False enterprise identification method and device, and medium

An identification method and enterprise technology, applied in the computer field, can solve the problems of authenticity and reliability, supply companies cannot obtain cooperation opportunities, and cannot satisfy purchasing companies, etc., and achieve the effect of guaranteeing experience.

Pending Publication Date: 2022-07-01
山东浪潮爱购云链信息科技有限公司
0 Cites 0 Cited by

AI-Extracted Technical Summary

Problems solved by technology

When an enterprise purchases items through the Internet, it is impossible to determine whether the supplier providing the item is authentic and reliable. Therefore, some purchasing enterprises will choose a single supplier that they are familiar with for cooperation, resulting in the fact that authentic a...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Method used

[0052] After obtaining the false information to be identified by the first node, the server can obtain the transaction record of the enterprise that the first node has produced in the block chain platform, and the first node corresponds to the enterprise to be authenticated. Enterprises may have falsified enterprise transaction records. This application uses blockchain to decentralize and cannot be tampered with, and records enterprise transaction records to prevent business-to-business transaction...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Abstract

The invention provides a false enterprise identification method and device, and a medium. The method comprises the following steps: receiving enterprise report information uploaded by a to-be-authenticated enterprise; wherein the enterprise report information at least comprises enterprise registration information and enterprise transaction records. And identifying the enterprise reported information, and determining a plurality of pieces of false information to be identified in the enterprise reported information. Obtaining comparison information corresponding to each piece of false information to be identified, and calculating a matching value between each piece of false information to be identified and the corresponding comparison information; and under the condition that the matching value does not reach the first preset threshold value, determining that the to-be-identified false information is false information. And according to each piece of false information, determining that the to-be-authenticated enterprise is a false enterprise so as to generate corresponding false enterprise prompt information and publish the false enterprise prompt information to a pre-established network platform. Through the method, an enterprise can be helped to identify a false enterprise in a network platform, and enterprise safety is guaranteed.

Application Domain

Technology Topic

Image

  • False enterprise identification method and device, and medium
  • False enterprise identification method and device, and medium
  • False enterprise identification method and device, and medium

Examples

  • Experimental program(1)

Example Embodiment

[0027] In order to make the objectives, technical solutions and advantages of the present application clearer, the technical solutions of the present application will be clearly and completely described below with reference to the specific embodiments of the present application and the corresponding drawings. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.
[0028] When an enterprise conducts business through an online platform, it cannot identify a fake enterprise by itself. Once a transaction with a fake enterprise occurs, it will bring huge losses to the enterprise. Therefore, it is the responsibility of the online platform to identify fake companies before the transaction occurs and avoid losses to other companies.
[0029] Based on this, the present application provides a false enterprise identification method, device and medium, which are used to determine a real and reliable enterprise in a network platform.
[0030] The various embodiments of the present application will be described in detail below with reference to the accompanying drawings.
[0031] The embodiment of the present application provides a false enterprise identification method, such as figure 1 As shown, the method may include steps S101-S105:
[0032] S101. The server receives the enterprise report information uploaded by the enterprise to be authenticated.
[0033] The information reported by the enterprise includes at least enterprise registration information and enterprise transaction records.
[0034] In the embodiment of the present application, an enterprise that has not performed the procedure of authenticating a false enterprise on the network platform is regarded as an enterprise to be authenticated. When the certified enterprise conducts bidding and bidding through the network platform, it can upload the information reported by the enterprise, complete the certification, and improve the credibility of the enterprise. The information reported by the enterprise may include enterprise registration information and enterprise transaction records. The enterprise transaction records may be offline records or online records.
[0035] It should be noted that the server as the execution subject of the false enterprise identification method is exemplified, and is not limited to the server, which is not specifically limited in this application.
[0036] S102: The server identifies the information reported by the enterprise, and determines some false information to be identified in the information reported by the enterprise.
[0037] In this embodiment of the present application, the server may obtain the false information to be identified by the following methods, such as figure 2 shown, including the following steps:
[0038] S201. The server determines enterprise information corresponding to the information reported by the enterprise according to the information reported by the enterprise.
[0039]The server can determine the enterprise information corresponding to the enterprise registration information according to the enterprise registration information in the information reported by the enterprise. If the information reported by the enterprise includes the business name of the enterprise, the server may obtain the pre-stored business name of the corresponding enterprise.
[0040] S202, the server compares the enterprise information with the information reported by the enterprise.
[0041] In an embodiment of the present application, the server may identify the enterprise registration information in the information reported by the enterprise according to preset rules, so as to obtain several sets of text information.
[0042] The server extracts keywords in each set of text information.
[0043] The server compares each keyword with the text information in the enterprise information.
[0044] Specifically, the server can input all the texts in the information reported by the enterprise into the neural network model according to the preset neural network model, and the neural network model can be preset with certain types of texts that are recognized, such as "address", "business number", "enterprise name" ”, etc., the neural network model recognizes this type of text in the information reported by the enterprise.
[0045] When the neural network model recognizes this type of text, the length of the text information after this type of text can be determined. For example, after the "enterprise name", it is "the first fake company", and after the "first fake company", the neural network Based on the "address" text recognized by the model, it is determined that the length of the "enterprise name" text information is 6, and the first group of text information is the "first false enterprise" corresponding to the "enterprise name".
[0046] The server extracts the keywords in the text information, "first", "false" and "enterprise", and compares the keywords with the text information in the enterprise information. There may be "the first false company" in the enterprise information. If the "enterprise" is different from the "company", the comparison between the two is unsuccessful, and the information reported by the enterprise cannot completely match the information of the enterprise, so the enterprise needs to modify the information reported by the enterprise.
[0047] S203 , the server determines a number of false information to be identified in the information reported by the enterprise when the comparison between the enterprise information and the information reported by the enterprise is successful.
[0048] The server compares the enterprise information with the information reported by the enterprise one by one. If the comparison is successful, it compares the enterprise registration information and enterprise transaction records in the information reported by the enterprise, such as enterprise name, industrial and commercial number, enterprise type, and between the enterprise and other enterprises. The transaction records on the online platform are regarded as false information to be determined.
[0049] S103: The server acquires the comparison information corresponding to each piece of false information to be determined, and calculates a matching value between each piece of false information to be recognized and the corresponding comparison information.
[0050] In order to ensure the rationality and accuracy of false enterprise identification, in this embodiment of the present application, the pre-built network platform may be a blockchain platform to calculate the matching value between each false information to be identified and the corresponding comparison information, such as image 3 shown, including the following steps:
[0051] S301. The server determines the enterprise transaction record generated by the first node on the blockchain platform according to the false information to be identified.
[0052] After obtaining the false information to be authenticated of the first node, the server may obtain the enterprise transaction records generated by the first node in the blockchain platform, and the first node corresponds to the enterprise to be authenticated. Enterprises may falsify enterprise transaction records. This application uses blockchain to decentralize and cannot be tampered with to record enterprise transaction records and prevent enterprise-to-enterprise transaction records from falsifying.
[0053] S302. The server determines that the second node corresponding to the third-party organization uploads the enterprise registration information corresponding to the first node.
[0054] In the embodiment of the present application, the second node corresponding to the third-party organization may upload the enterprise registration information corresponding to the first node to the blockchain of the present application.
[0055] In an embodiment of the present application, the enterprise registration information may also be that the server obtains the enterprise registration information corresponding to the first node from a third-party organization, and uploads it to the blockchain. The business registration information in the third party organization can be from the official registration department.
[0056] S303: The server uploads the enterprise transaction record generated by the first node on the blockchain platform and the second node corresponding to the third-party organization to upload the enterprise registration information corresponding to the first node as comparison information.
[0057] The server uses the enterprise transaction records generated by the blockchain platform and the enterprise registration information uploaded by the second node as the comparison information of the false information to be identified by the first node. If the false information to be determined includes at least the first transaction record, the second transaction record, the enterprise name, the enterprise type, etc., the server will match the first transaction record, the second transaction record, the enterprise name, and the enterprise type in the blockchain. information as comparison information.
[0058] S304, the server compares each false information to be identified with the comparison information one by one, and generates a comparison result.
[0059] The server can compare the to-be-identified false information with the comparison information one by one, such as the first transaction record corresponding to the to-be-identified false information, and the specific information of the first transaction record in the comparison information, such as A and B in the X month X date The alignment is performed and the alignment result is generated. The server compares the second transaction record in the false information to be determined, and so on, until all the information in the false information to be determined is compared.
[0060] S305. The server calculates, according to the comparison result, a matching value between each false information to be identified and the corresponding comparison information.
[0061] After completing the one-to-one comparison between the information to be identified and the comparison information, the server determines the comparison result, and calculates a matching value according to the comparison result of each information to be identified and the comparison information.
[0062] In another embodiment of the present application, according to the enterprise transaction records in the false information to be identified, the server may also determine whether the transaction record B is generated to the enterprise that has transactions with the enterprise to be authenticated. When it is determined that the transaction record B is generated, it is determined that the comparison result of the transaction record B is accurate. Specifically, if the enterprise transaction record of enterprise a to be authenticated includes a transaction record x with enterprise b, and enterprise b is an authenticated enterprise, determine whether the transaction record x is generated from the corresponding node of enterprise b. If there is a transaction record x in the corresponding node of enterprise b, then the transaction record x is a real transaction, and the transaction record x in the false information to be identified is generated. For an accurate comparison result, the matching value is 1.
[0063] S104: The server determines that the false information to be identified is false information when the matching value does not reach the first preset threshold.
[0064] In the embodiment of the present application, the to-be-identified false information of the enterprise to be authenticated may not be generated on the network platform, but may exist in offline transactions. The server determines the matching value of the to-be-identified false information of the enterprise to be authenticated, and compares it with the first preset threshold.
[0065] S105. The server determines the enterprise to be authenticated as a fake enterprise according to the fake information, so as to generate corresponding fake enterprise prompt information and publish it on the pre-built network platform.
[0066] According to various false information, the server may have offline transactions in the enterprise transaction records in the false information, and the network platform cannot know whether the enterprise transaction records are false, so the enterprise transaction records in the false information cannot be obtained through the network platform. Filter out information.
[0067] The server determines whether the matching values ​​of other false information after screening are all 1, and if other false information is not all 1, it authenticates the enterprise to be authenticated as a false enterprise, and in order to remind other enterprises of the false enterprise, the server can Generate fake enterprise prompt information, such as "Friendly reminder: the nth enterprise is a fake enterprise", etc., and publish it on the network platform. In addition, the server can remind the fake enterprise of the corresponding bidding and bidding enterprise, and the transaction enterprise is a fake enterprise.
[0068] Through the above solution, this application can ensure that false companies can be identified on the network platform, and when the company conducts purchases through the network platform, it can be determined whether the company is a false company based on the information reported by the company. Determine the reasonableness and legality of the procurement behavior, and avoid other companies deceived by false companies during the transaction process. By identifying fake companies, online platforms can also create green and healthy online platforms.
[0069] When an enterprise checks other enterprises and selects other enterprises to purchase through the network platform, before sending the purchase transaction behavior, the enterprise needs to ensure that the transaction enterprise is a real enterprise, so as to enhance the trust degree between enterprises. Accordingly, this application provides the following examples, such as Figure 4 As shown, it specifically includes steps S401-S405:
[0070] S401. The server acquires the authentication information sent by the first terminal.
[0071] The first terminal corresponds to a terminal that has been registered on a pre-built network platform; the authentication information includes an enterprise identifier.
[0072] In this embodiment of the present application, the first terminal corresponds to a terminal that has been registered on a pre-built network platform, and the first terminal can determine whether the other company is a fake company before selecting a seller company or a buyer company to conduct transactions . The first terminal may send the enterprise identification of the seller or buyer enterprise to be authenticated to the server.
[0073] In another embodiment of the present application, after obtaining the authentication information sent by the first terminal, the server can first determine whether the enterprise corresponding to the first terminal is a fake enterprise or an enterprise to be authenticated, which can ensure the security and integrity of the network platform.
[0074] S402. The server determines, according to the authentication information, the historical authentication records of the enterprise of interest corresponding to the first terminal, so as to determine whether the enterprise of interest is an enterprise to be authenticated.
[0075] According to the enterprise identifier in the authentication information, the server determines that the enterprise corresponding to the enterprise identifier is the interested enterprise of the first terminal. The server can determine whether the enterprise of interest has a historical authentication record, and if there is a historical authentication record, determine the historical authentication record result, such as the enterprise of interest is a fake enterprise, the enterprise of interest is a non-fake enterprise, if there is no historical authentication record, then The interested enterprise is the enterprise to be certified.
[0076] When the enterprise of interest has a historical authentication record, the server may send the historical authentication record result of the historical authentication record to the first terminal.
[0077] S403 , when the interested enterprise is an enterprise to be authenticated, the server generates prompt information to be authenticated, and sends it to a terminal corresponding to the interested enterprise to prompt the interested enterprise to upload the enterprise reporting information.
[0078] When the enterprise of interest is an enterprise to be authenticated, the server may generate prompt information to be authenticated, and the prompt information to be authenticated is used to prompt the enterprise of interest to perform authentication. The server prompts the interested enterprise to upload the information reported by the enterprise, so that the server performs the authentication work of steps S101-S105.
[0079] S404, the server obtains feedback information of the interested enterprise.
[0080] After receiving the prompt information to be authenticated, the corresponding terminal of the interested enterprise can choose to agree to the authentication or reject the authentication, and send the approval or rejection of the authentication as feedback information to the server.
[0081] S405. When the feedback information is that the authentication is rejected, the server generates an authentication rejection record, and records it in a corresponding database.
[0082] In the embodiment of the present application, if the interested enterprise agrees to the authentication, the information reported by the enterprise may be uploaded, and the authentication work of steps S101-S105 may be performed. If the interested enterprise refuses the authentication, the server may record the refusal of authentication and add it to the refusal of authentication record of the interested enterprise, and the refusal of authentication record is stored in the database of the server.
[0083] In an embodiment of the present application, in order to ensure the accuracy of the enterprise information, the network platform may set a corresponding number of times for the number of times the enterprise refuses to accept the authentication, and when the number of times exceeds the corresponding number, the authentication cannot be refused. Thereby, the server can obtain the number of times of refusing authentication records of the interested company in the database, and when the number of times of refusing authentication records exceeds the third preset threshold, such as 3 times, the server can send an interface for uploading the information of the company to the corresponding terminal of the interested company, and Determine whether the terminal corresponding to the interested enterprise has performed a corresponding operation on uploading the information reported by the enterprise. In the case that the interested enterprise performs corresponding operations on uploading the information reported by the enterprise, the account of the interested enterprise is controlled to be cancelled from the network platform within a preset time period.
[0084] In the actual enterprise network platform, when an enterprise uses the network platform, it first needs to register an account on the network platform. Some criminals may use the information such as the name of some large enterprises to register the network platform in advance. In order to prevent such behavior, this application can Constrained by the following examples, such as Figure 5 shown, including the following steps:
[0085] S501. The server acquires the platform registration information sent by the second terminal.
[0086] Wherein, the platform registration information includes at least an enterprise name, an enterprise address, and an enterprise type; the second terminal corresponds to a terminal not registered on the network platform.
[0087] When registering on the network platform, the second terminal may send the enterprise name, enterprise address, and enterprise type of the registered enterprise to the server.
[0088] S502, the server initiates authentication to a third-party organization according to the platform registration information.
[0089] According to the platform registration information, such as the company name in the platform registration information, the server obtains the information of the corresponding company in the third-party organization, or forwards the platform registration information sent by the second terminal to the third-party organization to authenticate the enterprise corresponding to the second terminal. . The third-party agency can be an agency that detects corporate information or an official corporate registration agency.
[0090] S503. The server generates registered account information corresponding to the second terminal when the authentication of the platform registration information is successful, and sends it to the second terminal, so that the second terminal uses the network platform according to the registered account information.
[0091] Through the above scheme, the preliminary information authentication of the enterprise can be carried out before the enterprise registers the online platform, which can resist bad behaviors such as some enterprises, squatting the account number corresponding to the name of other companies, avoid disputes on the online platform, and avoid the generation of false enterprises. At the same time, it can also improve the enterprise's experience of using the network platform that can identify fake enterprises.
[0092] When a server company communicates through a network platform, it may convey negative information, fraudulent information, etc. It is possible for such a company to be a fake company. Therefore, it is necessary to monitor such communication information, and at the same time, it can prevent the interests of one party from being affected by the company. damage.
[0093] Specifically, first, the server obtains the communication data between enterprises on the network platform. It should be noted that the communication data may be text information or voice information. Then, the server extracts keywords in the communication data. For example, the server generates text from text information or voice information, and determines that each word in the text includes "purchase" and "quantity".
[0094] The server determines whether there is negative information in the keyword based on the pre-trained neural network model. The server can input keywords into the pre-trained neural network model, and the pre-trained neural network model can be trained using words that are easy to appear in the online and offline procurement process as sample data.
[0095] Finally, when there is negative information in the keyword, the server sends prompt information to the corresponding terminal of the enterprise that sent the negative information, so as to remind the enterprise that sent the negative information.
[0096] The server generates announcement information when it is determined that the number of times that the enterprise that sent the negative information has sent the negative information is greater than the second preset threshold. Among them, the announcement information is the information published on the network platform. After reminding the enterprise that sent the negative information, if it still sends the negative information, the server can announce the behavior of the enterprise sending the negative information on the network platform.
[0097] In the embodiment of the present application, when an enterprise browses through a network platform, and chooses to purchase and sell products related to its own enterprise, the network platform can filter and push the enterprise for the enterprise:
[0098] First, the server obtains the enterprise type corresponding to the terminal currently using the network platform.
[0099] Then, the server filters the corresponding fake enterprises on the network platform according to the enterprise type, and pushes the enterprise corresponding to the enterprise type to the terminal currently using the network platform. Filtering out fake companies and pushing companies that correspond to the type of companies you browse can improve the efficiency of companies purchasing or selling on online platforms and improve their experience.
[0100] Through the above solution in the present application, a real and reliable enterprise can be determined on the network platform, the trust degree of the enterprise trading on the network platform can be improved, and a good user experience degree of the network platform can be ensured.
[0101] Image 6 A false enterprise identification device provided in the embodiment of the present application, the device includes:
[0102] at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being executed by the at least one processor, to enable the at least one processor to function:
[0103] Receive the enterprise report information uploaded by the enterprise to be certified. The information reported by the enterprise includes at least enterprise registration information and enterprise transaction records. Identify the information reported by the enterprise, and determine some false information to be identified in the information reported by the enterprise. The comparison information corresponding to each false information to be recognized is obtained, and the matching value between each false information to be recognized and the corresponding comparison information is calculated. In the case that the matching value does not reach the first preset threshold, it is determined that the false information to be identified is false information. According to each false information, the company to be certified is determined to be a false company, so as to generate corresponding false company reminder information and publish it on the pre-built network platform.
[0104] The embodiment of the present application also provides a non-volatile computer storage medium for false enterprise identification, which stores computer-executable instructions, and the computer-executable instructions are set to:
[0105] Receive the enterprise report information uploaded by the enterprise to be certified. The information reported by the enterprise includes at least enterprise registration information and enterprise transaction records. Identify the information reported by the enterprise, and determine some false information to be identified in the information reported by the enterprise. The comparison information corresponding to each false information to be recognized is obtained, and the matching value between each false information to be recognized and the corresponding comparison information is calculated. In the case that the matching value does not reach the first preset threshold, it is determined that the false information to be identified is false information. According to each false information, the company to be certified is determined to be a false company, so as to generate corresponding false company reminder information and publish it on the pre-built network platform.
[0106] Each embodiment in this application is described in a progressive manner, and the same and similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, as for the apparatus and medium embodiments, since they are basically similar to the method embodiments, the description is relatively simple, and reference may be made to some descriptions of the method embodiments for related parts.
[0107] The devices, media, and methods provided in the embodiments of the present application are in a one-to-one correspondence. Therefore, the devices and media also have beneficial technical effects similar to their corresponding methods. Since the beneficial technical effects of the methods have been described in detail above, therefore, The beneficial technical effects of the device and the medium are not repeated here.
[0108] It should also be noted that the terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion such that a process, method, article or device comprising a series of elements includes not only those elements, but also Other elements not expressly listed, or which are inherent to such a process, method, article of manufacture, or apparatus are also included. Without further limitation, an element qualified by the phrase "comprising a..." does not preclude the presence of additional identical elements in the process, method, article of manufacture, or device that includes the element.
[0109] The above descriptions are merely examples of the present application, and are not intended to limit the present application. Various modifications and variations of this application are possible for those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application shall be included within the scope of the claims of the present application.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Similar technology patents

Bill collection system

PendingCN110288282AGuaranteed experienceReduce the number of frequent identificationLogisticsCollection systemAuthorization
Owner:江苏伊斯特威尔供应链管理有限公司

Classification and recommendation of technical efficacy words

Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products