CN108966226A - The method for processing business and device of identity-based information - Google Patents
The method for processing business and device of identity-based information Download PDFInfo
- Publication number
- CN108966226A CN108966226A CN201810622557.7A CN201810622557A CN108966226A CN 108966226 A CN108966226 A CN 108966226A CN 201810622557 A CN201810622557 A CN 201810622557A CN 108966226 A CN108966226 A CN 108966226A
- Authority
- CN
- China
- Prior art keywords
- identity information
- target user
- subscriber identity
- abnormal
- mobile number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W60/00—Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
- H04W60/06—De-registration or detaching
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Telephonic Communication Services (AREA)
Abstract
The application provides the method for processing business and device of a kind of identity-based information, this method comprises: obtaining the abnormal number of pre-collecting;According to abnormal number, determines and whether there is target user's identity information corresponding with abnormal number in subscriber identity information total data;If it is determined that target user's identity information corresponding with abnormal number is not present in subscriber identity information total data, then shutdown processing is carried out to abnormal number.By being based on nationwide subscriber identity information total data; the abnormal number of pre-collecting is cleared up; shutdown processing is carried out to non-system of real name exception number; the generation of the events such as telecommunication fraud, malice blacklist, harassing and wrecking can be effectively reduced, solve the non-real name mobile number of the prior art and implement the defects of telecommunication fraud, harassing and wrecking, arrearage etc. can not demand.
Description
Technical field
This application involves technical field of information management more particularly to a kind of method for processing business and dress of identity-based information
It sets.
Background technique
With the rapid development of Internet technology, mobile phone at essential communication and converter tools in for people's lives,
It makes a phone call, surf the Internet, listening to music etc. to become the amusement and recreation mode of people by mobile phone.
But as cell-phone function is more and more, phone number leak case is also increasingly severe.Various telecommunications are caused to be cheated
Deceiving, harass, promoting etc. keeps user vexatious endlessly, greatly reduces user experience.And much it is marked as the number of swindle, harassing and wrecking
It is frequently not system of real name, causes to have no way of demanding.
Therefore, the technical issues of how effective managing mobile numbers and user information become operator's urgent need to resolve.
Summary of the invention
The application provides the method for processing business and device of a kind of identity-based information, is moved with solving the non-real name of the prior art
Dynamic number implements the defects of telecommunication fraud, harassing and wrecking, arrearage etc. can not demand.
The application first aspect provides a kind of method for processing business of identity-based information, comprising:
Obtain the abnormal number of pre-collecting;
According to the abnormal number, determine in subscriber identity information total data with the presence or absence of corresponding with the abnormal number
Target user's identity information, the subscriber identity information total data includes that mobile number is registered in preset geographical position range
Subscriber identity information;
If it is determined that there is no target user's identity corresponding with the exception number to believe in subscriber identity information total data
Breath then carries out shutdown processing to the abnormal number.
Further aspect of the application provides a kind of business processing device of identity-based information, comprising:
First obtains module, for obtaining the abnormal number of pre-collecting;
Determining module, for according to the abnormal number, determining to whether there is and institute in subscriber identity information total data
The corresponding target user's identity information of abnormal number is stated, the subscriber identity information total data includes in preset geographical position range
Register the subscriber identity information of mobile number;
Processing module is used for if it is determined that there is no mesh corresponding with the exception number in subscriber identity information total data
Subscriber identity information is marked, then shutdown processing is carried out to the abnormal number.
The method for processing business and device of identity-based information provided in this embodiment are determined according to the abnormal number
With the presence or absence of target user's identity information corresponding with the exception number in subscriber identity information total data;If it is determined that with
There is no target user's identity informations corresponding with the exception number in the identity information total data of family, then to the abnormal number
Carry out shutdown processing.By clearing up the abnormal number of pre-collecting based on nationwide subscriber identity information total data,
Shutdown processing is carried out to non-system of real name exception number, the hair of the events such as telecommunication fraud, malice blacklist, harassing and wrecking can be effectively reduced
It is raw, it solves the non-real name mobile number of the prior art and implements the defects of telecommunication fraud, harassing and wrecking, arrearage etc. can not demand.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this Shen
Some embodiments please for those of ordinary skill in the art without any creative labor, can be with
It obtains other drawings based on these drawings.
Fig. 1 is the flow diagram of the method for processing business for the identity-based information that one embodiment of the application provides;
Fig. 2 is the flow diagram of the method for processing business for the identity-based information that another embodiment of the application provides;
Fig. 3 is the structural schematic diagram of the business processing device for the identity-based information that one embodiment of the application provides;
Fig. 4 is the structural schematic diagram of the business processing device for the identity-based information that another embodiment of the application provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application
In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is
Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art
Every other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
Firstly, being explained to noun involved in the application:
Mobile number: refer to all types of telephone numbers that mobile terminal can be supported, telephone number, movement such as connection
Telephone number, the telephone number of telecommunications etc..
Abnormal number: referring to the number for being marked as harassing and wrecking, swindle, distribution, advertisement etc., or because of arrearage or other are improper
Factor is added into all abnormal numbers that can be collected into such as number of blacklist.
Subscriber identity information: refer to user provided identity information and mobile number when handling mobile number.Specifically
It may include ID card No., name, corresponding one or more mobile numbers, whether have blacklist and blacklist corresponding number
Whether code has arrearage and the arrearage amount of money etc., and particular content can be obtained information and actual area according to operator
It is configured.
Embodiment one
The present embodiment provides a kind of method for processing business of identity-based information, for based on nationwide interior registration movement
The subscriber identity information total data of number carries out corresponding cleaning treatment to abnormal number, avoids the presence without card number, effectively
Reduce telecommunication fraud.The executing subject of the present embodiment is the business processing device (hereinafter referred to as device) of identity-based information, should
Device can be set in the Subscriber Management System of operator, also can be set in the terminal, for example, server, desktop computer,
Laptop etc..
As shown in Figure 1, the flow diagram of the method for processing business for identity-based information provided in this embodiment, the party
Method includes:
Step 101, the abnormal number of pre-collecting is obtained.
Specifically, the abnormal numbers such as all known fraudulent call numbers, malice blacklist number can be collected, with movement
Number is unique index, establishes black list database.The device can then obtain abnormal number from black list database, be used for
Subsequent processing.
Step 102, it according to abnormal number, determines in subscriber identity information total data with the presence or absence of corresponding with abnormal number
Target user's identity information.
Wherein, subscriber identity information total data includes the user identity letter of registration mobile number in preset geographical position range
Breath.
Specifically, can be using ID card No. as unique index, registration mobile number in preset geographical position range
Subscriber identity information focuses in a database, obtains subscriber identity information total data.Wherein, preset geographical position range can
Think the whole country, i.e., the subscriber identity information in all systems in the whole nation is focused in a database, be managed collectively.
The exception number is inquired in subscriber identity information total data, with determine in subscriber identity information total data whether
In the presence of target user's identity information corresponding with abnormal number.
Step 103, however, it is determined that target user's body corresponding with abnormal number is not present in subscriber identity information total data
Part information, then carry out shutdown processing to abnormal number.
Specifically, if it is determined that target user's identity corresponding with abnormal number is not present in subscriber identity information total data
Information, it is determined that the exception number is the number of non-system of real name, then can carry out shutdown processing to abnormal number.To clear up non-reality
The abnormal number of name.An abnormal number has been cleared up, can obtain again next, has been cleared up according to above-mentioned steps.
It should be noted that the present embodiment is not limited to single treatment one abnormal number, it is also possible to handle simultaneously more
A exception number.The number of the abnormal number obtained is either one or more.It is multiple to refer to two or two
More than.
The method for processing business of identity-based information provided in this embodiment, by being believed based on nationwide user identity
Total data is ceased, the abnormal number of pre-collecting is cleared up, shutdown processing is carried out to non-system of real name exception number, can effectively be dropped
The generation of the events such as low telecommunication fraud, malice blacklist, harassing and wrecking solves the non-real name mobile number of the prior art and implements telecommunications swindleness
It deceives, harass, the defects of arrearage etc. can not demand.
Embodiment two
The present embodiment does further supplementary explanation to the method for processing business for the identity-based information that embodiment one provides.
As shown in Fig. 2, the flow diagram of the method for processing business for identity-based information provided in this embodiment.Upper
On the basis of stating embodiment one, optionally, this method further include:
Step 201, however, it is determined that there is target user's identity corresponding with abnormal number in subscriber identity information total data
Information then obtains the corresponding mobile number of target user's identity information.
Specifically, believing if it is determined that there is target user's identity corresponding with abnormal number in subscriber identity information total data
Breath, then it represents that the exception number is real name number, but is not excluded for usurping the possibility of identity information, therefore, available target
The corresponding mobile number of subscriber identity information, including the exception number, it is also possible to other mobile numbers are also had, such as
Certain subscriber identity information is for the multiple mobile numbers of Accreditation processing.
Step 202, if the number of the corresponding mobile number of target user's identity information is greater than 1, by target user's identity
Information flag is abnormal user.
Specifically, if the number of the corresponding mobile number of target user's identity information is greater than 1, i.e., in addition to the exception number also
There are another or multiple mobile numbers, then target user's identity information has stolen possibility, therefore, can be by target user
Identity information is labeled as abnormal user, so as to subsequent processing.
Optionally, after step 202, this method can also include:
Step 203, prompt information is sent to the corresponding each mobile number of target user's identity information.
Specifically, after target user's identity information is labeled as abnormal user, it can be to target user's identity information pair
Each mobile number answered sends prompt information, to be shown to the currently used person of each mobile number.
Optionally, prompt information is used to prompt the use user of mobile number to update subscriber identity information, alternatively, for mentioning
Show that the corresponding target user of target user's identity information confirms that mobile number is for target user's use.
Specifically, prompt information can be used for prompting the use user of mobile number to update subscriber identity information.For example, certain
Mobile number is currently used by A, but its subscriber identity information is B, then after A sees prompt information, can go to business hall will
The corresponding subscriber identity information of the mobile number is updated to the identity information of A.Alternatively, prompt information can be used for that target is prompted to use
Identity information corresponding target user in family confirms that mobile number is used for target user, for example, user C has handled 3 movements
Number can send prompt information to 3 mobile numbers, if 3 mobile numbers are currently that C is used, C can go to seek
The industry Room confirms that 3 mobile numbers are used in oneself really.To confirm that the identity information of user C is not stolen.Improve use
The identity information safety at family.The particular content of prompt information can be configured according to actual needs, for example may include " you
Identification card number correspondence handled 3 mobile numbers, would you please be confirmed whether be that you handle yourself ", " mobile number is abnormal,
Would you please to neighbouring business hall update subscriber identity information " etc. similar informations, if corresponding 3 movements number of the identity information of user C
In code, having one is not used in user C, and user C, which is known that, oneself only has 2 mobile numbers, then business hall can be gone to true
Oneself used two mobile number is recognized, so that business hall can know another mobile number to usurp identity information institute
The number handled can then carry out it shutting down processing or other measures accordingly.It is usurped to effectively control identity information
The transmission of situation is conducive to government and carries out supervision demand.
Prompt information can be also used for prompt subscriber payment, for example, abnormal number is the movement to pipe off by arrearage
The number mobile number is what A was saved, is searched in subscriber identity information total data it is found that the exception number has corresponding target
Subscriber identity information, corresponding 3 mobile numbers of target user's identity information, one is the exception number, other two is B
The mobile number of province.The information that prompting payment can be then sent to other two mobile number, and if can prompt when default
Between do not pay the fees to abnormal number in the time limit, then other two number such as will be deactivated at the information, if the user is in preset time
It does not pay the fees to abnormal number in time limit, does not also do any other explanation, then two right numbers of the user can be done accordingly
Processing, such as it is out of service etc., after subscriber payment, then restore its access right.To effectively increase underpayment management
Efficiency.
Optionally, after step 203, this method can also include:
Step 204, each mobile number corresponding for target user's identity information, if within the preset time time limit,
The subscriber identity information of mobile number does not update, alternatively, target user does not confirm that mobile number is used for target user,
Mobile number is then subjected to shutdown processing.
Specifically, if some mobile number, after being sent to it prompt information, within the preset time time limit, without user
It is carried out to confirm or without updating subscriber identity information, then shutdown processing can be carried out to it.For example user's C identity is believed
Corresponding 3 mobile numbers are ceased, have sent that " mobile number is abnormal, woulds you please in XX day to neighbouring business hall update user
Identity information ", wherein user C to business hall confirmed two mobile numbers.Another mobile number, in the preset time phase
User useless confirms or updates to business hall in limiting, then the provable mobile number is stolen information and handles, and does business
The Room then can carry out shutdown processing to the mobile number.
It is to be appreciated that prompt information content may include the corresponding mobile number number of current identity information, such as on
" your identification card number correspondence has handled 3 mobile numbers, woulds you please be confirmed whether be that you handle yourself " stated, at this point, the use
Family oneself can confirm in 3 mobile numbers which is that oneself is really used, in addition then can directly carry out shutdown processing.Tool
Body can be configured according to actual needs, it is therefore intended that ensure each mobile number, the corresponding user identity of the mobile number
Information and the real user of the mobile number are consistent, and the situation for avoiding identity information stolen occurs.It does not limit herein
It is fixed.
First it can confirm or update the process of subscriber identity information, can also be carried out by other approach, the present embodiment
What is provided confirms only exemplary illustration to business hall, not to the restriction of the application.For example, network managing system can also be passed through
System, passes through login authentication by user.Specifically such as: user can be by cell-phone number in the registration login of client of operator end, binding
Identity information uploads me and uses the photo of current mobile number etc. mode with identity card group photo photo, in person.As long as can reach
It is consistent to the confirmation testimony of a witness number.Unlimited validation testing.Its corresponding user identity is believed according to abnormal number to realize
Cease counter cleaned.
Optionally, it in order to achieve the purpose that all to clean, can not also be proceeded as described above according to abnormal number, and it is direct
For registering the subscriber identity information total data of mobile number in the whole country, uniformly cleaned, it is no matter right under identification card number
Several mobile numbers are answered, prompt user confirms, can more effectively ensure that the testimony of a witness number of all mobile numbers is consistent.Effectively
Ground strike usurps identity information and handles the criminal offences such as mobile number implementation swindle.
The method for processing business of identity-based information provided in this embodiment, by being believed based on nationwide user identity
Total data is ceased, the abnormal number of pre-collecting is cleared up, shutdown processing is carried out to non-system of real name exception number, can effectively be dropped
The generation of the events such as low telecommunication fraud, malice blacklist, harassing and wrecking solves the non-real name mobile number of the prior art and implements telecommunications swindleness
It deceives, harass, the defects of arrearage etc. can not demand.And pass through if it is determined that existing in subscriber identity information total data and anomalous sign
The corresponding target user's identity information of code, then obtain the corresponding mobile number of target user's identity information;If target user's identity
The number of the corresponding mobile number of information is greater than 1, then target user's identity information is labeled as abnormal user, to target user's body
The corresponding each mobile number transmission prompt information of part information, each mobile number corresponding for target user's identity information,
If the subscriber identity information of mobile number does not update within the preset time time limit, alternatively, target user does not confirm mobile number
Code is used for target user, then mobile number is carried out shutdown processing.It realizes according to abnormal number to subscriber identity information
Reverse cleaning is carried out, subscriber identity information update or confirmation are carried out to multiple mobile numbers under user name, to guarantee each movement
The real user of number is the user registered, avoids the generation that identity information usurps event, is further reduced telecommunications swindleness
Event is deceived, the efficiency of management of user information is improved.
Embodiment three
The present embodiment provides a kind of business processing device of identity-based information, for execute above-described embodiment one based on
The method for processing business of identity information.
As shown in figure 3, the structural schematic diagram of the business processing device for identity-based information provided in this embodiment.The base
Module 31, determining module 32 and processing module 33 are obtained including first in the business processing device 30 of identity information.
Wherein, the first acquisition module 31 is used to obtain the abnormal number of pre-collecting;Determining module 32 is used for according to anomalous sign
Code determines and whether there is target user's identity information corresponding with abnormal number, Yong Hushen in subscriber identity information total data
Part information total data includes the subscriber identity information of registration mobile number in preset geographical position range;If processing module 33 is used for
It determines and target user's identity information corresponding with abnormal number is not present in subscriber identity information total data, then to abnormal number
Carry out shutdown processing.
Device in this present embodiment is closed, wherein modules execute the concrete mode of operation in related this method
It is described in detail in embodiment, no detailed explanation will be given here.
According to the business processing device of identity-based information provided in this embodiment, by being based on nationwide user's body
Part information total data, clears up the abnormal number of pre-collecting, carries out shutdown processing, Ke Yiyou to non-system of real name exception number
Effect reduces the generation of the events such as telecommunication fraud, malice blacklist, harassing and wrecking, solves the non-real name mobile number of the prior art and implements telecommunications
The defects of swindle, harassing and wrecking, arrearage etc. can not demand.
Example IV
The present embodiment does the business processing device for the identity-based information that above-described embodiment three provides and further adds
It is bright.
As shown in figure 4, the structural schematic diagram of the business processing device for identity-based information provided in this embodiment.
On the basis of above-described embodiment three, optionally, which can also include the second acquisition module 34 and label
Module 35.
Wherein, second module 34 is obtained for if it is determined that existing in subscriber identity information total data corresponding with abnormal number
Target user's identity information, then obtain the corresponding mobile number of target user's identity information;If mark module 35 is used for target
The number of the corresponding mobile number of subscriber identity information is greater than 1, then target user's identity information is labeled as abnormal user.
Optionally, which can also include sending module 36.
Wherein, sending module 36 is used to send prompt information to the corresponding each mobile number of target user's identity information.
Optionally, prompt information is used to prompt the use user of mobile number to update subscriber identity information, alternatively, for mentioning
Show that the corresponding target user of target user's identity information confirms that mobile number is used for target user, alternatively, for prompting mesh
Mark user pays the fees.
Optionally, processing module 33 can be also used for: each mobile number corresponding for target user's identity information,
If the subscriber identity information of mobile number does not update within the preset time time limit, alternatively, target user does not confirm mobile number
Code is used for target user, then mobile number is carried out shutdown processing;Alternatively, target user does not pay the fees, then to mobile number
Code carries out processing out of service.
Device in this present embodiment is closed, wherein modules execute the concrete mode of operation in related this method
It is described in detail in embodiment, no detailed explanation will be given here.
According to the business processing device of identity-based information provided in this embodiment, by being based on nationwide user's body
Part information total data, clears up the abnormal number of pre-collecting, carries out shutdown processing, Ke Yiyou to non-system of real name exception number
Effect reduces the generation of the events such as telecommunication fraud, malice blacklist, harassing and wrecking, solves the non-real name mobile number of the prior art and implements telecommunications
The defects of swindle, harassing and wrecking, arrearage etc. can not demand.And pass through if it is determined that existing and exception in subscriber identity information total data
The corresponding target user's identity information of number, then obtain the corresponding mobile number of target user's identity information;If target user's body
The number of the corresponding mobile number of part information is greater than 1, then target user's identity information is labeled as abnormal user, to target user
The corresponding each mobile number of identity information sends prompt information, each movement number corresponding for target user's identity information
Code, if the subscriber identity information of mobile number does not update within the preset time time limit, alternatively, target user does not confirm shifting
Dynamic number is used for target user, then mobile number is carried out shutdown processing.It realizes according to abnormal number to user identity
Information carries out reverse cleaning, carries out subscriber identity information update or confirmation to multiple mobile numbers under user name, each to guarantee
The real user of mobile number is the user registered, avoids the generation that identity information usurps event, is further reduced electricity
Believe swindle event, improves the efficiency of management of user information.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it
Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only
Only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be tied
Another system is closed or is desirably integrated into, or some features can be ignored or not executed.Another point, it is shown or discussed
Mutual coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or logical of device or unit
Letter connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer
It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the present invention
The part steps of embodiment the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. it is various
It can store the medium of program code.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module
Division progress for example, in practical application, can according to need and above-mentioned function distribution is complete by different functional modules
At the internal structure of device being divided into different functional modules, to complete all or part of the functions described above.On
The specific work process for stating the device of description, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent
Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to
So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into
Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution
The range of scheme.
Claims (10)
1. a kind of method for processing business of identity-based information characterized by comprising
Obtain the abnormal number of pre-collecting;
According to the abnormal number, determine in subscriber identity information total data with the presence or absence of mesh corresponding with the exception number
Subscriber identity information is marked, the subscriber identity information total data includes the user of registration mobile number in preset geographical position range
Identity information;
If it is determined that there is no target user's identity informations corresponding with the exception number in subscriber identity information total data, then
Shutdown processing is carried out to the abnormal number.
2. the method according to claim 1, wherein if it is determined that existing and institute in subscriber identity information total data
The corresponding target user's identity information of abnormal number is stated, then obtains the corresponding mobile number of target user's identity information;
If the number of the corresponding mobile number of target user's identity information is greater than 1, by target user's identity information
Labeled as abnormal user.
3. according to the method described in claim 2, it is characterized in that, target user's identity information is used labeled as abnormal
After family, the method also includes:
Prompt information is sent to the corresponding each mobile number of target user's identity information.
4. according to the method described in claim 3, it is characterized in that, the prompt information is for prompting making for the mobile number
Subscriber identity information is updated with user, alternatively, for prompting the corresponding target user of target user's identity information to confirm institute
Stating mobile number is used for the target user, alternatively, for prompting the target user to pay the fees.
5. according to the method described in claim 4, it is characterized by further comprising:
Each mobile number corresponding for target user's identity information, if within the preset time time limit, the movement
The subscriber identity information of number does not update, alternatively, the target user does not confirm that the mobile number is for the target
User uses, then the mobile number is carried out shutdown processing;Alternatively, the target user does not pay the fees, then to the movement
Number carries out processing out of service.
6. a kind of business processing device of identity-based information characterized by comprising
First obtains module, for obtaining the abnormal number of pre-collecting;
Determining module, for according to the abnormal number, determine in subscriber identity information total data with the presence or absence of with it is described different
The corresponding target user's identity information of normal number, the subscriber identity information total data include registration in preset geographical position range
The subscriber identity information of mobile number;
Processing module is used for if it is determined that there is no targets corresponding with the exception number to use in subscriber identity information total data
Family identity information then carries out shutdown processing to the abnormal number.
7. device according to claim 6, which is characterized in that further include:
Second obtains module, is used for if it is determined that there is target corresponding with the exception number in subscriber identity information total data
Subscriber identity information then obtains the corresponding mobile number of target user's identity information;
Mark module, if the number for the corresponding mobile number of target user's identity information is greater than 1, by the target
Subscriber identity information is labeled as abnormal user.
8. device according to claim 7, which is characterized in that further include:
Sending module, for sending prompt information to the corresponding each mobile number of target user's identity information.
9. device according to claim 8, which is characterized in that the prompt information is for prompting making for the mobile number
Subscriber identity information is updated with user, alternatively, for prompting the corresponding target user of target user's identity information to confirm institute
Stating mobile number is used for the target user, alternatively, for prompting the target user to pay the fees.
10. device according to claim 8, which is characterized in that the processing module is also used to:
Each mobile number corresponding for target user's identity information, if within the preset time time limit, the movement
The subscriber identity information of number does not update, alternatively, the target user does not confirm that the mobile number is for the target
User uses, then the mobile number is carried out shutdown processing;Alternatively, the target user does not pay the fees, then to the movement
Number carries out processing out of service.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810622557.7A CN108966226A (en) | 2018-06-15 | 2018-06-15 | The method for processing business and device of identity-based information |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810622557.7A CN108966226A (en) | 2018-06-15 | 2018-06-15 | The method for processing business and device of identity-based information |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108966226A true CN108966226A (en) | 2018-12-07 |
Family
ID=64489069
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810622557.7A Pending CN108966226A (en) | 2018-06-15 | 2018-06-15 | The method for processing business and device of identity-based information |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108966226A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109769244A (en) * | 2019-01-08 | 2019-05-17 | 中国联合网络通信集团有限公司 | Recognition methods, device, equipment and the readable storage medium storing program for executing of abnormal phonecard |
CN111914240A (en) * | 2020-07-28 | 2020-11-10 | 中国联合网络通信集团有限公司 | Identity verification method and system based on block chain and notarization party node |
CN113676606A (en) * | 2021-08-23 | 2021-11-19 | 中国联合网络通信集团有限公司 | Shutdown method and apparatus |
CN113727352A (en) * | 2020-05-21 | 2021-11-30 | 美光科技公司 | Managing spoofed calls to mobile devices |
CN114258024A (en) * | 2021-12-03 | 2022-03-29 | 中国联合网络通信集团有限公司 | Halt processing method and device, electronic equipment and storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101730091A (en) * | 2008-10-28 | 2010-06-09 | 中国移动通信集团湖南有限公司 | Method and device for limiting unlawful communication service |
-
2018
- 2018-06-15 CN CN201810622557.7A patent/CN108966226A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101730091A (en) * | 2008-10-28 | 2010-06-09 | 中国移动通信集团湖南有限公司 | Method and device for limiting unlawful communication service |
Non-Patent Citations (1)
Title |
---|
LABULAKAYOYO: "电信号码没有实名制会停机?", 《CSDN博客》 * |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109769244A (en) * | 2019-01-08 | 2019-05-17 | 中国联合网络通信集团有限公司 | Recognition methods, device, equipment and the readable storage medium storing program for executing of abnormal phonecard |
CN109769244B (en) * | 2019-01-08 | 2021-10-15 | 中国联合网络通信集团有限公司 | Abnormal telephone card identification method, device, equipment and readable storage medium |
CN113727352A (en) * | 2020-05-21 | 2021-11-30 | 美光科技公司 | Managing spoofed calls to mobile devices |
CN111914240A (en) * | 2020-07-28 | 2020-11-10 | 中国联合网络通信集团有限公司 | Identity verification method and system based on block chain and notarization party node |
CN111914240B (en) * | 2020-07-28 | 2023-09-15 | 中国联合网络通信集团有限公司 | Identity verification method and system based on blockchain and notarization party node |
CN113676606A (en) * | 2021-08-23 | 2021-11-19 | 中国联合网络通信集团有限公司 | Shutdown method and apparatus |
CN113676606B (en) * | 2021-08-23 | 2022-08-16 | 中国联合网络通信集团有限公司 | Shutdown method and apparatus |
CN114258024A (en) * | 2021-12-03 | 2022-03-29 | 中国联合网络通信集团有限公司 | Halt processing method and device, electronic equipment and storage medium |
CN114258024B (en) * | 2021-12-03 | 2023-10-31 | 中国联合网络通信集团有限公司 | Shutdown processing method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108966226A (en) | The method for processing business and device of identity-based information | |
CN104954322B (en) | A kind of binding processing method of account, apparatus and system | |
CN104917749B (en) | account registration method and device | |
CN106303099B (en) | A kind of method, apparatus and system for verifying user's communicating number validity | |
CN110012028B (en) | Medical identity authentication method and system | |
CN101005503A (en) | Method and data processing system for intercepting communication between a client and a service | |
CN102523213A (en) | Server and terminal authenticating method and server and terminal | |
CN102611746B (en) | Method and system for sharing contact person information | |
CN110324815A (en) | Activating method, server, terminal and the block chain network system that No.1 is blocked more | |
CN109510758B (en) | Session establishing method, terminal and system | |
CN109246319A (en) | A kind of calling name card business implementation method, device, equipment and storage medium | |
CN108471601B (en) | Internetwork settlement method, device, equipment and storage medium | |
CN112437428B (en) | Verification method and server | |
CN109905874A (en) | The method and system of the autonomous number of selecting based on block chain | |
CN107172194B (en) | Virtual SIM card management method and device and communication terminal | |
CN109150864B (en) | Anti-cheating method and device based on secondary authentication | |
CN112866192B (en) | Method and device for identifying abnormal aggregation behaviors | |
EP2334009A1 (en) | Realizing method and device for independent vc system compatible with different charge cards | |
CN107067354A (en) | Based on the task of supervision treating method and apparatus for controlling grid altogether | |
CN107105430A (en) | A kind of number authentication method and device | |
CN104685856A (en) | System and method for processing lost password using password long-term memory of user | |
CN105871784A (en) | Information change processing method and device | |
CN107332999A (en) | A kind of Stranger Calls number identification method and device | |
CN105162600B (en) | The authentication information sending method and device of the Internet, applications | |
CN108200532A (en) | It is a kind of to verify the method and system made up SIM card user identity and be associated with SIM card |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181207 |
|
RJ01 | Rejection of invention patent application after publication |