CN105871937A - Data processing method, data processing device and data processing system - Google Patents

Data processing method, data processing device and data processing system Download PDF

Info

Publication number
CN105871937A
CN105871937A CN201610474873.5A CN201610474873A CN105871937A CN 105871937 A CN105871937 A CN 105871937A CN 201610474873 A CN201610474873 A CN 201610474873A CN 105871937 A CN105871937 A CN 105871937A
Authority
CN
China
Prior art keywords
information
suspicion
suspected
party server
sending
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610474873.5A
Other languages
Chinese (zh)
Inventor
李涓
宋丽思
钱军
刘文娇
李全涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Qizhi Software Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd, Qizhi Software Beijing Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610474873.5A priority Critical patent/CN105871937A/en
Publication of CN105871937A publication Critical patent/CN105871937A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/564Enhancement of application control based on intercepted application data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a data processing method, a data processing device and a data processing system and relates to the technical field of internet, aiming to solve the problem that existing defrauding prevention modes are low in efficiency. The data processing method includes acquiring suspicion information by a network-side server, wherein the suspicion information refers to suspect information; sending the suspicion information to a third-party server to enable the third-party server to judge whether to suspend internet service and/or communication service of the suspicion information or not. The data processing method, the data processing device and the data processing system are mainly applied to a process of preventing telecommunication fraud.

Description

Data processing method, device and system
Technical Field
The present invention relates to the field of internet technologies, and in particular, to a method, an apparatus, and a system for data processing.
Background
With the rapid development of the internet and communication technology, remote interaction using the internet or communication tools is becoming more and more popular, including payment using internet banking, communication through internet session tools, payment using a payment platform, and the like. However, in the course of remote interaction using the internet or a communication tool, a phenomenon that the user's property is deceived often occurs.
In the above-mentioned deceived phenomenon, since the operator providing the internet service or the communication tool cannot confirm the identity of the user, that is, cannot judge whether the user is a fraud owner, it is impossible to identify and intercept information used or transmitted by the fraud owner in time. In the prior art, in order to prevent cheating, a user usually prevents cheating by using some software with danger prompt or prevents cheating according to experience in the interaction process. However, fraud information is often not accurately identified in time only by the danger prompting software or the user's experience, so that there is still a tragedy that a large number of victims are deceived. In summary, the existing fraud prevention methods are inefficient.
Disclosure of Invention
In view of the above, the present invention has been made to provide a method, apparatus and system for data processing that overcomes or at least partially solves the above problems.
In view of the above problem, in one aspect, the present invention provides a method of data processing, the method comprising:
a network side server acquires suspicion information, wherein the suspicion information is information of a suspicion subject;
and sending the suspected information to a third-party server so that the third-party server judges whether to suspend the Internet service and/or communication service of the suspected information.
In another aspect, the present invention provides an apparatus for data processing, the apparatus comprising:
the system comprises an information acquisition unit, a processing unit and a processing unit, wherein the information acquisition unit is used for acquiring suspicion information by a network side server, and the suspicion information is information of a suspicion subject;
and the sending unit is used for sending the suspected information to a third-party server so that the third-party server judges whether to suspend the Internet service and/or the communication service of the suspected information.
In yet another aspect, the present invention provides a system for data processing, the system comprising: the system comprises a client, a network side server and a third party server;
the client is used for sending a reporting request to the network side server so that the network side server can acquire suspect information from reporting information in the reporting request;
the network side server is used for acquiring suspicion information, wherein the suspicion information is information of a suspicion subject; sending the suspicion information to a third-party server;
and the third-party server is used for receiving the suspected information and judging whether the internet service and/or the communication service of the suspected information is suspended or not.
By means of the technical scheme, the method, the device and the system for processing the data can be used for firstly obtaining the suspected information which is the information of a suspected subject by the network side server; and then sending the suspected information to a third-party server so that the third-party server judges whether to suspend the Internet service and/or the communication service of the suspected information according to the suspected information. Compared with the prior art, the method and the system can send the suspected information to the third-party server after the network-side server acquires the suspected information, so that the third-party server judges whether the internet service and/or the communication service of the suspected information is suspended, and the fraud behavior of a suspected subject using the suspected information can be fundamentally prevented if the internet service and/or the communication service of the suspected information is suspended by the third-party server, so that the fraud information cannot be transmitted to the user, and the fraud prevention efficiency is improved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 is a flow chart of a method for processing data according to an embodiment of the present invention;
FIG. 2 is a flow chart of another method of data processing provided by an embodiment of the present invention;
FIG. 3 is a flow chart of a method for processing data according to an embodiment of the present invention;
FIG. 4 is a block diagram illustrating an apparatus for data processing according to an embodiment of the present invention;
FIG. 5 is a block diagram of an apparatus for processing data according to another embodiment of the present invention;
fig. 6 shows a system block diagram of data processing according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
To solve the problem of low efficiency of the existing fraud prevention method, an embodiment of the present invention provides a data processing method, as shown in fig. 1, the method includes:
101. and the network side server acquires the suspect information.
The network side server obtains the suspected information of the suspected subject, and the suspected information in this embodiment mainly includes information such as a website, a bank account, a mobile phone number, an instant messaging account (a QQ number, a micro signal, and the like). In the process of fraud, the suspected subject usually needs to use the above-mentioned suspected information, such as: sending fraud short messages to a user by using a mobile phone number, wherein the fraud short messages may or include remitted bank account numbers, a fraud subject receives money through the bank account numbers, or the fraud short messages include malicious websites, and if the user clicks the malicious websites to enter, personal information may be leaked, so that the suspected subject illegally utilizes the personal information of the user to cause economic loss to the user; or fraud information is sent to the user through the instant messaging account, so that the user is reasonably cheated, and the like. The suspect information is obtained to prevent fraudulent behavior of the suspected subject in the subsequent steps.
102. And sending the suspect information to a third-party server.
And sending the suspect information acquired in the step 101 to a third-party server, wherein the third-party server is a server for providing service for the suspect information. For example, the server of Tencent provides information interaction for the QQ account; the bank server provides services such as account transfer and the like for the bank account; a server of a domain name provider provides network service for a website corresponding to the website; and the like. After the third-party server receives the suspect information, the suspect information is further judged, and then whether the internet service and/or the communication service of the suspect information is suspended or not is determined. If the third-party server suspends the internet service and/or the communication service of the suspected information, the suspected subject cannot send fraud information to the user by using the suspected information, so that the fraud behavior of the suspected subject can be fundamentally prevented, and the occurrence of the phenomenon that the user is harmed is further reduced. Such as: if the Tencent server stops serving the QQ account of the suspected subject, the account cannot send fraud information to the user, and the user cannot contact the fraud information, so that the flow of the fraud information is fundamentally prevented. If the bank server freezes the bank account of the suspected subject after being stopped, the bank account cannot be used for collecting money and withdrawing money, and the economic safety of the victim can be guaranteed. If the server of the domain name management mechanism stops serving the website of the suspected subject, the website cannot be opened, so that the user cannot enter the website after clicking the malicious website, and information leakage and the like of the user are avoided.
According to the data processing method provided by the embodiment, the suspected information can be obtained by the network side server, and the suspected information is information of a suspected subject; and then sending the suspected information to a third-party server so that the third-party server judges whether to suspend the Internet service and/or the communication service of the suspected information according to the suspected information. Compared with the prior art, the method and the system have the advantages that after the network side server obtains the suspected information, the suspected information can be sent to the third-party server, so that the third-party server judges whether the internet service and/or the communication service of the suspected information is suspended, and if the internet service and/or the communication service of the suspected information is suspended by the third-party server, the behavior of a suspected subject in fraud by using the suspected information can be fundamentally prevented, the fraud information cannot be conveyed to a user, and the fraud prevention efficiency is improved.
Further, as a refinement and an extension of the method shown in fig. 1, an embodiment of the present invention further provides a method for data processing, as shown in fig. 2, where the method includes:
201. and acquiring the reporting information.
And the network side server acquires reporting information which contains the suspicion information. The suspect information is information of a suspected subject, and is suspect information used by the suspected subject in a fraud process. In this embodiment, the suspected information mainly includes information such as a website, a bank account, a mobile phone number, and an instant messaging account (a QQ number, a micro signal, and the like).
The method for acquiring the report information specifically comprises two ways: the first way is that the report information is obtained from a report database, the report database comprises the report information reported by all users through various report platforms, and the report platform comprises an online platform and an offline platform; in the second approach, the report information is obtained from a report request, wherein the report request is a request sent by a client to a network side server, and the report request is used for enabling the client to send the report information to the server.
202. And identifying the suspect information in a preset format from the reported information.
Since the report information includes the suspect information, the suspect information needs to be acquired from the report information, and the suspect information is acquired in order to effectively prevent the fraudulent conduct of the fraudulent subject based on the suspect information. Specifically, the report information acquired in step 201 is at least one of text format information, picture format information, and voice format information. The reporting information in the unused format is also identified in a different manner according to the suspect information in the predetermined format. If the reported information is text format information, a text recognition technology is needed to identify the suspect information which accords with a preset format. The predetermined format comprises predetermined formats corresponding to all different types of suspicion information respectively: such as a predetermined format of a mobile phone number, a predetermined format of an instant messaging account number, a predetermined format of a web address, a predetermined format of a bank account number, and the like. The specific preset format of the mobile phone number defines the number digits of the effective mobile phone number, the ranges of the mobile phone numbers of different areas and different communication companies and the like. The predetermined format of the instant messaging account number specifies the digit range and the number range of the valid instant messaging account number of the existing various instant messaging service providers, or specifies the account number identification ("QQ", "WeChat", etc.) adjacent to the instant messaging account number. The predefined format of the web address specifies the obvious identification of the web address, such as special characters ("http", "www", "com", etc.) that the web address should contain. The number of digits of valid bank card numbers and personal account number identifications corresponding to different banks are specified in the predetermined format of the bank account number. If the reported information is picture format information or voice format information, the picture format information or the voice format information needs to be converted into text format information through an image recognition technology or a voice recognition technology, and then the suspect information is recognized by using a recognition mode of the text format information.
It should be noted that the text format information in this embodiment mainly refers to a short message sent by a suspected subject to a user.
203. And determining a third-party server corresponding to the information according to the type of the suspect information.
Different types of suspect information correspond to different third-party servers, for example, bank accounts opened by different banks correspond to different bank servers; different types of mobile phone numbers correspond to different servers of communication companies; the instant messaging account corresponds to a server providing communication services for the instant messaging account. Therefore, a corresponding third-party server needs to be determined according to the type of the suspect information, specifically: if the suspect information is the mobile phone number, determining a company (mobile, Unicom, or telecom, etc.) providing communication service for the mobile phone number according to the suspect information, and further determining a corresponding server; if the suspect information is the bank account, determining an account opening row of the bank account according to the suspect information, and further determining servers corresponding to different account opening rows; if the suspected information is a website, the domain name management mechanism corresponding to the website can be determined according to the website, and then servers corresponding to different domain name management mechanisms are determined.
204. And sending the suspect information to a corresponding third-party server.
And after the third-party server corresponding to the suspected information is determined, sending the suspected information to the corresponding third-party server so that the third-party server judges whether to suspend the internet service and/or communication service of the suspected information. If the third-party server suspends the internet service and/or the communication service of the suspected information, the suspected subject cannot send fraud information to the user by using the suspected information, so that the fraud behavior of the suspected subject can be fundamentally prevented, and the occurrence of the phenomenon that the user is harmed is further reduced.
Further, as a refinement and an extension of the methods shown in fig. 1 and fig. 2, an embodiment of the present invention further provides a method for data processing, as shown in fig. 3, where the method includes:
301. and the network side server acquires the suspect information.
The implementation of this step is the same as that of step 101 in fig. 1, and is not described here again.
302. A record of the suspicion associated with the suspicion information is collected.
After the network side server acquires the suspected clue information, the suspected records associated with the suspected information are collected, the suspected records are behavior records of a suspected subject interacting in the internet and/or a communication network by using the suspected information, and the purpose of collecting the suspected records is to provide a judgment basis for a subsequent third-party server to judge whether to suspend the internet and/or communication service of the suspected information. The specific process of collecting the suspicion record associated with the suspicion information is as follows:
firstly, monitoring interactive behaviors in the internet and/or a communication network, wherein a suspicion information base is usually carried for monitoring during monitoring, and the suspicion information base comprises suspicion information; and then comparing the suspect information with the information of the interactive behaviors in all the internet and/or the communication network, and if the suspect information is found, recording the behavior related to the suspect information to obtain the record of the interactive behavior of the suspect information, namely the suspect record. The concrete suspicion records mainly comprise: the suspicion subject uses the suspicion information to perform conversation communication with the user, or uses the suspicion information to obtain information records of property of the user, or uses the suspicion information to obtain personal information of the user, and the like.
303. And sending the suspicion information and the corresponding suspicion record to a third-party server.
And after the suspicion records are collected, sending the suspicion information and the corresponding suspicion records to a third-party server so that the third-party server judges whether to suspend the internet service and/or communication service of the suspicion information according to the suspicion information and the corresponding suspicion records. Specifically, when sending the suspect information to the third-party server, the type of the suspect information needs to be determined first, and then the suspect information is sent to the third-party server corresponding to the type of the suspect information, and an implementation manner of the specific sending is the same as that of steps 203 and 204 in fig. 2, and is not described here again.
The following two situations can be used for sending the suspicion information and the corresponding suspicion record to the third-party server:
in the first case, after the suspicion information and the corresponding suspicion record are obtained, the suspicion information and the corresponding suspicion record are directly sent to the third-party server.
In the second case, after the suspicion information and the corresponding suspicion record are obtained, firstly, analyzing and counting the suspicion record to obtain a statistical result; and then, determining whether to send the suspicion information and the suspicion record to a third-party server according to the statistical result. Specifically, the method comprises the following steps: and analyzing and counting the use times of the suspected information in the suspected records and the related sum of money, wherein the times are counted according to different users corresponding to the suspected information, one user corresponds to one time, and the related sum of money refers to the sum of money related to the suspected record corresponding to a certain suspected information. Then comparing the number of times of using the suspect information with the total amount of money involved with a preset statistical threshold value, wherein the statistical threshold value comprises the number of times of using the suspect information and/or the total amount of money involved; if at least one of the values of the use times or the sum of money counted by analysis is larger than the corresponding value specified in the preset counting threshold value, sending the suspicion information and the corresponding suspicion record to a third-party server; otherwise, the suspicion information and the corresponding suspicion record are not sent to the third-party server, and the suspicion record of the suspicion information is continuously collected until the statistical result of the suspicion record meets the preset statistical threshold value.
Further, as an implementation of the method shown in any one of fig. 1 to fig. 3, another embodiment of the present invention further provides an apparatus for data processing. The present apparatus embodiment corresponds to the foregoing method embodiment, and can implement all the contents in the foregoing method embodiment. For convenience of reading, the present apparatus embodiment only performs a summary description on the contents in the foregoing method embodiments, and details in the method embodiments are not repeated. As shown in fig. 4, the apparatus includes: an information acquisition unit 41 and a transmission unit 42. Wherein,
an information obtaining unit 41, configured to obtain, by a network-side server, suspected information, where the suspected information is information of a suspected subject;
and a sending unit 42, configured to send the suspect information to a third-party server, so that the third-party server determines whether to suspend an internet service and/or a communication service of the suspect information.
Further, as shown in fig. 5, the information acquiring unit 41 includes:
an information obtaining module 411, configured to obtain report information;
an identifying module 412, configured to identify the suspect information in a predetermined format from the reported information.
Further, the information obtaining module 411 is configured to:
acquiring reporting information from a reporting database;
and acquiring reporting information from the reporting request, wherein the reporting request is a request sent from the client to the network side server.
Further, the reporting information in the information obtaining module 411 is at least one of the following information:
text format information, picture format information, voice format information.
Further, the text format information in the information obtaining module 411 is a short message.
Further, as shown in fig. 5, the sending unit 42 includes:
the determining module 421 is configured to determine, according to the type of the suspected information, third-party servers corresponding to the suspected information, where different types of suspected information correspond to different third-party servers;
a sending module 422, configured to send the suspect information to a corresponding third-party server.
Further, as shown in fig. 5, the apparatus further includes:
a collecting unit 43, configured to collect a suspicion record associated with the suspicion information after the network-side server obtains the suspicion information, where the suspicion record is a behavior record of a suspicion subject interacting in the internet and/or a communication network using the suspicion information;
the sending unit 42 is further configured to:
and sending the suspected information and the corresponding suspected record to a third-party server so that the third-party server judges whether to suspend the internet service and/or the communication service of the suspected information according to the suspected information and the corresponding suspected record.
Further, as shown in fig. 5, the apparatus further includes:
the statistical unit 44 is configured to perform analysis statistics on information in the suspicion record to obtain a statistical result;
the sending unit 42 is further configured to send the suspicion information and the corresponding suspicion record to a third-party server if the statistical result meets a preset statistical threshold, where the statistical threshold includes the number of times the suspicion information is used and/or the total amount of money involved.
Further, as shown in fig. 5, the collecting unit 43 includes:
a monitoring module 431 for monitoring interaction behavior in the internet and/or a communication network;
a record obtaining module 432, configured to obtain a behavior record of the interaction behavior including the suspicion information.
The data processing device provided by this embodiment can first obtain suspect information, which is information of a suspect subject, from a network side server; and then sending the suspected information to a third-party server so that the third-party server judges whether to suspend the Internet service and/or the communication service of the suspected information according to the suspected information. Compared with the prior art, the method and the system have the advantages that after the network side server obtains the suspected information, the suspected information can be sent to the third-party server, so that the third-party server judges whether the internet service and/or the communication service of the suspected information is suspended, and if the internet service and/or the communication service of the suspected information is suspended by the third-party server, the behavior of a suspected subject in fraud by using the suspected information can be fundamentally prevented, the fraud information cannot be conveyed to a user, and the fraud prevention efficiency is improved.
Further, as an implementation of the method shown in any one of fig. 1 to fig. 3, another embodiment of the present invention further provides a system for data processing. The embodiment of the system corresponds to the embodiment of the method, and the content in the embodiment of the method can be realized. For convenience of reading, the embodiments of the present system only schematically describe the contents of the foregoing method embodiments, and details of the method embodiments are not described in detail. As shown in fig. 6, the system includes: client 61, network side server 62, third party server 63. Specifically, the method comprises the following steps:
the client 61 is configured to send a report request to the network-side server 62, so that the network-side server 62 obtains the suspect information from the report information in the report request;
the network side server 62 is used for acquiring suspected information, wherein the suspected information is information of a suspected subject; sending the suspect information to a third party server 63;
and the third-party server 63 is configured to receive the suspect information and determine whether to suspend the internet service and/or the communication service of the suspect information.
The data processing system provided by this embodiment can first obtain suspect information, which is information of a suspect subject, from a network side server; and then sending the suspected information to a third-party server so that the third-party server judges whether to suspend the Internet service and/or the communication service of the suspected information according to the suspected information. Compared with the prior art, the method and the system have the advantages that after the network side server obtains the suspected information, the suspected information can be sent to the third-party server, so that the third-party server judges whether the internet service and/or the communication service of the suspected information is suspended, and if the internet service and/or the communication service of the suspected information is suspended by the third-party server, the behavior of a suspected subject in fraud by using the suspected information can be fundamentally prevented, the fraud information cannot be conveyed to a user, and the fraud prevention efficiency is improved.
The embodiment of the invention discloses:
a1, a method for processing data, the method comprising:
a network side server acquires suspicion information, wherein the suspicion information is information of a suspicion subject;
and sending the suspected information to a third-party server so that the third-party server judges whether to suspend the Internet service and/or communication service of the suspected information.
A2, the method according to A1, wherein the obtaining of the suspicion information by the network side server includes:
acquiring reporting information;
and identifying the suspect information in a preset format from the report information.
A3, the method according to A2, wherein the acquiring the report information includes:
acquiring the report information from a report database; or,
and acquiring the report information from a report request, wherein the report request is a request sent to the network side server by a client.
A4, the method according to A2, wherein the reporting information is at least one of the following information:
text format information, picture format information, voice format information.
A5, the method according to A4, wherein the text format information is short message.
A6, the method according to A1, wherein the sending the suspicion information to a third party server comprises:
determining a third-party server corresponding to the suspected information according to the type of the suspected information, wherein different types of suspected information correspond to different third-party servers;
and sending the suspect information to a corresponding third-party server.
A7, the method according to A1, wherein after the network-side server obtains suspicion information, the method further comprises:
collecting a suspicion record associated with the suspicion information, wherein the suspicion record is a behavior record of a suspicion subject interacting in the Internet and/or a communication network by using the suspicion information;
the sending the suspicion information to a third-party server includes:
and sending the suspicion information and the corresponding suspicion record to a third-party server so that the third-party server judges whether to suspend the internet service and/or communication service of the suspicion information according to the suspicion information and the corresponding suspicion record.
A8, the method according to A7, wherein the method further comprises:
analyzing and counting the information in the suspicion record to obtain a statistical result;
and if the statistical result meets a preset statistical threshold value, sending the suspicion information and the corresponding suspicion record to a third-party server, wherein the statistical threshold value comprises the number of times of using the suspicion information and/or the total amount of related money.
A9, the method according to A7, wherein the collecting the suspicion record associated with the suspicion information comprises:
monitoring interaction behavior in the internet and/or communication network;
and acquiring a behavior record of the interactive behavior containing the suspect information.
B10, an apparatus for data processing, comprising:
the system comprises an information acquisition unit, a processing unit and a processing unit, wherein the information acquisition unit is used for acquiring suspicion information by a network side server, and the suspicion information is information of a suspicion subject;
and the sending unit is used for sending the suspected information to a third-party server so that the third-party server judges whether to suspend the Internet service and/or the communication service of the suspected information.
B11, the device according to B10, wherein the information acquisition unit comprises:
the information acquisition module is used for acquiring the reporting information;
and the identification module is used for identifying the suspect information in a preset format from the report information.
B12, the device according to B11, wherein the information acquisition module is configured to:
acquiring the report information from a report database;
and acquiring the report information from a report request, wherein the report request is a request sent to the network side server by a client.
B13 and the apparatus according to B11, wherein the report information in the information obtaining module is at least one of the following information:
text format information, picture format information, voice format information.
B14, the device according to B13, wherein the text format information in the information acquisition module is a short message.
B15, the device according to B10, wherein the sending unit includes:
the determining module is used for determining a third-party server corresponding to the suspect information according to the type of the suspect information, wherein different types of suspect information correspond to different third-party servers;
and the sending module is used for sending the suspicion information to a corresponding third-party server.
B16, the device according to B10, characterized in that the device further comprises:
the system comprises a collecting unit and a processing unit, wherein the collecting unit is used for collecting a suspicion record associated with suspicion information after the network side server obtains the suspicion information, and the suspicion record is a behavior record of a suspicion subject interacting in the internet and/or a communication network by using the suspicion information;
the sending unit is further configured to:
and sending the suspicion information and the corresponding suspicion record to a third-party server so that the third-party server judges whether to suspend the internet service and/or communication service of the suspicion information according to the suspicion information and the corresponding suspicion record.
B17, the device according to B16, characterized in that the device further comprises:
the statistical unit is used for analyzing and counting the information in the suspicion record to obtain a statistical result;
the sending unit is further configured to send the suspicion information and the corresponding suspicion record to a third-party server if the statistical result meets a preset statistical threshold, where the statistical threshold includes the number of times the suspicion information is used and/or the total amount of money involved.
B18, the device according to B16, wherein the collection unit comprises:
the monitoring module is used for monitoring the interaction behavior in the Internet and/or the communication network;
and the record acquisition module is used for acquiring the behavior record of the interactive behavior containing the suspect information.
C19, a data processing system, wherein the system comprises a client, a network side server and a third party server;
the client is used for sending a reporting request to the network side server so that the network side server can acquire suspect information from reporting information in the reporting request;
the network side server is used for acquiring suspicion information, wherein the suspicion information is information of a suspicion subject; sending the suspicion information to a third-party server;
and the third-party server is used for receiving the suspected information and judging whether the internet service and/or the communication service of the suspected information is suspended or not.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
It will be appreciated that the relevant features of the method and apparatus described above are referred to one another. In addition, "first", "second", and the like in the above embodiments are for distinguishing the embodiments, and do not represent merits of the embodiments.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components in the title of the invention (e.g., a data processing device) according to an embodiment of the invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.

Claims (10)

1. A method of data processing, the method comprising:
a network side server acquires suspicion information, wherein the suspicion information is information of a suspicion subject;
and sending the suspected information to a third-party server so that the third-party server judges whether to suspend the Internet service and/or communication service of the suspected information.
2. The method of claim 1, wherein the obtaining of the suspect information by the network-side server comprises:
acquiring reporting information;
and identifying the suspect information in a preset format from the report information.
3. The method of claim 2, wherein obtaining the reporting information comprises:
acquiring the report information from a report database; or,
and acquiring the report information from a report request, wherein the report request is a request sent to the network side server by a client.
4. The method of claim 2, wherein the reporting information is at least one of:
text format information, picture format information, voice format information.
5. The method of claim 4, wherein the text format information is a short message.
6. The method of claim 1, wherein the sending the suspicion information to a third party server comprises:
determining a third-party server corresponding to the suspected information according to the type of the suspected information, wherein different types of suspected information correspond to different third-party servers;
and sending the suspect information to a corresponding third-party server.
7. The method of claim 1, wherein after the network-side server obtains suspicion information, the method further comprises:
collecting a suspicion record associated with the suspicion information, wherein the suspicion record is a behavior record of a suspicion subject interacting in the Internet and/or a communication network by using the suspicion information;
the sending the suspicion information to a third-party server includes:
and sending the suspicion information and the corresponding suspicion record to a third-party server so that the third-party server judges whether to suspend the internet service and/or communication service of the suspicion information according to the suspicion information and the corresponding suspicion record.
8. The method of claim 7, further comprising:
analyzing and counting the information in the suspicion record to obtain a statistical result;
and if the statistical result meets a preset statistical threshold value, sending the suspicion information and the corresponding suspicion record to a third-party server, wherein the statistical threshold value comprises the number of times of using the suspicion information and/or the total amount of related money.
9. An apparatus for data processing, the apparatus comprising:
the system comprises an information acquisition unit, a processing unit and a processing unit, wherein the information acquisition unit is used for acquiring suspicion information by a network side server, and the suspicion information is information of a suspicion subject;
and the sending unit is used for sending the suspected information to a third-party server so that the third-party server judges whether to suspend the Internet service and/or the communication service of the suspected information.
10. A data processing system is characterized by comprising a client, a network side server and a third party server;
the client is used for sending a reporting request to the network side server so that the network side server can acquire suspect information from reporting information in the reporting request;
the network side server is used for acquiring suspicion information, wherein the suspicion information is information of a suspicion subject; sending the suspicion information to a third-party server;
and the third-party server is used for receiving the suspected information and judging whether the internet service and/or the communication service of the suspected information is suspended or not.
CN201610474873.5A 2016-06-24 2016-06-24 Data processing method, data processing device and data processing system Pending CN105871937A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610474873.5A CN105871937A (en) 2016-06-24 2016-06-24 Data processing method, data processing device and data processing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610474873.5A CN105871937A (en) 2016-06-24 2016-06-24 Data processing method, data processing device and data processing system

Publications (1)

Publication Number Publication Date
CN105871937A true CN105871937A (en) 2016-08-17

Family

ID=56655476

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610474873.5A Pending CN105871937A (en) 2016-06-24 2016-06-24 Data processing method, data processing device and data processing system

Country Status (1)

Country Link
CN (1) CN105871937A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108207001A (en) * 2016-12-16 2018-06-26 中国移动通信集团四川有限公司 Data processing equipment and method
CN108271159A (en) * 2017-01-04 2018-07-10 中国移动通信集团四川有限公司 Communication processing method, apparatus and system, safety communicating method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101304552A (en) * 2008-06-20 2008-11-12 Tcl天一移动通信(深圳)有限公司 Method and communication terminal capable of automatically matching incoming call number or note number
CN101594233A (en) * 2009-06-26 2009-12-02 成都市华为赛门铁克科技有限公司 Upload the method for information, the method and apparatus and the communication system of reception information
CN101605032A (en) * 2009-04-29 2009-12-16 中兴通讯股份有限公司 A kind of method and system of controlling website visiting
CN101753524A (en) * 2008-12-15 2010-06-23 青岛海信传媒网络技术有限公司 Method and system for upgrading software
US20130151906A1 (en) * 2011-12-08 2013-06-13 International Business Machines Corporation Analysis of Tests of Software Programs Based on Classification of Failed Test Cases
CN105635044A (en) * 2014-10-28 2016-06-01 腾讯科技(深圳)有限公司 Information synchronization method and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101304552A (en) * 2008-06-20 2008-11-12 Tcl天一移动通信(深圳)有限公司 Method and communication terminal capable of automatically matching incoming call number or note number
CN101753524A (en) * 2008-12-15 2010-06-23 青岛海信传媒网络技术有限公司 Method and system for upgrading software
CN101605032A (en) * 2009-04-29 2009-12-16 中兴通讯股份有限公司 A kind of method and system of controlling website visiting
CN101594233A (en) * 2009-06-26 2009-12-02 成都市华为赛门铁克科技有限公司 Upload the method for information, the method and apparatus and the communication system of reception information
US20130151906A1 (en) * 2011-12-08 2013-06-13 International Business Machines Corporation Analysis of Tests of Software Programs Based on Classification of Failed Test Cases
CN105635044A (en) * 2014-10-28 2016-06-01 腾讯科技(深圳)有限公司 Information synchronization method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108207001A (en) * 2016-12-16 2018-06-26 中国移动通信集团四川有限公司 Data processing equipment and method
CN108271159A (en) * 2017-01-04 2018-07-10 中国移动通信集团四川有限公司 Communication processing method, apparatus and system, safety communicating method and device

Similar Documents

Publication Publication Date Title
CN110517097B (en) Method, device, equipment and storage medium for identifying abnormal users
US11882139B2 (en) Method and system for preventing illicit use of a telephony platform
CN106791220B (en) Method and system for preventing telephone fraud
US10674009B1 (en) Validating automatic number identification data
CN104468249B (en) Account abnormity detection method and device
CN106549902B (en) Method and device for identifying suspicious users
CN106127463B (en) Transfer control method and terminal equipment
CN109857484A (en) For the processing method and system of interface call request
US11086991B2 (en) Method and system for active risk control based on intelligent interaction
CN110611929A (en) Abnormal user identification method and device
CN110839216A (en) Method and device for identifying communication information fraud
WO2017215553A1 (en) Short message monitoring method, device and monitoring center
CN109150864B (en) Anti-cheating method and device based on secondary authentication
CN114168423A (en) Abnormal number calling monitoring method, device, equipment and storage medium
CN105871937A (en) Data processing method, data processing device and data processing system
CN117252429A (en) Risk user identification method and device, storage medium and electronic equipment
KR20150059882A (en) System and method for analyzing malicious application of smart-phone and service system and service method for blocking malicious application of smart-phone
CN107809758B (en) SIM card information protection method and device
CN114301711B (en) Anti-riot brushing method, device, equipment, storage medium and computer program product
CN111294311B (en) Traffic charging method and system for preventing traffic fraud
CN110995848B (en) Service management method, device, system, electronic equipment and storage medium
CN113723788A (en) Internet of things card risk identification method and system based on multi-dimensional correlation detection model
CN108055661B (en) Telephone number blacklist establishing method and device based on communication network
CN112788016B (en) Illegal user identification method and device, electronic equipment and storage medium
CN110113312A (en) A kind of recognition methods of access request and processing method and computer readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160817