CN110225047B - Work monitoring method and device, computer equipment and storage medium - Google Patents
Work monitoring method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN110225047B CN110225047B CN201910531444.0A CN201910531444A CN110225047B CN 110225047 B CN110225047 B CN 110225047B CN 201910531444 A CN201910531444 A CN 201910531444A CN 110225047 B CN110225047 B CN 110225047B
- Authority
- CN
- China
- Prior art keywords
- information
- enterprise
- terminal device
- work
- operator
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 238000012544 monitoring process Methods 0.000 title claims abstract description 29
- 238000012795 verification Methods 0.000 claims abstract description 30
- 238000001514 detection method Methods 0.000 claims abstract description 20
- 230000033001 locomotion Effects 0.000 claims description 27
- 238000012545 processing Methods 0.000 claims description 14
- 230000002159 abnormal effect Effects 0.000 claims description 11
- 230000005856 abnormality Effects 0.000 claims description 11
- 239000000284 extract Substances 0.000 claims description 10
- 238000012806 monitoring device Methods 0.000 claims description 5
- 238000005516 engineering process Methods 0.000 abstract description 16
- 238000010586 diagram Methods 0.000 description 11
- 238000004590 computer program Methods 0.000 description 6
- 230000009286 beneficial effect Effects 0.000 description 4
- 230000000694 effects Effects 0.000 description 4
- 238000013528 artificial neural network Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000007689 inspection Methods 0.000 description 3
- 238000010801 machine learning Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 238000012015 optical character recognition Methods 0.000 description 3
- 238000013473 artificial intelligence Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000001747 exhibiting effect Effects 0.000 description 2
- 238000012797 qualification Methods 0.000 description 2
- 230000003203 everyday effect Effects 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 230000001131 transforming effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/40—Spoof detection, e.g. liveness detection
- G06V40/45—Detection of the body part being alive
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0861—Network architectures or network communication protocols for network security for authentication of entities using biometrical features, e.g. fingerprint, retina-scan
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Biomedical Technology (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Power Engineering (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
本发明公开了一种工作监测方法、装置、计算机设备及存储介质,其中方法为:终端设备获取待评估企业的名称,以及所述终端设备所在的第一地理位置;终端设备验证所述第一地理位置与第二地理位置是否一致;所述第二地理位置为预录入的所述待评估企业的地理位置;若一致,则所述终端设备对所述终端设备的操作者进行生物特征信息检测,若所述操作者未通过所述生物特征信息检测,则确定所述操作者的信息校验不通过。该方案应用于金融科技(Fintech)时,通过对终端设备的地理位置以及操作者生物特征信息的验证,提高了金融工作的有效监测。
The invention discloses a work monitoring method, device, computer equipment and storage medium, wherein the method is as follows: a terminal device obtains the name of an enterprise to be evaluated and a first geographic location where the terminal device is located; and the terminal device verifies the first Whether the geographic location is consistent with the second geographic location; the second geographic location is the pre-entered geographic location of the enterprise to be evaluated; if they are consistent, the terminal device performs biometric information detection on the operator of the terminal device , if the operator fails the biometric information detection, it is determined that the operator's information verification fails. When the solution is applied to financial technology (Fintech), it improves the effective monitoring of financial work by verifying the geographic location of the terminal device and the biometric information of the operator.
Description
技术领域technical field
本发明涉及金融科技(Fintech)领域和人工智能领域,尤其涉及一种工作监测方法、装置、计算机设备及存储介质。The present invention relates to the field of financial technology (Fintech) and the field of artificial intelligence, and in particular, to a work monitoring method, device, computer equipment and storage medium.
背景技术Background technique
随着计算机技术的发展,越来越多的技术(大数据、分布式、区块链(Blockchain)、人工智能等)应用在金融领域,传统金融业正在逐步向金融科技(Fintech)转变。目前,金融科技领域中,很多工作在开展时,工作人员都有违规操作的可能,因此需要对工作过程进行监测,从而规范工作人员的行为。举例来说,企业向银行申请贷款时,银行会派展业人员前往小微企业进行企业主身份核实以及企业实际情况核实,即进行展业工作。但是展业人员在进行展业工作的过程中,可能会出现违规操作,比如有些展业人员为了减少工作量,会与当地的中介进行不正当的合作,将展业工作交给中介公司,而自己则在工作时间公车私用,从事其它活动。因此,需要对工作过程进行监测,从而可以及时查处工作违规事件。With the development of computer technology, more and more technologies (big data, distributed, blockchain, artificial intelligence, etc.) are applied in the financial field, and the traditional financial industry is gradually transforming into financial technology (Fintech). At present, in the field of financial technology, when a lot of work is carried out, the staff may operate in violation of regulations, so it is necessary to monitor the work process to regulate the behavior of the staff. For example, when an enterprise applies for a loan from a bank, the bank will send an exhibition staff to a small and micro enterprise to verify the identity of the business owner and the actual situation of the enterprise, that is, to conduct business development work. However, in the process of exhibiting business, there may be illegal operations. For example, in order to reduce the workload, some exhibitors will cooperate improperly with the local intermediary, and hand over the exhibiting work to the intermediary company while they are working. Time for private use of the bus and other activities. Therefore, it is necessary to monitor the work process so that work violations can be investigated and dealt with in a timely manner.
目前对工作过程的监测主要通过随机抽查或人工反馈进行,举例来说,银行对展业人员是通过随机抽查、询问企业主或者其它途径的投诉信息对展业人员的工作情况进行评估。这种方法下,依赖人工操作,不仅监测效率低下,而且并不能避免工作人员进行违规操作,难以对全部工作人员进行有效监测。At present, the monitoring of the work process is mainly carried out through random inspection or manual feedback. For example, the bank evaluates the work conditions of the exhibitors through random inspections, inquiries from business owners or other means of complaint information. Under this method, relying on manual operation, not only the monitoring efficiency is low, but also can not prevent the staff from conducting illegal operations, and it is difficult to effectively monitor all the staff.
由此可见,目前对工作人员在工作过程的监测中,工作人员违规操作的空间较大,缺乏对工作人员违规操作的有效监测。It can be seen that at present, in the monitoring of the work process of the staff, there is a large space for the staff to operate illegally, and there is a lack of effective monitoring of the staff's illegal operations.
发明内容SUMMARY OF THE INVENTION
本申请实施例提供一种工作监测方法及装置,解决了现有技术中工作人员违规操作的空间较大,缺乏对工作人员违规操作的有效监测的问题。The embodiments of the present application provide a work monitoring method and device, which solves the problem in the prior art that there is a large space for staff to operate illegally, and there is a lack of effective monitoring of the staff's illegal operation.
本申请实施例提供一种工作监测方法:终端设备获取待评估企业的名称,以及所述终端设备所在的第一地理位置;终端设备验证所述第一地理位置与第二地理位置是否一致;所述第二地理位置为预录入的所述待评估企业的地理位置;若一致,则所述终端设备对所述终端设备的操作者进行生物特征信息检测,若所述操作者未通过所述生物特征信息检测,则确定所述操作者的信息校验不通过。The embodiment of the present application provides a work monitoring method: a terminal device obtains the name of the enterprise to be evaluated and a first geographic location where the terminal device is located; the terminal device verifies whether the first geographic location is consistent with the second geographic location; The second geographic location is the pre-entered geographic location of the to-be-evaluated enterprise; if the same, the terminal device performs biometric information detection on the operator of the terminal device, if the operator fails to pass the biometric information If the feature information is detected, it is determined that the operator's information verification fails.
上述方法中,终端设备首先获取待评估企业的名称,以及所述终端设备所在的第一地理位置,然后验证所述第一地理位置与预录入的所述待评估企业的第二地理位置是否一致,从而对终端设备的地理位置进行了验证,若一致,则对所述终端设备的操作者进行生物特征信息检测,结合对终端设备的地理位置的验证,若所述操作者未通过所述生物特征信息检测,则确定所述操作者的信息校验不通过,该方法大幅降低了操作者的违规操作空间,从而实现对操作者违规的有效监测。In the above method, the terminal device first obtains the name of the enterprise to be evaluated and the first geographic location where the terminal device is located, and then verifies whether the first geographic location is consistent with the pre-entered second geographic location of the enterprise to be evaluated. , so as to verify the geographic location of the terminal device. If they are consistent, then perform biometric information detection on the operator of the terminal device. Combined with the verification of the geographic location of the terminal device, if the operator fails to pass the biometric information If the feature information is detected, it is determined that the operator's information verification fails. This method greatly reduces the operator's illegal operation space, thereby realizing effective monitoring of the operator's violation.
一种可选实施方式中,所述终端设备采集预设空间范围内的第一工作信息;所述第一工作信息包括所述操作者的第一身份信息和所述待评估企业的第一企业信息;所述第一企业信息包括以下至少一项:企业主;企业名称;所述终端设备验证所述第一工作信息与第二工作信息是否一致;其中,所述第二工作信息包括第二身份信息和第二企业信息;所述第二身份信息为预录入的所述操作者的身份信息,所述第二企业信息为预录入的所述待评估企业的企业信息;若不一致,则确定所述操作者的信息校验不通过。In an optional implementation manner, the terminal device collects first work information within a preset space; the first work information includes the operator's first identity information and the first enterprise of the enterprise to be evaluated. information; the first enterprise information includes at least one of the following: an enterprise owner; an enterprise name; the terminal device verifies whether the first work information is consistent with the second work information; wherein the second work information includes the second work information. Identity information and second enterprise information; the second identity information is the pre-entered identity information of the operator, and the second enterprise information is the pre-entered enterprise information of the to-be-evaluated enterprise; if inconsistent, determine The operator's information verification fails.
上述方法中,所述终端设备采集预设空间范围内的第一工作信息;所述第一工作信息包括所述操作者的第一身份信息和所述待评估企业的第一企业信息;所述第一企业信息包括以下至少一项:企业主;企业名称,然后终端设备验证所述第一工作信息与预先录入的第二工作信息是否一致,进一步对操作者进行信息校验,实现对操作者违规的有效监测。In the above method, the terminal device collects first work information within a preset space; the first work information includes first identity information of the operator and first enterprise information of the enterprise to be evaluated; the The first enterprise information includes at least one of the following: the owner of the enterprise; the name of the enterprise, and then the terminal device verifies whether the first work information is consistent with the pre-entered second work information, and further performs information verification on the operator, so as to realize the verification of the operator. Effective monitoring of violations.
一种可选实施方式中,所述终端设备采集预设空间范围内的第一工作信息,包括:所述终端设备采集所述预设空间范围的影音信息;所述终端设备从所述影音信息中提取所述第一身份信息以及所述第一企业信息。In an optional implementation manner, collecting, by the terminal device, the first work information within a preset spatial range includes: collecting, by the terminal device, audio and video information in the preset spatial range; Extract the first identity information and the first enterprise information from the .
上述方法中,所述终端设备采集所述预设空间范围的影音信息,并从所述影音信息中提取所述第一身份信息以及所述第一企业信息,由于影音信息中第一身份信息以及第一企业信息更难伪造,从而增加了获取所述第一身份信息以及所述第一企业信息的安全性,从而进一步降低操作者的违规操作空间。In the above method, the terminal device collects the audio and video information in the preset spatial range, and extracts the first identity information and the first enterprise information from the audio and video information. The first enterprise information is more difficult to forge, thereby increasing the security of obtaining the first identity information and the first enterprise information, thereby further reducing the operator's room for illegal operations.
一种可选实施方式中,所述终端设备验证所述第一工作信息与第二工作信息是否一致,包括:所述终端设备将所述第一工作信息按照预设算法加密,获取第一加密信息;所述终端设备获取第二加密信息;所述第二加密信息是预先按照所述预设算法加密所述第二工作信息得到的;所述终端设备验证所述第一加密信息是否与所述第二加密信息一致,若一致,则验证所述第一工作信息与所述第二工作信息一致;否则,验证所述第一工作信息与所述第二工作信息不一致。In an optional implementation manner, the terminal device verifying whether the first work information is consistent with the second work information includes: the terminal device encrypts the first work information according to a preset algorithm, and obtains the first encrypted data. information; the terminal device obtains second encrypted information; the second encrypted information is obtained by encrypting the second working information in advance according to the preset algorithm; the terminal device verifies whether the first encrypted information is the same as the The second encrypted information is consistent, and if they are consistent, verify that the first working information is consistent with the second working information; otherwise, verify that the first working information and the second working information are inconsistent.
上述方法中,所述终端设备将所述第一工作信息按照预设算法加密,获取第一加密信息;所述终端设备获取第二加密信息;所述第二加密信息是预先按照所述预设算法加密所述第二工作信息得到的;根据加密后的第一加密信息与第二加密信息,验证第一工作信息与第二工作信息是否一致,从而增加了第一工作信息与第二工作信息是否一致验证结论的可靠性。In the above method, the terminal device encrypts the first work information according to a preset algorithm to obtain the first encrypted information; the terminal device obtains the second encrypted information; the second encrypted information is obtained in advance according to the preset algorithm It is obtained by encrypting the second working information with an algorithm; according to the encrypted first encrypted information and the second encrypted information, it is verified whether the first working information and the second working information are consistent, thereby adding the first working information and the second working information Whether it is consistent to verify the reliability of the conclusion.
一种可选实施方式中,所述终端设备获取所述终端设备的运动轨迹;所述终端设备若确定所述运动轨迹异常则进行异常上报。In an optional implementation manner, the terminal device acquires the motion track of the terminal device; if the terminal device determines that the motion track is abnormal, it reports the abnormality.
上述方法中,终端设备获取所述终端设备的运动轨迹;所述终端设备若确定所述运动轨迹异常则进行异常上报,即便操作者通过信息校验,如果未能按预期运动轨迹运动,也能及时上报异常情况。In the above method, the terminal device obtains the motion track of the terminal device; if the terminal device determines that the motion track is abnormal, it will report the abnormality, even if the operator passes the information verification, if he fails to move according to the expected motion track, he can also report the abnormality. Report exceptions in a timely manner.
本申请实施例提供一种工作监测装置,获取模块,用于获取待评估企业的名称,以及所述装置所在的第一地理位置;处理模块,用于验证所述第一地理位置与第二地理位置是否一致;所述第二地理位置为预录入的所述待评估企业的地理位置;若一致,则所述装置的操作者进行生物特征信息检测,若所述操作者未通过所述生物特征信息检测,则确定所述操作者的信息校验不通过。An embodiment of the present application provides a work monitoring device. An acquisition module is used to acquire the name of the enterprise to be evaluated and a first geographic location where the device is located; and a processing module is used to verify the first geographic location and the second geographic location. Whether the location is consistent; the second geographic location is the pre-entered geographic location of the enterprise to be evaluated; if it is consistent, the operator of the device will perform biometric information detection, if the operator fails to pass the biometric information If the information is detected, it is determined that the operator's information verification fails.
一种可选实施方式中,所述处理模块还用于:采集预设空间范围内的第一工作信息;所述第一工作信息包括所述操作者的第一身份信息和所述待评估企业的第一企业信息;所述第一企业信息包括以下至少一项:企业主;企业名称;验证所述第一工作信息与第二工作信息是否一致;其中,所述第二工作信息包括第二身份信息和第二企业信息;所述第二身份信息为预录入的所述操作者的身份信息,所述第二企业信息为预录入的所述待评估企业的企业信息;若不一致,则确定所述操作者的信息校验不通过。In an optional implementation manner, the processing module is further configured to: collect first work information within a preset spatial range; the first work information includes the operator's first identity information and the enterprise to be evaluated. The first enterprise information; the first enterprise information includes at least one of the following: enterprise owner; enterprise name; verifying whether the first work information is consistent with the second work information; wherein, the second work information includes the second Identity information and second enterprise information; the second identity information is the pre-entered identity information of the operator, and the second enterprise information is the pre-entered enterprise information of the to-be-evaluated enterprise; if inconsistent, determine The operator's information verification fails.
一种可选实施方式中,所述处理模块具体用于:采集所述预设空间范围的影音信息;从所述影音信息中提取所述第一身份信息以及所述第一企业信息。In an optional implementation manner, the processing module is specifically configured to: collect audio and video information in the preset spatial range; and extract the first identity information and the first enterprise information from the audio and video information.
一种可选实施方式中,所述处理模块具体用于:将所述第一工作信息按照预设算法加密,获取第一加密信息;获取第二加密信息;所述第二加密信息是预先按照所述预设算法加密所述第二工作信息得到的;验证所述第一加密信息是否与所述第二加密信息一致,若一致,则验证所述第一工作信息与所述第二工作信息一致;否则,验证所述第一工作信息与所述第二工作信息不一致。In an optional implementation manner, the processing module is specifically configured to: encrypt the first work information according to a preset algorithm, and obtain the first encrypted information; obtain the second encrypted information; Obtained by encrypting the second working information by the preset algorithm; verifying whether the first encrypted information is consistent with the second encrypted information, and if they are consistent, verifying the first working information and the second working information Consistent; otherwise, verify that the first work information is inconsistent with the second work information.
一种可选实施方式中,所述获取模块还用于:获取所述装置的运动轨迹;若确定所述运动轨迹异常则进行异常上报。In an optional implementation manner, the acquiring module is further configured to: acquire the motion trajectory of the device; and report the abnormality if it is determined that the motion trajectory is abnormal.
上述第二方面及第二方面各个实施例的有益效果,可以参考上述第一方面及第一方面各个实施例的有益效果,这里不再赘述。For the beneficial effects of the second aspect and the embodiments of the second aspect, reference may be made to the beneficial effects of the first aspect and the embodiments of the first aspect, which will not be repeated here.
第三方面,本申请实施例提供一种计算机设备,包括程序或指令,当所述程序或指令被执行时,用以执行上述第一方面及第一方面各个实施例的方法。In a third aspect, an embodiment of the present application provides a computer device, including a program or an instruction, which, when the program or instruction is executed, is used to execute the above-mentioned first aspect and the methods of the various embodiments of the first aspect.
第四方面,本申请实施例提供一种存储介质,包括程序或指令,当所述程序或指令被执行时,用以执行上述第一方面及第一方面各个实施例的方法。In a fourth aspect, an embodiment of the present application provides a storage medium, including a program or an instruction, which, when the program or instruction is executed, is used to execute the above-mentioned first aspect and the methods of the various embodiments of the first aspect.
附图说明Description of drawings
图1为本申请实施例提供的一种工作监测系统的系统架构示意图;1 is a schematic diagram of a system architecture of a work monitoring system provided by an embodiment of the present application;
图2为本申请实施例提供的一种工作监测方法的步骤流程示意图;2 is a schematic flowchart of steps of a work monitoring method provided in an embodiment of the present application;
图3为本申请实施例提供的一种工作监测方法的步骤流程的具体示意图;FIG. 3 is a specific schematic diagram of the step flow of a work monitoring method provided by an embodiment of the present application;
图4为本申请实施例提供的一种工作监测装置的结构示意图。FIG. 4 is a schematic structural diagram of a work monitoring device according to an embodiment of the present application.
具体实施方式Detailed ways
为了更好的理解上述技术方案,下面将结合说明书附图及具体的实施方式对上述技术方案进行详细的说明,应当理解本申请实施例以及实施例中的具体特征是对本申请技术方案的详细的说明,而不是对本申请技术方案的限定,在不冲突的情况下,本申请实施例以及实施例中的技术特征可以相互结合。In order to better understand the above technical solutions, the above technical solutions will be described in detail below with reference to the accompanying drawings and specific embodiments of the description. The description is not intended to limit the technical solutions of the present application, and the embodiments of the present application and the technical features in the embodiments may be combined with each other if there is no conflict.
目前,金融科技(Fintech)领域中,很多工作在开展时,工作人员都有违规操作的可能,因此需要对工作过程进行监测,从而规范工作人员的行为。目前工作人员的实际工作情况是缺乏有效监测的。举例来说,展业工作过程中,为了减少展业人员与当地中介进行不正当的合作、展业人员公车私用以及工作时间从事私人活动,对小微企业和银行造成损失,银行一般只能通过随机抽查以及小微企业主或者其它途径的投诉信息来对展业人员进行考核。这种方法不仅效率低,而且并不能避免展业人员进行违规操作。目前展业工作有以下违规隐患:(1)展业人员可以与当地中介进行违规合作,获取不正当利益。(2)小微企业信息安全受到威胁,企业主权益得不到保障。(3)展业人员不到场审查企业,仅仅通过中介,不仅会使得银行的服务质量得不到保障,影响银行信誉,而且会损害银行的利益。(4)展业人员公车私用,会额外增加银行的运营成本。(5)展业人员每天工作时间只花小部分时间去小微企业核实资质,大部分时间都用来从事其它私人活动,这样会使得小微企业不能及时获得贷款,银行利益受到损害,同时会增加银行的人力成本。At present, in the field of financial technology (Fintech), when a lot of work is carried out, the staff may operate in violation of regulations, so it is necessary to monitor the work process to regulate the behavior of the staff. At present, the actual work situation of the staff lacks effective monitoring. For example, in order to reduce the improper cooperation between the exhibitors and local intermediaries, the private use of public vehicles by the exhibitors, and the private activities during working hours, which may cause losses to small and micro enterprises and banks, banks generally can only conduct random inspections. As well as the complaint information of small and micro business owners or other channels to evaluate the exhibitors. This method is not only inefficient, but also cannot avoid illegal operations by exhibitors. At present, there are the following hidden dangers in the exhibition work: (1) The exhibition staff can cooperate with local intermediaries in violation of regulations to obtain illegitimate benefits. (2) The information security of small and micro enterprises is threatened, and the rights and interests of business owners cannot be guaranteed. (3) If the exhibitors are not present to inspect the enterprise, but only through intermediaries, the service quality of the bank will not be guaranteed, which will affect the bank's reputation, and will damage the bank's interests. (4) Private use of public vehicles by exhibitors will increase the bank's operating costs. (5) The exhibition staff only spend a small part of their working time every day to verify the qualifications of small and micro enterprises, and most of the time is used to engage in other private activities, which will make small and micro enterprises unable to obtain loans in time, damage the interests of banks, and increase the number of small and micro enterprises. Bank labor costs.
为此,在定位技术、加密技术以及机器学习技术日益成熟的今天,本申请通过定位技术、加密技术以及机器学习技术对工作人员的实际工作情况进行监测,举例来说,确保展业人员亲自去申请贷款的小微企业进行资质核实且不能在工作时间从事私人活动,可以有效的解决原有方案的缺陷,下面将进行详细说明。For this reason, with the increasingly mature positioning technology, encryption technology and machine learning technology, this application monitors the actual working conditions of the staff through positioning technology, encryption technology and machine learning technology. Small and micro-enterprises with loans can verify their qualifications and cannot engage in private activities during working hours, which can effectively solve the shortcomings of the original plan, which will be explained in detail below.
本申请实施例提供的一种工作监测方法即可由终端设备单独来完成,也可以将一部分步骤交由后台服务器来完成。举例来说,如图1所示,为本申请实施例提供的一种工作监测系统的系统架构示意图。The work monitoring method provided by the embodiment of the present application can be completed by a terminal device alone, or part of the steps can be completed by a background server. For example, as shown in FIG. 1 , a schematic diagram of a system architecture of a work monitoring system provided by an embodiment of the present application is shown.
该系统架构包括两部分:终端设备和后台服务器。The system architecture includes two parts: terminal equipment and background server.
终端设备用于收集地理位置信息、生物特征信息和企业信息以及运动轨迹,上传给后台服务器。The terminal device is used to collect geographic location information, biometric information, enterprise information and motion trajectories, and upload them to the background server.
后台服务器负责处理和判断地理位置信息、生物特征信息和企业信息,并将信息校验结果反馈至终端设备,以及对终端设备的运动轨迹进行异常判断,及时上报。The background server is responsible for processing and judging geographic location information, biometric information and enterprise information, and feeding back the information verification results to the terminal device, as well as judging the abnormality of the movement trajectory of the terminal device and reporting it in time.
如图2所示,为本申请实施例提供的一种工作监测方法的步骤流程示意图,图2示出的工作监测方法由终端设备单独完成。As shown in FIG. 2 , it is a schematic flowchart of steps of a work monitoring method provided by an embodiment of the present application, and the work monitoring method shown in FIG. 2 is completed by a terminal device alone.
步骤201:终端设备获取待评估企业的名称,以及所述终端设备所在的第一地理位置。Step 201: The terminal device obtains the name of the enterprise to be evaluated and the first geographic location where the terminal device is located.
终端设备可以直接获取操作者输入的待评估企业的名称,也可以从后台服务器获取预先规定的当前时间段需要进行评估的企业的名称,具体获取方式在此不做限定。另外,获取第一地理位置的方式不做限定,举例来说,可以通过全球定位系统(GlobalPositioning System,GPS)获取。The terminal device can directly obtain the name of the enterprise to be evaluated entered by the operator, or obtain the name of the enterprise to be evaluated in the current time period specified in advance from the background server. The specific obtaining method is not limited here. In addition, the manner of acquiring the first geographic location is not limited, for example, it can be acquired through a global positioning system (Global Positioning System, GPS).
步骤202:终端设备验证所述第一地理位置与第二地理位置是否一致。Step 202: The terminal device verifies whether the first geographic location is consistent with the second geographic location.
所述第二地理位置为预录入的所述待评估企业的地理位置。The second geographic location is the pre-entered geographic location of the enterprise to be evaluated.
步骤203:若一致,则所述终端设备对所述终端设备的操作者进行生物特征信息检测,若所述操作者未通过所述生物特征信息检测,则确定所述操作者的信息校验不通过。Step 203: If they are consistent, the terminal device performs biometric information detection on the operator of the terminal device, and if the operator fails the biometric information detection, it is determined that the operator's information verification is not successful. pass.
需要说明的是,步骤203中,若第一地理位置和第二地理位置一致,且操作者通过了生物特征信息检测,可以确定操作者通过了信息校验;也可以加入其他验证后,再根据验证结果,确定操作者是否通过了信息校验。It should be noted that, in step 203, if the first geographic location is consistent with the second geographic location, and the operator has passed the biometric information detection, it can be determined that the operator has passed the information verification; other verifications can also be added, and then Verify the result to determine whether the operator has passed the information verification.
另外,生物特征信息检测可以为活体人脸检测,从而加大了工作人员冒名顶替的难度,减少了工作人员的违规操作空间。In addition, the detection of biometric information can be a living face detection, which increases the difficulty of impersonation by the staff and reduces the illegal operation space of the staff.
上述方法中,终端设备首先获取待评估企业的名称,以及所述终端设备所在的第一地理位置,然后验证所述第一地理位置与预录入的所述待评估企业的第二地理位置是否一致,从而对终端设备的地理位置进行了验证,若一致,则对所述终端设备的操作者进行生物特征信息检测,结合对终端设备的地理位置的验证,若所述操作者未通过所述生物特征信息检测,则确定所述操作者的信息校验不通过,该方法大幅降低了操作者的违规操作空间,从而实现对操作者违规的有效监测。In the above method, the terminal device first obtains the name of the enterprise to be evaluated and the first geographic location where the terminal device is located, and then verifies whether the first geographic location is consistent with the pre-entered second geographic location of the enterprise to be evaluated. , so as to verify the geographic location of the terminal device. If they are consistent, then perform biometric information detection on the operator of the terminal device. Combined with the verification of the geographic location of the terminal device, if the operator fails to pass the biometric information If the feature information is detected, it is determined that the operator's information verification fails. This method greatly reduces the operator's illegal operation space, thereby realizing effective monitoring of the operator's violation.
在步骤201~步骤203中,一种可选实施方式如下:In
所述终端设备采集预设空间范围内的第一工作信息;所述第一工作信息包括所述操作者的第一身份信息和所述待评估企业的第一企业信息;所述第一企业信息包括以下至少一项:企业主;企业名称;所述终端设备验证所述第一工作信息与第二工作信息是否一致;其中,所述第二工作信息包括第二身份信息和第二企业信息;所述第二身份信息为预录入的所述操作者的身份信息,所述第二企业信息为预录入的所述待评估企业的企业信息;若不一致,则确定所述操作者的信息校验不通过。The terminal device collects first work information within a preset space; the first work information includes the operator's first identity information and the first enterprise information of the enterprise to be evaluated; the first enterprise information It includes at least one of the following: an enterprise owner; an enterprise name; the terminal device verifies whether the first work information is consistent with the second work information; wherein the second work information includes second identity information and second enterprise information; The second identity information is the pre-entered identity information of the operator, and the second enterprise information is the pre-entered enterprise information of the to-be-evaluated enterprise; if they are inconsistent, determine the operator's information verification Fail.
需要说明的是,预设空间范围可以是将终端设备移动所至的空间范围,也可以是终端设备当前所在环境的空间范围。终端设备可以直接采集预设空间范围内的第一工作信息,也可以间接采集其他设备录制的预设空间范围内的第一工作信息。It should be noted that the preset spatial range may be the spatial range to which the terminal device is moved, or may be the spatial range of the environment where the terminal device is currently located. The terminal device may directly collect the first work information within the preset space range, or may indirectly collect the first work information within the preset space range recorded by other devices.
举例来说,所述第一工作信息包括操作者A的身份信息A,企业信息A;第二工作信息包括身份信息B,企业信息A。那么确定操作者A的信息校验不通过。For example, the first work information includes identity information A of operator A and enterprise information A; the second work information includes identity information B and enterprise information A. Then, it is determined that the information verification of operator A fails.
上述方法中,所述终端设备采集预设空间范围内的第一工作信息;所述第一工作信息包括所述操作者的第一身份信息和所述待评估企业的第一企业信息;所述第一企业信息包括以下至少一项:企业主;企业名称,然后终端设备验证所述第一工作信息与预先录入的第二工作信息是否一致,进一步对操作者进行信息校验,实现对操作者违规的有效监测。In the above method, the terminal device collects first work information within a preset space; the first work information includes first identity information of the operator and first enterprise information of the enterprise to be evaluated; the The first enterprise information includes at least one of the following: the owner of the enterprise; the name of the enterprise, and then the terminal device verifies whether the first work information is consistent with the pre-entered second work information, and further performs information verification on the operator, so as to realize the verification of the operator. Effective monitoring of violations.
在上述验证第一工作信息和第二工作信息是否一致的过程中,终端设备可以按照以下方式采集预设空间范围内的第一工作信息:In the above process of verifying whether the first work information and the second work information are consistent, the terminal device may collect the first work information within the preset space in the following manner:
所述终端设备采集所述预设空间范围的影音信息;所述终端设备从所述影音信息中提取所述第一身份信息以及所述第一企业信息。The terminal device collects the audio and video information in the preset spatial range; the terminal device extracts the first identity information and the first enterprise information from the audio and video information.
影音信息的形式不做限定。举例来说,展业工作中,展业人员和企业主以企业名称为背景进行合影,并将照片上传至后台服务器,后台服务器对照片进行人脸识别以及文字识别,举例来说,通过光学字符识别(OCR,optical character recognition)技术对合影进行文字识别,提取第一身份信息以及所述第一企业信息。The format of the audio-visual information is not limited. For example, in the exhibition work, the exhibition staff and the business owner take a group photo with the company name as the background, and upload the photo to the backend server. The backend server performs face recognition and text recognition on the photo, for example, through optical character recognition ( OCR, optical character recognition) technology performs text recognition on the group photo, and extracts the first identity information and the first enterprise information.
上述方法中,所述终端设备采集所述预设空间范围的影音信息,并从所述影音信息中提取所述第一身份信息以及所述第一企业信息,由于影音信息中第一身份信息以及第一企业信息更难伪造,从而增加了获取所述第一身份信息以及所述第一企业信息的安全性,从而进一步降低操作者的违规操作空间。In the above method, the terminal device collects the audio and video information in the preset spatial range, and extracts the first identity information and the first enterprise information from the audio and video information. The first enterprise information is more difficult to forge, thereby increasing the security of obtaining the first identity information and the first enterprise information, thereby further reducing the operator's room for illegal operations.
在上述验证第一工作信息和第二工作信息是否一致的过程中,可以按照以下方式进行:In the above process of verifying whether the first work information and the second work information are consistent, the following methods may be used:
所述终端设备将所述第一工作信息按照预设算法加密,获取第一加密信息;所述终端设备获取第二加密信息;所述第二加密信息是预先按照所述预设算法加密所述第二工作信息得到的;所述终端设备验证所述第一加密信息是否与所述第二加密信息一致,若一致,则验证所述第一工作信息与所述第二工作信息一致;否则,验证所述第一工作信息与所述第二工作信息不一致。The terminal device encrypts the first work information according to a preset algorithm, and obtains the first encrypted information; the terminal device obtains second encrypted information; the second encrypted information is encrypted in advance according to the preset algorithm. The second working information is obtained; the terminal device verifies whether the first encrypted information is consistent with the second encrypted information, and if so, verifies that the first working information is consistent with the second working information; otherwise, Verify that the first work information is inconsistent with the second work information.
举例来说,上述预设加密算法可以为信息摘要算法(Message-Digest Algorithm,MD5)。另外,第二加密信息可以是终端设备直接获取的,也可以是从后台服务器中获取的。For example, the above-mentioned predetermined encryption algorithm may be a Message-Digest Algorithm (MD5). In addition, the second encrypted information may be obtained directly by the terminal device, or may be obtained from a background server.
上述方法中,所述终端设备将所述第一工作信息按照预设算法加密,获取第一加密信息;所述终端设备获取第二加密信息;所述第二加密信息是预先按照所述预设算法加密所述第二工作信息得到的;根据加密后的第一加密信息与第二加密信息,验证第一工作信息与第二工作信息是否一致,从而增加了第一工作信息与第二工作信息是否一致验证结论的可靠性。In the above method, the terminal device encrypts the first work information according to a preset algorithm to obtain the first encrypted information; the terminal device obtains the second encrypted information; the second encrypted information is obtained in advance according to the preset algorithm It is obtained by encrypting the second working information with an algorithm; according to the encrypted first encrypted information and the second encrypted information, it is verified whether the first working information and the second working information are consistent, thereby adding the first working information and the second working information Whether it is consistent to verify the reliability of the conclusion.
另外一种实施方式中,所述终端设备获取所述终端设备的运动轨迹;所述终端设备若确定所述运动轨迹异常则进行异常上报。In another implementation manner, the terminal device acquires the motion trajectory of the terminal device; if the terminal device determines that the motion trajectory is abnormal, it reports the abnormality.
举例来说,可以对终端设备正常的运动轨迹进行机器学习训练,构建出一个可以判断运动轨迹是否正常的神经网络,从而将获取到的终端设备的运动轨迹输入神经网络,由神经网络输出运动轨迹是否正常。For example, machine learning training can be performed on the normal motion trajectory of the terminal device to construct a neural network that can judge whether the motion trajectory is normal, so that the acquired motion trajectory of the terminal device can be input into the neural network, and the neural network outputs the motion trajectory. Is it normal.
上述方法中,终端设备获取所述终端设备的运动轨迹;所述终端设备若确定所述运动轨迹异常则进行异常上报,即便操作者通过信息校验,如果未能按预期运动轨迹运动,也能及时上报异常情况。In the above method, the terminal device obtains the motion track of the terminal device; if the terminal device determines that the motion track is abnormal, it will report the abnormality, even if the operator passes the information verification, if he fails to move according to the expected motion track, he can also report the abnormality. Report exceptions in a timely manner.
本申请阐述了一种新型的银行展业人员实际工作情况监测方法,通过加密算法、定位技术、信息提取技术和生物特征信息技术降低工作人员违规操作的空间,实现了对工作人员的有效检测。This application describes a new method for monitoring the actual working conditions of bank exhibitors, which reduces the space for staff to operate illegally through encryption algorithms, positioning technology, information extraction technology and biometric information technology, and realizes effective detection of staff.
下面结合图3,详细介绍为本申请实施例提供的一种工作监测方法,图3为本申请实施例提供的一种工作监测方法的步骤流程的具体示意图。The following describes a work monitoring method provided by an embodiment of the present application in detail with reference to FIG. 3 , and FIG. 3 is a specific schematic diagram of a step flow of a work monitoring method provided by an embodiment of the present application.
步骤301:终端设备获取操作者输入的待评估企业的名称。Step 301: The terminal device acquires the name of the enterprise to be evaluated input by the operator.
步骤302:终端设备获取第二工作信息,并将第二工作信息加密为第二加密信息。Step 302: The terminal device acquires the second work information, and encrypts the second work information into the second encrypted information.
后台服务器根据操作者输入的待评估企业的名称,获取预录入的第二企业信息,以及根据操作者的信息,获取第二身份信息。并使用MD5进行加密,对第二身份信息和第二企业信息进行加密,生成第二加密信息。The background server obtains pre-entered second enterprise information according to the name of the enterprise to be evaluated input by the operator, and obtains second identity information according to the operator's information. MD5 is used for encryption, and the second identity information and the second enterprise information are encrypted to generate the second encrypted information.
步骤303:确定第一地理位置与第二地理位置是否一致。Step 303: Determine whether the first geographic location is consistent with the second geographic location.
这里可以是终端设备确定,也可以是终端设备通过服务器确定,终端设备获取确定的结果。Here, it may be determined by the terminal device, or it may be determined by the terminal device through the server, and the terminal device obtains the determination result.
若是,执行步骤304;否则,执行步骤308。If yes, go to step 304; otherwise, go to step 308.
步骤304:终端设备对操作者进行人脸活体检测,确定操作者是否通过人脸活体检测。Step 304 : the terminal device performs face liveness detection on the operator to determine whether the operator passes the face liveness detection.
若是,执行步骤305;否则,执行步骤308。If yes, go to step 305; otherwise, go to step 308.
步骤305:获取第一工作信息,并将第一工作信息加密为第一加密信息。Step 305: Acquire first work information, and encrypt the first work information into first encrypted information.
举例来说,影音信息为操作者、企业主以及企业名称的合影信息,终端设备通过该合影信息,提取第一工作信息,并使用MD5进行加密,对第一工作信息进行加密,生成第一加密信息。For example, the audio and video information is the group photo information of the operator, the business owner and the business name. The terminal device extracts the first work information through the group photo information, and encrypts it with MD5, encrypts the first work information, and generates the first encrypted information. information.
这里可以是终端设备将第一工作信息加密为第一加密信息,也可以是终端设备将第一工作信息发送至服务器,由服务器加密为第一加密信息,终端设备再获取服务器返回的第一加密信息。Here, the terminal device can encrypt the first work information into the first encrypted information, or the terminal device can send the first work information to the server, and the server encrypts it into the first encrypted information, and the terminal device then obtains the first encrypted information returned by the server. information.
步骤306:确定第一加密信息和第二加密信息是否一致。Step 306: Determine whether the first encrypted information and the second encrypted information are consistent.
这里可以是终端设备确定,也可以是终端设备通过服务器确定,终端设备获取确定的结果。Here, it may be determined by the terminal device, or it may be determined by the terminal device through the server, and the terminal device obtains the determination result.
若一致,则执行步骤307;否则执行步骤308。If they are consistent, go to step 307; otherwise, go to step 308.
步骤307:确定操作者通过信息校验。Step 307: It is determined that the operator has passed the information verification.
步骤308:确定操作者未通过信息校验。Step 308: It is determined that the operator fails the information verification.
步骤307或步骤308执行完毕后,均执行步骤309。After
步骤309:确定终端设备的运动轨迹是否异常。Step 309: Determine whether the motion trajectory of the terminal device is abnormal.
这里可以是终端设备确定,也可以是终端设备通过服务器确定,终端设备获取确定的结果。Here, it may be determined by the terminal device, or it may be determined by the terminal device through the server, and the terminal device obtains the determination result.
若是,则执行步骤310;否则按预设周期循环执行步骤309。If yes, go to step 310; otherwise, go to step 309 according to a preset cycle.
步骤310:上报异常。Step 310: Report an exception.
这里可以是终端设备向后台服务器上报,也可以是终端设备向其它设备上报,也可以是后台服务器向其它设备上报。需要说明的是,无论是否异常,终端设备都可以向后台服务器传输运动轨迹,为以后判断运动轨迹是否异常提供依据。Here, the terminal device may report to the background server, or the terminal device may report to other devices, or the background server may report to other devices. It should be noted that, no matter whether it is abnormal or not, the terminal device can transmit the motion trajectory to the background server, so as to provide a basis for judging whether the motion trajectory is abnormal in the future.
如图4所示,为本申请实施例提供的一种工作监测装置的结构示意图。As shown in FIG. 4 , it is a schematic structural diagram of a work monitoring device according to an embodiment of the present application.
本申请实施例提供一种工作监测装置,获取模块401,用于获取待评估企业的名称,以及所述装置所在的第一地理位置;处理模块402,用于验证所述第一地理位置与第二地理位置是否一致;所述第二地理位置为预录入的所述待评估企业的地理位置;若一致,则所述装置的操作者进行生物特征信息检测,若所述操作者未通过所述生物特征信息检测,则确定所述操作者的信息校验不通过。The embodiment of the present application provides a work monitoring device, the obtaining
一种可选实施方式中,所述处理模块402还用于:采集预设空间范围内的第一工作信息;所述第一工作信息包括所述操作者的第一身份信息和所述待评估企业的第一企业信息;所述第一企业信息包括以下至少一项:企业主;企业名称;验证所述第一工作信息与第二工作信息是否一致;其中,所述第二工作信息包括第二身份信息和第二企业信息;所述第二身份信息为预录入的所述操作者的身份信息,所述第二企业信息为预录入的所述待评估企业的企业信息;若不一致,则确定所述操作者的信息校验不通过。In an optional implementation manner, the
一种可选实施方式中,所述处理模块402具体用于:采集所述预设空间范围的影音信息;从所述影音信息中提取所述第一身份信息以及所述第一企业信息。In an optional implementation manner, the
一种可选实施方式中,所述处理模块402具体用于:将所述第一工作信息按照预设算法加密,获取第一加密信息;获取第二加密信息;所述第二加密信息是预先按照所述预设算法加密所述第二工作信息得到的;验证所述第一加密信息是否与所述第二加密信息一致,若一致,则验证所述第一工作信息与所述第二工作信息一致;否则,验证所述第一工作信息与所述第二工作信息不一致。In an optional implementation manner, the
一种可选实施方式中,所述获取模块401还用于:获取所述装置的运动轨迹;若确定所述运动轨迹异常则进行异常上报。In an optional implementation manner, the acquiring
上述装置各个实施例的有益效果,可以参考本申请实施例的工作检测方法中各个实施例的有益效果,这里不再赘述。For the beneficial effects of the foregoing device embodiments, reference may be made to the beneficial effects of the respective embodiments in the work detection method of the embodiments of the present application, which will not be repeated here.
本申请实施例提供一种计算机设备,包括程序或指令,当所述程序或指令被执行时,用以执行上述工作监测方法及任一可选方法。An embodiment of the present application provides a computer device, including a program or an instruction, and when the program or instruction is executed, is used to execute the above-mentioned work monitoring method and any optional method.
本申请实施例提供一种存储介质,包括程序或指令,当所述程序或指令被执行时,用以执行上述工作监测方法及任一可选方法。An embodiment of the present application provides a storage medium, which includes a program or an instruction, and when the program or instruction is executed, is used to execute the above-mentioned work monitoring method and any optional method.
最后应说明的是:本领域内的技术人员应明白,本申请的实施例可提供为方法、系统、或计算机程序产品。因此,本申请可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本申请可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、光学存储器等)上实施的计算机程序产品的形式。Finally, it should be noted that those skilled in the art should understand that the embodiments of the present application may be provided as methods, systems, or computer program products. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, etc.) having computer-usable program code embodied therein.
本申请是参照根据本申请的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程数据处理设备的处理器以产生一个机器,使得通过计算机或其他可编程数据处理设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to the present application. It will be understood that each flow and/or block in the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to the processor of a general purpose computer, special purpose computer, embedded processor or other programmable data processing device to produce a machine such that the instructions executed by the processor of the computer or other programmable data processing device produce Means for implementing the functions specified in a flow or flow of a flowchart and/or a block or blocks of a block diagram.
这些计算机程序指令也可存储在能引导计算机或其他可编程数据处理设备以特定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。These computer program instructions may also be stored in a computer-readable memory capable of directing a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory result in an article of manufacture comprising instruction means, the instructions The apparatus implements the functions specified in the flow or flow of the flowcharts and/or the block or blocks of the block diagrams.
显然,本领域的技术人员可以对本申请进行各种改动和变型而不脱离本申请的范围。这样,倘若本申请的这些修改和变型属于本申请权利要求及其等同技术的范围之内,则本申请也意图包含这些改动和变型在内。Obviously, those skilled in the art can make various changes and modifications to the present application without departing from the scope of the present application. Thus, if these modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is also intended to include these modifications and variations.
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910531444.0A CN110225047B (en) | 2019-06-19 | 2019-06-19 | Work monitoring method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910531444.0A CN110225047B (en) | 2019-06-19 | 2019-06-19 | Work monitoring method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110225047A CN110225047A (en) | 2019-09-10 |
CN110225047B true CN110225047B (en) | 2022-09-02 |
Family
ID=67817800
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910531444.0A Active CN110225047B (en) | 2019-06-19 | 2019-06-19 | Work monitoring method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110225047B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111291143B (en) * | 2020-01-16 | 2024-08-06 | 深圳市华傲数据技术有限公司 | Grid data acquisition method and system |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101685554A (en) * | 2008-09-25 | 2010-03-31 | 银河港(北京)技术有限公司 | Human face identification work-attendance checking method and system based on network |
CN102790674A (en) * | 2011-05-20 | 2012-11-21 | 阿里巴巴集团控股有限公司 | Authentication method, equipment and system |
CN104715245A (en) * | 2015-04-02 | 2015-06-17 | 中国民用航空局信息中心 | Method and device for monitoring airport staff |
CN109361657A (en) * | 2018-09-25 | 2019-02-19 | 深圳市亿融咨询服务有限公司 | Real name identification method, equipment and the storage medium of enterprises service platform |
CN109636318A (en) * | 2018-11-23 | 2019-04-16 | 南宁市国土测绘地理信息中心 | A kind of method of Immovable Property Registration system and Immovable Property Registration |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6792323B2 (en) * | 2002-06-27 | 2004-09-14 | Openpeak Inc. | Method, system, and computer program product for managing controlled residential or non-residential environments |
-
2019
- 2019-06-19 CN CN201910531444.0A patent/CN110225047B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101685554A (en) * | 2008-09-25 | 2010-03-31 | 银河港(北京)技术有限公司 | Human face identification work-attendance checking method and system based on network |
CN102790674A (en) * | 2011-05-20 | 2012-11-21 | 阿里巴巴集团控股有限公司 | Authentication method, equipment and system |
CN104715245A (en) * | 2015-04-02 | 2015-06-17 | 中国民用航空局信息中心 | Method and device for monitoring airport staff |
CN109361657A (en) * | 2018-09-25 | 2019-02-19 | 深圳市亿融咨询服务有限公司 | Real name identification method, equipment and the storage medium of enterprises service platform |
CN109636318A (en) * | 2018-11-23 | 2019-04-16 | 南宁市国土测绘地理信息中心 | A kind of method of Immovable Property Registration system and Immovable Property Registration |
Also Published As
Publication number | Publication date |
---|---|
CN110225047A (en) | 2019-09-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110874649B (en) | Federal learning execution method, system, client and electronic equipment | |
CN111414873B (en) | Alarm prompting method, device and alarm system based on wearing state of safety helmet | |
CN104766166B (en) | A kind of information system security compliance inspection method towards hierarchical protection | |
CN109951441B (en) | Examination information evaluation method, device, equipment and storage medium based on block chain | |
CN111709718B (en) | Intelligent factoring asset service platform, method and storage medium based on artificial intelligence | |
Lidkea et al. | Convolutional neural network framework for encrypted image classification in cloud-based ITS | |
US11763548B2 (en) | Monitoring devices at enterprise locations using machine-learning models to protect enterprise-managed information and resources | |
CN111581659A (en) | Method and device for calling electronic evidence | |
CN110225047B (en) | Work monitoring method and device, computer equipment and storage medium | |
CN112508564B (en) | Seal use management method based on block chain, electronic equipment and storage medium | |
CN113807157B (en) | Method, device and system for training neural network model based on federal learning | |
CN114360091A (en) | Inspection method, device and equipment | |
CN115938005B (en) | Offline attendance checking method and device based on digital identity | |
CN114301599B (en) | Digital certificate import method, device and computer equipment for switch | |
WO2020000198A1 (en) | Block chain-based attendance system | |
CN117786652A (en) | Block chain-based safety inspection system | |
CN115600189A (en) | Commercial password application security evaluation system | |
CN113434851A (en) | Key management method and system based on data acquisition | |
CN111428961A (en) | Petrochemical equipment major risk remote diagnosis system and method based on mixed reality | |
CN112687032B (en) | Method and system for monitoring work task by using mechanical lock | |
CN115361274B (en) | Alarm message processing method and device | |
CN114553684B (en) | Method, device, computer equipment and storage medium for network point operation and maintenance | |
Yapa et al. | Improve the Efficiency and Security by Digitalizing the Sri Lankan Police Department | |
CN119379473A (en) | Operation safety supervision method, system, device, equipment and storage medium | |
CN120182009A (en) | Financial information management system based on cloud computing |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |