CN111800748B - Re-network user identification method, system, computer equipment and storage medium - Google Patents

Re-network user identification method, system, computer equipment and storage medium Download PDF

Info

Publication number
CN111800748B
CN111800748B CN202010624531.3A CN202010624531A CN111800748B CN 111800748 B CN111800748 B CN 111800748B CN 202010624531 A CN202010624531 A CN 202010624531A CN 111800748 B CN111800748 B CN 111800748B
Authority
CN
China
Prior art keywords
user
old
network access
short message
suspected
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010624531.3A
Other languages
Chinese (zh)
Other versions
CN111800748A (en
Inventor
宋玉珊
王鑫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202010624531.3A priority Critical patent/CN111800748B/en
Publication of CN111800748A publication Critical patent/CN111800748A/en
Application granted granted Critical
Publication of CN111800748B publication Critical patent/CN111800748B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • H04W8/205Transfer to or from user equipment or user record carrier
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/26Network addressing or numbering for mobility support

Abstract

The embodiment of the disclosure provides a method, a system, a computer device and a storage medium for identifying a re-network-access user, wherein the method comprises the following steps: acquiring an industry short message sent to a user; extracting an industry short message number, a user number, user call information and first user characteristic information from an industry short message; forming a suspected re-networking user list by new networking users and old users corresponding to the new networking users with the same industry short message number, the same user calling information and the same first user characteristic information; and detecting the current state of the user number of the old user in the suspected re-network access user list, and determining whether the new network access user corresponding to the old user is the re-network access user according to the detection result. The suspected re-networking user list is formed based on the industry short message, whether the corresponding new networking user is the re-networking user or not is judged according to the current state of the user number of the old user in the list, the identification accuracy rate is high, the calculated amount is small, and the identification period is fast.

Description

Re-network user identification method, system, computer equipment and storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method for identifying a re-networking user, a system for identifying a re-networking user, a computer device, and a computer-readable storage medium.
Background
The re-network user refers to a user who purchases the mobile phone card of the operator again to replace the original mobile phone card service volume for use under the influence of factors such as preferential policies of the operator and the like on the premise that the user already holds the mobile phone card of the operator. The re-network access behavior can cause the consequences of waste of operator number card resources, card abandonment and arrearage, and the like, and the user stickiness of the users is not high, and the maintenance significance is not large, so the re-network access behavior has very important practical significance for the identification of the users.
At present, the re-networking user identification method adopted in the industry generally comprises the following three methods:
(1) identifying according to the network access data (such as ID card number) of the new and old users;
(2) identifying according to the same terminal IMEI (International Mobile Equipment Identity) used by the new and old users, namely the new and old users use the same Mobile phone;
(3) and identifying according to the contact degree of the conversation intercourse circles of the new and old users, namely the conversation contacts of the new and old users are similar.
However, due to the factors such as inaccurate network access materials of users, user switching, etc., the methods (1) and (2) have inaccurate identification of the re-access users, and the method (3) needs to identify through the contact degree of the call communication circle of the users, and has a large amount of calculation and a slow identification period.
Therefore, it is an urgent problem to provide a re-networking user identification scheme with high identification accuracy, small calculation amount and fast identification period.
Disclosure of Invention
The present disclosure has been made to at least partially solve the technical problems occurring in the prior art.
According to an aspect of the embodiments of the present disclosure, a method for identifying a re-entry user is provided, where the method includes:
acquiring an industry short message sent to a user;
extracting an industry short message number, a user number, user call information and first user characteristic information from the industry short message;
forming a suspected re-networking user list by new networking users and old users corresponding to the new networking users with the same industry short message numbers, the same user call information and the same first user characteristic information, wherein the suspected re-networking user list comprises user numbers of the new networking users and the old users corresponding to the new networking users; and the number of the first and second groups,
and detecting the current state of the user number of the old user in the suspected re-network access user list, and determining whether the new network access user corresponding to the old user is the re-network access user according to the detection result.
Optionally, the method further comprises:
extracting second user characteristic information from the industry short message;
after forming the suspected re-networking user list and before detecting the current state of the user number of the old user in the suspected re-networking user list, the method further comprises the following steps:
comparing whether the second user characteristic information of the new network access user and the corresponding old user in the suspected re-network access user list is the same or not; and the number of the first and second groups,
and if the two users are different, removing the new network access user and the old user corresponding to the new network access user from the suspected re-network access user list.
Optionally, the current state of the user number of the old user includes a current account opening state and a current communication state;
determining whether the new network access user corresponding to the old user is a re-network access user according to the detection result, wherein the determining comprises the following steps:
and if the current account opening state of the user number of the old user is the sold number or the current communication state is that the communication traffic is lower than a preset traffic threshold, determining the new network access user corresponding to the old user as the re-network access user.
Optionally, the first user characteristic information includes: user card number information; the second user characteristic information includes: and extracting user information according to preset keywords in the industry short message and the short message sending date.
According to another aspect of the embodiments of the present disclosure, there is provided a re-networking subscriber identification system, the system including:
the acquisition module is used for acquiring the industry short message sent to the user;
the extraction module is used for extracting an industry short message number, a user number, user call information and first user characteristic information from the industry short message;
the list construction module is set to form a suspected re-network user list of new network users and old users corresponding to the new network users with the same industry short message number, the same user calling information and the same first user characteristic information, wherein the suspected re-network user list comprises user numbers of the new network users and the old users corresponding to the new network users;
the detection module is set to detect the current state of the user number of the old user in the suspected re-networking user list; and the number of the first and second groups,
and the determining module is set to determine whether the new network access user corresponding to the old user is the re-network access user according to the detection result of the detecting module.
Optionally, the extraction module is further configured to extract second user characteristic information from the industry short message;
the system further comprises:
the comparison module is used for comparing whether the second user characteristic information of the new network access user and the second user characteristic information of the corresponding old user in the suspected re-network access user list are the same or not; and (c) a second step of,
and the removing module is set to remove the new network access user and the old user corresponding to the new network access user from the suspected re-network access user list when the comparison results of the comparison modules are different.
Optionally, the current state of the user number of the old user includes a current account opening state and a current communication state;
the determining module is specifically configured to determine a new network-accessing user corresponding to the old user as a re-network-accessing user if the current account opening state of the user number of the old user is an account number, or the current communication state is that the communication traffic is lower than a preset traffic threshold.
Optionally, the first user characteristic information includes: user card number information; the second user characteristic information includes: and extracting user information according to preset keywords in the industry short message and the short message sending date.
According to another aspect of the embodiments of the present disclosure, there is provided a computer device, including a memory and a processor, where the memory stores a computer program, and when the processor runs the computer program stored in the memory, the processor executes the aforementioned re-network user identification method.
According to still another aspect of the embodiments of the present disclosure, there is provided a computer-readable storage medium, on which a computer program is stored, wherein when the computer program is executed by a processor, the processor executes the foregoing method for identifying a re-entry network user.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects:
the re-networking user identification method provided by the embodiment of the disclosure forms a suspected re-networking user list based on the industry short message, and then judges whether a new networking user corresponding to the old user in the list is the re-networking user according to the current state of the user number of the old user in the list, so that the identification accuracy is high, the calculated amount is small, and the identification period is fast.
Additional features and advantages of the disclosure will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the disclosure. The objectives and other advantages of the disclosure may be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the disclosed embodiments and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the example serve to explain the principles of the disclosure and not to limit the disclosure.
Fig. 1 is a schematic flowchart of a re-networking user identification method according to an embodiment of the present disclosure;
fig. 2 is a schematic flowchart of another re-network user identification method according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of a re-entry network subscriber identification system according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of a computer device provided in an embodiment of the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, specific embodiments of the present disclosure are described below in detail with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present disclosure, are given by way of illustration and explanation only, not limitation.
It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order; also, the embodiments and features of the embodiments in the present disclosure may be arbitrarily combined with each other without conflict.
Fig. 1 is a schematic flowchart of a method for identifying a re-access network user according to an embodiment of the present disclosure. As shown in fig. 1, the method for identifying a re-network-accessing user includes the following steps S101 to S104.
S101, acquiring an industry short message sent to a user;
s102, extracting an industry short message number, a user number, user call information and first user characteristic information from the industry short message;
s103, forming a suspected re-networking user list by the new networking users and the corresponding old users with the same industry short message number, the same user call information and the same first user characteristic information, wherein the suspected re-networking user list comprises the user numbers of the new networking users and the corresponding old users;
specifically, when two or more subscriber numbers have the same industry short message number, the same subscriber call information and the same first subscriber feature information, it is indicated that the subscriber numbers belong to the same subscriber, that is, the same subscriber holds a plurality of numbers of the same operator, if both a new subscriber and an old subscriber exist in the subscriber numbers, it is considered that a suspected re-networking relationship exists between the new subscriber and the old subscriber, the new subscriber and the old subscriber are associated, and then the corresponding relationship and the subscriber numbers are stored in a suspected re-networking subscriber list, that is, the list includes both the corresponding relationship between the new subscriber and the old subscriber and the subscriber numbers thereof.
And S104, detecting the current state of the user number of the old user in the suspected re-network access user list, and determining whether the new network access user corresponding to the old user is a re-network access user according to the detection result.
The industry short message can be a short message sent to a user by a bank, a merchant and the like; the industry short message number is the number of a sender sending an industry short message to a user. The user call information may be the name of the user. The new network-accessing user refers to a user whose network-accessing time is lower than or equal to a preset time threshold, and the time threshold can be set by a person skilled in the art according to actual situations, and can be set to be 2 months or 3 months, for example. The old user is a user whose network access time exceeds a preset time threshold, in other words, the users except the new network access user are all old users.
In the embodiment of the disclosure, a suspected re-networking user list is formed based on the industry short message, and whether a new networking user corresponding to the old user in the list is the re-networking user is judged according to the current state of the user number of the old user in the list, so that the identification accuracy is high, the calculated amount is small, and the identification period is fast.
In one embodiment, the first user characteristic information includes: user card number information. Such as the end number of a bank card (including credit and savings cards), membership card number, etc.
For example, bank a sends an industry short message to the user with number 13810096938 at number 10690289601169, the content is "honored mr. zhang, and the credit card 2 month bill of your tail number 1111 is 888 yuan", then from the industry short message, the short message platform can extract: the industry short message number is 10690289601169, the user name information is Zhang III, the user number is 13810096938, and the first user characteristic information is a credit card tail number 1111.
In one embodiment, step S102 further comprises: and extracting second user characteristic information from the industry short message.
Accordingly, after step S103 and before step S104, the following steps S105 to S107 are further included.
S105, comparing whether the second user characteristic information of the new network access user and the corresponding old user in the suspected re-network access user list is the same or not, if so, executing a step S106, and if not, executing a step S107;
s106, reserving the new network access user and the corresponding old user in the suspected re-network access user list;
and S107, removing the new network access user and the corresponding old user from the suspected re-network access user list.
For example, the birthday information or the billing date information of the new network-accessing user and the corresponding old user for the same industry short message number may be compared, and if the birthday information or the billing date information of the new network-accessing user and the corresponding old user do not match, the new network-accessing user and the corresponding old user are removed from the suspected re-network user list.
In the embodiment of the disclosure, the second user characteristic information is acquired from the industry short message, and the new network access users with different second user characteristic information and the corresponding old users thereof are removed from the suspected re-network access user list, so that unreasonable information in the suspected re-network access user list is removed, and the accuracy of subsequent re-network access user identification can be effectively improved.
In one embodiment, the second user characteristic information includes: and extracting user information according to preset keywords in the industry short message in combination with the short message sending date.
The preset keyword may be user information related to a date, such as happy birthday, bills of several months, and the like. Combining the 'happy birthday' with the short message sending date to obtain the second user characteristic information as the birthday date of the user; and combining the 'bills of several months' with the short message sending date to obtain the second user characteristic information as the bill date of the user.
For example, bank a sends an industry short message to the user in 4 months and 5 days, the content is "Zusanqi Mr. honored, bank a congratulates your birthday, and the consumption in the birthday can share 3 times of points", and according to the keyword "happy birthday" and the sending time of the industry short message, the short message platform can extract the second user characteristic information as that the birthday of the user is 4 months and 5 days.
For example, bank a sends an industry short message to the user in 3 months and 2 days, the content is "mr. zhang respected, and the credit card 2 month bill of you tail number 1111 is 888 yuan", and according to the keyword "2 month bill" and the sending time of the industry short message, the short message platform can extract the second user characteristic information that the user bill day is 3 months and 2 days.
In one embodiment, the current state of the subscriber number of the old subscriber includes a current account opening state and a current communication state.
Correspondingly, in step S104, it is determined whether the new network access user corresponding to the old user is a re-network access user according to the detection result, specifically:
if the current account opening state of the user number of the old user is the sold number or the current communication state is that the communication traffic is lower than a preset traffic threshold, determining a new network access user corresponding to the old user as a re-network access user;
and if the current state of the user number of the old user is normal and the current communication state is that the communication traffic is not lower than a preset traffic threshold, determining the new network access user corresponding to the old user as a non-reentrant network access user.
The communication service comprises the following steps: voice, text messaging, data traffic, and the like. The traffic threshold can be set by those skilled in the art according to the actual situation.
In the embodiment of the present disclosure, if it is detected that an old user has sold a number, or the communication traffic is greatly reduced until the number is lower than a preset traffic threshold, it is determined that a new network-accessing user corresponding to the old user is a re-network-accessing user of the old user.
Fig. 2 is a schematic flowchart of another re-networking user identification method according to an embodiment of the present disclosure. As shown in fig. 2, the method for identifying a re-networking subscriber is applied to a short message platform, and includes the following steps S201 to S206.
S201, acquiring an industry short message sent to a user;
s202, extracting an industry short message number, a user number, user call information, first user characteristic information and second user characteristic information from the industry short message;
s203, forming and storing a first mapping table containing a mapping relation of 'industry short signal code-user number-user name information-first user characteristic information' and a second mapping table containing a mapping relation of 'industry short signal code-user number-second user characteristic information';
s204, according to the first mapping table, forming a suspected re-networking user list of new network access users and old users corresponding to the new network access users with the same industry short message number, the same user call information and the same first user characteristic information, wherein the list comprises user numbers of the new network access users and the old users corresponding to the new network access users;
s205, according to the second mapping table, comparing second user characteristic information of the new network-accessing user and the corresponding old user in the suspected re-network-accessing user list, and removing the new network-accessing user and the corresponding old user which are not matched with the second user characteristic information from the suspected re-network-accessing user list.
S206, detecting the account opening state and the communication state of the user number of the old user in the suspected re-network access user list, and determining whether the new network access user corresponding to the old user is the re-network access user according to the detection result.
The method for identifying the re-network-accessing user provided by the embodiment of the disclosure includes the steps of firstly forming a suspected re-network-accessing user list based on an industry short message number, a user number, user call information and first user characteristic information in an industry short message, then removing a new network-accessing user and an old user corresponding to the new network-accessing user, of which the second user characteristic information is not consistent, from the suspected re-network-accessing user list according to the industry short message number, the user number and the second user characteristic information in the industry short message, and finally judging whether the new network-accessing user corresponding to the new network-accessing user is the re-network-accessing user according to the current state of the user number of the old user in the suspected re-network-accessing user list, so that whether the new network-accessing user is the re-network-accessing user corresponding to the old user is accurately identified, and the identification accuracy is high, the calculation amount is small, and the identification period is fast.
Fig. 3 is a schematic structural diagram of a re-entry network subscriber identification system according to an embodiment of the present disclosure. As shown in fig. 3, the re-entry subscriber identification system 3 includes: an acquisition module 31, an extraction module 32, a list construction module 33, a detection module 34 and a determination module 35.
The acquisition module 31 is configured to acquire an industry short message sent to a user; the extraction module 32 is configured to extract an industry short message number, a user number, user call information and first user feature information from the industry short message; the list construction module 33 is configured to form a suspected re-networking user list including new networking users and old users corresponding to the new networking users, which have the same industry short message number, the same user call information and the same first user characteristic information, wherein the user number of the new networking user and the old users corresponding to the new networking user is included; the detection module 34 is configured to detect a current status of the user number of the old user in the suspected re-networking user list; the determining module 35 is configured to determine whether the new network access user corresponding to the old user is the re-network access user according to the detection result of the detecting module 34.
The industry short message can be a short message sent to a user by a bank, a merchant and the like; the industry short message number is the number of a sender sending an industry short message to a user. The user call information may be the name of the user. The new network access user is a user with a network access time lower than or equal to a preset time threshold, and the time threshold can be set by a person skilled in the art according to actual conditions, and can be set to be 2 months or 3 months, for example. The old user is a user whose network access time exceeds a preset time threshold, in other words, the users except the new network access user are all old users.
In the embodiment of the disclosure, a suspected re-networking user list is formed based on the industry short message, and whether a new networking user corresponding to the old user in the list is the re-networking user is judged according to the current state of the user number of the old user in the list, so that the identification accuracy is high, the calculated amount is small, and the identification period is fast.
In one embodiment, the first user characteristic information includes: user card number information. Such as the end number of a bank card (including credit and savings cards), the membership card number, etc.
In an embodiment, the extracting module 32 is further configured to extract second user characteristic information from the industry short message.
Correspondingly, the re-network user identification system 3 further includes: a contrast module 36 and a removal module 37.
The comparison module 36 is configured to compare whether the second user characteristic information of the new network access user and the second user characteristic information of the old user corresponding to the new network access user in the suspected re-network access user list are the same; the removing module 37 is configured to remove the new network-accessing user and the old user corresponding to the new network-accessing user from the suspected re-network-accessing user list when the comparison result of the comparing module 36 is different.
In the embodiment of the disclosure, the second user characteristic information is acquired from the industry short message, and the new network access users with different second user characteristic information and the corresponding old users thereof are removed from the suspected re-network access user list, so that unreasonable information in the suspected re-network access user list is removed, and the accuracy of subsequent re-network access user identification can be effectively improved.
In one embodiment, the second user characteristic information includes: and extracting user information according to preset keywords in the industry short message and the short message sending date. The preset keyword may be user information related to a date.
In one embodiment, the current state of the subscriber number of the old subscriber includes a current account opening state and a current communication state.
Correspondingly, the determining module 35 is specifically configured to determine the new network-accessing user corresponding to the old user as the re-network-accessing user if the current account opening state of the user number of the old user is the sold number or the current communication state is that the communication traffic is lower than the preset traffic threshold.
The communication service comprises the following steps: voice, short message, data traffic, etc. The traffic threshold can be set by those skilled in the art according to the actual situation.
In this embodiment of the present disclosure, if the detecting module 34 detects that the old user has sold the number, or the communication traffic is greatly decreased until the number is lower than the preset traffic threshold, the determining module 35 determines that the new network access user corresponding to the old user is the re-network access user of the old user.
The re-networking user identification system provided by the embodiment of the disclosure forms a suspected re-networking user list based on an industry short message number, a user number, user call information and first user characteristic information in an industry short message, removes a new networking user with non-consistent second user characteristic information and an old user corresponding to the new networking user from the suspected re-networking user list according to the industry short message number, the user number and the second user characteristic information in the industry short message, and judges whether the new networking user corresponding to the old user is the re-networking user according to the current state of the user number of the old user in the suspected re-networking user list, so that whether the new networking user is the re-networking user of the old user corresponding to the new networking user is accurately identified, and the re-networking user identification system has high identification accuracy, small calculation amount and fast identification period.
Based on the same technical concept, the embodiment of the present disclosure correspondingly provides a computer device, as shown in fig. 4, the computer device 4 includes a memory 41 and a processor 42, the memory 41 stores a computer program, and when the processor 42 runs the computer program stored in the memory 41, the processor 42 executes the aforementioned re-networking user identification method.
Based on the same technical concept, embodiments of the present disclosure correspondingly provide a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the processor executes the foregoing re-networking user identification method.
To sum up, the re-networking user identification method, system, computer device and storage medium provided by the embodiments of the present disclosure form and store a first mapping table containing an "industry short message number-user call information-first user feature information" mapping relationship and a second mapping table containing an "industry short message number-user number-second user feature information" mapping relationship by acquiring an industry short message sent to a user, then form a suspected re-networking user list for new networking users and corresponding old users having the same industry short message number, the same user call information and the same first user feature information according to the first mapping table, and then remove the new networking users and corresponding old users having different second user feature information in the suspected re-networking user list from the suspected re-networking user list according to the second mapping table, and finally, detecting the account opening state and the communication state of the user number of the old user in the suspected re-networking user list, and determining whether the new networking user corresponding to the old user is the re-networking user according to the detection result, so that whether the new networking user is the re-networking user of the corresponding old user is accurately identified, and the method is high in identification accuracy, small in calculated amount and fast in identification period.
It will be understood by those of ordinary skill in the art that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, or suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as is well known to those skilled in the art.
Finally, it should be noted that: the above embodiments are only used for illustrating the technical solutions of the present disclosure, and not for limiting the same; while the present disclosure has been described in detail with reference to the foregoing embodiments, those of ordinary skill in the art will understand that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present disclosure.

Claims (8)

1. A re-network access user identification method is characterized by comprising the following steps:
acquiring an industry short message sent to a user;
extracting an industry short message number, a user number, user call information and first user characteristic information from the industry short message;
forming a suspected re-networking user list by new networking users and old users corresponding to the new networking users with the same industry short message numbers, the same user call information and the same first user characteristic information, wherein the suspected re-networking user list comprises user numbers of the new networking users and the old users corresponding to the new networking users; and the number of the first and second groups,
detecting the current state of the user number of the old user in the suspected re-network access user list, and determining whether a new network access user corresponding to the old user is a re-network access user according to a detection result; the current state of the user number of the old user comprises a current account opening state and a current communication state;
the determining whether the new network access user corresponding to the old user is the re-network access user according to the detection result includes:
and if the current account opening state of the user number of the old user is the sold number or the current communication state is that the communication traffic is lower than a preset traffic threshold, determining the new network access user corresponding to the old user as the re-network access user.
2. The method of claim 1, further comprising:
extracting second user characteristic information from the industry short message;
after forming the suspected re-networking user list and before detecting the current state of the user number of the old user in the suspected re-networking user list, the method further comprises the following steps:
comparing whether the second user characteristic information of the new network access user and the corresponding old user in the suspected re-network access user list is the same or not; and the number of the first and second groups,
and if the two users are different, removing the new network access user and the old user corresponding to the new network access user from the suspected re-network access user list.
3. The method of claim 2, wherein the first user characteristic information comprises: user card number information; the second user characteristic information includes: and extracting user information according to preset keywords in the industry short message and the short message sending date.
4. A re-entry network subscriber identification system, comprising:
the acquisition module is used for acquiring the industry short message sent to the user;
the extraction module is used for extracting an industry short message number, a user number, user call information and first user characteristic information from the industry short message;
the list construction module is set to form a suspected re-network user list of new network users and old users corresponding to the new network users with the same industry short message number, the same user calling information and the same first user characteristic information, wherein the suspected re-network user list comprises user numbers of the new network users and the old users corresponding to the new network users;
the detection module is set to detect the current state of the user number of the old user in the suspected re-networking user list; and the number of the first and second groups,
the determining module is set to determine whether the new network access user corresponding to the old user is the re-network access user according to the detection result of the detecting module; the current state of the user number of the old user comprises a current account opening state and a current communication state;
the determining module is specifically configured to determine a new network-accessing user corresponding to the old user as a re-network-accessing user if the current account opening state of the user number of the old user is an account number, or the current communication state is that the communication traffic is lower than a preset traffic threshold.
5. The system of claim 4,
the extraction module is also configured to extract second user characteristic information from the industry short message;
the system further comprises:
the comparison module is used for comparing whether the second user characteristic information of the new network access user and the second user characteristic information of the corresponding old user in the suspected re-network access user list are the same or not; and the number of the first and second groups,
and the removing module is set to remove the new network access user and the old user corresponding to the new network access user from the suspected re-network access user list when the comparison results of the comparison modules are different.
6. The system of claim 5, wherein the first user characteristic information comprises: user card number information; the second user characteristic information includes: and extracting user information according to preset keywords in the industry short message and the short message sending date.
7. A computer device comprising a memory and a processor, the memory having a computer program stored therein, the processor performing the method for identifying a re-entrant subscriber as claimed in any one of claims 1 to 3 when the processor executes the computer program stored in the memory.
8. A computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, performs a re-entry subscriber identification method according to any of claims 1 to 3.
CN202010624531.3A 2020-07-01 2020-07-01 Re-network user identification method, system, computer equipment and storage medium Active CN111800748B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010624531.3A CN111800748B (en) 2020-07-01 2020-07-01 Re-network user identification method, system, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010624531.3A CN111800748B (en) 2020-07-01 2020-07-01 Re-network user identification method, system, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111800748A CN111800748A (en) 2020-10-20
CN111800748B true CN111800748B (en) 2022-07-12

Family

ID=72809935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010624531.3A Active CN111800748B (en) 2020-07-01 2020-07-01 Re-network user identification method, system, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111800748B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116828404B (en) * 2023-08-02 2024-03-01 黄文良 Industry short message accurate sending method and device, electronic equipment and medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102215504A (en) * 2010-04-08 2011-10-12 中国移动通信集团甘肃有限公司 Method and system for identifying class of newly network-accessed user
WO2014094302A1 (en) * 2012-12-21 2014-06-26 华为技术有限公司 Method and device for judging user repeatedly accessing network
CN105959934B (en) * 2016-06-17 2019-04-02 中国联合网络通信集团有限公司 Network re-entry recognition methods and system
CN105959911B (en) * 2016-06-22 2019-07-16 中国联合网络通信集团有限公司 Identify the method and device of user
CN106973379B (en) * 2017-05-25 2019-12-03 中国联合网络通信集团有限公司 Network re-entry recognition methods and device
CN110290513B (en) * 2019-07-05 2021-10-15 中国联合网络通信集团有限公司 Identification method and system for re-network access user

Also Published As

Publication number Publication date
CN111800748A (en) 2020-10-20

Similar Documents

Publication Publication Date Title
CN101651731B (en) Method and system for managing address book and mobile terminal
CN110493477B (en) Fraud number identification method, device, equipment and storage medium
CN107094291B (en) System, method and terminal for preventing telecommunication fraud
CN109474923B (en) Object recognition method and device, and storage medium
CN103916541A (en) Automatic record eliminating method and mobile terminal
CN109688273B (en) Reminding method, reminding device, terminal and storage medium
CN110611929A (en) Abnormal user identification method and device
CN111800748B (en) Re-network user identification method, system, computer equipment and storage medium
CN107872446B (en) Communication account management method and device and server
CN109246280B (en) Address book cloud processing method and device, computer equipment and readable storage medium
CN108696873B (en) False user identification method and device
CN108198086B (en) Method and device for identifying disturbance source according to communication behavior characteristics
CN103220390A (en) Method and terminal for marking newest contact ways of contacts
CN108924840B (en) Blacklist management method and device and terminal
CN111949421A (en) SDK calling method and device, electronic equipment and computer readable storage medium
CN107483700B (en) Method and device for identifying bad number
CN109121137B (en) Method and device for identifying user number use type of double-card terminal
CN112188474B (en) Re-network user identification method, platform, computer equipment and storage medium
CN113132991B (en) Card raising identification method, system and device
US20130210381A1 (en) Apparatus and account management method of communication device
CN112311933B (en) Sensitive information shielding method and system
CN114168423A (en) Abnormal number calling monitoring method, device, equipment and storage medium
US20070297409A1 (en) Message indentification system and method
CN112839335A (en) Number identification method, device, equipment and medium
EP3509283A1 (en) Communication information hiding realization method and realization system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant