[go: up one dir, main page]

CN106408756A - Method and system for identifying illegal use of identity card in operational internet surfing place - Google Patents

Method and system for identifying illegal use of identity card in operational internet surfing place Download PDF

Info

Publication number
CN106408756A
CN106408756A CN201610827852.7A CN201610827852A CN106408756A CN 106408756 A CN106408756 A CN 106408756A CN 201610827852 A CN201610827852 A CN 201610827852A CN 106408756 A CN106408756 A CN 106408756A
Authority
CN
China
Prior art keywords
identity card
place
online
metering data
history
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201610827852.7A
Other languages
Chinese (zh)
Other versions
CN106408756B (en
Inventor
游晓光
周可
郑义
曹锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUHAN SHIJI JINQIAO SAFETY TECHNOLOGY Co Ltd
Original Assignee
WUHAN SHIJI JINQIAO SAFETY TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUHAN SHIJI JINQIAO SAFETY TECHNOLOGY Co Ltd filed Critical WUHAN SHIJI JINQIAO SAFETY TECHNOLOGY Co Ltd
Priority to CN201610827852.7A priority Critical patent/CN106408756B/en
Publication of CN106408756A publication Critical patent/CN106408756A/en
Application granted granted Critical
Publication of CN106408756B publication Critical patent/CN106408756B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data

Landscapes

  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method and a system for identifying the illegal use of an identity card in an operational internet surfing place, and relates to the field of certificate identification in an internet service business place. The method comprises the following steps: extracting historical billing data of an internet surfing place of a former natural day to serve as embezzling judgement data; counting the number of all consumption events occurred by each identity card number of the embezzling judgement data; traversing the number of the consumption events of all identity card numbers, marking the identity card numbers with more than X times of the consumption events as suspected embezzled identity card numbers, and counting the number Y of the suspected embezzled identity card numbers; determining whether the current internet surfing place exists a behaviour of using the identity card to open an account for surfing the internet in an unauthorized manner according to the number Y of the suspected embezzled identity card numbers. According to the method and the system for identifying the illegal use of the identity card in the operational internet surfing place, whether the internet surfing place exists the behaviour of using the identity card to open an account for surfing the internet in the unauthorized manner can be determined according to the number of all the consumption events of the same identity card number of the specified internet surfing place on one day.

Description

A kind of operational online place is illegally using recognition methodss and the system of identity card
Technical field
The present invention relates to the certificate identification field in Internet service place of business is and in particular to a kind of operational online field Illegally using recognition methodss and the system of identity card.
Background technology
With the development of the cybertimes, (offer accomplishing the object of profit making opening to the public of Internet service place The place of service on net, is commonly called as Internet bar or net coffee, hereinafter referred to as surf the Net place) widely available among society;Online Place provides computer related hardware for consumer, and consumer can freely manipulate software facility.According to the People's Republic of China (PRC)《Interconnection Net service business place management rules》Relevant provision regulation, online place online primary condition be:1. must hold Personal identification papers.2. I must expire for 18 one full year of life.
But, some online places, in order to receive netizen's online that is teenage and not carrying identity card, can be usurped in recent years The identity card that client loses is opened an account in POS and is settled accounts;And then compromise pupillary physical and mental health, also result in simultaneously Some law-breakers conceal in online place and anonymity is issued in the Internet and browsed illegal information.
The existing method preventing identity card stolen is generally:Using living things feature recognition (such as recognition of face) cooperation Electronic characteristic identifies (such as mobile terminal identification code).But although said method needs in first registration biological characteristic and electricity Subcharacter, but registered biological characteristic and electronic characteristic whether all institute cannot be verified when place of surfing the Net uses identity card Belong to holder itself.Therefore, the identity card that the client usurping in said method still None- identified online place loses.
(me when opening an account, is needed to know fingerprint additionally, the third generation identity card with fingerprint identification technology has been promoted Not), but, a large amount of second generation identity cards not possessing fingerprint identification technology are still commonly using;Therefore, also do not have in prior art The method having the second generation identity card of client's loss usurped in identification online place.
Content of the invention
For defect present in prior art, present invention solves the technical problem that being:Existed according to specified online place All consumption event number of times that in one day, same identification card number occurs, determine that this online place whether there is robber's brush identity card and opens an account The behavior of online.
For reaching object above, the operational online place that the present invention provides, illegally using the recognition methodss of identity card, is wrapped Include following steps:
S1:Timing extraction need detect identity card whether usurp online place previous consecutive days history charging number According to timing cycle is 24 hours, and history metering data includes all consumption event of the netizen's real name internet with identification card number Data;Using the history metering data of described previous consecutive days as usurping judgement data, go to S2;
S2:Usurp in judgement data all, all consumption event number of times that each identification card number is occurred are united Meter, goes to S3;
S3:Travel through the consumption event number of times of all identification card numbers, will appear from the identification card number labelling of X above consumption event For the doubtful identification card number usurped, count number Y of the doubtful identification card number usurped, go to S4;
S4:According to number Y of the doubtful identification card number usurped, determine that current place of surfing the Net whether there is robber's brush identity card and opens The behavior of family online.
On the basis of technique scheme, extract described in S1 and need to detect the online place whether identity card is usurped The idiographic flow of the history metering data of previous consecutive days is:Extract the history metering data table in current place of surfing the Net, history meter Expense tables of data is used for storing the history metering data in current place of surfing the Net in fixed time limit;History metering data table determines and works as The history metering data of front online place previous consecutive days.
On the basis of technique scheme, the idiographic flow of S4 is:Whether judge Y >=1, if it is determined that on current Net place exists steals brush identity card and opens an account the behavior of online, otherwise determines that current place of surfing the Net does not exist on robber's brush identity card opens an account The behavior of net.
On the basis of technique scheme, in S1, one-time-consumption event data includes opening an account and number of settling accounts of one group of association According to.
What the present invention provided the realize operational online place of said method illegally using the identifying system of identity card, including Intervalometer, requestor, consumption event enumerator, usurp identity card mark module and threshold-discrimination module;
Intervalometer is used for:Timing sends inquiry signal to requestor, and timing cycle is 24 hours;
Requestor is used for:After receiving inquiry signal, extract and need to detect the previous of the online place whether identity card is usurped The history metering data of consecutive days, history metering data includes all consumption event of the netizen's real name internet with identification card number Data;Using the history metering data of described previous consecutive days as usurping judgement data, send consumption to consumption event enumerator Event count signal;
Consumption event enumerator is used for:After receiving consumption event count signal, usurp in judgement data all, to each All consumption event number of times that individual identification card number occurs are counted, and usurp identity card mark to usurping the transmission of identity card mark module Note signal;
Usurp identity card mark module to be used for:Receive after usurping identity card marking signal, travel through disappearing of all identification card numbers Take event times, the identification card number that will appear from X above consumption event is labeled as the doubtful identification card number usurped, and counts doubtful robber Number Y of identification card number, judges signal to threshold-discrimination module sending threshold value;
Threshold-discrimination module is used for:After receiving threshold determination signal, according to number Y of the doubtful identification card number usurped, really Settled front online place whether there is steals brush identity card and opens an account the behavior of online.
On the basis of technique scheme, the specific workflow of described requestor is:Extract the history in online place Metering data table, history metering data table is used for storing the history metering data in current place of surfing the Net in fixed time limit;In history The history metering data of current place previous consecutive days of surfing the Net is determined in metering data table.
On the basis of technique scheme, the specific workflow of described threshold-discrimination module is:Whether judge Y >=1, If the behavior of online it is determined that presence robber's brush identity card in online place is opened an account, otherwise determine that online place does not have robber's brush body Part demonstrate,proves the behavior of online of opening an account.
On the basis of technique scheme, the one-time-consumption event data in described requestor includes opening of one group of association Family and checkout data.
Compared with prior art, it is an advantage of the current invention that:
The identity card Limited Number illegally held due to online place owner, these illegal identity cards would generally be in short-term The frequent degree that interior Reusability, therefore illegal identity card sends consumption event in online place in a short time is often very high.This Bright exactly using identity card, usage frequency at short notice performs an analysis, statistics specified online place same identification card number in a day The all consumption event number of times occurring, and then determine that this online place whether there is and steal brush identity card and open an account the behavior of online.
In view of this, compared with living things feature recognition of the prior art cooperation electronic characteristic identification, no matter the present invention gives birth to Thing feature identification and electronic characteristic identify whether to be cracked, and all can detect whether identity card is stolen.Meanwhile, the present invention Identification is usurped without the proof procedure relying on identity card during identity card, and then the day-to-day operations activity without interference with online place, Either online place or user name all will not discover the statistics and analysis process of the present invention;Therefore, the disguise of the present invention is relatively Good, it is very suitable for promoting.
Brief description
Fig. 1 is for operational online place in the embodiment of the present invention illegally using the flow chart of the recognition methodss of identity card;
Fig. 2 is for operational online place in the embodiment of the present invention illegally using the FB(flow block) of the identifying system of identity card.
Specific embodiment
Below in conjunction with drawings and Examples, the present invention is described in further detail.
Shown in Figure 1, in the embodiment of the present invention operational online place illegally using the recognition methodss of identity card, including Following steps:
S1:Regularly (timing cycle is 24 hours) extracts the history meter in the online place needing to detect whether identity card is usurped Take tables of data, history metering data table is used for storing the history metering data in this online place certain time Nei, history charging number According to the netizen's real name internet including with identification card number all consumption event data (one-time-consumption event data include one group pass Join opens an account and data of settling accounts);The history charging number of current place previous consecutive days of surfing the Net is determined in history metering data table According to and as usurping judgement data, go to S2.
S2:Usurp in judgement data all, all consumption event number of times that each identification card number is occurred are united Meter, goes to S3.
S3:Travel through the consumption event number of times of all identification card numbers, will appear from the identification card number labelling of X above consumption event For the doubtful identification card number usurped, count number Y of the doubtful identification card number usurped, go to S4.
S4:According to number Y of the doubtful identification card number usurped, determine that current place of surfing the Net whether there is robber's brush identity card and opens The behavior (if Y >=1, being, be not otherwise) of family online.
Shown in Figure 2, realize the operational online place of said method illegally using identity in the embodiment of the present invention The identifying system of card, including intervalometer, requestor, consumption event enumerator, usurps identity card mark module and threshold determination mould Block.
Intervalometer is used for:Timing sends inquiry signal to requestor, and timing cycle is 24 hours.
Requestor is used for:After receiving inquiry signal, extract the history in the online place needing to detect whether identity card is usurped Metering data table, history metering data table is used for storing the history metering data in this online place certain time Nei, history charging Data includes all consumption event data of the netizen's real name internet with identification card number, and (one-time-consumption event data includes one group Associate opens an account and data of settling accounts);The history charging of current place previous consecutive days of surfing the Net is determined in history metering data table Data as usurping judgement data, sends consumption event count signal to consumption event enumerator.
Consumption event enumerator is used for:After receiving consumption event count signal, usurp in judgement data all, to each All consumption event number of times that individual identification card number occurs are counted, and usurp identity card mark to usurping the transmission of identity card mark module Note signal.
Usurp identity card mark module to be used for:Receive after usurping identity card marking signal, travel through disappearing of all identification card numbers Take event times, the identification card number that will appear from X above consumption event is labeled as the doubtful identification card number usurped, and counts doubtful robber Number Y of identification card number, judges signal to threshold-discrimination module sending threshold value.
Threshold-discrimination module is used for:After receiving threshold determination signal, according to number Y of the doubtful identification card number usurped, really Settled front online place whether there is steals brush identity card and opens an account the behavior (if Y >=1, being, be not otherwise) of online.
The present invention is not limited to above-mentioned embodiment, for those skilled in the art, without departing from On the premise of the principle of the invention, some improvements and modifications can also be made, these improvements and modifications are also considered as the protection of the present invention Within the scope of.The content not being described in detail in this specification belongs to prior art known to professional and technical personnel in the field.

Claims (8)

1. a kind of operational online place illegally using identity card recognition methodss it is characterised in that the method includes following step Suddenly:
S1:The history metering data of the previous consecutive days in online place that timing extraction needs to detect whether identity card is usurped, fixed When the cycle be 24 hours, history metering data includes all consumption event data of the netizen's real name internet with identification card number; Using the history metering data of described previous consecutive days as usurping judgement data, go to S2;
S2:Usurp in judgement data all, all consumption event number of times that each identification card number is occurred count, and turn To S3;
S3:Travel through the consumption event number of times of all identification card numbers, the identification card number that will appear from X above consumption event is labeled as doubting The identification card number seemingly usurped, counts number Y of the doubtful identification card number usurped, goes to S4;
S4:According to number Y of the doubtful identification card number usurped, determine that current place of surfing the Net whether there is and steal on brush identity card opens an account The behavior of net.
2. as claimed in claim 1 operational online place illegally using identity card recognition methodss it is characterised in that:In S1 Described extraction need detect identity card whether usurp online place the history metering data of previous consecutive days idiographic flow For:Extract the history metering data table in current place of surfing the Net, history metering data table is used for storing in fixed time limit currently surfs the Net The history metering data in place;The history charging number of current place previous consecutive days of surfing the Net is determined in history metering data table According to.
3. as claimed in claim 1 operational online place illegally using identity card recognition methodss it is characterised in that:S4's Idiographic flow is:Whether judge Y >=1, if the behavior of online it is determined that place presence robber's brush identity card of currently surfing the Net is opened an account, Otherwise determine that current place of surfing the Net does not exist to steal brush identity card and open an account the behavior of online.
4. the operational online place as described in any one of claims 1 to 3 is illegally using the recognition methodss of identity card, its feature It is:In S1, one-time-consumption event data includes opening an account and data of settling accounts of one group of association.
5. a kind of operational online place realizing Claims 1-4 any one methods described is illegally using the identification of identity card System it is characterised in that:This system includes intervalometer, requestor, consumption event enumerator, usurps identity card mark module and threshold Value determination module;
Intervalometer is used for:Timing sends inquiry signal to requestor, and timing cycle is 24 hours;
Requestor is used for:After receiving inquiry signal, extract the previous nature in the online place needing to detect whether identity card is usurped The history metering data of day, history metering data includes all consumption event numbers of the netizen's real name internet with identification card number According to;Using the history metering data of described previous consecutive days as usurping judgement data, send consumption thing to consumption event enumerator Part count signal;
Consumption event enumerator is used for:After receiving consumption event count signal, usurp in judgement data all, to each body All consumption event number of times that part card number occurs are counted, and usurp identity card labelling letter to usurping the transmission of identity card mark module Number;
Usurp identity card mark module to be used for:Receive after usurping identity card marking signal, travel through the consumption thing of all identification card numbers Piece number, the identification card number that will appear from X above consumption event is labeled as the doubtful identification card number usurped, and statistics is doubtful to be usurped Number Y of identification card number, judges signal to threshold-discrimination module sending threshold value;
Threshold-discrimination module is used for:After receiving threshold determination signal, according to number Y of the doubtful identification card number usurped, determine and work as Front online place whether there is steals brush identity card and opens an account the behavior of online.
6. as claimed in claim 5 operational online place illegally using identity card identifying system it is characterised in that:Described The specific workflow of requestor is:Extract the history metering data table in online place, history metering data table refers to for storage The history metering data in current place of surfing the Net in periodically limiting;The current previous nature in place of surfing the Net is determined in history metering data table The history metering data of day.
7. as claimed in claim 5 operational online place illegally using identity card identifying system it is characterised in that:Described The specific workflow of threshold-discrimination module is:Whether judge Y >=1, if it is determined that presence robber's brush identity card in online place is opened The behavior of family online, otherwise determines that online place does not exist and steals brush identity card and open an account the behavior of online.
8. the operational online place as described in any one of claim 5 to 7 is illegally using the identifying system of identity card, its feature It is:One-time-consumption event data in described requestor includes opening an account and data of settling accounts of one group of association.
CN201610827852.7A 2016-09-18 2016-09-18 A kind of operational online place illegally uses the recognition methods and system of identity card Active CN106408756B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610827852.7A CN106408756B (en) 2016-09-18 2016-09-18 A kind of operational online place illegally uses the recognition methods and system of identity card

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610827852.7A CN106408756B (en) 2016-09-18 2016-09-18 A kind of operational online place illegally uses the recognition methods and system of identity card

Publications (2)

Publication Number Publication Date
CN106408756A true CN106408756A (en) 2017-02-15
CN106408756B CN106408756B (en) 2019-07-02

Family

ID=57997401

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610827852.7A Active CN106408756B (en) 2016-09-18 2016-09-18 A kind of operational online place illegally uses the recognition methods and system of identity card

Country Status (1)

Country Link
CN (1) CN106408756B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1388481A (en) * 2001-05-25 2003-01-01 林义富 Financial transaction security system and method
US20060010487A1 (en) * 2004-07-09 2006-01-12 Fierer Robert G System and method of verifying personal identities
CN101789113A (en) * 2010-02-09 2010-07-28 许晓飞 Individual consumption record acquisition and query system
CN202495090U (en) * 2012-03-31 2012-10-17 成都因纳伟盛科技股份有限公司 Internet cafe management system based on second generation identity card reader
CN103123712A (en) * 2011-11-17 2013-05-29 阿里巴巴集团控股有限公司 Method and system for monitoring network behavior data

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1388481A (en) * 2001-05-25 2003-01-01 林义富 Financial transaction security system and method
US20060010487A1 (en) * 2004-07-09 2006-01-12 Fierer Robert G System and method of verifying personal identities
CN101789113A (en) * 2010-02-09 2010-07-28 许晓飞 Individual consumption record acquisition and query system
CN103123712A (en) * 2011-11-17 2013-05-29 阿里巴巴集团控股有限公司 Method and system for monitoring network behavior data
CN202495090U (en) * 2012-03-31 2012-10-17 成都因纳伟盛科技股份有限公司 Internet cafe management system based on second generation identity card reader

Also Published As

Publication number Publication date
CN106408756B (en) 2019-07-02

Similar Documents

Publication Publication Date Title
CN106384273B (en) Malicious bill-swiping detection system and method
US20120131657A1 (en) Apparatus and Method for Authenticated Multi-User Personal Information Database
CN102945366A (en) Method and device for face recognition
CN104637184A (en) Medical storage control method and system based on human face recognition
WO2019041774A1 (en) Customer information screening method and apparatus, electronic device, and medium
CN107633573A (en) The method for unlocking and intelligent door lock of a kind of intelligent door lock
CN104636337B (en) A kind of data cleansing storage method for value-added tax
CN101739767A (en) Method and system for processing abnormal operation of self-service terminal
CN106485225A (en) Identity card checking method and system based on biological nature identification
CN107798448A (en) The determination methods and device of black list user
CN106789292A (en) A kind of abnormal behaviour monitoring method and device
CN110659335A (en) Analysis method for recessive drug addicts
CN102930492A (en) Method for preventing counterfeiting and illegally using second-generation ID card
CN101699435A (en) Method for querying and authenticating second-generation ID card based on key information
CN108510396A (en) It insures method, apparatus, computer equipment and the storage medium of verification
CN103207963A (en) Two-factor authentication system based on fingerprint and vein recognition
CN203192091U (en) Automatic teller machine
CN110059671A (en) A kind of safety inspection method, system, device and computer readable storage medium
CN104965927A (en) Method and system of verifying identity (ID) cards by using database
Descallar et al. The association between the incidence of emergency department attendances for alcohol problems and assault incidents attended by police in New South Wales, Australia, 2003–2008: a time–series analysis
CN106408756B (en) A kind of operational online place illegally uses the recognition methods and system of identity card
CN101702168A (en) Method for inquiring information based on key information of the second generation identity card
CN102254129A (en) Identity (ID) card verifying system
CN101840505A (en) Individual identity identification system
Sullivan Digital identity–The legal person?

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant