CN102546272A - Information leakage detection method and device and system utilizing method - Google Patents

Information leakage detection method and device and system utilizing method Download PDF

Info

Publication number
CN102546272A
CN102546272A CN2010105893654A CN201010589365A CN102546272A CN 102546272 A CN102546272 A CN 102546272A CN 2010105893654 A CN2010105893654 A CN 2010105893654A CN 201010589365 A CN201010589365 A CN 201010589365A CN 102546272 A CN102546272 A CN 102546272A
Authority
CN
China
Prior art keywords
information
test subscriber
numbers
real user
calling
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2010105893654A
Other languages
Chinese (zh)
Other versions
CN102546272B (en
Inventor
尚晶
袁向阳
孙少陵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201010589365.4A priority Critical patent/CN102546272B/en
Publication of CN102546272A publication Critical patent/CN102546272A/en
Application granted granted Critical
Publication of CN102546272B publication Critical patent/CN102546272B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention provides an information leakage detection method and a device and a system utilizing the method. The information leakage detection method includes: adding preset tested user information containing tested user numbers into real user information containing real user numbers, and then determining that information is leaked when at least one tested user terminal which corresponds to the tested user numbers is triggered. When fake user numbers are contacted, the fake user terminals are triggered actively correspondingly, so that information leakage is detected and information leakage detection efficiency is improved.

Description

Information leakage detection method, Apparatus and system
Technical field
The present invention relates to the business supporting network technical field, be specifically related to a kind of information leakage detection method, Apparatus and system.
Background technology
For decision-making and the analysis ability that realizes that enterprise is required, a lot of enterprises have all set up the enterprise-level data warehouse, have held the data of enterprise key, comprise customer data, client traffic service recorder, consumption record etc.Enterprise can pass through analysis mining, filters out the user list with certain characteristic, for example characteristic such as high value, new business using tendency height.These user lists can comprise address name, age, telephone number, terminal type etc., are used for customer care, product marketing of enterprise etc.Yet these lists can become expressly when getting into the use link, be distributed to certain channel the client is contacted, for example outgoing call, bulk SMS etc.These plaintext lists just have by the possibility of extensive contact; Become the data that are easy to steal, these are in case leakage can cause privacy of user to be revealed; And the data theft person realizes through contacting with the user that the user instigates rebellion within enemy camp, refuse messages mass-sending etc., and enterprise is brought direct or indirect loss.
In order to protect these customer privacy data, avoid the user to suffer unnecessary harassing and wrecking, can in data warehouse, take a series of secrecy technology usually, like data encryption, digital watermarking etc.Wherein, Data encryption is the treatment technologies of a kind of data on the backstage; Database is through handling the realization data according to common AES and deposit with encrypted test mode part table, part field; Through keeping properly and the regular update key data disclosure of avoiding the back-end data access mode to cause as far as possible.Digital watermarking is the treatment technology that a kind of data (promptly represent link) on the foreground; Through in webpage or document, embedding some shadings that are difficult to revise; Increase the difficulty that the data theft person obtains data in batches; When data are revealed from the foreground and are not removed watermark, can follow the trail of the source of this data disclosure according to information implicit in the digital watermarking such as visitor, access time, visit IP address etc.
Above-mentioned two kinds of data safety management technology exist weak point and the restriction of suitable scene in reality, specific as follows:
For the data encryption mode: the data encrypting and deciphering process is serious to the systematic function influence, and performance impact about 30%, can influence the service level of on-line system usually at present; Data encrypting and deciphering is primarily aimed at the data protection on backstage, and is inapplicable for the data disclosure that produces in foreground and the data use; Can't initiatively find the data disclosure incident;
For the digital watermarking mode:, just can't tracked information reveal the source in case watermark is removed; Can't initiatively find the information leakage incident; Data can't derive reprocessing.
Summary of the invention
First purpose of the present invention is to propose a kind of high-efficiency information leak detection method.
Second purpose of the present invention is to propose a kind of high-efficiency information leak detection apparatus.
The 3rd purpose of the present invention is to propose a kind of high-efficiency information leak detection systems.
For realizing above-mentioned first purpose, the invention provides a kind of information leakage detection method, comprising: in comprising the real user information of real user number, add preset test subscriber's information, test subscriber's information comprises test subscriber's number; When at least one test subscriber terminal corresponding with test subscriber's number is triggered, confirm that information is revealed.
For realizing above-mentioned second purpose, the invention provides a kind of information leakage checkout gear, comprising: processing module, be used for adding preset test subscriber's information in the real user information that comprises the real user number, test subscriber's information comprises test subscriber's number; Detection module when being used for being triggered at least one test subscriber terminal corresponding with test subscriber's number, confirms that information is revealed.
For realizing above-mentioned the 3rd purpose; The invention provides a kind of information leakage detection system; Comprise: the information leakage checkout gear, be used for adding preset test subscriber's information in the real user information that comprises the real user number, test subscriber's information comprises test subscriber's number; When at least one test subscriber terminal corresponding with test subscriber's number is triggered, confirm that information is revealed; At least one test subscriber terminal is used for when being triggered, the work of trigger message leak detection apparatus.
Among each embodiment of the present invention; Through in actual user data, inserting the user data of forging (being test subscriber's information); Subscriber Number in the data falsification is at net state, is contacted in case these forge Subscriber Number, and these forgery user terminals initiatively trigger and carry out the information leakage detection.
Description of drawings
Accompanying drawing is used to provide further understanding of the present invention, and constitutes the part of specification, is used to explain the present invention in the lump with embodiments of the invention, is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is embodiment one flow chart of information leakage detection method of the present invention;
Fig. 2 is embodiment two flow charts of information leakage detection method of the present invention;
Fig. 3 is the example structure figure of information leakage checkout gear of the present invention;
Fig. 4 is the example structure figure of information leakage detection system of the present invention.
Embodiment
Below in conjunction with accompanying drawing the preferred embodiments of the present invention are described, should be appreciated that preferred embodiment described herein only is used for explanation and explains the present invention, and be not used in qualification the present invention.
Method embodiment
Fig. 1 is embodiment one flow chart of information leakage detection method of the present invention.As shown in Figure 1, present embodiment comprises:
Step 102: in comprising the real user information of real user number, add preset test subscriber's information, test subscriber's information comprises test subscriber's number;
Step 104: when being triggered, confirm that information is revealed at least one test subscriber terminal corresponding with test subscriber's number.
Present embodiment is through inserting the user data of forging (being test subscriber's information) in actual user data; Subscriber Number in the data falsification is at net state; In case these are forged Subscriber Number and are contacted, these forgery user terminals initiatively trigger and carry out the information leakage detection.
Fig. 2 is embodiment two flow charts of information leakage detection method of the present invention.As shown in Figure 2, present embodiment comprises:
Step 202: data warehouse carries out the screening of real user; This step mainly is to generate normal list (user wherein is real user); With having the derivation list that is used for concrete business (showing loving care for) now like the user; Be various embodiments of the present invention steps before, should not be construed as the qualification to each embodiment, concrete operations are following:
Data warehouse is through some data digging methods or screening technique (being prior art); Draw user list with some characteristic; As shown in table 1; List can comprise that ID, Subscriber Number, user's base attribute (like name, terminal type and VIP attribute etc.), user's statistical attribute are (like the average every user's income of new business (Average revenue per user, ARPU) etc.);
Table 1
ID Subscriber Number Name VIP belongs to The terminal class New business Recommend industry
Figure BSA00000386839100041
Step 204: according to the information of forging in the user resources information bank; Confirm to forge user's ID, Subscriber Number, base attribute information such as (like name, VIP attribute, terminals etc.); This forgery user is the test subscriber; And add forgery user profile in the real user information of in step 202, selecting, and this forgery user list of deriving incident is charged to daily record.
During concrete operations; Some statistical attributes in the forgery user profile can be derived according to numerical value in the true list and obtained, and for example " new business ARPU " can be " product that mean value adds mean square deviation and [1,1] interval random value "; New business ARPU mean value like real user in the table 1 is 67.47; Mean square deviation is 6.58, supposes that random value is 0.31, and the new business ARPU that then forges the user is 69.5; Forge user list information example such as table 2;
Table 2
Figure BSA00000386839100042
To can being set in each derivation incident (list that promptly comprises real user) as required, one or more forges the user; A plurality of derivation incidents of following the tracks of simultaneously for needs; Suppose that forging total number of users is n; Being used for the number of identified event is m, and the derivation event number that then can follow the tracks of simultaneously is
Figure BSA00000386839100043
During concrete operations, can also obtain various forgery user combinations (form that can show is deposited) according to forging the user, as shown in table 3, forgery user combination is used for order or randomly draws, and guarantees that each forgery user is assigned difference; Combination is assigned with the back state and is used by available being updated to; Because the user exists from operations such as net or transfers, promptly the user has life cycle, and the client of certain number representative can't keep having certain characteristic forever; For example high value, a so list can't be forever useful, through after a while; The protection rank of this list just can reduce, and no longer includes the leakage tracing scope in, and the forgery user that be used to identify this list this moment just can be recovered use; Simultaneously, certain Subscriber Number does not need to be used to forge user's purposes always, after the term of validity of all signs lost efficacy; Also can get into normal intermediate links, become normal users, be set the recovery date so can also forge the user or forge user's combined resource to each; (expression derivation incident has taken place for a long time during the date reaching recovery; Deriving list lost efficacy), state can be recovered as available, can be changed to system's maximum with reclaiming the date but be recovered as the time spent;
Table 3
The combination sign Forge number 1 Forge number 2 State Reclaim the date
1 ?13911165432 13510054321 Use 2010-12-31
2 ?13911165432 13810056789 Available 2999-12-31
Step 206: after step 204 will be forged user profile adding real user information, promptly can generate the derivation list that comprises forgery user profile and real user information, and list is derived in output;
During concrete operations; Can deposit whole derivation lists in daily record; Comprise derivation activity corresponding relation, derive whereabouts etc.; In daily record, can also preserve the preset normal contact rule (as all users are contacted in each derivation incident normal time being set and normal calling number during by contact) of derivation incident, like table 4;
Table 4
Figure BSA00000386839100051
Step 208: forge user's contact incident and catch;
Because forging the user is not the user of necessary being, does not have the social interaction circle,, mean that then this list existence leakage maybe in case therefore these users are contacted; So when forging the user when being contacted (like speech called, note receptions, multimedia message reception, information on services or push information (being Wap Push) etc.), this incident can be captured by the monitoring unit (this monitoring unit sees explaining of Fig. 4 for details) that is connected with the forgery user terminal; During concrete operations, can after capturing, reveal by direct determination information, perhaps after execution in step 210, carry out information leakage again and judge by the contact incident;
Step 210: the preliminary eliminating normally contacts; Be specially: monitoring unit with each forge log record in time that user contacted and the step 206 preset normal time of contact or/and normally calling number compare; If belong to normal time of contact or/and belong to normal calling number; Then this incident is left in the basket, and no longer carries out subsequent treatment;
It will be appreciated by those skilled in the art that; When occurring at least one test subscriber terminal corresponding in can step 208 and being triggered with test subscriber's number; Then execution in step 210, that is: whether the time that is triggered of judging at least one test subscriber terminal is that time period of presetting (promptly preset normal time of contact section) is or/and judge whether the calling number that triggers at least one test subscriber terminal is the Subscriber Number of presetting (promptly preset normal calling number);
The time of being triggered for the preset time period or/and calling number during for preset Subscriber Number, can confirm directly that information is revealed perhaps, does not definitely earlier belong to normal contact, carry out the operation of step 212, judge again whether information is revealed;
Step 212: initiate related data collection request to data warehouse, gather related data, the line data of going forward side by side leaks follows the trail of (executive agent of step 212 can see explaining of Fig. 4 for details for the discriminance analysis unit among Fig. 4); Specific as follows:
Data disclosure is followed the trail of relating module according to the total data of gathering, and forge the user and distribute the record in the usage log to carry out related comparison, according to the forgery user of contact organize the specified data leakage doubtful from data derivation incident.Judgment rule mainly comprises several types:
At first, obtain the communication information of all calling numbers that trigger at least one test subscriber terminal; Concrete as: forge user's number, the combinations of numbers of forging the user, contact period, Position/Point Of Contact, the way of contact (voice, note, multimedia message etc.) according to contact and collect relevant signaling data, call bill data from data warehouse; Data acquisition can once obtain total data, also can the step acquisitions data;
Secondly, according to the communication information of each calling number, judge whether each calling number carries out the communication of all number section; And be not when carrying out the calling number undetermined of all number section communication when existing, judge that whether calling number undetermined called out a plurality of test subscriber's numbers or/and a plurality of real user number at Preset Time at interval; That is to say, if calling number carries out is the general call to all station of all number section, be not to particular group, then do not belong to the leakage incident, ignores flow;
Once more, as having called out a plurality of test subscriber's numbers at interval at Preset Time or/and during at least one calling number undetermined of a plurality of real user numbers, confirm that information is revealed;
That is to say; If calling number is in certain time interval; Called out a plurality of forgery users simultaneously, forged the user and make up and unique definite one or many data to derive incident, or/and the real user in the determined derivation incident is also by part or all of contact; Then confirm as doubtful leakage incident, this situation is applicable to the data theft, and the person harasses with one number;
During concrete operations; As in the Preset Time interval, having called out a plurality of test subscriber's numbers or/and the calling number a plurality of undetermined of a plurality of real user numbers (that is to say; Not directly with the calling number of at least one calling number undetermined as the leakage of information time) time; According to the communication information of a plurality of calling numbers undetermined, the communication locations of confirming a plurality of calling numbers undetermined whether in preset geographic range and/or call duration time whether in the Preset Time scope; In preset geographic range and/or call duration time in the Preset Time scope time, confirm that information is revealed at the communication locations of a plurality of calling numbers undetermined;
That is to say, partly forge the user if calling number in certain time interval, has been called out; The user who forges in the user combination other simultaneously also in certain time interval by other calling numbers contacts; These calling number caller times are similar, and the caller place is approaching, or/and called out other real user in the relevant derivation time; Then confirm as doubtful leakage incident, the person harasses with a plurality of numbers to be applicable to the data theft in this case;
Step 214; According to the leakage of information result who confirms in the step 212, generate data disclosure and follow the trail of report.
Present embodiment is before actual user data (comprising Subscriber Number and other user characteristicses) derived data warehouse system; Insert the user data of forging therein, the Subscriber Number of insertion makes up corresponding derivation incident, and the Subscriber Number in the data falsification is at net state; In case these are forged Subscriber Number and are contacted; These forge initiatively trigger message leak detection of user terminal, forge user profile and have very strong camouflage property, and data falsification and True Data are difficult for differentiating; Data theft user sensitiveness is not high, can't antitracking; Preferably, whether after forging user terminal and being triggered, further analyzing time of contact and the calling number of forging number is the time and the number of improper use, and time of improper use during with number determination information revealed the accuracy of raising detection; Preferably,, carry out discriminatory analysis, confirm information leakage, and form report according to dependency rules such as the forgery number that contacts, derivation event informations by triggering collection related data behind the time of judging improper use and number.
Device embodiment
Fig. 3 is embodiment one structure chart of information leakage checkout gear of the present invention.The method embodiment of Fig. 1-Fig. 2 all can be applicable to present embodiment.As shown in Figure 3, present embodiment comprises: processing module 32, be used for adding preset test subscriber's information in the real user information that comprises the real user number, and test subscriber's information comprises test subscriber's number; Detection module 34 when being used for being triggered at least one test subscriber terminal corresponding with test subscriber's number, confirms that information is revealed.
During concrete operations, detection module 34 can comprise:
First judges submodule 340; When being used for being triggered at least one test subscriber terminal corresponding with test subscriber's number; Whether the time that is triggered of judging at least one test subscriber terminal is the time period of presetting, and judges whether the calling number that triggers at least one test subscriber terminal is the Subscriber Number of presetting;
First detection sub-module 342, being used in the time of being triggered is not that the preset time period is not or/and calling number is when presetting Subscriber Number, to confirm that information is revealed;
Detection module 34 can also comprise:
Obtain submodule 344, be used to obtain the communication information of all calling numbers that trigger at least one test subscriber terminal;
Second judges submodule 346, is used for the communication information according to each calling number, judges whether each calling number carries out the communication of all number section; And be not when carrying out the calling number undetermined of all number section communication when existing, judge that whether calling number undetermined called out a plurality of test subscriber's numbers or/and a plurality of real user number at Preset Time at interval;
Second detection sub-module 348 is used for as having called out a plurality of test subscriber's numbers at Preset Time at interval or/and during at least one calling number undetermined of a plurality of real user numbers, confirm that information is revealed;
Processing module 32 can comprise:
Processing sub 322 is used for adding test subscriber's information in the real user information that comprises the real user number;
Reclaim submodule 324, be used for after test subscriber's information is added to the Preset Time threshold value of real user information, reclaim test subscriber's information.
Present embodiment is introduced the forgery user profile that is difficult for resolution in real user information through processing module 32; Follow the tracks of data falsification through detection module 34; Find that initiatively True Data is revealed, used; In addition, this reclaims 324 pairs of submodules and forges the management of Subscriber Number implementation some cycles, and realizing forging Subscriber Number can recycle with physical number.
System embodiment
Fig. 4 is the example structure figure of information leakage detection system of the present invention.The method embodiment of Fig. 1-Fig. 2 all can be applicable to present embodiment.As shown in Figure 4, present embodiment comprises: information leakage checkout gear 42, be used for adding preset test subscriber's information in the real user information that comprises the real user number, and test subscriber's information comprises test subscriber's number; When at least one test subscriber terminal corresponding with test subscriber's number is triggered, confirm that information is revealed; At least one test subscriber terminal 44 is used for when being triggered, the work of trigger message leak detection apparatus.
It will be appreciated by those skilled in the art that processing module 32 can correspond to the number resource administrative unit among Fig. 4, first judges that the submodule 340 and first detection sub-module 342 can be corresponding to monitoring units, and obtaining submodule 344, the second judgement submodule 346 and second detection sub-module 348 can be corresponding to the discriminance analysis unit; Wherein, The number resource administrative unit is in charge of the number resource of forging the user, is responsible for distributing and reclaiming, and safeguards and forge user's combined resource record sheet; Monitoring unit is caught forging user's contact; And tentatively get rid of, externally forming alarm prompt, related data is responsible for from data warehouse, gathering in the discriminance analysis unit; And according to certain rule data are revealed relevant data and carry out association analysis, form the data disclosure analysis report.
Present embodiment is introduced the forgery user profile that is difficult for resolution in real user information through the information leakage checkout gear; And tracking data falsification; Find that initiatively True Data is revealed, used; In addition, carry out the some cycles management to forging Subscriber Number, realizing forging Subscriber Number can recycle with physical number.
What should explain at last is: more than be merely the preferred embodiments of the present invention; Be not limited to the present invention; Although the present invention has been carried out detailed explanation with reference to previous embodiment; For a person skilled in the art, it still can be made amendment to the technical scheme that aforementioned each embodiment put down in writing, and perhaps part technical characterictic wherein is equal to replacement.All within spirit of the present invention and principle, any modification of being done, be equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. an information leakage detection method is characterized in that, may further comprise the steps:
In comprising the real user information of real user number, add preset test subscriber's information, said test subscriber's information comprises test subscriber's number;
When at least one test subscriber terminal corresponding with said test subscriber's number is triggered, confirm that information is revealed.
2. information leakage detection method according to claim 1 is characterized in that, and is said when being triggered at least one test subscriber terminal corresponding with said test subscriber's number, confirms that the step that information is revealed comprises:
When at least one test subscriber terminal corresponding with said test subscriber's number is triggered, judge whether the time that is triggered at said at least one test subscriber terminal is the time period of presetting or/and judge whether the calling number that triggers said at least one test subscriber terminal is the Subscriber Number of presetting;
The said time that is triggered for the said preset time period or/and said calling number during for said preset Subscriber Number, confirms that information is revealed.
3. information leakage detection method according to claim 1 is characterized in that, and is said when being triggered at least one test subscriber terminal corresponding with said test subscriber's number, confirms that the step that information is revealed comprises:
Obtain the communication information of all calling numbers that trigger said at least one test subscriber terminal;
According to the communication information of each calling number, judge whether each calling number carries out the communication of all number section; And be not when carrying out the calling number undetermined of all number section communication when existing, judge that whether said calling number undetermined called out a plurality of said test subscriber's numbers or/and a plurality of said real user number at Preset Time at interval;
As having called out a plurality of said test subscriber's numbers at interval at said Preset Time or/and during the said calling number undetermined of at least one of a plurality of real user numbers, confirm that information is revealed.
4. information leakage detection method according to claim 3; It is characterized in that; Said as having called out a plurality of said test subscriber's numbers at interval at said Preset Time or/and during the said calling number undetermined of at least one of a plurality of real user numbers, confirm that the step that information is revealed comprises:
As having called out a plurality of said test subscriber's numbers at interval at said Preset Time or/and during the calling number a plurality of said undetermined of a plurality of real user numbers; According to the communication information of said a plurality of said calling numbers undetermined, the communication locations of confirming said a plurality of said calling numbers undetermined whether in preset geographic range and/or call duration time whether in the Preset Time scope;
In said preset geographic range and/or call duration time in said Preset Time scope the time, confirm that information is revealed at the communication locations of said a plurality of said calling numbers undetermined.
5. require each described information leakage detection method among the 1-4 according to aforesaid right, it is characterized in that, also comprise:
After said test subscriber's information is added to the Preset Time threshold value of said real user information, reclaim said test subscriber's information.
6. an information leakage checkout gear is characterized in that, comprising:
Processing module is used for adding preset test subscriber's information in the real user information that comprises the real user number, and said test subscriber's information comprises test subscriber's number;
Detection module when being used for being triggered at least one test subscriber terminal corresponding with said test subscriber's number, confirms that information is revealed.
7. according to the information leakage checkout gear described in the claim 6, it is characterized in that said detection module comprises:
First judges submodule; When being used for being triggered at least one test subscriber terminal corresponding with said test subscriber's number; Whether the time that is triggered of judging said at least one test subscriber terminal is the time period of presetting, and judges whether the calling number that triggers said at least one test subscriber terminal is the Subscriber Number of presetting;
First detection sub-module, be used for the said time that is triggered for the said preset time period or/and said calling number during for said preset Subscriber Number, confirms that information is revealed.
8. detect server according to the information leakage described in the claim 6, it is characterized in that said detection module also comprises:
Obtain submodule, be used to obtain the communication information of all calling numbers that trigger said at least one test subscriber terminal;
Second judges submodule, is used for the communication information according to each calling number, judges whether each calling number carries out the communication of all number section; And be not when carrying out the calling number undetermined of all number section communication when existing, judge that whether said calling number undetermined called out a plurality of said test subscriber's numbers or/and a plurality of said real user number at Preset Time at interval;
Second detection sub-module is used for as having called out a plurality of said test subscriber's numbers at said Preset Time at interval or/and during the said calling number undetermined of at least one of a plurality of real user numbers, confirm that information is revealed.
9. detect server according to the information leakage described in claim 6 or 7, it is characterized in that said processing module comprises:
Processing sub is used for adding test subscriber's information in the real user information that comprises the real user number;
Reclaim submodule, be used for after said test subscriber's information is added to the Preset Time threshold value of said real user information, reclaiming said test subscriber's information.
10. an information leakage detection system is characterized in that, comprising:
The information leakage checkout gear is used for adding preset test subscriber's information in the real user information that comprises the real user number, and said test subscriber's information comprises test subscriber's number; When at least one test subscriber terminal corresponding with said test subscriber's number is triggered, confirm that information is revealed;
Said at least one test subscriber terminal is used for when being triggered, and triggers the work of said information leakage checkout gear.
CN201010589365.4A 2010-12-08 2010-12-08 Information leakage detection method and device and system utilizing method Expired - Fee Related CN102546272B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201010589365.4A CN102546272B (en) 2010-12-08 2010-12-08 Information leakage detection method and device and system utilizing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201010589365.4A CN102546272B (en) 2010-12-08 2010-12-08 Information leakage detection method and device and system utilizing method

Publications (2)

Publication Number Publication Date
CN102546272A true CN102546272A (en) 2012-07-04
CN102546272B CN102546272B (en) 2015-02-04

Family

ID=46352277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201010589365.4A Expired - Fee Related CN102546272B (en) 2010-12-08 2010-12-08 Information leakage detection method and device and system utilizing method

Country Status (1)

Country Link
CN (1) CN102546272B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743904A (en) * 2016-03-14 2016-07-06 上海携程商务有限公司 Leakage detection method and system of user information of website
CN106685966A (en) * 2016-12-29 2017-05-17 北京奇虎科技有限公司 Divulged information detection method, divulged information detection device and divulged information detection system
CN108683587A (en) * 2018-05-11 2018-10-19 腾讯科技(深圳)有限公司 A kind of account management method and device
CN112104779A (en) * 2020-09-22 2020-12-18 深圳市艾酷通信软件有限公司 Information prompting method and device and electronic equipment
CN114465978A (en) * 2022-02-07 2022-05-10 北京知道创宇信息技术股份有限公司 Mailbox disclosure discovery method, device and system and readable storage medium
CN115242531A (en) * 2022-07-27 2022-10-25 上海齐屹信息科技有限公司 Method for tracking user information in multiple scenes across systems

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1700356A (en) * 2004-05-18 2005-11-23 富士通株式会社 Semiconductor memory
CN101150449A (en) * 2006-09-22 2008-03-26 中国移动通信集团公司 Content information monitoring system and method
CN101984629A (en) * 2010-10-22 2011-03-09 北京工业大学 Cooperative identification method of Web service based site revealing user privacy information

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1700356A (en) * 2004-05-18 2005-11-23 富士通株式会社 Semiconductor memory
CN101150449A (en) * 2006-09-22 2008-03-26 中国移动通信集团公司 Content information monitoring system and method
CN101984629A (en) * 2010-10-22 2011-03-09 北京工业大学 Cooperative identification method of Web service based site revealing user privacy information

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105743904A (en) * 2016-03-14 2016-07-06 上海携程商务有限公司 Leakage detection method and system of user information of website
CN105743904B (en) * 2016-03-14 2019-02-01 上海携程商务有限公司 The leakage detection method and system of the user information of website
CN106685966A (en) * 2016-12-29 2017-05-17 北京奇虎科技有限公司 Divulged information detection method, divulged information detection device and divulged information detection system
CN106685966B (en) * 2016-12-29 2020-08-04 北京奇虎科技有限公司 Method, device and system for detecting leakage information
CN108683587A (en) * 2018-05-11 2018-10-19 腾讯科技(深圳)有限公司 A kind of account management method and device
CN112104779A (en) * 2020-09-22 2020-12-18 深圳市艾酷通信软件有限公司 Information prompting method and device and electronic equipment
CN114465978A (en) * 2022-02-07 2022-05-10 北京知道创宇信息技术股份有限公司 Mailbox disclosure discovery method, device and system and readable storage medium
CN114465978B (en) * 2022-02-07 2023-10-13 北京知道创宇信息技术股份有限公司 Mailbox leakage discovery method, device and system and readable storage medium
CN115242531A (en) * 2022-07-27 2022-10-25 上海齐屹信息科技有限公司 Method for tracking user information in multiple scenes across systems
CN115242531B (en) * 2022-07-27 2023-12-22 上海齐屹信息科技有限公司 Method for tracking user information in cross-system multi-scene mode

Also Published As

Publication number Publication date
CN102546272B (en) 2015-02-04

Similar Documents

Publication Publication Date Title
Becker et al. Fraud detection in telecommunications: History and lessons learned
CN102546272B (en) Information leakage detection method and device and system utilizing method
EP3214861A1 (en) Method, device and system for detecting fraudulent user
Jiang et al. Greystar: Fast and accurate detection of {SMS} spam numbers in large cellular networks using gray phone space
CN106102001A (en) The screening technique of suspected crime mobile terminal and system
CN102611746B (en) Method and system for sharing contact person information
CN108513301B (en) Illegal user identification method and device
KR102200253B1 (en) System and method for detecting fraud usage of message
Zhang et al. Lies in the air: Characterizing fake-base-station spam ecosystem in china
CN101715192B (en) Harassing call filtering method, device and system
CN112866192B (en) Method and device for identifying abnormal aggregation behaviors
CN112437428B (en) Verification method and server
CN106102082A (en) A kind of suspicion number determines method, device, system
CN102256255A (en) Detection method for parallel-used-card proof based on time and geographic location collisions
CN107705126B (en) Transaction instruction processing method and device
AlBougha Comparing data mining classification algorithms in detection of simbox fraud
CN107995616B (en) User behavior data processing method and device
CN112995413A (en) Number information tracing method and device and server
Ighneiwa et al. Bypass fraud detection: Artificial intelligence approach
Alraouji et al. International call fraud detection systems and techniques
AT&T paper.dvi
CN114338915A (en) Caller ID risk identification method, caller ID risk identification device, caller ID risk identification equipment and storage medium
CN112925971A (en) Multi-source analysis-based fraud topic detection method and device
CN108491902B (en) Two-dimensional code anti-lost method and system based on public platform
Ruihong et al. Assisting Telecommunication Fraud Prediction: Detect Individuals Carrying Multiple Phones Based on Trajectory Data Mining

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20150204

CF01 Termination of patent right due to non-payment of annual fee