CN108416485A - Method for identifying ID, electronic device and computer readable storage medium - Google Patents
Method for identifying ID, electronic device and computer readable storage medium Download PDFInfo
- Publication number
- CN108416485A CN108416485A CN201710614414.7A CN201710614414A CN108416485A CN 108416485 A CN108416485 A CN 108416485A CN 201710614414 A CN201710614414 A CN 201710614414A CN 108416485 A CN108416485 A CN 108416485A
- Authority
- CN
- China
- Prior art keywords
- identifier
- user
- suspicious
- business
- business datum
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/04—Billing or invoicing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06395—Quality analysis or management
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Development Economics (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Marketing (AREA)
- Educational Administration (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Game Theory and Decision Science (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of method for identifying ID, this method includes:Business datum is obtained, business datum includes the first identifier number of user identity for identification;Analyze in first identifier number whether have suspicious number according to preset analysis rule;If there is suspicious number, suspicious number is compared with the second identifier number of the worker for identification stored in Staffing System, judges whether suspicious number is problem number according to comparison result;If suspicious number is problem number, the corresponding user of problem number is suspicious user.Not only realizing prevents employee from exploiting one's office that user identity progress business is pretended to be to open list, obtains unjustified enrichment, and can improve the management and control to sales force.
Description
Technical field
The present invention relates to information to verify field more particularly to a kind of method for identifying ID, electronic device and computer
Readable storage medium storing program for executing.
Background technology
In recent years, with Sales Channel increase and the increase of selling operation amount, the competition between sales force
Increasing, some sales forces are in order to improve achievement, it will usually by telemarketing channel be that the user that non-telephone is sold directly to households goes out
Has the sales slip of telemarketing, some sales forces can even issue the convenience of sales slip using itself employee, with the body of itself
Part issues out multiple sales slips for not meeting relevant regulations.Therefore, sales force or other intra-companies employee are sharp in order to prevent
Personation sale is just carried out with user identity with work, improper benefit is obtained, needs to the various pins such as telemarketing, online retailing
The state of affairs for selling channel is controlled uniformly, and verifies true user identity, finds out the interior employee of fake user.
Invention content
In view of this, the present invention proposes a kind of method for identifying ID, can be used for according to include in business datum
The second identifier number of the worker for identification stored in the first identifier number and Staffing System of identification user identity
Code, analyzes the employee of fake user identity, improves the management and control to sales force.
First, to achieve the above object, the present invention proposes a kind of method for identifying ID, which is characterized in that this method
Include the following steps:
A, business datum is obtained from business management system, business datum includes the first identifier of user identity for identification
Number;
B, suspicious number is filtered out in the first identifier number contained from business data packet according to preset analysis rule;
If C, have the worker for identification stored in Staffing System second identifier number and one suspicious number
Code is identical, it is determined that suspicious number is problem number, and the corresponding user of problem number is suspicious user.
Preferably, preset analysis rule includes:
The number of each first identifier number in difference service data statistics;
The number for each first identifier number that statistics obtains is compared with preset threshold values respectively;
If there is the number of first identifier number to be equal to or more than preset threshold values, it is determined that the first identifier number is suspicious
Number.
Preferably, this method further includes:
Problem number detecting is carried out to the business datum of each marketing system typing in real time, if there is the industry of marketing system typing
Data of being engaged in include one or more problem numbers, then send out information warning, and the marketing system is prompted to stop being directed to this or more
The business handling of the corresponding user of a problem number.
Preferably, this method further includes:
If the marketing system sends the corrigendum request of number the problem of to be corrected with one or more for information warning,
The problem of number was sent to predetermined terminal, this is to be corrected to manual examination and verification the problem of to be corrected during then corrigendum is asked
Number;
If, will after the more positive order of the problem of being received from predetermined terminal for one or more after corrigendum number
The problem of more positive order is corresponding to be corrected number mark is right number, and is sent to the marketing system continuing with this just
The instruction of the business handling of the corresponding user of normal number.
Preferably, first identifier number includes the contact method of user;Second identifier number includes the contact method of employee.
In addition, to achieve the above object, the present invention also provides a kind of electronic devices, which is characterized in that the electronic device packet
The user identity identification system that includes memory, processor and storage on a memory and can run on a processor, user identity
Following steps are realized when identifying system is executed by processor:
A, business datum is obtained from business management system, business datum includes the first identifier of user identity for identification
Number;
B, suspicious number is filtered out in the first identifier number contained from business data packet according to preset analysis rule;
If C, have the worker for identification stored in Staffing System second identifier number and one suspicious number
Code is identical, it is determined that suspicious number is problem number;The corresponding user of problem number is suspicious user.
Preferably, preset analysis rule includes:
The number of each first identifier number in difference service data statistics;
The number for each first identifier number that statistics obtains is compared with pre-set threshold value respectively;
If there is the number of first identifier number to be equal to or more than pre-set threshold value, it is determined that first identifier number is suspicious number
Code.
Preferably, following steps are also realized when user identity identification system is executed by processor:
Problem number detecting is carried out to the business datum of each marketing system typing in real time, if there is the industry of marketing system typing
Data of being engaged in include one or more problem numbers, then send out information warning, and the marketing system is prompted to stop being directed to this or more
The business handling of the corresponding user of a problem number.
Preferably, following steps are also realized when user identity identification system is executed by processor:
If the marketing system sends the corrigendum request of number the problem of to be corrected with one or more for information warning,
Then will be to be corrected in corrigendum request the problem of, number was sent to predetermined terminal, and to manual examination and verification, this to be corrected is asked
Question number code;
If, will after the more positive order of the problem of being received from predetermined terminal for one or more after corrigendum number
The problem of more positive order is corresponding to be corrected number mark is right number, and is sent to the marketing system continuing with this just
The business handling instruction of the corresponding user of normal number.
To achieve the above object, the present invention also provides a kind of computer readable storage medium, the computer-readable storage mediums
Matter is stored with user identity identification system, and user identity identification system can be executed by least one processor, so that at least one
Processor executes the step of above-mentioned each method for identifying ID.
Compared to the prior art, it method for identifying ID proposed by the invention, electronic device and computer-readable deposits
Storage media, by the first identifier number of the user identity for identification recorded from business datum according to preset analysis rule
In analyze suspicious number, further by the second of the worker for identification stored in suspicious number and Staffing System
Identification number is compared;Judge whether suspicious number is problem number according to comparison result;If suspicious number is problem number,
Then the corresponding user of problem number is suspicious user.In this way, both itself employee can be utilized to avoid sales force in the prior art
That issues sales slip facilitates the drawbacks of carrying out personation sale, can also improve the management and control to sales force.
Description of the drawings
Fig. 1 is each one optional application environment schematic diagram of embodiment of the present invention;
Fig. 2 is the schematic diagram of one optional hardware structure of electronic device in Fig. 1;
Fig. 3 is the high-level schematic functional block diagram of user identity identification system preferred embodiment of the present invention;
Fig. 4 is the implementation process diagram of one embodiment of method for identifying ID of the present invention;
Fig. 5 is the implementation process diagram of another embodiment of method for identifying ID of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work
The every other embodiment obtained is put, shall fall within the protection scope of the present invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is used for description purposes only, and cannot
It is interpreted as indicating or implying its relative importance or implicitly indicates the quantity of indicated technical characteristic.Define as a result, " the
One ", the feature of " second " can explicitly or implicitly include at least one of the features.In addition, the skill between each embodiment
Art scheme can be combined with each other, but must can be implemented as basis with those of ordinary skill in the art, when technical solution
Will be understood that the combination of this technical solution is not present in conjunction with there is conflicting or cannot achieve when, also not the present invention claims
Protection domain within.
As shown in fig.1, being each one optional application environment schematic diagram of embodiment of the present invention.
In the present embodiment, present invention can apply to include but are not limited to, server 1, electronic device 2, network 3
In application environment.
Wherein, server 1 can be the director server of enterprises, can also be the service that some department is managed in enterprise
Device.It can be the computing devices such as rack-mount server, blade server, tower server or Cabinet-type server.
Server 1 can be independent server, can also be the server cluster that multiple servers are formed.Server
Business management system (APP), Staffing System (APP) and each marketing system (APP) are installed and run in 1.
Network 3 can be intranet (Intranet), internet (Internet), global system for mobile communications
(Global System of Mobile communication, GSM), wideband code division multiple access (Wideband Code
Division Multiple Access, WCDMA), 4G networks, 5G networks, bluetooth (Bluetooth), Wi-Fi etc. is wireless or has
Gauze network.
Server 1 is communicated to connect by network 3 and electronic device 2, and the use of the present invention is installed and run in electronic device 2
Family identification system 200.
As shown in fig.2, being 2 one optional hardware structure schematic diagram of electronic device in Fig. 1.In the present embodiment, electronics dress
It sets 2 may include, but is not limited only to, the memory 11, processor 12, network interface of connection can be in communication with each other by system bus
13.It should be pointed out that Fig. 2 illustrates only the electronic device 2 with component 11-13, it should be understood that being not required for reality
Apply all components shown, the implementation that can be substituted is more or less component.
Wherein, memory 11 includes at least a type of readable storage medium storing program for executing, and readable storage medium storing program for executing includes flash memory, hard
Disk, multimedia card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), static random-access
Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), may be programmed read-only storage at read-only memory (ROM)
Device (PROM), magnetic storage, disk, CD etc..In some embodiments, memory 11 can be the inside of electronic device 2
Storage unit, for example, electronic device 2 hard disk or memory.In further embodiments, memory 11 can also be electronic device 2
External memory equipment, such as the plug-in type hard disk that is equipped on electronic device 2, intelligent memory card (Smart Media Card,
SMC), secure digital (Secure Digital, SD) blocks, flash card (Flash Card) etc..Certainly, memory 11 can also be both
Internal storage unit including electronic device 2 also includes its External memory equipment.In the present embodiment, memory 11 is commonly used in depositing
Storage is installed on the operating system and types of applications software of electronic device 2, such as the program code of user identity identification system 200
Deng.In addition, memory 11 can be also used for temporarily storing the Various types of data that has exported or will export.
Processor 12 can be in some embodiments central processing unit (Central Processing Unit, CPU),
Controller, microcontroller, microprocessor or other data processing chips.Processor 12 is total commonly used in control electronic device 2
Gymnastics is made, such as executes and carry out data interaction with server 1 or communicate relevant control and processing etc..In the present embodiment, place
The program code or handle data that reason device 12 is used to store in run memory 11, such as the user identity identification system of operation
200 etc..
Network interface 13 may include that radio network interface or wired network interface, network interface 13 are commonly used in filling in electronics
It sets and establishes communication connection between 2 and other electronic equipments.In the present embodiment, network interface 13 is mainly used for will be electric by network 3
Sub-device 2 is connected with server 1, and data transmission channel and communication connection are established between electronic device 2 and server 1.
So far, oneself is through describing the hardware configuration and work(of the application environment and relevant device of each embodiment of the present invention in detail
Energy.In the following, above application environment and relevant device will be based on, each embodiment of the present invention is proposed.
First, the present invention proposes a kind of user identity identification system 200.
As shown in fig.3, being the functional block diagram of 200 preferred embodiment of user identity identification system of the present invention.This implementation
In example, user identity identification system 200 can be divided into one or more modules, one or more module, which is stored in, deposits
In reservoir 11, and it is performed by one or more processors (being processor 12 in the present embodiment), to complete the present invention.For example,
In figure 3, it is true can be divided into acquisition module 201, screening module 202 and problem number for user identity identification system 200
Cover half block 203.The so-called function module of the present invention is the series of computation machine program instruction section for referring to complete specific function, than
Implementation procedure of the program more suitable for description user identity identification system 200 in electronic device 2.Each function module is put up with below
The function of 201-203 is described in detail.
Acquisition module 201, for obtaining business datum from business management system, business datum includes user for identification
The first identifier number of identity.
In the present embodiment, for the convenience of description, being illustrated by taking the insurance business of insurance company as an example, then business datum
Including declaration form data.In various embodiments, business datum is different according to the difference of company's selling operation, but can manage
Xie Di, business datum all record the essential information for having user, essential information include user contact method (for example, phone number,
Mailbox, QQ) etc. can be used to identify the first identifier number of user identity.
In general, user will fill in detailed personal information, staff can be in service management when buying insurance
The personal information and user that typing user fills in system buy the specifying information of insurance to generate business datum (in the present embodiment
For declaration form data).Wherein, must include that user corresponding with the name of user commonly contacts in the personal information that user fills in
Mode (for example, phone number), business management system (in the present embodiment for insure system) reserved generally according to user with
The corresponding contact method of name at family identifies the identity for the user that insures.For example, when the user that insures is directly defeated in the system of insuring
When entering reserved phone number, the system of insuring can call the corresponding declaration form data of the phone number and be shown to user.
In some cases, it is also necessary to fill in the information of the important recognizable user identity such as ID card No. of user.
For example, at present when user buys vehicle insurance, need to leave the phone number of the user of purchase vehicle insurance, user buy serious illness insurance or
When accident insurance etc. is related to the insurance of user itself vital interests, while needing user to leave phone number, it is also necessary to user
Leave ID card No. etc..
Screening module 202 is screened in the first identifier number for being contained from business data packet according to preset analysis rule
Go out suspicious number.
Wherein, preset analysis rule includes:
The number of each first identifier number in difference service data statistics;
The number for each first identifier number that statistics obtains is compared with pre-set threshold value respectively;
For example, in the present embodiment, pre-set threshold value 5.
If there is the number of first identifier number to be equal to or more than pre-set threshold value, it is determined that the first identifier number is suspicious number
Code.
Problem number determining module 203, for determining that suspicious number is problem number.
If in general, have the worker for identification stored in Staffing System second identifier number and one or more
It is a can be identical with number, it is determined that the suspicious number be problem number, and the corresponding user of problem number be suspicious user.
It is to be appreciated that the essential information of employee is stored in the Staffing System of enterprises, the essential information packet
Include name, the common contact method of employee (for example, phone number, wechat, QQ, E-mail address etc.) of employee, the name of employee
It is usually corresponded with contact method, Staffing System can usually identify the body of employee by the contact method of employee
Part, for example, when whether need to inquire the corresponding user of some telephone number is the employee of our unit, usually in staff's benefits
The telephone number is inputted in system, if telephone number correspondence is stored in Staffing System, Staffing System corresponds to
Show the corresponding employee information of the telephone number.
On certain important posies, essential information further includes important recognizable employee's body such as ID card No. of employee
The number of part.Therefore, the identification number for the identification worker that will be stored in suspicious number and Staffing System can be passed through
(telephone number of employee or the ID card No. of employee) is compared, to determine whether suspicious number is problem number.
In another embodiment of the invention, identification system 200 further includes detecting module and corrigendum module (detecting mould
Block and corrigendum module are not shown in figure 3).
Wherein, detecting module, for carrying out problem number detecting to the business datum of each marketing system typing in real time, if
It includes one or more problem numbers to have the business datum of marketing system typing, then sends out information warning (for example, information warning is
N), the marketing system is prompted to stop the business handling for the corresponding user of the one or more problem number (for example, safety plug
Sale system stops list of offering out).
Module is corrected, for sending the problem of to be corrected number to predetermined terminal, and from predetermined terminal
It receives for one or more after the corrigendum the problem of after the more positive order of number, asks the more positive order is corresponding to be corrected
Question number code labeling is right number, and sends the business handling continuing with the right number corresponding user to marketing system
Instruction.
In general, in practical applications, after each marketing system receives information warning, if user has a question, needing
It wants marketing system to send out the corrigendum request of the problem of one or more to be corrected number according to the query that user proposes, corrects module
The problem of to be corrected during the corrigendum is asked, number was sent to predetermined terminal, and predetermined terminal passes through manual examination and verification
The problem of this is to be corrected number.
If it is the second mark for the recognizable worker that employee reserves that manual examination and verification, which find the problem of this is to be corrected number not,
Know number, then sends more positive order to correcting module.
After the more positive order of number, which is referred to the problem of receiving for one or more after corrigendum for corrigendum module
It is right number to enable the problem of corresponding to be corrected number mark, and continues to correspond to the right number to marketing system transmission
User business handling instruction.
In addition, the present invention also proposes a kind of method for identifying ID.
As shown in fig.4, being the implementation process diagram of one embodiment of method for identifying ID of the present invention.In this implementation
In example, the execution sequence of the step in flow chart shown in Fig. 4 can change according to different requirements, and certain steps can save
Slightly.
Step S301, obtains business datum from business management system, and business datum includes user identity for identification
First identifier number.
In the present embodiment, for convenience, by taking the household electrical appliances business in market as an example.In general, user is in purchase household electrical appliances
When, basic personal information will be filled in, staff can typing user fills in business management system personal information
And user buys the information of household electrical appliances to generate business datum.Wherein, must include in the personal information that user fills in and user
The common contact method of the corresponding user of name (for example, phone number, wechat, qq, E-mail address etc.), operation system is usual
The contact method corresponding with address name reserved according to user identifies the identity of user.For example, when there is user to need repairing
Or when goods return and replacement, reserved phone number can be directly inputted in operation system, operation system can call the phone number to correspond to
Business datum (for example, order information) and be shown to related personnel.
Step S302 filters out suspicious number in the first identifier number contained from business data packet according to preset analysis rule
Code.
Wherein, preset analysis rule includes:
The number of each first identifier number in difference service data statistics;
The number of each first identifier number that statistics is obtained respectively and pre-set threshold value (for example, pre-set threshold value is 5) into
Row compares;
If the number of first identifier number is equal to or more than pre-set threshold value, it is determined that first identifier number is suspicious number.
Step S303, if having the worker for identification stored in Staffing System second identifier number and one
Suspicious number is identical, it is determined that suspicious number is problem number, can be using the corresponding user of number as suspicious user.
It is to be appreciated that usually prestoring the essential information of employee in the Staffing System of enterprises, this believes substantially
Breath includes name, the common contact method of employee (for example, phone number, wechat, QQ, E-mail address etc.) of employee, employee's
Name is usually corresponded with contact method, and Staffing System usually identifies the body of employee by the contact method of employee
Part, for example, when whether need to inquire some telephone number is the employee of our unit, usually inputted in Staffing System
The telephone number, if telephone number correspondence is pre-stored in Staffing System, Staffing System, which corresponds to, shows the phone
The corresponding employee information of number.
On certain important posies, essential information further includes important recognizable employee's body such as ID card No. of employee
The number of part.Therefore, the identification number for the identification worker that will be stored in suspicious number and Staffing System can be passed through
(telephone number of employee or the ID card No. of employee) is compared, to determine whether suspicious number is problem number.
As shown in fig.5, being the implementation process diagram of another embodiment of method for identifying ID of the present invention.In this reality
It applies in example, the execution sequence of the step in flow chart shown in fig. 5 can change according to different requirements, and certain steps can be with
It omits.
Step S401, obtains business datum from business management system, and business datum includes user identity for identification
First identifier number.
Step S402 filters out suspicious number in the first identifier number contained from business data packet according to preset analysis rule
Code.
Step S403, if having the worker for identification stored in Staffing System identification number and one it is suspicious
Number is identical, it is determined that the suspicious number is problem number, and the corresponding user of problem number is suspicious user.
Step S404 carries out problem number detecting to the business datum of each marketing system typing in real time, if there is sale system
The business datum of system typing includes one or more problem numbers, then sends out information warning, and marketing system stopping is prompted to be directed to
The business handling (for example, list of offering out) of the corresponding user of the one or more problem number.
The embodiment is to increase step S404 on the basis of embodiment shown in Fig. 4, judges to ask in above-described embodiment
On the basis of question number code, management and control further is carried out to single process of opening after each marketing system, it is ensured that follow-up each sale system
System has prevented interior employee's fake user of exploiting one's office from carrying out out list when carry out business opens list, obtains improper benefit.
In general, in practical applications, after each marketing system receives information warning, if user has a question, needing
It wants marketing system to send out problem number according to the query that user proposes and corrects request., identification system 200 receiving sale
System send the one or more for information warning after corrigendum the problem of number corrigendum request after, will the corrigendum request in
The problem of number was sent to predetermined terminal, this is to be corrected to manual examination and verification the problem of to be corrected number.
If being found after manual examination and verification, the problem of this is to be corrected number is the number that normal users use, predetermined
The problem of terminal is to be corrected for one or more number sends more positive order to user identity identification system 200, user identity
After the more positive order of the problem of identifying system 200 is received for one or more from predetermined terminal after corrigendum number,
The problem of more positive order is corresponding to be corrected number mark be right number, and to the marketing system send continuing with this
The instruction of the business handling of the corresponding user of right number.
By above-described embodiment it is found that method for identifying ID, electronic device and the computer-readable storage of the present invention
Medium analyzes the user identity for identification that business datum includes by obtaining business datum according to preset analysis rule
First identifier number in whether have suspicious number;If there is suspicious number, suspicious number is stored with Staffing System
The second identifier number of worker for identification be compared;Judge whether suspicious number is issue number according to comparison result
Code, if suspicious number is problem number, the corresponding user of problem number is suspicious user.Not only realizing prevents employee from utilizing
Work just pretends to be user identity progress business to open list, obtains improper benefit, and can improve the management and control to sales force.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art
Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium
In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal equipment (can be mobile phone, computer, clothes
Be engaged in device, air conditioner or the network equipment etc.) execute method described in each embodiment of the present invention.
It these are only the preferred embodiment of the present invention, be not intended to limit the scope of the invention, it is every to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of method for identifying ID, which is characterized in that described method includes following steps:
A, business datum is obtained from business management system, the business datum includes the first identifier of user identity for identification
Number;
B, suspicious number is filtered out from the first identifier number that the business datum includes according to preset analysis rule;
If C, have the worker for identification stored in Staffing System second identifier number and one described suspicious number
Code is identical, it is determined that the suspicious number is problem number, and the corresponding user of described problem number is suspicious user.
2. method for identifying ID as described in claim 1, which is characterized in that the preset analysis rule includes:
The number of each first identifier number in the business datum is counted respectively;
The number for each first identifier number that statistics obtains is compared with pre-set threshold value respectively;
If there is the number of first identifier number to be equal to or more than the pre-set threshold value, it is determined that the first identifier number is suspicious number
Code.
3. method for identifying ID as described in claim 1, which is characterized in that the method further includes:
Problem number detecting is carried out to the business datum of each marketing system typing in real time, if there is the business number of marketing system typing
According to comprising one or more problem numbers, then information warning is sent out, marketing system stopping is prompted to be asked for the one or more
The business handling of the corresponding user of question number code.
4. method for identifying ID as claimed in claim 3, which is characterized in that the method further includes:
If the marketing system sends the corrigendum request of number the problem of to be corrected with one or more for the information warning,
Then will be to be corrected in corrigendum request the problem of, number was sent to predetermined terminal, and to manual examination and verification, this to be corrected is asked
Question number code;
If after the more positive order of the problem of being received from predetermined terminal for one or more after corrigendum number, more by this
The problem of positive order is corresponding to be corrected number mark is right number, and is sent to the marketing system continuing with this normal number
The instruction of the business handling of the corresponding user of code.
5. the method for identifying ID as described in claim 1-4 is any, which is characterized in that the first identifier number includes
The contact method of user;The second identifier number includes the contact method of employee.
6. a kind of electronic device, which is characterized in that the electronic device includes memory, processor and is stored in the memory
User identity identification system that is upper and can running on the processor, the user identity identification system are held by the processor
Following steps are realized when row:
A, business datum is obtained from business management system, the business datum includes the first identifier of user identity for identification
Number;
B, suspicious number is filtered out from the first identifier number that the business datum includes according to preset analysis rule;
If C, have the worker for identification stored in Staffing System second identifier number and one described suspicious number
Code is identical, it is determined that the suspicious number is problem number, and the corresponding user of described problem number is suspicious user.
7. electronic device as claimed in claim 6, which is characterized in that the preset analysis rule includes:
The number of each first identifier number in the business datum is counted respectively;
The number for each first identifier number that statistics obtains is compared with pre-set threshold value respectively;
If there is the number of first identifier number to be equal to or more than the pre-set threshold value, it is determined that the first identifier number is suspicious number
Code.
8. electronic device as claimed in claim 6, which is characterized in that the user identity identification system is held by the processor
Following steps are also realized when row:
Problem number detecting is carried out to the business datum of each marketing system typing in real time, if there is the business number of marketing system typing
According to comprising one or more problem numbers, then information warning is sent out, marketing system stopping is prompted to be asked for the one or more
The business handling of the corresponding user of question number code.
9. electronic device as claimed in claim 8, which is characterized in that the user identity identification system is held by the processor
Following steps are also realized when row:
If the marketing system sends the corrigendum request of number the problem of to be corrected with one or more for the information warning,
Then will be to be corrected in corrigendum request the problem of, number was sent to predetermined terminal, and to manual examination and verification, this to be corrected is asked
Question number code;
If after the more positive order of the problem of being received from predetermined terminal for one or more after corrigendum number, more by this
The problem of positive order is corresponding to be corrected number mark is right number, and is sent to the marketing system continuing with this normal number
The business handling instruction of the corresponding user of code.
10. a kind of computer readable storage medium, the computer-readable recording medium storage has user's identification system, institute
Stating user identity identification system can be executed by least one processor, so that at least one processor executes such as claim
The step of any one of 1-5 method for identifying ID.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710614414.7A CN108416485B (en) | 2017-07-25 | 2017-07-25 | User identity recognition method, electronic device and computer readable storage medium |
PCT/CN2018/077649 WO2019019636A1 (en) | 2017-07-25 | 2018-02-28 | User identification method, electronic device, and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710614414.7A CN108416485B (en) | 2017-07-25 | 2017-07-25 | User identity recognition method, electronic device and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108416485A true CN108416485A (en) | 2018-08-17 |
CN108416485B CN108416485B (en) | 2021-10-08 |
Family
ID=63125454
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710614414.7A Active CN108416485B (en) | 2017-07-25 | 2017-07-25 | User identity recognition method, electronic device and computer readable storage medium |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN108416485B (en) |
WO (1) | WO2019019636A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109410048A (en) * | 2018-09-07 | 2019-03-01 | 平安科技(深圳)有限公司 | Electronic device, customer information method for managing security and storage medium |
CN111222566A (en) * | 2020-01-02 | 2020-06-02 | 平安科技(深圳)有限公司 | User attribute identification method, device and storage medium |
CN111800370A (en) * | 2019-04-09 | 2020-10-20 | 阿里巴巴集团控股有限公司 | User information sending and receiving method, device and terminal equipment |
CN112907395A (en) * | 2019-11-19 | 2021-06-04 | 深圳市明源云客电子商务有限公司 | Client type identification method, device and equipment |
CN113286041A (en) * | 2021-04-09 | 2021-08-20 | 厦门市美亚柏科信息股份有限公司 | Method and system for identifying abnormal use of oversea mobile phone number |
US20220006190A1 (en) * | 2019-05-07 | 2022-01-06 | Bao Tran | Cellular system |
US11658407B2 (en) * | 2019-05-07 | 2023-05-23 | Bao Tran | Cellular system |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111274561A (en) * | 2020-02-28 | 2020-06-12 | 广州高专资讯科技有限公司 | Identity management method, device, equipment and storage medium |
CN114071454B (en) * | 2020-07-31 | 2023-09-05 | 中移(苏州)软件技术有限公司 | Identification method, device, equipment and storage medium for mobile user identification code |
CN112163050B (en) * | 2020-10-16 | 2023-11-07 | 泰康保险集团股份有限公司 | Label processing method and device, electronic equipment and storage medium |
CN112668800A (en) * | 2021-01-04 | 2021-04-16 | 荣联科技集团股份有限公司 | Information processing method, apparatus, medium, and device |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090125320A1 (en) * | 2007-11-12 | 2009-05-14 | Bickett Erick J | Method and system for displaying business information |
US20120123941A1 (en) * | 2010-11-17 | 2012-05-17 | American Express Travel Related Services Company, Inc. | Internet facilitation of fraud services |
CN104424433A (en) * | 2013-08-22 | 2015-03-18 | 腾讯科技(深圳)有限公司 | Anti-cheating method and anti-cheating system of application program |
CN104869155A (en) * | 2015-04-27 | 2015-08-26 | 腾讯科技(深圳)有限公司 | Data auditing method and device |
GB2535433A (en) * | 2014-12-12 | 2016-08-24 | Aeriandi Ltd | Method and apparatus for call correlation |
CN106776973A (en) * | 2016-12-05 | 2017-05-31 | 深圳前海微众银行股份有限公司 | Blacklist data generation method and device |
CN106851613A (en) * | 2016-12-09 | 2017-06-13 | 深圳市金立通信设备有限公司 | Service request method, the verification method of business handling number and its terminal |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105657659A (en) * | 2016-01-29 | 2016-06-08 | 北京邮电大学 | Method and system for identifying scalping user in taxi service |
-
2017
- 2017-07-25 CN CN201710614414.7A patent/CN108416485B/en active Active
-
2018
- 2018-02-28 WO PCT/CN2018/077649 patent/WO2019019636A1/en active Application Filing
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090125320A1 (en) * | 2007-11-12 | 2009-05-14 | Bickett Erick J | Method and system for displaying business information |
US20120123941A1 (en) * | 2010-11-17 | 2012-05-17 | American Express Travel Related Services Company, Inc. | Internet facilitation of fraud services |
CN104424433A (en) * | 2013-08-22 | 2015-03-18 | 腾讯科技(深圳)有限公司 | Anti-cheating method and anti-cheating system of application program |
GB2535433A (en) * | 2014-12-12 | 2016-08-24 | Aeriandi Ltd | Method and apparatus for call correlation |
CN104869155A (en) * | 2015-04-27 | 2015-08-26 | 腾讯科技(深圳)有限公司 | Data auditing method and device |
CN106776973A (en) * | 2016-12-05 | 2017-05-31 | 深圳前海微众银行股份有限公司 | Blacklist data generation method and device |
CN106851613A (en) * | 2016-12-09 | 2017-06-13 | 深圳市金立通信设备有限公司 | Service request method, the verification method of business handling number and its terminal |
Non-Patent Citations (1)
Title |
---|
魏浩: ""基于Web数据流分析的用户访问行为核查技术研究"", 《中国优秀硕士学位论文全文数据库(信息科技辑)》 * |
Cited By (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109410048A (en) * | 2018-09-07 | 2019-03-01 | 平安科技(深圳)有限公司 | Electronic device, customer information method for managing security and storage medium |
CN109410048B (en) * | 2018-09-07 | 2023-04-25 | 平安科技(深圳)有限公司 | Electronic device, client information security management method, and storage medium |
CN111800370B (en) * | 2019-04-09 | 2022-11-15 | 阿里巴巴集团控股有限公司 | User information sending and receiving method, device and terminal equipment |
CN111800370A (en) * | 2019-04-09 | 2020-10-20 | 阿里巴巴集团控股有限公司 | User information sending and receiving method, device and terminal equipment |
US11658414B2 (en) * | 2019-05-07 | 2023-05-23 | Bao Tran | Cellular system |
US20220006190A1 (en) * | 2019-05-07 | 2022-01-06 | Bao Tran | Cellular system |
US20220094058A1 (en) * | 2019-05-07 | 2022-03-24 | Bao Tran | Cellular system |
US11646491B2 (en) * | 2019-05-07 | 2023-05-09 | Bao Tran | Cellular system |
US11658407B2 (en) * | 2019-05-07 | 2023-05-23 | Bao Tran | Cellular system |
US20230232251A1 (en) * | 2019-05-07 | 2023-07-20 | Bao Tran | Cellular system |
US20230268651A1 (en) * | 2019-05-07 | 2023-08-24 | Bao Tran | Cellular system |
US11929559B2 (en) * | 2019-05-07 | 2024-03-12 | Bao Tran | Cellular system |
CN112907395A (en) * | 2019-11-19 | 2021-06-04 | 深圳市明源云客电子商务有限公司 | Client type identification method, device and equipment |
CN111222566B (en) * | 2020-01-02 | 2020-09-01 | 平安科技(深圳)有限公司 | User attribute identification method, device and storage medium |
CN111222566A (en) * | 2020-01-02 | 2020-06-02 | 平安科技(深圳)有限公司 | User attribute identification method, device and storage medium |
CN113286041A (en) * | 2021-04-09 | 2021-08-20 | 厦门市美亚柏科信息股份有限公司 | Method and system for identifying abnormal use of oversea mobile phone number |
CN113286041B (en) * | 2021-04-09 | 2023-10-03 | 厦门市美亚柏科信息股份有限公司 | Method and system for identifying abnormal use of foreign mobile phone number |
Also Published As
Publication number | Publication date |
---|---|
WO2019019636A1 (en) | 2019-01-31 |
CN108416485B (en) | 2021-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108416485A (en) | Method for identifying ID, electronic device and computer readable storage medium | |
CN107464117A (en) | Data managing method and block catenary system based on block chain | |
CN108427705A (en) | Electronic device, distributed system journal querying method and storage medium | |
CN108154047A (en) | A kind of data desensitization method and device | |
CN108632367A (en) | Account correlating method and information-pushing method | |
CN107995377A (en) | Customer service management method, electronic device and computer-readable recording medium | |
CN104320375B (en) | A kind of method and apparatus for preventing from illegally registering | |
CN108494771A (en) | Electronic device, fire wall open verification method and storage medium | |
CN111268524A (en) | System and method for preventing use of pirated products in elevator control devices | |
CN107911334A (en) | Ip address risk monitoring method and application server | |
CN108415925A (en) | Electronic device, data call daily record generation and querying method and storage medium | |
CN111371772A (en) | Intelligent gateway current limiting method and system based on redis and computer equipment | |
CN107908480A (en) | Wages computational methods, application server and computer-readable recording medium | |
CN110069925A (en) | Software monitors method, system and computer readable storage medium | |
CN108763051A (en) | Electronic device, transaction software operation risk method for early warning and storage medium | |
CN109040146B (en) | Account login authorization method, server, computer equipment and storage medium | |
CN110769064A (en) | System, method and equipment for offline message pushing | |
CN107526580A (en) | Terminal applies recognition methods and device | |
CN107967305A (en) | Image file upload method, server and readable storage medium storing program for executing | |
CN107154975A (en) | One kind application method for down loading and device | |
CN107733785A (en) | A kind of multiple terminals chat message synchronization removal method and device | |
CN107911400A (en) | Data sharing method, electronic device and computer-readable recording medium | |
JP7208080B2 (en) | Automatic activation and onboarding of connected equipment | |
CN110069445A (en) | Face image processing process, server and computer readable storage medium | |
CN109905407A (en) | Management method, system, equipment and medium based on vpn server access Intranet |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |