CN102917352B - A kind of violation terminal built-in behavior processing method, apparatus and system - Google Patents
A kind of violation terminal built-in behavior processing method, apparatus and system Download PDFInfo
- Publication number
- CN102917352B CN102917352B CN201110218441.5A CN201110218441A CN102917352B CN 102917352 B CN102917352 B CN 102917352B CN 201110218441 A CN201110218441 A CN 201110218441A CN 102917352 B CN102917352 B CN 102917352B
- Authority
- CN
- China
- Prior art keywords
- business
- user
- service group
- confirmation
- abnormal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Telephonic Communication Services (AREA)
Abstract
The embodiment of the invention discloses a kind of violation terminal built-in behavior processing method, apparatus and system, methods described includes:The user behaviors log data of capturing service management platform whole user;Extract the daily record data that the user uplink uses business;The upper line number that there are 182 mistakes in the daily record data of each user terminal number is counted respectively, checks out abnormal user;There is the upper line number of 182 mistakes in the daily record data for the up use business for counting the abnormal user respectively by SP business, check out abnormal SP business;Operation to exception SP business described in user's program request carries out service authentication control.Device and system of the present invention can be used for realizing methods described.Using the present invention, it can accurately find the behavior of violation terminal built-in and effectively contain this behavior, reduce the situation of terminal violation fee suction, ensure user benefit from infringement.
Description
Technical field
The present invention relates to communication technical field, more particularly to a kind of violation terminal built-in behavior processing method, device and it is
System.
Background technology
As the user group using mountain vallage machine increasingly increases, partial service provider gives birth in conjunction with solution business, mobile phone
Business men, the built-in SP of violation in mountain vallage machine(ISP, Service Provider)Business, in the unwitting situation of user
Built-in SP business is deducted fees in violation of rules and regulations in lower triggering, here it is so-called " mountain vallage machine fee suction trap ".This Terminal Type(Mountain vallage machine)In in violation of rules and regulations
The behavior of putting has triggered the substantial amounts of complaint of user, and certain customers open in order to avoid closing mobile information service by fee suction even requirement
Close, the serious popularization that have impact on regular traffic.At present, terminal(Mountain vallage machine)Built-in behavior is many in violation of rules and regulations, and common disobeys
Rule built-in manner includes:Built-in menu mode, when user clicks on the built-in menu of mountain vallage machine, that is, triggers service order or industry
Make sure use;Built-in backdoor programs mode, Backdoor Software is random or is used according to user key-press triggering service order or business;It is interior
Put Games Software mode, mountain vallage machine user during playing mobile phone built-in game, it is necessary to when into next pass, by " it is determined that "
I.e. triggering service order or business are used;Application software mode, the application software that user downloads(Such as mobile phone theme)In, hide
Fee suction trap, automatic triggering service order or business are used.
For violation terminal built-in behavior, at present in the means of checking, mainly there are the testing of mountain vallage machine, customer complaint verification two
Kind.Mountain vallage machine testing, active testing is carried out for business conduct built in the violation in mountain vallage machine, and discovery has analog subscriber and ordered
Purchase, without reminding rates, menu content is vulgar, the problems such as not providing business tine of deducting fees so that judge terminal suspicion exist disobey
The abnormal user and exception SP business of the built-in behavior of rule.It has the disadvantage:Type limited coverage area, can only find part mountain vallage machine
Unlawful practice;Mountain vallage machine manufacturer has been carried out built-in by batch selectivity, therefore testing result has inaccuracy.Customer complaint
Verification, then be to extract user by artificial mode according to customer complaint to be analyzed using business diary data, judges to complain
In violation of rules and regulations whether the authenticity and the complained business of determination of content.It has the disadvantage:Belong to passive processing, it is impossible to effectively reduce user
The rate of complaints;Meanwhile, as being based on insufficient grounds for business violation, there is a situation where that evidence obtaining is difficult.
The content of the invention
The technical problem that the embodiment of the present invention is solved is that there is provided a kind of violation terminal built-in behavior processing method, dress
Put and system, can actively, effectively find the behavior of violation terminal built-in and be handled, reduce the situation of terminal violation fee suction,
The rate of complaints of user to violation terminal built-in behavior fee suction is reduced, ensures user benefit from infringement.
To achieve these goals, the embodiments of the invention provide a kind of violation terminal built-in behavior processing method, including:
The user behaviors log data of capturing service management platform whole user;
Extract the daily record data that the user uplink uses business;
The upper line number that there are 182 mistakes in the daily record data of each user terminal number is counted respectively, is judged certain
Whether the upper line number for occurring 182 mistakes in the cycle exceedes setting number, in this way, then judges that the user terminal number is used to be abnormal
Family;
There is the upper of 182 mistakes in the daily record data for the up use business for counting the abnormal user respectively by SP business
Line number, judges whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, in this way, then judges the SP industry
It is engaged in as abnormal SP business;
Operation to exception SP business described in user's program request carries out service authentication control.
Further, to the operation progress service authentication control of exception SP business described in user's program request the step of, includes:
Abnormal SP business to user's program request carries out service group's authentication, determines its affiliated service group;
Authentication control is carried out to the SP business using service group's secondary-confirmation strategy corresponding to the service group of determination
System.
Further, service group's authentication, the step of determining its affiliated service group, specific bag are carried out to the SP business
Include:
According to the difference of the abnormal SP business violation order of severity, the business group belonging to the SP abnormal traffics is determined
Group.
Further, the service group includes high violation degree service group, middle violation degree service group and low violation
Service group is spent, wherein, there is the upper line number of 182 mistakes and reach that the SP business of the first setting number condition belongs to high violation degree business
, there is the upper line number of 182 mistakes and reaches that the SP business of the second setting number condition belongs to middle violation degree service group, occur in group
The upper line number of 182 mistakes reaches that the SP business of the 3rd setting number condition belongs to low violation degree service group.
Further, corresponding service group's secondary-confirmation strategy that the high violation degree service group sets as:It is secondary true
It is the equal secondary-confirmation of each program request to recognize rule, and secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation;
Corresponding service group's secondary-confirmation strategy that the middle violation degree service group sets as:Headed by secondary-confirmation rule
Secondary program request secondary-confirmation, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation;
Corresponding service group's secondary-confirmation strategy that the low violation degree service group sets as:Headed by secondary-confirmation rule
Secondary program request secondary-confirmation, secondary-confirmation pattern is simple problem secondary-confirmation.
Accordingly, the invention provides a kind of violation terminal built-in behavior processing unit, including:
Collecting unit, the user behaviors log data for the whole users of capturing service management platform;
Extracting unit, the daily record data of business is used for extracting the user uplink;
There are 182 mistakes in first judging unit, the daily record data for counting each user terminal number respectively
Upper line number, judges whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, in this way, then judges the user
Termination number is abnormal user;
Second judging unit, the daily record data of the up use business for counting the abnormal user respectively by SP business
The middle upper line number that there are 182 mistakes, judges whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, such as
It is then to judge the SP business as abnormal SP business;
Service authentication control unit, service authentication control is carried out for the operation to exception SP business described in user's program request.
Further, the service authentication control unit further comprises:
Determining unit, for carrying out service group's authentication to the abnormal SP business, determines the service group belonging to it;
Control unit, for service group's secondary-confirmation strategy corresponding to the service group using determination to the user
The SP business of program request carries out authentication control.
Accordingly, the invention provides a kind of violation terminal built-in behavior processing system, the system includes audit system
And Business Management Platform;
The audit system is used for the abnormal user for checking that terminal suspicion has built-in behavior in violation of rules and regulations, and according to described different
Normal user uplink checks out abnormal SP business using the daily record data of business, and according to preparatory condition, by the abnormal SP business
It is divided into different service groups, and for the different service group's secondary-confirmation strategies of different service group's settings;
The Business Management Platform is used for after the request of exception SP business described in user's program request is received, and carries out service group
Authentication, then carries out authentication control using corresponding service group's secondary-confirmation strategy to the abnormal SP business of user's program request.
Further, the audit system includes:
Collecting unit, the user behaviors log data for the whole users of capturing service management platform;
Extracting unit, the daily record data of business is used for extracting the user uplink;
Statistical analysis unit, for counting the upper line number in the presence of 182 mistakes respectively by user terminal number, it is determined that abnormal use
Family;And by the daily record data of the up use business of the abnormal user, counted respectively in the presence of 182 mistakes according to SP business
Upper line number, it is determined that exception SP business, and according to preparatory condition, the abnormal SP business is included in different service groups;
Dispensing unit, for setting different service group's secondary-confirmation strategies for different business group.
Further, the Business Management Platform includes:
Searching unit, for searching the service group belonging to the abnormal SP business of user's program request;
Authenticating unit, for the corresponding service group's secondary-confirmation plan of service group found using the searching unit
SP business slightly to user's program request is authenticated.
Further, the Business Management Platform is directed to different service group's secondary-confirmation strategies, provided with different topics
Storehouse, including random code exam pool, challenge exam pool and simple problem exam pool, the exam pool can also be supplied to by audit system
The Business Management Platform.
Implement the embodiment of the present invention, have the advantages that:
1st, by checking judgement, statistical analysis user uplink uses the daily record data of business, can more accurately found
There is the abnormal user and exception SP business of built-in behavior in violation of rules and regulations in terminal suspicion, and then control it management.
2nd, for different service groups, using different secondary-confirmation control strategies, it can realize and targetedly manage
Reason operation, makes terminal is built-in in violation of rules and regulations easily can not complete secondary-confirmation, significantly more efficient reduction terminal violation fee suction for user
Situation, reduction user ensures user benefit from infringement the complaint amount of violation fee suction.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this
Some embodiments of invention, for those of ordinary skill in the art, without having to pay creative labor, may be used also
To obtain other accompanying drawings according to these accompanying drawings.
Fig. 1 is the flow chart of the first embodiment of the violation terminal built-in behavior processing method of the present invention;
Fig. 2 is the flow chart of the second embodiment of the violation terminal built-in behavior processing method of the present invention;
Fig. 3 is service group's secondary-confirmation strategy configuration diagram of the invention;
Fig. 4 is flow chart of the user using the method program request SP business of the present invention;
Fig. 5 is the structural representation of an embodiment of the violation terminal built-in behavior processing unit of the present invention;
Fig. 6 is the structural representation of the service authentication control unit of the violation terminal built-in behavior processing unit of the present invention;
Fig. 7 is an example structure schematic diagram of the violation terminal built-in behavior processing system of the present invention;
Fig. 8 is the structural representation of the audit system of the present invention;
Fig. 9 is the structural representation of the Business Management Platform of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete
Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on
Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made
Embodiment, belongs to the scope of protection of the invention.
Fig. 1 is referred to, is the flow chart of the first embodiment of violation terminal built-in behavior processing method of the present invention;The side
Method includes:
Step S101, the user behaviors log data of capturing service management platform whole user.
In the specific implementation, the user behaviors log data of capturing service management platform user are prior art, here is omitted.
Step S102, extracts the daily record data that the user uplink uses business.
In the specific implementation, it is prior art to extract the user uplink using the daily record data of business, here is omitted.
Step S103, counts the upper line number that there are 182 mistakes in the daily record data of each user terminal number, sentences respectively
Break in some cycles occur 182 mistake upper line numbers whether exceed setting number, in this way, then judge the user terminal number as
Abnormal user.
It judges that principle is as follows:In the case of mobile information service switch is closed, user initiates upstream request and uses business,
182 error codes will be returned to when Business Management Platform is authenticated, 10086, which can issue prompt message, notifies user.It is normal to use
Family, will not continue to up use business;And terminal(Mountain vallage machine)Embedded software, shields the prompt message knot up without knowing
Really, then it may proceed to attempt, and cause substantial amounts of 182 mistake.Therefore, collection User action log is analyzed, and is checked in the presence of big
The situation of the mistake of amount 182, it can be found that terminal(Mountain vallage machine)SP business built in violation.
In the specific implementation, there are the upper line numbers of 182 mistakes in counting the daily record data of each user terminal number respectively,
If in some cycles(Such as one week), the user uplink uses many days of business(Such as more than 3 days, it can match somebody with somebody)In the presence of 182 mistakes,
Or exist within one week multiple(Such as more than 7 times, it can match somebody with somebody)182 mistakes, can assert that the user has built-in row in violation of rules and regulations for terminal suspicion
For abnormal user.
Exist in step S104, the daily record data for the up use business for counting the abnormal user respectively by SP business
The upper line number of 182 mistakes, judges whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, in this way, then sentences
The fixed SP business is exception SP business.
In the specific implementation, the daily record data of the up use business of whole abnormal users is first obtained, then according to SP business
Upper line number of every SP business in the presence of 182 mistakes is counted respectively, if the SP business is accessed in measurement period has following feelings
Shape:182 error numbers exceed setting value(50, it can match somebody with somebody)Or 182 the up number of times of mistake account for the ratios of all up number of times and exceed
Setting value(Such as 5%, it can match somebody with somebody), abnormal SP business of the SP business built in terminal violation can be assert.
Step S105, the operation to exception SP business described in user's program request carries out service authentication control.
In the specific implementation, the operation progress service authentication control to exception SP business described in user's program request can be existing skill
Art.It is preferred that, present invention also offers the service authentication control method that one is different from prior art, refer to shown in accompanying drawing 2
Embodiment.
The embodiment of the present invention has following technique effect:
By checking judgement, statistical analysis user uplink uses the daily record data of business, can more accurately find end
There is the abnormal user and exception SP business of built-in behavior in violation of rules and regulations in end suspicion, and then control it management.
Fig. 2 is referred to, is the flow chart of the second embodiment of violation terminal built-in behavior processing method of the present invention;The side
Method includes:
Step S201, the user behaviors log data of capturing service management platform whole user.
In the specific implementation, it is identical with the step S101 in embodiment illustrated in fig. 1, it will not be repeated here.
Step S202, extracts the daily record data that the user uplink uses business.
In the specific implementation, it is identical with the step S102 in embodiment illustrated in fig. 1, it will not be repeated here.
Step S203, counts the upper line number that there are 182 mistakes in the daily record data of each user terminal number, sentences respectively
Break in some cycles occur 182 mistake upper line numbers whether exceed setting number, in this way, then judge the user terminal number as
Abnormal user.
In the specific implementation, it is identical with the step S103 in embodiment illustrated in fig. 1, it will not be repeated here.
Exist in step S204, the daily record data for the up use business for counting the abnormal user respectively by SP business
The upper line number of 182 mistakes, judges whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, in this way, then sentences
The fixed SP business is exception SP business.
In the specific implementation, it is identical with the step S104 in embodiment illustrated in fig. 1, it will not be repeated here.
Step S205, the abnormal SP business to user's program request carries out service group's authentication, determines its affiliated service group.
Specifically, according to the difference of the abnormal SP business violation order of severity, determining belonging to the SP abnormal traffics
Service group.The service group includes high violation degree service group, middle violation degree service group and low violation degree business group
Group, wherein, there is the upper line number of 182 mistakes and reach that the SP business of the first setting number condition belongs to high violation degree service group, go out
The existing upper line number of 182 mistake reaches that the SP business of the second setting number condition belongs to middle violation degree service group, occurs in 182 mistakes
Line number reaches that the SP business of the 3rd setting number condition belongs to low violation degree service group.It is tight in violation of rules and regulations according to the abnormal SP business
The difference of weight degree, determines the service group belonging to the SP abnormal traffics.
Step S206, is entered using service group's secondary-confirmation strategy corresponding to the service group of determination to the SP business
Row authentication control.
In the specific implementation, corresponding service group's secondary-confirmation strategy is shown in Figure 3.
The corresponding service group's secondary-confirmation strategy of the high violation degree service group:Secondary-confirmation rule is each program request
Equal secondary-confirmation, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Wherein, challenge is by phase
The exam pool answered is provided, and challenge refers to the problem of its answer is unique, for example:" 2 Jia 3 equal to several "Answer is " 5 ", and user is defeated
Program request can be confirmed by entering correct option.Random code is provided by corresponding exam pool.Random code is generally a character string, its confirmation side
Formula can be, for example:" please input character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can confirm program request.
The corresponding service group's secondary-confirmation strategy of the middle violation degree service group:Secondary-confirmation rule is program request first
Secondary-confirmation, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Wherein, challenge is by corresponding
Exam pool provide, challenge refers to the problem of its answer is unique, for example:" 2 Jia 3 equal to several "Answer is " 5 ", user's input
Correct option can confirm program request.Random code is provided by corresponding exam pool.Random code is generally a character string, its validation testing
Can be, for example:" please input character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can confirm program request.
The corresponding service group's secondary-confirmation strategy of the low violation degree service group:Secondary-confirmation rule is program request first
Secondary-confirmation, secondary-confirmation pattern is simple problem secondary-confirmation.Wherein simple problem is provided by corresponding exam pool, simple problem
Refer to the problem of its answer there are many, for example:" Any Digit that please be input between 10 to 20 ", user can input " 11,
Any one in 12 ... ..., 19 ", you can confirm program request.
It should be noted that the corresponding secondary-confirmation rule of the high violation degree service group shown in figure is each program request
Equal secondary-confirmation, corresponding secondary-confirmation pattern is challenge or random code secondary-confirmation, middle violation degree service group pair
The secondary-confirmation rule answered is program request secondary-confirmation first, and corresponding secondary-confirmation pattern is that challenge or random code are secondary
Confirm, the corresponding secondary-confirmation rule of low violation degree service group is program request secondary-confirmation, corresponding secondary-confirmation pattern first
It is not what is uniquely determined for the pattern of simple problem secondary-confirmation, there can also be other associative modes, as long as meets a kind of
A kind of regular and a kind of secondary-confirmation pattern of secondary-confirmation of service group's correspondence.
Fig. 4 is referred to, is the flow chart that user uses the inventive method program request SP business.
1)User initiates up-on command demand (telecommunication) service to Short Message Service Gateway;
2)Order request is sent to Business Management Platform by Short Message Service Gateway;
3)Business Management Platform does service group's authentication, and which group is judgement business belong to;
4)Service group's secondary-confirmation strategy authentication, judges the secondary-confirmation strategy corresponding to the service group of ownership;
5)Business Management Platform returns to Short Message Service Gateway order request response, and mark needs user to carry out secondary-confirmation;
6)Business Management Platform carries secondary-confirmation strategy to sms center forwarding secondary-confirmation request;
7)Sms center combines corresponding secondary-confirmation short message according to secondary-confirmation strategy;
8)Sms center issues secondary-confirmation short message to user;
9)User replys secondary-confirmation short message;
10)Sms center initiates program request confirmation request to Business Management Platform;
11)Business Management Platform generates interim order relations;
12)Business Management Platform sends program request to Short Message Service Gateway and confirms to respond;
13)Short Message Service Gateway issues program request and confirms to respond to user.
The embodiment of the present invention has following technique effect:
1st, by checking judgement, statistical analysis user uplink uses the daily record data of business, can more accurately found
There is the abnormal user and exception SP business of built-in behavior in violation of rules and regulations in terminal suspicion, and then control it management.
2nd, for different service groups, using different secondary-confirmation control strategies, it can realize and targetedly manage
Reason operation, makes terminal is built-in in violation of rules and regulations easily can not complete secondary-confirmation, significantly more efficient reduction terminal violation fee suction for user
Situation, reduction user to the complaint amount of violation fee suction, meanwhile, can also improve the perception that normal users use business.
Accordingly, the invention also discloses a kind of violation terminal built-in behavior processing unit, Fig. 5 is whole for the violation of the present invention
The structural representation of one embodiment of the built-in behavior processing unit in end, as shown in Fig. 5, described device 1 includes:Collecting unit 11,
Extracting unit 12, the first judging unit 13, the second judging unit 14 and service authentication control unit 15.
The collecting unit 11, the user behaviors log data for the whole users of capturing service management platform.
Specifically, the collecting unit 11 is prior art, here is omitted.
The extracting unit 12, the daily record data of business is used for extracting the user uplink.
Specifically, the extracting unit 12 is prior art, here is omitted.
There are 182 mistakes in first judging unit 13, the daily record data for counting each user terminal number respectively
Upper line number, judge in some cycles occur 182 mistake upper line numbers whether exceed setting number, in this way, then judge the use
Family termination number is abnormal user.
It judges that principle is as follows:In the case of mobile information service switch is closed, user initiates upstream request and uses business,
182 error codes will be returned to when Business Management Platform is authenticated, 10086, which can issue prompt message, notifies user.It is normal to use
Family, will not continue to up use business;And terminal(Mountain vallage machine)Embedded software, shields the prompt message knot up without knowing
Really, then it may proceed to attempt, and cause substantial amounts of 182 mistake.Therefore, collection User action log is analyzed, and is checked in the presence of big
The situation of the mistake of amount 182, it can be found that terminal(Mountain vallage machine)SP business built in violation.
In the specific implementation, there are the upper line numbers of 182 mistakes in counting the daily record data of each user terminal number respectively,
If in some cycles(Such as one week), the user uplink uses many days of business(Such as more than 3 days, it can match somebody with somebody)In the presence of 182 mistakes,
Or exist within one week multiple(Such as more than 7 times, it can match somebody with somebody)182 mistakes, can assert that the user has built-in row in violation of rules and regulations for terminal suspicion
For abnormal user.
Second judging unit 14, the daily record number of the up use business for counting the abnormal user respectively by SP business
According to the middle upper line number that there are 182 mistakes, judge whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number,
In this way, then judge the SP business as abnormal SP business.
In the specific implementation, the daily record data of the up use business of whole abnormal users is first obtained, then according to SP business
Upper line number of every SP business in the presence of 182 mistakes is counted respectively, if the SP business is accessed in measurement period has following feelings
Shape:182 error numbers exceed setting value(50, it can match somebody with somebody)Or 182 the up number of times of mistake account for the ratios of all up number of times and exceed
Setting value(Such as 5%, it can match somebody with somebody), abnormal SP business of the SP business built in terminal violation can be assert.
Service authentication control unit 15, service authentication control is carried out for the operation to exception SP business described in user's program request
System.
Specifically, the service authentication control unit 15 further comprises:Determining unit 151 and control unit 152, specifically
Incorporated by reference to referring to Fig. 6.
The determining unit 151, for carrying out service group's authentication to the abnormal SP business, determines the business belonging to it
Group.
In the specific implementation, the service group include high violation degree service group, middle violation degree service group and it is low disobey
Normality service group, wherein, there is the upper line number of 182 mistakes and reach that the SP business of the 3rd setting number condition belongs to high violation degree industry
Be engaged in group, the upper line number of 182 mistakes occurs and reaches that the SP business of the 4th setting number condition belongs to middle violation degree service group, occurs
The upper line number of 182 mistakes reaches that the SP business of the 5th setting number condition belongs to low violation degree service group.According to the abnormal SP
The difference of the business violation order of severity, determines the service group belonging to the SP abnormal traffics.
Described control unit 152, for using service group's secondary-confirmation strategy pair corresponding to the service group determined
The SP business of user's program request carries out authentication control.
In the specific implementation, corresponding service group's secondary-confirmation strategy is shown in Figure 3.
The corresponding service group's secondary-confirmation strategy of the high violation degree service group:Secondary-confirmation rule is each program request
Equal secondary-confirmation, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Wherein, challenge is by phase
The exam pool answered is provided, and challenge refers to the problem of its answer is unique, for example:" 2 Jia 3 equal to several "Answer is " 5 ", and user is defeated
Program request can be confirmed by entering correct option.Random code is provided by corresponding exam pool.Random code is generally a character string, its confirmation side
Formula can be, for example:" please input character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can confirm program request.
The corresponding service group's secondary-confirmation strategy of the middle violation degree service group:Secondary-confirmation rule is program request first
Secondary-confirmation, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Wherein, challenge is by corresponding
Exam pool provide, challenge refers to the problem of its answer is unique, for example:" 2 Jia 3 equal to several "Answer is " 5 ", user's input
Correct option can confirm program request.Random code is provided by corresponding exam pool.Random code is generally a character string, its validation testing
Can be, for example:" please input character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can confirm program request.
The corresponding service group's secondary-confirmation strategy of the low violation degree service group:Secondary-confirmation rule is program request first
Secondary-confirmation, secondary-confirmation pattern is simple problem secondary-confirmation.Wherein simple problem is provided by corresponding exam pool, simple problem
Refer to the problem of its answer there are many, for example:" Any Digit that please be input between 10 to 20 ", user can input " 11,
Any one in 12 ... ..., 19 ", you can confirm program request.
The embodiment of the present invention has following technique effect:
1st, by checking judgement, statistical analysis user uplink uses the daily record data of business, can more accurately found
There is the abnormal user and exception SP business of built-in behavior in violation of rules and regulations in terminal suspicion, and then control it management.
2nd, for different service groups, using different secondary-confirmation control strategies, it can realize and targetedly manage
Reason operation, makes terminal is built-in in violation of rules and regulations easily can not complete secondary-confirmation, significantly more efficient reduction terminal violation fee suction for user
Situation, reduction user to the complaint amount of violation fee suction, meanwhile, can also improve the perception that normal users use business.
Accordingly, present invention also offers a kind of violation terminal built-in behavior processing system.Fig. 7 is whole for the violation of the present invention
One example structure schematic diagram of the built-in behavior processing system in end, as shown in fig. 7, the system 1 includes audit system 11 and industry
Business management platform 12.
The audit system 11, for checking that the exception that terminal suspicion has built-in behavior in violation of rules and regulations on Business Management Platform is used
Family, and abnormal SP business is checked out according to the daily record data of the up use business of the abnormal user, and according to preparatory condition,
The abnormal SP business is divided into different service groups, and it is secondary for the different service groups of different service group's settings
Confirm strategy.
Specifically, referring to Fig. 8, the audit system 11 includes:
Collecting unit 111, the user behaviors log data for the whole users of capturing service management platform.
Extracting unit 112, the daily record data of business is used for extracting the user uplink.
Statistical analysis unit 113, for counting the upper line number in the presence of 182 mistakes respectively by user terminal number, is determined different
Conventional family;And by the daily record data of the up use business of the abnormal user, count wrong in the presence of 182 respectively according to SP business
Upper line number by mistake, it is determined that exception SP business, and according to preparatory condition, the abnormal SP business is included in different service groups.
Dispensing unit 114, for setting different service group's secondary-confirmation strategies for different business group.
The Business Management Platform 12, for after the request of exception SP business described in user's program request is received, carrying out business
Group authenticates, and then carries out authentication control to the abnormal SP business of user's program request using corresponding service group's secondary-confirmation strategy
System.
Wherein, the Business Management Platform is directed to different service group's secondary-confirmation strategies, provided with different exam pools, bag
Random code exam pool, challenge exam pool and simple problem exam pool are included, the exam pool can also be supplied to described by audit system
Business Management Platform.
Specifically, incorporated by reference to referring to Fig. 9, the Business Management Platform 12 includes:
Searching unit 121, for searching the service group belonging to the abnormal SP business of user's program request.
In the specific implementation, the service group include high violation degree service group, middle violation degree service group and it is low disobey
Normality service group, wherein, there is the upper line number of 182 mistakes and reach that the SP business of the 3rd setting number condition belongs to high violation degree industry
Be engaged in group, the upper line number of 182 mistakes occurs and reaches that the SP business of the 4th setting number condition belongs to middle violation degree service group, occurs
The upper line number of 182 mistakes reaches that the SP business of the 5th setting number condition belongs to low violation degree service group.According to the abnormal SP
The difference of the business violation order of severity, determines the service group belonging to the SP abnormal traffics.
Authenticating unit 122, the corresponding service group of service group for being found using the searching unit is secondary really
Recognize strategy to authenticate the SP business of user's program request.
In the specific implementation, corresponding service group's secondary-confirmation strategy is shown in Figure 3.
The corresponding service group's secondary-confirmation strategy of the high violation degree service group:Secondary-confirmation rule is each program request
Equal secondary-confirmation, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Wherein, challenge is by phase
The exam pool answered is provided, and challenge refers to the problem of its answer is unique, for example:" 2 Jia 3 equal to several "Answer is " 5 ", and user is defeated
Program request can be confirmed by entering correct option.Random code is provided by corresponding exam pool.Random code is generally a character string, its confirmation side
Formula can be, for example:" please input character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can confirm program request.
The corresponding service group's secondary-confirmation strategy of the middle violation degree service group:Secondary-confirmation rule is program request first
Secondary-confirmation, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Wherein, challenge is by corresponding
Exam pool provide, challenge refers to the problem of its answer is unique, for example:" 2 Jia 3 equal to several "Answer is " 5 ", user's input
Correct option can confirm program request.Random code is provided by corresponding exam pool.Random code is generally a character string, its validation testing
Can be, for example:" please input character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can confirm program request.
The corresponding service group's secondary-confirmation strategy of the low violation degree service group:Secondary-confirmation rule is program request first
Secondary-confirmation, secondary-confirmation pattern is simple problem secondary-confirmation.Wherein simple problem is provided by corresponding exam pool, simple problem
Refer to the problem of its answer there are many, for example:" Any Digit that please be input between 10 to 20 ", user can input " 11,
Any one in 12 ... ..., 19 ", you can confirm program request.
The embodiment of the present invention has following technique effect:
1st, by checking judgement, statistical analysis user uplink uses the daily record data of business, can more accurately found
There is the abnormal user and exception SP business of built-in behavior in violation of rules and regulations in terminal suspicion, and then control it management.
2nd, for different service groups, using different secondary-confirmation control strategies, it can realize and targetedly manage
Reason operation, makes terminal is built-in in violation of rules and regulations easily can not complete secondary-confirmation, significantly more efficient reduction terminal violation fee suction for user
Situation, reduction user to the complaint amount of violation fee suction, meanwhile, can also improve the perception that normal users use business.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with
The hardware of correlation is instructed to complete by computer program, described program can be stored in a computer read/write memory medium
In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic
Dish, CD, read-only memory(Read-Only Memory, ROM)Or random access memory(Random Access
Memory, RAM)Deng.
Above disclosure is only preferred embodiment of present invention, can not limit the right model of the present invention with this certainly
Enclose, one of ordinary skill in the art will appreciate that all or part of flow of above-described embodiment is realized, and will according to right of the present invention
Made equivalent variations are sought, still falls within and invents covered scope.
Claims (6)
1. a kind of built-in behavior processing method of terminal violation, it is characterised in that including:
The user behaviors log data of capturing service management platform whole user;
Extract the daily record data that the user uplink uses business;
The upper line number that there are 182 mistakes in the daily record data of each user terminal number is counted respectively, is judged in some cycles
Whether the interior upper line number for 182 mistakes occur exceedes setting number, in this way, then judges the user terminal number as abnormal user;
There is the up of 182 mistakes in the daily record data for the up use business for counting the abnormal user respectively by SP business
Number, judges whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, in this way, then judges the SP business
For abnormal SP business;
Operation to exception SP business described in user's program request carries out service authentication control;
The step of carrying out service authentication control to the operation of exception SP business described in user's program request includes:
Abnormal SP business to user's program request carries out service group's authentication, determines its affiliated service group;
Authentication control is carried out to the SP business using service group's secondary-confirmation strategy corresponding to the service group of determination;
Service group's authentication is carried out to the SP business, the step of determining its affiliated service group specifically includes:
According to the difference of the abnormal SP business violation order of severity, the service group belonging to the SP abnormal traffics is determined.
2. according to the method described in claim 1, it is characterised in that the service group include high violation degree service group, in
Violation degree service group and low violation degree service group, wherein, there is the upper line number of 182 mistakes and reach the first setting number condition
SP business belong to high violation degree service group, there is the SP business category that the upper line numbers of 182 mistakes reach the second setting number condition
In middle violation degree service group, there is the upper line number of 182 mistakes and reach that the SP business of the 3rd setting number condition belongs to low violation degree
Service group.
3. method according to claim 2, it is characterised in that:
Corresponding service group's secondary-confirmation strategy that the high violation degree service group sets as:Secondary-confirmation rule is each point
Equal secondary-confirmation is broadcast, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation;
Corresponding service group's secondary-confirmation strategy that the middle violation degree service group sets as:Secondary-confirmation rule is point first
Secondary-confirmation is broadcast, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation;
Corresponding service group's secondary-confirmation strategy that the low violation degree service group sets as:Secondary-confirmation rule is point first
Secondary-confirmation is broadcast, secondary-confirmation pattern is simple problem secondary-confirmation.
4. a kind of built-in behavior processing unit of terminal violation, it is characterised in that including:
Collecting unit, the user behaviors log data for the whole users of capturing service management platform;
Extracting unit, the daily record data of business is used for extracting the user uplink;
There is the up of 182 mistakes in first judging unit, the daily record data for counting each user terminal number respectively
Number, judges whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, in this way, then judges the user terminal
Number is abnormal user;
Deposited in second judging unit, the daily record data for the up use business for counting the abnormal user respectively by SP business
In the upper line number of 182 mistakes, judge whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, in this way, then
Judge the SP business as abnormal SP business;
Service authentication control unit, service authentication control is carried out for the operation to exception SP business described in user's program request;
The service authentication control unit further comprises:
Determining unit, for carrying out service group's authentication to the abnormal SP business, determines the service group belonging to it;
Control unit, for service group's secondary-confirmation strategy corresponding to the service group using determination to user's program request
SP business carry out authentication control;
The determining unit, specifically for the difference according to the abnormal SP business violation order of severity, determines that the SP is abnormal
Service group belonging to business.
5. a kind of built-in behavior processing system of terminal violation, it is characterised in that the system includes audit system and service management
Platform;
The audit system is used for the abnormal user for checking that terminal suspicion has built-in behavior in violation of rules and regulations, and is used according to the exception
The daily record data of the up use business in family checks out abnormal SP business, and according to preparatory condition, the abnormal SP business is divided into
Different service groups, and for the different service group's secondary-confirmation strategies of different service group's settings;
The Business Management Platform is used for after the request of exception SP business described in user's program request is received, and carries out service group's mirror
Power, then carries out authentication control using corresponding service group's secondary-confirmation strategy to the abnormal SP business of user's program request;
The audit system includes:
Collecting unit, the user behaviors log data for the whole users of capturing service management platform;
Extracting unit, the daily record data of business is used for extracting the user uplink;
Statistical analysis unit, for counting the upper line number in the presence of 182 mistakes respectively by user terminal number, determines abnormal user;
And by the daily record data of the up use business of the abnormal user, counted respectively in the presence of the upper of 182 mistakes according to SP business
Line number, it is determined that exception SP business, and according to preparatory condition, the abnormal SP business is included in different service groups;
Dispensing unit, for setting different service group's secondary-confirmation strategies for different business group;
The Business Management Platform includes:
Searching unit, for searching the service group belonging to the abnormal SP business of user's program request;
Authenticating unit, for the corresponding service group's secondary-confirmation strategy pair of service group found using the searching unit
The SP business of user's program request is authenticated.
6. system as claimed in claim 5, it is characterised in that the Business Management Platform is secondary for different service groups
Confirm strategy, provided with different exam pools, including random code exam pool, challenge exam pool and simple problem exam pool, the exam pool
The Business Management Platform can also be supplied to by audit system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110218441.5A CN102917352B (en) | 2011-08-01 | 2011-08-01 | A kind of violation terminal built-in behavior processing method, apparatus and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201110218441.5A CN102917352B (en) | 2011-08-01 | 2011-08-01 | A kind of violation terminal built-in behavior processing method, apparatus and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102917352A CN102917352A (en) | 2013-02-06 |
CN102917352B true CN102917352B (en) | 2017-11-03 |
Family
ID=47615547
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201110218441.5A Active CN102917352B (en) | 2011-08-01 | 2011-08-01 | A kind of violation terminal built-in behavior processing method, apparatus and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102917352B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105636076B (en) * | 2014-11-07 | 2019-06-07 | 中国移动通信集团四川有限公司 | A kind of auditing method, device and the equipment of the behavior of violation terminal built-in |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101198140A (en) * | 2007-12-29 | 2008-06-11 | 深圳华为通信技术有限公司 | Terminal exception reminding method and apparatus |
CN101291259A (en) * | 2007-04-18 | 2008-10-22 | 阿里巴巴集团控股有限公司 | System and method for monitoring geographic position of website visitor and visiting status |
CN102006588A (en) * | 2010-12-28 | 2011-04-06 | 北京安天电子设备有限公司 | Method and system for monitoring network behavior of smart mobile phone |
CN102082704A (en) * | 2009-11-30 | 2011-06-01 | 中国移动通信集团河北有限公司 | Safety monitoring method and system |
-
2011
- 2011-08-01 CN CN201110218441.5A patent/CN102917352B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101291259A (en) * | 2007-04-18 | 2008-10-22 | 阿里巴巴集团控股有限公司 | System and method for monitoring geographic position of website visitor and visiting status |
CN101198140A (en) * | 2007-12-29 | 2008-06-11 | 深圳华为通信技术有限公司 | Terminal exception reminding method and apparatus |
CN102082704A (en) * | 2009-11-30 | 2011-06-01 | 中国移动通信集团河北有限公司 | Safety monitoring method and system |
CN102006588A (en) * | 2010-12-28 | 2011-04-06 | 北京安天电子设备有限公司 | Method and system for monitoring network behavior of smart mobile phone |
Also Published As
Publication number | Publication date |
---|---|
CN102917352A (en) | 2013-02-06 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103379090B (en) | A kind of control method for frequency and system, frequency server of open platform access | |
CN104933207B (en) | The acquisition methods and system of user behavior data in application program | |
CN1607768A (en) | Pay-per-connection scheme for wireless access to internet | |
CN102917334B (en) | A kind of violation terminal built-in behavior processing method, apparatus and system | |
CN106302534B (en) | A kind of method and system of detection and processing illegal user | |
CN107657156A (en) | User ID authentication method and device based on user operation habits and contact pressure area | |
CN1996839A (en) | A low-cost and easy-to-distribute identity verification method and device | |
CN107612922A (en) | User ID authentication method and device based on user operation habits and geographical position | |
CN109727027A (en) | Account recognition methods, device, equipment and storage medium | |
CN105050068A (en) | Billing bill recording, detection, and correction method, apparatus, and bill processing system | |
CN113923048B (en) | Network attack behavior identification method, device, equipment and storage medium | |
KR20090003134A (en) | Illegal login protection system and method based on pc registratrion | |
CN102917352B (en) | A kind of violation terminal built-in behavior processing method, apparatus and system | |
WO2011048907A1 (en) | Game system | |
CN110415025A (en) | A kind of verification method and device | |
CN102917335B (en) | A kind of violation terminal built-in behavior processing method, apparatus and system | |
CN107623696A (en) | A kind of user ID authentication method and device based on user behavior feature | |
US20040162142A1 (en) | System for playing games through a communication device | |
CN107872491A (en) | A kind of data processing method and device | |
CN115802359A (en) | Method and device for preventing and treating spam short messages | |
WO2014177098A1 (en) | Application software online payment processing method and system | |
CN111294311B (en) | Traffic charging method and system for preventing traffic fraud | |
CN102780686A (en) | Credible resource based method and device for protecting bank user information | |
CN102740451B (en) | Activating and registering method for intelligent mobile phone | |
CN101163008B (en) | Anti-hacking and anti-number stolen system of online game |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |