CN102917352B - A kind of violation terminal built-in behavior processing method, apparatus and system - Google Patents

A kind of violation terminal built-in behavior processing method, apparatus and system Download PDF

Info

Publication number
CN102917352B
CN102917352B CN201110218441.5A CN201110218441A CN102917352B CN 102917352 B CN102917352 B CN 102917352B CN 201110218441 A CN201110218441 A CN 201110218441A CN 102917352 B CN102917352 B CN 102917352B
Authority
CN
China
Prior art keywords
business
user
service group
confirmation
abnormal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201110218441.5A
Other languages
Chinese (zh)
Other versions
CN102917352A (en
Inventor
胡铁
胡云
杨刚
张磊
水波
王珂
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Beijing Co Ltd
Aspire Digital Technologies Shenzhen Co Ltd
Original Assignee
China Mobile Group Beijing Co Ltd
Aspire Digital Technologies Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Beijing Co Ltd, Aspire Digital Technologies Shenzhen Co Ltd filed Critical China Mobile Group Beijing Co Ltd
Priority to CN201110218441.5A priority Critical patent/CN102917352B/en
Publication of CN102917352A publication Critical patent/CN102917352A/en
Application granted granted Critical
Publication of CN102917352B publication Critical patent/CN102917352B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention discloses a kind of violation terminal built-in behavior processing method, apparatus and system, methods described includes:The user behaviors log data of capturing service management platform whole user;Extract the daily record data that the user uplink uses business;The upper line number that there are 182 mistakes in the daily record data of each user terminal number is counted respectively, checks out abnormal user;There is the upper line number of 182 mistakes in the daily record data for the up use business for counting the abnormal user respectively by SP business, check out abnormal SP business;Operation to exception SP business described in user's program request carries out service authentication control.Device and system of the present invention can be used for realizing methods described.Using the present invention, it can accurately find the behavior of violation terminal built-in and effectively contain this behavior, reduce the situation of terminal violation fee suction, ensure user benefit from infringement.

Description

A kind of violation terminal built-in behavior processing method, apparatus and system
Technical field
The present invention relates to communication technical field, more particularly to a kind of violation terminal built-in behavior processing method, device and it is System.
Background technology
As the user group using mountain vallage machine increasingly increases, partial service provider gives birth in conjunction with solution business, mobile phone Business men, the built-in SP of violation in mountain vallage machine(ISP, Service Provider)Business, in the unwitting situation of user Built-in SP business is deducted fees in violation of rules and regulations in lower triggering, here it is so-called " mountain vallage machine fee suction trap ".This Terminal Type(Mountain vallage machine)In in violation of rules and regulations The behavior of putting has triggered the substantial amounts of complaint of user, and certain customers open in order to avoid closing mobile information service by fee suction even requirement Close, the serious popularization that have impact on regular traffic.At present, terminal(Mountain vallage machine)Built-in behavior is many in violation of rules and regulations, and common disobeys Rule built-in manner includes:Built-in menu mode, when user clicks on the built-in menu of mountain vallage machine, that is, triggers service order or industry Make sure use;Built-in backdoor programs mode, Backdoor Software is random or is used according to user key-press triggering service order or business;It is interior Put Games Software mode, mountain vallage machine user during playing mobile phone built-in game, it is necessary to when into next pass, by " it is determined that " I.e. triggering service order or business are used;Application software mode, the application software that user downloads(Such as mobile phone theme)In, hide Fee suction trap, automatic triggering service order or business are used.
For violation terminal built-in behavior, at present in the means of checking, mainly there are the testing of mountain vallage machine, customer complaint verification two Kind.Mountain vallage machine testing, active testing is carried out for business conduct built in the violation in mountain vallage machine, and discovery has analog subscriber and ordered Purchase, without reminding rates, menu content is vulgar, the problems such as not providing business tine of deducting fees so that judge terminal suspicion exist disobey The abnormal user and exception SP business of the built-in behavior of rule.It has the disadvantage:Type limited coverage area, can only find part mountain vallage machine Unlawful practice;Mountain vallage machine manufacturer has been carried out built-in by batch selectivity, therefore testing result has inaccuracy.Customer complaint Verification, then be to extract user by artificial mode according to customer complaint to be analyzed using business diary data, judges to complain In violation of rules and regulations whether the authenticity and the complained business of determination of content.It has the disadvantage:Belong to passive processing, it is impossible to effectively reduce user The rate of complaints;Meanwhile, as being based on insufficient grounds for business violation, there is a situation where that evidence obtaining is difficult.
The content of the invention
The technical problem that the embodiment of the present invention is solved is that there is provided a kind of violation terminal built-in behavior processing method, dress Put and system, can actively, effectively find the behavior of violation terminal built-in and be handled, reduce the situation of terminal violation fee suction, The rate of complaints of user to violation terminal built-in behavior fee suction is reduced, ensures user benefit from infringement.
To achieve these goals, the embodiments of the invention provide a kind of violation terminal built-in behavior processing method, including:
The user behaviors log data of capturing service management platform whole user;
Extract the daily record data that the user uplink uses business;
The upper line number that there are 182 mistakes in the daily record data of each user terminal number is counted respectively, is judged certain Whether the upper line number for occurring 182 mistakes in the cycle exceedes setting number, in this way, then judges that the user terminal number is used to be abnormal Family;
There is the upper of 182 mistakes in the daily record data for the up use business for counting the abnormal user respectively by SP business Line number, judges whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, in this way, then judges the SP industry It is engaged in as abnormal SP business;
Operation to exception SP business described in user's program request carries out service authentication control.
Further, to the operation progress service authentication control of exception SP business described in user's program request the step of, includes:
Abnormal SP business to user's program request carries out service group's authentication, determines its affiliated service group;
Authentication control is carried out to the SP business using service group's secondary-confirmation strategy corresponding to the service group of determination System.
Further, service group's authentication, the step of determining its affiliated service group, specific bag are carried out to the SP business Include:
According to the difference of the abnormal SP business violation order of severity, the business group belonging to the SP abnormal traffics is determined Group.
Further, the service group includes high violation degree service group, middle violation degree service group and low violation Service group is spent, wherein, there is the upper line number of 182 mistakes and reach that the SP business of the first setting number condition belongs to high violation degree business , there is the upper line number of 182 mistakes and reaches that the SP business of the second setting number condition belongs to middle violation degree service group, occur in group The upper line number of 182 mistakes reaches that the SP business of the 3rd setting number condition belongs to low violation degree service group.
Further, corresponding service group's secondary-confirmation strategy that the high violation degree service group sets as:It is secondary true It is the equal secondary-confirmation of each program request to recognize rule, and secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation;
Corresponding service group's secondary-confirmation strategy that the middle violation degree service group sets as:Headed by secondary-confirmation rule Secondary program request secondary-confirmation, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation;
Corresponding service group's secondary-confirmation strategy that the low violation degree service group sets as:Headed by secondary-confirmation rule Secondary program request secondary-confirmation, secondary-confirmation pattern is simple problem secondary-confirmation.
Accordingly, the invention provides a kind of violation terminal built-in behavior processing unit, including:
Collecting unit, the user behaviors log data for the whole users of capturing service management platform;
Extracting unit, the daily record data of business is used for extracting the user uplink;
There are 182 mistakes in first judging unit, the daily record data for counting each user terminal number respectively Upper line number, judges whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, in this way, then judges the user Termination number is abnormal user;
Second judging unit, the daily record data of the up use business for counting the abnormal user respectively by SP business The middle upper line number that there are 182 mistakes, judges whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, such as It is then to judge the SP business as abnormal SP business;
Service authentication control unit, service authentication control is carried out for the operation to exception SP business described in user's program request.
Further, the service authentication control unit further comprises:
Determining unit, for carrying out service group's authentication to the abnormal SP business, determines the service group belonging to it;
Control unit, for service group's secondary-confirmation strategy corresponding to the service group using determination to the user The SP business of program request carries out authentication control.
Accordingly, the invention provides a kind of violation terminal built-in behavior processing system, the system includes audit system And Business Management Platform;
The audit system is used for the abnormal user for checking that terminal suspicion has built-in behavior in violation of rules and regulations, and according to described different Normal user uplink checks out abnormal SP business using the daily record data of business, and according to preparatory condition, by the abnormal SP business It is divided into different service groups, and for the different service group's secondary-confirmation strategies of different service group's settings;
The Business Management Platform is used for after the request of exception SP business described in user's program request is received, and carries out service group Authentication, then carries out authentication control using corresponding service group's secondary-confirmation strategy to the abnormal SP business of user's program request.
Further, the audit system includes:
Collecting unit, the user behaviors log data for the whole users of capturing service management platform;
Extracting unit, the daily record data of business is used for extracting the user uplink;
Statistical analysis unit, for counting the upper line number in the presence of 182 mistakes respectively by user terminal number, it is determined that abnormal use Family;And by the daily record data of the up use business of the abnormal user, counted respectively in the presence of 182 mistakes according to SP business Upper line number, it is determined that exception SP business, and according to preparatory condition, the abnormal SP business is included in different service groups;
Dispensing unit, for setting different service group's secondary-confirmation strategies for different business group.
Further, the Business Management Platform includes:
Searching unit, for searching the service group belonging to the abnormal SP business of user's program request;
Authenticating unit, for the corresponding service group's secondary-confirmation plan of service group found using the searching unit SP business slightly to user's program request is authenticated.
Further, the Business Management Platform is directed to different service group's secondary-confirmation strategies, provided with different topics Storehouse, including random code exam pool, challenge exam pool and simple problem exam pool, the exam pool can also be supplied to by audit system The Business Management Platform.
Implement the embodiment of the present invention, have the advantages that:
1st, by checking judgement, statistical analysis user uplink uses the daily record data of business, can more accurately found There is the abnormal user and exception SP business of built-in behavior in violation of rules and regulations in terminal suspicion, and then control it management.
2nd, for different service groups, using different secondary-confirmation control strategies, it can realize and targetedly manage Reason operation, makes terminal is built-in in violation of rules and regulations easily can not complete secondary-confirmation, significantly more efficient reduction terminal violation fee suction for user Situation, reduction user ensures user benefit from infringement the complaint amount of violation fee suction.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments of invention, for those of ordinary skill in the art, without having to pay creative labor, may be used also To obtain other accompanying drawings according to these accompanying drawings.
Fig. 1 is the flow chart of the first embodiment of the violation terminal built-in behavior processing method of the present invention;
Fig. 2 is the flow chart of the second embodiment of the violation terminal built-in behavior processing method of the present invention;
Fig. 3 is service group's secondary-confirmation strategy configuration diagram of the invention;
Fig. 4 is flow chart of the user using the method program request SP business of the present invention;
Fig. 5 is the structural representation of an embodiment of the violation terminal built-in behavior processing unit of the present invention;
Fig. 6 is the structural representation of the service authentication control unit of the violation terminal built-in behavior processing unit of the present invention;
Fig. 7 is an example structure schematic diagram of the violation terminal built-in behavior processing system of the present invention;
Fig. 8 is the structural representation of the audit system of the present invention;
Fig. 9 is the structural representation of the Business Management Platform of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation is described, it is clear that described embodiment is only a part of embodiment of the invention, rather than whole embodiments.It is based on Embodiment in the present invention, it is every other that those of ordinary skill in the art are obtained under the premise of creative work is not made Embodiment, belongs to the scope of protection of the invention.
Fig. 1 is referred to, is the flow chart of the first embodiment of violation terminal built-in behavior processing method of the present invention;The side Method includes:
Step S101, the user behaviors log data of capturing service management platform whole user.
In the specific implementation, the user behaviors log data of capturing service management platform user are prior art, here is omitted.
Step S102, extracts the daily record data that the user uplink uses business.
In the specific implementation, it is prior art to extract the user uplink using the daily record data of business, here is omitted.
Step S103, counts the upper line number that there are 182 mistakes in the daily record data of each user terminal number, sentences respectively Break in some cycles occur 182 mistake upper line numbers whether exceed setting number, in this way, then judge the user terminal number as Abnormal user.
It judges that principle is as follows:In the case of mobile information service switch is closed, user initiates upstream request and uses business, 182 error codes will be returned to when Business Management Platform is authenticated, 10086, which can issue prompt message, notifies user.It is normal to use Family, will not continue to up use business;And terminal(Mountain vallage machine)Embedded software, shields the prompt message knot up without knowing Really, then it may proceed to attempt, and cause substantial amounts of 182 mistake.Therefore, collection User action log is analyzed, and is checked in the presence of big The situation of the mistake of amount 182, it can be found that terminal(Mountain vallage machine)SP business built in violation.
In the specific implementation, there are the upper line numbers of 182 mistakes in counting the daily record data of each user terminal number respectively, If in some cycles(Such as one week), the user uplink uses many days of business(Such as more than 3 days, it can match somebody with somebody)In the presence of 182 mistakes, Or exist within one week multiple(Such as more than 7 times, it can match somebody with somebody)182 mistakes, can assert that the user has built-in row in violation of rules and regulations for terminal suspicion For abnormal user.
Exist in step S104, the daily record data for the up use business for counting the abnormal user respectively by SP business The upper line number of 182 mistakes, judges whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, in this way, then sentences The fixed SP business is exception SP business.
In the specific implementation, the daily record data of the up use business of whole abnormal users is first obtained, then according to SP business Upper line number of every SP business in the presence of 182 mistakes is counted respectively, if the SP business is accessed in measurement period has following feelings Shape:182 error numbers exceed setting value(50, it can match somebody with somebody)Or 182 the up number of times of mistake account for the ratios of all up number of times and exceed Setting value(Such as 5%, it can match somebody with somebody), abnormal SP business of the SP business built in terminal violation can be assert.
Step S105, the operation to exception SP business described in user's program request carries out service authentication control.
In the specific implementation, the operation progress service authentication control to exception SP business described in user's program request can be existing skill Art.It is preferred that, present invention also offers the service authentication control method that one is different from prior art, refer to shown in accompanying drawing 2 Embodiment.
The embodiment of the present invention has following technique effect:
By checking judgement, statistical analysis user uplink uses the daily record data of business, can more accurately find end There is the abnormal user and exception SP business of built-in behavior in violation of rules and regulations in end suspicion, and then control it management.
Fig. 2 is referred to, is the flow chart of the second embodiment of violation terminal built-in behavior processing method of the present invention;The side Method includes:
Step S201, the user behaviors log data of capturing service management platform whole user.
In the specific implementation, it is identical with the step S101 in embodiment illustrated in fig. 1, it will not be repeated here.
Step S202, extracts the daily record data that the user uplink uses business.
In the specific implementation, it is identical with the step S102 in embodiment illustrated in fig. 1, it will not be repeated here.
Step S203, counts the upper line number that there are 182 mistakes in the daily record data of each user terminal number, sentences respectively Break in some cycles occur 182 mistake upper line numbers whether exceed setting number, in this way, then judge the user terminal number as Abnormal user.
In the specific implementation, it is identical with the step S103 in embodiment illustrated in fig. 1, it will not be repeated here.
Exist in step S204, the daily record data for the up use business for counting the abnormal user respectively by SP business The upper line number of 182 mistakes, judges whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, in this way, then sentences The fixed SP business is exception SP business.
In the specific implementation, it is identical with the step S104 in embodiment illustrated in fig. 1, it will not be repeated here.
Step S205, the abnormal SP business to user's program request carries out service group's authentication, determines its affiliated service group.
Specifically, according to the difference of the abnormal SP business violation order of severity, determining belonging to the SP abnormal traffics Service group.The service group includes high violation degree service group, middle violation degree service group and low violation degree business group Group, wherein, there is the upper line number of 182 mistakes and reach that the SP business of the first setting number condition belongs to high violation degree service group, go out The existing upper line number of 182 mistake reaches that the SP business of the second setting number condition belongs to middle violation degree service group, occurs in 182 mistakes Line number reaches that the SP business of the 3rd setting number condition belongs to low violation degree service group.It is tight in violation of rules and regulations according to the abnormal SP business The difference of weight degree, determines the service group belonging to the SP abnormal traffics.
Step S206, is entered using service group's secondary-confirmation strategy corresponding to the service group of determination to the SP business Row authentication control.
In the specific implementation, corresponding service group's secondary-confirmation strategy is shown in Figure 3.
The corresponding service group's secondary-confirmation strategy of the high violation degree service group:Secondary-confirmation rule is each program request Equal secondary-confirmation, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Wherein, challenge is by phase The exam pool answered is provided, and challenge refers to the problem of its answer is unique, for example:" 2 Jia 3 equal to several "Answer is " 5 ", and user is defeated Program request can be confirmed by entering correct option.Random code is provided by corresponding exam pool.Random code is generally a character string, its confirmation side Formula can be, for example:" please input character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can confirm program request.
The corresponding service group's secondary-confirmation strategy of the middle violation degree service group:Secondary-confirmation rule is program request first Secondary-confirmation, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Wherein, challenge is by corresponding Exam pool provide, challenge refers to the problem of its answer is unique, for example:" 2 Jia 3 equal to several "Answer is " 5 ", user's input Correct option can confirm program request.Random code is provided by corresponding exam pool.Random code is generally a character string, its validation testing Can be, for example:" please input character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can confirm program request.
The corresponding service group's secondary-confirmation strategy of the low violation degree service group:Secondary-confirmation rule is program request first Secondary-confirmation, secondary-confirmation pattern is simple problem secondary-confirmation.Wherein simple problem is provided by corresponding exam pool, simple problem Refer to the problem of its answer there are many, for example:" Any Digit that please be input between 10 to 20 ", user can input " 11, Any one in 12 ... ..., 19 ", you can confirm program request.
It should be noted that the corresponding secondary-confirmation rule of the high violation degree service group shown in figure is each program request Equal secondary-confirmation, corresponding secondary-confirmation pattern is challenge or random code secondary-confirmation, middle violation degree service group pair The secondary-confirmation rule answered is program request secondary-confirmation first, and corresponding secondary-confirmation pattern is that challenge or random code are secondary Confirm, the corresponding secondary-confirmation rule of low violation degree service group is program request secondary-confirmation, corresponding secondary-confirmation pattern first It is not what is uniquely determined for the pattern of simple problem secondary-confirmation, there can also be other associative modes, as long as meets a kind of A kind of regular and a kind of secondary-confirmation pattern of secondary-confirmation of service group's correspondence.
Fig. 4 is referred to, is the flow chart that user uses the inventive method program request SP business.
1)User initiates up-on command demand (telecommunication) service to Short Message Service Gateway;
2)Order request is sent to Business Management Platform by Short Message Service Gateway;
3)Business Management Platform does service group's authentication, and which group is judgement business belong to;
4)Service group's secondary-confirmation strategy authentication, judges the secondary-confirmation strategy corresponding to the service group of ownership;
5)Business Management Platform returns to Short Message Service Gateway order request response, and mark needs user to carry out secondary-confirmation;
6)Business Management Platform carries secondary-confirmation strategy to sms center forwarding secondary-confirmation request;
7)Sms center combines corresponding secondary-confirmation short message according to secondary-confirmation strategy;
8)Sms center issues secondary-confirmation short message to user;
9)User replys secondary-confirmation short message;
10)Sms center initiates program request confirmation request to Business Management Platform;
11)Business Management Platform generates interim order relations;
12)Business Management Platform sends program request to Short Message Service Gateway and confirms to respond;
13)Short Message Service Gateway issues program request and confirms to respond to user.
The embodiment of the present invention has following technique effect:
1st, by checking judgement, statistical analysis user uplink uses the daily record data of business, can more accurately found There is the abnormal user and exception SP business of built-in behavior in violation of rules and regulations in terminal suspicion, and then control it management.
2nd, for different service groups, using different secondary-confirmation control strategies, it can realize and targetedly manage Reason operation, makes terminal is built-in in violation of rules and regulations easily can not complete secondary-confirmation, significantly more efficient reduction terminal violation fee suction for user Situation, reduction user to the complaint amount of violation fee suction, meanwhile, can also improve the perception that normal users use business.
Accordingly, the invention also discloses a kind of violation terminal built-in behavior processing unit, Fig. 5 is whole for the violation of the present invention The structural representation of one embodiment of the built-in behavior processing unit in end, as shown in Fig. 5, described device 1 includes:Collecting unit 11, Extracting unit 12, the first judging unit 13, the second judging unit 14 and service authentication control unit 15.
The collecting unit 11, the user behaviors log data for the whole users of capturing service management platform.
Specifically, the collecting unit 11 is prior art, here is omitted.
The extracting unit 12, the daily record data of business is used for extracting the user uplink.
Specifically, the extracting unit 12 is prior art, here is omitted.
There are 182 mistakes in first judging unit 13, the daily record data for counting each user terminal number respectively Upper line number, judge in some cycles occur 182 mistake upper line numbers whether exceed setting number, in this way, then judge the use Family termination number is abnormal user.
It judges that principle is as follows:In the case of mobile information service switch is closed, user initiates upstream request and uses business, 182 error codes will be returned to when Business Management Platform is authenticated, 10086, which can issue prompt message, notifies user.It is normal to use Family, will not continue to up use business;And terminal(Mountain vallage machine)Embedded software, shields the prompt message knot up without knowing Really, then it may proceed to attempt, and cause substantial amounts of 182 mistake.Therefore, collection User action log is analyzed, and is checked in the presence of big The situation of the mistake of amount 182, it can be found that terminal(Mountain vallage machine)SP business built in violation.
In the specific implementation, there are the upper line numbers of 182 mistakes in counting the daily record data of each user terminal number respectively, If in some cycles(Such as one week), the user uplink uses many days of business(Such as more than 3 days, it can match somebody with somebody)In the presence of 182 mistakes, Or exist within one week multiple(Such as more than 7 times, it can match somebody with somebody)182 mistakes, can assert that the user has built-in row in violation of rules and regulations for terminal suspicion For abnormal user.
Second judging unit 14, the daily record number of the up use business for counting the abnormal user respectively by SP business According to the middle upper line number that there are 182 mistakes, judge whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, In this way, then judge the SP business as abnormal SP business.
In the specific implementation, the daily record data of the up use business of whole abnormal users is first obtained, then according to SP business Upper line number of every SP business in the presence of 182 mistakes is counted respectively, if the SP business is accessed in measurement period has following feelings Shape:182 error numbers exceed setting value(50, it can match somebody with somebody)Or 182 the up number of times of mistake account for the ratios of all up number of times and exceed Setting value(Such as 5%, it can match somebody with somebody), abnormal SP business of the SP business built in terminal violation can be assert.
Service authentication control unit 15, service authentication control is carried out for the operation to exception SP business described in user's program request System.
Specifically, the service authentication control unit 15 further comprises:Determining unit 151 and control unit 152, specifically Incorporated by reference to referring to Fig. 6.
The determining unit 151, for carrying out service group's authentication to the abnormal SP business, determines the business belonging to it Group.
In the specific implementation, the service group include high violation degree service group, middle violation degree service group and it is low disobey Normality service group, wherein, there is the upper line number of 182 mistakes and reach that the SP business of the 3rd setting number condition belongs to high violation degree industry Be engaged in group, the upper line number of 182 mistakes occurs and reaches that the SP business of the 4th setting number condition belongs to middle violation degree service group, occurs The upper line number of 182 mistakes reaches that the SP business of the 5th setting number condition belongs to low violation degree service group.According to the abnormal SP The difference of the business violation order of severity, determines the service group belonging to the SP abnormal traffics.
Described control unit 152, for using service group's secondary-confirmation strategy pair corresponding to the service group determined The SP business of user's program request carries out authentication control.
In the specific implementation, corresponding service group's secondary-confirmation strategy is shown in Figure 3.
The corresponding service group's secondary-confirmation strategy of the high violation degree service group:Secondary-confirmation rule is each program request Equal secondary-confirmation, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Wherein, challenge is by phase The exam pool answered is provided, and challenge refers to the problem of its answer is unique, for example:" 2 Jia 3 equal to several "Answer is " 5 ", and user is defeated Program request can be confirmed by entering correct option.Random code is provided by corresponding exam pool.Random code is generally a character string, its confirmation side Formula can be, for example:" please input character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can confirm program request.
The corresponding service group's secondary-confirmation strategy of the middle violation degree service group:Secondary-confirmation rule is program request first Secondary-confirmation, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Wherein, challenge is by corresponding Exam pool provide, challenge refers to the problem of its answer is unique, for example:" 2 Jia 3 equal to several "Answer is " 5 ", user's input Correct option can confirm program request.Random code is provided by corresponding exam pool.Random code is generally a character string, its validation testing Can be, for example:" please input character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can confirm program request.
The corresponding service group's secondary-confirmation strategy of the low violation degree service group:Secondary-confirmation rule is program request first Secondary-confirmation, secondary-confirmation pattern is simple problem secondary-confirmation.Wherein simple problem is provided by corresponding exam pool, simple problem Refer to the problem of its answer there are many, for example:" Any Digit that please be input between 10 to 20 ", user can input " 11, Any one in 12 ... ..., 19 ", you can confirm program request.
The embodiment of the present invention has following technique effect:
1st, by checking judgement, statistical analysis user uplink uses the daily record data of business, can more accurately found There is the abnormal user and exception SP business of built-in behavior in violation of rules and regulations in terminal suspicion, and then control it management.
2nd, for different service groups, using different secondary-confirmation control strategies, it can realize and targetedly manage Reason operation, makes terminal is built-in in violation of rules and regulations easily can not complete secondary-confirmation, significantly more efficient reduction terminal violation fee suction for user Situation, reduction user to the complaint amount of violation fee suction, meanwhile, can also improve the perception that normal users use business.
Accordingly, present invention also offers a kind of violation terminal built-in behavior processing system.Fig. 7 is whole for the violation of the present invention One example structure schematic diagram of the built-in behavior processing system in end, as shown in fig. 7, the system 1 includes audit system 11 and industry Business management platform 12.
The audit system 11, for checking that the exception that terminal suspicion has built-in behavior in violation of rules and regulations on Business Management Platform is used Family, and abnormal SP business is checked out according to the daily record data of the up use business of the abnormal user, and according to preparatory condition, The abnormal SP business is divided into different service groups, and it is secondary for the different service groups of different service group's settings Confirm strategy.
Specifically, referring to Fig. 8, the audit system 11 includes:
Collecting unit 111, the user behaviors log data for the whole users of capturing service management platform.
Extracting unit 112, the daily record data of business is used for extracting the user uplink.
Statistical analysis unit 113, for counting the upper line number in the presence of 182 mistakes respectively by user terminal number, is determined different Conventional family;And by the daily record data of the up use business of the abnormal user, count wrong in the presence of 182 respectively according to SP business Upper line number by mistake, it is determined that exception SP business, and according to preparatory condition, the abnormal SP business is included in different service groups.
Dispensing unit 114, for setting different service group's secondary-confirmation strategies for different business group.
The Business Management Platform 12, for after the request of exception SP business described in user's program request is received, carrying out business Group authenticates, and then carries out authentication control to the abnormal SP business of user's program request using corresponding service group's secondary-confirmation strategy System.
Wherein, the Business Management Platform is directed to different service group's secondary-confirmation strategies, provided with different exam pools, bag Random code exam pool, challenge exam pool and simple problem exam pool are included, the exam pool can also be supplied to described by audit system Business Management Platform.
Specifically, incorporated by reference to referring to Fig. 9, the Business Management Platform 12 includes:
Searching unit 121, for searching the service group belonging to the abnormal SP business of user's program request.
In the specific implementation, the service group include high violation degree service group, middle violation degree service group and it is low disobey Normality service group, wherein, there is the upper line number of 182 mistakes and reach that the SP business of the 3rd setting number condition belongs to high violation degree industry Be engaged in group, the upper line number of 182 mistakes occurs and reaches that the SP business of the 4th setting number condition belongs to middle violation degree service group, occurs The upper line number of 182 mistakes reaches that the SP business of the 5th setting number condition belongs to low violation degree service group.According to the abnormal SP The difference of the business violation order of severity, determines the service group belonging to the SP abnormal traffics.
Authenticating unit 122, the corresponding service group of service group for being found using the searching unit is secondary really Recognize strategy to authenticate the SP business of user's program request.
In the specific implementation, corresponding service group's secondary-confirmation strategy is shown in Figure 3.
The corresponding service group's secondary-confirmation strategy of the high violation degree service group:Secondary-confirmation rule is each program request Equal secondary-confirmation, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Wherein, challenge is by phase The exam pool answered is provided, and challenge refers to the problem of its answer is unique, for example:" 2 Jia 3 equal to several "Answer is " 5 ", and user is defeated Program request can be confirmed by entering correct option.Random code is provided by corresponding exam pool.Random code is generally a character string, its confirmation side Formula can be, for example:" please input character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can confirm program request.
The corresponding service group's secondary-confirmation strategy of the middle violation degree service group:Secondary-confirmation rule is program request first Secondary-confirmation, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation.Wherein, challenge is by corresponding Exam pool provide, challenge refers to the problem of its answer is unique, for example:" 2 Jia 3 equal to several "Answer is " 5 ", user's input Correct option can confirm program request.Random code is provided by corresponding exam pool.Random code is generally a character string, its validation testing Can be, for example:" please input character string ' ahgt21 ' to confirm program request ", user's input " ahgt21 " can confirm program request.
The corresponding service group's secondary-confirmation strategy of the low violation degree service group:Secondary-confirmation rule is program request first Secondary-confirmation, secondary-confirmation pattern is simple problem secondary-confirmation.Wherein simple problem is provided by corresponding exam pool, simple problem Refer to the problem of its answer there are many, for example:" Any Digit that please be input between 10 to 20 ", user can input " 11, Any one in 12 ... ..., 19 ", you can confirm program request.
The embodiment of the present invention has following technique effect:
1st, by checking judgement, statistical analysis user uplink uses the daily record data of business, can more accurately found There is the abnormal user and exception SP business of built-in behavior in violation of rules and regulations in terminal suspicion, and then control it management.
2nd, for different service groups, using different secondary-confirmation control strategies, it can realize and targetedly manage Reason operation, makes terminal is built-in in violation of rules and regulations easily can not complete secondary-confirmation, significantly more efficient reduction terminal violation fee suction for user Situation, reduction user to the complaint amount of violation fee suction, meanwhile, can also improve the perception that normal users use business.
One of ordinary skill in the art will appreciate that realize all or part of flow in above-described embodiment method, being can be with The hardware of correlation is instructed to complete by computer program, described program can be stored in a computer read/write memory medium In, the program is upon execution, it may include such as the flow of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only memory(Read-Only Memory, ROM)Or random access memory(Random Access Memory, RAM)Deng.
Above disclosure is only preferred embodiment of present invention, can not limit the right model of the present invention with this certainly Enclose, one of ordinary skill in the art will appreciate that all or part of flow of above-described embodiment is realized, and will according to right of the present invention Made equivalent variations are sought, still falls within and invents covered scope.

Claims (6)

1. a kind of built-in behavior processing method of terminal violation, it is characterised in that including:
The user behaviors log data of capturing service management platform whole user;
Extract the daily record data that the user uplink uses business;
The upper line number that there are 182 mistakes in the daily record data of each user terminal number is counted respectively, is judged in some cycles Whether the interior upper line number for 182 mistakes occur exceedes setting number, in this way, then judges the user terminal number as abnormal user;
There is the up of 182 mistakes in the daily record data for the up use business for counting the abnormal user respectively by SP business Number, judges whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, in this way, then judges the SP business For abnormal SP business;
Operation to exception SP business described in user's program request carries out service authentication control;
The step of carrying out service authentication control to the operation of exception SP business described in user's program request includes:
Abnormal SP business to user's program request carries out service group's authentication, determines its affiliated service group;
Authentication control is carried out to the SP business using service group's secondary-confirmation strategy corresponding to the service group of determination;
Service group's authentication is carried out to the SP business, the step of determining its affiliated service group specifically includes:
According to the difference of the abnormal SP business violation order of severity, the service group belonging to the SP abnormal traffics is determined.
2. according to the method described in claim 1, it is characterised in that the service group include high violation degree service group, in Violation degree service group and low violation degree service group, wherein, there is the upper line number of 182 mistakes and reach the first setting number condition SP business belong to high violation degree service group, there is the SP business category that the upper line numbers of 182 mistakes reach the second setting number condition In middle violation degree service group, there is the upper line number of 182 mistakes and reach that the SP business of the 3rd setting number condition belongs to low violation degree Service group.
3. method according to claim 2, it is characterised in that:
Corresponding service group's secondary-confirmation strategy that the high violation degree service group sets as:Secondary-confirmation rule is each point Equal secondary-confirmation is broadcast, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation;
Corresponding service group's secondary-confirmation strategy that the middle violation degree service group sets as:Secondary-confirmation rule is point first Secondary-confirmation is broadcast, secondary-confirmation pattern is challenge secondary-confirmation or random code secondary-confirmation;
Corresponding service group's secondary-confirmation strategy that the low violation degree service group sets as:Secondary-confirmation rule is point first Secondary-confirmation is broadcast, secondary-confirmation pattern is simple problem secondary-confirmation.
4. a kind of built-in behavior processing unit of terminal violation, it is characterised in that including:
Collecting unit, the user behaviors log data for the whole users of capturing service management platform;
Extracting unit, the daily record data of business is used for extracting the user uplink;
There is the up of 182 mistakes in first judging unit, the daily record data for counting each user terminal number respectively Number, judges whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, in this way, then judges the user terminal Number is abnormal user;
Deposited in second judging unit, the daily record data for the up use business for counting the abnormal user respectively by SP business In the upper line number of 182 mistakes, judge whether the upper line number for occurring 182 mistakes in some cycles exceedes setting number, in this way, then Judge the SP business as abnormal SP business;
Service authentication control unit, service authentication control is carried out for the operation to exception SP business described in user's program request;
The service authentication control unit further comprises:
Determining unit, for carrying out service group's authentication to the abnormal SP business, determines the service group belonging to it;
Control unit, for service group's secondary-confirmation strategy corresponding to the service group using determination to user's program request SP business carry out authentication control;
The determining unit, specifically for the difference according to the abnormal SP business violation order of severity, determines that the SP is abnormal Service group belonging to business.
5. a kind of built-in behavior processing system of terminal violation, it is characterised in that the system includes audit system and service management Platform;
The audit system is used for the abnormal user for checking that terminal suspicion has built-in behavior in violation of rules and regulations, and is used according to the exception The daily record data of the up use business in family checks out abnormal SP business, and according to preparatory condition, the abnormal SP business is divided into Different service groups, and for the different service group's secondary-confirmation strategies of different service group's settings;
The Business Management Platform is used for after the request of exception SP business described in user's program request is received, and carries out service group's mirror Power, then carries out authentication control using corresponding service group's secondary-confirmation strategy to the abnormal SP business of user's program request;
The audit system includes:
Collecting unit, the user behaviors log data for the whole users of capturing service management platform;
Extracting unit, the daily record data of business is used for extracting the user uplink;
Statistical analysis unit, for counting the upper line number in the presence of 182 mistakes respectively by user terminal number, determines abnormal user; And by the daily record data of the up use business of the abnormal user, counted respectively in the presence of the upper of 182 mistakes according to SP business Line number, it is determined that exception SP business, and according to preparatory condition, the abnormal SP business is included in different service groups;
Dispensing unit, for setting different service group's secondary-confirmation strategies for different business group;
The Business Management Platform includes:
Searching unit, for searching the service group belonging to the abnormal SP business of user's program request;
Authenticating unit, for the corresponding service group's secondary-confirmation strategy pair of service group found using the searching unit The SP business of user's program request is authenticated.
6. system as claimed in claim 5, it is characterised in that the Business Management Platform is secondary for different service groups Confirm strategy, provided with different exam pools, including random code exam pool, challenge exam pool and simple problem exam pool, the exam pool The Business Management Platform can also be supplied to by audit system.
CN201110218441.5A 2011-08-01 2011-08-01 A kind of violation terminal built-in behavior processing method, apparatus and system Active CN102917352B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201110218441.5A CN102917352B (en) 2011-08-01 2011-08-01 A kind of violation terminal built-in behavior processing method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110218441.5A CN102917352B (en) 2011-08-01 2011-08-01 A kind of violation terminal built-in behavior processing method, apparatus and system

Publications (2)

Publication Number Publication Date
CN102917352A CN102917352A (en) 2013-02-06
CN102917352B true CN102917352B (en) 2017-11-03

Family

ID=47615547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110218441.5A Active CN102917352B (en) 2011-08-01 2011-08-01 A kind of violation terminal built-in behavior processing method, apparatus and system

Country Status (1)

Country Link
CN (1) CN102917352B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105636076B (en) * 2014-11-07 2019-06-07 中国移动通信集团四川有限公司 A kind of auditing method, device and the equipment of the behavior of violation terminal built-in

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101198140A (en) * 2007-12-29 2008-06-11 深圳华为通信技术有限公司 Terminal exception reminding method and apparatus
CN101291259A (en) * 2007-04-18 2008-10-22 阿里巴巴集团控股有限公司 System and method for monitoring geographic position of website visitor and visiting status
CN102006588A (en) * 2010-12-28 2011-04-06 北京安天电子设备有限公司 Method and system for monitoring network behavior of smart mobile phone
CN102082704A (en) * 2009-11-30 2011-06-01 中国移动通信集团河北有限公司 Safety monitoring method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101291259A (en) * 2007-04-18 2008-10-22 阿里巴巴集团控股有限公司 System and method for monitoring geographic position of website visitor and visiting status
CN101198140A (en) * 2007-12-29 2008-06-11 深圳华为通信技术有限公司 Terminal exception reminding method and apparatus
CN102082704A (en) * 2009-11-30 2011-06-01 中国移动通信集团河北有限公司 Safety monitoring method and system
CN102006588A (en) * 2010-12-28 2011-04-06 北京安天电子设备有限公司 Method and system for monitoring network behavior of smart mobile phone

Also Published As

Publication number Publication date
CN102917352A (en) 2013-02-06

Similar Documents

Publication Publication Date Title
CN103379090B (en) A kind of control method for frequency and system, frequency server of open platform access
CN104933207B (en) The acquisition methods and system of user behavior data in application program
CN1607768A (en) Pay-per-connection scheme for wireless access to internet
CN102917334B (en) A kind of violation terminal built-in behavior processing method, apparatus and system
CN106302534B (en) A kind of method and system of detection and processing illegal user
CN107657156A (en) User ID authentication method and device based on user operation habits and contact pressure area
CN1996839A (en) A low-cost and easy-to-distribute identity verification method and device
CN107612922A (en) User ID authentication method and device based on user operation habits and geographical position
CN109727027A (en) Account recognition methods, device, equipment and storage medium
CN105050068A (en) Billing bill recording, detection, and correction method, apparatus, and bill processing system
CN113923048B (en) Network attack behavior identification method, device, equipment and storage medium
KR20090003134A (en) Illegal login protection system and method based on pc registratrion
CN102917352B (en) A kind of violation terminal built-in behavior processing method, apparatus and system
WO2011048907A1 (en) Game system
CN110415025A (en) A kind of verification method and device
CN102917335B (en) A kind of violation terminal built-in behavior processing method, apparatus and system
CN107623696A (en) A kind of user ID authentication method and device based on user behavior feature
US20040162142A1 (en) System for playing games through a communication device
CN107872491A (en) A kind of data processing method and device
CN115802359A (en) Method and device for preventing and treating spam short messages
WO2014177098A1 (en) Application software online payment processing method and system
CN111294311B (en) Traffic charging method and system for preventing traffic fraud
CN102780686A (en) Credible resource based method and device for protecting bank user information
CN102740451B (en) Activating and registering method for intelligent mobile phone
CN101163008B (en) Anti-hacking and anti-number stolen system of online game

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant