CN102355664A - Method for identifying and matching user identity by user-based social network - Google Patents
Method for identifying and matching user identity by user-based social network Download PDFInfo
- Publication number
- CN102355664A CN102355664A CN2011102263262A CN201110226326A CN102355664A CN 102355664 A CN102355664 A CN 102355664A CN 2011102263262 A CN2011102263262 A CN 2011102263262A CN 201110226326 A CN201110226326 A CN 201110226326A CN 102355664 A CN102355664 A CN 102355664A
- Authority
- CN
- China
- Prior art keywords
- user
- telecom operators
- telephone number
- communication
- centerdot
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Telephonic Communication Services (AREA)
Abstract
The invention discloses a user identification and matching method and a user identification and matching system for a telecom operator, an email service provider, an instant message service provider and a social network service provider. The method and the system comprises the three parts of user data acquisition, user characteristic extraction and identity database construction, and user identification and matching. In the method and the system, user identity characteristics are identified according to the communication characteristics of a user, and the most important user identity characteristic is that the user connects a plurality of groups which are independent of one another. The method and the system can be used for identifying and analyzing the conversion of the user among different service providers, and also can be used for identifying and monitoring suspicious characters by security departments.
Description
Technical field
The present invention relates to the communications field and e-commerce field, particularly a kind of method and apparatus to user identity identification and coupling.
Background technology
Here said user's identification and coupling are meant through limited telex network behavioral data differentiation and use whether the user of different accounts is same people.With telecom operators is example, and the main purpose of user identity identification is to judge whether that same people is using or once using a plurality of different telephone numbers.Said different telephone number possibly provide service by same telecom operators, also possibly service is provided by different telecom operators.Major applications is to be example with telecom operators among this paper, yet its range of application is not limited to the telephone subscriber identity identification and coupling of telecom operators.For example, this method also can be used to discern and the user identity that mates Email, instant communication software, microblogging with device.
Along with the telecommunications industry intensification of competition, the telephone subscriber turns to from net and uses the service frequency of other operators to increase gradually.The telephone subscriber changes operator and means that said user changes potential customers into by the existing client of operator, and owing to can not discern telephone subscriber's identity, makes that telecom operators are difficult to propagate and serve to potential customers targetedly.In addition, the telephone subscriber often possibly use two phones as transition when decision conversion operator simultaneously, with the continuity of guaranteeing and existing contact person links up.If telecom operators can discern the telephone subscriber timely and effectively and use two phones at the same time, help telecom operators and take measure targetedly that the telephone subscriber who is about to change operator is kept.Even some telephone subscriber perhaps from the attraction of other preferential policies, also possibly change telephone number in same telephone operator inside from the consideration of using more preferential tariff package.If telecom operators can not find to use the actual same people of being of telephone subscriber of different telephone numbers, this also will make telecom operators successional service not to be provided for this telephone subscriber.Main purpose to telephone subscriber identity identification is, makes telecom operators can focus be put on man understand and service is provided the telephone subscriber.
In the sociology field; The researcher from the angle of enterprise or individual's social capital just the enterprise community network or personal accomplishment go-between connect two and do not have the phenomenon of the network of direct correlation to further investigate, Ronald Burt is referred to as it " structural hole " (structural hole).Yet, the notion of utilizing " structural hole " to the individuality in the community network discern with the research of mating also beyond example.
Summary of the invention
Communication user is as the social man, the different identity of in different groups, playing the part of, the contextual definition of communication user in society the identity of communication user.This method is discerned and coupling subset owner identification through the social networks analysis to communication user.The basic thought of this method is to consider from following: communication user is because different identity is in somely has among the circle that is closely connected, and for example relatives' circle, circle of friends, colleague's circle, classmate's circle, clubbite enclose ...Exists between the inner member of each circle to be closely connected, concern not too closely between the member of different circles, even do not know each other mutually and be in.That is to say that there are some contact persons that are closely connected in said communication user, do not have contact closely between these contact persons.Under this meaning, said communication user becomes the bridge of the different circles of contact.And because the particularity of personal story, the different communication user has got in touch different circles as bridge, has particularity, and we can utilize this characteristic as characteristic communication user to be discerned.
The advantage of this method is that whole communications records that telecom operators needn't obtain the telephone subscriber also can discern and mate user identity.Can intuitively imagine, certain communication user A also keeps close ties with the present still good friend C at certain little county town, local simultaneously because work relationship is got to know good friend B in the place of working.Because difference in geographical location and social class's difference is not known each other between the good friend B of this communication user and the good friend C probably mutually, and this communication user becomes the unique bridge that connects between B and the C.Telecom operators only need know that certain telephone number keeps close ties with B and C at the same time, just can be used by user A by this telephone number of more safe judgement.Even A has repeatedly changed telephone number, making that telecom operators also can be quite sure judges that these numbers are all had by user A.And; Even user A has up to a hundred contact persons; But telecom operators only need the communications records between telephone subscriber A and B and the C, and the communications records between telephone subscriber A and other telephone subscribers of forgetting it, telecom operators also can make more accurately to be judged.The occupation rate of market of considering any one telecom operators is not 100%, that is to say that any one telecom operation commercial city can not obtain all communications records of all telephone subscribers.This method does not need this advantage of the whole communications records of telephone subscriber, make telecom operators only the internetwork communication record of the communication user of the communication user through other telecom operators and these telecom operators just can discern and mate the user identity of other telecom operators.And; These characteristics of this method make telecom operators can just change telecom operators at communication user, from net or be about to the off-grid starting stage and just can the part communications records through communication user just it discerned rapidly and mate, and launch propaganda work targetedly.
This method is divided into three phases such as data preparatory stage, feature extraction stage and characteristic matching stage.The main purpose of data preparatory stage is from communication network, to extract the communications records data of communication user.The main purpose in feature extraction stage is to set up communication user mingle feature storehouse, utilizes historical communications records, according to the social networks information of communication user each communication user is characterized, and sets up communication user mingle feature database.In the characteristic matching stage, extract the communications records of some particular account number, according to the communications records of these numbers of the account its this number of the account and existing user identity property data base are complementary.
The flow process of three phases such as the data preparatory stage that this method comprised, feature extraction stage and characteristic matching stage specifically is divided into 101~103 3 steps as shown in Figure 1:
101. extract the communication history record of communication user.Telecom operators from the perhaps needs of system maintenance that charge, have accumulated a large amount of communication history records in internal system when for the user communication service being provided.These communication history records include but not limited to following communications records: the communications records of the employed instant messaging product of multimedia message communications records, user between the voice communication record between the user, the record of the short message communication between the user, user.Communications records between these users will become the data basis of this method.
Set up communication user mingle feature database 102. utilize communications records.Based on user's historical communications records, extract the social relationships that can represent and discern user identity, make up the mingle feature database of communication user based on this.The employed method of this step is described in detail in step 201~204 of accompanying drawing 2 and correspondence.
103. in communication user mingle feature database coupling with inquire about the similar history of number of the account mingle feature of the communicating by letter interested number of the account of communicating by letter.In case set up according to the historical communications records of communication user after the mingle feature database of communication user; Telecom operators can to newly-increased telephone number according to its mingle feature in the historical mingle feature database of communication user these newly-increased numbers of identification whether with feature database in historical telephone number be complementary, respectively shown in the illustrated method of accompanying drawing 3 and accompanying drawing 4.The method of accompanying drawing 3 and corresponding step 301~305 is described the sign whether user that telecom operators differentiate Add User source and these telecom operators of other telecom operators according to the internetwork communication record of its and other telecom operators loss occurs being about to.The method of accompanying drawing 4 and corresponding step 401~404 is described telecom operators and is utilized communication user mingle feature database to differentiate its source that Adds User.And; Based on the described technology of this method; Can make up the responsive personage's (for example suspect) that possibly change telephone number the telephone number changing and the real-time tracking and the warning system of use, its concrete steps are as as described in accompanying drawing E and step 501~505.
After having obtained the behavior communication data of communication user, need set up the behavioral characteristic database of communication user according to the user's communications behavioral data.The purpose of this method is to find that communication user is unique, stable, that be difficult to forge and behavioral characteristic database that can the relatively accurate communication user behavioural characteristic that the user is discerned make up communication user.And the contacts of communication user relation is a communication user behavioural characteristic that can satisfy above-mentioned requirements.This method will be described the communication behavior property data base that the communication behavior that how to utilize communication user makes up communication user, specifically describe as as described in step 201~204:
201., calculate the relation intensity between each communication user and other communication users according to communications records.Whether there is contact between two communication users, can be according to whether existing the information of communications records to judge between two phones.Contact between two communication users can think then that more for stablizing closely the relation intensity between two communication users is strong more.Here do not advise using the tolerance of indexs such as the duration of call, talk times as relation intensity between two communication users.Because this index of communication time is closely related with individual's communication custom.And, but do not set up long-term and stable social bond between two communication users because two communication users of some accidental causes possibly have long communication in a short time.For example; Communication user when the finishing new house maybe and the master worker of finishing team between produced a large amount of communication; But just seldom contact between them after finishing finishes, such contact can not provide enough useful informations for identification in future and coupling communication user.At this, the relationship strength that we define between two communication user A, the B is:
Each time interval possibly got 1 day, 1 week, January ...Wherein 0≤α≤1 is attenuation coefficient.When α=0, have only a nearest time interval influential to both relationship strength.When α=1, this intensity is represented nearest t, and (t day, t week, t are in the month recently in the time period ...) associated between the two time period number.For example α suggestion value is 0.9.And the definition of the gap length of each time period can be according to the characteristics decision of communication service self.In the practical implementation process, the definition of the relation intensity between two communication users can further be optimized.
202. the screening communications records, deletion is not suitable for use in the node and the limit of user identity identification.Suppose that certain communication user has d contact person, then any two tlv triple that the contact person formed (triad) by said communication user, said communication user possibly make up for total d (d-1)/2 kind.And for the telephone number that is used for public service, be used for telemarketing commercial numbers such as telephone number probably in a period of time correlate in ten thousand phone number; Such telephone number has hundreds of millions of possible tlv triple, with the computational resource and the storage resources of labor.So, be necessary ability according to system, to the too much telephone number of contact person, just spend big node and treat with a certain discrimination.Equally; Deleting those relation intensity is not very strong limit; Just delete those and be not suitable for use in following identification and more weak the getting in touch of intensity of mating the communication user identity, such contact possibly be occurrent, and the possibility that following both sides continue to get in touch is less.In practice, for each communication user, just how many bar limits of each node reservation will be determined by the scale of network and the computing capability of system.The suggestion of an experience is only to keep for each node to be no more than 50 limits.
203. calculate the intensity of communication user as the bridge that connects other two communication users.Suppose that node n has got in touch node n simultaneously
1With node n
2, then node n is with node n
1With node n
2Relation intensity constituted the characteristic of node n.If node n is with node n
1And node n
2Relation intensity be respectively
Then node n is as bridge connected node n
1And node n
2Intensity
Definition should be satisfied following characteristic:
B).
Approaching more, then bigger (purpose of this characteristic is to have the consideration of different communication customs from the different communication user to the intensity of this bridge, if node n is with node n
1And node n
2Relation intensity similar, he is described and between the two);
C) if. node n
1With node n
2Between relation intensity
More, then bigger (purpose that proposes this characteristic is to consider from following to the intensity of this bridge: if node n
1With node n
2Between have contact, then n, n
1, n
2The three maybe be in being in same circle, all might have contact between a lot of communication users in this circle, is difficult to according to contact identification between the inner communication user of this social networks and coupling communication user).
In order to satisfy above-mentioned characteristic, defined node n is as bridge connected node n
1And node n
2Intensity
As follows:
In the formula
Be that node n is as bridge connected node n
1And node n
2Intensity,
It is respectively the bonding strength between the respective nodes.In order to satisfy characteristic b), used the expression way of similar information entropy in the definition.In order to satisfy characteristic c); In the formula
taken the logarithm as denominator; And "+1.01 " in the logarithm are negative or 0 to occur for fear of denominator; β is a constant in the denominator, regulates
influence to
.Can find out to have following character for the non-directed graph bridge length by above-mentioned formula:
204. as variable, as value, node is characterized with bridge intensity with the point at bridge two ends.For any one communication user corresponding nodes n, the number of degrees of node are d
nAnd n exists the node of contact to do
Then the mingle feature of this communication user is represented with following vector:
With there is the node of getting in touch in all with n in the following formula
Existing combination
Be designated as Con (n), then two node m, the corresponding mingle feature v of n
m, v
nBetween similarity can define as follows with the cosine similarity:
But v is used in suggestion in application in practice
m, v
nBetween inner product<v
mV
n>As measuring similarity between m, the n, that is:
Work as v
m, v
nBetween similarity similar (v
m, v
n) when big more, m, n are that same user's possibility is big more.In concrete practice process, be necessary the similarity formula between m, the n is necessarily improved and optimizes.
Other improvement: for node n described in the formula (2) as bridge connected node n
1And node n
2Intensity
Can be optimized, use
Represent as follows:
Also promptly, if a plurality of nodes are arranged simultaneously as bridge connected node n
1And node n
2, n then
1N
2Ability as the characteristic of the identity of differentiating node n will weaken greatly.So the definition that the definition of formula (7) can place of equation (2) is used for making up through optimizing user's mingle feature vector.
Along with the telecommunications service permeability is tending towards saturated, the increasingly sharpening of telecommunications industry competition, a lot of telecommunication users receive other telecom operators more high-quality or preferential service attraction and turn to the service of using other telecom operators from net from existing telecom operators.Use the internetwork communication record of user's communication behavior property data base constructed in this method and telecom operators and other telecom operators; Can help telecom operators to analyze the source that Adds User of other telecom operators; Thereby analyze the whereabouts of these telecom operators from network users; And improve self operation and service in view of the above targetedly, its concrete grammar is shown in accompanying drawing 3 and step 301~305:
301. telecom operators are according to the telephone subscriber's of the telephone subscriber of other telecom operators and this telecom operators internetwork communication record, the telephone number storehouse of maintaining other telecom operators.Some telephone numbers in the phone number list of other telecom operators, newly occurred, perhaps the long-term sluggish telephone number of some of other telecom operators reactivates, a collection of telephone subscriber that then might mean other telecom operators' new developments.
302. extract the communications records of the newly-increased telephone number of other telecom operators and these telecom operators, the method according to 201~204 uses formula (1)~formula (4) to make up the mingle feature vector of the newly-increased telephone number of these other telecom operators.
303. utilize formula (6), calculate the similarity degree between the newly-increased telephone number of other telecom operators and these telecom operators telephone number.For each telephone number k, choose this telecom operators telephone number i the most close with it.If both similarities greater than certain threshold value the telephone number of these these telecom operators get into and further investigate tabulation.
If 304. fluctuation appears in the conversation behavior of above-mentioned tabulation telephone number.These wave phenomenons include but not limited to following situation: suspension, phone are nullified, the call volume fall surpasses certain threshold value, note amount fall surpasses certain threshold value, the network traffics fall surpasses certain threshold value.Telephone subscriber in the then above-mentioned tabulation has bigger assurance to be judged as soon from netting the service of perhaps having left net, having turned to other telecom operators of use.
305. the telephone subscriber for take place changeing net in these telecom operators probably takes appropriate measures, for example: through Customer Service Center's contact and investigate this part telephone subscriber find out they from the net reason; This part telephone subscriber is taked to show loving care for targetedly and keeps measure.
New user is being greatly developed in the telecom operation commercial city now; But these new users have certain customers to change net by the user of former rival operator; It is real Adding User that certain customers are arranged; And certain customers are arranged are the historic customer change telephone numbers by these telecom operators; If can not effectively distinguish the source that increases the telephone subscriber newly then the effect that can not effectively assess new user's development policies, can not effectively lasting service be provided for the telephone subscriber who has changed telephone number.The user's mingle feature storehouse that utilizes this method to propose can help the source of the newly-increased telephone customer of telecom operators' effective recognition, as described in accompanying drawing 4 and step 401~404:
401. telecom operators obtain the new adding networking user's of these telecom operators telephone number from channels such as business operation support system, CRM systems.
402. extract the communications records of new networking telephone number, the method according to 201~204 uses formula (1)~formula (4) to make up the mingle feature vector of this new networking telephone number.
The mingle feature storehouse of the historical telephone number of the mingle feature vector sum of telephone number compares 403. will newly network, and calculates the similarity between new networking telephone number and the historical telephone number according to formula (6).Historical telephone number comprises not only that the historical telephone number of these telecom operators also comprises according to what the internetwork communication record obtained provides the telephone number of service by other telecom operators.
404. judge new networking user source according to the similarity of new networking telephone number and historical telephone number, new networking user is divided into several types: the existing user of these telecom operators, other telecom operators of changing number change network users, Add User purely.The business intelligence analysis report of new networking user's source analysis is provided.
The another one purposes of the said method and apparatus of this patent is at public safety field, to suspect's identification and monitoring.The suspect that the suspect is especially fugitive gets in touch through regular meeting's conversion telephone number and its contact person.If the suspect All Contacts is carried out manual monitoring and can there be a lot of problems in monitoring: (1) artificial monitoring and monitoring need the time and the manpower of labor, and accuracy rate is not high; (2) promptness of manual monitoring and monitoring is very poor; (3) Ren Gong monitoring and the privacy of monitoring meeting infringement much human, such method is difficult to obtain jural permission.Utilize the said method and apparatus of this patent can draw a circle to approve the scope of suspect's possible telephone number after changing automatically,, thereby can effectively avoid above-mentioned variety of issue because all work are accomplished by computer automatically.Its concrete grammar is as as described in accompanying drawing 5 and step 501~505:
501. public security department obtains to telecom operators the suspect to be provided historical telephone number after the relevant law approval.
502. telecom operators obtain the communications records of the historical telephone number of suspect from historical communications records.
503. the historical communications records of the historical telephone number s of telecom operators through the suspect are like its mingle feature vector of structure as described in formula (2)~(4)
504. telecom operators are provided with the early warning rule on communication equipment, screen doubtfully currently to use telephone number by the suspect.The early warning rule is provided with as follows: extract suspect s mingle feature vector v
sThe maximum some variablees of middle weight
And corresponding contact person combination { s
1S
2... S
iS
j, when any one telephone number p and contact person make up s
iS
jIn s
iWith s
jAll get in touch, then this telephone number p is added in the doubtful telephone number inventory of suspect s, so that next step carries out more deep investigation.
505. the technical staff of telecom operators carries out artificial judgment to the suspicious call number that is produced by system, filters out the telephone number of the most possible current use of suspect, and according to legal procedure the communications records of this telephone number is transferred public security department.The standard of the technical staff of telecom operators foundation when the suspicious call number that is produced by system is carried out artificial judgment comprises the networking duration of judging this suspicious call number, historical number of communications of this suspicious call number and expense etc.The communications records that the suspicious call number of technical staff's artificial screening will pass through in telecom operators move down the peace department of handing over to the collective or the state in the guidance of law, are further analyzed by public security department.
Description of drawings:
Fig. 1 is user identity identification and coupling overall flow figure;
Fig. 2 is that the communication user mingle feature extracts flow chart;
Fig. 3 is that telecom operators leave network users whereabouts identification process figure.
Fig. 4 is the new networking user of the telecom operators identification process figure that originates.
Fig. 5 is suspicious user identification and monitoring flow chart automatically.
Claims (5)
1. the social networks based on the user that can be used for telecom operators, email service provider, instant message service provider, social networking service provider and security fields utilizes a spot of user behavior data that user identity is quick and precisely discerned and the method and apparatus that mates, and the core of its method and apparatus comprises:
To the identification of incidence relation between the user,
To the definition of incidence relation intensity between the user,
To the user screening that is not suitable for this method and device,
To the customer relationship screening that is not suitable for use in user characteristics,
To the user associate definition and the sign of relationship characteristic and make up communication user mingle feature database,
Coupling and identification to user characteristics.
2. the system that makes up in order to realize the said function of claim 1 comprises: from the operation system of telecom operators, extract the communication history record of communication user, the function of utilizing communications records to set up communication user mingle feature database and the characteristic in unknown subscriber and the communication user mingle feature database is complementary.
3. utilize Add User source and discern the user of these telecom operators of user's mingle feature information bank as claimed in claim 1 identification rival telecom operators from the net sign and from the net whereabouts, and in order to reach the system that comprises following functional module of the required structure of this purpose:
Find the module of the newly-increased telephone number of other telecom operators according to message registration between net;
Extract the module of the newly-increased telephone number of other telecom operators and these communications records;
The module of being compared in the mingle feature storehouse of the telephone number of these telecom operators of mingle feature vector sum of the newly-increased telephone number of other telecom operators.
4. utilize newly the network system in telephone number source of these telecom operators of user's mingle feature information bank as claimed in claim 1 identification.
5. utilize the method for user behavior characteristic vector as claimed in claim 1 to help telecom operators to seek and a kind ofly can be under the prerequisite of the privacy of protecting the telephone subscriber to greatest extent comprise following function for security department in time finds the method and system of the employed new telephone number of suspect:
Telecom operators from historical communications records, obtain the historical telephone number of suspect communications records,
The historical communications records of the historical telephone number of telecom operators through the suspect make up its mingle feature vector,
Telecom operators are provided with the early warning rule on communication equipment, screen doubtfully currently to use telephone number by the suspect.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102263262A CN102355664A (en) | 2011-08-09 | 2011-08-09 | Method for identifying and matching user identity by user-based social network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2011102263262A CN102355664A (en) | 2011-08-09 | 2011-08-09 | Method for identifying and matching user identity by user-based social network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN102355664A true CN102355664A (en) | 2012-02-15 |
Family
ID=45579145
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2011102263262A Pending CN102355664A (en) | 2011-08-09 | 2011-08-09 | Method for identifying and matching user identity by user-based social network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102355664A (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103279713A (en) * | 2013-06-08 | 2013-09-04 | 广西师范大学 | Optimized SNS (social network service) graph data publication privacy protection method |
CN103916244A (en) * | 2013-01-04 | 2014-07-09 | 深圳市腾讯计算机系统有限公司 | Verification method and device |
CN103914494A (en) * | 2013-01-09 | 2014-07-09 | 北大方正集团有限公司 | Method and system for identifying identity of microblog user |
CN104574192A (en) * | 2013-10-25 | 2015-04-29 | 华为技术有限公司 | Method and device for identifying same user from multiple social networks |
CN104933139A (en) * | 2015-06-17 | 2015-09-23 | 中国科学院计算技术研究所 | Social network user identity real-virtual mapping method and device |
CN105243566A (en) * | 2015-10-28 | 2016-01-13 | 联动优势科技有限公司 | Method and apparatus for evaluating credit of users through different mobile phone number information from operators |
CN105306213A (en) * | 2015-09-23 | 2016-02-03 | 中国联合网络通信集团有限公司 | User information processing method and system |
CN105590232A (en) * | 2014-11-11 | 2016-05-18 | 中国移动通信集团广东有限公司 | Client relation generation method and apparatus, and electronic device |
CN105959911A (en) * | 2016-06-22 | 2016-09-21 | 中国联合网络通信集团有限公司 | Method and device for identifying user |
CN106331060A (en) * | 2016-08-12 | 2017-01-11 | 广州市高奈特网络科技有限公司 | Control execution method and system based on WIFI |
CN107403019A (en) * | 2017-08-15 | 2017-11-28 | 重庆邮电大学 | A kind of vehicle owner identification method based on mobile data |
CN108712269A (en) * | 2018-05-30 | 2018-10-26 | 中国联合网络通信集团有限公司 | The method for retrieving and device of off-network user |
CN108920479A (en) * | 2018-04-16 | 2018-11-30 | 国家计算机网络与信息安全管理中心 | For two micro- across information source account recommended methods in one end |
CN110969861A (en) * | 2019-12-20 | 2020-04-07 | 中国移动通信集团黑龙江有限公司 | Vehicle identification method, device, equipment and computer storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030217283A1 (en) * | 2002-05-20 | 2003-11-20 | Scott Hrastar | Method and system for encrypted network management and intrusion detection |
CN1547402A (en) * | 2003-12-11 | 2004-11-17 | �Ϻ���ǰ��Ϣ�Ƽ���չ����˾ | Reverse authentication system and reverse authentication method for identity registration handset short message |
WO2005011305A1 (en) * | 2003-07-31 | 2005-02-03 | Huawei Technologies Co., Ltd. | A optimization mutual method of the user terminal select accessing mobile network in wlan |
CN1889730A (en) * | 2005-09-30 | 2007-01-03 | 华为技术有限公司 | Wireless user identification module, communication terminal equipment and communication control method |
-
2011
- 2011-08-09 CN CN2011102263262A patent/CN102355664A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030217283A1 (en) * | 2002-05-20 | 2003-11-20 | Scott Hrastar | Method and system for encrypted network management and intrusion detection |
WO2005011305A1 (en) * | 2003-07-31 | 2005-02-03 | Huawei Technologies Co., Ltd. | A optimization mutual method of the user terminal select accessing mobile network in wlan |
CN1547402A (en) * | 2003-12-11 | 2004-11-17 | �Ϻ���ǰ��Ϣ�Ƽ���չ����˾ | Reverse authentication system and reverse authentication method for identity registration handset short message |
CN1889730A (en) * | 2005-09-30 | 2007-01-03 | 华为技术有限公司 | Wireless user identification module, communication terminal equipment and communication control method |
Cited By (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103916244A (en) * | 2013-01-04 | 2014-07-09 | 深圳市腾讯计算机系统有限公司 | Verification method and device |
WO2014106422A1 (en) * | 2013-01-04 | 2014-07-10 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for user authentication |
US9985944B2 (en) | 2013-01-04 | 2018-05-29 | Tencent Technology (Shenzhen) Company Limited | Method and apparatus for user authentication |
CN103914494A (en) * | 2013-01-09 | 2014-07-09 | 北大方正集团有限公司 | Method and system for identifying identity of microblog user |
CN103914494B (en) * | 2013-01-09 | 2017-05-17 | 北大方正集团有限公司 | Method and system for identifying identity of microblog user |
CN103279713A (en) * | 2013-06-08 | 2013-09-04 | 广西师范大学 | Optimized SNS (social network service) graph data publication privacy protection method |
CN103279713B (en) * | 2013-06-08 | 2015-11-18 | 广西师范大学 | A kind of social network diagram data publication method for secret protection of optimization |
CN104574192A (en) * | 2013-10-25 | 2015-04-29 | 华为技术有限公司 | Method and device for identifying same user from multiple social networks |
CN105590232A (en) * | 2014-11-11 | 2016-05-18 | 中国移动通信集团广东有限公司 | Client relation generation method and apparatus, and electronic device |
CN104933139B (en) * | 2015-06-17 | 2018-06-01 | 中国科学院计算技术研究所 | A kind of method and device of social network user identity actual situation mapping |
CN104933139A (en) * | 2015-06-17 | 2015-09-23 | 中国科学院计算技术研究所 | Social network user identity real-virtual mapping method and device |
CN105306213A (en) * | 2015-09-23 | 2016-02-03 | 中国联合网络通信集团有限公司 | User information processing method and system |
CN105243566A (en) * | 2015-10-28 | 2016-01-13 | 联动优势科技有限公司 | Method and apparatus for evaluating credit of users through different mobile phone number information from operators |
CN105959911B (en) * | 2016-06-22 | 2019-07-16 | 中国联合网络通信集团有限公司 | Identify the method and device of user |
CN105959911A (en) * | 2016-06-22 | 2016-09-21 | 中国联合网络通信集团有限公司 | Method and device for identifying user |
CN106331060A (en) * | 2016-08-12 | 2017-01-11 | 广州市高奈特网络科技有限公司 | Control execution method and system based on WIFI |
CN106331060B (en) * | 2016-08-12 | 2019-12-31 | 广州市高奈特网络科技有限公司 | WIFI-based deployment and control method and system |
CN107403019A (en) * | 2017-08-15 | 2017-11-28 | 重庆邮电大学 | A kind of vehicle owner identification method based on mobile data |
CN107403019B (en) * | 2017-08-15 | 2020-08-18 | 重庆邮电大学 | Vehicle owner identity recognition method based on mobile data |
CN108920479A (en) * | 2018-04-16 | 2018-11-30 | 国家计算机网络与信息安全管理中心 | For two micro- across information source account recommended methods in one end |
CN108920479B (en) * | 2018-04-16 | 2022-06-17 | 国家计算机网络与信息安全管理中心 | Cross-information-source account recommendation method for two micro terminals |
CN108712269A (en) * | 2018-05-30 | 2018-10-26 | 中国联合网络通信集团有限公司 | The method for retrieving and device of off-network user |
CN110969861A (en) * | 2019-12-20 | 2020-04-07 | 中国移动通信集团黑龙江有限公司 | Vehicle identification method, device, equipment and computer storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102355664A (en) | Method for identifying and matching user identity by user-based social network | |
CN108924333B (en) | Fraud telephone identification method, device and system | |
US10140642B2 (en) | Automated customer engagement and issue location, prediction, and response through utilization of public and private data sources | |
Phadke et al. | Prediction of subscriber churn using social network analysis | |
US9762462B2 (en) | Method and apparatus for providing an anti-bullying service | |
Moreau et al. | Detection of mobile phone fraud using supervised neural networks: A first prototype | |
Mateescu et al. | Social media surveillance and law enforcement | |
CN102083010B (en) | Method and equipment for screening user information | |
Irarrázaval et al. | Telecom traffic pumping analytics via explainable data science | |
Yang et al. | To stay or to leave: Churn prediction for urban migrants in the initial period | |
Nwanga et al. | Impact of big data analytics to Nigerian mobile phone industry | |
CN106936997A (en) | It is a kind of based on the rubbish voice recognition methods of social networks collection of illustrative plates and system | |
Hong et al. | Characterization of internal migrant behavior in the immediate post-migration period using cell phone traces | |
CN113010578A (en) | Community data analysis method and device, community intelligent interaction platform and storage medium | |
Petit et al. | Protective measures and vulnerability indices for the Enhanced Critical Infrastructure Protection Programme | |
Hamdy et al. | Criminal act detection and identification model | |
Sumathi et al. | Crowd estimation at a social event using call data records | |
Ashraf et al. | Visualizations-based analysis of Telco data for business intelligence | |
CN116320159A (en) | Harassment fraud number identification processing method and device, electronic equipment and medium | |
Gursoy et al. | Customer churn behaviour predicting using social network analysis techniques: A case study | |
CN112307075B (en) | User relationship identification method and device | |
Onnela et al. | Investigating population dynamics of the Kumbh Mela through the lens of cell phone data | |
Songailaite et al. | Synthetic Call Detail Records Generator. | |
Dyagilev et al. | On information propagation in mobile call networks | |
Binh et al. | An application of rough set theory to predict telecom customer churn |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
DD01 | Delivery of document by public notice |
Addressee: Zheng Yi Document name: Notification that Application Deemed to be Withdrawn |
|
C02 | Deemed withdrawal of patent application after publication (patent law 2001) | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20120215 |