Preset type number recognition method and device

An identification method and identification device technology, applied in the computer field, can solve the problems of time-consuming efficiency, inability to identify malicious numbers, low performance, etc., and achieve the effect of preventing property safety behaviors

Inactive Publication Date: 2015-06-17
SHENZHEN TENCENT COMP SYST CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition, using this technical solution to discover and identify malicious numbers often requires comprehensive decision-making based on multiple characteristics and strategies. At this time, reviewing th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Preset type number recognition method and device
  • Preset type number recognition method and device
  • Preset type number recognition method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The following descriptions of the various embodiments refer to the accompanying drawings to illustrate specific embodiments in which the present invention can be practiced.

[0031] The term "predetermined type number" may refer to any one of a malicious number and a non-malicious number (trusted number), wherein the number may be an account number of an Internet application, an account number of an Internet service, etc., and the Internet application includes But not limited to instant messaging applications (for example, QQ, WeChat, etc.), email, online games, etc. In the technical solution discussed below, a malicious number is taken as an example for illustration.

[0032] The term "network interaction operation data" refers to data related to network interaction operations, wherein the network interaction operations may be network payment, network transfer, and so on.

[0033] The term "candidate number" refers to a number that is determined to have a certain degr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a preset type number recognition method and device. The method comprises the steps that starting from a node corresponding to a first type number in an operating relation chain, the node serves as a starting node, adjacent other nodes are searched according to the point direction of branches of the node till leaf nodes, a father node of the leaf nodes is traced, adjacent other nodes of the father node are searched, and whether the attribute of the searched nodes meets the specific condition or not is judged in the process; the steps are repeatedly executed till all nodes in the operating relation chain are accessed, and a first judgment result is obtained; the nodes meeting the specific condition in the first judgment result are screened according to the preset screening condition, and the preset type number is obtained. According to the preset type number recognition method and device, the preset type number can be automatically recognized.

Description

【Technical field】 [0001] The invention relates to the field of computer technology, in particular to a predetermined type number identification method and device. 【Background technique】 [0002] A large number of frequent network interaction operations (for example, network payment, network transfer, etc.) are carried out on the Internet every day. For illegal purposes, some criminals have carried out activities related to endangering the security of network interactive operations (such as theft, fraud, etc.) through the Internet, which has brought huge property losses to users of Internet applications. [0003] In order to avoid losses, it is necessary to identify malicious numbers (that is, numbers used by lawbreakers to carry out illegal acts), so as to take relevant measures against the malicious numbers. [0004] Traditional technical solutions for identifying malicious numbers include the following two types: [0005] The first technical solution is to discover malic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30H04L29/06
Inventor 金欢陈中亭潘安群李雪冰张盛凯全小龙陈和
Owner SHENZHEN TENCENT COMP SYST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products