CN108966226A - The method for processing business and device of identity-based information - Google Patents

The method for processing business and device of identity-based information Download PDF

Info

Publication number
CN108966226A
CN108966226A CN201810622557.7A CN201810622557A CN108966226A CN 108966226 A CN108966226 A CN 108966226A CN 201810622557 A CN201810622557 A CN 201810622557A CN 108966226 A CN108966226 A CN 108966226A
Authority
CN
China
Prior art keywords
identity information
target user
subscriber identity
abnormal
mobile number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810622557.7A
Other languages
Chinese (zh)
Inventor
杜永红
张云勇
王君珂
冯伟斌
王艳丽
王晔
靳慧芳
李希金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201810622557.7A priority Critical patent/CN108966226A/en
Publication of CN108966226A publication Critical patent/CN108966226A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W60/00Affiliation to network, e.g. registration; Terminating affiliation with the network, e.g. de-registration
    • H04W60/06De-registration or detaching

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides the method for processing business and device of a kind of identity-based information, this method comprises: obtaining the abnormal number of pre-collecting;According to abnormal number, determines and whether there is target user's identity information corresponding with abnormal number in subscriber identity information total data;If it is determined that target user's identity information corresponding with abnormal number is not present in subscriber identity information total data, then shutdown processing is carried out to abnormal number.By being based on nationwide subscriber identity information total data; the abnormal number of pre-collecting is cleared up; shutdown processing is carried out to non-system of real name exception number; the generation of the events such as telecommunication fraud, malice blacklist, harassing and wrecking can be effectively reduced, solve the non-real name mobile number of the prior art and implement the defects of telecommunication fraud, harassing and wrecking, arrearage etc. can not demand.

Description

The method for processing business and device of identity-based information
Technical field
This application involves technical field of information management more particularly to a kind of method for processing business and dress of identity-based information It sets.
Background technique
With the rapid development of Internet technology, mobile phone at essential communication and converter tools in for people's lives, It makes a phone call, surf the Internet, listening to music etc. to become the amusement and recreation mode of people by mobile phone.
But as cell-phone function is more and more, phone number leak case is also increasingly severe.Various telecommunications are caused to be cheated Deceiving, harass, promoting etc. keeps user vexatious endlessly, greatly reduces user experience.And much it is marked as the number of swindle, harassing and wrecking It is frequently not system of real name, causes to have no way of demanding.
Therefore, the technical issues of how effective managing mobile numbers and user information become operator's urgent need to resolve.
Summary of the invention
The application provides the method for processing business and device of a kind of identity-based information, is moved with solving the non-real name of the prior art Dynamic number implements the defects of telecommunication fraud, harassing and wrecking, arrearage etc. can not demand.
The application first aspect provides a kind of method for processing business of identity-based information, comprising:
Obtain the abnormal number of pre-collecting;
According to the abnormal number, determine in subscriber identity information total data with the presence or absence of corresponding with the abnormal number Target user's identity information, the subscriber identity information total data includes that mobile number is registered in preset geographical position range Subscriber identity information;
If it is determined that there is no target user's identity corresponding with the exception number to believe in subscriber identity information total data Breath then carries out shutdown processing to the abnormal number.
Further aspect of the application provides a kind of business processing device of identity-based information, comprising:
First obtains module, for obtaining the abnormal number of pre-collecting;
Determining module, for according to the abnormal number, determining to whether there is and institute in subscriber identity information total data The corresponding target user's identity information of abnormal number is stated, the subscriber identity information total data includes in preset geographical position range Register the subscriber identity information of mobile number;
Processing module is used for if it is determined that there is no mesh corresponding with the exception number in subscriber identity information total data Subscriber identity information is marked, then shutdown processing is carried out to the abnormal number.
The method for processing business and device of identity-based information provided in this embodiment are determined according to the abnormal number With the presence or absence of target user's identity information corresponding with the exception number in subscriber identity information total data;If it is determined that with There is no target user's identity informations corresponding with the exception number in the identity information total data of family, then to the abnormal number Carry out shutdown processing.By clearing up the abnormal number of pre-collecting based on nationwide subscriber identity information total data, Shutdown processing is carried out to non-system of real name exception number, the hair of the events such as telecommunication fraud, malice blacklist, harassing and wrecking can be effectively reduced It is raw, it solves the non-real name mobile number of the prior art and implements the defects of telecommunication fraud, harassing and wrecking, arrearage etc. can not demand.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is this Shen Some embodiments please for those of ordinary skill in the art without any creative labor, can be with It obtains other drawings based on these drawings.
Fig. 1 is the flow diagram of the method for processing business for the identity-based information that one embodiment of the application provides;
Fig. 2 is the flow diagram of the method for processing business for the identity-based information that another embodiment of the application provides;
Fig. 3 is the structural schematic diagram of the business processing device for the identity-based information that one embodiment of the application provides;
Fig. 4 is the structural schematic diagram of the business processing device for the identity-based information that another embodiment of the application provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application In attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is Some embodiments of the present application, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art Every other embodiment obtained without creative efforts, shall fall in the protection scope of this application.
Firstly, being explained to noun involved in the application:
Mobile number: refer to all types of telephone numbers that mobile terminal can be supported, telephone number, movement such as connection Telephone number, the telephone number of telecommunications etc..
Abnormal number: referring to the number for being marked as harassing and wrecking, swindle, distribution, advertisement etc., or because of arrearage or other are improper Factor is added into all abnormal numbers that can be collected into such as number of blacklist.
Subscriber identity information: refer to user provided identity information and mobile number when handling mobile number.Specifically It may include ID card No., name, corresponding one or more mobile numbers, whether have blacklist and blacklist corresponding number Whether code has arrearage and the arrearage amount of money etc., and particular content can be obtained information and actual area according to operator It is configured.
Embodiment one
The present embodiment provides a kind of method for processing business of identity-based information, for based on nationwide interior registration movement The subscriber identity information total data of number carries out corresponding cleaning treatment to abnormal number, avoids the presence without card number, effectively Reduce telecommunication fraud.The executing subject of the present embodiment is the business processing device (hereinafter referred to as device) of identity-based information, should Device can be set in the Subscriber Management System of operator, also can be set in the terminal, for example, server, desktop computer, Laptop etc..
As shown in Figure 1, the flow diagram of the method for processing business for identity-based information provided in this embodiment, the party Method includes:
Step 101, the abnormal number of pre-collecting is obtained.
Specifically, the abnormal numbers such as all known fraudulent call numbers, malice blacklist number can be collected, with movement Number is unique index, establishes black list database.The device can then obtain abnormal number from black list database, be used for Subsequent processing.
Step 102, it according to abnormal number, determines in subscriber identity information total data with the presence or absence of corresponding with abnormal number Target user's identity information.
Wherein, subscriber identity information total data includes the user identity letter of registration mobile number in preset geographical position range Breath.
Specifically, can be using ID card No. as unique index, registration mobile number in preset geographical position range Subscriber identity information focuses in a database, obtains subscriber identity information total data.Wherein, preset geographical position range can Think the whole country, i.e., the subscriber identity information in all systems in the whole nation is focused in a database, be managed collectively.
The exception number is inquired in subscriber identity information total data, with determine in subscriber identity information total data whether In the presence of target user's identity information corresponding with abnormal number.
Step 103, however, it is determined that target user's body corresponding with abnormal number is not present in subscriber identity information total data Part information, then carry out shutdown processing to abnormal number.
Specifically, if it is determined that target user's identity corresponding with abnormal number is not present in subscriber identity information total data Information, it is determined that the exception number is the number of non-system of real name, then can carry out shutdown processing to abnormal number.To clear up non-reality The abnormal number of name.An abnormal number has been cleared up, can obtain again next, has been cleared up according to above-mentioned steps.
It should be noted that the present embodiment is not limited to single treatment one abnormal number, it is also possible to handle simultaneously more A exception number.The number of the abnormal number obtained is either one or more.It is multiple to refer to two or two More than.
The method for processing business of identity-based information provided in this embodiment, by being believed based on nationwide user identity Total data is ceased, the abnormal number of pre-collecting is cleared up, shutdown processing is carried out to non-system of real name exception number, can effectively be dropped The generation of the events such as low telecommunication fraud, malice blacklist, harassing and wrecking solves the non-real name mobile number of the prior art and implements telecommunications swindleness It deceives, harass, the defects of arrearage etc. can not demand.
Embodiment two
The present embodiment does further supplementary explanation to the method for processing business for the identity-based information that embodiment one provides.
As shown in Fig. 2, the flow diagram of the method for processing business for identity-based information provided in this embodiment.Upper On the basis of stating embodiment one, optionally, this method further include:
Step 201, however, it is determined that there is target user's identity corresponding with abnormal number in subscriber identity information total data Information then obtains the corresponding mobile number of target user's identity information.
Specifically, believing if it is determined that there is target user's identity corresponding with abnormal number in subscriber identity information total data Breath, then it represents that the exception number is real name number, but is not excluded for usurping the possibility of identity information, therefore, available target The corresponding mobile number of subscriber identity information, including the exception number, it is also possible to other mobile numbers are also had, such as Certain subscriber identity information is for the multiple mobile numbers of Accreditation processing.
Step 202, if the number of the corresponding mobile number of target user's identity information is greater than 1, by target user's identity Information flag is abnormal user.
Specifically, if the number of the corresponding mobile number of target user's identity information is greater than 1, i.e., in addition to the exception number also There are another or multiple mobile numbers, then target user's identity information has stolen possibility, therefore, can be by target user Identity information is labeled as abnormal user, so as to subsequent processing.
Optionally, after step 202, this method can also include:
Step 203, prompt information is sent to the corresponding each mobile number of target user's identity information.
Specifically, after target user's identity information is labeled as abnormal user, it can be to target user's identity information pair Each mobile number answered sends prompt information, to be shown to the currently used person of each mobile number.
Optionally, prompt information is used to prompt the use user of mobile number to update subscriber identity information, alternatively, for mentioning Show that the corresponding target user of target user's identity information confirms that mobile number is for target user's use.
Specifically, prompt information can be used for prompting the use user of mobile number to update subscriber identity information.For example, certain Mobile number is currently used by A, but its subscriber identity information is B, then after A sees prompt information, can go to business hall will The corresponding subscriber identity information of the mobile number is updated to the identity information of A.Alternatively, prompt information can be used for that target is prompted to use Identity information corresponding target user in family confirms that mobile number is used for target user, for example, user C has handled 3 movements Number can send prompt information to 3 mobile numbers, if 3 mobile numbers are currently that C is used, C can go to seek The industry Room confirms that 3 mobile numbers are used in oneself really.To confirm that the identity information of user C is not stolen.Improve use The identity information safety at family.The particular content of prompt information can be configured according to actual needs, for example may include " you Identification card number correspondence handled 3 mobile numbers, would you please be confirmed whether be that you handle yourself ", " mobile number is abnormal, Would you please to neighbouring business hall update subscriber identity information " etc. similar informations, if corresponding 3 movements number of the identity information of user C In code, having one is not used in user C, and user C, which is known that, oneself only has 2 mobile numbers, then business hall can be gone to true Oneself used two mobile number is recognized, so that business hall can know another mobile number to usurp identity information institute The number handled can then carry out it shutting down processing or other measures accordingly.It is usurped to effectively control identity information The transmission of situation is conducive to government and carries out supervision demand.
Prompt information can be also used for prompt subscriber payment, for example, abnormal number is the movement to pipe off by arrearage The number mobile number is what A was saved, is searched in subscriber identity information total data it is found that the exception number has corresponding target Subscriber identity information, corresponding 3 mobile numbers of target user's identity information, one is the exception number, other two is B The mobile number of province.The information that prompting payment can be then sent to other two mobile number, and if can prompt when default Between do not pay the fees to abnormal number in the time limit, then other two number such as will be deactivated at the information, if the user is in preset time It does not pay the fees to abnormal number in time limit, does not also do any other explanation, then two right numbers of the user can be done accordingly Processing, such as it is out of service etc., after subscriber payment, then restore its access right.To effectively increase underpayment management Efficiency.
Optionally, after step 203, this method can also include:
Step 204, each mobile number corresponding for target user's identity information, if within the preset time time limit, The subscriber identity information of mobile number does not update, alternatively, target user does not confirm that mobile number is used for target user, Mobile number is then subjected to shutdown processing.
Specifically, if some mobile number, after being sent to it prompt information, within the preset time time limit, without user It is carried out to confirm or without updating subscriber identity information, then shutdown processing can be carried out to it.For example user's C identity is believed Corresponding 3 mobile numbers are ceased, have sent that " mobile number is abnormal, woulds you please in XX day to neighbouring business hall update user Identity information ", wherein user C to business hall confirmed two mobile numbers.Another mobile number, in the preset time phase User useless confirms or updates to business hall in limiting, then the provable mobile number is stolen information and handles, and does business The Room then can carry out shutdown processing to the mobile number.
It is to be appreciated that prompt information content may include the corresponding mobile number number of current identity information, such as on " your identification card number correspondence has handled 3 mobile numbers, woulds you please be confirmed whether be that you handle yourself " stated, at this point, the use Family oneself can confirm in 3 mobile numbers which is that oneself is really used, in addition then can directly carry out shutdown processing.Tool Body can be configured according to actual needs, it is therefore intended that ensure each mobile number, the corresponding user identity of the mobile number Information and the real user of the mobile number are consistent, and the situation for avoiding identity information stolen occurs.It does not limit herein It is fixed.
First it can confirm or update the process of subscriber identity information, can also be carried out by other approach, the present embodiment What is provided confirms only exemplary illustration to business hall, not to the restriction of the application.For example, network managing system can also be passed through System, passes through login authentication by user.Specifically such as: user can be by cell-phone number in the registration login of client of operator end, binding Identity information uploads me and uses the photo of current mobile number etc. mode with identity card group photo photo, in person.As long as can reach It is consistent to the confirmation testimony of a witness number.Unlimited validation testing.Its corresponding user identity is believed according to abnormal number to realize Cease counter cleaned.
Optionally, it in order to achieve the purpose that all to clean, can not also be proceeded as described above according to abnormal number, and it is direct For registering the subscriber identity information total data of mobile number in the whole country, uniformly cleaned, it is no matter right under identification card number Several mobile numbers are answered, prompt user confirms, can more effectively ensure that the testimony of a witness number of all mobile numbers is consistent.Effectively Ground strike usurps identity information and handles the criminal offences such as mobile number implementation swindle.
The method for processing business of identity-based information provided in this embodiment, by being believed based on nationwide user identity Total data is ceased, the abnormal number of pre-collecting is cleared up, shutdown processing is carried out to non-system of real name exception number, can effectively be dropped The generation of the events such as low telecommunication fraud, malice blacklist, harassing and wrecking solves the non-real name mobile number of the prior art and implements telecommunications swindleness It deceives, harass, the defects of arrearage etc. can not demand.And pass through if it is determined that existing in subscriber identity information total data and anomalous sign The corresponding target user's identity information of code, then obtain the corresponding mobile number of target user's identity information;If target user's identity The number of the corresponding mobile number of information is greater than 1, then target user's identity information is labeled as abnormal user, to target user's body The corresponding each mobile number transmission prompt information of part information, each mobile number corresponding for target user's identity information, If the subscriber identity information of mobile number does not update within the preset time time limit, alternatively, target user does not confirm mobile number Code is used for target user, then mobile number is carried out shutdown processing.It realizes according to abnormal number to subscriber identity information Reverse cleaning is carried out, subscriber identity information update or confirmation are carried out to multiple mobile numbers under user name, to guarantee each movement The real user of number is the user registered, avoids the generation that identity information usurps event, is further reduced telecommunications swindleness Event is deceived, the efficiency of management of user information is improved.
Embodiment three
The present embodiment provides a kind of business processing device of identity-based information, for execute above-described embodiment one based on The method for processing business of identity information.
As shown in figure 3, the structural schematic diagram of the business processing device for identity-based information provided in this embodiment.The base Module 31, determining module 32 and processing module 33 are obtained including first in the business processing device 30 of identity information.
Wherein, the first acquisition module 31 is used to obtain the abnormal number of pre-collecting;Determining module 32 is used for according to anomalous sign Code determines and whether there is target user's identity information corresponding with abnormal number, Yong Hushen in subscriber identity information total data Part information total data includes the subscriber identity information of registration mobile number in preset geographical position range;If processing module 33 is used for It determines and target user's identity information corresponding with abnormal number is not present in subscriber identity information total data, then to abnormal number Carry out shutdown processing.
Device in this present embodiment is closed, wherein modules execute the concrete mode of operation in related this method It is described in detail in embodiment, no detailed explanation will be given here.
According to the business processing device of identity-based information provided in this embodiment, by being based on nationwide user's body Part information total data, clears up the abnormal number of pre-collecting, carries out shutdown processing, Ke Yiyou to non-system of real name exception number Effect reduces the generation of the events such as telecommunication fraud, malice blacklist, harassing and wrecking, solves the non-real name mobile number of the prior art and implements telecommunications The defects of swindle, harassing and wrecking, arrearage etc. can not demand.
Example IV
The present embodiment does the business processing device for the identity-based information that above-described embodiment three provides and further adds It is bright.
As shown in figure 4, the structural schematic diagram of the business processing device for identity-based information provided in this embodiment.
On the basis of above-described embodiment three, optionally, which can also include the second acquisition module 34 and label Module 35.
Wherein, second module 34 is obtained for if it is determined that existing in subscriber identity information total data corresponding with abnormal number Target user's identity information, then obtain the corresponding mobile number of target user's identity information;If mark module 35 is used for target The number of the corresponding mobile number of subscriber identity information is greater than 1, then target user's identity information is labeled as abnormal user.
Optionally, which can also include sending module 36.
Wherein, sending module 36 is used to send prompt information to the corresponding each mobile number of target user's identity information.
Optionally, prompt information is used to prompt the use user of mobile number to update subscriber identity information, alternatively, for mentioning Show that the corresponding target user of target user's identity information confirms that mobile number is used for target user, alternatively, for prompting mesh Mark user pays the fees.
Optionally, processing module 33 can be also used for: each mobile number corresponding for target user's identity information, If the subscriber identity information of mobile number does not update within the preset time time limit, alternatively, target user does not confirm mobile number Code is used for target user, then mobile number is carried out shutdown processing;Alternatively, target user does not pay the fees, then to mobile number Code carries out processing out of service.
Device in this present embodiment is closed, wherein modules execute the concrete mode of operation in related this method It is described in detail in embodiment, no detailed explanation will be given here.
According to the business processing device of identity-based information provided in this embodiment, by being based on nationwide user's body Part information total data, clears up the abnormal number of pre-collecting, carries out shutdown processing, Ke Yiyou to non-system of real name exception number Effect reduces the generation of the events such as telecommunication fraud, malice blacklist, harassing and wrecking, solves the non-real name mobile number of the prior art and implements telecommunications The defects of swindle, harassing and wrecking, arrearage etc. can not demand.And pass through if it is determined that existing and exception in subscriber identity information total data The corresponding target user's identity information of number, then obtain the corresponding mobile number of target user's identity information;If target user's body The number of the corresponding mobile number of part information is greater than 1, then target user's identity information is labeled as abnormal user, to target user The corresponding each mobile number of identity information sends prompt information, each movement number corresponding for target user's identity information Code, if the subscriber identity information of mobile number does not update within the preset time time limit, alternatively, target user does not confirm shifting Dynamic number is used for target user, then mobile number is carried out shutdown processing.It realizes according to abnormal number to user identity Information carries out reverse cleaning, carries out subscriber identity information update or confirmation to multiple mobile numbers under user name, each to guarantee The real user of mobile number is the user registered, avoids the generation that identity information usurps event, is further reduced electricity Believe swindle event, improves the efficiency of management of user information.
In several embodiments provided by the present invention, it should be understood that disclosed device and method can pass through it Its mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only Only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components can be tied Another system is closed or is desirably integrated into, or some features can be ignored or not executed.Another point, it is shown or discussed Mutual coupling, direct-coupling or communication connection can be through some interfaces, the INDIRECT COUPLING or logical of device or unit Letter connection can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, the functional units in various embodiments of the present invention may be integrated into one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can store and computer-readable deposit at one In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer It is each that equipment (can be personal computer, server or the network equipment etc.) or processor (processor) execute the present invention The part steps of embodiment the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read- Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. it is various It can store the medium of program code.
Those skilled in the art can be understood that, for convenience and simplicity of description, only with above-mentioned each functional module Division progress for example, in practical application, can according to need and above-mentioned function distribution is complete by different functional modules At the internal structure of device being divided into different functional modules, to complete all or part of the functions described above.On The specific work process for stating the device of description, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (10)

1. a kind of method for processing business of identity-based information characterized by comprising
Obtain the abnormal number of pre-collecting;
According to the abnormal number, determine in subscriber identity information total data with the presence or absence of mesh corresponding with the exception number Subscriber identity information is marked, the subscriber identity information total data includes the user of registration mobile number in preset geographical position range Identity information;
If it is determined that there is no target user's identity informations corresponding with the exception number in subscriber identity information total data, then Shutdown processing is carried out to the abnormal number.
2. the method according to claim 1, wherein if it is determined that existing and institute in subscriber identity information total data The corresponding target user's identity information of abnormal number is stated, then obtains the corresponding mobile number of target user's identity information;
If the number of the corresponding mobile number of target user's identity information is greater than 1, by target user's identity information Labeled as abnormal user.
3. according to the method described in claim 2, it is characterized in that, target user's identity information is used labeled as abnormal After family, the method also includes:
Prompt information is sent to the corresponding each mobile number of target user's identity information.
4. according to the method described in claim 3, it is characterized in that, the prompt information is for prompting making for the mobile number Subscriber identity information is updated with user, alternatively, for prompting the corresponding target user of target user's identity information to confirm institute Stating mobile number is used for the target user, alternatively, for prompting the target user to pay the fees.
5. according to the method described in claim 4, it is characterized by further comprising:
Each mobile number corresponding for target user's identity information, if within the preset time time limit, the movement The subscriber identity information of number does not update, alternatively, the target user does not confirm that the mobile number is for the target User uses, then the mobile number is carried out shutdown processing;Alternatively, the target user does not pay the fees, then to the movement Number carries out processing out of service.
6. a kind of business processing device of identity-based information characterized by comprising
First obtains module, for obtaining the abnormal number of pre-collecting;
Determining module, for according to the abnormal number, determine in subscriber identity information total data with the presence or absence of with it is described different The corresponding target user's identity information of normal number, the subscriber identity information total data include registration in preset geographical position range The subscriber identity information of mobile number;
Processing module is used for if it is determined that there is no targets corresponding with the exception number to use in subscriber identity information total data Family identity information then carries out shutdown processing to the abnormal number.
7. device according to claim 6, which is characterized in that further include:
Second obtains module, is used for if it is determined that there is target corresponding with the exception number in subscriber identity information total data Subscriber identity information then obtains the corresponding mobile number of target user's identity information;
Mark module, if the number for the corresponding mobile number of target user's identity information is greater than 1, by the target Subscriber identity information is labeled as abnormal user.
8. device according to claim 7, which is characterized in that further include:
Sending module, for sending prompt information to the corresponding each mobile number of target user's identity information.
9. device according to claim 8, which is characterized in that the prompt information is for prompting making for the mobile number Subscriber identity information is updated with user, alternatively, for prompting the corresponding target user of target user's identity information to confirm institute Stating mobile number is used for the target user, alternatively, for prompting the target user to pay the fees.
10. device according to claim 8, which is characterized in that the processing module is also used to:
Each mobile number corresponding for target user's identity information, if within the preset time time limit, the movement The subscriber identity information of number does not update, alternatively, the target user does not confirm that the mobile number is for the target User uses, then the mobile number is carried out shutdown processing;Alternatively, the target user does not pay the fees, then to the movement Number carries out processing out of service.
CN201810622557.7A 2018-06-15 2018-06-15 The method for processing business and device of identity-based information Pending CN108966226A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810622557.7A CN108966226A (en) 2018-06-15 2018-06-15 The method for processing business and device of identity-based information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810622557.7A CN108966226A (en) 2018-06-15 2018-06-15 The method for processing business and device of identity-based information

Publications (1)

Publication Number Publication Date
CN108966226A true CN108966226A (en) 2018-12-07

Family

ID=64489069

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810622557.7A Pending CN108966226A (en) 2018-06-15 2018-06-15 The method for processing business and device of identity-based information

Country Status (1)

Country Link
CN (1) CN108966226A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109769244A (en) * 2019-01-08 2019-05-17 中国联合网络通信集团有限公司 Recognition methods, device, equipment and the readable storage medium storing program for executing of abnormal phonecard
CN111914240A (en) * 2020-07-28 2020-11-10 中国联合网络通信集团有限公司 Identity verification method and system based on block chain and notarization party node
CN113676606A (en) * 2021-08-23 2021-11-19 中国联合网络通信集团有限公司 Shutdown method and apparatus
CN113727352A (en) * 2020-05-21 2021-11-30 美光科技公司 Managing spoofed calls to mobile devices
CN114258024A (en) * 2021-12-03 2022-03-29 中国联合网络通信集团有限公司 Halt processing method and device, electronic equipment and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101730091A (en) * 2008-10-28 2010-06-09 中国移动通信集团湖南有限公司 Method and device for limiting unlawful communication service

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101730091A (en) * 2008-10-28 2010-06-09 中国移动通信集团湖南有限公司 Method and device for limiting unlawful communication service

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
LABULAKAYOYO: "电信号码没有实名制会停机?", 《CSDN博客》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109769244A (en) * 2019-01-08 2019-05-17 中国联合网络通信集团有限公司 Recognition methods, device, equipment and the readable storage medium storing program for executing of abnormal phonecard
CN109769244B (en) * 2019-01-08 2021-10-15 中国联合网络通信集团有限公司 Abnormal telephone card identification method, device, equipment and readable storage medium
CN113727352A (en) * 2020-05-21 2021-11-30 美光科技公司 Managing spoofed calls to mobile devices
CN111914240A (en) * 2020-07-28 2020-11-10 中国联合网络通信集团有限公司 Identity verification method and system based on block chain and notarization party node
CN111914240B (en) * 2020-07-28 2023-09-15 中国联合网络通信集团有限公司 Identity verification method and system based on blockchain and notarization party node
CN113676606A (en) * 2021-08-23 2021-11-19 中国联合网络通信集团有限公司 Shutdown method and apparatus
CN113676606B (en) * 2021-08-23 2022-08-16 中国联合网络通信集团有限公司 Shutdown method and apparatus
CN114258024A (en) * 2021-12-03 2022-03-29 中国联合网络通信集团有限公司 Halt processing method and device, electronic equipment and storage medium
CN114258024B (en) * 2021-12-03 2023-10-31 中国联合网络通信集团有限公司 Shutdown processing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN108966226A (en) The method for processing business and device of identity-based information
CN104954322B (en) A kind of binding processing method of account, apparatus and system
CN104917749B (en) account registration method and device
CN106303099B (en) A kind of method, apparatus and system for verifying user's communicating number validity
CN110012028B (en) Medical identity authentication method and system
CN101005503A (en) Method and data processing system for intercepting communication between a client and a service
CN102523213A (en) Server and terminal authenticating method and server and terminal
CN102611746B (en) Method and system for sharing contact person information
CN110324815A (en) Activating method, server, terminal and the block chain network system that No.1 is blocked more
CN109510758B (en) Session establishing method, terminal and system
CN109246319A (en) A kind of calling name card business implementation method, device, equipment and storage medium
CN108471601B (en) Internetwork settlement method, device, equipment and storage medium
CN112437428B (en) Verification method and server
CN109905874A (en) The method and system of the autonomous number of selecting based on block chain
CN107172194B (en) Virtual SIM card management method and device and communication terminal
CN109150864B (en) Anti-cheating method and device based on secondary authentication
CN112866192B (en) Method and device for identifying abnormal aggregation behaviors
EP2334009A1 (en) Realizing method and device for independent vc system compatible with different charge cards
CN107067354A (en) Based on the task of supervision treating method and apparatus for controlling grid altogether
CN107105430A (en) A kind of number authentication method and device
CN104685856A (en) System and method for processing lost password using password long-term memory of user
CN105871784A (en) Information change processing method and device
CN107332999A (en) A kind of Stranger Calls number identification method and device
CN105162600B (en) The authentication information sending method and device of the Internet, applications
CN108200532A (en) It is a kind of to verify the method and system made up SIM card user identity and be associated with SIM card

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181207

RJ01 Rejection of invention patent application after publication