CN108416485A - Method for identifying ID, electronic device and computer readable storage medium - Google Patents

Method for identifying ID, electronic device and computer readable storage medium Download PDF

Info

Publication number
CN108416485A
CN108416485A CN201710614414.7A CN201710614414A CN108416485A CN 108416485 A CN108416485 A CN 108416485A CN 201710614414 A CN201710614414 A CN 201710614414A CN 108416485 A CN108416485 A CN 108416485A
Authority
CN
China
Prior art keywords
identifier
user
suspicious
business
business datum
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710614414.7A
Other languages
Chinese (zh)
Other versions
CN108416485B (en
Inventor
张政
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201710614414.7A priority Critical patent/CN108416485B/en
Priority to PCT/CN2018/077649 priority patent/WO2019019636A1/en
Publication of CN108416485A publication Critical patent/CN108416485A/en
Application granted granted Critical
Publication of CN108416485B publication Critical patent/CN108416485B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/04Billing or invoicing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06395Quality analysis or management

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Development Economics (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Educational Administration (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of method for identifying ID, this method includes:Business datum is obtained, business datum includes the first identifier number of user identity for identification;Analyze in first identifier number whether have suspicious number according to preset analysis rule;If there is suspicious number, suspicious number is compared with the second identifier number of the worker for identification stored in Staffing System, judges whether suspicious number is problem number according to comparison result;If suspicious number is problem number, the corresponding user of problem number is suspicious user.Not only realizing prevents employee from exploiting one's office that user identity progress business is pretended to be to open list, obtains unjustified enrichment, and can improve the management and control to sales force.

Description

Method for identifying ID, electronic device and computer readable storage medium
Technical field
The present invention relates to information to verify field more particularly to a kind of method for identifying ID, electronic device and computer Readable storage medium storing program for executing.
Background technology
In recent years, with Sales Channel increase and the increase of selling operation amount, the competition between sales force Increasing, some sales forces are in order to improve achievement, it will usually by telemarketing channel be that the user that non-telephone is sold directly to households goes out Has the sales slip of telemarketing, some sales forces can even issue the convenience of sales slip using itself employee, with the body of itself Part issues out multiple sales slips for not meeting relevant regulations.Therefore, sales force or other intra-companies employee are sharp in order to prevent Personation sale is just carried out with user identity with work, improper benefit is obtained, needs to the various pins such as telemarketing, online retailing The state of affairs for selling channel is controlled uniformly, and verifies true user identity, finds out the interior employee of fake user.
Invention content
In view of this, the present invention proposes a kind of method for identifying ID, can be used for according to include in business datum The second identifier number of the worker for identification stored in the first identifier number and Staffing System of identification user identity Code, analyzes the employee of fake user identity, improves the management and control to sales force.
First, to achieve the above object, the present invention proposes a kind of method for identifying ID, which is characterized in that this method Include the following steps:
A, business datum is obtained from business management system, business datum includes the first identifier of user identity for identification Number;
B, suspicious number is filtered out in the first identifier number contained from business data packet according to preset analysis rule;
If C, have the worker for identification stored in Staffing System second identifier number and one suspicious number Code is identical, it is determined that suspicious number is problem number, and the corresponding user of problem number is suspicious user.
Preferably, preset analysis rule includes:
The number of each first identifier number in difference service data statistics;
The number for each first identifier number that statistics obtains is compared with preset threshold values respectively;
If there is the number of first identifier number to be equal to or more than preset threshold values, it is determined that the first identifier number is suspicious Number.
Preferably, this method further includes:
Problem number detecting is carried out to the business datum of each marketing system typing in real time, if there is the industry of marketing system typing Data of being engaged in include one or more problem numbers, then send out information warning, and the marketing system is prompted to stop being directed to this or more The business handling of the corresponding user of a problem number.
Preferably, this method further includes:
If the marketing system sends the corrigendum request of number the problem of to be corrected with one or more for information warning, The problem of number was sent to predetermined terminal, this is to be corrected to manual examination and verification the problem of to be corrected during then corrigendum is asked Number;
If, will after the more positive order of the problem of being received from predetermined terminal for one or more after corrigendum number The problem of more positive order is corresponding to be corrected number mark is right number, and is sent to the marketing system continuing with this just The instruction of the business handling of the corresponding user of normal number.
Preferably, first identifier number includes the contact method of user;Second identifier number includes the contact method of employee.
In addition, to achieve the above object, the present invention also provides a kind of electronic devices, which is characterized in that the electronic device packet The user identity identification system that includes memory, processor and storage on a memory and can run on a processor, user identity Following steps are realized when identifying system is executed by processor:
A, business datum is obtained from business management system, business datum includes the first identifier of user identity for identification Number;
B, suspicious number is filtered out in the first identifier number contained from business data packet according to preset analysis rule;
If C, have the worker for identification stored in Staffing System second identifier number and one suspicious number Code is identical, it is determined that suspicious number is problem number;The corresponding user of problem number is suspicious user.
Preferably, preset analysis rule includes:
The number of each first identifier number in difference service data statistics;
The number for each first identifier number that statistics obtains is compared with pre-set threshold value respectively;
If there is the number of first identifier number to be equal to or more than pre-set threshold value, it is determined that first identifier number is suspicious number Code.
Preferably, following steps are also realized when user identity identification system is executed by processor:
Problem number detecting is carried out to the business datum of each marketing system typing in real time, if there is the industry of marketing system typing Data of being engaged in include one or more problem numbers, then send out information warning, and the marketing system is prompted to stop being directed to this or more The business handling of the corresponding user of a problem number.
Preferably, following steps are also realized when user identity identification system is executed by processor:
If the marketing system sends the corrigendum request of number the problem of to be corrected with one or more for information warning, Then will be to be corrected in corrigendum request the problem of, number was sent to predetermined terminal, and to manual examination and verification, this to be corrected is asked Question number code;
If, will after the more positive order of the problem of being received from predetermined terminal for one or more after corrigendum number The problem of more positive order is corresponding to be corrected number mark is right number, and is sent to the marketing system continuing with this just The business handling instruction of the corresponding user of normal number.
To achieve the above object, the present invention also provides a kind of computer readable storage medium, the computer-readable storage mediums Matter is stored with user identity identification system, and user identity identification system can be executed by least one processor, so that at least one Processor executes the step of above-mentioned each method for identifying ID.
Compared to the prior art, it method for identifying ID proposed by the invention, electronic device and computer-readable deposits Storage media, by the first identifier number of the user identity for identification recorded from business datum according to preset analysis rule In analyze suspicious number, further by the second of the worker for identification stored in suspicious number and Staffing System Identification number is compared;Judge whether suspicious number is problem number according to comparison result;If suspicious number is problem number, Then the corresponding user of problem number is suspicious user.In this way, both itself employee can be utilized to avoid sales force in the prior art That issues sales slip facilitates the drawbacks of carrying out personation sale, can also improve the management and control to sales force.
Description of the drawings
Fig. 1 is each one optional application environment schematic diagram of embodiment of the present invention;
Fig. 2 is the schematic diagram of one optional hardware structure of electronic device in Fig. 1;
Fig. 3 is the high-level schematic functional block diagram of user identity identification system preferred embodiment of the present invention;
Fig. 4 is the implementation process diagram of one embodiment of method for identifying ID of the present invention;
Fig. 5 is the implementation process diagram of another embodiment of method for identifying ID of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work The every other embodiment obtained is put, shall fall within the protection scope of the present invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot It is interpreted as indicating or implying its relative importance or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment Art scheme can be combined with each other, but must can be implemented as basis with those of ordinary skill in the art, when technical solution Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims Protection domain within.
As shown in fig.1, being each one optional application environment schematic diagram of embodiment of the present invention.
In the present embodiment, present invention can apply to include but are not limited to, server 1, electronic device 2, network 3 In application environment.
Wherein, server 1 can be the director server of enterprises, can also be the service that some department is managed in enterprise Device.It can be the computing devices such as rack-mount server, blade server, tower server or Cabinet-type server.
Server 1 can be independent server, can also be the server cluster that multiple servers are formed.Server Business management system (APP), Staffing System (APP) and each marketing system (APP) are installed and run in 1.
Network 3 can be intranet (Intranet), internet (Internet), global system for mobile communications (Global System of Mobile communication, GSM), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), 4G networks, 5G networks, bluetooth (Bluetooth), Wi-Fi etc. is wireless or has Gauze network.
Server 1 is communicated to connect by network 3 and electronic device 2, and the use of the present invention is installed and run in electronic device 2 Family identification system 200.
As shown in fig.2, being 2 one optional hardware structure schematic diagram of electronic device in Fig. 1.In the present embodiment, electronics dress It sets 2 may include, but is not limited only to, the memory 11, processor 12, network interface of connection can be in communication with each other by system bus 13.It should be pointed out that Fig. 2 illustrates only the electronic device 2 with component 11-13, it should be understood that being not required for reality Apply all components shown, the implementation that can be substituted is more or less component.
Wherein, memory 11 includes at least a type of readable storage medium storing program for executing, and readable storage medium storing program for executing includes flash memory, hard Disk, multimedia card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), static random-access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), may be programmed read-only storage at read-only memory (ROM) Device (PROM), magnetic storage, disk, CD etc..In some embodiments, memory 11 can be the inside of electronic device 2 Storage unit, for example, electronic device 2 hard disk or memory.In further embodiments, memory 11 can also be electronic device 2 External memory equipment, such as the plug-in type hard disk that is equipped on electronic device 2, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) blocks, flash card (Flash Card) etc..Certainly, memory 11 can also be both Internal storage unit including electronic device 2 also includes its External memory equipment.In the present embodiment, memory 11 is commonly used in depositing Storage is installed on the operating system and types of applications software of electronic device 2, such as the program code of user identity identification system 200 Deng.In addition, memory 11 can be also used for temporarily storing the Various types of data that has exported or will export.
Processor 12 can be in some embodiments central processing unit (Central Processing Unit, CPU), Controller, microcontroller, microprocessor or other data processing chips.Processor 12 is total commonly used in control electronic device 2 Gymnastics is made, such as executes and carry out data interaction with server 1 or communicate relevant control and processing etc..In the present embodiment, place The program code or handle data that reason device 12 is used to store in run memory 11, such as the user identity identification system of operation 200 etc..
Network interface 13 may include that radio network interface or wired network interface, network interface 13 are commonly used in filling in electronics It sets and establishes communication connection between 2 and other electronic equipments.In the present embodiment, network interface 13 is mainly used for will be electric by network 3 Sub-device 2 is connected with server 1, and data transmission channel and communication connection are established between electronic device 2 and server 1.
So far, oneself is through describing the hardware configuration and work(of the application environment and relevant device of each embodiment of the present invention in detail Energy.In the following, above application environment and relevant device will be based on, each embodiment of the present invention is proposed.
First, the present invention proposes a kind of user identity identification system 200.
As shown in fig.3, being the functional block diagram of 200 preferred embodiment of user identity identification system of the present invention.This implementation In example, user identity identification system 200 can be divided into one or more modules, one or more module, which is stored in, deposits In reservoir 11, and it is performed by one or more processors (being processor 12 in the present embodiment), to complete the present invention.For example, In figure 3, it is true can be divided into acquisition module 201, screening module 202 and problem number for user identity identification system 200 Cover half block 203.The so-called function module of the present invention is the series of computation machine program instruction section for referring to complete specific function, than Implementation procedure of the program more suitable for description user identity identification system 200 in electronic device 2.Each function module is put up with below The function of 201-203 is described in detail.
Acquisition module 201, for obtaining business datum from business management system, business datum includes user for identification The first identifier number of identity.
In the present embodiment, for the convenience of description, being illustrated by taking the insurance business of insurance company as an example, then business datum Including declaration form data.In various embodiments, business datum is different according to the difference of company's selling operation, but can manage Xie Di, business datum all record the essential information for having user, essential information include user contact method (for example, phone number, Mailbox, QQ) etc. can be used to identify the first identifier number of user identity.
In general, user will fill in detailed personal information, staff can be in service management when buying insurance The personal information and user that typing user fills in system buy the specifying information of insurance to generate business datum (in the present embodiment For declaration form data).Wherein, must include that user corresponding with the name of user commonly contacts in the personal information that user fills in Mode (for example, phone number), business management system (in the present embodiment for insure system) reserved generally according to user with The corresponding contact method of name at family identifies the identity for the user that insures.For example, when the user that insures is directly defeated in the system of insuring When entering reserved phone number, the system of insuring can call the corresponding declaration form data of the phone number and be shown to user.
In some cases, it is also necessary to fill in the information of the important recognizable user identity such as ID card No. of user. For example, at present when user buys vehicle insurance, need to leave the phone number of the user of purchase vehicle insurance, user buy serious illness insurance or When accident insurance etc. is related to the insurance of user itself vital interests, while needing user to leave phone number, it is also necessary to user Leave ID card No. etc..
Screening module 202 is screened in the first identifier number for being contained from business data packet according to preset analysis rule Go out suspicious number.
Wherein, preset analysis rule includes:
The number of each first identifier number in difference service data statistics;
The number for each first identifier number that statistics obtains is compared with pre-set threshold value respectively;
For example, in the present embodiment, pre-set threshold value 5.
If there is the number of first identifier number to be equal to or more than pre-set threshold value, it is determined that the first identifier number is suspicious number Code.
Problem number determining module 203, for determining that suspicious number is problem number.
If in general, have the worker for identification stored in Staffing System second identifier number and one or more It is a can be identical with number, it is determined that the suspicious number be problem number, and the corresponding user of problem number be suspicious user.
It is to be appreciated that the essential information of employee is stored in the Staffing System of enterprises, the essential information packet Include name, the common contact method of employee (for example, phone number, wechat, QQ, E-mail address etc.) of employee, the name of employee It is usually corresponded with contact method, Staffing System can usually identify the body of employee by the contact method of employee Part, for example, when whether need to inquire the corresponding user of some telephone number is the employee of our unit, usually in staff's benefits The telephone number is inputted in system, if telephone number correspondence is stored in Staffing System, Staffing System corresponds to Show the corresponding employee information of the telephone number.
On certain important posies, essential information further includes important recognizable employee's body such as ID card No. of employee The number of part.Therefore, the identification number for the identification worker that will be stored in suspicious number and Staffing System can be passed through (telephone number of employee or the ID card No. of employee) is compared, to determine whether suspicious number is problem number.
In another embodiment of the invention, identification system 200 further includes detecting module and corrigendum module (detecting mould Block and corrigendum module are not shown in figure 3).
Wherein, detecting module, for carrying out problem number detecting to the business datum of each marketing system typing in real time, if It includes one or more problem numbers to have the business datum of marketing system typing, then sends out information warning (for example, information warning is N), the marketing system is prompted to stop the business handling for the corresponding user of the one or more problem number (for example, safety plug Sale system stops list of offering out).
Module is corrected, for sending the problem of to be corrected number to predetermined terminal, and from predetermined terminal It receives for one or more after the corrigendum the problem of after the more positive order of number, asks the more positive order is corresponding to be corrected Question number code labeling is right number, and sends the business handling continuing with the right number corresponding user to marketing system Instruction.
In general, in practical applications, after each marketing system receives information warning, if user has a question, needing It wants marketing system to send out the corrigendum request of the problem of one or more to be corrected number according to the query that user proposes, corrects module The problem of to be corrected during the corrigendum is asked, number was sent to predetermined terminal, and predetermined terminal passes through manual examination and verification The problem of this is to be corrected number.
If it is the second mark for the recognizable worker that employee reserves that manual examination and verification, which find the problem of this is to be corrected number not, Know number, then sends more positive order to correcting module.
After the more positive order of number, which is referred to the problem of receiving for one or more after corrigendum for corrigendum module It is right number to enable the problem of corresponding to be corrected number mark, and continues to correspond to the right number to marketing system transmission User business handling instruction.
In addition, the present invention also proposes a kind of method for identifying ID.
As shown in fig.4, being the implementation process diagram of one embodiment of method for identifying ID of the present invention.In this implementation In example, the execution sequence of the step in flow chart shown in Fig. 4 can change according to different requirements, and certain steps can save Slightly.
Step S301, obtains business datum from business management system, and business datum includes user identity for identification First identifier number.
In the present embodiment, for convenience, by taking the household electrical appliances business in market as an example.In general, user is in purchase household electrical appliances When, basic personal information will be filled in, staff can typing user fills in business management system personal information And user buys the information of household electrical appliances to generate business datum.Wherein, must include in the personal information that user fills in and user The common contact method of the corresponding user of name (for example, phone number, wechat, qq, E-mail address etc.), operation system is usual The contact method corresponding with address name reserved according to user identifies the identity of user.For example, when there is user to need repairing Or when goods return and replacement, reserved phone number can be directly inputted in operation system, operation system can call the phone number to correspond to Business datum (for example, order information) and be shown to related personnel.
Step S302 filters out suspicious number in the first identifier number contained from business data packet according to preset analysis rule Code.
Wherein, preset analysis rule includes:
The number of each first identifier number in difference service data statistics;
The number of each first identifier number that statistics is obtained respectively and pre-set threshold value (for example, pre-set threshold value is 5) into Row compares;
If the number of first identifier number is equal to or more than pre-set threshold value, it is determined that first identifier number is suspicious number.
Step S303, if having the worker for identification stored in Staffing System second identifier number and one Suspicious number is identical, it is determined that suspicious number is problem number, can be using the corresponding user of number as suspicious user.
It is to be appreciated that usually prestoring the essential information of employee in the Staffing System of enterprises, this believes substantially Breath includes name, the common contact method of employee (for example, phone number, wechat, QQ, E-mail address etc.) of employee, employee's Name is usually corresponded with contact method, and Staffing System usually identifies the body of employee by the contact method of employee Part, for example, when whether need to inquire some telephone number is the employee of our unit, usually inputted in Staffing System The telephone number, if telephone number correspondence is pre-stored in Staffing System, Staffing System, which corresponds to, shows the phone The corresponding employee information of number.
On certain important posies, essential information further includes important recognizable employee's body such as ID card No. of employee The number of part.Therefore, the identification number for the identification worker that will be stored in suspicious number and Staffing System can be passed through (telephone number of employee or the ID card No. of employee) is compared, to determine whether suspicious number is problem number.
As shown in fig.5, being the implementation process diagram of another embodiment of method for identifying ID of the present invention.In this reality It applies in example, the execution sequence of the step in flow chart shown in fig. 5 can change according to different requirements, and certain steps can be with It omits.
Step S401, obtains business datum from business management system, and business datum includes user identity for identification First identifier number.
Step S402 filters out suspicious number in the first identifier number contained from business data packet according to preset analysis rule Code.
Step S403, if having the worker for identification stored in Staffing System identification number and one it is suspicious Number is identical, it is determined that the suspicious number is problem number, and the corresponding user of problem number is suspicious user.
Step S404 carries out problem number detecting to the business datum of each marketing system typing in real time, if there is sale system The business datum of system typing includes one or more problem numbers, then sends out information warning, and marketing system stopping is prompted to be directed to The business handling (for example, list of offering out) of the corresponding user of the one or more problem number.
The embodiment is to increase step S404 on the basis of embodiment shown in Fig. 4, judges to ask in above-described embodiment On the basis of question number code, management and control further is carried out to single process of opening after each marketing system, it is ensured that follow-up each sale system System has prevented interior employee's fake user of exploiting one's office from carrying out out list when carry out business opens list, obtains improper benefit.
In general, in practical applications, after each marketing system receives information warning, if user has a question, needing It wants marketing system to send out problem number according to the query that user proposes and corrects request., identification system 200 receiving sale System send the one or more for information warning after corrigendum the problem of number corrigendum request after, will the corrigendum request in The problem of number was sent to predetermined terminal, this is to be corrected to manual examination and verification the problem of to be corrected number.
If being found after manual examination and verification, the problem of this is to be corrected number is the number that normal users use, predetermined The problem of terminal is to be corrected for one or more number sends more positive order to user identity identification system 200, user identity After the more positive order of the problem of identifying system 200 is received for one or more from predetermined terminal after corrigendum number, The problem of more positive order is corresponding to be corrected number mark be right number, and to the marketing system send continuing with this The instruction of the business handling of the corresponding user of right number.
By above-described embodiment it is found that method for identifying ID, electronic device and the computer-readable storage of the present invention Medium analyzes the user identity for identification that business datum includes by obtaining business datum according to preset analysis rule First identifier number in whether have suspicious number;If there is suspicious number, suspicious number is stored with Staffing System The second identifier number of worker for identification be compared;Judge whether suspicious number is issue number according to comparison result Code, if suspicious number is problem number, the corresponding user of problem number is suspicious user.Not only realizing prevents employee from utilizing Work just pretends to be user identity progress business to open list, obtains improper benefit, and can improve the management and control to sales force.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, computer, clothes Be engaged in device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of method for identifying ID, which is characterized in that described method includes following steps:
A, business datum is obtained from business management system, the business datum includes the first identifier of user identity for identification Number;
B, suspicious number is filtered out from the first identifier number that the business datum includes according to preset analysis rule;
If C, have the worker for identification stored in Staffing System second identifier number and one described suspicious number Code is identical, it is determined that the suspicious number is problem number, and the corresponding user of described problem number is suspicious user.
2. method for identifying ID as described in claim 1, which is characterized in that the preset analysis rule includes:
The number of each first identifier number in the business datum is counted respectively;
The number for each first identifier number that statistics obtains is compared with pre-set threshold value respectively;
If there is the number of first identifier number to be equal to or more than the pre-set threshold value, it is determined that the first identifier number is suspicious number Code.
3. method for identifying ID as described in claim 1, which is characterized in that the method further includes:
Problem number detecting is carried out to the business datum of each marketing system typing in real time, if there is the business number of marketing system typing According to comprising one or more problem numbers, then information warning is sent out, marketing system stopping is prompted to be asked for the one or more The business handling of the corresponding user of question number code.
4. method for identifying ID as claimed in claim 3, which is characterized in that the method further includes:
If the marketing system sends the corrigendum request of number the problem of to be corrected with one or more for the information warning, Then will be to be corrected in corrigendum request the problem of, number was sent to predetermined terminal, and to manual examination and verification, this to be corrected is asked Question number code;
If after the more positive order of the problem of being received from predetermined terminal for one or more after corrigendum number, more by this The problem of positive order is corresponding to be corrected number mark is right number, and is sent to the marketing system continuing with this normal number The instruction of the business handling of the corresponding user of code.
5. the method for identifying ID as described in claim 1-4 is any, which is characterized in that the first identifier number includes The contact method of user;The second identifier number includes the contact method of employee.
6. a kind of electronic device, which is characterized in that the electronic device includes memory, processor and is stored in the memory User identity identification system that is upper and can running on the processor, the user identity identification system are held by the processor Following steps are realized when row:
A, business datum is obtained from business management system, the business datum includes the first identifier of user identity for identification Number;
B, suspicious number is filtered out from the first identifier number that the business datum includes according to preset analysis rule;
If C, have the worker for identification stored in Staffing System second identifier number and one described suspicious number Code is identical, it is determined that the suspicious number is problem number, and the corresponding user of described problem number is suspicious user.
7. electronic device as claimed in claim 6, which is characterized in that the preset analysis rule includes:
The number of each first identifier number in the business datum is counted respectively;
The number for each first identifier number that statistics obtains is compared with pre-set threshold value respectively;
If there is the number of first identifier number to be equal to or more than the pre-set threshold value, it is determined that the first identifier number is suspicious number Code.
8. electronic device as claimed in claim 6, which is characterized in that the user identity identification system is held by the processor Following steps are also realized when row:
Problem number detecting is carried out to the business datum of each marketing system typing in real time, if there is the business number of marketing system typing According to comprising one or more problem numbers, then information warning is sent out, marketing system stopping is prompted to be asked for the one or more The business handling of the corresponding user of question number code.
9. electronic device as claimed in claim 8, which is characterized in that the user identity identification system is held by the processor Following steps are also realized when row:
If the marketing system sends the corrigendum request of number the problem of to be corrected with one or more for the information warning, Then will be to be corrected in corrigendum request the problem of, number was sent to predetermined terminal, and to manual examination and verification, this to be corrected is asked Question number code;
If after the more positive order of the problem of being received from predetermined terminal for one or more after corrigendum number, more by this The problem of positive order is corresponding to be corrected number mark is right number, and is sent to the marketing system continuing with this normal number The business handling instruction of the corresponding user of code.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has user's identification system, institute Stating user identity identification system can be executed by least one processor, so that at least one processor executes such as claim The step of any one of 1-5 method for identifying ID.
CN201710614414.7A 2017-07-25 2017-07-25 User identity recognition method, electronic device and computer readable storage medium Active CN108416485B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710614414.7A CN108416485B (en) 2017-07-25 2017-07-25 User identity recognition method, electronic device and computer readable storage medium
PCT/CN2018/077649 WO2019019636A1 (en) 2017-07-25 2018-02-28 User identification method, electronic device, and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710614414.7A CN108416485B (en) 2017-07-25 2017-07-25 User identity recognition method, electronic device and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108416485A true CN108416485A (en) 2018-08-17
CN108416485B CN108416485B (en) 2021-10-08

Family

ID=63125454

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710614414.7A Active CN108416485B (en) 2017-07-25 2017-07-25 User identity recognition method, electronic device and computer readable storage medium

Country Status (2)

Country Link
CN (1) CN108416485B (en)
WO (1) WO2019019636A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109410048A (en) * 2018-09-07 2019-03-01 平安科技(深圳)有限公司 Electronic device, customer information method for managing security and storage medium
CN111222566A (en) * 2020-01-02 2020-06-02 平安科技(深圳)有限公司 User attribute identification method, device and storage medium
CN111800370A (en) * 2019-04-09 2020-10-20 阿里巴巴集团控股有限公司 User information sending and receiving method, device and terminal equipment
CN112907395A (en) * 2019-11-19 2021-06-04 深圳市明源云客电子商务有限公司 Client type identification method, device and equipment
CN113286041A (en) * 2021-04-09 2021-08-20 厦门市美亚柏科信息股份有限公司 Method and system for identifying abnormal use of oversea mobile phone number
US20220006190A1 (en) * 2019-05-07 2022-01-06 Bao Tran Cellular system
US11658407B2 (en) * 2019-05-07 2023-05-23 Bao Tran Cellular system

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111274561A (en) * 2020-02-28 2020-06-12 广州高专资讯科技有限公司 Identity management method, device, equipment and storage medium
CN114071454B (en) * 2020-07-31 2023-09-05 中移(苏州)软件技术有限公司 Identification method, device, equipment and storage medium for mobile user identification code
CN112163050B (en) * 2020-10-16 2023-11-07 泰康保险集团股份有限公司 Label processing method and device, electronic equipment and storage medium
CN112668800A (en) * 2021-01-04 2021-04-16 荣联科技集团股份有限公司 Information processing method, apparatus, medium, and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090125320A1 (en) * 2007-11-12 2009-05-14 Bickett Erick J Method and system for displaying business information
US20120123941A1 (en) * 2010-11-17 2012-05-17 American Express Travel Related Services Company, Inc. Internet facilitation of fraud services
CN104424433A (en) * 2013-08-22 2015-03-18 腾讯科技(深圳)有限公司 Anti-cheating method and anti-cheating system of application program
CN104869155A (en) * 2015-04-27 2015-08-26 腾讯科技(深圳)有限公司 Data auditing method and device
GB2535433A (en) * 2014-12-12 2016-08-24 Aeriandi Ltd Method and apparatus for call correlation
CN106776973A (en) * 2016-12-05 2017-05-31 深圳前海微众银行股份有限公司 Blacklist data generation method and device
CN106851613A (en) * 2016-12-09 2017-06-13 深圳市金立通信设备有限公司 Service request method, the verification method of business handling number and its terminal

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105657659A (en) * 2016-01-29 2016-06-08 北京邮电大学 Method and system for identifying scalping user in taxi service

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090125320A1 (en) * 2007-11-12 2009-05-14 Bickett Erick J Method and system for displaying business information
US20120123941A1 (en) * 2010-11-17 2012-05-17 American Express Travel Related Services Company, Inc. Internet facilitation of fraud services
CN104424433A (en) * 2013-08-22 2015-03-18 腾讯科技(深圳)有限公司 Anti-cheating method and anti-cheating system of application program
GB2535433A (en) * 2014-12-12 2016-08-24 Aeriandi Ltd Method and apparatus for call correlation
CN104869155A (en) * 2015-04-27 2015-08-26 腾讯科技(深圳)有限公司 Data auditing method and device
CN106776973A (en) * 2016-12-05 2017-05-31 深圳前海微众银行股份有限公司 Blacklist data generation method and device
CN106851613A (en) * 2016-12-09 2017-06-13 深圳市金立通信设备有限公司 Service request method, the verification method of business handling number and its terminal

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
魏浩: ""基于Web数据流分析的用户访问行为核查技术研究"", 《中国优秀硕士学位论文全文数据库(信息科技辑)》 *

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109410048A (en) * 2018-09-07 2019-03-01 平安科技(深圳)有限公司 Electronic device, customer information method for managing security and storage medium
CN109410048B (en) * 2018-09-07 2023-04-25 平安科技(深圳)有限公司 Electronic device, client information security management method, and storage medium
CN111800370B (en) * 2019-04-09 2022-11-15 阿里巴巴集团控股有限公司 User information sending and receiving method, device and terminal equipment
CN111800370A (en) * 2019-04-09 2020-10-20 阿里巴巴集团控股有限公司 User information sending and receiving method, device and terminal equipment
US11658414B2 (en) * 2019-05-07 2023-05-23 Bao Tran Cellular system
US20220006190A1 (en) * 2019-05-07 2022-01-06 Bao Tran Cellular system
US20220094058A1 (en) * 2019-05-07 2022-03-24 Bao Tran Cellular system
US11646491B2 (en) * 2019-05-07 2023-05-09 Bao Tran Cellular system
US11658407B2 (en) * 2019-05-07 2023-05-23 Bao Tran Cellular system
US20230232251A1 (en) * 2019-05-07 2023-07-20 Bao Tran Cellular system
US20230268651A1 (en) * 2019-05-07 2023-08-24 Bao Tran Cellular system
US11929559B2 (en) * 2019-05-07 2024-03-12 Bao Tran Cellular system
CN112907395A (en) * 2019-11-19 2021-06-04 深圳市明源云客电子商务有限公司 Client type identification method, device and equipment
CN111222566B (en) * 2020-01-02 2020-09-01 平安科技(深圳)有限公司 User attribute identification method, device and storage medium
CN111222566A (en) * 2020-01-02 2020-06-02 平安科技(深圳)有限公司 User attribute identification method, device and storage medium
CN113286041A (en) * 2021-04-09 2021-08-20 厦门市美亚柏科信息股份有限公司 Method and system for identifying abnormal use of oversea mobile phone number
CN113286041B (en) * 2021-04-09 2023-10-03 厦门市美亚柏科信息股份有限公司 Method and system for identifying abnormal use of foreign mobile phone number

Also Published As

Publication number Publication date
WO2019019636A1 (en) 2019-01-31
CN108416485B (en) 2021-10-08

Similar Documents

Publication Publication Date Title
CN108416485A (en) Method for identifying ID, electronic device and computer readable storage medium
CN107464117A (en) Data managing method and block catenary system based on block chain
CN108427705A (en) Electronic device, distributed system journal querying method and storage medium
CN108154047A (en) A kind of data desensitization method and device
CN108632367A (en) Account correlating method and information-pushing method
CN107995377A (en) Customer service management method, electronic device and computer-readable recording medium
CN104320375B (en) A kind of method and apparatus for preventing from illegally registering
CN108494771A (en) Electronic device, fire wall open verification method and storage medium
CN111268524A (en) System and method for preventing use of pirated products in elevator control devices
CN107911334A (en) Ip address risk monitoring method and application server
CN108415925A (en) Electronic device, data call daily record generation and querying method and storage medium
CN111371772A (en) Intelligent gateway current limiting method and system based on redis and computer equipment
CN107908480A (en) Wages computational methods, application server and computer-readable recording medium
CN110069925A (en) Software monitors method, system and computer readable storage medium
CN108763051A (en) Electronic device, transaction software operation risk method for early warning and storage medium
CN109040146B (en) Account login authorization method, server, computer equipment and storage medium
CN110769064A (en) System, method and equipment for offline message pushing
CN107526580A (en) Terminal applies recognition methods and device
CN107967305A (en) Image file upload method, server and readable storage medium storing program for executing
CN107154975A (en) One kind application method for down loading and device
CN107733785A (en) A kind of multiple terminals chat message synchronization removal method and device
CN107911400A (en) Data sharing method, electronic device and computer-readable recording medium
JP7208080B2 (en) Automatic activation and onboarding of connected equipment
CN110069445A (en) Face image processing process, server and computer readable storage medium
CN109905407A (en) Management method, system, equipment and medium based on vpn server access Intranet

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant