Security risk control method of raising card identification by using big data and equipment fingerprint

A device fingerprint and security risk technology, applied in security devices, electrical components, wireless communications, etc., can solve the problems of low accuracy and large workload of the maintenance card identification method, and achieve small memory, fast running speed, and low error rate. Effect

Active Publication Date: 2018-03-16
NANJING XINWANG VIDEO NETWORK TECH +1
View PDF9 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The invention provides a security risk control method for card maintenance identification using big data and device fingerprints, which can solve the problems of low accuracy and heavy workload in existing card maintenance identification methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security risk control method of raising card identification by using big data and equipment fingerprint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention is described below in conjunction with accompanying drawing: As shown in the figure, this method first utilizes existing maintenance card warehouse, and directly introduces the resource in the maintenance card warehouse into the database of this platform so as to distinguish the maintenance card that has been recorded in the database Number. And re-identify the number that is not in the original card maintenance model library, and if it meets the conditions for card maintenance, the number will also be stored in the card maintenance database of this platform. The main process is:

[0019] S1 establishes the maintenance card database; the maintenance card database obtains the data information of the maintenance card library of the IT wisdom center and the database of no calling and no called last month through the API interface, and obtains the maintenance card number and the number of the maintenance card in the maintenance card warehouse of the IT...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security risk control method of raising card identification by using big data and equipment fingerprint. The method comprises the following steps: S1, establishing a raisingcard database; S2, when a user enters a platform to handle service, calling a service log of the user on the platform, obtaining a number of a telephone card associated with the user, a login equipment number and an IP according to the contents recorded in the service log, and comparing the obtained telephone card number with the number of a raising card model base; S3, obtaining the handling path of the raising card number in a telecommunication channel log, reading the equipment fingerprint used for handling the service in the log, and storing the data information of the equipment fingerprint and the handling path in a record of the raising card number; and S4, obtaining the service handling path of the user in the telecommunication channel log, and analyzing whether the service handling is preset service involving interest arbitrage. The method is small in memory occupation, high in operation speed and very low in error rate.

Description

technical field [0001] The invention relates to the field of information security of mobile operations, in particular to a security risk control method for card maintenance identification using big data and device fingerprints. Background technique [0002] "Handheld business hall" is an important mobile Internet product for mobile operators in terms of electronic channels. It has become the key target of this black industrial chain. In recent years, the growth rate of the number of users in the mobile communication market in various regions has slowed down, the number of low-end users in the incremental market has increased, and the competition among China Mobile, China Unicom and China Telecom (or China Netcom) has become increasingly fierce. At the same time, the loyalty of social channels to mobile companies is decreasing. In various regions, there are some distributors operating in violation of regulations in the market. On the other hand, the increase in false number...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W24/08H04W12/126
CPCH04W12/12H04W24/08
Inventor 石光捷付飞龙方勇徐高军戴光浩
Owner NANJING XINWANG VIDEO NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products