Supercharge Your Innovation With Domain-Expert AI Agents!

Data processing method and apparatus

A data processing and data technology, applied in the field of communication, can solve the problems of not being able to find malicious ordering behaviors of CRBT, heavy workload, uncertain time, etc., and achieve the effect of reducing malicious ordering behaviors of CRBTs, improving efficiency, and ensuring real-time performance

Active Publication Date: 2014-06-11
XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. Low monitoring efficiency
They all use manual analysis, which is inefficient, and the CRBT platform has nearly 10 kinds of ordering interfaces. For each ordering interface, manual monitoring of malicious ordering is adopted. The workload is heavy and the operation is not feasible.
[0007] 2. The time span is relatively large, and the behavior of maliciously ordering ring tones cannot be detected in time
Under the passive monitoring scheme, the time is even more uncertain, because it is monitored through customer complaints. If there are no user complaints, it is possible that the malicious ordering behavior of CRBT may not be discovered at all.
[0008] 3. The analysis angle is to analyze from the results to determine which numbers and channels have been maliciously ordered and which ring tones have been maliciously ordered, which has resulted in a large part of malicious orders being successfully executed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and apparatus
  • Data processing method and apparatus
  • Data processing method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] Embodiment 1 of the present invention provides a data processing method, the steps of the method can be as follows figure 1 shown, including:

[0027] Step 101, collect order data flow.

[0028] In this step, the ordering data flow of ordering CRBT in the CRBT platform can be collected. Ordering data flow can include but is not limited to SMS ordering, website ordering, Interactive Voice Response (IVR, Interactive Voice Response) voice interaction platform ordering, unstructured supplementary data service (USSD, UnstructuredSupplementary Service Data) ordering, wireless application protocol (WAP, The subscription data flow generated by MMS subscription methods such as Wireless Application Protocol) may also include the data flow generated by links such as CRBT copying and CRBT gifting that generate the subscription data flow.

[0029] In this embodiment, it can be understood that the CRBT includes ringtone objects such as service provider (SP) ringtone, group ringtone...

Embodiment 2

[0060] Embodiment 2 of the present invention provides a data processing device, the structure of which can be as follows figure 2 shown, including:

[0061] Acquisition module 11 is used for collecting the ordering data flow of ordering CRBT in the CRBT platform; Analysis module 12 is used for determining whether the ordering data flow collected includes malicious ordering data according to preset malicious ordering rules; Alarm output module 13 is used for targeting The malicious order data determined by the analysis module generates an alarm message.

[0062] The device also includes a report generation module 14:

[0063] The report generation module 14 is used for determining associated information in the malicious order data determined by the analyzing module; and determining specified information corresponding to the malicious order data according to the associated information.

[0064] The report generation module 14 is further configured to use the determined malici...

Embodiment 3

[0071] In combination with Embodiment 2, this Embodiment 3 provides the implementation principle of the data processing method described in Embodiment 1. The implementation principle can be as follows image 3 shown.

[0072] When users order CRBT through websites, voice messages or WAP, etc., the order data can be forwarded by SP, content provider (CP), interface platform, etc., sent to the CRBT ordering interface, and then sent to the CRBT service database through the CRBT ordering interface. The database can realize the playing of the CRBT through the corresponding device for playing the CRBT sound, and realize the response to the CRBT ordering data. However, the data processing device provided by Embodiment 2 of the present invention can collect ordering data streams from the CRBT ordering interface, so that the ordering data streams can be analyzed subsequently, and the malicious ordering behavior of CRBTs can be monitored, and alarm information and monitoring reports can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the invention provide a data processing method and apparatus. The method comprises: according to a preset malicious subscription rule, analyzing a subscription data flow subscribing a customized ring back tone, determining whether the subscription data flow comprises malicious subscription data, and generating alarm information for the malicious subscription data. Since an automatic analysis technology is employed, manual analysis is unnecessary, and the efficiency in monitoring malicious subscription behaviors of the customized ring back tone can be effectively improved. Besides, since the subscription data flow is analyzed, the generation of a subscription result and a subscriber complaint is unnecessary, it can be ensured that the malicious subscription behaviors of the customized ring back tone can be monitored in real time, and the malicious subscription behaviors of the customized ring back tone can be effectively prevented.

Description

technical field [0001] The present invention relates to the communication field, in particular to a data processing method and device. Background technique [0002] At present, there are generally two monitoring methods for malicious ordering of CRBT: [0003] One is active monitoring. Active monitoring is to manually analyze the results of CRBT ordering at regular intervals to find information about maliciously ordered CRBTs within a period of time. Based on this information, query the interface program logs to find the source of malicious ordering behaviors and notify relevant departments to prevent CRBTs from being illegally ordered. Malicious order. [0004] The other is passive monitoring. To put it simply, it is to monitor the malicious ordering behavior of CRBT according to the complaints of CRBT subscription. In this case, the malicious ordering behavior has generally occurred for a period of time and has caused user complaints. When the CRBT maintainer inquires...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W4/16H04W8/18H04W24/00
Inventor 常会卿郭怀军黄梅英余谦贺延敏卫娜刘丽萍孙启昌荆晶
Owner XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More