Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Service processing method and apparatus based on identity information

A technology for identity information and business processing, applied in the field of information management, can solve the problems of non-recovery of arrears, harassment, non-real-name mobile number telecommunication fraud, etc., and achieve the effect of reducing telecommunication fraud

Inactive Publication Date: 2018-12-07
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF1 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a business processing method and device based on identity information to solve the defects in the prior art such as telecommunication fraud, harassment, arrears, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Service processing method and apparatus based on identity information
  • Service processing method and apparatus based on identity information
  • Service processing method and apparatus based on identity information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] This embodiment provides a business processing method based on identity information, which is used to clean abnormal numbers based on the total data of user identity information of registered mobile numbers nationwide, avoid the existence of unlicensed numbers, and effectively reduce telecommunications fraud. The execution subject of this embodiment is a service processing device based on identity information (hereinafter referred to as the device), which can be installed in the operator's user management system or in a terminal, such as a server, desktop computer, notebook computer, etc.

[0027] Such as figure 1 As shown, it is a schematic flowchart of the identity information-based business processing method provided in this embodiment, the method includes:

[0028] Step 101, obtain pre-collected exception numbers.

[0029] Specifically, all known abnormal numbers such as fraud phone numbers and malicious blacklist numbers can be collected, and a blacklist database ...

Embodiment 2

[0039] This embodiment provides a further supplementary description of the service processing method based on identity information provided in the first embodiment.

[0040] Such as figure 2 As shown in , it is a schematic flowchart of the service processing method based on identity information provided in this embodiment. On the basis of the first embodiment above, optionally, the method further includes:

[0041] Step 201, if it is determined that the target user identity information corresponding to the abnormal number exists in the total user identity information data, then acquire the mobile number corresponding to the target user identity information.

[0042] Specifically, if it is determined that there is target user identity information corresponding to the abnormal number in the total user identity information data, it means that the abnormal number is a real-name number, but the possibility of identity information theft cannot be ruled out. Therefore, the target u...

Embodiment 3

[0059] This embodiment provides an identity information-based service processing device, which is used to execute the identity information-based service processing method in the first embodiment above.

[0060] Such as image 3 As shown in , it is a schematic structural diagram of an identity information-based service processing device provided in this embodiment. The identity information-based business processing device 30 includes a first acquisition module 31 , a determination module 32 and a processing module 33 .

[0061] Wherein, the first acquisition module 31 is used to obtain the pre-collected abnormal number; the determination module 32 is used to determine whether there is target user identity information corresponding to the abnormal number in the total data of user identity information according to the abnormal number, and the total data of user identity information Including the user identity information of registered mobile numbers within the preset geographica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a service processing method and apparatus based on identity information. The service processing method based on identity information includes the steps: acquiring pre-collectedabnormal numbers; according to the abnormal numbers, determining whether target user identity information corresponding to the abnormal numbers exists in the total data of the user identity information; and if the target user identity information corresponding to the abnormal numbers does not exist in the total data of the user identity information, performing phone-halting processing on the abnormal numbers. Based on the total data of the user identity information in the range of the whole country, the service processing method based on identity information cleans up the pre-collected abnormal numbers and performs phone-halting processing on the abnormal numbers without real names, so as to effectively reduce occurrences of telecommunication fraud, malicious blacklists, harassment, and the like and solve the defect that the prior art cannot recourse telecommunication fraud, harassment, arrears, and the like which are implemented by non-real-name mobile numbers.

Description

technical field [0001] The present application relates to the technical field of information management, in particular to a business processing method and device based on identity information. Background technique [0002] With the rapid development of Internet technology, mobile phones have become an indispensable communication and entertainment tool in people's lives. Making calls, surfing the Internet, and listening to music through mobile phones have become people's leisure and entertainment methods. [0003] However, with more and more functions of mobile phones, the leakage of mobile phone numbers is also becoming more and more serious. As a result, various telecommunications fraud, harassment, sales promotion, etc. have annoyed users and greatly reduced user experience. However, many numbers marked as fraudulent and harassing are often not registered with real names, making it impossible to trace them. [0004] Therefore, how to effectively manage mobile numbers and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/12H04W60/06H04W12/128
CPCH04W12/06H04W12/12H04W60/06
Inventor 杜永红张云勇王君珂冯伟斌王艳丽王晔靳慧芳李希金
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products