WO2022142903A1 - Identity recognition method and apparatus, electronic device, and related product - Google Patents
Identity recognition method and apparatus, electronic device, and related product Download PDFInfo
- Publication number
- WO2022142903A1 WO2022142903A1 PCT/CN2021/133117 CN2021133117W WO2022142903A1 WO 2022142903 A1 WO2022142903 A1 WO 2022142903A1 CN 2021133117 W CN2021133117 W CN 2021133117W WO 2022142903 A1 WO2022142903 A1 WO 2022142903A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- community
- identity
- community member
- information
- time period
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 230000000694 effects Effects 0.000 claims abstract description 83
- 238000004590 computer program Methods 0.000 claims description 22
- 230000001788 irregular Effects 0.000 claims description 8
- 230000000423 heterosexual effect Effects 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 8
- 230000001815 facial effect Effects 0.000 description 6
- 238000005266 casting Methods 0.000 description 4
- 238000004891 communication Methods 0.000 description 3
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- OWZREIFADZCYQD-NSHGMRRFSA-N deltamethrin Chemical compound CC1(C)[C@@H](C=C(Br)Br)[C@H]1C(=O)O[C@H](C#N)C1=CC=CC(OC=2C=CC=CC=2)=C1 OWZREIFADZCYQD-NSHGMRRFSA-N 0.000 description 3
- 239000011159 matrix material Substances 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
Definitions
- the present application relates to the technical field of information identification, and in particular to an identification method, device, electronic device and related products.
- the embodiments of the present application provide an identity recognition method, device, electronic device and related products, which can screen out target community members from the community, and improve the anti-fraud pertinence and publicity effect.
- the embodiments of the present application provide an identity recognition method, including:
- the identity information of each community member and the activity track within the preset time period are input into the deceived person identification model that has completed the training, and the first identity of each community member is predicted.
- the first identity identifier includes whether each of the community members is a deceived person;
- the second identification includes whether each of the community members is a potentially vulnerable person;
- the target community member in the community is determined.
- an identification device including:
- the transceiver unit is used to obtain the identity information of each community member in the community, family member information and activity track within a preset time period;
- the processing unit is used to input the identity information of each community member and the activity track within a preset time period into the deceived person identification model that has completed the training, and predict the first identity of each community member, the
- the first identification of each community member includes whether the community member is a deceived person;
- the identity type is identified according to the identity information of each community member, family member information and activity track within a preset time period , determine the second identity of each community member, and the second identity of each community member includes whether each community member is a potentially vulnerable person; according to the first identity of each community member
- the identifier and the second identity identifier are used to determine the target community members in the community.
- an embodiment of the present application provides an electronic device, including: a processor, the processor is connected to a memory, the memory is used for storing a computer program, and the processor is used for executing the computer program stored in the memory , so that the electronic device performs the method according to the first aspect.
- an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program causes a computer to execute the method according to the first aspect.
- an embodiment of the present application provides a computer program product, the computer program product includes a non-transitory computer-readable storage medium storing a computer program, the computer is operable to cause the computer to execute as described in the first aspect Methods.
- the identity recognition device predicts the first identity of each community member through the deceived person identification model that has completed the training; and obtains the second identity of each community member through feature analysis; and According to the first identification and the second identification of each community member, the target community member in the community is determined. Since the user's identity is analyzed from multiple dimensions, the determined target community members are comprehensive and accurate. In addition, the target community members are used as the target of anti-fraud publicity, so that targeted anti-fraud publicity can be carried out for these target community members, without the need for casting net publicity, which reduces the cost of publicity and improves the effect of publicity.
- FIG. 1 is a schematic structural diagram of an identity recognition system provided by an embodiment of the present application.
- FIG. 2 is a schematic diagram of an identity identification method provided by an embodiment of the present application.
- FIG. 3 is a schematic flowchart of an identity identification method provided by an embodiment of the present application.
- FIG. 4 is a schematic flowchart of another identity identification method provided by an embodiment of the present application.
- FIG. 5 is a block diagram of functional units of an identification device provided by an embodiment of the present application.
- FIG. 6 is a schematic structural diagram of an identification device provided by an embodiment of the present application.
- Class deceived person Identify each community person through the trained deceived person identification model, get the probability that each community person belongs to the deceived person, and regard the community person whose probability is greater than the threshold as the class deceived person. Since the deceived person identification model is obtained by training the information of historically deceived persons, the class of deceived persons is to screen out the community personnel whose classification probability is greater than the threshold from the dimension of comparing the information of community personnel with the information of historically deceived persons.
- Potentially gullible persons based on identity information, family member information, and activity trajectories within a preset period of time to identify qualified community members, that is, from the dimension of each community member's own identity information, screen out of eligible community members.
- FIG. 1 is a schematic structural diagram of an identity recognition system provided by an embodiment of the present application.
- the identity recognition system includes an identity recognition device 10 and an image acquisition device 20.
- the identity recognition device 10 and the image acquisition device maintain a communication connection.
- the image acquisition device 20 is installed in the community and is used to obtain the itinerary of community members in the community.
- the image acquisition device 20 collects the facial image of each community member in the community, and uploads the facial image of each community member to the identity recognition device 10, wherein the facial image carries the geographic location information; the identity recognition device 10 determines the daily travel trajectory of each community member according to the facial image of each person, and creates a file database for each community member according to the daily travel trajectory of each community member (that is, realizes one file per person), wherein , the archives of each community member includes the identity information of each community member, family member information and the daily activity track of each community member.
- the identity recognition device 10 can obtain the identity information of each community member, family member information and the activity track within a preset time period from the archives of each community member in the process of identity recognition,
- the identity information of each community member and the activity trajectory within the preset time period are input into the deceived person identification model that has completed the training, and the first identity identification of each community member is predicted, that is, whether each community member is a deceived person or not; then , according to the identity information of each community member, family member information and the activity track within a preset time period, determine the second identity of each community member, that is, determine whether each community member is a potentially vulnerable person; finally,
- the target community members in the community are determined by colliding with the first identification and the second identification of each community member. Among them, the target community members are the target of anti-fraud propaganda.
- the identification device 10 and the image acquisition device 20 cooperate with each other to screen out target community members (targets of anti-fraud publications) from the community; Targeted anti-fraud publicity is carried out without the need to cast a net, which reduces the cost of publicity and improves the effect of publicity.
- FIG. 2 is a schematic diagram of an identity identification method provided by an embodiment of the present application. The method is applied to an identity recognition device.
- the identification device first trains a deceived person identification model through historical deceived people in the community and semi-supervised learning, and then uses the trained deceived person identification model to identify all community personnel in the community, and obtains each The first identification of the community members is to determine whether each community member is a deceived person; in addition, the identification device obtains the identity characteristics of each potential deceived group by summarizing and analyzing the potential deceived groups in the community; The characteristics of each potential deceived group are used to establish the identification model corresponding to each kind of potential deceived group.
- This application takes the establishment of four identification models: housewife identification model, unemployed person identification model, retired old person identification model and school-age single youth identification model as examples to illustrate.
- the identity recognition device collides with the identified quasi-deceived persons and potential deceived persons, determines the target community members in the community, and uses the target community members as anti-fraud propaganda objects.
- the identity recognition device can screen out the target community members from the community, and use the target community members as anti-fraud propaganda objects; in this way, these target community members can be targeted.
- Targeted anti-fraud publicity eliminates the need for net-casting publicity, which reduces publicity costs and improves publicity effects.
- FIG. 3 is a schematic flowchart of an identity recognition method provided by an embodiment of the present application. The method is applied to an identity recognition device. The method includes the following steps:
- the identity recognition device acquires identity information, family member information, and activity tracks within a preset time period of each community member in the community.
- the identity recognition device can create a file for each community member in the community, obtain the archive of each community member, and realize one file per person, wherein the archive of each community member in the community includes each community member. identity information, family member information, and daily activity information. Specifically, the identity recognition device can obtain the identity information and family member information of each community member, wherein the identity information and family member information can be read by the identity recognition device from other devices, and each can be read from the community management system.
- the identity information of each community member wherein the identity information of each community member includes the name, gender, age and ID number of each community member, etc., and the family member information includes the marriage information and child information of each community member;
- the identification device can obtain the facial images of the community members at each activity location from the image acquisition equipment at the front end of the community, and determine the daily activity track of each community member according to the facial images of the community members at each activity location; , store the identity information of each community member, family member information, and each community member's daily activity track in association, and realize the establishment of a file library for each community member in the community.
- the identity recognition device can read the identity information, family member information and activities within a preset time period of each community member from the archives of each community member according to one or more identification information of each community member trajectory. For example, according to the ID number of each community member, the archive database corresponding to each community member can be determined, and the identity information, family member information and information of each community member in the preset time period can be read from the archive database. Movement tracking.
- the identity recognition device inputs the identity information of each community member and the activity track within the preset time period into the trained deceived person recognition model, and predicts the first identity identifier of each community member, and the The first identification of each community member includes whether each community member is a deceived person.
- the preset time period may be one day, two days, one week, one month or other values.
- the deceived person identification model is a deceived person identification model that has been trained in advance.
- the identification information of the historically defrauded person may be obtained, wherein the identification information is used to identify the identity of the historically defrauded person, for example, the identification information may be the name, ID number, mobile phone number, etc. of the historically defrauded person; Determine the archive established for the historically deceived person according to the identification information of the historically deceived person, and obtain the historically deceived person's identity information (for example, age and gender) and historical activity track from the archives of the historically deceived person, and The identity information and historical activity trajectories of the historically deceived persons are taken as negative samples; then, the identification information of the historically defrauded persons is obtained, and the archives established by the historically defrauded persons are determined according to the identification information of the historically defrauded persons.
- the identification information is used to identify the identity of the historically defrauded person
- the identification information may be the name, ID number, mobile phone number, etc. of the historically defrauded person
- the deceived person identification model is trained by using the negative samples and positive samples, that is, the model parameters of the deceived person identification model are adjusted to obtain the deceived person identification model that has completed the training.
- the identity information of the above-mentioned historically deceived persons and those who have not been deceived in history include but are not limited to gender, age, education, and work; among which, the case information of historically defrauded persons includes but is not limited to: history of deceived persons time and location).
- historically deceived persons and historically not deceived persons may be community members in the community, or may not be community members of this community. This is not limited.
- the daily activity trajectory of each community member in a preset time period can be digitized, and a feature vector corresponding to the daily activity trajectory can be obtained.
- multiple activity locations can be preset. location, the dimension corresponding to the activity location is set to 1, and if the activity location is not reached on the day, the dimension corresponding to the activity location is set to 0, and the feature vector corresponding to the daily activity track is obtained; then, the preset The eigenvectors corresponding to the daily activity trajectories in the time period are spliced (vertically spliced) to obtain a first matrix.
- the first matrix obtained is Similarly, the identity information (ie, gender and age) of each community member is vectorized (ie, mapped), and the feature vector corresponding to the identity information is obtained.
- gender female can be represented by a feature vector whose value is all 1
- Male gender can be represented by an eigenvector whose value is all 0, and age can be represented by a corresponding binary number
- the eigenvector corresponding to the identity information is spliced (vertically spliced) with the above-mentioned first matrix to obtain the input data; finally , input the input data of each community member into the trained deceived person identification model, and get the probability that each community member belongs to the deceived person.
- the probability is greater than or equal to the threshold, determine the community member as a class of deceived people , in the case that the probability is less than the threshold, it is determined that the community member is not a deceived person.
- the identity recognition device performs identity type recognition according to the identity information of each community member, family member information and the activity track within a preset time period, and determines the second identity of each community member, and each The second identification of each community member includes whether each of the community members is a potentially gullible person.
- each community member in the preset time period determines the travel status of each community member in the preset time period;
- the travel status in the time period is input into the identity recognition model (that is, input into the housewife recognition model, the unemployed person recognition model, the retired old person recognition model and the marriageable single youth recognition model shown in Figure 2 respectively), and each community member is determined.
- the second identification of each community member is to determine whether each community member is a potential gullible person.
- the types of potential gullible persons include but are not limited to the following: housewives, unemployed persons, retirees, and young single marriageable persons.
- the identity information of each community member, family member information, and travel status within a preset time period are input into the housewife identification model. If it is recognized that the travel of community member A within the preset time period is irregular, and carry children, and the gender of the community member A is female, then determine the second identity of the community member A as a housewife, wherein the community member A is any community member in the community;
- the first sub-preset time period may be the first half of the month
- the second sub-preset time period may be the second half of the month.
- the first age group is the working age group, for example, 18-60 years old;
- the identification device collides according to the first identification and the second identification of each community member, and determines a target community member in the community.
- the first identity of the community member A is a deceived person, and the second identity is a potential fraudulent person, determine that the community member A is a first-level target community member in the community; In the case that the first identity of the community member A is a quasi-deceived person, and the second identity is not a person who is easily deceived, determine that the community member A is a secondary target community member in the community; in the community member A In the case that the second identity of the person is not a deceived person, and the second identity is a potentially deceptive person, determine that the community member A is a secondary target community member in the community.
- the anti-fraud publicity for the first-level target community members is stronger than the second-level target personnel.
- offline publicity and one-to-one publicity for the anti-fraud of the first-level target personnel can be carried out, and only online publicity for the second-level target personnel. , and encourage secondary target personnel to learn anti-fraud knowledge online.
- the identity recognition device predicts the first identity of each community member through the deceived person identification model that has completed the training; and obtains the second identity of each community member through feature analysis; and
- the target community members in the community are determined according to the collision between the first identification and the second identification of each community member. Since the user's identity is analyzed from multiple dimensions, the determined target community members are comprehensive and accurate.
- the target community members are used as the target of anti-fraud publicity, so that targeted anti-fraud publicity can be carried out for these target community members, without the need for net-casting publicity, which reduces the cost of publicity and improves the effect of publicity.
- FIG. 4 is a schematic flowchart of another identity identification method provided by an embodiment of the present application.
- the method is applied to an identity recognition device.
- the content of this embodiment is the same as that of the embodiment shown in FIG. 3 , and the description is not repeated here.
- the method of this embodiment includes the following steps:
- the identity recognition device acquires identity information, family member information, and activity tracks within a preset time period of each community member in the community.
- the identity recognition device inputs the identity information of each community member and the activity track within a preset time period into the trained deceived person recognition model, and predicts the first identity of each community member, and the The first identification of each community member includes whether each community member is a deceived person.
- the identity recognition device identifies the identity type according to the identity information of each community member, family member information, and the activity track within a preset time period, and determines the second identity of each community member, and each The second identification of each community member includes whether each of the community members is a potentially gullible person.
- the identification device collides according to the first identification and the second identification of each community member, and determines a target community member in the community.
- the identification device acquires the number of historically deceived persons in the community.
- the identification device determines the vulnerability index of the community according to the number of historical deceived persons in the community and the number of community members whose second identity is identified as a potential vulnerable person in the community, wherein the community The Fraud Index of is used to indicate that the community members within said community are at risk of being gullible.
- the deceived index of the community may be obtained according to the number of historically deceived persons in the community, the number of potential deceptive persons and a preset weight coefficient.
- the deceived index of the community can be expressed by formula (1):
- Index is the vulnerability index of the community
- L 1 is the number of historically deceived people in the community
- L 2 is the number of potential deceived people in the community
- A is the preset weight coefficient
- the value is greater than 1.
- the identity recognition device predicts the first identity of each community member through the deceived person identification model that has completed the training; and obtains the second identity of each community member through feature analysis; and According to the first identification and the second identification of each community member, the target community member in the community is determined. Since the user's identity is analyzed from multiple dimensions, the determined target community members are comprehensive and accurate.
- target community members are used as anti-fraud politicians objects, so that targeted anti-fraud politicians can be carried out for these target community members, without the need for casting net politicians, which reduces propaganda costs and improves propaganda effects. And calculate the gullibility index of the community, so that each community can be targeted for publicity, focusing on the community with a higher gullibility index.
- the number of each type of potentially vulnerable persons may be counted, that is, the number of housewives, the number of unemployed persons, the number of retirees The number and the number of single young marriageable people, then, according to the number of potential gullible people of each type, the four types of potential gullible people are ranked, and the ranking results Potentially vulnerable persons shall formulate targeted publicity plans to further improve the pertinence of anti-fraud publicity. In addition, the total number of potentially gullible people in the community can be counted.
- FIG. 5 is a block diagram of functional units of an identification device provided by an embodiment of the present application.
- the identification device 500 includes: a transceiver unit 501 and a processing unit 502, wherein:
- the transceiver unit 501 is used to obtain the identity information, family member information and activity track within a preset time period of each community member in the community;
- the processing unit 502 is configured to input the identity information of each community member and the activity track within a preset time period into the deceived person identification model that has completed the training, and predict the first identity of each community member, so
- the first identity identifier of each community member includes whether each community member is a deceived person; the identity type is carried out according to the identity information of each community member, family member information and the activity track within a preset time period. Identify, determine the second identity of each community member, and the second identity of each community member includes whether each community member is a potential gullible person; according to the first identification of each community member
- the identity identifier and the second identity identifier determine the target community members in the community.
- the processing unit 502 before acquiring the identity information of each community member in the community, the family member information and the activity track within a preset time period, is further configured to provide each community member in the community Personnel establishes an archive, wherein the archive of each community member includes the identity information of each community member, family member information, and the daily activity track of each community member;
- the processing unit 502 is specifically used for:
- the identity information, family member information and activity track within a preset time period of each community member are acquired from the archives of each community member.
- the transceiver unit 501 is further configured to acquire the identification information of the historically deceived person, Determine the archive of the historically cheated person according to the identification information of the historically cheated person, obtain the identity information, case information and historical activity track of the historically cheated person from the archives of the historically cheated person, and store the historically cheated person.
- the identity information, case information, and historical activity trajectories of the deceived persons are taken as negative samples; the identification information of the historically defrauded persons is obtained, and the archives of the historically defrauded persons are determined according to the identification information of the historically defrauded persons.
- the processing unit is further configured to use the negative samples and the positive samples to perform model training to obtain the trained deceived person identification model.
- identifying the identity category according to the identity information of each community member, family member information and the activity track within a preset time period, and determining the second identity of each community member In one aspect, the processing unit 502 is specifically configured to:
- the identity information of each community member, family member information and travel status within the preset time period are input into the identity recognition model to determine the second identity of each community member.
- the potentially deceived persons include housewives, unemployed persons, retirees and young single marriageable young people, the identity information of each community member includes gender and age, and the identity information of each community member Family member information including marital status and child status;
- the processing unit 502 In terms of inputting the identity information, family member information and travel status of each community member into the identity recognition model and determining the second identity of each community member, the processing unit 502 , specifically for:
- Input the identity information of each community member, family member information and travel status within the preset time period into the unemployed person identification model. is regular, and the travel within the second sub-preset time period is irregular, and the age of the community member A belongs to the first age group, and the second identity of the community member A is determined to be an unemployed person , wherein the first sub-preset time period and the second sub-preset time period are two sub-time periods of the preset time period, and the first sub-preset time period is located in the second sub-preset time period before the sub-preset time period;
- the community member A is any member of the community.
- the processing unit 502 is specifically configured to:
- the first identity of the community member A is a quasi-deceived person, and the second identity is a potentially deceptive person, determine that the community member A is a first-level target community member in the community;
- the first identity of the community member A is a quasi-deceived person, and the second identification is not a potentially vulnerable person, determine that the community member A is a secondary target community member in the community;
- the second identity of the community member A is not a deceived person, and the second identity is a potential vulnerable person, determine that the community member A is a secondary target community member in the community;
- the community member A is any member of the community, and the anti-fraud publicity for the first-level target community members in the community is greater than that of the second-level target community members.
- the transceiver unit 501 is further configured to acquire the number of historically deceived persons in the community; the processing unit 502 is further configured to obtain the number of historically deceived persons in the community and the The number of community members whose second identity is identified as potential gullible persons determines the gullibility index of the community, wherein the gullibility index of the community is used to indicate that the community members in the community are at risk of being deceived.
- FIG. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
- the electronic device 600 includes a transceiver 601 , a processor 602 and a memory 603 . They are connected by bus 604 .
- the memory 603 is used to store computer programs and data, and can transmit the data stored in the memory 603 to the processor 602 .
- the processor 602 is used to read the computer program in the memory 603 to perform the following operations:
- the identity information of each community member and the activity track within the preset time period are input into the deceived person identification model that has completed the training, and the first identity of each community member is predicted.
- the first identity identifier includes whether each of the community members is a deceived person;
- the second identification includes whether each of the community members is a potentially vulnerable person;
- the target community member in the community is determined.
- the processor 602 is further configured to read the computer program in the memory 603 for execution before acquiring the identity information of each community member in the community, the family member information and the activity track within a preset time period The following operations: establish an archive for each community member in the community, wherein the archive of each community member includes the identity information of each community member, family member information and the daily data of each community member Movement tracking;
- the processor 602 is specifically configured to perform the following operations: obtain all the community members from the archives of each community member.
- the identity information, family member information, and activity trajectories of each community member within a preset time period are described.
- the processor 602 is further configured to read the computer program in the memory 603 for execution before acquiring the identity information of each community member in the community, the family member information and the activity track within a preset time period Do the following:
- the control transceiver 601 obtains the identification information of the historically deceived person, determines the archive of the historically defrauded person according to the identification information of the historically deceived person, and obtains the identity information of the historically deceived person from the archives of the historically deceived person , case information and historical activity trajectories, taking the identity information, case information and historical activity trajectories of the historically defrauded persons as negative samples;
- Obtain the identification information of the person who has not been cheated in history determine the archive of the person who has not been cheated in history according to the identification information of the person who has not been cheated in history, and obtain the identity of the person who has not been cheated in history from the archive library of the person who has not been cheated in history information and historical activity trajectories, taking the identity information and historical activity trajectories of the historically unspoofed persons as positive samples;
- Model training is performed using the negative samples and the positive samples, and the trained deceived person identification model is obtained.
- identifying the identity type according to the identity information of each community member, family member information and the activity track within a preset time period, to determine the second identity of each community member In one aspect, the processor 602 is specifically configured to perform the following operations:
- the identity information of each community member, family member information and travel status within the preset time period are input into the identity recognition model to determine the second identity of each community member.
- the potentially deceived persons include housewives, unemployed persons, retirees and young single marriageable young people, the identity information of each community member includes gender and age, and the identity information of each community member Family member information including marital status and child status;
- the processor 602 In terms of inputting the identity information, family member information and travel status of each community member into the identity recognition model to determine the second identity of each community member, the processor 602 Specifically used to do the following:
- Input the identity information of each community member, family member information and travel status within the preset time period into the unemployed person identification model. is regular, and the travel within the second sub-preset time period is irregular, and the age of the community member A belongs to the first age group, and the second identity of the community member A is determined to be an unemployed person , wherein the first sub-preset time period and the second sub-preset time period are two sub-time periods of the preset time period, and the first sub-preset time period is located in the second sub-preset time period before the sub-preset time period;
- the community member A is any member of the community.
- the processor 602 is specifically configured to perform the following operations in determining the target community personnel in the community according to the collision between the first identity identifier and the second identity identifier of each community member:
- the first identity of the community member A is a quasi-deceived person, and the second identity is a potentially deceptive person, determine that the community member A is a first-level target community member in the community;
- the first identity of the community member A is a quasi-deceived person, and the second identification is not a potentially vulnerable person, determine that the community member A is a secondary target community member in the community;
- the second identity of the community member A is not a deceived person, and the second identity is a potential vulnerable person, determine that the community member A is a secondary target community member in the community;
- the community member A is any member of the community, and the anti-fraud publicity for the first-level target community members in the community is greater than that of the second-level target community members.
- the processor 602 is further configured to read the computer program in the memory 603 to perform the following operations:
- the deception index of the community is determined, wherein the deception index of the community is determined by In order to indicate that community members within the community are at risk of being gullible.
- the transceiver 601 may be the transceiver unit 501 of the identification device 500 of the embodiment shown in FIG. 5
- the processor 602 may be the processing unit 502 of the identification device 500 of the embodiment described in FIG. 5 .
- the electronic devices in this application may include smart phones (such as Android mobile phones, iOS mobile phones, Windows Phone mobile phones, etc.), tablet computers, handheld computers, notebook computers, MID (Mobile Internet Devices, referred to as: MID) or wearable devices, etc.
- smart phones such as Android mobile phones, iOS mobile phones, Windows Phone mobile phones, etc.
- tablet computers handheld computers
- notebook computers MID (Mobile Internet Devices, referred to as: MID) or wearable devices, etc.
- MID Mobile Internet Devices, referred to as: MID) or wearable devices, etc.
- the above electronic devices are only examples, not exhaustive, including but not limited to the above electronic devices. In practical applications, the above-mentioned electronic devices may also include: intelligent vehicle-mounted terminals, computer devices, and the like.
- Embodiments of the present application further provide a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program is executed by a processor to implement any one of the identification methods described in the foregoing method embodiments some or all of the steps.
- Embodiments of the present application further provide a computer program product, the computer program product comprising a non-transitory computer-readable storage medium storing a computer program, the computer program being operable to cause a computer to execute the methods described in the foregoing method embodiments Some or all of the steps of any identification method.
- the disclosed apparatus may be implemented in other manners.
- the apparatus embodiments described above are only illustrative, for example, the division of the units is only a logical function division, and there may be other division methods in actual implementation, for example, multiple units or components may be combined or Integration into another system, or some features can be ignored, or not implemented.
- the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical or other forms.
- the units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
- each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit.
- the above-mentioned integrated units can be implemented in the form of hardware, and can also be implemented in the form of software program modules.
- the integrated unit if implemented in the form of a software program module and sold or used as a stand-alone product, may be stored in a computer readable memory.
- the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art, or all or part of the technical solution, and the computer software product is stored in a memory.
- a computer device which may be a personal computer, a server, or a network device, etc.
- the aforementioned memory includes: U disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk or optical disk and other media that can store program codes.
Landscapes
- Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Medical Treatment And Welfare Office Work (AREA)
Abstract
An identity recognition method and apparatus, an electronic device, and a related product. The method comprises: acquiring identity information, family member information, and the movement trajectory in a preset time period of each community member in a community (301); inputting the identity information and the movement trajectory in a preset time period of each community member into a trained defrauded person recognition model to predict a first identity identifier of each community member (302); on the basis of the identity information, family member information, and the movement trajectory in a preset time period of each community member, performing identity type recognition to determine a second identity identifier of each community member (303); and, on the basis of the first identity identifier and the second identity identifier of each community member, implementing collision to determine a target community member in the community (304). The embodiments of the present application are conducive to improving the effect of anti-fraud publicity.
Description
本申请要求于2020年12月31日提交中国专利局,申请号为202011645088.4、发明名称为“身份识别方法、装置、电子设备及相关产品”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application filed on December 31, 2020 with the application number 202011645088.4 and the invention name is "identification method, device, electronic equipment and related products", the entire contents of which are incorporated by reference in this application.
本申请涉及信息识别技术领域,具体涉及一种身份识别方法、装置、电子设备及相关产品。The present application relates to the technical field of information identification, and in particular to an identification method, device, electronic device and related products.
随着政府部门对社会治安案件的打击力度不断加大,社会治安接触类案件快速侦破,发案率也不断降低;但社会治安非接触类案件(比如,电信诈骗)发案率却逆势呈上升趋势。对于非接触类案件的打击和侦破也成为了政府部门非常棘手的事情。目前,政府部门对非接触类案件的打击方式主要有两种:通过各种线索和手段针对已经发案的非接触类案件进行侦破;加强对社区内易受骗人群进行多方面的宣传。As the government departments continue to crack down on social security cases, social security contact cases are quickly detected and the incidence rate continues to decrease; however, the incidence rate of non-contact social security cases (for example, telecommunication fraud) has bucked the trend. Upward trend. The crackdown and detection of non-contact cases has also become a very difficult task for government departments. At present, there are two main ways for government departments to crack down on non-contact cases: to detect non-contact cases that have already occurred through various clues and means;
然而,当前针对社区的易受骗人群的反诈骗宣传多为撒网式宣传,并无针对性,导致宣传成本高,且效果低下。However, the current anti-fraud propaganda aimed at vulnerable people in the community is mostly cast-net propaganda, which is not targeted, resulting in high propaganda costs and low effectiveness.
发明内容SUMMARY OF THE INVENTION
本申请实施例提供了一种身份识别方法、装置、电子设备及相关产品,从社区中筛选出目标社区人员,提高反诈骗针对性和宣传效果。The embodiments of the present application provide an identity recognition method, device, electronic device and related products, which can screen out target community members from the community, and improve the anti-fraud pertinence and publicity effect.
第一方面,本申请实施例提供一种身份识别方法,包括:In a first aspect, the embodiments of the present application provide an identity recognition method, including:
获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹;Obtain the identity information, family member information and activity trajectories of each community member in the community within a preset time period;
将所述每个社区人员的身份信息以及在预设时间段内的活动轨迹输入到完成训练的受骗人员识别模型,预测所述每个社区人员的第一身份标识,所述每个社区人员的第一身份标识包括所述每个社区人员是否为类受骗人员;The identity information of each community member and the activity track within the preset time period are input into the deceived person identification model that has completed the training, and the first identity of each community member is predicted. The first identity identifier includes whether each of the community members is a deceived person;
根据所述每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹进行身份类型识别,确定所述每个社区人员的第二身份标识,所述每个社区人员的第二身份标识包括所述每个社区人员是否为潜在易受骗人员;Identify the identity type according to the identity information of each community member, family member information and the activity track within a preset time period, determine the second identity of each community member, and determine the second identity of each community member. The second identification includes whether each of the community members is a potentially vulnerable person;
根据所述每个社区人员的第一身份标识与第二身份标识进行碰撞,确定所述社区中的目标社区人员。According to the collision between the first identification and the second identification of each community member, the target community member in the community is determined.
第二方面,本申请实施例提供一种身份识别装置,包括:In a second aspect, an embodiment of the present application provides an identification device, including:
收发单元,用于获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹;The transceiver unit is used to obtain the identity information of each community member in the community, family member information and activity track within a preset time period;
处理单元,用于将所述每个社区人员的身份信息以及在预设时间段内的活动轨迹输入到完成训练的受骗人员识别模型,预测所述每个社区人员的第一身份标识,所述每个社区人员的第一身份标识包括所述每个社区人员是否为类受骗人员;根据所述每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹进行身份类型识别,确定所述每个社区人员的第二身份标识,所述每个社区人员的第二身份标识包括所述每个社区人员是否为潜在易受骗人员;根据所述每个社区人员的第一身份标识以及第二身份标识,确定所述社区中的目标社区人员。The processing unit is used to input the identity information of each community member and the activity track within a preset time period into the deceived person identification model that has completed the training, and predict the first identity of each community member, the The first identification of each community member includes whether the community member is a deceived person; the identity type is identified according to the identity information of each community member, family member information and activity track within a preset time period , determine the second identity of each community member, and the second identity of each community member includes whether each community member is a potentially vulnerable person; according to the first identity of each community member The identifier and the second identity identifier are used to determine the target community members in the community.
第三方面,本申请实施例提供一种电子设备,包括:处理器,所述处理器与存储器相连,所述存储器用于存储计算机程序,所述处理器用于执行所述存储器中存储的计算机程序,以使得所述电子设备执行如第一方面所述的方法。In a third aspect, an embodiment of the present application provides an electronic device, including: a processor, the processor is connected to a memory, the memory is used for storing a computer program, and the processor is used for executing the computer program stored in the memory , so that the electronic device performs the method according to the first aspect.
第四方面,本申请实施例提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序使得计算机执行如第一方面所述的方法。In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program causes a computer to execute the method according to the first aspect.
第五方面,本申请实施例提供一种计算机程序产品,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机可操作来使计算机执行如第一方面所述的方法。In a fifth aspect, an embodiment of the present application provides a computer program product, the computer program product includes a non-transitory computer-readable storage medium storing a computer program, the computer is operable to cause the computer to execute as described in the first aspect Methods.
实施本申请实施例,具有如下有益效果:Implementing the embodiments of the present application has the following beneficial effects:
可以看出,在本申请实施例中,身份识别装置通过完成训练的受骗人员识别模型预测每个社区人员的第一身份标识;并通过特征分析,得到每个社区成员的第二身份标识;并根据每个社区人员的第一身份标识和第二身份标识,确定出社区内的目标社区人员。由于从多个维度分析用户的身份标识,使确定出的目标社区人员比较全面,且精度较高。另外,将目标社区人员作为反诈骗的 宣传对象,这样就可以针对这些目标社区人员进行针对性的反欺诈宣传,无需进行撒网式宣传,降低了宣传成本,提高了宣传效果。It can be seen that, in the embodiment of the present application, the identity recognition device predicts the first identity of each community member through the deceived person identification model that has completed the training; and obtains the second identity of each community member through feature analysis; and According to the first identification and the second identification of each community member, the target community member in the community is determined. Since the user's identity is analyzed from multiple dimensions, the determined target community members are comprehensive and accurate. In addition, the target community members are used as the target of anti-fraud publicity, so that targeted anti-fraud publicity can be carried out for these target community members, without the need for casting net publicity, which reduces the cost of publicity and improves the effect of publicity.
图1为本申请实施例提供的一种身份识别系统的架构示意图;1 is a schematic structural diagram of an identity recognition system provided by an embodiment of the present application;
图2为本申请实施例提供的一种身份识别方法的示意图;2 is a schematic diagram of an identity identification method provided by an embodiment of the present application;
图3为本申请实施例提供的一种身份识别方法的流程示意图;3 is a schematic flowchart of an identity identification method provided by an embodiment of the present application;
图4为本申请实施例提供的另一种身份识别方法的流程示意图;4 is a schematic flowchart of another identity identification method provided by an embodiment of the present application;
图5为本申请实施例提供的一种身份识别装置的功能单元组成框图;FIG. 5 is a block diagram of functional units of an identification device provided by an embodiment of the present application;
图6为本申请实施例提供的一种身份识别装置的结构示意图。FIG. 6 is a schematic structural diagram of an identification device provided by an embodiment of the present application.
为了理解本申请,首先对本申请涉及到专业术语进行解释和说明。In order to understand the present application, the technical terms involved in the present application are explained and explained first.
类受骗人员:通过完成训练的受骗人员识别模型对每个社区人员进行识别,得到每个社区人员属于受骗人员的概率,将概率大于阈值的社区人员作为类受骗人员。由于受骗人员识别模型是通过历史受骗人员的信息训练的得到的,因此,类受骗人员是从将社区人员信息与历史受骗人员的信息进行比对的维度,筛选出分类概率大于阈值的社区人员。Class deceived person: Identify each community person through the trained deceived person identification model, get the probability that each community person belongs to the deceived person, and regard the community person whose probability is greater than the threshold as the class deceived person. Since the deceived person identification model is obtained by training the information of historically deceived persons, the class of deceived persons is to screen out the community personnel whose classification probability is greater than the threshold from the dimension of comparing the information of community personnel with the information of historically deceived persons.
潜在易受骗人员:根据身份信息、家庭成员信息以及在预设时间段内的活动轨迹识别出的满足条件的社区人员,也就是从每个社区人员自身所有的身份特征信息的维度出发,筛选出的符合条件的社区人员。Potentially gullible persons: based on identity information, family member information, and activity trajectories within a preset period of time to identify qualified community members, that is, from the dimension of each community member's own identity information, screen out of eligible community members.
参阅图1,图1为本申请实施例提供的一种身份识别系统的架构示意图。身份识别系统包括身份识别装置10和图像采集设备20,身份识别装置10和图像采集设备之间保持通信连接,图像采集设备20设置于社区内,用于获取社区内的社区成员的行程轨迹。Referring to FIG. 1 , FIG. 1 is a schematic structural diagram of an identity recognition system provided by an embodiment of the present application. The identity recognition system includes an identity recognition device 10 and an image acquisition device 20. The identity recognition device 10 and the image acquisition device maintain a communication connection. The image acquisition device 20 is installed in the community and is used to obtain the itinerary of community members in the community.
基于图1所示的身份识别系统,图像采集设备20采集社区内每个社区人员的面部图像,并将每个社区人员的面部图像上传给身份识别装置10,其中,该面部图像携带有地理位置信息;身份识别装置10根据每个人员的面部图像,确定每个社区人员每天的行程轨迹,根据每个社区人员每天的行程轨迹为每个 社区人员创建档案库(即实现一人一档),其中,每个社区人员的档案库包括每个社区人员的身份信息、家庭成员信息以及每个社区人员每天的活动轨迹。这样,身份识别装置10后面进行身份识别的过程中就可以从每个社区人员的档案库中获取每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹,并将每个社区人员的身份信息以及在预设时间段内的活动轨迹输入到完成训练的受骗人员识别模型,预测每个社区人员的第一身份标识,即预测每个社区人员是否为类受骗人员;然后,根据每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹,确定每个社区人员的第二身份标识,即确定每个社区人员是否为潜在易受骗人员;最后,根据每个社区人员的第一身份标识以及第二身份标识进行碰撞,确定该社区中的目标社区人员。其中,该目标社区人员为反诈骗的宣传对象。Based on the identity recognition system shown in FIG. 1 , the image acquisition device 20 collects the facial image of each community member in the community, and uploads the facial image of each community member to the identity recognition device 10, wherein the facial image carries the geographic location information; the identity recognition device 10 determines the daily travel trajectory of each community member according to the facial image of each person, and creates a file database for each community member according to the daily travel trajectory of each community member (that is, realizes one file per person), wherein , the archives of each community member includes the identity information of each community member, family member information and the daily activity track of each community member. In this way, the identity recognition device 10 can obtain the identity information of each community member, family member information and the activity track within a preset time period from the archives of each community member in the process of identity recognition, The identity information of each community member and the activity trajectory within the preset time period are input into the deceived person identification model that has completed the training, and the first identity identification of each community member is predicted, that is, whether each community member is a deceived person or not; then , according to the identity information of each community member, family member information and the activity track within a preset time period, determine the second identity of each community member, that is, determine whether each community member is a potentially vulnerable person; finally, The target community members in the community are determined by colliding with the first identification and the second identification of each community member. Among them, the target community members are the target of anti-fraud propaganda.
可以看出,在本申请实施例中,身份识别装置10和图像采集设备20之间协同作用,可以从社区中筛选出目标社区人员(反诈骗的宣传对象);然后,可以针对这些目标社区人员进行针对性的反欺诈宣传,无需进行撒网式宣传,降低了宣传成本,提高了宣传效果。It can be seen that, in the embodiment of the present application, the identification device 10 and the image acquisition device 20 cooperate with each other to screen out target community members (targets of anti-fraud propaganda) from the community; Targeted anti-fraud publicity is carried out without the need to cast a net, which reduces the cost of publicity and improves the effect of publicity.
参阅图2,图2为本申请实施例提供的一种身份识别方法的示意图。该方法应用于身份识别装置。Referring to FIG. 2, FIG. 2 is a schematic diagram of an identity identification method provided by an embodiment of the present application. The method is applied to an identity recognition device.
如图2所示,身份识别装置通过社区内历史受骗人群以及半监督学习先训练出一个受骗人员识别模型,然后使用完成训练的受骗人员识别模型对社区内所有社区人员进行身份识别,得到每个社区人员的第一身份标识,即确定每个社区人员是否为类受骗人员;此外,身份识别装置通过对社区内的潜在受骗人群进行归纳和分析,得到每种潜在受骗人群的身份特征;根据每种潜在受骗人群的特征建立与每种潜在受骗人群对应的识别模型,本申请以建立家庭主妇识别模型、失业人员识别模型、退休老人识别模型以及适龄单身青年识别模型四个识别模型为例进行说明;然后,通过这四个识别模型,对社区内的所有社区人员进行身份类型识别,得到每个社区人员的第二身份标识,即确定每个社区人员是否为潜在易受骗人员,以及确定是哪种类型的潜在易受骗人员。最后,身份识别装置根据识别出的类受骗人员和潜在易受骗人员进行碰撞,确定出社 区内的目标社区人员,并将目标社区人员作为反诈骗的宣传对象。As shown in Figure 2, the identification device first trains a deceived person identification model through historical deceived people in the community and semi-supervised learning, and then uses the trained deceived person identification model to identify all community personnel in the community, and obtains each The first identification of the community members is to determine whether each community member is a deceived person; in addition, the identification device obtains the identity characteristics of each potential deceived group by summarizing and analyzing the potential deceived groups in the community; The characteristics of each potential deceived group are used to establish the identification model corresponding to each kind of potential deceived group. This application takes the establishment of four identification models: housewife identification model, unemployed person identification model, retired old person identification model and school-age single youth identification model as examples to illustrate. ; Then, through these four identification models, identify the identity types of all community members in the community, and obtain the second identity of each community member, that is, determine whether each community member is a potential vulnerable person, and determine which types of potentially gullible persons. Finally, the identity recognition device collides with the identified quasi-deceived persons and potential deceived persons, determines the target community members in the community, and uses the target community members as anti-fraud propaganda objects.
可以看出,在本申请实施例中,身份识别装置通过模型的建立,可以从社区中筛选出目标社区人员,并将目标社区人员作为反诈骗的宣传对象;这样就可以针对这些目标社区人员进行针对性的反欺诈宣传,无需进行撒网式宣传,降低了宣传成本,提高了宣传效果。It can be seen that, in the embodiment of the present application, through the establishment of the model, the identity recognition device can screen out the target community members from the community, and use the target community members as anti-fraud propaganda objects; in this way, these target community members can be targeted. Targeted anti-fraud publicity eliminates the need for net-casting publicity, which reduces publicity costs and improves publicity effects.
参阅图3,图3为本申请实施例提供的一种身份识别方法的流程示意图。该方法应用于身份识别装置。该方法包括以下步骤:Referring to FIG. 3, FIG. 3 is a schematic flowchart of an identity recognition method provided by an embodiment of the present application. The method is applied to an identity recognition device. The method includes the following steps:
301:身份识别装置获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹。301: The identity recognition device acquires identity information, family member information, and activity tracks within a preset time period of each community member in the community.
应理解,本申请中是以对一个社区内的社区人员进行身份识别为例说明,其他社区中的社区人员的身份识别过程与该社区的识别方式类似,不再叙述。It should be understood that this application takes the identification of community members in one community as an example, and the identification process of community members in other communities is similar to the identification method of the community, and will not be described again.
示例性的,身份识别装置可以为社区内的每个社区人员建档,得到每个社区人员的档案库,实现一人一档,其中,社区内的每个社区人员的档案库包括每个社区人员的身份信息、家庭成员信息以及每天的活动信息。具体的,身份识别装置可以获取每个社区人员的身份信息以及家庭成员信息,其中,该身份信息和家庭成员信息可以由身份识别装置从其他的设备中读取,可以从社区管理系统读取每个社区人员的身份信息,其中,每个社区人员的身份信息包括每个社区人员的姓名、性别、年龄以及身份证号,等等,家庭成员信息包括每个社区人员的婚姻信息和子女信息;另外,身份识别装置可以从社区前端的图像采集设备中获取位于每个活动位置的社区人员的面部图像,根据每个活动位置的社区人员的面部图像,确定每个社区成员每天的活动轨迹;最后,将每个社区人员的身份信息、家庭成员信息以及每个社区人员每天的活动轨迹关联存储,实现为社区内的每个社区人员建立档案库。Exemplarily, the identity recognition device can create a file for each community member in the community, obtain the archive of each community member, and realize one file per person, wherein the archive of each community member in the community includes each community member. identity information, family member information, and daily activity information. Specifically, the identity recognition device can obtain the identity information and family member information of each community member, wherein the identity information and family member information can be read by the identity recognition device from other devices, and each can be read from the community management system. The identity information of each community member, wherein the identity information of each community member includes the name, gender, age and ID number of each community member, etc., and the family member information includes the marriage information and child information of each community member; In addition, the identification device can obtain the facial images of the community members at each activity location from the image acquisition equipment at the front end of the community, and determine the daily activity track of each community member according to the facial images of the community members at each activity location; , store the identity information of each community member, family member information, and each community member's daily activity track in association, and realize the establishment of a file library for each community member in the community.
因此,身份识别装置可以根据每个社区人员的一个或多个标识信息,从每个社区人员的档案库中读取每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹。比如,可以根据每个社区人员的身份证号,确定每个社区人员对应的档案库,并从该档案库中读取每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹。Therefore, the identity recognition device can read the identity information, family member information and activities within a preset time period of each community member from the archives of each community member according to one or more identification information of each community member trajectory. For example, according to the ID number of each community member, the archive database corresponding to each community member can be determined, and the identity information, family member information and information of each community member in the preset time period can be read from the archive database. Movement tracking.
302:身份识别装置将所述每个社区人员的身份信息以及在预设时间段内的活动轨迹输入到完成训练的受骗人员识别模型,预测所述每个社区人员的第一身份标识,所述每个社区人员的第一身份标识包括所述每个社区人员是否为类受骗人员。302: The identity recognition device inputs the identity information of each community member and the activity track within the preset time period into the trained deceived person recognition model, and predicts the first identity identifier of each community member, and the The first identification of each community member includes whether each community member is a deceived person.
其中,该预设时间段可以一天、两天、一星期、一个月或者其他值。Wherein, the preset time period may be one day, two days, one week, one month or other values.
其中,该受骗人员识别模型是预先完成训练的受骗人员识别模型。The deceived person identification model is a deceived person identification model that has been trained in advance.
示例性的,可获取历史受骗人员的标识信息,其中,该标识信息用于标识历史受骗人员的身份,比如,该标识信息可以为历史受骗人员的姓名、身份证号、手机号,等等;根据该历史受骗人员的标识信息确定为该历史受骗人员所建立的档案库,并从该历史受骗人员的档案库中获取历史受骗人员的身份信息(比如,年龄和性别)以及历史活动轨迹,并将历史受骗人员的身份信息以及历史活动轨迹作为负样本;然后,获取历史未受骗人员的标识信息,根据历史未受骗人员的标识信息确定为历史未受骗人员所建立的档案库,并从该历史未受骗人员的档案库中读取该历史未受骗人员的身份信息、案件信息以及历史活动轨迹,并将该历史未受骗人员的身份信息、案件信息以及历史活动轨迹作为正样本。最后,使用该负样本和正样本对受骗人员识别模型进行训练,即对该受骗人员识别模型的模型参数进行调整,得到该完成训练的受骗人员识别模型。Exemplarily, the identification information of the historically defrauded person may be obtained, wherein the identification information is used to identify the identity of the historically defrauded person, for example, the identification information may be the name, ID number, mobile phone number, etc. of the historically defrauded person; Determine the archive established for the historically deceived person according to the identification information of the historically deceived person, and obtain the historically deceived person's identity information (for example, age and gender) and historical activity track from the archives of the historically deceived person, and The identity information and historical activity trajectories of the historically deceived persons are taken as negative samples; then, the identification information of the historically defrauded persons is obtained, and the archives established by the historically defrauded persons are determined according to the identification information of the historically defrauded persons. Read the identity information, case information and historical activity track of the historically not deceived person from the archive database of the undeceived person, and use the identity information, case information and historical activity track of the historically not defrauded person as a positive sample. Finally, the deceived person identification model is trained by using the negative samples and positive samples, that is, the model parameters of the deceived person identification model are adjusted to obtain the deceived person identification model that has completed the training.
其中,上述历史受骗人员和历史未受骗人员的身份信息均包括但不限于性别、年龄、学历以及工作;其中,历史受骗人员的案件信息包括但不限于:历史受骗人员的被骗经过、被骗时间以及被骗地点)。Among them, the identity information of the above-mentioned historically deceived persons and those who have not been deceived in history include but are not limited to gender, age, education, and work; among which, the case information of historically defrauded persons includes but is not limited to: history of deceived persons time and location).
应理解,上述历史受骗人员和历史未受骗人员均可以为该社区内的社区人员,也可以不是本社区的社区人员,比如,可以是其他社区中的历史受骗人员和历史未受骗人员,本申请对此不做限定。It should be understood that the above-mentioned historically deceived persons and historically not deceived persons may be community members in the community, or may not be community members of this community. This is not limited.
示例性的,可以将每个社区人员在预设时间段中每天的活动轨迹数字化,得到与每天的活动轨迹对应的特征向量,比如,可预先设置多个活动位置,若当天到达了某个活动位置,则将该活动位置对应的维度设置为1,若当天未到达该活动位置,则将该活动位置对应的维度设置为0,得到与每天的活动轨迹对应的特征向量;然后,将预设时间段内每天的活动轨迹对应的特征向量进行 拼接(纵向拼接),得到第一矩阵。比如,第一个特征向量为[0,01,0],第二个特征向量为[0,1,0,0],则纵向拼接之后,得到的第一矩阵为
同样,将每个社区成员的身份信息(即性别和年龄)进行向量化(即映射处理),得到与身份信息对应的特征向量,比如,性别女可以通过取值全为1的特征向量表示,性别男可以通过取值全为0的特征向量表示,年龄可以用对应的二进制数进行表示;最后,将身份信息对应的特征向量与上述第一矩阵进行拼接(纵向拼接),得到输入数据;最后,将每个社区人员的输入数据输入到该完成训练的受骗人员识别模型,得到每个社区人员属于受骗人员的概率,在该概率大于或等于阈值的情况下,确定该社区人员为类受骗人员,在该概率小于该阈值的情况下,确定该社区人员不是类受骗人员。
Exemplarily, the daily activity trajectory of each community member in a preset time period can be digitized, and a feature vector corresponding to the daily activity trajectory can be obtained. For example, multiple activity locations can be preset. location, the dimension corresponding to the activity location is set to 1, and if the activity location is not reached on the day, the dimension corresponding to the activity location is set to 0, and the feature vector corresponding to the daily activity track is obtained; then, the preset The eigenvectors corresponding to the daily activity trajectories in the time period are spliced (vertically spliced) to obtain a first matrix. For example, if the first eigenvector is [0,01,0] and the second eigenvector is [0,1,0,0], after vertical splicing, the first matrix obtained is Similarly, the identity information (ie, gender and age) of each community member is vectorized (ie, mapped), and the feature vector corresponding to the identity information is obtained. For example, gender female can be represented by a feature vector whose value is all 1, Male gender can be represented by an eigenvector whose value is all 0, and age can be represented by a corresponding binary number; finally, the eigenvector corresponding to the identity information is spliced (vertically spliced) with the above-mentioned first matrix to obtain the input data; finally , input the input data of each community member into the trained deceived person identification model, and get the probability that each community member belongs to the deceived person. When the probability is greater than or equal to the threshold, determine the community member as a class of deceived people , in the case that the probability is less than the threshold, it is determined that the community member is not a deceived person.
303:身份识别装置根据所述每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹进行身份类型识别,确定所述每个社区人员的第二身份标识,所述每个社区人员的第二身份标识包括所述每个社区人员是否为潜在易受骗人员。303: The identity recognition device performs identity type recognition according to the identity information of each community member, family member information and the activity track within a preset time period, and determines the second identity of each community member, and each The second identification of each community member includes whether each of the community members is a potentially gullible person.
示例性的,根据每个社区人员在预设时间段内的出行轨迹,确定每个社区人员在预设时间段内的出行状况;将每个社区人员的身份信息、家庭成员信息以及在预设时间段内的出行状况输入到身份识别模型(即分别输入到图2中示出的家庭主妇识别模型、失业人员识别模型、退休老人识别模型以及适婚单身青年识别模型),确定每个社区人员的第二身份标识,即确定每个社区人员是不是潜在易受骗人员。其中,潜在易受骗人员的类型包括但不限于以下几种:家庭主妇、失业人员、退休老人以及适婚单身青年。Exemplarily, according to the travel trajectory of each community member in the preset time period, determine the travel status of each community member in the preset time period; The travel status in the time period is input into the identity recognition model (that is, input into the housewife recognition model, the unemployed person recognition model, the retired old person recognition model and the marriageable single youth recognition model shown in Figure 2 respectively), and each community member is determined. The second identification of each community member is to determine whether each community member is a potential gullible person. Among them, the types of potential gullible persons include but are not limited to the following: housewives, unemployed persons, retirees, and young single marriageable persons.
具体的,将每个社区人员的身份信息、家庭成员信息以及在预设时间段内的出行状况输入到家庭主妇识别模型,若识别出社区人员A在预设时间内的出行是无规律的,且携带有儿童,且该社区人员A的性别为女性,则确定该社区人员A的第二身份标识为家庭主妇,其中,该社区人员A为该社区内的任意一个社区人员;Specifically, the identity information of each community member, family member information, and travel status within a preset time period are input into the housewife identification model. If it is recognized that the travel of community member A within the preset time period is irregular, and carry children, and the gender of the community member A is female, then determine the second identity of the community member A as a housewife, wherein the community member A is any community member in the community;
将每个社区人员的身份信息、家庭成员信息以及在预设时间段内的出行状况输入到失业人员识别模型,若识别出社区人员A在第一子预设时间段内的出 行是有规律的,且在第二子预设时间段的出行是无规律的,且社区人员A的年龄属于第一年龄段,确定社区成员A的第二身份标识为失业人员,其中,该第一子预设时间段和第二子预设时间段为该预设时间段中的两个子时间段,且该第一子预设时间段位于该第二预设时间段之前。比如,预设时间段为一个月,则第一子预设时间段可以为前半个月,第二子预设时间段为后半个月。其中,该第一年龄段为工作年龄段,比如,18岁-60岁;Input the identity information, family member information and travel status of each community member into the unemployed person identification model. If it is recognized that the travel of community member A in the first sub-preset time period is regular , and the travel in the second sub-preset time period is irregular, and the age of community member A belongs to the first age group, it is determined that the second identity of community member A is an unemployed person, wherein the first sub-preset The time period and the second sub-preset time period are two sub-time periods in the preset time period, and the first sub-preset time period is located before the second preset time period. For example, if the preset time period is one month, the first sub-preset time period may be the first half of the month, and the second sub-preset time period may be the second half of the month. Among them, the first age group is the working age group, for example, 18-60 years old;
将所每个社区人员的身份信息、家庭成员信息以及在预设时间段内的出行状况输入到退休老人识别模型,若识别出社区人员A在预设时间段内的出行中无配偶和子女的陪伴,且社区人员A的年龄属于第二预设年龄段,确定社区人员A的第二身份标识为退休老人,其中,第二年龄段可以为60岁-80岁;Input the identity information, family member information and travel status of each community member into the retirement identification model within the preset time period. Accompany, and the age of community member A belongs to the second preset age group, determine that the second identity of community member A is a retired old man, wherein the second age group can be 60-80 years old;
将每个社区人员的身份信息、家庭成员信息以及在预设时间段内的出行状况输入到适婚单身青年识别模型,若识别出社区人员A在预设时间段内的出行中无异性陪伴,且社区人员A的婚姻状况为未婚,且社区人员A的年龄段属于第三年龄段,确定社区人员A的第二身份标识为适婚单身青年,其中,第三年龄段可以为23-35。Input the identity information, family member information, and travel status of each community member into the marriageable single youth identification model within the preset time period. And the marital status of community member A is unmarried, and the age group of community member A belongs to the third age group, and the second identity of community member A is determined to be a marriageable single youth, of which the third age group can be 23-35.
304:身份识别装置根据所述每个社区人员的第一身份标识以及第二身份标识进行碰撞,确定所述社区中的目标社区人员。304: The identification device collides according to the first identification and the second identification of each community member, and determines a target community member in the community.
示例性的,在社区人员A的第一身份标识为类受骗人员,且第二身份标识为潜在易受骗人员的情况下,确定所述社区人员A为所述社区中的一级目标社区人员;在社区人员A的第一身份标识为类受骗人员,且第二身份标识不是易潜在受骗人员的情况下,确定所述社区人员A为所述社区中的二级目标社区人员;在社区人员A的第二身份标识不是类受骗人员,且第二身份标识为潜在易受骗人员的情况下,确定所述社区人员A为所述社区中的二级目标社区人员。Exemplarily, in the case that the first identity of the community member A is a deceived person, and the second identity is a potential fraudulent person, determine that the community member A is a first-level target community member in the community; In the case that the first identity of the community member A is a quasi-deceived person, and the second identity is not a person who is easily deceived, determine that the community member A is a secondary target community member in the community; in the community member A In the case that the second identity of the person is not a deceived person, and the second identity is a potentially deceptive person, determine that the community member A is a secondary target community member in the community.
其中,对一级目标社区人员的反诈骗宣传力度大于二级目标人员,比如,可以对以一级目标人员的反诈骗的进行线下宣传,一对一宣传,对二级目标人员只是在线宣传,鼓励二级目标人员在线学习反诈骗知识。Among them, the anti-fraud publicity for the first-level target community members is stronger than the second-level target personnel. For example, offline publicity and one-to-one publicity for the anti-fraud of the first-level target personnel can be carried out, and only online publicity for the second-level target personnel. , and encourage secondary target personnel to learn anti-fraud knowledge online.
可以看出,在本申请实施例中,身份识别装置通过完成训练的受骗人员识别模型预测每个社区人员的第一身份标识;并通过特征分析,得到每个社区成员的第二身份标识;并根据每个社区人员的第一身份标识和第二身份标识进行 碰撞,确定出社区内的目标社区人员。由于从多个维度分析用户的身份标识,使确定出的目标社区人员比较全面,且精度较高。另外,将目标社区人员作为反诈骗的宣传对象,这样就可以针对这些目标社区人员进行针对性的反诈骗宣传,无需进行撒网式宣传,降低了宣传成本,提高了宣传效果。It can be seen that, in the embodiment of the present application, the identity recognition device predicts the first identity of each community member through the deceived person identification model that has completed the training; and obtains the second identity of each community member through feature analysis; and The target community members in the community are determined according to the collision between the first identification and the second identification of each community member. Since the user's identity is analyzed from multiple dimensions, the determined target community members are comprehensive and accurate. In addition, the target community members are used as the target of anti-fraud publicity, so that targeted anti-fraud publicity can be carried out for these target community members, without the need for net-casting publicity, which reduces the cost of publicity and improves the effect of publicity.
参阅图4,图4为本申请实施例提供的另一种身份识别方法的流程示意图。该方法应用于身份识别装置。该实施例中与图3所示的实施例相同的内容,此处不再重复描述。本实施例的方法包括以下步骤:Referring to FIG. 4 , FIG. 4 is a schematic flowchart of another identity identification method provided by an embodiment of the present application. The method is applied to an identity recognition device. The content of this embodiment is the same as that of the embodiment shown in FIG. 3 , and the description is not repeated here. The method of this embodiment includes the following steps:
401:身份识别装置获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹。401: The identity recognition device acquires identity information, family member information, and activity tracks within a preset time period of each community member in the community.
402:身份识别装置将所述每个社区人员的身份信息以及在预设时间段内的活动轨迹输入到完成训练的受骗人员识别模型,预测所述每个社区人员的第一身份标识,所述每个社区人员的第一身份标识包括所述每个社区人员是否为类受骗人员。402: The identity recognition device inputs the identity information of each community member and the activity track within a preset time period into the trained deceived person recognition model, and predicts the first identity of each community member, and the The first identification of each community member includes whether each community member is a deceived person.
403:身份识别装置根据所述每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹进行身份类型识别,确定所述每个社区人员的第二身份标识,所述每个社区人员的第二身份标识包括所述每个社区人员是否为潜在易受骗人员。403: The identity recognition device identifies the identity type according to the identity information of each community member, family member information, and the activity track within a preset time period, and determines the second identity of each community member, and each The second identification of each community member includes whether each of the community members is a potentially gullible person.
404:身份识别装置根据所述每个社区人员的第一身份标识以及第二身份标识进行碰撞,确定所述社区中的目标社区人员。404: The identification device collides according to the first identification and the second identification of each community member, and determines a target community member in the community.
405:身份识别装置获取所述社区中的历史受骗人员的数量。405: The identification device acquires the number of historically deceived persons in the community.
406:身份识别装置根据所述社区中的历史受骗人员的数量以及所述社区中第二身份标识为潜在易受骗人员的社区人员的数量,确定所述社区的易受骗指数,其中,所述社区的易受骗指数用于指示所述社区内的社区人员存在易受骗的风险。406: The identification device determines the vulnerability index of the community according to the number of historical deceived persons in the community and the number of community members whose second identity is identified as a potential vulnerable person in the community, wherein the community The Fraud Index of is used to indicate that the community members within said community are at risk of being gullible.
示例性的,可根据社区中的历史受骗人员的数量、潜在易受骗人员的数量以及预设的权重系数,得到该社区的受骗指数。示例性的,社区的受骗指数可以通过公式(1)表示:Exemplarily, the deceived index of the community may be obtained according to the number of historically deceived persons in the community, the number of potential deceptive persons and a preset weight coefficient. Exemplarily, the deceived index of the community can be expressed by formula (1):
Index=L
1*A+L
2 公式(1);
Index=L 1 *A+L 2 formula (1);
其中,Index为社区的易受骗指数,L
1为社区中的历史受骗人员数量,L
2为社区中的潜在易受骗人员的数量,A为预设的权重系数,取值大于1。
Among them, Index is the vulnerability index of the community, L 1 is the number of historically deceived people in the community, L 2 is the number of potential deceived people in the community, A is the preset weight coefficient, and the value is greater than 1.
可以看出,在本申请实施例中,身份识别装置通过完成训练的受骗人员识别模型预测每个社区人员的第一身份标识;并通过特征分析,得到每个社区成员的第二身份标识;并根据每个社区人员的第一身份标识和第二身份标识,确定出社区内的目标社区人员。由于从多个维度分析用户的身份标识,使确定出的目标社区人员比较全面,且精度较高。另外,将目标社区人员作为反诈骗的宣传对象,这样就可以针对这些目标社区人员进行针对性的反欺诈宣传,无需进行撒网式宣传,降低了宣传成本,提高了宣传效果。并且计算社区的易受骗指数,从而可以实现对每个社区进行针对性宣传,重点关注易受骗指数较高的社区。It can be seen that, in the embodiment of the present application, the identity recognition device predicts the first identity of each community member through the deceived person identification model that has completed the training; and obtains the second identity of each community member through feature analysis; and According to the first identification and the second identification of each community member, the target community member in the community is determined. Since the user's identity is analyzed from multiple dimensions, the determined target community members are comprehensive and accurate. In addition, target community members are used as anti-fraud propaganda objects, so that targeted anti-fraud propaganda can be carried out for these target community members, without the need for casting net propaganda, which reduces propaganda costs and improves propaganda effects. And calculate the gullibility index of the community, so that each community can be targeted for publicity, focusing on the community with a higher gullibility index.
在一些可能的实施方式中,在确定出每个社区人员的第二身份标识之后,可统计每种类型的潜在易受骗人员的数量,即统计家庭主妇的数量、失业人员的数量、退休老人的数量以及适婚单身青年的数量,然后,根据每种类型的潜在易受骗人员的数量,对这四种类型的潜在易受骗人员进行排序,并将排序结果进行可视化展示,以对每种类型的潜在易受骗人员针对性的制定宣传方案,进一步提高反诈骗宣传的针对性。另外,还可以统计社区内潜在易受骗人员的总数量。In some possible implementations, after the second identification of each community member is determined, the number of each type of potentially vulnerable persons may be counted, that is, the number of housewives, the number of unemployed persons, the number of retirees The number and the number of single young marriageable people, then, according to the number of potential gullible people of each type, the four types of potential gullible people are ranked, and the ranking results Potentially vulnerable persons shall formulate targeted publicity plans to further improve the pertinence of anti-fraud publicity. In addition, the total number of potentially gullible people in the community can be counted.
参阅图5,图5本申请实施例提供的一种身份识别装置的功能单元组成框图。身份识别装置500包括:收发单元501和处理单元502,其中:Referring to FIG. 5, FIG. 5 is a block diagram of functional units of an identification device provided by an embodiment of the present application. The identification device 500 includes: a transceiver unit 501 and a processing unit 502, wherein:
收发单元501,用于获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹;The transceiver unit 501 is used to obtain the identity information, family member information and activity track within a preset time period of each community member in the community;
处理单元502,用于将所述每个社区人员的身份信息以及在预设时间段内的活动轨迹输入到完成训练的受骗人员识别模型,预测所述每个社区人员的第一身份标识,所述每个社区人员的第一身份标识包括所述每个社区人员是否为类受骗人员;根据所述每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹进行身份类型识别,确定所述每个社区人员的第二身份标识,所述每个社区人员的第二身份标识包括所述每个社区人员是否为潜在易受 骗人员;根据所述每个社区人员的第一身份标识以及第二身份标识,确定所述社区中的目标社区人员。The processing unit 502 is configured to input the identity information of each community member and the activity track within a preset time period into the deceived person identification model that has completed the training, and predict the first identity of each community member, so The first identity identifier of each community member includes whether each community member is a deceived person; the identity type is carried out according to the identity information of each community member, family member information and the activity track within a preset time period. Identify, determine the second identity of each community member, and the second identity of each community member includes whether each community member is a potential gullible person; according to the first identification of each community member The identity identifier and the second identity identifier determine the target community members in the community.
在一些可能的实施方式中,在获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹之前,处理单元502,还用于为所述社区中每个社区人员建立档案库,其中,所述每个社区人员的档案库包括所述每个社区人员的身份信息、家庭成员信息以及所述每个社区人员每天的活动轨迹;In some possible implementations, before acquiring the identity information of each community member in the community, the family member information and the activity track within a preset time period, the processing unit 502 is further configured to provide each community member in the community Personnel establishes an archive, wherein the archive of each community member includes the identity information of each community member, family member information, and the daily activity track of each community member;
在获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹方面,处理单元502,具体用于:In terms of acquiring the identity information, family member information and activity track within a preset time period of each community member in the community, the processing unit 502 is specifically used for:
从所述每个社区人员的档案库中获取所述每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹。The identity information, family member information and activity track within a preset time period of each community member are acquired from the archives of each community member.
在一些可能的实施方式中,在获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹之前,收发单元501,还用于获取历史受骗人员的标识信息,根据所述历史受骗人员的标识信息确定所述历史受骗人员的档案库,从所述历史受骗人员的档案库中获取所述历史受骗人员的身份信息、案件信息以及历史活动轨迹,将所述历史受骗人员的身份信息、案件信息以及历史活动轨迹作为负样本;获取历史未受骗人员的标识信息,根据所述历史未受骗人员的标识信息确定所述历史未受骗人员的档案库,从所述历史未受骗人员的档案库中获取所述历史未受骗人员的身份信息以及历史活动轨迹,将所述历史未受骗人员的身份信息以及历史活动轨迹作为正样本;In some possible implementations, before acquiring the identity information of each community member in the community, the family member information and the activity track within a preset time period, the transceiver unit 501 is further configured to acquire the identification information of the historically deceived person, Determine the archive of the historically cheated person according to the identification information of the historically cheated person, obtain the identity information, case information and historical activity track of the historically cheated person from the archives of the historically cheated person, and store the historically cheated person. The identity information, case information, and historical activity trajectories of the deceived persons are taken as negative samples; the identification information of the historically defrauded persons is obtained, and the archives of the historically defrauded persons are determined according to the identification information of the historically defrauded persons. Obtain the identity information and historical activity trajectories of the historically undeceived persons from the archives of the undeceived persons, and use the identity information and historical activity trajectories of the historically undeceived persons as positive samples;
处理单元,还用于使用所述负样本和所述正样本进行模型训练,得到所述完成训练的受骗人员识别模型。The processing unit is further configured to use the negative samples and the positive samples to perform model training to obtain the trained deceived person identification model.
在一些可能的实施方式中,在根据所述每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹进行身份类别识别,确定所述每个社区人员的第二身份标识方面,处理单元502,具体用于:In some possible implementations, identifying the identity category according to the identity information of each community member, family member information and the activity track within a preset time period, and determining the second identity of each community member In one aspect, the processing unit 502 is specifically configured to:
根据所述每个社区人员在预设时间段内的出行轨迹,确定所述每个社区人员在所述预设时间段内的出行状况;According to the travel trajectory of each community member within the preset time period, determine the travel status of each community member within the preset time period;
将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到身份识别模型,确定所述每个社区人员的第二身份标识。The identity information of each community member, family member information and travel status within the preset time period are input into the identity recognition model to determine the second identity of each community member.
在一些可能的实施方式中,所述潜在易受骗人员包括家庭主妇、失业人员、退休老人以及适婚单身青年,所述每个社区人员的身份信息包括性别和年龄,所述每个社区人员的家庭成员信息包括婚姻状况和子女状况;In some possible implementations, the potentially deceived persons include housewives, unemployed persons, retirees and young single marriageable young people, the identity information of each community member includes gender and age, and the identity information of each community member Family member information including marital status and child status;
在将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到身份识别模型,确定所述每个社区人员的第二身份标识方面,处理单元502,具体用于:In terms of inputting the identity information, family member information and travel status of each community member into the identity recognition model and determining the second identity of each community member, the processing unit 502 , specifically for:
将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到家庭主妇识别模型,若识别出社区人员A在预设时间内的出行是无规律的,且携带有儿童,且所述社区人员A的性别为女性,确定所述社区人员A的第二身份标识为家庭主妇;Input the identity information of each community member, family member information and travel status within the preset time period into the housewife identification model, if it is recognized that the travel of community member A within the preset time period is irregular , and carry a child, and the gender of the community member A is female, determine that the second identity of the community member A is a housewife;
将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到失业人员识别模型,若识别出社区人员A在第一子预设时间段内的出行是有规律的,且在第二子预设时间段内的出行是无规律的,且所述社区人员A的年龄属于第一年龄段,确定所述社区成员A的第二身份标识为失业人员,其中,所述第一子预设时间段和所述第二子预设时间段为所述预设时间段的两个子时间段,且所述第一子预设时间段位于所述第二子预设时间段之前;Input the identity information of each community member, family member information and travel status within the preset time period into the unemployed person identification model. is regular, and the travel within the second sub-preset time period is irregular, and the age of the community member A belongs to the first age group, and the second identity of the community member A is determined to be an unemployed person , wherein the first sub-preset time period and the second sub-preset time period are two sub-time periods of the preset time period, and the first sub-preset time period is located in the second sub-preset time period before the sub-preset time period;
将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到退休老人识别模型,若识别出社区人员A在预设时间段内的出行中无配偶和子女的陪伴,且所述社区人员A的年龄属于第二年龄段,确定所述社区人员A的第二身份标识为退休老人;Input the identity information, family member information and travel status of each community member into the retirement identification model within the preset time period, if it is identified that the community member A has no spouse during the trip within the preset time period Accompanied by children, and the age of the community member A belongs to the second age group, it is determined that the second identity of the community member A is a retired old man;
将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到适婚单身青年识别模型,若识别出社区人员A在预设时间段内的出行中无异性陪伴,且所述社区人员A的婚姻状况为未婚,且所述社区人员A的年龄属于第三年龄段,确定所述社区人员A的第二身份标识为适婚单身青年;Input the identity information, family member information and travel status of each community member into the marriageable single youth identification model within the preset time period, if it is identified that the community member A is traveling within the preset time period No heterosexual companionship, and the marital status of the community member A is unmarried, and the age of the community member A belongs to the third age group, determine that the second identity of the community member A is a marriageable single youth;
其中,所述社区人员A为所述社区中的任意一个社区人员。Wherein, the community member A is any member of the community.
在一些可能的实施方式中,在根据所述每个社区人员的第一身份标识与第二身份标识进行碰撞,确定所述社区中的目标社区人员方面,处理单元502, 具体用于:In some possible implementations, in terms of determining the target community member in the community according to the collision between the first identification and the second identification of each community member, the processing unit 502 is specifically configured to:
在社区人员A的第一身份标识为类受骗人员,且第二身份标识为潜在易受骗人员的情况下,确定所述社区人员A为所述社区中的一级目标社区人员;In the case that the first identity of the community member A is a quasi-deceived person, and the second identity is a potentially deceptive person, determine that the community member A is a first-level target community member in the community;
在社区人员A的第一身份标识为类受骗人员,且第二身份标识不是潜在易受骗人员的情况下,确定所述社区人员A为所述社区中的二级目标社区人员;In the case that the first identity of the community member A is a quasi-deceived person, and the second identification is not a potentially vulnerable person, determine that the community member A is a secondary target community member in the community;
在社区人员A的第二身份标识不是类受骗人员,且第二身份标识为潜在易受骗人员的情况下,确定所述社区人员A为所述社区中的二级目标社区人员;In the case where the second identity of the community member A is not a deceived person, and the second identity is a potential vulnerable person, determine that the community member A is a secondary target community member in the community;
其中,所述社区人员A为所述社区中的任意一个社区人员,对所述社区中的一级目标社区人员的反诈骗宣传力度大于二级目标社区人员。Wherein, the community member A is any member of the community, and the anti-fraud publicity for the first-level target community members in the community is greater than that of the second-level target community members.
在一些可能的实施方式中,收发单元501,还用于获取所述社区中的历史受骗人员的数量;处理单元502,还用于根据所述社区中的历史受骗人员的数量以及所述社区中第二身份标识为潜在易受骗人员的社区人员的数量,确定所述社区的易受骗指数,其中,所述社区的易受骗指数用于指示所述社区内的社区人员存在易受骗的风险。In some possible implementations, the transceiver unit 501 is further configured to acquire the number of historically deceived persons in the community; the processing unit 502 is further configured to obtain the number of historically deceived persons in the community and the The number of community members whose second identity is identified as potential gullible persons determines the gullibility index of the community, wherein the gullibility index of the community is used to indicate that the community members in the community are at risk of being deceived.
参阅图6,图6为本申请实施例提供的一种电子设备的结构示意图。如图6所示,电子设备600包括收发器601、处理器602和存储器603。它们之间通过总线604连接。存储器603用于存储计算机程序和数据,并可以将存储器603存储的数据传输给处理器602。Referring to FIG. 6 , FIG. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present application. As shown in FIG. 6 , the electronic device 600 includes a transceiver 601 , a processor 602 and a memory 603 . They are connected by bus 604 . The memory 603 is used to store computer programs and data, and can transmit the data stored in the memory 603 to the processor 602 .
处理器602用于读取存储器603中的计算机程序执行以下操作:The processor 602 is used to read the computer program in the memory 603 to perform the following operations:
控制收发器601获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹;Control the transceiver 601 to obtain the identity information, family member information and activity track within a preset time period of each community member in the community;
将所述每个社区人员的身份信息以及在预设时间段内的活动轨迹输入到完成训练的受骗人员识别模型,预测所述每个社区人员的第一身份标识,所述每个社区人员的第一身份标识包括所述每个社区人员是否为类受骗人员;The identity information of each community member and the activity track within the preset time period are input into the deceived person identification model that has completed the training, and the first identity of each community member is predicted. The first identity identifier includes whether each of the community members is a deceived person;
根据所述每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹进行身份类型识别,确定所述每个社区人员的第二身份标识,所述每个社区人员的第二身份标识包括所述每个社区人员是否为潜在易受骗人员;Identify the identity type according to the identity information of each community member, family member information and the activity track within a preset time period, determine the second identity of each community member, and determine the second identity of each community member. The second identification includes whether each of the community members is a potentially vulnerable person;
根据所述每个社区人员的第一身份标识与第二身份标识进行碰撞,确定所 述社区中的目标社区人员。According to the collision between the first identification and the second identification of each community member, the target community member in the community is determined.
在一些可能的实施方式中,在获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹之前,处理器602还用于读取存储器603中的计算机程序执行以下操作:为所述社区中每个社区人员建立档案库,其中,所述每个社区人员的档案库包括所述每个社区人员的身份信息、家庭成员信息以及所述每个社区人员每天的活动轨迹;In some possible implementations, the processor 602 is further configured to read the computer program in the memory 603 for execution before acquiring the identity information of each community member in the community, the family member information and the activity track within a preset time period The following operations: establish an archive for each community member in the community, wherein the archive of each community member includes the identity information of each community member, family member information and the daily data of each community member Movement tracking;
在获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹方面,处理器602具体用于执行以下操作:从所述每个社区人员的档案库中获取所述每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹。In terms of acquiring the identity information, family member information and activity track within a preset time period of each community member in the community, the processor 602 is specifically configured to perform the following operations: obtain all the community members from the archives of each community member. The identity information, family member information, and activity trajectories of each community member within a preset time period are described.
在一些可能的实施方式中,在获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹之前,处理器602还用于读取存储器603中的计算机程序执行以下操作:In some possible implementations, the processor 602 is further configured to read the computer program in the memory 603 for execution before acquiring the identity information of each community member in the community, the family member information and the activity track within a preset time period Do the following:
控制收发器601获取历史受骗人员的标识信息,根据所述历史受骗人员的标识信息确定所述历史受骗人员的档案库,从所述历史受骗人员的档案库中获取所述历史受骗人员的身份信息、案件信息以及历史活动轨迹,将所述历史受骗人员的身份信息、案件信息以及历史活动轨迹作为负样本;The control transceiver 601 obtains the identification information of the historically deceived person, determines the archive of the historically defrauded person according to the identification information of the historically deceived person, and obtains the identity information of the historically deceived person from the archives of the historically deceived person , case information and historical activity trajectories, taking the identity information, case information and historical activity trajectories of the historically defrauded persons as negative samples;
获取历史未受骗人员的标识信息,根据所述历史未受骗人员的标识信息确定所述历史未受骗人员的档案库,从所述历史未受骗人员的档案库中获取所述历史未受骗人员的身份信息以及历史活动轨迹,将所述历史未受骗人员的身份信息以及历史活动轨迹作为正样本;Obtain the identification information of the person who has not been cheated in history, determine the archive of the person who has not been cheated in history according to the identification information of the person who has not been cheated in history, and obtain the identity of the person who has not been cheated in history from the archive library of the person who has not been cheated in history information and historical activity trajectories, taking the identity information and historical activity trajectories of the historically unspoofed persons as positive samples;
使用所述负样本和所述正样本进行模型训练,得到所述完成训练的受骗人员识别模型。Model training is performed using the negative samples and the positive samples, and the trained deceived person identification model is obtained.
在一些可能的实施方式中,在根据所述每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹进行身份类型识别,确定所述每个社区人员的第二身份标识方面,处理器602具体用于执行以下操作:In some possible implementations, identifying the identity type according to the identity information of each community member, family member information and the activity track within a preset time period, to determine the second identity of each community member In one aspect, the processor 602 is specifically configured to perform the following operations:
根据所述每个社区人员在预设时间段内的出行轨迹,确定所述每个社区人员在所述预设时间段内的出行状况;According to the travel trajectory of each community member within the preset time period, determine the travel status of each community member within the preset time period;
将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内 的出行状况输入到身份识别模型,确定所述每个社区人员的第二身份标识。The identity information of each community member, family member information and travel status within the preset time period are input into the identity recognition model to determine the second identity of each community member.
在一些可能的实施方式中,所述潜在易受骗人员包括家庭主妇、失业人员、退休老人以及适婚单身青年,所述每个社区人员的身份信息包括性别和年龄,所述每个社区人员的家庭成员信息包括婚姻状况和子女状况;In some possible implementations, the potentially deceived persons include housewives, unemployed persons, retirees and young single marriageable young people, the identity information of each community member includes gender and age, and the identity information of each community member Family member information including marital status and child status;
在将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到身份识别模型,确定所述每个社区人员的第二身份标识方面,处理器602具体用于执行以下操作:In terms of inputting the identity information, family member information and travel status of each community member into the identity recognition model to determine the second identity of each community member, the processor 602 Specifically used to do the following:
将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到家庭主妇识别模型,若识别出社区人员A在预设时间内的出行是无规律的,且携带有儿童,且所述社区人员A的性别为女性,确定所述社区人员A的第二身份标识为家庭主妇;Input the identity information of each community member, family member information and travel status within the preset time period into the housewife identification model, if it is recognized that the travel of community member A within the preset time period is irregular , and carry a child, and the gender of the community member A is female, determine that the second identity of the community member A is a housewife;
将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到失业人员识别模型,若识别出社区人员A在第一子预设时间段内的出行是有规律的,且在第二子预设时间段内的出行是无规律的,且所述社区人员A的年龄属于第一年龄段,确定所述社区成员A的第二身份标识为失业人员,其中,所述第一子预设时间段和所述第二子预设时间段为所述预设时间段的两个子时间段,且所述第一子预设时间段位于所述第二子预设时间段之前;Input the identity information of each community member, family member information and travel status within the preset time period into the unemployed person identification model. is regular, and the travel within the second sub-preset time period is irregular, and the age of the community member A belongs to the first age group, and the second identity of the community member A is determined to be an unemployed person , wherein the first sub-preset time period and the second sub-preset time period are two sub-time periods of the preset time period, and the first sub-preset time period is located in the second sub-preset time period before the sub-preset time period;
将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到退休老人识别模型,若识别出社区人员A在预设时间段内的出行中无配偶和子女的陪伴,且所述社区人员A的年龄属于第二年龄段,确定所述社区人员A的第二身份标识为退休老人;Input the identity information, family member information and travel status of each community member into the retirement identification model within the preset time period, if it is identified that the community member A has no spouse during the trip within the preset time period Accompanied by children, and the age of the community member A belongs to the second age group, it is determined that the second identity of the community member A is a retired old man;
将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到适婚单身青年识别模型,若识别出社区人员A在预设时间段内的出行中无异性陪伴,且所述社区人员A的婚姻状况为未婚,且所述社区人员A的年龄属于第三年龄段,确定所述社区人员A的第二身份标识为适婚单身青年;Input the identity information, family member information and travel status of each community member into the marriageable single youth identification model within the preset time period, if it is identified that the community member A is traveling within the preset time period No heterosexual companionship, and the marital status of the community member A is unmarried, and the age of the community member A belongs to the third age group, determine that the second identity of the community member A is a marriageable single youth;
其中,所述社区人员A为所述社区中的任意一个社区人员。Wherein, the community member A is any member of the community.
在一些可能的实施方式中,在根据所述每个社区人员的第一身份标识与第 二身份标识进行碰撞,确定所述社区中的目标社区人员方面,处理器602具体用于执行以下操作:In some possible implementations, the processor 602 is specifically configured to perform the following operations in determining the target community personnel in the community according to the collision between the first identity identifier and the second identity identifier of each community member:
在社区人员A的第一身份标识为类受骗人员,且第二身份标识为潜在易受骗人员的情况下,确定所述社区人员A为所述社区中的一级目标社区人员;In the case that the first identity of the community member A is a quasi-deceived person, and the second identity is a potentially deceptive person, determine that the community member A is a first-level target community member in the community;
在社区人员A的第一身份标识为类受骗人员,且第二身份标识不是潜在易受骗人员的情况下,确定所述社区人员A为所述社区中的二级目标社区人员;In the case that the first identity of the community member A is a quasi-deceived person, and the second identification is not a potentially vulnerable person, determine that the community member A is a secondary target community member in the community;
在社区人员A的第二身份标识不是类受骗人员,且第二身份标识为潜在易受骗人员的情况下,确定所述社区人员A为所述社区中的二级目标社区人员;In the case where the second identity of the community member A is not a deceived person, and the second identity is a potential vulnerable person, determine that the community member A is a secondary target community member in the community;
其中,所述社区人员A为所述社区中的任意一个社区人员,对所述社区中的一级目标社区人员的反诈骗宣传力度大于二级目标社区人员。Wherein, the community member A is any member of the community, and the anti-fraud publicity for the first-level target community members in the community is greater than that of the second-level target community members.
在一些可能的实施方式中,处理器602还用于读取存储器603中的计算机程序执行以下操作:In some possible implementations, the processor 602 is further configured to read the computer program in the memory 603 to perform the following operations:
控制收发器601获取所述社区中的历史受骗人员的数量;Control the transceiver 601 to obtain the number of historically deceived persons in the community;
根据所述社区中的历史受骗人员的数量以及所述社区中第二身份标识为潜在易受骗人员的社区人员的数量,确定所述社区的易受骗指数,其中,所述社区的易受骗指数用于指示所述社区内的社区人员存在易受骗的风险。According to the number of historically deceived persons in the community and the number of community members whose second identities are identified as potential vulnerable persons in the community, the deception index of the community is determined, wherein the deception index of the community is determined by In order to indicate that community members within the community are at risk of being gullible.
具体地,上述收发器601可为图5所述的实施例的身份识别装置500的收发单元501,上述处理器602可以为图5所述的实施例的身份识别装置500的处理单元502。Specifically, the transceiver 601 may be the transceiver unit 501 of the identification device 500 of the embodiment shown in FIG. 5 , and the processor 602 may be the processing unit 502 of the identification device 500 of the embodiment described in FIG. 5 .
应理解,本申请中的电子设备可以包括智能手机(如Android手机、iOS手机、Windows Phone手机等)、平板电脑、掌上电脑、笔记本电脑、移动互联网设备MID(Mobile Internet Devices,简称:MID)或穿戴式设备等。上述电子设备仅是举例,而非穷举,包含但不限于上述电子设备。在实际应用中,上述电子设备还可以包括:智能车载终端、计算机设备等等。It should be understood that the electronic devices in this application may include smart phones (such as Android mobile phones, iOS mobile phones, Windows Phone mobile phones, etc.), tablet computers, handheld computers, notebook computers, MID (Mobile Internet Devices, referred to as: MID) or wearable devices, etc. The above electronic devices are only examples, not exhaustive, including but not limited to the above electronic devices. In practical applications, the above-mentioned electronic devices may also include: intelligent vehicle-mounted terminals, computer devices, and the like.
本申请实施例还提供一种计算机可读存储介质,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行以实现如上述方法实施例中记载的任何一种身份识别方法的部分或全部步骤。Embodiments of the present application further provide a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program is executed by a processor to implement any one of the identification methods described in the foregoing method embodiments some or all of the steps.
本申请实施例还提供一种计算机程序产品,所述计算机程序产品包括存储了计算机程序的非瞬时性计算机可读存储介质,所述计算机程序可操作来使计 算机执行如上述方法实施例中记载的任何一种身份识别方法的部分或全部步骤。Embodiments of the present application further provide a computer program product, the computer program product comprising a non-transitory computer-readable storage medium storing a computer program, the computer program being operable to cause a computer to execute the methods described in the foregoing method embodiments Some or all of the steps of any identification method.
需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本申请并不受所描述的动作顺序的限制,因为依据本申请,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述的实施例均属于可选实施例,所涉及的动作和模块并不一定是本申请所必须的。It should be noted that, for the sake of simple description, the foregoing method embodiments are all expressed as a series of action combinations, but those skilled in the art should know that the present application is not limited by the described action sequence. Because in accordance with the present application, certain steps may be performed in other orders or concurrently. Secondly, those skilled in the art should also know that the embodiments described in the specification are all optional embodiments, and the actions and modules involved are not necessarily required by the present application.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above-mentioned embodiments, the description of each embodiment has its own emphasis. For parts that are not described in detail in a certain embodiment, reference may be made to the relevant descriptions of other embodiments.
在本申请所提供的几个实施例中,应该理解到,所揭露的装置,可通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个系统,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性或其它的形式。In the several embodiments provided in this application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the apparatus embodiments described above are only illustrative, for example, the division of the units is only a logical function division, and there may be other division methods in actual implementation, for example, multiple units or components may be combined or Integration into another system, or some features can be ignored, or not implemented. On the other hand, the shown or discussed mutual coupling or direct coupling or communication connection may be through some interfaces, indirect coupling or communication connection of devices or units, and may be in electrical or other forms.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution in this embodiment.
另外,在本申请各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件程序模块的形式实现。In addition, each functional unit in each embodiment of the present application may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit. The above-mentioned integrated units can be implemented in the form of hardware, and can also be implemented in the form of software program modules.
所述集成的单元如果以软件程序模块的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储器中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储器中,包括若干指令用以使得一台计算机设备(可为个人计算机、服务器或者网 络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储器包括:U盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、移动硬盘、磁碟或者光盘等各种可以存储程序代码的介质。The integrated unit, if implemented in the form of a software program module and sold or used as a stand-alone product, may be stored in a computer readable memory. Based on this understanding, the technical solution of the present application can be embodied in the form of a software product in essence, or the part that contributes to the prior art, or all or part of the technical solution, and the computer software product is stored in a memory, Several instructions are included to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application. The aforementioned memory includes: U disk, read-only memory (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), mobile hard disk, magnetic disk or optical disk and other media that can store program codes.
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储器中,存储器可以包括:闪存盘、只读存储器(英文:Read-Only Memory,简称:ROM)、随机存取器(英文:Random Access Memory,简称:RAM)、磁盘或光盘等。Those skilled in the art can understand that all or part of the steps in the various methods of the above embodiments can be completed by instructing relevant hardware through a program, and the program can be stored in a computer-readable memory, and the memory can include: a flash disk , Read-only memory (English: Read-Only Memory, referred to as: ROM), random access device (English: Random Access Memory, referred to as: RAM), magnetic disk or optical disk, etc.
Claims (10)
- 一种身份识别方法,其特征在于,包括:A method for identification, comprising:获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹;Obtain the identity information, family member information and activity trajectories of each community member in the community within a preset time period;将所述每个社区人员的身份信息以及在预设时间段内的活动轨迹输入到完成训练的受骗人员识别模型,预测所述每个社区人员的第一身份标识,所述每个社区人员的第一身份标识包括所述每个社区人员是否为类受骗人员;The identity information of each community member and the activity track within the preset time period are input into the deceived person identification model that has completed the training, and the first identity of each community member is predicted. The first identity identifier includes whether each of the community members is a deceived person;根据所述每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹进行身份类型识别,确定所述每个社区人员的第二身份标识,所述每个社区人员的第二身份标识包括所述每个社区人员是否为潜在易受骗人员;Identify the identity type according to the identity information of each community member, family member information and the activity track within a preset time period, determine the second identity of each community member, and determine the second identity of each community member. The second identification includes whether each of the community members is a potentially deceptive person;根据所述每个社区人员的第一身份标识与第二身份标识进行碰撞,确定所述社区中的目标社区人员。According to the collision between the first identification and the second identification of each community member, the target community member in the community is determined.
- 根据权利要求1所述的方法,其特征在于,在获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹之前,所述方法还包括:The method according to claim 1, characterized in that, before acquiring the identity information of each community member in the community, family member information and activity track within a preset time period, the method further comprises:为所述社区中每个社区人员建立档案库,其中,所述每个社区人员的档案库包括所述每个社区人员的身份信息、家庭成员信息以及所述每个社区人员每天的活动轨迹;establishing an archive for each community member in the community, wherein the archive of each community member includes the identity information of each community member, family member information and the daily activity track of each community member;所述获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹,包括:The obtaining of the identity information, family member information and activity track within a preset time period of each community member in the community includes:从所述每个社区人员的档案库中获取所述每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹。The identity information, family member information and activity track within a preset time period of each community member are acquired from the archives of each community member.
- 根据权利要求2所述的方法,其特征在于,在获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹之前,所述方法还包括:The method according to claim 2, characterized in that, before acquiring the identity information of each community member in the community, family member information and activity track within a preset time period, the method further comprises:获取历史受骗人员的标识信息,根据所述历史受骗人员的标识信息确定所述历史受骗人员的档案库,从所述历史受骗人员的档案库中获取所述历史受骗人员的身份信息、案件信息以及历史活动轨迹,将所述历史受骗人员的身份信息、案件信息以及历史活动轨迹作为负样本;Obtain the identification information of the historically defrauded person, determine the archive of the historically defrauded person according to the identification information of the historically deceived person, and obtain the historically deceived person's identity information, case information and Historical activity trajectories, taking the identity information, case information and historical activity trajectories of the historically deceived persons as negative samples;获取历史未受骗人员的标识信息,根据所述历史未受骗人员的标识信息确 定所述历史未受骗人员的档案库,从所述历史未受骗人员的档案库中获取所述历史未受骗人员的身份信息以及历史活动轨迹,将所述历史未受骗人员的身份信息以及历史活动轨迹作为正样本;Obtain the identification information of the person who has not been cheated in history, determine the archive of the person who has not been cheated in history according to the identification information of the person who has not been cheated in history, and obtain the identity of the person who has not been cheated in history from the archive library of the person who has not been cheated in history information and historical activity trajectories, taking the identity information and historical activity trajectories of the historically unspoofed persons as positive samples;使用所述负样本和所述正样本进行模型训练,得到所述完成训练的受骗人员识别模型。Model training is performed using the negative samples and the positive samples, and the trained deceived person identification model is obtained.
- 根据权利要求1-3中任一项所述的方法,其特征在于,所述根据所述每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹进行身份类型识别,确定所述每个社区人员的第二身份标识,包括:The method according to any one of claims 1-3, wherein the identity type identification is performed according to the identity information of each community member, the family member information and the activity track within a preset time period, Determine the second identity of each community member, including:根据所述每个社区人员在预设时间段内的出行轨迹,确定所述每个社区人员在所述预设时间段内的出行状况;According to the travel trajectory of each community member within the preset time period, determine the travel status of each community member within the preset time period;将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到身份识别模型,确定所述每个社区人员的第二身份标识。The identity information of each community member, family member information and travel status within the preset time period are input into the identity recognition model to determine the second identity of each community member.
- 根据权利要求4所述的方法,其特征在于,所述潜在易受骗人员包括家庭主妇、失业人员、退休老人以及适婚单身青年,所述每个社区人员的身份信息包括性别和年龄,所述每个社区人员的家庭成员信息包括婚姻状况和子女状况;The method according to claim 4, wherein the potentially deceived persons include housewives, unemployed persons, retirees and marriageable single youths, the identity information of each community person includes gender and age, and the Family member information of each community member including marital status and child status;所述将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到身份识别模型,确定所述每个社区人员的第二身份标识,包括:The inputting the identity information, family member information and travel status of each community member into the identity recognition model to determine the second identity of each community member, including:将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到家庭主妇识别模型,若识别出社区人员A在预设时间内的出行是无规律的,且携带有儿童,且所述社区人员A的性别为女性,确定所述社区人员A的第二身份标识为家庭主妇;Input the identity information of each community member, family member information and travel status within the preset time period into the housewife identification model, if it is identified that the travel of community member A within the preset time period is irregular , and carry children, and the gender of the community member A is female, determine that the second identity of the community member A is a housewife;将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到失业人员识别模型,若识别出社区人员A在第一子预设时间段内的出行是有规律的,且在第二子预设时间段内的出行是无规律的,且所述社区人员A的年龄属于第一年龄段,确定所述社区成员A的第二身份标识为失业人员,其中,所述第一子预设时间段和所述第二子预设时间段为所述预设时间段的两个子时间段,且所述第一子预设时间段位于所述第二子预设时间段之前;Input the identity information of each community member, family member information and travel status within the preset time period into the unemployed person identification model. is regular, and the travel within the second sub-preset time period is irregular, and the age of the community member A belongs to the first age group, and the second identity of the community member A is determined to be an unemployed person , wherein the first sub-preset time period and the second sub-preset time period are two sub-time periods of the preset time period, and the first sub-preset time period is located in the second sub-preset time period before the sub-preset time period;将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到退休老人识别模型,若识别出社区人员A在预设时间段内的出行中无配偶和子女的陪伴,且所述社区人员A的年龄属于第二年龄段,确定所述社区人员A的第二身份标识为退休老人;Input the identity information, family member information and travel status of each community member into the retirement identification model within the preset time period, if it is identified that the community member A has no spouse during the trip within the preset time period Accompanied by children, and the age of the community member A belongs to the second age group, it is determined that the second identity of the community member A is a retired old man;将所述每个社区人员的身份信息、家庭成员信息以及在所述预设时间段内的出行状况输入到适婚单身青年识别模型,若识别出社区人员A在预设时间段内的出行中无异性陪伴,且所述社区人员A的婚姻状况为未婚,且所述社区人员A的年龄属于第三年龄段,确定所述社区人员A的第二身份标识为适婚单身青年;Input the identity information of each community member, family member information and travel status within the preset time period into the marriageable single youth identification model, if it is identified that the community member A is traveling within the preset time period No heterosexual companionship, and the marital status of the community member A is unmarried, and the age of the community member A belongs to the third age group, determine that the second identity of the community member A is a marriageable single youth;其中,所述社区人员A为所述社区中的任意一个社区人员。Wherein, the community member A is any member of the community.
- 根据权利要求1-5中任一项所述的方法,其特征在于,所述根据所述每个社区人员的第一身份标识与第二身份标识进行碰撞,确定所述社区中的目标社区人员,包括:The method according to any one of claims 1-5, wherein the target community member in the community is determined according to the collision between the first identity identifier and the second identity identifier of each community member ,include:在社区人员A的第一身份标识为类受骗人员,且第二身份标识为潜在易受骗人员的情况下,确定所述社区人员A为所述社区中的一级目标社区人员;In the case that the first identity of the community member A is a quasi-deceived person, and the second identity is a potentially deceptive person, determine that the community member A is a first-level target community member in the community;在社区人员A的第一身份标识为类受骗人员,且第二身份标识不是潜在易受骗人员的情况下,确定所述社区人员A为所述社区中的二级目标社区人员;In the case that the first identity of the community member A is a quasi-deceived person, and the second identification is not a potentially vulnerable person, determine that the community member A is a secondary target community member in the community;在社区人员A的第二身份标识不是类受骗人员,且第二身份标识为潜在易受骗人员的情况下,确定所述社区人员A为所述社区中的二级目标社区人员;In the case where the second identity of the community member A is not a deceived person, and the second identity is a potential vulnerable person, determine that the community member A is a secondary target community member in the community;其中,所述社区人员A为所述社区中的任意一个社区人员,对所述社区中的一级目标社区人员的反诈骗宣传力度大于二级目标社区人员。Wherein, the community member A is any member of the community, and the anti-fraud publicity for the first-level target community members in the community is greater than that of the second-level target community members.
- 根据权利要求1-6中任一项所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1-6, wherein the method further comprises:获取所述社区中的历史受骗人员的数量;Obtain the number of historically deceived persons in said community;根据所述社区中的历史受骗人员的数量以及所述社区中第二身份标识为潜在易受骗人员的社区人员的数量,确定所述社区的易受骗指数,其中,所述社区的易受骗指数用于指示所述社区内的社区人员存在易受骗的风险。According to the number of historically deceived persons in the community and the number of community members whose second identities are identified as potential vulnerable persons in the community, the deception index of the community is determined, wherein the deception index of the community is determined by In order to indicate that community members within the community are at risk of being gullible.
- 一种身份识别装置,其特征在于,包括:An identification device, characterized in that it includes:收发单元,用于获取社区中每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹;The transceiver unit is used to obtain the identity information of each community member in the community, family member information and activity track within a preset time period;处理单元,用于将所述每个社区人员的身份信息以及在预设时间段内的活 动轨迹输入到完成训练的受骗人员识别模型,预测所述每个社区人员的第一身份标识,所述每个社区人员的第一身份标识包括所述每个社区人员是否为类受骗人员;根据所述每个社区人员的身份信息、家庭成员信息以及在预设时间段内的活动轨迹进行身份类型识别,确定所述每个社区人员的第二身份标识,所述每个社区人员的第二身份标识包括所述每个社区人员是否为潜在易受骗人员;根据所述每个社区人员的第一身份标识以及第二身份标识,确定所述社区中的目标社区人员。The processing unit is used to input the identity information of each community member and the activity track within a preset time period into the deceived person identification model that has completed the training, and predict the first identity of each community member, the The first identification of each community member includes whether the community member is a deceived person; the identity type is identified according to the identity information of each community member, family member information and activity track within a preset time period , determine the second identity of each community member, and the second identity of each community member includes whether each community member is a potentially vulnerable person; according to the first identity of each community member The identifier and the second identity identifier are used to determine the target community members in the community.
- 一种电子设备,其特征在于,包括:处理器和存储器,所述处理器与所述存储器相连,所述存储器用于存储计算机程序,所述处理器用于执行所述存储器中存储的计算机程序,以使得所述电子设备执行如权利要求1-7中任一项所述的方法。An electronic device, comprising: a processor and a memory, the processor is connected to the memory, the memory is used to store a computer program, and the processor is used to execute the computer program stored in the memory, to cause the electronic device to perform the method of any one of claims 1-7.
- 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有计算机程序,所述计算机程序被处理器执行以实现如权利要求1-7任一项所述的方法。A computer-readable storage medium, characterized in that, the computer-readable storage medium stores a computer program, and the computer program is executed by a processor to implement the method according to any one of claims 1-7.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011645088.4 | 2020-12-31 | ||
CN202011645088.4A CN112669187B (en) | 2020-12-31 | 2020-12-31 | Identity recognition method, device, electronic equipment and related products |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2022142903A1 true WO2022142903A1 (en) | 2022-07-07 |
Family
ID=75412472
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2021/133117 WO2022142903A1 (en) | 2020-12-31 | 2021-11-25 | Identity recognition method and apparatus, electronic device, and related product |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN112669187B (en) |
WO (1) | WO2022142903A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115689298A (en) * | 2022-12-30 | 2023-02-03 | 北京码牛科技股份有限公司 | Telecommunication fraud risk prediction method, system, equipment and readable storage medium |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112669187B (en) * | 2020-12-31 | 2024-04-02 | 深圳云天励飞技术股份有限公司 | Identity recognition method, device, electronic equipment and related products |
CN116088322A (en) * | 2021-11-08 | 2023-05-09 | 广东美的制冷设备有限公司 | Control method and control device for household electrical appliance, electronic equipment and storage medium |
CN114757318A (en) * | 2022-03-30 | 2022-07-15 | 卫健智能(深圳)有限公司 | A method for identifying identity information of community members |
CN116418916A (en) * | 2023-04-27 | 2023-07-11 | 深圳市安络科技有限公司 | Anti-fraud early warning method, system, computer equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017104861A1 (en) * | 2015-12-16 | 2017-06-22 | 모다정보통신 주식회사 | Method for preventing voice phishing based on internet of things and apparatus therefor |
CN110222992A (en) * | 2019-06-11 | 2019-09-10 | 深圳市安络科技有限公司 | A kind of network swindle method for early warning and device based on group's portrait of being deceived |
CN110232524A (en) * | 2019-06-14 | 2019-09-13 | 哈尔滨哈银消费金融有限责任公司 | Social networks cheats the construction method of model, antifraud method and apparatus |
CN110830664A (en) * | 2018-08-14 | 2020-02-21 | 中国移动通信集团设计院有限公司 | Method and device for identifying telecommunication fraud potential victim user |
CN111915468A (en) * | 2020-08-14 | 2020-11-10 | 中国科学院自动化研究所 | Novel anti-fraud active inspection and early warning system for network |
CN112669187A (en) * | 2020-12-31 | 2021-04-16 | 深圳云天励飞技术股份有限公司 | Identity recognition method and device, electronic equipment and related products |
-
2020
- 2020-12-31 CN CN202011645088.4A patent/CN112669187B/en active Active
-
2021
- 2021-11-25 WO PCT/CN2021/133117 patent/WO2022142903A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2017104861A1 (en) * | 2015-12-16 | 2017-06-22 | 모다정보통신 주식회사 | Method for preventing voice phishing based on internet of things and apparatus therefor |
CN110830664A (en) * | 2018-08-14 | 2020-02-21 | 中国移动通信集团设计院有限公司 | Method and device for identifying telecommunication fraud potential victim user |
CN110222992A (en) * | 2019-06-11 | 2019-09-10 | 深圳市安络科技有限公司 | A kind of network swindle method for early warning and device based on group's portrait of being deceived |
CN110232524A (en) * | 2019-06-14 | 2019-09-13 | 哈尔滨哈银消费金融有限责任公司 | Social networks cheats the construction method of model, antifraud method and apparatus |
CN111915468A (en) * | 2020-08-14 | 2020-11-10 | 中国科学院自动化研究所 | Novel anti-fraud active inspection and early warning system for network |
CN112669187A (en) * | 2020-12-31 | 2021-04-16 | 深圳云天励飞技术股份有限公司 | Identity recognition method and device, electronic equipment and related products |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115689298A (en) * | 2022-12-30 | 2023-02-03 | 北京码牛科技股份有限公司 | Telecommunication fraud risk prediction method, system, equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112669187B (en) | 2024-04-02 |
CN112669187A (en) | 2021-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2022142903A1 (en) | Identity recognition method and apparatus, electronic device, and related product | |
US12153693B2 (en) | Sensitive data classification | |
CN110009174B (en) | Risk recognition model training method and device and server | |
US11259718B1 (en) | Systems and methods for automated body mass index calculation to determine value | |
JP2022141931A (en) | Method and device for training living body detection model, method and apparatus for living body detection, electronic apparatus, storage medium, and computer program | |
US11837061B2 (en) | Techniques to provide and process video data of automatic teller machine video streams to perform suspicious activity detection | |
WO2022105118A1 (en) | Image-based health status identification method and apparatus, device and storage medium | |
US20170018030A1 (en) | System and Method for Determining Credit Worthiness of a User | |
CN109345417B (en) | Online assessment method and terminal equipment for business personnel based on identity authentication | |
US10997609B1 (en) | Biometric based user identity verification | |
US20190034831A1 (en) | Systems and Methods for Online Annotation of Source Data using Skill Estimation | |
CN108428001B (en) | Credit score prediction method and device | |
WO2021003803A1 (en) | Data processing method and apparatus, storage medium and electronic device | |
CN113642519A (en) | Face recognition system and face recognition method | |
KhudaBukhsh et al. | Detecting non-adversarial collusion in crowdsourcing | |
US20230410221A1 (en) | Information processing apparatus, control method, and program | |
CN111754241A (en) | A user behavior perception method, device, device and medium | |
CN113139812B (en) | User transaction risk identification method, device and server | |
CN109377347B (en) | Network credit early warning method, system and electronic equipment based on feature selection | |
Kumar et al. | Automatic detection of fake profiles in online social networks | |
US20200012772A1 (en) | Systems and methods for matching identity and readily accessible personal identifier information based on transaction timestamp | |
WO2019223082A1 (en) | Customer category analysis method and apparatus, and computer device and storage medium | |
CN115730125A (en) | Object identification method and device, computer equipment and storage medium | |
CN112446708A (en) | Risk identification method and device | |
CN114842535B (en) | Branch service supervision method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 21913645 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 21913645 Country of ref document: EP Kind code of ref document: A1 |