Abnormal object identification method and terminal equipment

An identification method and abnormal identification technology, which is applied in the field of data processing, can solve the problems of long authentication time, high authentication operation difficulty, and low authentication efficiency, and achieve the effects of improving accuracy, reducing identification difficulty, and improving identification efficiency

Pending Publication Date: 2020-09-18
平安付科技服务有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present application provides an abnormal object identification method and terminal equipment to solve the object identification technology, which relies on manpower to complete, and requires offline verification and certification of materials, so the difficulty of the certification operation is high and the certification The problem of long time and low authentication efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal object identification method and terminal equipment
  • Abnormal object identification method and terminal equipment
  • Abnormal object identification method and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0031] In the embodiment of the present application, by obtaining the object data of the target object that needs to be authenticated, the object data is specifically a plurality of object images uploaded by the target object; respectively comparing each object image with the historical image in the database to determine whether the above object image is It belongs to the images collected from the network to pretend to be legitimate objects; therefore, when the object image is detected to match the historical images in the database, the target object is identified as a risk...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the technical field of data processing, and provides an abnormal object identification method and terminal equipment, and the method comprises the steps: receiving the object data of a to-be-recognized target object; respectively extracting an image feature value of each object image, and matching the image feature value with a historical feature value of each historical image in a database to obtain a matching result between the image feature value of the object image and the database; if the matching result is that the matching is successful, respectively importing each object image of the target object into a preset image analysis model to obtain object attribute information of each object image; and outputting an exception identification result of the target object based on all the object attribute information. According to the invention, online authentication is realized, the identification efficiency is improved, the identification difficulty is reduced, and the labor cost of the identification process is further reduced.

Description

technical field [0001] The invention belongs to the technical field of data processing, and in particular relates to an abnormal object identification method and terminal equipment. Background technique [0002] With the continuous advancement of the electronic process, most identity authentication operations can be completed online, which greatly simplifies the difficulty and approval process of shops. With the development of the economy, the number of self-employed and small and medium-sized enterprises is increasing at a geometric rate, so how to verify the validity of the data uploaded by merchants, enterprises and other objects is particularly important. [0003] With the existing object recognition technology, after the user uploads the data, it needs to be manually approved by the administrator, and the accuracy of the data needs to be checked on the spot. However, as the number of enterprises that initiate certification requests continues to increase, manual approval...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/583G06F16/535G06F16/55
CPCG06F16/535G06F16/55G06F16/583
Inventor 徐巍越何亮飞胡怡文
Owner 平安付科技服务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products