CN107870988A - A kind of information verification method, terminal device and storage medium - Google Patents
A kind of information verification method, terminal device and storage medium Download PDFInfo
- Publication number
- CN107870988A CN107870988A CN201710960967.8A CN201710960967A CN107870988A CN 107870988 A CN107870988 A CN 107870988A CN 201710960967 A CN201710960967 A CN 201710960967A CN 107870988 A CN107870988 A CN 107870988A
- Authority
- CN
- China
- Prior art keywords
- information
- analysis
- verification
- type
- liaison
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 97
- 238000000034 method Methods 0.000 title claims abstract description 31
- 238000003860 storage Methods 0.000 title claims description 13
- 238000004458 analytical method Methods 0.000 claims abstract description 80
- 238000012545 processing Methods 0.000 claims abstract description 8
- 238000000605 extraction Methods 0.000 claims abstract description 6
- 238000004590 computer program Methods 0.000 claims description 23
- 238000012549 training Methods 0.000 claims description 12
- 239000003814 drug Substances 0.000 claims description 3
- 229940079593 drug Drugs 0.000 claims description 3
- 230000008520 organization Effects 0.000 claims description 2
- 238000001556 precipitation Methods 0.000 claims 2
- 230000000007 visual effect Effects 0.000 abstract description 2
- 238000010586 diagram Methods 0.000 description 7
- 238000013473 artificial intelligence Methods 0.000 description 2
- 238000009412 basement excavation Methods 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 238000013135 deep learning Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000003252 repetitive effect Effects 0.000 description 2
- 241000208340 Araliaceae Species 0.000 description 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 description 1
- 235000003140 Panax quinquefolius Nutrition 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000004880 explosion Methods 0.000 description 1
- 235000008434 ginseng Nutrition 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000004549 pulsed laser deposition Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Tourism & Hospitality (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- General Health & Medical Sciences (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Technology Law (AREA)
- Computational Linguistics (AREA)
- Data Mining & Analysis (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention discloses a kind of information verification method, comprises the following steps, S1:Condition value, data type corresponding to intelligent Matching to input value are verified in input, and carry out keyword extraction to input value according to the data type matched, into S2 steps;S2:Data type and keyword according to corresponding to the input value obtained in S1, retrieval obtains raw information record, into S3 steps;S3:Analysis model corresponding to calling carries out various dimensions information analysis processing to the raw information obtained in S2, the analysis result of information verification is obtained, into S4 steps;S4:The analysis result of the information verification obtained in S3 is shown taking human as dimension.Based on " information verification purpose be exactly in order to find suspect and about clue " thinking, by integrating, excavating, analyzing hit results, finally taking human as dimension it is visual and clear show information verification result, meet user's fast positioning suspect and to find the actual combat demand of related thread.
Description
Technical field
The present invention relates to technical field of information processing, specifically a kind of information verification method, terminal device and storage medium.
Background technology
In the big data epoch, increase to various data explosion formulas, elements of crime such as time, space, behavior, the work of criminal
Tool etc., it is most of all by the mass data of correlation from different profile records.But there is enormous amount in data, broken simultaneously
Piece, value density join the features such as secondary uneven, how to allow staff to be quickly found out corresponding suspect in information verification
Member and clue, can turn into find crime sign, the key point actively investigated and had the situation under control in time.
At present, the existing information verification instrument of in the market, it is based primarily upon single information element and is verified, result is daily record
Type, recordable type displaying, without further excavating and analyzing, these technologies can not meet the actual combat of the information verification in big data epoch
Demand, because it has following deficiency:
1. data volume is big, information is messy, does not sort out and arranges, and it is huge as a result to verify workload.
Potential clue can not be excavated 2. the relevance between result does not embody, during verification, and is easily omitted recessive
Clue.
The content of the invention
In order to solve the above problems, the present invention provides a kind of information verification method, terminal device and storage medium, using base
In the information verification scheme that information is portrayed, based on " information verification purpose be exactly in order to find suspect and about clue " think of
Road, by integrating, excavating, analyzing hit results, finally taking human as dimension it is visual and clear show information verification result, meet to use
Family fast positioning suspect and the actual combat demand for finding related thread.
Present invention contrast prior art, has the characteristics that:
1. design object is different, the present invention is mainly set with " look for people, look for clue " to verify the final goal of work
Meter, rather than be the stacking of simple information.
2. the depth verified is different, the information that the present invention is carried out in all directions to the suspect for verifying hit is portrayed, and allows work
Personnel's very first time grasps the situation of suspect.
3. the range verified is different, the present invention combines same type case data, and the relevant cue of batch verification object is entered
Row excavates and analysis.
4. result exhibition method is different:The present invention carries out information integration taking human as dimension and result is shown, directly perceived, clear.
A kind of information verification method of the present invention, comprises the following steps:
S1:Verification condition intelligent Matching, obtain keyword:Input and verify condition value, corresponding to intelligent Matching to input value
Data type, and keyword extraction is carried out to input value according to the data type matched, into S2 steps;
S2:Retrieval obtains raw information record:Data type and keyword according to corresponding to the input value obtained in S1, inspection
Rope obtains raw information record, into S3 steps;
S3:Various dimensions information analysis is handled:Analysis model corresponding to calling carries out multidimensional to the raw information obtained in S2
Information analysis processing is spent, the analysis result of information verification is obtained, into S4 steps;
S4:Analysis result is shown:The analysis result of the information verification obtained in S3 is shown taking human as dimension.
Further, in S1, verification condition is divided into two kinds of account type and content type, account type is entered using regular expression
Row intelligent Matching, content type carry out intelligent Matching using characteristic matching.
Further, in S1, data type corresponding to account type verification condition includes but is not limited to:Cell-phone number, identity
Card number, mailbox, bank's card number and license plate number;Data type corresponding to content type verification condition includes but is not limited to:Virtual identity,
Name, place name and organization.
Further, in S3, various dimensions information analysis processing, the dimension of analysis includes three dimensions:1st, direct suspicion
People:Account is directly under the jurisdiction of some suspect corresponding to verification condition;2nd, relation suspect:Account corresponding to verification condition is certain
The good friend of individual suspect or communications and liaison object;3rd, content type clue:Verification condition occurred in content type data.
Further, in S3, analysis model corresponding to three dimensions is:Analysis model corresponding to direct suspect is behaved
Member's information is portrayed;Analysis model corresponding to relation suspect is analyzed for incidence relation;Analysis model corresponding to content type clue is
Usage scenario is analyzed.
Further, in S3, personnel's information portrays analysis model flow and is:
1.1st, from the essential information of personnel, extract real identity attribute, and for its identity attribute stamp source and
Confidence level label;
1.2nd, according to the identity attribute information obtained in 1.1, on the basis of the various information resource databases comprising case information
On, analyze the case-involving clue of personnel;
1.3rd, according to the identity attribute information obtained in 1.1, on the basis of the various information resource databases comprising case information
On, analyze the case-involving relation of personnel;
1.4th, analysis result is preserved.
Further, in S3, incidence relation is analyzed analysis model and analyzed by the network of personal connections of suspect and verification object
Further to verify, its flow is:
2.1st, by the analysis of the communications and liaison frequency, navigate to and verification object close relationship people the most;
2.2nd, the analysis of passage time relation, the party with verification object communications and liaison time anomaly is navigated to;
2.3rd, by the analysis of areal relation, specific region or the party that can be implemented are navigated to;
2.4th, analysis result is preserved.
Further, in S3, usage scenario analyzes the usage scenario that analysis model occurs by analyzing communications and liaison content,
Staff is allowed to filter out interference information, its flow is:
3.1st, by the chat content of existing case, identified by manual type, build training class case model, class case model bag
Include but be not limited to:Be involved in drug traffic communications and liaison training pattern, relate to yellow communications and liaison training pattern, gun-related communications and liaison training pattern;
3.2nd, from the original communications and liaison content of Mobile Phone Forensics extracting data;
3.3rd, using the class case model trained in 3.1, the business usage scenario of communications and liaison content in 3.2 is intelligently studied and judged;
3.4th, analysis result is preserved.
A kind of information verification terminal device of the present invention, including memory, processor and be stored in the memory simultaneously
The computer program that can be run on the processor, information verification side is realized during computer program described in the computing device
The step of method.
A kind of computer-readable recording medium of the present invention, the computer-readable recording medium storage have computer program,
The computer program realizes the step of information verification method when being executed by processor.
Beneficial effects of the present invention are:
1. by combing miscellaneous service rule, with reference to a large amount of basic resource information, automation is completed with computer program
The excavation extraction of personnel's information and clue, suspicion object and Key thread corresponding to fast positioning, is realized " to look for people, look for line
Rope " is the one-stop information verification of target, can be effectively reduced staff's repetitive operation burden, improve staff's
Operating efficiency.
2. proposing a variety of analysis models, artificial intelligence deep learning algorithm, the comprehensive feelings for portraying verification object are introduced
Report and hint information, realize preferable information verification effect.
Brief description of the drawings
Fig. 1 is the method flow diagram of the embodiment of the present invention one;
Fig. 2 is the verification condition intelligent Matching schematic flow sheet of the embodiment of the present invention one;
Fig. 3 is that personnel's information of the embodiment of the present invention one portrays schematic flow sheet;
Fig. 4 is the incidence relation analysis process schematic diagram of the embodiment of the present invention one;
Fig. 5 is the usage scenario analysis process schematic diagram of the embodiment of the present invention one;
Fig. 6 is the verification condition intelligent Matching schematic diagram that the embodiment of the present invention is applied to searching products intelligently;
Fig. 7 is the schematic diagram of information verification result of the embodiment of the present invention.
Embodiment
To further illustrate each embodiment, the present invention is provided with accompanying drawing.These accompanying drawings are the invention discloses the one of content
Point, it can coordinate the associated description of specification to explain the operation principles of embodiment mainly to illustrate embodiment.Coordinate ginseng
These contents are examined, those of ordinary skill in the art will be understood that other possible embodiments and advantages of the present invention.In figure
Component be not necessarily to scale, and similar element numbers are conventionally used to indicate similar component.
In conjunction with the drawings and specific embodiments, the present invention is further described.
Embodiment one:
Refer to shown in Fig. 1-Fig. 7, the invention provides a kind of information verification method, global analysis flow as shown in figure 1,
Staff inputs single or multiple information verification conditions, data class corresponding to the verification condition of system Auto-matching input
Type, and keyword extraction is carried out to input value according to the data type matched, and retrieve and obtain the original record of all hits,
Called respectively at corresponding analysis model further according to three direct suspect, relation suspect and content type clue dimensions
Reason, the hit results of last displaying information verification directly perceived.
Method set forth in the present invention comprises the following steps that:
S1:Verification condition intelligent Matching, obtain keyword:Input and verify condition value, corresponding to intelligent Matching to input value
Data type, and keyword extraction is carried out to input value according to the data type matched,
Specifically, verification condition is divided into two kinds of account type and content type, account type carries out intelligence using regular expression
Matching, content type carry out intelligent Matching using characteristic matching.
Data type corresponding to account type verification condition includes but is not limited to:Cell-phone number, identification card number, mailbox, bank card
Number and license plate number;Data type corresponding to content type verification condition includes but is not limited to:Virtual identity, name, place name and tissue
Mechanism.
Because the information for needing to verify under different operating scene makes a big difference, such as:Verify data, the core of known type
Look into the data of UNKNOWN TYPE, verify different types of data etc. in batches.According to the way of routine, user needs to carry out different behaviour
Make, great inconvenience is brought to work is verified.
And the present embodiment is by verification condition as shown in Fig. 2 be divided into two kinds of account type and content type, using regular expression and
Two methods of characteristic matching, the various types of verification conditions of Intelligent Recognition, the information core allowed under user's one-key operation different scenes
Look into work.
Into S2 steps;
S2:Retrieval obtains raw information record:Data type and keyword according to corresponding to the input value obtained in S1, inspection
Rope obtains raw information record, into S3 steps;
S3:Various dimensions information analysis is handled:Analysis model corresponding to calling carries out multidimensional to the raw information obtained in S2
Information analysis processing is spent, obtains the analysis result of information verification,
Specifically, based on " information verification purpose be exactly in order to find suspect and about clue " analytical mathematics, multidimensional
Information analysis processing is spent, the dimension of analysis includes three dimensions:1st, direct suspect:Account corresponding to verification condition is directly subordinate to
In some suspect, verification work of this information to this will be most important, based on this analysis theory, analyzes mould
Type is portrayed using personnel's information, and flow is as shown in Figure 3;2nd, relation suspect:Account corresponding to verification condition is some suspect
Good friend or communications and liaison object, in this case, it is main be come by the analysis of the network of personal connections of suspect and verification object it is further
Verify, based on this analysis theory, use analysis model to be analyzed for incidence relation, analysis model is as shown in Figure 4;3rd, content molded line
Rope:Verification condition occurred in content type data, and in this case, main is the use field for analyzing content appearance
Scape, allow staff to filter out interference information, based on this analysis theory, use analysis model to be analyzed for usage scenario, analysis
Model is as shown in Figure 5.
Specifically, personnel's information portrays analysis model flow is:
1.1st, from the essential information of personnel, real identity attribute is extracted, such as:Name, identity card, address, cell-phone number
Code, virtual identity (QQ, wechat, E-mail etc.);And stamp source and confidence level label for its identity attribute;
1.2nd, according to the identity attribute information obtained in 1.1, on the basis of the various information resource databases comprising case information
On, analyze the case-involving clue of personnel;Such as:There are spot, case-involving communications and liaison etc.;
1.3rd, according to the identity attribute information obtained in 1.1, on the basis of the various information resource databases comprising case information
On, analyze the case-involving relation of personnel;Such as:Live together etc.;
1.4th, analysis result is preserved.
Incidence relation is analyzed analysis model and analyzed by the network of personal connections of suspect and verification object further to verify, and it flows
Cheng Wei:
2.1st, by the analysis of the communications and liaison frequency, navigate to and verification object close relationship people the most;
2.2nd, the analysis of passage time relation, the party with verification object communications and liaison time anomaly is navigated to;
2.3rd, by the analysis of areal relation, specific region or the party that can be implemented are navigated to;
2.4th, analysis result is preserved.
Usage scenario analyzes the usage scenario that analysis model occurs by analyzing communications and liaison content, allows staff to filter out
Interference information, its flow are:
3.1st, the chat content of existing case is identified by manual type based on TensorFlow, builds training class case
Model, class case model include but is not limited to:Be involved in drug traffic communications and liaison training pattern, relate to yellow communications and liaison training pattern, gun-related communications and liaison training pattern;
3.2nd, from the original communications and liaison content of Mobile Phone Forensics extracting data;Including short message, instant messaging chat content, micro-
Rich, mail etc.;
3.3rd, using the class case model trained in 3.1, the business usage scenario of communications and liaison content in 3.2 is intelligently studied and judged;
3.4th, analysis result is preserved.
Into S4 steps;
S4:Analysis result is shown:The analysis result of the information verification obtained in S3 is shown taking human as dimension.
Embodiment two:
The present invention also provides a kind of information verification terminal device, including memory, processor and is stored in the storage
In device and the computer program that can run on the processor, this hair is realized during computer program described in the computing device
Step in bright embodiment above method embodiment, such as the method and step of the step shown in Fig. 1-Fig. 5.
Further, can be desktop PC, pen as an executable scheme, described information terminal verification equipment
The computing devices such as note sheet, palm PC and cloud server.Described information terminal verification equipment may include, but be not limited only to, place
Manage device, memory.It will be understood by those skilled in the art that the composition structure of above- mentioned information terminal verification equipment is only information core
The example of terminal device is looked into, does not form the restriction to information verification terminal device, can be included more more or less than above-mentioned
Part, some parts or different parts are either combined, such as described information terminal verification equipment can also be defeated including inputting
Go out equipment, network access equipment, bus etc., the embodiment of the present invention is not limited this.
Further, as an executable scheme, alleged processor can be CPU (Central
Processing Unit, CPU), it can also be other general processors, digital signal processor (Digital Signal
Processor, DSP), it is application specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing
Into programmable gate array (Field-Programmable Gate Array, FPGA) or other PLDs, divide
Vertical door or transistor logic, discrete hardware components etc..General processor can be microprocessor or the processor
Can be any conventional processor etc., the processor is the control centre of described information terminal verification equipment, and utilization is various
The various pieces of interface and the whole information verification terminal device of connection.
The memory can be used for storing the computer program and/or module, and the processor is by running or performing
The computer program and/or module being stored in the memory, and the data being stored in memory are called, described in realization
The various functions of information verification terminal device.The memory can mainly include storing program area and storage data field, wherein, deposit
Storing up program area can storage program area, the application program needed at least one function;Storage data field can be stored according to mobile phone
Use created data etc..In addition, memory can include high-speed random access memory, non-volatile deposit can also be included
Reservoir, such as hard disk, internal memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital
(Secure Digital, SD) block, flash card (Flash Card), at least one disk memory, flush memory device or its
His volatile solid-state part.
The present invention also provides a kind of computer-readable recording medium, and the computer-readable recording medium storage has computer
Program, the computer program realizes the above method of embodiment of the present invention when being executed by processor the step of.
If module/unit of described information terminal verification integration of equipments realized in the form of SFU software functional unit and as
Independent production marketing in use, can be stored in a computer read/write memory medium.Based on such understanding, sheet
All or part of flow in above-described embodiment method is realized in invention, and the hardware of correlation can also be instructed by computer program
To complete, described computer program can be stored in a computer-readable recording medium, and the computer program is by processor
During execution, can be achieved above-mentioned each embodiment of the method the step of.Wherein, the computer program includes computer program code,
The computer program code can be source code form, object identification code form, executable file or some intermediate forms etc..Institute
Stating computer-readable medium can include:Can carry any entity or device of the computer program code, recording medium,
USB flash disk, mobile hard disk, magnetic disc, CD, computer storage, read-only storage (ROM, Read-Only Memory), arbitrary access
Memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..Need
Bright, the content that the computer-readable medium includes can be entered according to legislation in jurisdiction and the requirement of patent practice
The appropriate increase and decrease of row, such as in some jurisdictions, according to legislation and patent practice, computer-readable medium does not include electricity and carried
Ripple signal and telecommunication signal.The present invention a kind of information verification method, terminal device and storage medium, advised by combing miscellaneous service
Then, with reference to a large amount of basic resource information, personnel's information of automation is completed with computer program and the excavation of clue is extracted, quickly
Suspicion object and Key thread corresponding to positioning, realize with the one-stop information verification that " look for people, look for clue " is target, can be with
Staff's repetitive operation burden is effectively reduced, improves the operating efficiency of staff.A variety of analysis models are proposed, are drawn
Enter artificial intelligence deep learning algorithm, the comprehensive information and hint information for portraying verification object, realize preferable information verification
Effect.It is illustrated in figure 6 the verification condition intelligent Matching schematic diagram that the embodiment of the present invention is applied to searching products intelligently;Fig. 7 institutes
It is shown as the schematic diagram of information verification result of the embodiment of the present invention.
Although specifically showing and describing the present invention with reference to preferred embodiment, those skilled in the art should be bright
In vain, do not departing from the spirit and scope of the present invention that appended claims are limited, in the form and details can be right
The present invention makes a variety of changes, and is protection scope of the present invention.
Claims (10)
- A kind of 1. information verification method, it is characterised in that:Comprise the following steps:S1:Verification condition intelligent Matching, obtain keyword:Condition value, data corresponding to intelligent Matching to input value are verified in input Type, and keyword extraction is carried out to input value according to the data type matched, into S2 steps;S2:Retrieval obtains raw information record:Data type and keyword, retrieval obtain according to corresponding to the input value obtained in S1 Raw information is taken to record, into S3 steps;S3:Various dimensions information analysis is handled:Analysis model corresponding to calling carries out various dimensions letter to the raw information obtained in S2 Breath analyzing and processing, the analysis result of information verification is obtained, into S4 steps;S4:Analysis result is shown:The analysis result of the information verification obtained in S3 is shown taking human as dimension.
- 2. information verification method as claimed in claim 1, it is characterised in that:In S1, verification condition is divided into account type and interior Two kinds of appearance type, account type carry out intelligent Matching using regular expression, and content type carries out intelligent Matching using characteristic matching.
- 3. information verification method as claimed in claim 2, it is characterised in that:In S1, data corresponding to account type verification condition Type includes but is not limited to:Cell-phone number, identification card number, mailbox, bank's card number and license plate number;Number corresponding to content type verification condition Include but is not limited to according to type:Virtual identity, name, place name and organization.
- 4. information verification method as claimed in claim 2, it is characterised in that:In S3, various dimensions information analysis processing, analysis Dimension includes three dimensions:1st, direct suspect:Account is directly under the jurisdiction of some suspect corresponding to verification condition;2nd, relation is disliked Doubt people:Good friend or communications and liaison object of the account corresponding to verification condition for some suspect;3rd, content type clue:Including verification condition Occurred in appearance type data.
- 5. information verification method as claimed in claim 4, it is characterised in that:In S3, analysis model corresponding to three dimensions is: Analysis model corresponding to direct suspect is that personnel's information is portrayed;Analysis model corresponding to relation suspect is incidence relation point Analysis;Analysis model corresponding to content type clue is analyzed for usage scenario.
- 6. information verification method as claimed in claim 5, it is characterised in that:In S3, personnel's information portrays analysis model flow For:1.1st, from the essential information of personnel, extract real identity attribute, and source and credible is stamped for its identity attribute Scale label;1.2nd, according to the identity attribute information obtained in 1.1, on the basis of the various information resource databases comprising case information, divide The case-involving clue of precipitation personnel;1.3rd, according to the identity attribute information obtained in 1.1, on the basis of the various information resource databases comprising case information, divide The case-involving relation of precipitation personnel;1.4th, analysis result is preserved.
- 7. information verification method as claimed in claim 5, it is characterised in that:In S3, incidence relation analysis analysis model passes through The network of personal connections of suspect and verification object is analyzed further to verify, and its flow is:2.1st, by the analysis of the communications and liaison frequency, navigate to and verification object close relationship people the most;2.2nd, the analysis of passage time relation, the party with verification object communications and liaison time anomaly is navigated to;2.3rd, by the analysis of areal relation, specific region or the party that can be implemented are navigated to;2.4th, analysis result is preserved.
- 8. information verification method as claimed in claim 5, it is characterised in that:In S3, usage scenario analysis analysis model passes through The usage scenario of communications and liaison content appearance is analyzed, allows staff to filter out interference information, its flow is:3.1st, by the chat content of existing case, identified by manual type, build training class case model, class case model include but It is not limited to:Be involved in drug traffic communications and liaison training pattern, relate to yellow communications and liaison training pattern, gun-related communications and liaison training pattern;3.2nd, from the original communications and liaison content of Mobile Phone Forensics extracting data;3.3rd, using the class case model trained in 3.1, the business usage scenario of communications and liaison content in 3.2 is intelligently studied and judged;3.4th, analysis result is preserved.
- 9. a kind of information verification terminal device, including memory, processor and it is stored in the memory and can be described The computer program run on processor, it is characterised in that:Such as right is realized described in the computing device during computer program It is required that the step of 1-8 methods describeds.
- 10. a kind of computer-readable recording medium, the computer-readable recording medium storage has computer program, and its feature exists In:Realized when the computer program is executed by processor such as the step of claim 1-8 methods describeds.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710960967.8A CN107870988A (en) | 2017-10-17 | 2017-10-17 | A kind of information verification method, terminal device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710960967.8A CN107870988A (en) | 2017-10-17 | 2017-10-17 | A kind of information verification method, terminal device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107870988A true CN107870988A (en) | 2018-04-03 |
Family
ID=61752892
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710960967.8A Pending CN107870988A (en) | 2017-10-17 | 2017-10-17 | A kind of information verification method, terminal device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107870988A (en) |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108536855A (en) * | 2018-04-17 | 2018-09-14 | 厦门市美亚柏科信息股份有限公司 | Mobile communications device evidence collecting method and system |
CN109558497A (en) * | 2018-12-04 | 2019-04-02 | 珠海市新德汇信息技术有限公司 | A kind of body of data investigation analysis method |
CN109558488A (en) * | 2018-11-30 | 2019-04-02 | 重庆市千将软件有限公司 | Based on data to the multi dimensional analysis method of criminal offence |
CN109635099A (en) * | 2018-12-21 | 2019-04-16 | 山东华夏高科信息股份有限公司 | Case-involving electronic data evidence obtaining management system |
CN110557466A (en) * | 2019-09-11 | 2019-12-10 | 北京明略软件系统有限公司 | data processing method and device, electronic equipment and storage medium |
CN112597238A (en) * | 2020-12-17 | 2021-04-02 | 北京以萨技术股份有限公司 | Method, system, device and medium for establishing knowledge graph based on personnel information |
CN112948224A (en) * | 2019-12-23 | 2021-06-11 | 深圳市明源云科技有限公司 | Data processing method, device, terminal and storage medium |
CN112990980A (en) * | 2021-04-09 | 2021-06-18 | 厦门市美亚柏科信息股份有限公司 | Evidence obtaining data-based black grey product advertisement identification method and system |
WO2023197725A1 (en) * | 2022-04-14 | 2023-10-19 | 厦门市美亚柏科信息股份有限公司 | Same-type label data prediction method, terminal device, and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130204880A1 (en) * | 2012-02-06 | 2013-08-08 | Fis Financial Compliance Solutions, Llc | Methods and systems for list filtering based on known entity matching |
CN103425704A (en) * | 2012-05-24 | 2013-12-04 | 阿里巴巴集团控股有限公司 | Application interface providing method and application interface providing device |
CN104572615A (en) * | 2014-12-19 | 2015-04-29 | 深圳中创华安科技有限公司 | Method and system for on-line case investigation processing |
CN105574172A (en) * | 2015-12-17 | 2016-05-11 | 北京锐安科技有限公司 | Data analysis method and analysis system |
CN107247743A (en) * | 2017-05-17 | 2017-10-13 | 安徽富驰信息技术有限公司 | A kind of judicial class case search method and system |
-
2017
- 2017-10-17 CN CN201710960967.8A patent/CN107870988A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130204880A1 (en) * | 2012-02-06 | 2013-08-08 | Fis Financial Compliance Solutions, Llc | Methods and systems for list filtering based on known entity matching |
CN103425704A (en) * | 2012-05-24 | 2013-12-04 | 阿里巴巴集团控股有限公司 | Application interface providing method and application interface providing device |
CN104572615A (en) * | 2014-12-19 | 2015-04-29 | 深圳中创华安科技有限公司 | Method and system for on-line case investigation processing |
CN105574172A (en) * | 2015-12-17 | 2016-05-11 | 北京锐安科技有限公司 | Data analysis method and analysis system |
CN107247743A (en) * | 2017-05-17 | 2017-10-13 | 安徽富驰信息技术有限公司 | A kind of judicial class case search method and system |
Non-Patent Citations (1)
Title |
---|
王凡: "公安缉毒排查系统的研究与实现", 《中国优秀硕士学位论文全文数据库》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108536855A (en) * | 2018-04-17 | 2018-09-14 | 厦门市美亚柏科信息股份有限公司 | Mobile communications device evidence collecting method and system |
CN109558488A (en) * | 2018-11-30 | 2019-04-02 | 重庆市千将软件有限公司 | Based on data to the multi dimensional analysis method of criminal offence |
CN109558497A (en) * | 2018-12-04 | 2019-04-02 | 珠海市新德汇信息技术有限公司 | A kind of body of data investigation analysis method |
CN109635099A (en) * | 2018-12-21 | 2019-04-16 | 山东华夏高科信息股份有限公司 | Case-involving electronic data evidence obtaining management system |
CN110557466A (en) * | 2019-09-11 | 2019-12-10 | 北京明略软件系统有限公司 | data processing method and device, electronic equipment and storage medium |
CN112948224A (en) * | 2019-12-23 | 2021-06-11 | 深圳市明源云科技有限公司 | Data processing method, device, terminal and storage medium |
CN112948224B (en) * | 2019-12-23 | 2023-10-10 | 深圳市明源云科技有限公司 | Data processing method, device, terminal and storage medium |
CN112597238A (en) * | 2020-12-17 | 2021-04-02 | 北京以萨技术股份有限公司 | Method, system, device and medium for establishing knowledge graph based on personnel information |
CN112990980A (en) * | 2021-04-09 | 2021-06-18 | 厦门市美亚柏科信息股份有限公司 | Evidence obtaining data-based black grey product advertisement identification method and system |
WO2023197725A1 (en) * | 2022-04-14 | 2023-10-19 | 厦门市美亚柏科信息股份有限公司 | Same-type label data prediction method, terminal device, and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107870988A (en) | A kind of information verification method, terminal device and storage medium | |
CN109816397B (en) | Fraud discrimination method, device and storage medium | |
US9348934B2 (en) | Systems and methods for facilitating open source intelligence gathering | |
CN107992746A (en) | Malicious act method for digging and device | |
CN112487208B (en) | Network security data association analysis method, device, equipment and storage medium | |
CN107273752B (en) | Vulnerability automatic classification method based on word frequency statistics and naive Bayes fusion model | |
CN111680153A (en) | Big data authentication method and system based on knowledge graph | |
CN107733902A (en) | A kind of monitoring method and device of target data diffusion process | |
CN111414740B (en) | Electronic experiment record book report generation system | |
CN110519264A (en) | Tracking source tracing method, device and the equipment of attack | |
CN108268886A (en) | For identifying the method and system of plug-in operation | |
CN112861056A (en) | Enterprise website construction information display and release system and method | |
CN107644106A (en) | The internuncial method of automatic mining business, terminal device and storage medium | |
CN112291261A (en) | Network security log audit analysis method driven by knowledge graph | |
Brahimi et al. | Mapping the Scientific Landscape of Metaverse Using VOSviewer and Bibliometrix | |
CN109672586A (en) | A kind of DPI service traffics recognition methods, device and computer readable storage medium | |
CN117150138A (en) | Scientific and technological resource organization method and system based on high-dimensional space mapping | |
CN107608965A (en) | Extracting method, electronic equipment and the storage medium of books the names of protagonists | |
CN110457009B (en) | Method for realizing software security requirement recommendation model based on data analysis | |
CN109918420A (en) | A kind of rival's recommended method, server | |
CN116228402A (en) | Financial credit investigation feature warehouse technical support system | |
CN113065126B (en) | Personal information compliance method and device based on distributed data sandbox | |
CN105786929A (en) | Information monitoring method and device | |
CN112365248B (en) | Method and system for analyzing digital currency transaction path | |
CN114237798A (en) | Data processing method, device, server and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180403 |