CN102917352A - System, device and method for treatment of violation terminal built-in behaviors - Google Patents

System, device and method for treatment of violation terminal built-in behaviors Download PDF

Info

Publication number
CN102917352A
CN102917352A CN2011102184415A CN201110218441A CN102917352A CN 102917352 A CN102917352 A CN 102917352A CN 2011102184415 A CN2011102184415 A CN 2011102184415A CN 201110218441 A CN201110218441 A CN 201110218441A CN 102917352 A CN102917352 A CN 102917352A
Authority
CN
China
Prior art keywords
service group
business
confirmation
user
violation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011102184415A
Other languages
Chinese (zh)
Other versions
CN102917352B (en
Inventor
胡铁
胡云
杨刚
张磊
水波
王珂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Beijing Co Ltd
Aspire Digital Technologies Shenzhen Co Ltd
Original Assignee
China Mobile Group Beijing Co Ltd
Aspire Digital Technologies Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Beijing Co Ltd, Aspire Digital Technologies Shenzhen Co Ltd filed Critical China Mobile Group Beijing Co Ltd
Priority to CN201110218441.5A priority Critical patent/CN102917352B/en
Publication of CN102917352A publication Critical patent/CN102917352A/en
Application granted granted Critical
Publication of CN102917352B publication Critical patent/CN102917352B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

An embodiment of the invention discloses a system, a device and a method for treatment of violation terminal built-in behaviors. The method includes: acquiring behavior log data of all users of a service management platform; extracting log data of uplink use services of the users; respectively counting up the uplink number with 182 errors in log data of each user terminal number to check out abnormal users; respectively counting up the uplink number with the 182 errors in the log data of the uplink use services of the abnormal users according to SP (service provider) services to check out abnormal SP services; and subjecting requesting operations of the abnormal SP services by the users to service authentication control. The device and the system can be used for implementation of the method for treatment of violation terminal built-in behaviors. Using the system, the device and the method can accurately find the violation terminal built-in behaviors to effectively restrain the behaviors, violation fee collection of the terminal is reduced, and benefits of users are guaranteed against infringement.

Description

The built-in behavior processing method of a kind of violation terminal, Apparatus and system
Technical field
The present invention relates to communication technical field, relate in particular to the built-in behavior processing method of a kind of violation terminal, Apparatus and system.
Background technology
Along with the user group who uses the mountain vallage machine increases day by day, part service provider's connection is with solution merchant, mobile phone manufacturer, the built-in SP(ISP of violation in the mountain vallage machine, Service Provider) business, the built-in SP business of violation is deducted fees in triggering in the unwitting situation of user, and Here it is so-called " mountain vallage machine fee suction trap ".This Terminal Type (mountain vallage machine) in violation of rules and regulations built-in behavior has caused a large amount of complaint of user, and certain customers are for fear of being closed the mobile information service switch by fee suction even requirement, the serious popularization that has affected regular traffic.At present, built-in behavior is a lot of in violation of rules and regulations for terminal (mountain vallage machine), and the built-in mode of common violation includes: built-in menu mode, and the built-in menu when the user clicks the mountain vallage machine namely triggers service order or professional the use; Built-in backdoor programs mode, Backdoor Software trigger service order or professional the use at random or according to user key-press; The built-in game software mode, mountain vallage machine user when need to enter next pass, namely triggers service order or professional the use by " determining " in playing the embedded in mobile phone game process; The application software mode in the application software (such as mobile phone theme) that the user downloads, is hidden the fee suction trap, automatically triggers service order or professional the use.
For the built-in behavior of violation terminal, on the means of checking, mainly contain two kinds of the testing of mountain vallage machine, customer complaint verifications at present.The testing of mountain vallage machine, carry out the active testing for the built-in business conduct of the violation in the mountain vallage machine, discovery exist analog subscriber order, without reminding rates, vulgar, the problems such as business tine is not provided of deducting fees of menu content, exist the abnormal user of in violation of rules and regulations built-in behavior and unusual SP professional thereby judge terminal suspicion.Its shortcoming is: the type limited coverage area, can only find the unlawful practice of part mountain vallage machine; Mountain vallage machine manufacturer has realized by batch selectivity built-in, so there is inaccuracy in the testing result.The customer complaint verification then is to extract the user according to customer complaint by artificial mode to use the business diary data analysis, judges the authenticity of complaining content and determines whether in violation of rules and regulations complained business.Its shortcoming is: belong to passive processing, can't effectively reduce the customer complaint rate; Simultaneously, as being based on insufficient grounds of business violation, there is the situation of evidence obtaining difficulty.
Summary of the invention
The technical problem that the embodiment of the invention solves is, the built-in behavior processing method of a kind of violation terminal, Apparatus and system are provided, can initiatively, effectively find the in violation of rules and regulations built-in behavior of terminal and process, reduce the in violation of rules and regulations situation of fee suction of terminal, reduce the user to the rate of complaints of the built-in behavior fee suction of violation terminal, the guarantee user benefit is avoided infringement.
To achieve these goals, the embodiment of the invention provides a kind of violation terminal built-in behavior processing method, comprising:
The whole users' of capturing service management platform user behaviors log data;
Extract described user uplink and use professional daily record data;
Add up respectively the upper line number that has 182 mistakes in the daily record data of each user terminal number, judge whether the upper line number that occurs 182 mistakes in some cycles surpasses to set number, in this way, judge that then this user terminal number is abnormal user;
Add up respectively the up upper line number that has 182 mistakes in the professional daily record data of using of described abnormal user by the SP business, whether 182 mistakes appear in judgement in some cycles upper line number surpasses the setting number, in this way, judge that then described SP is professional professional as unusual SP;
Service authentication control is carried out in the operation of the described unusual SP business of user's program request.
The step of further, service authentication control is carried out in the operation of the described unusual SP business of user's program request comprises:
Unusual SP business to user's program request is carried out service group's authentication, determines its affiliated service group;
Adopt corresponding service group of the service group secondary-confirmation strategy of determining that described SP business is carried out authentication control.
Further, described SP business is carried out service group's authentication, determines the step of its affiliated service group, specifically comprise:
According to the professional in violation of rules and regulations difference of the order of severity of described unusual SP, determine the service group that described SP abnormal traffic is affiliated.
Further, described service group comprises height violation degree service group, middle violation degree service group and low violation degree service group, wherein, appearance 182 wrong upper line numbers reach the first SP business of setting the number condition and belong to height violation degree service group, 182 wrong upper line numbers occur and reach the second SP business of setting the number condition and belong to middle violation degree service group, 182 wrong upper line numbers occur and reach the 3rd SP business of setting the number condition and belong to low violation degree service group.
Further, the corresponding service group secondary-confirmation strategy set of described high violation degree service group is: the secondary-confirmation rule is the equal secondary-confirmation of each program request, and the secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation;
The corresponding service group secondary-confirmation strategy that described middle violation degree service group sets is: the secondary-confirmation rule is program request secondary-confirmation first, and the secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation;
The corresponding service group secondary-confirmation strategy that described low violation degree service group sets is: the secondary-confirmation rule is program request secondary-confirmation first, and the secondary-confirmation pattern is the simple problem secondary-confirmation.
Accordingly, the invention provides the built-in behavior processing unit of a kind of violation terminal, comprising:
Collecting unit is for the whole users' of capturing service management platform user behaviors log data;
Extracting unit is used for extracting described user uplink and uses professional daily record data;
The first judging unit, the upper line number that has 182 mistakes for the daily record data of adding up respectively each user terminal number, whether 182 mistakes appear in judgement in some cycles upper line number surpasses the setting number, in this way, judges that then this user terminal number is abnormal user;
The second judging unit, be used for adding up respectively by the SP business the up upper line number of using professional daily record data to have 182 mistakes of described abnormal user, whether 182 mistakes appear in judgement in some cycles upper line number surpasses the setting number, in this way, judges that then described SP business is that unusual SP is professional;
The service authentication control unit is used for service authentication control is carried out in the operation of the described unusual SP business of user's program request.
Further, described service authentication control unit further comprises:
Determining unit is used for described unusual SP business is carried out service group's authentication, determines the service group that it is affiliated;
Control unit is used for adopting corresponding service group of the service group secondary-confirmation strategy of determining that the SP business of described user's program request is carried out authentication control.
Accordingly, the invention provides the built-in behavior treatment system of a kind of violation terminal, described system comprises audit system and Business Management Platform;
Described audit system is used for checking that there is the in violation of rules and regulations abnormal user of built-in behavior in terminal suspicion, and use professional daily record data to check out that unusual SP is professional according to described abnormal user is up, and according to pre-conditioned, described unusual SP business is divided into different service groups, and sets different service group's secondary-confirmation strategies for different service groups;
Described Business Management Platform is used for carrying out service group's authentication after the request of receiving the described unusual SP business of user's program request, then adopts corresponding service group secondary-confirmation strategy that the unusual SP business of user's program request is carried out authentication control.
Further, described audit system comprises:
Collecting unit is for the whole users' of capturing service management platform user behaviors log data;
Extracting unit is used for extracting described user uplink and uses professional daily record data;
Statistical analysis unit is used for adding up respectively the upper line number that has 182 mistakes by user terminal number, determines abnormal user; And described abnormal user up used professional daily record data, and add up respectively the upper line number that has 182 mistakes according to the SP business, determine that unusual SP is professional, and according to pre-conditioned, list described unusual SP business in different service group;
Dispensing unit is used for setting different service group's secondary-confirmation strategies for different business group.
Further, described Business Management Platform comprises:
Search the unit, be used for searching the affiliated service group of unusual SP business of user's program request;
Authenticating unit is used for adopting and describedly searches service group's secondary-confirmation strategy corresponding to service group that the unit finds the SP business of described user's program request is carried out authentication.
Further, described Business Management Platform is provided with different exam pools for different service group's secondary-confirmation strategies, comprises the random code exam pool, challenge exam pool and simple problem exam pool, described exam pool also can offer described Business Management Platform by audit system.
Implement the embodiment of the invention, have following beneficial effect:
1, by checking judgement, the statistical analysis user uplink uses professional daily record data, can find more accurately that terminal suspicion exists the abnormal user of in violation of rules and regulations built-in behavior professional with unusual SP, and then it is carried out control and management.
2, for different service groups, adopt different secondary-confirmation control strategies, can realize targetedly bookkeeping, make that terminal is in violation of rules and regulations built-in can not finish secondary-confirmation for the user easily, more effectively reduce the in violation of rules and regulations situation of fee suction of terminal, reduce the user to the complaint amount of violation fee suction, the guarantee user benefit is avoided infringement.
Description of drawings
In order to be illustrated more clearly in the embodiment of the invention or technical scheme of the prior art, the below will do to introduce simply to the accompanying drawing of required use in embodiment or the description of the Prior Art, apparently, accompanying drawing in the following describes only is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the flow chart of the first embodiment of the built-in behavior processing method of violation terminal of the present invention;
Fig. 2 is the flow chart of the second embodiment of the built-in behavior processing method of violation terminal of the present invention;
Fig. 3 is service group of the present invention secondary-confirmation strategy allocation plan;
The flow chart of Fig. 4 method program request SP business of the present invention for the user adopts;
Fig. 5 is the structural representation of an embodiment of the built-in behavior processing unit of violation terminal of the present invention;
Fig. 6 is the structural representation of the service authentication control unit of the built-in behavior processing unit of violation terminal of the present invention;
Fig. 7 is an example structure schematic diagram of the built-in behavior treatment system of violation terminal of the present invention;
Fig. 8 is the structural representation of audit system of the present invention;
Fig. 9 is the structural representation of Business Management Platform of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the invention, the technical scheme in the embodiment of the invention is clearly and completely described, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that obtains under the creative work prerequisite.
See also Fig. 1, be the present invention's flow chart of the first embodiment of the built-in behavior processing method of terminal in violation of rules and regulations; Described method comprises:
Step S101, the whole users' of capturing service management platform user behaviors log data.
In the specific implementation, capturing service management platform user's user behaviors log data are prior art, repeat no more herein.
Step S102 extracts described user uplink and uses professional daily record data.
In the specific implementation, extract described user uplink and use professional daily record data to be prior art, repeat no more herein.
Step S103 adds up respectively the upper line number that has 182 mistakes in the daily record data of each user terminal number, judges whether the upper line number that occurs 182 mistakes in some cycles surpasses to set number, in this way, judges that then this user terminal number is abnormal user.
It judges that principle is as follows: close in the situation at the mobile information service switch, the user initiates upstream request and uses business, will return 182 error codes when Business Management Platform carries out authentication, and 10086 can issue information notifies the user.Normal user, it is professional can not continue up use; And terminal (mountain vallage machine) embedded software has shielded information and has not known up result, then can continue to attempt, and cause 182 a large amount of mistakes.Therefore, gather User action log and analyze, check the situation that has a large amount of 182 mistakes, can find that the built-in SP of terminal (mountain vallage machine) violation is professional.
In the specific implementation, add up respectively the upper line number that has 182 mistakes in the daily record data of each user terminal number, if in some cycles (a for example week), described user uplink uses professional many days (as above 3 days, can join) existence 182 mistakes, or one week have repeatedly (as surpassing 7 times, can join) 182 mistakes, can assert that there is the abnormal user of the built-in behavior of violation in described user for terminal suspicion.
Step S104, add up respectively the up upper line number that has 182 mistakes in the professional daily record data of using of described abnormal user by the SP business, whether 182 mistakes appear in judgement in some cycles upper line number surpasses the setting number, in this way, judges that then described SP business is that unusual SP is professional.
In the specific implementation, obtain first the up daily record data that uses business of whole abnormal user, then add up respectively the professional upper line number that has 182 mistakes of each SP according to the SP business, if there is following situation in the described SP business of access in measurement period: 182 wrong numbers surpass set point (50, can join) or the up number of times of the 182 mistakes ratio that accounts for whole up number of times surpass set point (such as 5%, can join), can assert that described SP business is professional for the built-in unusual SP of terminal violation.
Step S105 carries out service authentication control to the operation of the described unusual SP business of user's program request.
In the specific implementation, service authentication control is carried out in the operation of the described unusual SP business of user's program request can be prior art.Preferably, the present invention also provides a service authentication control method that is different from prior art, sees also the embodiment shown in the accompanying drawing 2.
The embodiment of the invention has following technique effect:
By checking judgement, the statistical analysis user uplink uses professional daily record data, can find more accurately that terminal suspicion exists the abnormal user of in violation of rules and regulations built-in behavior professional with unusual SP, and then it is carried out control and management.
See also Fig. 2, be the present invention's flow chart of the second embodiment of the built-in behavior processing method of terminal in violation of rules and regulations; Described method comprises:
Step S201, the whole users' of capturing service management platform user behaviors log data.
In the specific implementation, identical with step S101 in embodiment illustrated in fig. 1, do not repeat them here.
Step S202 extracts described user uplink and uses professional daily record data.
In the specific implementation, identical with step S102 in embodiment illustrated in fig. 1, do not repeat them here.
Step S203 adds up respectively the upper line number that has 182 mistakes in the daily record data of each user terminal number, judges whether the upper line number that occurs 182 mistakes in some cycles surpasses to set number, in this way, judges that then this user terminal number is abnormal user.
In the specific implementation, identical with step S103 in embodiment illustrated in fig. 1, do not repeat them here.
Step S204, add up respectively the up upper line number that has 182 mistakes in the professional daily record data of using of described abnormal user by the SP business, whether 182 mistakes appear in judgement in some cycles upper line number surpasses the setting number, in this way, judges that then described SP business is that unusual SP is professional.
In the specific implementation, identical with step S104 in embodiment illustrated in fig. 1, do not repeat them here.
Step S205 carries out service group's authentication to the unusual SP business of user's program request, determines its affiliated service group.
Concrete, according to the professional in violation of rules and regulations difference of the order of severity of described unusual SP, determine the service group that described SP abnormal traffic is affiliated.Described service group comprises height violation degree service group, middle violation degree service group and low violation degree service group, wherein, appearance 182 wrong upper line numbers reach the first SP business of setting the number condition and belong to height violation degree service group, 182 wrong upper line numbers occur and reach the second SP business of setting the number condition and belong to middle violation degree service group, 182 wrong upper line numbers occur and reach the 3rd SP business of setting the number condition and belong to low violation degree service group.According to the professional in violation of rules and regulations difference of the order of severity of described unusual SP, determine the service group that described SP abnormal traffic is affiliated.
Step S206 adopts corresponding service group of the service group secondary-confirmation strategy of determining that described SP business is carried out authentication control.
In the specific implementation, corresponding service group's secondary-confirmation strategy sees also shown in Figure 3.
Service group's secondary-confirmation strategy corresponding to described high violation degree service group: the secondary-confirmation rule is the equal secondary-confirmation of each program request, and the secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Is how many wherein, challenge provided by corresponding exam pool, and challenge refers to the problem that its answer is unique, for example: " 2 add 3 equals "? answer is " 5 ", and the user inputs correct option can confirm program request.Random code is provided by corresponding exam pool.Random code is generally a character string, its affirmation mode can for, for example: " to ask input of character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can be confirmed program request.
Service group's secondary-confirmation strategy corresponding to described middle violation degree service group: secondary-confirmation rule is program request secondary-confirmation first, and the secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Is how many wherein, challenge provided by corresponding exam pool, and challenge refers to the problem that its answer is unique, for example: " 2 add 3 equals "? answer is " 5 ", and the user inputs correct option can confirm program request.Random code is provided by corresponding exam pool.Random code is generally a character string, its affirmation mode can for, for example: " to ask input of character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can be confirmed program request.
Service group's secondary-confirmation strategy corresponding to described low violation degree service group: secondary-confirmation rule is program request secondary-confirmation first, and the secondary-confirmation pattern is the simple problem secondary-confirmation.Wherein simple problem is provided by corresponding exam pool, and simple problem refers to that its answer has a lot of problems, for example: " please input the Any Digit between 10 to 20 ", the user can input " 11,12 ..., 19 " in any one, can confirm program request.
It should be noted that, secondary-confirmation rule corresponding to described high violation degree service group shown in the figure is the equal secondary-confirmation of each program request, corresponding secondary-confirmation pattern is challenge or random code secondary-confirmation, secondary-confirmation rule corresponding to middle violation degree service group is program request secondary-confirmation first, corresponding secondary-confirmation pattern is challenge or random code secondary-confirmation, secondary-confirmation corresponding to low violation degree service group be regular to be program request secondary-confirmation first, corresponding secondary-confirmation pattern is that the pattern of simple problem secondary-confirmation is not well-determined, other associative mode can also be arranged, as long as satisfy corresponding a kind of secondary-confirmation rule of a kind of service group and a kind of secondary-confirmation pattern.
See also Fig. 4, adopt the flow chart of the inventive method program request SP business for the user.
1) user initiates the up-on command demand (telecommunication) service to Short Message Service Gateway;
2) Short Message Service Gateway sends to Business Management Platform with order request;
3) Business Management Platform is done service group's authentication, and which group is the judgement business belong to;
4) service group's secondary-confirmation strategy authentication is judged the corresponding secondary-confirmation strategy of service group that belongs to;
5) Business Management Platform returns the Short Message Service Gateway order request and replys, and sign needs the user to carry out secondary-confirmation;
6) Business Management Platform is transmitted the secondary-confirmation request to sms center, carries the secondary-confirmation strategy;
7) sms center makes up corresponding secondary-confirmation note according to the secondary-confirmation strategy;
8) sms center issues the secondary-confirmation note to the user;
9) user replys the secondary-confirmation note;
10) sms center is initiated program request affirmation request to Business Management Platform;
11) Business Management Platform generates interim order relations;
12) Business Management Platform sends program request affirmation response to Short Message Service Gateway;
13) Short Message Service Gateway issues program request affirmation response to the user.
The embodiment of the invention has following technique effect:
1, by checking judgement, the statistical analysis user uplink uses professional daily record data, can find more accurately that terminal suspicion exists the abnormal user of in violation of rules and regulations built-in behavior professional with unusual SP, and then it is carried out control and management.
2, for different service groups, adopt different secondary-confirmation control strategies, can realize targetedly bookkeeping, make that terminal is in violation of rules and regulations built-in can not finish secondary-confirmation for the user easily, more effectively reduce the in violation of rules and regulations situation of fee suction of terminal, reduce the user to the complaint amount of violation fee suction, simultaneously, also can improve normal users and use professional perception.
Accordingly, the invention also discloses the built-in behavior processing unit of a kind of violation terminal, Fig. 5 is the structural representation of an embodiment of the built-in behavior processing unit of violation terminal of the present invention, shown in Fig. 5, described device 1 comprises: collecting unit 11, extracting unit 12, the first judging unit 13, the second judging unit 14 and service authentication control unit 15.
Described collecting unit 11 is for the whole users' of capturing service management platform user behaviors log data.
Concrete, described collecting unit 11 is prior art, repeats no more herein.
Described extracting unit 12 is used for extracting described user uplink and uses professional daily record data.
Concrete, described extracting unit 12 is prior art, repeats no more herein.
The first judging unit 13, the upper line number that has 182 mistakes for the daily record data of adding up respectively each user terminal number, whether 182 mistakes appear in judgement in some cycles upper line number surpasses the setting number, in this way, judges that then this user terminal number is abnormal user.
It judges that principle is as follows: close in the situation at the mobile information service switch, the user initiates upstream request and uses business, will return 182 error codes when Business Management Platform carries out authentication, and 10086 can issue information notifies the user.Normal user, it is professional can not continue up use; And terminal (mountain vallage machine) embedded software has shielded information and has not known up result, then can continue to attempt, and cause 182 a large amount of mistakes.Therefore, gather User action log and analyze, check the situation that has a large amount of 182 mistakes, can find that the built-in SP of terminal (mountain vallage machine) violation is professional.
In the specific implementation, add up respectively the upper line number that has 182 mistakes in the daily record data of each user terminal number, if in some cycles (a for example week), described user uplink uses professional many days (as above 3 days, can join) existence 182 mistakes, or one week have repeatedly (as surpassing 7 times, can join) 182 mistakes, can assert that there is the abnormal user of the built-in behavior of violation in described user for terminal suspicion.
The second judging unit 14, be used for adding up respectively by the SP business the up upper line number of using professional daily record data to have 182 mistakes of described abnormal user, whether 182 mistakes appear in judgement in some cycles upper line number surpasses the setting number, in this way, judge that then described SP is professional professional as unusual SP.
In the specific implementation, obtain first the up daily record data that uses business of whole abnormal user, then add up respectively the professional upper line number that has 182 mistakes of each SP according to the SP business, if there is following situation in the described SP business of access in measurement period: 182 wrong numbers surpass set point (50, can join) or the up number of times of the 182 mistakes ratio that accounts for whole up number of times surpass set point (such as 5%, can join), can assert that described SP business is professional for the built-in unusual SP of terminal violation.
Service authentication control unit 15 is used for service authentication control is carried out in the operation of the described unusual SP business of user's program request.
Concrete, described service authentication control unit 15 further comprises: determining unit 151 and control unit 152, and specifically please in conjunction with referring to Fig. 6.
Described determining unit 151 is used for described unusual SP business is carried out service group's authentication, determines the service group that it is affiliated.
In the specific implementation, described service group comprises height violation degree service group, middle violation degree service group and low violation degree service group, wherein, appearance 182 wrong upper line numbers reach the 3rd SP business of setting the number condition and belong to height violation degree service group, 182 wrong upper line numbers occur and reach the 4th SP business of setting the number condition and belong to middle violation degree service group, 182 wrong upper line numbers occur and reach the 5th SP business of setting the number condition and belong to low violation degree service group.According to the professional in violation of rules and regulations difference of the order of severity of described unusual SP, determine the service group that described SP abnormal traffic is affiliated.
Described control unit 152 is used for adopting corresponding service group of the service group secondary-confirmation strategy of determining that the SP business of described user's program request is carried out authentication control.
In the specific implementation, corresponding service group's secondary-confirmation strategy sees also shown in Figure 3.
Service group's secondary-confirmation strategy corresponding to described high violation degree service group: the secondary-confirmation rule is the equal secondary-confirmation of each program request, and the secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Is how many wherein, challenge provided by corresponding exam pool, and challenge refers to the problem that its answer is unique, for example: " 2 add 3 equals "? answer is " 5 ", and the user inputs correct option can confirm program request.Random code is provided by corresponding exam pool.Random code is generally a character string, its affirmation mode can for, for example: " to ask input of character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can be confirmed program request.
Service group's secondary-confirmation strategy corresponding to described middle violation degree service group: secondary-confirmation rule is program request secondary-confirmation first, and the secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Is how many wherein, challenge provided by corresponding exam pool, and challenge refers to the problem that its answer is unique, for example: " 2 add 3 equals "? answer is " 5 ", and the user inputs correct option can confirm program request.Random code is provided by corresponding exam pool.Random code is generally a character string, its affirmation mode can for, for example: " to ask input of character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can be confirmed program request.
Service group's secondary-confirmation strategy corresponding to described low violation degree service group: secondary-confirmation rule is program request secondary-confirmation first, and the secondary-confirmation pattern is the simple problem secondary-confirmation.Wherein simple problem is provided by corresponding exam pool, and simple problem refers to that its answer has a lot of problems, for example: " please input the Any Digit between 10 to 20 ", the user can input " 11,12 ..., 19 " in any one, can confirm program request.
The embodiment of the invention has following technique effect:
1, by checking judgement, the statistical analysis user uplink uses professional daily record data, can find more accurately that terminal suspicion exists the abnormal user of in violation of rules and regulations built-in behavior professional with unusual SP, and then it is carried out control and management.
2, for different service groups, adopt different secondary-confirmation control strategies, can realize targetedly bookkeeping, make that terminal is in violation of rules and regulations built-in can not finish secondary-confirmation for the user easily, more effectively reduce the in violation of rules and regulations situation of fee suction of terminal, reduce the user to the complaint amount of violation fee suction, simultaneously, also can improve normal users and use professional perception.
Accordingly, the present invention also provides a kind of violation terminal built-in behavior treatment system.Fig. 7 is an example structure schematic diagram of the built-in behavior treatment system of violation terminal of the present invention, and as shown in Figure 7, described system 1 comprises audit system 11 and Business Management Platform 12.
Described audit system 11, be used for checking that there is the in violation of rules and regulations abnormal user of built-in behavior in terminal suspicion on the Business Management Platform, and use professional daily record data to check out that unusual SP is professional according to described abnormal user is up, and according to pre-conditioned, described unusual SP business is divided into different service groups, and sets different service group's secondary-confirmation strategies for different service groups.
Concrete, seeing also Fig. 8, described audit system 11 comprises:
Collecting unit 111 is for the whole users' of capturing service management platform user behaviors log data.
Extracting unit 112 is used for extracting described user uplink and uses professional daily record data.
Statistical analysis unit 113 is used for adding up respectively the upper line number that has 182 mistakes by user terminal number, determines abnormal user; And described abnormal user up used professional daily record data, and add up respectively the upper line number that has 182 mistakes according to the SP business, determine that unusual SP is professional, and according to pre-conditioned, list described unusual SP business in different service group.
Dispensing unit 114 is used for setting different service group's secondary-confirmation strategies for different business group.
Described Business Management Platform 12 is used for carrying out service group's authentication after the request of receiving the described unusual SP business of user's program request, then adopts corresponding service group secondary-confirmation strategy that the unusual SP business of user's program request is carried out authentication control.
Wherein, described Business Management Platform is provided with different exam pools for different service group's secondary-confirmation strategies, comprises the random code exam pool, and challenge exam pool and simple problem exam pool, described exam pool also can offer described Business Management Platform by audit system.
Concrete, please in conjunction with referring to Fig. 9, described Business Management Platform 12 comprises:
Search unit 121, be used for searching the affiliated service group of unusual SP business of user's program request.
In the specific implementation, described service group comprises height violation degree service group, middle violation degree service group and low violation degree service group, wherein, appearance 182 wrong upper line numbers reach the 3rd SP business of setting the number condition and belong to height violation degree service group, 182 wrong upper line numbers occur and reach the 4th SP business of setting the number condition and belong to middle violation degree service group, 182 wrong upper line numbers occur and reach the 5th SP business of setting the number condition and belong to low violation degree service group.According to the professional in violation of rules and regulations difference of the order of severity of described unusual SP, determine the service group that described SP abnormal traffic is affiliated.
Authenticating unit 122 is used for adopting and describedly searches service group's secondary-confirmation strategy corresponding to service group that the unit finds the SP business of described user's program request is carried out authentication.
In the specific implementation, corresponding service group's secondary-confirmation strategy sees also shown in Figure 3.
Service group's secondary-confirmation strategy corresponding to described high violation degree service group: the secondary-confirmation rule is the equal secondary-confirmation of each program request, and the secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Is how many wherein, challenge provided by corresponding exam pool, and challenge refers to the problem that its answer is unique, for example: " 2 add 3 equals "? answer is " 5 ", and the user inputs correct option can confirm program request.Random code is provided by corresponding exam pool.Random code is generally a character string, its affirmation mode can for, for example: " to ask input of character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can be confirmed program request.
Service group's secondary-confirmation strategy corresponding to described middle violation degree service group: secondary-confirmation rule is program request secondary-confirmation first, and the secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Is how many wherein, challenge provided by corresponding exam pool, and challenge refers to the problem that its answer is unique, for example: " 2 add 3 equals "? answer is " 5 ", and the user inputs correct option can confirm program request.Random code is provided by corresponding exam pool.Random code is generally a character string, its affirmation mode can for, for example: " to ask input of character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can be confirmed program request.
Service group's secondary-confirmation strategy corresponding to described low violation degree service group: secondary-confirmation rule is program request secondary-confirmation first, and the secondary-confirmation pattern is the simple problem secondary-confirmation.Wherein simple problem is provided by corresponding exam pool, and simple problem refers to that its answer has a lot of problems, for example: " please input the Any Digit between 10 to 20 ", the user can input " 11,12 ..., 19 " in any one, can confirm program request.
The embodiment of the invention has following technique effect:
1, by checking judgement, the statistical analysis user uplink uses professional daily record data, can find more accurately that terminal suspicion exists the abnormal user of in violation of rules and regulations built-in behavior professional with unusual SP, and then it is carried out control and management.
2, for different service groups, adopt different secondary-confirmation control strategies, can realize targetedly bookkeeping, make that terminal is in violation of rules and regulations built-in can not finish secondary-confirmation for the user easily, more effectively reduce the in violation of rules and regulations situation of fee suction of terminal, reduce the user to the complaint amount of violation fee suction, simultaneously, also can improve normal users and use professional perception.
One of ordinary skill in the art will appreciate that all or part of flow process that realizes in above-described embodiment method, to come the relevant hardware of instruction to finish by computer program, described program can be stored in the computer read/write memory medium, this program can comprise the flow process such as the embodiment of above-mentioned each side method when carrying out.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or store-memory body (Random Access Memory, RAM) etc. at random.
Above disclosed only is preferred embodiment of the present invention, certainly can not limit with this interest field of the present invention, one of ordinary skill in the art will appreciate that all or part of flow process that realizes above-described embodiment, and according to the equivalent variations that claim of the present invention is done, still belong to the scope that invention is contained.

Claims (11)

1. the built-in behavior processing method of violation terminal is characterized in that, comprising:
The whole users' of capturing service management platform user behaviors log data;
Extract described user uplink and use professional daily record data;
Add up respectively the upper line number that has 182 mistakes in the daily record data of each user terminal number, judge whether the upper line number that occurs 182 mistakes in some cycles surpasses to set number, in this way, judge that then this user terminal number is abnormal user;
Add up respectively the up upper line number that has 182 mistakes in the professional daily record data of using of described abnormal user by the SP business, whether 182 mistakes appear in judgement in some cycles upper line number surpasses the setting number, in this way, judge that then described SP is professional professional as unusual SP;
Service authentication control is carried out in the operation of the described unusual SP business of user's program request.
2. method according to claim 1 is characterized in that, the step of the operation of the described unusual SP business of user's program request being carried out service authentication control comprises:
Unusual SP business to user's program request is carried out service group's authentication, determines its affiliated service group;
Adopt corresponding service group of the service group secondary-confirmation strategy of determining that described SP business is carried out authentication control.
3. method according to claim 2 is characterized in that, described SP business is carried out service group's authentication, determines the step of its affiliated service group, specifically comprises:
According to the professional in violation of rules and regulations difference of the order of severity of described unusual SP, determine the service group that described SP abnormal traffic is affiliated.
4. method according to claim 3, it is characterized in that, described service group comprises height violation degree service group, middle violation degree service group and low violation degree service group, wherein, appearance 182 wrong upper line numbers reach the first SP business of setting the number condition and belong to height violation degree service group, 182 wrong upper line numbers occur and reach the second SP business of setting the number condition and belong to middle violation degree service group, 182 wrong upper line numbers occur and reach the 3rd SP business of setting the number condition and belong to low violation degree service group.
5. method according to claim 4 is characterized in that:
The corresponding service group secondary-confirmation strategy that described high violation degree service group sets is: the secondary-confirmation rule is the equal secondary-confirmation of each program request, and the secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation;
The corresponding service group secondary-confirmation strategy that described middle violation degree service group sets is: the secondary-confirmation rule is program request secondary-confirmation first, and the secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation;
The corresponding service group secondary-confirmation strategy that described low violation degree service group sets is: the secondary-confirmation rule is program request secondary-confirmation first, and the secondary-confirmation pattern is the simple problem secondary-confirmation.
6. the built-in behavior processing unit of violation terminal is characterized in that, comprising:
Collecting unit is for the whole users' of capturing service management platform user behaviors log data;
Extracting unit is used for extracting described user uplink and uses professional daily record data;
The first judging unit, the upper line number that has 182 mistakes for the daily record data of adding up respectively each user terminal number, whether 182 mistakes appear in judgement in some cycles upper line number surpasses the setting number, in this way, judges that then this user terminal number is abnormal user;
The second judging unit, be used for adding up respectively by the SP business the up upper line number of using professional daily record data to have 182 mistakes of described abnormal user, whether 182 mistakes appear in judgement in some cycles upper line number surpasses the setting number, in this way, judges that then described SP business is that unusual SP is professional;
The service authentication control unit is used for service authentication control is carried out in the operation of the described unusual SP business of user's program request.
7. device as claimed in claim 6 is characterized in that, described service authentication control unit advances
One step comprised:
Determining unit is used for described unusual SP business is carried out service group's authentication, determines the service group that it is affiliated;
Control unit is used for adopting corresponding service group of the service group secondary-confirmation strategy of determining that the SP business of described user's program request is carried out authentication control.
8. the built-in behavior treatment system of violation terminal is characterized in that described system comprises audit system and Business Management Platform;
Described audit system is used for checking that there is the in violation of rules and regulations abnormal user of built-in behavior in terminal suspicion, and use professional daily record data to check out that unusual SP is professional according to described abnormal user is up, and according to pre-conditioned, described unusual SP business is divided into different service groups, and sets different service group's secondary-confirmation strategies for different service groups;
Described Business Management Platform is used for carrying out service group's authentication after the request of receiving the described unusual SP business of user's program request, then adopts corresponding service group secondary-confirmation strategy that the unusual SP business of user's program request is carried out authentication control.
9. system as claimed in claim 8 is characterized in that, described audit system comprises:
Collecting unit is for the whole users' of capturing service management platform user behaviors log data;
Extracting unit is used for extracting described user uplink and uses professional daily record data;
Statistical analysis unit is used for adding up respectively the upper line number that has 182 mistakes by user terminal number, determines abnormal user; And described abnormal user up used professional daily record data, and add up respectively the upper line number that has 182 mistakes according to the SP business, determine that unusual SP is professional, and according to pre-conditioned, list described unusual SP business in different service group;
Dispensing unit is used for setting different service group's secondary-confirmation strategies for different business group.
10. system as claimed in claim 8 is characterized in that, described Business Management Platform comprises:
Search the unit, be used for searching the affiliated service group of unusual SP business of user's program request;
Authenticating unit is used for adopting and describedly searches service group's secondary-confirmation strategy corresponding to service group that the unit finds the SP business of described user's program request is carried out authentication.
11. system as claimed in claim 8, it is characterized in that, described Business Management Platform is for different service group's secondary-confirmation strategies, be provided with different exam pools, comprise the random code exam pool, challenge exam pool and simple problem exam pool, described exam pool also can offer described Business Management Platform by audit system.
CN201110218441.5A 2011-08-01 2011-08-01 A kind of violation terminal built-in behavior processing method, apparatus and system Active CN102917352B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110218441.5A CN102917352B (en) 2011-08-01 2011-08-01 A kind of violation terminal built-in behavior processing method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110218441.5A CN102917352B (en) 2011-08-01 2011-08-01 A kind of violation terminal built-in behavior processing method, apparatus and system

Publications (2)

Publication Number Publication Date
CN102917352A true CN102917352A (en) 2013-02-06
CN102917352B CN102917352B (en) 2017-11-03

Family

ID=47615547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110218441.5A Active CN102917352B (en) 2011-08-01 2011-08-01 A kind of violation terminal built-in behavior processing method, apparatus and system

Country Status (1)

Country Link
CN (1) CN102917352B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105636076A (en) * 2014-11-07 2016-06-01 中国移动通信集团四川有限公司 Auditing method, device and equipment of illegal terminal built-in behavior

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101198140A (en) * 2007-12-29 2008-06-11 深圳华为通信技术有限公司 Terminal exception reminding method and apparatus
CN101291259A (en) * 2007-04-18 2008-10-22 阿里巴巴集团控股有限公司 System and method for monitoring geographic position of website visitor and visiting status
CN102006588A (en) * 2010-12-28 2011-04-06 北京安天电子设备有限公司 Method and system for monitoring network behavior of smart mobile phone
CN102082704A (en) * 2009-11-30 2011-06-01 中国移动通信集团河北有限公司 Safety monitoring method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101291259A (en) * 2007-04-18 2008-10-22 阿里巴巴集团控股有限公司 System and method for monitoring geographic position of website visitor and visiting status
CN101198140A (en) * 2007-12-29 2008-06-11 深圳华为通信技术有限公司 Terminal exception reminding method and apparatus
CN102082704A (en) * 2009-11-30 2011-06-01 中国移动通信集团河北有限公司 Safety monitoring method and system
CN102006588A (en) * 2010-12-28 2011-04-06 北京安天电子设备有限公司 Method and system for monitoring network behavior of smart mobile phone

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105636076A (en) * 2014-11-07 2016-06-01 中国移动通信集团四川有限公司 Auditing method, device and equipment of illegal terminal built-in behavior
CN105636076B (en) * 2014-11-07 2019-06-07 中国移动通信集团四川有限公司 A kind of auditing method, device and the equipment of the behavior of violation terminal built-in

Also Published As

Publication number Publication date
CN102917352B (en) 2017-11-03

Similar Documents

Publication Publication Date Title
CN105516133A (en) User identity verification method, server and client
Stork et al. OTT-Threat or opportunity for African Telcos?
CN106302534B (en) A kind of method and system of detection and processing illegal user
CN102685709B (en) Method and device for auditing charging
CN101860835B (en) Value added service payment method and system
CN1996839A (en) A low-cost and easy-to-distribute identity verification method and device
CN106937291A (en) Support card identification method and system
CN102917334B (en) A kind of violation terminal built-in behavior processing method, apparatus and system
CN109727027A (en) Account recognition methods, device, equipment and storage medium
CN103258281A (en) Mobile device application software popularization method based on rebating
CN109685639A (en) Loan checking method, device, equipment and computer readable storage medium
CN105050068A (en) Billing bill recording, detection, and correction method, apparatus, and bill processing system
CN111476640B (en) Authentication method, system, storage medium and big data authentication platform
CN107705126B (en) Transaction instruction processing method and device
CN109741070B (en) Account management method and device based on network certificate
CN105354787A (en) Communication real-name system based communication money management system
CN114331592A (en) Method for identifying malicious order-swiping behavior
CN102917352A (en) System, device and method for treatment of violation terminal built-in behaviors
CN105827602B (en) A kind of embedded SIM card register method and server
CN103326865A (en) Network authentication method and system for making calls
CN106162586A (en) Method for limiting incoming call, device and system
CN107623696A (en) A kind of user ID authentication method and device based on user behavior feature
CN102917335A (en) System, device and method for treatment of violation terminal built-in behaviors
CN1801228A (en) Method for real-time authorization of bank card transaction based on interactive voice response
CN115103063A (en) Internet fraud identification method and device for counterfeit customer service class

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant