CN107870988A - A kind of information verification method, terminal device and storage medium - Google Patents

A kind of information verification method, terminal device and storage medium Download PDF

Info

Publication number
CN107870988A
CN107870988A CN201710960967.8A CN201710960967A CN107870988A CN 107870988 A CN107870988 A CN 107870988A CN 201710960967 A CN201710960967 A CN 201710960967A CN 107870988 A CN107870988 A CN 107870988A
Authority
CN
China
Prior art keywords
information
analysis
verification
type
liaison
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710960967.8A
Other languages
Chinese (zh)
Inventor
林文楷
江汉祥
曾超
蔡淋强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meiya Pico Information Co Ltd
Original Assignee
Xiamen Meiya Pico Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meiya Pico Information Co Ltd filed Critical Xiamen Meiya Pico Information Co Ltd
Priority to CN201710960967.8A priority Critical patent/CN107870988A/en
Publication of CN107870988A publication Critical patent/CN107870988A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • General Health & Medical Sciences (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Technology Law (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention discloses a kind of information verification method, comprises the following steps, S1:Condition value, data type corresponding to intelligent Matching to input value are verified in input, and carry out keyword extraction to input value according to the data type matched, into S2 steps;S2:Data type and keyword according to corresponding to the input value obtained in S1, retrieval obtains raw information record, into S3 steps;S3:Analysis model corresponding to calling carries out various dimensions information analysis processing to the raw information obtained in S2, the analysis result of information verification is obtained, into S4 steps;S4:The analysis result of the information verification obtained in S3 is shown taking human as dimension.Based on " information verification purpose be exactly in order to find suspect and about clue " thinking, by integrating, excavating, analyzing hit results, finally taking human as dimension it is visual and clear show information verification result, meet user's fast positioning suspect and to find the actual combat demand of related thread.

Description

A kind of information verification method, terminal device and storage medium
Technical field
The present invention relates to technical field of information processing, specifically a kind of information verification method, terminal device and storage medium.
Background technology
In the big data epoch, increase to various data explosion formulas, elements of crime such as time, space, behavior, the work of criminal Tool etc., it is most of all by the mass data of correlation from different profile records.But there is enormous amount in data, broken simultaneously Piece, value density join the features such as secondary uneven, how to allow staff to be quickly found out corresponding suspect in information verification Member and clue, can turn into find crime sign, the key point actively investigated and had the situation under control in time.
At present, the existing information verification instrument of in the market, it is based primarily upon single information element and is verified, result is daily record Type, recordable type displaying, without further excavating and analyzing, these technologies can not meet the actual combat of the information verification in big data epoch Demand, because it has following deficiency:
1. data volume is big, information is messy, does not sort out and arranges, and it is huge as a result to verify workload.
Potential clue can not be excavated 2. the relevance between result does not embody, during verification, and is easily omitted recessive Clue.
The content of the invention
In order to solve the above problems, the present invention provides a kind of information verification method, terminal device and storage medium, using base In the information verification scheme that information is portrayed, based on " information verification purpose be exactly in order to find suspect and about clue " think of Road, by integrating, excavating, analyzing hit results, finally taking human as dimension it is visual and clear show information verification result, meet to use Family fast positioning suspect and the actual combat demand for finding related thread.
Present invention contrast prior art, has the characteristics that:
1. design object is different, the present invention is mainly set with " look for people, look for clue " to verify the final goal of work Meter, rather than be the stacking of simple information.
2. the depth verified is different, the information that the present invention is carried out in all directions to the suspect for verifying hit is portrayed, and allows work Personnel's very first time grasps the situation of suspect.
3. the range verified is different, the present invention combines same type case data, and the relevant cue of batch verification object is entered Row excavates and analysis.
4. result exhibition method is different:The present invention carries out information integration taking human as dimension and result is shown, directly perceived, clear.
A kind of information verification method of the present invention, comprises the following steps:
S1:Verification condition intelligent Matching, obtain keyword:Input and verify condition value, corresponding to intelligent Matching to input value Data type, and keyword extraction is carried out to input value according to the data type matched, into S2 steps;
S2:Retrieval obtains raw information record:Data type and keyword according to corresponding to the input value obtained in S1, inspection Rope obtains raw information record, into S3 steps;
S3:Various dimensions information analysis is handled:Analysis model corresponding to calling carries out multidimensional to the raw information obtained in S2 Information analysis processing is spent, the analysis result of information verification is obtained, into S4 steps;
S4:Analysis result is shown:The analysis result of the information verification obtained in S3 is shown taking human as dimension.
Further, in S1, verification condition is divided into two kinds of account type and content type, account type is entered using regular expression Row intelligent Matching, content type carry out intelligent Matching using characteristic matching.
Further, in S1, data type corresponding to account type verification condition includes but is not limited to:Cell-phone number, identity Card number, mailbox, bank's card number and license plate number;Data type corresponding to content type verification condition includes but is not limited to:Virtual identity, Name, place name and organization.
Further, in S3, various dimensions information analysis processing, the dimension of analysis includes three dimensions:1st, direct suspicion People:Account is directly under the jurisdiction of some suspect corresponding to verification condition;2nd, relation suspect:Account corresponding to verification condition is certain The good friend of individual suspect or communications and liaison object;3rd, content type clue:Verification condition occurred in content type data.
Further, in S3, analysis model corresponding to three dimensions is:Analysis model corresponding to direct suspect is behaved Member's information is portrayed;Analysis model corresponding to relation suspect is analyzed for incidence relation;Analysis model corresponding to content type clue is Usage scenario is analyzed.
Further, in S3, personnel's information portrays analysis model flow and is:
1.1st, from the essential information of personnel, extract real identity attribute, and for its identity attribute stamp source and Confidence level label;
1.2nd, according to the identity attribute information obtained in 1.1, on the basis of the various information resource databases comprising case information On, analyze the case-involving clue of personnel;
1.3rd, according to the identity attribute information obtained in 1.1, on the basis of the various information resource databases comprising case information On, analyze the case-involving relation of personnel;
1.4th, analysis result is preserved.
Further, in S3, incidence relation is analyzed analysis model and analyzed by the network of personal connections of suspect and verification object Further to verify, its flow is:
2.1st, by the analysis of the communications and liaison frequency, navigate to and verification object close relationship people the most;
2.2nd, the analysis of passage time relation, the party with verification object communications and liaison time anomaly is navigated to;
2.3rd, by the analysis of areal relation, specific region or the party that can be implemented are navigated to;
2.4th, analysis result is preserved.
Further, in S3, usage scenario analyzes the usage scenario that analysis model occurs by analyzing communications and liaison content, Staff is allowed to filter out interference information, its flow is:
3.1st, by the chat content of existing case, identified by manual type, build training class case model, class case model bag Include but be not limited to:Be involved in drug traffic communications and liaison training pattern, relate to yellow communications and liaison training pattern, gun-related communications and liaison training pattern;
3.2nd, from the original communications and liaison content of Mobile Phone Forensics extracting data;
3.3rd, using the class case model trained in 3.1, the business usage scenario of communications and liaison content in 3.2 is intelligently studied and judged;
3.4th, analysis result is preserved.
A kind of information verification terminal device of the present invention, including memory, processor and be stored in the memory simultaneously The computer program that can be run on the processor, information verification side is realized during computer program described in the computing device The step of method.
A kind of computer-readable recording medium of the present invention, the computer-readable recording medium storage have computer program, The computer program realizes the step of information verification method when being executed by processor.
Beneficial effects of the present invention are:
1. by combing miscellaneous service rule, with reference to a large amount of basic resource information, automation is completed with computer program The excavation extraction of personnel's information and clue, suspicion object and Key thread corresponding to fast positioning, is realized " to look for people, look for line Rope " is the one-stop information verification of target, can be effectively reduced staff's repetitive operation burden, improve staff's Operating efficiency.
2. proposing a variety of analysis models, artificial intelligence deep learning algorithm, the comprehensive feelings for portraying verification object are introduced Report and hint information, realize preferable information verification effect.
Brief description of the drawings
Fig. 1 is the method flow diagram of the embodiment of the present invention one;
Fig. 2 is the verification condition intelligent Matching schematic flow sheet of the embodiment of the present invention one;
Fig. 3 is that personnel's information of the embodiment of the present invention one portrays schematic flow sheet;
Fig. 4 is the incidence relation analysis process schematic diagram of the embodiment of the present invention one;
Fig. 5 is the usage scenario analysis process schematic diagram of the embodiment of the present invention one;
Fig. 6 is the verification condition intelligent Matching schematic diagram that the embodiment of the present invention is applied to searching products intelligently;
Fig. 7 is the schematic diagram of information verification result of the embodiment of the present invention.
Embodiment
To further illustrate each embodiment, the present invention is provided with accompanying drawing.These accompanying drawings are the invention discloses the one of content Point, it can coordinate the associated description of specification to explain the operation principles of embodiment mainly to illustrate embodiment.Coordinate ginseng These contents are examined, those of ordinary skill in the art will be understood that other possible embodiments and advantages of the present invention.In figure Component be not necessarily to scale, and similar element numbers are conventionally used to indicate similar component.
In conjunction with the drawings and specific embodiments, the present invention is further described.
Embodiment one:
Refer to shown in Fig. 1-Fig. 7, the invention provides a kind of information verification method, global analysis flow as shown in figure 1, Staff inputs single or multiple information verification conditions, data class corresponding to the verification condition of system Auto-matching input Type, and keyword extraction is carried out to input value according to the data type matched, and retrieve and obtain the original record of all hits, Called respectively at corresponding analysis model further according to three direct suspect, relation suspect and content type clue dimensions Reason, the hit results of last displaying information verification directly perceived.
Method set forth in the present invention comprises the following steps that:
S1:Verification condition intelligent Matching, obtain keyword:Input and verify condition value, corresponding to intelligent Matching to input value Data type, and keyword extraction is carried out to input value according to the data type matched,
Specifically, verification condition is divided into two kinds of account type and content type, account type carries out intelligence using regular expression Matching, content type carry out intelligent Matching using characteristic matching.
Data type corresponding to account type verification condition includes but is not limited to:Cell-phone number, identification card number, mailbox, bank card Number and license plate number;Data type corresponding to content type verification condition includes but is not limited to:Virtual identity, name, place name and tissue Mechanism.
Because the information for needing to verify under different operating scene makes a big difference, such as:Verify data, the core of known type Look into the data of UNKNOWN TYPE, verify different types of data etc. in batches.According to the way of routine, user needs to carry out different behaviour Make, great inconvenience is brought to work is verified.
And the present embodiment is by verification condition as shown in Fig. 2 be divided into two kinds of account type and content type, using regular expression and Two methods of characteristic matching, the various types of verification conditions of Intelligent Recognition, the information core allowed under user's one-key operation different scenes Look into work.
Into S2 steps;
S2:Retrieval obtains raw information record:Data type and keyword according to corresponding to the input value obtained in S1, inspection Rope obtains raw information record, into S3 steps;
S3:Various dimensions information analysis is handled:Analysis model corresponding to calling carries out multidimensional to the raw information obtained in S2 Information analysis processing is spent, obtains the analysis result of information verification,
Specifically, based on " information verification purpose be exactly in order to find suspect and about clue " analytical mathematics, multidimensional Information analysis processing is spent, the dimension of analysis includes three dimensions:1st, direct suspect:Account corresponding to verification condition is directly subordinate to In some suspect, verification work of this information to this will be most important, based on this analysis theory, analyzes mould Type is portrayed using personnel's information, and flow is as shown in Figure 3;2nd, relation suspect:Account corresponding to verification condition is some suspect Good friend or communications and liaison object, in this case, it is main be come by the analysis of the network of personal connections of suspect and verification object it is further Verify, based on this analysis theory, use analysis model to be analyzed for incidence relation, analysis model is as shown in Figure 4;3rd, content molded line Rope:Verification condition occurred in content type data, and in this case, main is the use field for analyzing content appearance Scape, allow staff to filter out interference information, based on this analysis theory, use analysis model to be analyzed for usage scenario, analysis Model is as shown in Figure 5.
Specifically, personnel's information portrays analysis model flow is:
1.1st, from the essential information of personnel, real identity attribute is extracted, such as:Name, identity card, address, cell-phone number Code, virtual identity (QQ, wechat, E-mail etc.);And stamp source and confidence level label for its identity attribute;
1.2nd, according to the identity attribute information obtained in 1.1, on the basis of the various information resource databases comprising case information On, analyze the case-involving clue of personnel;Such as:There are spot, case-involving communications and liaison etc.;
1.3rd, according to the identity attribute information obtained in 1.1, on the basis of the various information resource databases comprising case information On, analyze the case-involving relation of personnel;Such as:Live together etc.;
1.4th, analysis result is preserved.
Incidence relation is analyzed analysis model and analyzed by the network of personal connections of suspect and verification object further to verify, and it flows Cheng Wei:
2.1st, by the analysis of the communications and liaison frequency, navigate to and verification object close relationship people the most;
2.2nd, the analysis of passage time relation, the party with verification object communications and liaison time anomaly is navigated to;
2.3rd, by the analysis of areal relation, specific region or the party that can be implemented are navigated to;
2.4th, analysis result is preserved.
Usage scenario analyzes the usage scenario that analysis model occurs by analyzing communications and liaison content, allows staff to filter out Interference information, its flow are:
3.1st, the chat content of existing case is identified by manual type based on TensorFlow, builds training class case Model, class case model include but is not limited to:Be involved in drug traffic communications and liaison training pattern, relate to yellow communications and liaison training pattern, gun-related communications and liaison training pattern;
3.2nd, from the original communications and liaison content of Mobile Phone Forensics extracting data;Including short message, instant messaging chat content, micro- Rich, mail etc.;
3.3rd, using the class case model trained in 3.1, the business usage scenario of communications and liaison content in 3.2 is intelligently studied and judged;
3.4th, analysis result is preserved.
Into S4 steps;
S4:Analysis result is shown:The analysis result of the information verification obtained in S3 is shown taking human as dimension.
Embodiment two:
The present invention also provides a kind of information verification terminal device, including memory, processor and is stored in the storage In device and the computer program that can run on the processor, this hair is realized during computer program described in the computing device Step in bright embodiment above method embodiment, such as the method and step of the step shown in Fig. 1-Fig. 5.
Further, can be desktop PC, pen as an executable scheme, described information terminal verification equipment The computing devices such as note sheet, palm PC and cloud server.Described information terminal verification equipment may include, but be not limited only to, place Manage device, memory.It will be understood by those skilled in the art that the composition structure of above- mentioned information terminal verification equipment is only information core The example of terminal device is looked into, does not form the restriction to information verification terminal device, can be included more more or less than above-mentioned Part, some parts or different parts are either combined, such as described information terminal verification equipment can also be defeated including inputting Go out equipment, network access equipment, bus etc., the embodiment of the present invention is not limited this.
Further, as an executable scheme, alleged processor can be CPU (Central Processing Unit, CPU), it can also be other general processors, digital signal processor (Digital Signal Processor, DSP), it is application specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing Into programmable gate array (Field-Programmable Gate Array, FPGA) or other PLDs, divide Vertical door or transistor logic, discrete hardware components etc..General processor can be microprocessor or the processor Can be any conventional processor etc., the processor is the control centre of described information terminal verification equipment, and utilization is various The various pieces of interface and the whole information verification terminal device of connection.
The memory can be used for storing the computer program and/or module, and the processor is by running or performing The computer program and/or module being stored in the memory, and the data being stored in memory are called, described in realization The various functions of information verification terminal device.The memory can mainly include storing program area and storage data field, wherein, deposit Storing up program area can storage program area, the application program needed at least one function;Storage data field can be stored according to mobile phone Use created data etc..In addition, memory can include high-speed random access memory, non-volatile deposit can also be included Reservoir, such as hard disk, internal memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) block, flash card (Flash Card), at least one disk memory, flush memory device or its His volatile solid-state part.
The present invention also provides a kind of computer-readable recording medium, and the computer-readable recording medium storage has computer Program, the computer program realizes the above method of embodiment of the present invention when being executed by processor the step of.
If module/unit of described information terminal verification integration of equipments realized in the form of SFU software functional unit and as Independent production marketing in use, can be stored in a computer read/write memory medium.Based on such understanding, sheet All or part of flow in above-described embodiment method is realized in invention, and the hardware of correlation can also be instructed by computer program To complete, described computer program can be stored in a computer-readable recording medium, and the computer program is by processor During execution, can be achieved above-mentioned each embodiment of the method the step of.Wherein, the computer program includes computer program code, The computer program code can be source code form, object identification code form, executable file or some intermediate forms etc..Institute Stating computer-readable medium can include:Can carry any entity or device of the computer program code, recording medium, USB flash disk, mobile hard disk, magnetic disc, CD, computer storage, read-only storage (ROM, Read-Only Memory), arbitrary access Memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..Need Bright, the content that the computer-readable medium includes can be entered according to legislation in jurisdiction and the requirement of patent practice The appropriate increase and decrease of row, such as in some jurisdictions, according to legislation and patent practice, computer-readable medium does not include electricity and carried Ripple signal and telecommunication signal.The present invention a kind of information verification method, terminal device and storage medium, advised by combing miscellaneous service Then, with reference to a large amount of basic resource information, personnel's information of automation is completed with computer program and the excavation of clue is extracted, quickly Suspicion object and Key thread corresponding to positioning, realize with the one-stop information verification that " look for people, look for clue " is target, can be with Staff's repetitive operation burden is effectively reduced, improves the operating efficiency of staff.A variety of analysis models are proposed, are drawn Enter artificial intelligence deep learning algorithm, the comprehensive information and hint information for portraying verification object, realize preferable information verification Effect.It is illustrated in figure 6 the verification condition intelligent Matching schematic diagram that the embodiment of the present invention is applied to searching products intelligently;Fig. 7 institutes It is shown as the schematic diagram of information verification result of the embodiment of the present invention.
Although specifically showing and describing the present invention with reference to preferred embodiment, those skilled in the art should be bright In vain, do not departing from the spirit and scope of the present invention that appended claims are limited, in the form and details can be right The present invention makes a variety of changes, and is protection scope of the present invention.

Claims (10)

  1. A kind of 1. information verification method, it is characterised in that:Comprise the following steps:
    S1:Verification condition intelligent Matching, obtain keyword:Condition value, data corresponding to intelligent Matching to input value are verified in input Type, and keyword extraction is carried out to input value according to the data type matched, into S2 steps;
    S2:Retrieval obtains raw information record:Data type and keyword, retrieval obtain according to corresponding to the input value obtained in S1 Raw information is taken to record, into S3 steps;
    S3:Various dimensions information analysis is handled:Analysis model corresponding to calling carries out various dimensions letter to the raw information obtained in S2 Breath analyzing and processing, the analysis result of information verification is obtained, into S4 steps;
    S4:Analysis result is shown:The analysis result of the information verification obtained in S3 is shown taking human as dimension.
  2. 2. information verification method as claimed in claim 1, it is characterised in that:In S1, verification condition is divided into account type and interior Two kinds of appearance type, account type carry out intelligent Matching using regular expression, and content type carries out intelligent Matching using characteristic matching.
  3. 3. information verification method as claimed in claim 2, it is characterised in that:In S1, data corresponding to account type verification condition Type includes but is not limited to:Cell-phone number, identification card number, mailbox, bank's card number and license plate number;Number corresponding to content type verification condition Include but is not limited to according to type:Virtual identity, name, place name and organization.
  4. 4. information verification method as claimed in claim 2, it is characterised in that:In S3, various dimensions information analysis processing, analysis Dimension includes three dimensions:1st, direct suspect:Account is directly under the jurisdiction of some suspect corresponding to verification condition;2nd, relation is disliked Doubt people:Good friend or communications and liaison object of the account corresponding to verification condition for some suspect;3rd, content type clue:Including verification condition Occurred in appearance type data.
  5. 5. information verification method as claimed in claim 4, it is characterised in that:In S3, analysis model corresponding to three dimensions is: Analysis model corresponding to direct suspect is that personnel's information is portrayed;Analysis model corresponding to relation suspect is incidence relation point Analysis;Analysis model corresponding to content type clue is analyzed for usage scenario.
  6. 6. information verification method as claimed in claim 5, it is characterised in that:In S3, personnel's information portrays analysis model flow For:
    1.1st, from the essential information of personnel, extract real identity attribute, and source and credible is stamped for its identity attribute Scale label;
    1.2nd, according to the identity attribute information obtained in 1.1, on the basis of the various information resource databases comprising case information, divide The case-involving clue of precipitation personnel;
    1.3rd, according to the identity attribute information obtained in 1.1, on the basis of the various information resource databases comprising case information, divide The case-involving relation of precipitation personnel;
    1.4th, analysis result is preserved.
  7. 7. information verification method as claimed in claim 5, it is characterised in that:In S3, incidence relation analysis analysis model passes through The network of personal connections of suspect and verification object is analyzed further to verify, and its flow is:
    2.1st, by the analysis of the communications and liaison frequency, navigate to and verification object close relationship people the most;
    2.2nd, the analysis of passage time relation, the party with verification object communications and liaison time anomaly is navigated to;
    2.3rd, by the analysis of areal relation, specific region or the party that can be implemented are navigated to;
    2.4th, analysis result is preserved.
  8. 8. information verification method as claimed in claim 5, it is characterised in that:In S3, usage scenario analysis analysis model passes through The usage scenario of communications and liaison content appearance is analyzed, allows staff to filter out interference information, its flow is:
    3.1st, by the chat content of existing case, identified by manual type, build training class case model, class case model include but It is not limited to:Be involved in drug traffic communications and liaison training pattern, relate to yellow communications and liaison training pattern, gun-related communications and liaison training pattern;
    3.2nd, from the original communications and liaison content of Mobile Phone Forensics extracting data;
    3.3rd, using the class case model trained in 3.1, the business usage scenario of communications and liaison content in 3.2 is intelligently studied and judged;
    3.4th, analysis result is preserved.
  9. 9. a kind of information verification terminal device, including memory, processor and it is stored in the memory and can be described The computer program run on processor, it is characterised in that:Such as right is realized described in the computing device during computer program It is required that the step of 1-8 methods describeds.
  10. 10. a kind of computer-readable recording medium, the computer-readable recording medium storage has computer program, and its feature exists In:Realized when the computer program is executed by processor such as the step of claim 1-8 methods describeds.
CN201710960967.8A 2017-10-17 2017-10-17 A kind of information verification method, terminal device and storage medium Pending CN107870988A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710960967.8A CN107870988A (en) 2017-10-17 2017-10-17 A kind of information verification method, terminal device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710960967.8A CN107870988A (en) 2017-10-17 2017-10-17 A kind of information verification method, terminal device and storage medium

Publications (1)

Publication Number Publication Date
CN107870988A true CN107870988A (en) 2018-04-03

Family

ID=61752892

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710960967.8A Pending CN107870988A (en) 2017-10-17 2017-10-17 A kind of information verification method, terminal device and storage medium

Country Status (1)

Country Link
CN (1) CN107870988A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108536855A (en) * 2018-04-17 2018-09-14 厦门市美亚柏科信息股份有限公司 Mobile communications device evidence collecting method and system
CN109558497A (en) * 2018-12-04 2019-04-02 珠海市新德汇信息技术有限公司 A kind of body of data investigation analysis method
CN109558488A (en) * 2018-11-30 2019-04-02 重庆市千将软件有限公司 Based on data to the multi dimensional analysis method of criminal offence
CN109635099A (en) * 2018-12-21 2019-04-16 山东华夏高科信息股份有限公司 Case-involving electronic data evidence obtaining management system
CN110557466A (en) * 2019-09-11 2019-12-10 北京明略软件系统有限公司 data processing method and device, electronic equipment and storage medium
CN112597238A (en) * 2020-12-17 2021-04-02 北京以萨技术股份有限公司 Method, system, device and medium for establishing knowledge graph based on personnel information
CN112948224A (en) * 2019-12-23 2021-06-11 深圳市明源云科技有限公司 Data processing method, device, terminal and storage medium
CN112990980A (en) * 2021-04-09 2021-06-18 厦门市美亚柏科信息股份有限公司 Evidence obtaining data-based black grey product advertisement identification method and system
WO2023197725A1 (en) * 2022-04-14 2023-10-19 厦门市美亚柏科信息股份有限公司 Same-type label data prediction method, terminal device, and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130204880A1 (en) * 2012-02-06 2013-08-08 Fis Financial Compliance Solutions, Llc Methods and systems for list filtering based on known entity matching
CN103425704A (en) * 2012-05-24 2013-12-04 阿里巴巴集团控股有限公司 Application interface providing method and application interface providing device
CN104572615A (en) * 2014-12-19 2015-04-29 深圳中创华安科技有限公司 Method and system for on-line case investigation processing
CN105574172A (en) * 2015-12-17 2016-05-11 北京锐安科技有限公司 Data analysis method and analysis system
CN107247743A (en) * 2017-05-17 2017-10-13 安徽富驰信息技术有限公司 A kind of judicial class case search method and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130204880A1 (en) * 2012-02-06 2013-08-08 Fis Financial Compliance Solutions, Llc Methods and systems for list filtering based on known entity matching
CN103425704A (en) * 2012-05-24 2013-12-04 阿里巴巴集团控股有限公司 Application interface providing method and application interface providing device
CN104572615A (en) * 2014-12-19 2015-04-29 深圳中创华安科技有限公司 Method and system for on-line case investigation processing
CN105574172A (en) * 2015-12-17 2016-05-11 北京锐安科技有限公司 Data analysis method and analysis system
CN107247743A (en) * 2017-05-17 2017-10-13 安徽富驰信息技术有限公司 A kind of judicial class case search method and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王凡: "公安缉毒排查系统的研究与实现", 《中国优秀硕士学位论文全文数据库》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108536855A (en) * 2018-04-17 2018-09-14 厦门市美亚柏科信息股份有限公司 Mobile communications device evidence collecting method and system
CN109558488A (en) * 2018-11-30 2019-04-02 重庆市千将软件有限公司 Based on data to the multi dimensional analysis method of criminal offence
CN109558497A (en) * 2018-12-04 2019-04-02 珠海市新德汇信息技术有限公司 A kind of body of data investigation analysis method
CN109635099A (en) * 2018-12-21 2019-04-16 山东华夏高科信息股份有限公司 Case-involving electronic data evidence obtaining management system
CN110557466A (en) * 2019-09-11 2019-12-10 北京明略软件系统有限公司 data processing method and device, electronic equipment and storage medium
CN112948224A (en) * 2019-12-23 2021-06-11 深圳市明源云科技有限公司 Data processing method, device, terminal and storage medium
CN112948224B (en) * 2019-12-23 2023-10-10 深圳市明源云科技有限公司 Data processing method, device, terminal and storage medium
CN112597238A (en) * 2020-12-17 2021-04-02 北京以萨技术股份有限公司 Method, system, device and medium for establishing knowledge graph based on personnel information
CN112990980A (en) * 2021-04-09 2021-06-18 厦门市美亚柏科信息股份有限公司 Evidence obtaining data-based black grey product advertisement identification method and system
WO2023197725A1 (en) * 2022-04-14 2023-10-19 厦门市美亚柏科信息股份有限公司 Same-type label data prediction method, terminal device, and storage medium

Similar Documents

Publication Publication Date Title
CN107870988A (en) A kind of information verification method, terminal device and storage medium
CN109816397B (en) Fraud discrimination method, device and storage medium
US9348934B2 (en) Systems and methods for facilitating open source intelligence gathering
CN107992746A (en) Malicious act method for digging and device
CN112487208B (en) Network security data association analysis method, device, equipment and storage medium
CN107273752B (en) Vulnerability automatic classification method based on word frequency statistics and naive Bayes fusion model
CN111680153A (en) Big data authentication method and system based on knowledge graph
CN107733902A (en) A kind of monitoring method and device of target data diffusion process
CN111414740B (en) Electronic experiment record book report generation system
CN110519264A (en) Tracking source tracing method, device and the equipment of attack
CN108268886A (en) For identifying the method and system of plug-in operation
CN112861056A (en) Enterprise website construction information display and release system and method
CN107644106A (en) The internuncial method of automatic mining business, terminal device and storage medium
CN112291261A (en) Network security log audit analysis method driven by knowledge graph
Brahimi et al. Mapping the Scientific Landscape of Metaverse Using VOSviewer and Bibliometrix
CN109672586A (en) A kind of DPI service traffics recognition methods, device and computer readable storage medium
CN117150138A (en) Scientific and technological resource organization method and system based on high-dimensional space mapping
CN107608965A (en) Extracting method, electronic equipment and the storage medium of books the names of protagonists
CN110457009B (en) Method for realizing software security requirement recommendation model based on data analysis
CN109918420A (en) A kind of rival's recommended method, server
CN116228402A (en) Financial credit investigation feature warehouse technical support system
CN113065126B (en) Personal information compliance method and device based on distributed data sandbox
CN105786929A (en) Information monitoring method and device
CN112365248B (en) Method and system for analyzing digital currency transaction path
CN114237798A (en) Data processing method, device, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180403