CN102622379A - Real name detection method and equipment - Google Patents

Real name detection method and equipment Download PDF

Info

Publication number
CN102622379A
CN102622379A CN2011100360588A CN201110036058A CN102622379A CN 102622379 A CN102622379 A CN 102622379A CN 2011100360588 A CN2011100360588 A CN 2011100360588A CN 201110036058 A CN201110036058 A CN 201110036058A CN 102622379 A CN102622379 A CN 102622379A
Authority
CN
China
Prior art keywords
name
surname
true
real
confirmed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011100360588A
Other languages
Chinese (zh)
Inventor
陈冬梁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Oak Pacific Interactive Technology Development Co Ltd
Original Assignee
Beijing Oak Pacific Interactive Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Oak Pacific Interactive Technology Development Co Ltd filed Critical Beijing Oak Pacific Interactive Technology Development Co Ltd
Priority to CN2011100360588A priority Critical patent/CN102622379A/en
Publication of CN102622379A publication Critical patent/CN102622379A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Machine Translation (AREA)

Abstract

The invention provides a real name detection method which comprises: a receiving step of receiving the name input by a user, and a determining step of determining whether the name is a real name according to the pre-stored name rule, wherein the name includes the family name and the first name; and the name rule reflects the statistical attribute of the name. The invention also provides equipment for real name detection. Through the method and equipment provided by the invention, the name input by the user can be quickly, efficiently and accurately detected to determine whether the name is a real name.

Description

The method and apparatus that real name detects
Technical field
The present invention relates in general to the communications field, more specifically, relates to the detection method and the equipment of real name.
Background technology
In social network sites, the efficient of the reliability that needs real name to register usually to improve friend-making and good friend's search, and can improve the security of website, prevent that personal information is stolen.For example, if someone is with the Real Name registration of oneself, then its good friend only need import this Real Name, just can find this person more easily, thus good friend's relation set up with it.
Whether the name that therefore, needs a kind of method to detect user's input is real name.
In the prior art, when whether the name of judging user input is a name that meets real naming rule, often can only rely on the method for manual examination and verification, not only labor intensive, and efficient is also very low.
Summary of the invention
It is slow to the objective of the invention is to overcome in the prior art real name detection speed, the defective of labor intensive.
According to an aspect of the present invention, a kind of method that real name detects that is used for is provided, comprises: receiving step, receive the name that the user imports, said name comprises surname and name; And definite step, confirm according to the name rule of storage in advance whether said name is real name, and said name rule has reflected the statistical attribute of name.
According to an embodiment of the invention, wherein, said definite step comprises: the length that detects said name; And if said length is then confirmed as non-real name with said name outside preset range.
According to an embodiment of the invention, wherein, said definite step comprises: the key word blacklist of said name with storage in advance compared; If at least one word in the said name or character are present in the said key word blacklist, then non-real name confirmed as in said name.
According to an embodiment of the invention, wherein said receiving step comprises: receive surname and name in the said name respectively.
According to an embodiment of the invention, wherein said receiving step comprises: from the said name of input, extract surname and name.
According to an embodiment of the invention, wherein, said definite step comprises: confirm whether said surname is true surname; And/or confirm whether said name is true name; If at least one in said surname and the name is fict, then non-real name confirmed as in said name.
According to an embodiment of the invention, wherein, confirm whether said surname is that true surname comprises: the surname white list of said surname with storage in advance compared; If said surname is present in the said surname white list, then true surname is confirmed as in said surname, otherwise be non-true surname.
According to an embodiment of the invention, wherein, confirm whether said surname is that true surname comprises: the surname blacklist of said surname with storage in advance compared; If said surname is present in the said surname blacklist, then non-true surname is confirmed as in said surname, otherwise be true surname.
According to an embodiment of the invention, wherein, confirm whether said name is that true name comprises: the name white list of said name with storage in advance compared; If said name is present in the said name white list, then said name is confirmed as true name, otherwise be non-true name.
According to an embodiment of the invention, wherein, confirm whether said name is that true name comprises: the name blacklist of said name with storage in advance compared; If said name is present in the said name blacklist, then said name is confirmed as non-true name, otherwise be true name.
According to an embodiment of the invention, wherein, confirm at first whether said surname is true surname.
According to an embodiment of the invention, wherein, be under the situation of true surname: if said name is true name, then real name confirmed as in said name, perhaps confirm as name undetermined for further analysis at said surname; And if said name is non-true name, then said non-real name comprises the suspicion name that will further analyze.
According to an embodiment of the invention, this method further comprises: the name blacklist of said name undetermined with storage in advance compared; And if said name undetermined is present in the said name blacklist, then non-real name confirmed as in said name undetermined, otherwise confirm as real name.
According to an embodiment of the invention; This method further comprises: if said name is determined by non-real name; The request of checking again that then receives the user is to confirm again according to the said request of checking more whether user's name is real name, and the wherein said request of checking again comprises user's certificate information at least.
According to an embodiment of the invention, this method further comprises: if real name confirmed as again in the said name that will be confirmed as non-real name according to said certificate information, then said name rule is upgraded.
According to a further aspect in the invention, a kind of equipment that real name detects that is used for is provided, comprises: receiving trap, be used to receive the name that the user imports, said name comprises surname and name; And definite device, be used for confirming according to the name rule of storage in advance whether said name is real name, and said name rule has reflected the statistical attribute of name.
Method and apparatus provided by the invention can carry out fast the name of user's input, efficient and accurate the detection to confirm whether this name is real name.
Description of drawings
Fig. 1 shows the process flow diagram according to the method that is used for the real name detection of one aspect of the invention;
Fig. 2 shows the overview flow chart according to definite step 200 of one embodiment of the present invention;
Fig. 3 shows another exemplary process diagram according to the method that is used for the real name detection of one embodiment of the present invention;
Fig. 4 shows the block diagram of the equipment that is used for the real name detection according to a further aspect of the invention;
Fig. 5 has gone out can realize therein the terminal device of an illustrative embodiments of the present invention; And
Fig. 6 shows the block diagram of a kind of example devices that various embodiment of the present invention can realize therein.
Embodiment
Be described in detail below in conjunction with the accompanying drawing specific embodiments of the invention.It will be appreciated that although following description only is example with Chinese, method and apparatus of the present invention can be applied to any in the world language.
In addition, it will be appreciated that in the present invention, term " name " refers to the combination of " surname " and " name ", therefore in the present invention, " name ", " surname " and " name " refer to different aspects.What in addition, term " real name " and " non-real name " were represented respectively is " Real Name " and " non-Real Name ".
Fig. 1 shows the process flow diagram according to the method that is used for the real name detection of one aspect of the invention, and this method comprises: receiving step 100, receive the name that the user imports, and said name comprises surname and name; And definite step 200, confirm according to the name rule of storage in advance whether said name is real name, and said name rule has reflected the statistical attribute of name.
Above-mentioned name rule can comprise multiple.Name with Han nationality is an example, and normally surname is preceding, name after.Through statistics, the total length great majority of name are two words or three words.In addition, also have some two-character surnames, thereby the total length of name possibly reach four words or longer.Further, the surname of some ethnic groups and name maybe be longer.Therefore, can come the name of user's input is carried out preliminary judgement according to the length of name, to confirm whether this name is real name.
Fig. 2 shows the overview flow chart according to definite step 200 of one embodiment of the present invention.
According to an embodiment of the invention, as shown in Figure 2, said definite step 200 can comprise alternatively: in step 210, detect the length of name; And if said length is then confirmed as non-real name with said name outside preset range.
According to an embodiment of the invention, said preset range can be 2-15.According to statistics, the name of Han nationality surpasses the actually rare of 10 words, and wherein the longest name has reached 15 words.The name number of words has nearly 1000 people more than 10 words.According to statistics, in the nearly 1000 people more than Han nationality's name number of words 10 words, 97% all in the Xinjiang Uygur Autonomous Regions.Therefore, the length range of 2-15 can satisfy most of people's registration needs.
It will be appreciated that above-mentioned scope only is an embodiment, those skilled in the art can select any desired length, 2-20 for example, 2-30 or the like.Wide length range means loose registration requirement, and narrow registered range then means strict relatively registration requirement.Through utilizing definite method of name length, can tentatively filter out a part and not meet some name inputs that registration required or obviously be non-real name.
In addition, as shown in Figure 2 according to an embodiment of the invention, said definite step 200 can comprise alternatively: in step 220, the key word blacklist of said name with storage in advance compared; If at least one word in the said name or character are present in the said key word blacklist, then non-real name confirmed as in said name.
For example; In registration process; Some users may hide length aspect or otherwise restriction through using some special symbols such as space, dash, asterisk; Perhaps, may there be " dirty " word in the name of certain user's input, thereby can judges obviously that this name is not a real name.Therefore, register, can be at first each word in the name of input or character be compared with the key word blacklist of storing in advance in order to prevent these users.If have the word or the character that are present in this key word blacklist in this name, think that then this name is non-real name, and forbid registration.In this way, can filter out the registration that some obviously do not meet the name rule effectively, thus convenient follow-up further checking.
According to an embodiment of the invention, wherein said receiving step 100 can comprise: receive surname and name in the said name respectively.
According to above embodiment, can when the user imports name, require it to import respectively, thereby make things convenient for follow-up further checking according to surname and name.
According to an embodiment of the invention, wherein said receiving step 100 can comprise: from the said name of input, extract surname and name.
For example, system can automatically therefrom extract surname and name according to the name of user's input.First word that for example can give tacit consent in this name is a surname, runs after fame and give tacit consent to follow-up one or more words.Also can at first judge whether to be two-character surname.For example, when first word was " Europe ", then system can judge whether ensuing word is " sun ", if, think that then " Ouyang " is surname, ensuing one or more words are name.In this way, can judge other two-character surnames or longer surname.Certainly, those skilled in the art can adopt any other mode to extract surname and name, and are not limited to above-mentioned exemplary scenario.
According to a preferred implementation of the present invention, as shown in Figure 2, said definite step 200 comprises: in step 230, confirm whether said surname is true surname; And/or, in step 240, confirm whether said name is true name; If at least one in said surname and the name is fict, then non-real name confirmed as in said name.
According to this exemplary; Surname and name all can be used as the decisive criterion that real name detects, that is, as long as in surname and the name is fict; Can confirm at once that then name is non-real name, and need not another one is further detected.
Can confirm in several ways whether surname is true surname.According to an embodiment of the invention, confirm whether said surname is that true surname 210 can comprise: the surname white list of said surname with storage in advance compared; If said surname is present in the said surname white list, then true surname is confirmed as in said surname, otherwise be non-true surname.
Can store all surnames in the One Hundred Family Names in the above-mentioned surname white list; And can store the surname of any ethnic group, therefore, generally; If user's input is real name,, above-mentioned surname can not be confirmed as non-true surname usually in judging so.
According to another implementation of the invention, wherein, confirm whether said surname is that true surname 210 can comprise: the surname blacklist of said surname with storage in advance compared; If said surname is present in the said surname blacklist, then non-true surname is confirmed as in said surname, otherwise be true surname.
Can store word or speech that those can not use as surname in the above-mentioned surname blacklist, more for example " dirty " word or have contumelious words or the like also can be some special symbols, for example "+" number, arabic numeral or the like.
Although above-mentioned two kinds of embodiments have been carried out independent description, it will be appreciated that, can above-mentioned two kinds of embodiments be combined surname is confirmed.For example, can judge simultaneously surname whether in white list with blacklist in, if neither in white list, also not in blacklist, then can be set to the suspicion surname by this surname, for further analysis.This is described in detail below.
According to an embodiment of the invention, wherein, confirm whether said name is that true name 220 can comprise: the name white list of said name with storage in advance compared; If said name is present in the said name white list, then said name is confirmed as true name, otherwise be non-true name.
Can store common name in the above-mentioned name white list, comprise with the form of single word and the form of speech and storing.For example, store " building " word and " state " word in the white list, so name " foundation " and " state builds " all can be confirmed as through checking be true name.
According to an embodiment of the invention, wherein, confirm whether said name is that true name 220 can comprise: the name blacklist of said name with storage in advance compared; If said name is present in the said name blacklist, then said name is confirmed as non-true name, otherwise be true name.
Similar with the surname blacklist; Can store word or speech that those can not use as name in the name blacklist, more for example " dirty " word or have contumelious words or the like also can be some special symbols; For example "+" number, arabic numeral or the like.
According to a preferred implementation of the present invention, confirm at first whether said surname is true surname.The beneficial effect of doing like this is, because the quantity of surname is far smaller than the quantity of name, so aforesaid operations can be practiced thrift computational resource, the efficient that the raising real name detects.
According to an embodiment of the invention, be under the situation of true surname: if said name is true name, then real name confirmed as in said name, perhaps confirm as name undetermined for further analysis at said surname; And if said name is non-true name, then said non-real name comprises the suspicion name that will further analyze.
It will be appreciated that, in the above-described embodiment, if surname and name are real simultaneously, then can Real Name be confirmed as in this name, and need not to carry out further to confirm.
But; Because the quantity of name is bigger than the quantity of surname far away; And randomness is also stronger than surname, therefore, even the name of user's input is confirmed as non-true name (for example in the name blacklist; Perhaps not in the name white list), also and do not mean that the true name of the inevitable right and wrong of this name.In view of this, according to an embodiment of the invention, if surname is confirmed as true surname, and name is confirmed as non-true name, then can the suspicion name be confirmed as in this name.It will be appreciated that this suspicion name can be included in the category of non-real name.
For example can comprise the further processing of this suspicion name and to utilize manual work to sort, require the user to provide perfect instrument to prove authenticity of its name or the like.Here will no longer go through.
Replacedly; According to an embodiment of the invention; Be under the real situation at surname and name, can name undetermined be confirmed as in resulting name, rather than directly confirm as Real Name; And this name undetermined is further handled, so more helped improving the reliability that real name detects.For example, register as name if certain user will " sell " as surname and with " house ", so, in carrying out the process that surname is confirmed and name is confirmed respectively, true surname and true name can be confirmed as respectively in these two speech.But; Here it probably is not a real name that the name of being imported " is sold the house "; And might be that a potential house property is sold the user, in case it succeeds in registration, then might in the website, issue its sale advertising; Thereby the normal operation of social network sites produced disturb, this is not hope situation about occurring.
To above-mentioned situation, an optional embodiment of the present invention further comprises: in optional step 250, the name blacklist of said name undetermined with storage in advance compared; And if said name undetermined is present in the said name blacklist, then non-real name confirmed as in said name undetermined, otherwise confirm as real name.
Above-mentioned name blacklist can comprise the various words of not expecting, is not the word of Real Name obviously perhaps, for example " atomic bomb ", " the Great Sage Equalling Heaven " or the like.
It will be appreciated that above-mentioned various white lists and blacklist comprise surname black and white lists, name black and white lists and surname blacklist, can be dynamically updated, this will be described in detail below.
It will be appreciated that, although step 250 described herein is in after the step 210-240, this step also can be before the step 210-240 or between, can have this step, also can omit this step.Those skilled in the art can confirm order, interpolation or omission between the above-mentioned steps according to the intensity that real name in the actual conditions detects.In addition, it will be appreciated that Fig. 2 only shows the overview flow chart according to real name detection method of the present invention, caused each branch's step of method step at length is not shown.But those skilled in the art combine description of the invention can be expressly understood very much the spirit of essence of the present invention.
Fig. 3 shows another exemplary process diagram according to the method that is used for the real name detection of one embodiment of the present invention.
According to an embodiment of the invention; As shown in Figure 3; Method of the present invention further comprises confirms step 300 again: if said name is determined by non-real name; The request of checking again that then receives the user is to confirm again according to the said request of checking more whether user's name is real name, and the wherein said request of checking again comprises user's certificate information at least.
In some cases, possibly be able to not fully include all name situation in consideration based on the name rule of the statistical attribute of name.For example, some very uncommon surnames possibly not listed in the surname white list at first, thereby this will cause this surname to be confirmed as non-true surname being rejected.Perhaps, some key words may be added in the name blacklist at first, but have such name in the actual conditions.Therefore, according to an embodiment of the invention,, then can require to confirm again whether its name is real name through sending checking request again if the name of user's input is rejected.According to an embodiment of the invention, this verifies that again request has comprised user's lawful document information at least.
Certificate information includes but not limited to ID card information, passport information, student's identity card, business card or the like.Through authentic and valid certificate information is provided, then unaccepted name possibly confirmed as real name again.Again definite real name can be passed through manual type, also can carry out through being connected with official's database of certificate.Here will no longer detail.
According to an embodiment of the invention, as shown in Figure 3, method of the present invention further comprises step of updating 400: if real name confirmed as again in the said name that will be confirmed as non-real name according to said certificate information, then said name rule is upgraded.
The name rule upgraded comprise numerous embodiments.For example,, then can the surname of this name be joined in the surname white list, perhaps this surname deleted from the form blacklist if real name confirmed as again in a name that originally was confirmed as non-real name; Can the name of this surname be added in the name white list, also can this name be deleted from the name blacklist; Can this name be deleted from the name blacklist; Can revise the length range of name, also can certain key word in this name be deleted from the key word blacklist, or the like.
Through above renewal operation, it is more and more accurate that the name rule will become.
It will be appreciated that step 400 is an optional step just, it not is necessary that the name rule is upgraded.This be because; Although through having confirmed that again by name be a real name; But it is lower to be rejected the likelihood ratio that also means this name appearance before this name, only needs therefore to make that the name that originally was confirmed as non-real name passes through this checking, and need not to revise the name rule.
Fig. 4 shows the block diagram of the equipment that is used for the real name detection according to a further aspect of the invention.
According to a further aspect in the invention, as shown in Figure 4, a kind of equipment that real name detects that is used for is provided, comprising: receiving trap 10, be used to receive the name that the user imports, said name comprises surname and name; And definite device 20, be used for confirming according to the name rule of storage in advance whether said name is real name, and said name rule has reflected the statistical attribute of name.
According to an embodiment of the invention, wherein, said definite device 20 comprises: the device that is used to detect the length of said name; And if be used for said length outside preset range, then said name is confirmed as the device of non-real name.
According to an embodiment of the invention, wherein, said definite device 20 comprises: be used for the key word blacklist device that compare of said name with storage in advance; Be present in the said key word blacklist if be used at least one word or the character of said name, then said name confirmed as the device of non-real name.
According to an embodiment of the invention, wherein said receiving equipment 10 comprises: be used for receiving respectively the surname of said name and the device of name.
According to an embodiment of the invention, wherein said receiving trap 10 comprises: the device that is used for extracting from the said name of input surname and name.
According to an embodiment of the invention, wherein, said definite device 20 comprises: be used for confirming whether said surname is the device of true surname; And/or be used for confirming whether said name is the device of true name; If at least one that is used for said surname and name is fict, then said name is confirmed as the device of non-real name.
According to an embodiment of the invention, wherein, be used for confirming that whether said surname is that the device of true surname comprises: be used for the device that the surname white list with said surname and storage in advance compares; Be present in said surname white list if be used for said surname, then true surname confirmed as in said surname, otherwise be the device of non-true surname.
According to an embodiment of the invention, wherein, be used for confirming that whether said surname is that the device of true surname comprises: be used for the device that the surname blacklist with said surname and storage in advance compares; Be present in said surname blacklist if be used for said surname, then non-true surname confirmed as in said surname, otherwise be the device of true surname.
According to an embodiment of the invention, wherein, be used for confirming that whether said name is that the device of true name comprises: be used for the device that the name white list with said name and storage in advance compares; Be present in said name white list if be used for said name, then said name confirmed as true name, otherwise be the device of non-true name.
According to an embodiment of the invention, wherein, be used for confirming whether said name is that true name comprises: be used for the device that the name blacklist with said name and storage in advance compares; Be present in said name blacklist if be used for said name, then said name confirmed as non-true name, otherwise be the device of true name.
According to an embodiment of the invention, wherein, be used for confirming that whether said surname is that the device of true surname is prior to being used for confirming that whether said name is the device of true name and operating.
According to an embodiment of the invention, wherein, be under the situation of true surname: if said name is true name, then real name confirmed as in said name, perhaps confirm as name undetermined for further analysis at said surname; And if said name is non-true name, then said non-real name comprises the suspicion name that will further analyze.
According to an embodiment of the invention, equipment according to the present invention further comprises: be used for the name blacklist device that compare of said name undetermined with storage in advance; And if be used for said name undetermined and be present in said name blacklist, then non-real name confirmed as in said name undetermined, otherwise confirm as the device of real name.
According to an embodiment of the invention; Equipment according to the present invention further comprises: be determined by non-real name if be used for said name; The request of checking again that then receives the user is to confirm again according to the said request of checking more whether user's name is the device of real name, and the wherein said request of checking again comprises user's certificate information at least.
According to an embodiment of the invention, equipment according to the present invention further comprises: confirm as real name again, the device that then said name rule is upgraded if be used for will being confirmed as according to said certificate information the said name of non-real name.
Various embodiment of the present invention can be realized through hardware, firmware, software and combination in any wherein.And various embodiments of the present invention for example can web server place realize, but it will be appreciated that the present invention is not limited to this, but the present invention can use in any application that needs real name to detect, and not only is confined in the social network sites.
Those skilled in the art can utilize any available terminal to visit social network sites.The type at terminal includes but not limited to desk-top computer, has the portable terminal of network function, for example laptop computer, mobile phone, PDA, dedicated Internet access equipment or the like.
Fig. 5 has gone out can realize therein the terminal device of an illustrative embodiments of the present invention.
Terminal device 600 comprises loudspeaker or earphone 602, microphone 606, touch display 603 and button set 604, and said button set can comprise the navigation input equipment of virtual key 604a, soft key 604b, 604c and operating rod 605 or other types.
Fig. 6 shows the block diagram of a kind of example devices that various embodiment of the present invention can realize therein.
Equipment shown in Fig. 6 comprises CPU (CPU) 801, RAM (RAS) 802, ROM (ROM (read-only memory)) 803, system bus 804, hard disk controller 805, KBC 806, serial interface controller 807, parallel interface controller 808, display controller 809, hard disk 810, keyboard 811, serial external unit 812, parallel external unit 813 and display 814.In these parts, what link to each other with system bus 804 has CPU 801, RAM 802, ROM 803, hard disk controller 805, KBC 806, serial interface controller 807, parallel interface controller 808 and a display controller 809.Hard disk 810 links to each other with hard disk controller 805; Keyboard 811 links to each other with KBC 806; Serial external unit 812 links to each other with serial interface controller 807, and parallel external unit 813 links to each other with parallel interface controller 808, and display 814 links to each other with display controller 809.
The described block diagram of Fig. 6 illustrates just to the purpose of example, is not to be limitation of the present invention.In some cases, can add or reduce wherein some equipment as required.For example, equipment shown in Figure 6 can omit keyboard 811, and only be one can be by the server of external device access.Equipment shown in Figure 6 can be realized the environment that the present invention moves individually; Also can couple together mutually through network and realize the environment that the present invention moves, each module for example of the present invention and/or step can be implemented in interconnected each equipment with distributing.
Above-mentioned various aspects can be suitable for by independent use or with various combinations.The application's instruction can realize through the combination of hardware and software, but can in software or hardware, realize equally.The application's instruction may be embodied as the computer program on computer-readable medium equally, and said computer-readable medium can be any material medium, for example floppy disk, CD-ROM, DVD, hard drives even network medium etc.
One skilled in the art will appreciate that the above-mentioned embodiment that provides just in order to explain the present invention, rather than restriction protection scope of the present invention.Those skilled in the art can carry out various modifications and modification to each embodiment based on instruction of the present invention within the scope of the appended claims under the situation that does not deviate from protection domain of the present invention.Therefore, the present invention is intended to contain included various modifications and equivalent arrangements in spirit and the scope of accompanying claims.The scope of claim meets broad interpretation, so that comprise all such modifications and equivalent structure and function.

Claims (30)

1. one kind is used for the method that real name detects, and comprising:
Receiving step receives the name that the user imports, and said name comprises surname and name; And
Confirm step, confirm according to the name rule of storage in advance whether said name is real name, and said name rule has reflected the statistical attribute of name.
2. method according to claim 1, wherein, said definite step comprises:
Detect the length of said name; And
If said length outside preset range, is then confirmed as non-real name with said name.
3. method according to claim 1, wherein, said definite step comprises:
The key word blacklist of said name with storage in advance compared;
If at least one word in the said name or character are present in the said key word blacklist, then non-real name confirmed as in said name.
4. method according to claim 1, wherein said receiving step comprises: receive surname and name in the said name respectively.
5. method according to claim 1, wherein said receiving step comprises: from the said name of input, extract surname and name.
6. method according to claim 1, wherein, said definite step comprises:
Confirm whether said surname is true surname; And/or
Confirm whether said name is true name;
If at least one in said surname and the name is fict, then non-real name confirmed as in said name.
7. method according to claim 6, wherein, confirm whether said surname is that true surname comprises:
The surname white list of said surname with storage in advance compared;
If said surname is present in the said surname white list, then true surname is confirmed as in said surname, otherwise be non-true surname.
8. method according to claim 6, wherein, confirm whether said surname is that true surname comprises:
The surname blacklist of said surname with storage in advance compared;
If said surname is present in the said surname blacklist, then non-true surname is confirmed as in said surname, otherwise be true surname.
9. method according to claim 6, wherein, confirm whether said name is that true name comprises:
The name white list of said name with storage in advance compared;
If said name is present in the said name white list, then said name is confirmed as true name, otherwise be non-true name.
10. method according to claim 6, wherein, confirm whether said name is that true name comprises:
The name blacklist of said name with storage in advance compared;
If said name is present in the said name blacklist, then said name is confirmed as non-true name, otherwise be true name.
11. method according to claim 6 wherein, confirms at first whether said surname is true surname.
12. method according to claim 6 wherein, is under the situation of true surname at said surname:
If said name is true name, then real name confirmed as in said name, perhaps confirm as name undetermined for further analysis; And
If said name is non-true name, then said non-real name comprises the suspicion name that will further analyze.
13. method according to claim 12 further comprises:
The name blacklist of said name undetermined with storage in advance compared; And
If said name undetermined is present in the said name blacklist, then non-real name is confirmed as in said name undetermined, otherwise confirm as real name.
14. according to any described method among the claim 1-13; Further comprise: if said name is determined by non-real name; The request of checking again that then receives the user is to confirm again according to the said request of checking more whether user's name is real name, and the wherein said request of checking again comprises user's certificate information at least.
15. method according to claim 14 further comprises:, then said name rule is upgraded if real name confirmed as again in the said name that will be confirmed as non-real name according to said certificate information.
16. one kind is used for the equipment that real name detects, comprises:
Receiving trap is used to receive the name that the user imports, and said name comprises surname and name; And
Confirm device, be used for confirming according to the name rule of storage in advance whether said name is real name, and said name rule has reflected the statistical attribute of name.
17. equipment according to claim 16, wherein, said definite device comprises:
Be used to detect the device of the length of said name; And
If be used for said length outside preset range, then said name is confirmed as the device of non-real name.
18. equipment according to claim 16, wherein, said definite device comprises:
Be used for the key word blacklist device that compare of said name with storage in advance;
Be present in the said key word blacklist if be used at least one word or the character of said name, then said name confirmed as the device of non-real name.
19. equipment according to claim 16, wherein said receiving equipment comprises: be used for receiving respectively the surname of said name and the device of name.
20. equipment according to claim 16, wherein said receiving trap comprises: the device that is used for extracting from the said name of input surname and name.
21. equipment according to claim 16, wherein, said definite device comprises:
Be used for confirming whether said surname is the device of true surname; And/or
Be used for confirming whether said name is the device of true name;
If at least one that is used for said surname and name is fict, then said name is confirmed as the device of non-real name.
22. equipment according to claim 21 wherein, is used for confirming that whether said surname is that the device of true surname comprises:
Be used for the surname white list device that compare of said surname with storage in advance;
Be present in said surname white list if be used for said surname, then true surname confirmed as in said surname, otherwise be the device of non-true surname.
23. equipment according to claim 21 wherein, is used for confirming that whether said surname is that the device of true surname comprises:
Be used for the surname blacklist device that compare of said surname with storage in advance;
Be present in said surname blacklist if be used for said surname, then non-true surname confirmed as in said surname, otherwise be the device of true surname.
24. equipment according to claim 21 wherein, is used for confirming that whether said name is that the device of true name comprises:
Be used for the name white list device that compare of said name with storage in advance;
Be present in said name white list if be used for said name, then said name confirmed as true name, otherwise be the device of non-true name.
25. equipment according to claim 21 wherein, is used for confirming whether said name is that true name comprises:
Be used for the name blacklist device that compare of said name with storage in advance;
Be present in said name blacklist if be used for said name, then said name confirmed as non-true name, otherwise be the device of true name.
26. equipment according to claim 21 wherein, is used for confirming that whether said surname is that the device of true surname is prior to being used for confirming that whether said name is the device of true name and operating.
27. equipment according to claim 21 wherein, is under the situation of true surname at said surname:
If said name is true name, then real name confirmed as in said name, perhaps confirm as name undetermined for further analysis; And
If said name is non-true name, then said non-real name comprises the suspicion name that will further analyze.
28. equipment according to claim 27 further comprises:
Be used for the name blacklist device that compare of said name undetermined with storage in advance; And
Be present in said name blacklist if be used for said name undetermined, then non-real name confirmed as in said name undetermined, otherwise confirm as the device of real name.
29. according to any described equipment among the claim 16-28; Further comprise: be determined by non-real name if be used for said name; The request of checking again that then receives the user is to confirm again according to the said request of checking more whether user's name is the device of real name, and the wherein said request of checking again comprises user's certificate information at least.
30. equipment according to claim 29 further comprises: confirm as real name again, the device that then said name rule is upgraded if be used for to be confirmed as the said name of non-real name according to said certificate information.
CN2011100360588A 2011-01-31 2011-01-31 Real name detection method and equipment Pending CN102622379A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011100360588A CN102622379A (en) 2011-01-31 2011-01-31 Real name detection method and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011100360588A CN102622379A (en) 2011-01-31 2011-01-31 Real name detection method and equipment

Publications (1)

Publication Number Publication Date
CN102622379A true CN102622379A (en) 2012-08-01

Family

ID=46562302

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011100360588A Pending CN102622379A (en) 2011-01-31 2011-01-31 Real name detection method and equipment

Country Status (1)

Country Link
CN (1) CN102622379A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488083A (en) * 2014-12-08 2016-04-13 哈尔滨安天科技股份有限公司 Construction method and system of name field in database honeypot
CN105988993A (en) * 2015-03-06 2016-10-05 阿里巴巴集团控股有限公司 Method and apparatus for detecting rationality of name registered in website
CN108664973A (en) * 2018-03-28 2018-10-16 北京捷通华声科技股份有限公司 Text handling method and device
TWI734183B (en) * 2019-08-30 2021-07-21 台中商業銀行股份有限公司 Blacklist database retrieval system and retrieval method

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030090898A (en) * 2002-05-22 2003-12-01 주식회사 퓨젼티앤씨 System for network-based providing financial service using reverse auction and method thereof
CN101359254A (en) * 2007-08-03 2009-02-04 北京搜狗科技发展有限公司 Character input method and system for enhancing input efficiency of name entry
CN201622583U (en) * 2010-03-23 2010-11-03 深圳桑达商用机器有限公司 Portable real-name ticket detection device and real-name ticket detection system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20030090898A (en) * 2002-05-22 2003-12-01 주식회사 퓨젼티앤씨 System for network-based providing financial service using reverse auction and method thereof
CN101359254A (en) * 2007-08-03 2009-02-04 北京搜狗科技发展有限公司 Character input method and system for enhancing input efficiency of name entry
CN201622583U (en) * 2010-03-23 2010-11-03 深圳桑达商用机器有限公司 Portable real-name ticket detection device and real-name ticket detection system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488083A (en) * 2014-12-08 2016-04-13 哈尔滨安天科技股份有限公司 Construction method and system of name field in database honeypot
CN105488083B (en) * 2014-12-08 2020-08-21 哈尔滨安天科技集团股份有限公司 Method and system for constructing name field in database honeypot
CN105988993A (en) * 2015-03-06 2016-10-05 阿里巴巴集团控股有限公司 Method and apparatus for detecting rationality of name registered in website
CN105988993B (en) * 2015-03-06 2019-05-07 阿里巴巴集团控股有限公司 The rational method and apparatus of name registered on detection website
CN108664973A (en) * 2018-03-28 2018-10-16 北京捷通华声科技股份有限公司 Text handling method and device
TWI734183B (en) * 2019-08-30 2021-07-21 台中商業銀行股份有限公司 Blacklist database retrieval system and retrieval method

Similar Documents

Publication Publication Date Title
KR102355973B1 (en) Apparatus and method for detecting smishing message
CN106713579B (en) Telephone number identification method and device
US20140006507A1 (en) Dynamic Security Question Compromise Checking Based on Incoming Social Network Postings
KR20110115542A (en) Method for calculating semantic similarities between messages and conversations based on enhanced entity extraction
US9571515B2 (en) Notification of security question compromise level based on social network interactions
WO2016188029A1 (en) Method and device for parsing two-dimensional code, computer readable storage medium, computer program product and terminal device
CN104731468A (en) Application icon sorting method and device
CN105792152A (en) Method and device for recognizing pseudo base station short message
CN108880879B (en) User identity identification method, device, equipment and computer readable storage medium
CN102622379A (en) Real name detection method and equipment
CN112328802A (en) Data processing method and device and server
CN103810204B (en) A kind of method and device of information searching
CN110677506B (en) Network access method, device, computer equipment and storage medium
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
CN105468947A (en) Information processing method and device and electronic equipment
CN105260034B (en) A kind of character input method and device
CN113609493A (en) Phishing website identification method, device, equipment and medium
CN106203036A (en) The operation copy hidden method opened based on application and device more
CN104573486A (en) Vulnerability detection method and device
KR102151322B1 (en) Information push method and device
US9971814B1 (en) Monitoring and analysis of social network traffic
US20150269268A1 (en) Search server and search method
US20160277430A1 (en) System and method for detecting mobile cyber incident
US20220027419A1 (en) Smart search and recommendation method for content, storage medium, and terminal
CN105159993A (en) Search method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20120801