CN105574172A - Data analysis method and analysis system - Google Patents

Data analysis method and analysis system Download PDF

Info

Publication number
CN105574172A
CN105574172A CN201510955402.1A CN201510955402A CN105574172A CN 105574172 A CN105574172 A CN 105574172A CN 201510955402 A CN201510955402 A CN 201510955402A CN 105574172 A CN105574172 A CN 105574172A
Authority
CN
China
Prior art keywords
data
suspect
configuration file
clue
hints
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510955402.1A
Other languages
Chinese (zh)
Inventor
陈志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ruian Technology Co Ltd
Original Assignee
Beijing Ruian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ruian Technology Co Ltd filed Critical Beijing Ruian Technology Co Ltd
Priority to CN201510955402.1A priority Critical patent/CN105574172A/en
Publication of CN105574172A publication Critical patent/CN105574172A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a data analysis method and an analysis system. The method comprises steps as follows: a configuration file is edited; an inquiry clue is generated according to the configuration file; a database is inquired according to the inquiry clue, and clue data about a criminal suspect are acquired; criminal suspect information is generated according to the configuration file and the clue data about the criminal suspect. The data analysis method and the analysis system can aid a worker handling a case in quickly positioning valuable information in the massive data, the criminal suspect is determined automatically, a large amount of time and police strength is saved, the operation efficiency of the system is high, and a potential dangerous object can be found and locked in first time.

Description

A kind of data analysing method and analytic system
Technical field
The present invention relates to data processing technique, particularly relate to a kind of data analysing method and analytic system.
Background technology
Current, the attack of terrorism is becoming increasingly rampant, and effective anti-terrorism means are all being looked in the whole world.Along with the development of internet, offender is by Network Capture and send bulk information, by with excavating to the Appropriate application of these information can effectively hit and prevent criminal activity.
The existing analytical approach for criminal activity comprises Manual analysis method, based on the analytic approach of picture showing and social network analysis method.But all analytic approachs also only rest in the aspect of Manual analysis at present, namely remain the criminal network analytic approach of the so-called first generation.This analytical approach is when huge data volume, and efficiency is lower, has certain randomness.Personnel in charge of the case needs to rely on experience for many years in boundless and indistinct data, on purpose find the information oneself thinking useful, and in fact the acquisition of data still completes by manpower.Meanwhile, need to excavate further, retrieve to determine potential danger object toward contact after personnel in charge of the case gets useful information, make case handling efficiency low.
Summary of the invention
The invention provides a kind of data analysing method and analytic system, find valuable information to help personnel in charge of the case's quick position in mass data and automatically determine suspect, save plenty of time and police strength, simultaneity factor operational efficiency is high, can find the very first time and lock potential danger object.
First aspect, embodiments provides a kind of data analysing method, comprising:
Editor's configuration file;
According to described configuration file generated query clue;
Suspect's hints data is obtained according to described inquiry clue Query Database;
Suspect's information is generated according to described configuration file and described suspect's hints data.
Second aspect, the embodiment of the present invention additionally provides a kind of data analysis system, comprising:
Configuration file editor module, for editing configuration file;
Inquiry clue generation module, for according to described configuration file generated query clue;
Hints data acquisition module, for obtaining suspect's hints data according to described inquiry clue Query Database;
Statistical information generation module, for generating suspect's information according to described configuration file and described suspect's hints data.
The present invention is by editor's configuration file, utilize the configuration file generated query clue that editor is complete, and then obtain suspect's hints data by inquiry clue and finally obtain suspect's information, solve personnel in charge of the case to need on purpose find in mass data by rule of thumb and oneself think valuable information and the inefficiency brought and the problem that suspect cannot be determined the very first time, find valuable information to help personnel in charge of the case's quick position in mass data and automatically determine suspect, save plenty of time and police strength, simultaneity factor operational efficiency is high, can find the very first time and lock potential danger object.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the data analysing method that the embodiment of the present invention one provides;
Fig. 2 is the process flow diagram of the data analysing method that the embodiment of the present invention two provides;
Fig. 3 is the structural representation of the data analysis system that the embodiment of the present invention three provides;
Fig. 4 is the structural representation of the data analysis system that the embodiment of the present invention four provides;
Fig. 5 is the sequence chart of the data analysis system that the embodiment of the present invention four provides;
Fig. 6 is the process flow diagram of the data analysing method that the embodiment of the present invention five provides.
Embodiment
Below in conjunction with drawings and Examples, the present invention is described in further detail.Be understandable that, specific embodiment described herein is only for explaining the present invention, but not limitation of the invention.It also should be noted that, for convenience of description, illustrate only part related to the present invention in accompanying drawing but not entire infrastructure.
Embodiment one
The process flow diagram of the data analysing method that Fig. 1 provides for the embodiment of the present invention one, the present embodiment is applicable to personnel in charge of the case and finds according to self demand of handling a case and determine the situation of potential danger object, the equipment that the method can be used by personnel in charge of the case performs as desktop computer, notebook computer, specifically comprises the steps:
Step 101, editor's configuration file;
Wherein, configuration file comprises theme, finds rule, determines multiple content such as rule and filtercondition, and such as theme can be " propagating XX video by mail ".Find that rule comprises and multiplely can be used for cascade inquiry with the discovery subelement obtaining result, each discovery subelement comprises database-name, database protocol, cascade query source, the local data base type of association and the associate field etc. of correspondence that concrete needs are inquired about.Filtercondition comprises the data time section etc. of whether linked database and inquiry.Determine that rule comprises the Chinese of the clue determined, the instructions such as the next stage inquiry field that this clue is specified.Configuration file, except comprising above-mentioned main contents, also comprises the position of each field preservation of the Query Result returned and gets the command information of field accordingly.Configuration file in this programme can according to difference handle a case demand adaptation adjustment, existing template is simply arranged.
Step 102, according to described configuration file generated query clue;
Wherein, comprise according to configuration file and local data base generated query clue according to configuration file generated query clue.Configuration file will generate many inquiry clues after editor according to the field recorded in the difference of self configuration file and local data base.Local data base only have recorded a small amount of critical field information, and its result returned according to each inquiry external data base upgrades.This inquiry clue contains the database-name of inquiry and the field of suspicion data, for inquiring about external data base and obtaining the content of the respective field of the pre-inquiry that external data base returns.
Step 103, obtain suspect's hints data according to described inquiry clue Query Database;
Wherein, obtain suspect's hints data according to inquiry clue Query Database to comprise: obtain suspect's hints data according to inquiry clue by query interface inquiry external data base.External data base comprises basic database, high-volume database and full-text database.The data recorded in basic database comprise the Back ground Informations such as phone number, ID (identity number) card No., name, the data recorded in high-volume database comprise the web site name of login, ip address, network account, adsl information, domain name, network address, login time, login place and login account etc. sent by network and obtaining information time the related data that stays, the data recorded in full-text database comprise some text category informations such as mail text, short message text and message text.This three classes database is not preserved due to reasons such as data volume are large, level of security is high in this locality, carries out data access inquiry when needs are inquired about by external interface.Inquire about suspect's hints data of obtaining and comprise the login account, user name etc. of suspect when using website, and the information such as the name relevant with the identity of suspect own, telephone number, mailbox, address and identification card number.Because inquiring about the difference of the information recorded in clue and database, the suspect's hints data returned also is not quite similar.As only have recorded suspect's login account and reserved mailbox in database, then only comprising the box name of suspect's login account information and use thereof by inquiring about the suspect's hints data returned, concrete suspect cannot be navigated to by this inquiry clue.
Step 104, generate suspect according to described configuration file and described suspect's hints data and add up letter;
Wherein, generate suspect's information according to described configuration file and described suspect's hints data to comprise: directly generate suspect's information according to described configuration file and described suspect's hints data; Or according to described configuration file and described suspect's hints data Query Database, generate suspect's information, wherein said suspect's information comprises suspect's identification card number and suspect location.When asked for by information trunk in step 103 after suspect's hints data, the information that this suspect's hints data obtains due to different inquiry situations can uniquely specify a certain suspect, as inquired ID (identity number) card No..When the suspect's data message obtained uniquely can not specify suspect, during as inquired a user name or phone number, then need to inquire about finally uniquely determine suspect further according to this suspect's hints data.Whether this suspect's hints data found finally can determine that the regular record of unique suspect is in configuration file, comprises in the configuration file mentioned and really establishes rules, arrange this part in step 101.Therefore then directly generate suspect's information when suspect's hints data uniquely can specify suspect, when suspect's hints data uniquely cannot specify this suspect, then continue Query Database finally to determine unique suspect according to this suspect's hints data.If suspect's hints data is phone number, then by determining that the suspect's ID (identity number) card information opening this phone number is finally to determine this suspect's identity to the further inquiry of this phone number.
The technical scheme that the present embodiment provides, by editor's configuration file, utilize the configuration file generated query clue that editor is complete, and then obtain suspect's hints data by inquiry clue and finally obtain suspect's information, solve personnel in charge of the case to need on purpose find in mass data by rule of thumb and oneself think valuable information and the inefficiency brought and the problem that suspect cannot be determined the very first time, find valuable information to help personnel in charge of the case's quick position in mass data and automatically determine suspect, save plenty of time and police strength, simultaneity factor operational efficiency is high, can find the very first time and lock potential danger object.
On the basis of technique scheme, after obtaining suspect's hints data according to inquiry clue Query Database, also comprise: described suspect's hints data to be preserved in the buffer and in suspect's hints data to described local data base described in synchronized update.Suspect's hints data is kept at the acquisition of data when buffer memory is convenient at Query Database and generates suspect's information.Suspect's hints data is saved to local data base to be convenient to again inquire about, can directly returns results when local data base has during the suspect's hints data meeting inquiry clue.
Embodiment two
The process flow diagram of the data analysing method that Fig. 2 provides for the embodiment of the present invention two, the present embodiment is applicable to personnel in charge of the case and is found by configuration file and determine potential danger object, it can be used as suspect, the equipment that the method can be used by personnel in charge of the case performs as desktop computer, notebook computer, specifically comprises the steps:
Step 201, read configuration file obtain local data library information;
Wherein, read configuration file and find rule to obtain.
Step 202, according to configuration file and local data library information generated query clue.
Wherein, configuration file will generate many inquiry clues after editor according to the field recorded in the difference of self configuration file and local data base.Local data base only have recorded a small amount of key message, and its result returned according to each inquiry external data base upgrades.This inquiry clue contains the database-name of inquiry and the field of suspicion data, for inquiring about external data base and obtaining the content of the respective field of the pre-inquiry that external data base returns
Step 203, according to inquiry thread calls external inquiry interface;
Wherein, the database that different external interface is corresponding different, main Basis of Database database, high-volume database and full-text database.The data recorded in basic database comprise the Back ground Informations such as phone number, ID (identity number) card No., name, the data recorded in high-volume database comprise the web site name of login, network address, login time, login place and login account medium sent by network and obtaining information time the related data that stays, the data recorded in full-text database comprise some text category informations such as mail text, short message text and message text.
Step 204, inquiry number of days is set, and inquires about full-text database, high-volume database and basic database respectively;
Wherein, inquiry number of days is defaulted as 1 day, can carry out self-definedly arranging adjustment according to actual conditions.
Step 205, be saved to middle database by inquiring about suspect's hints data of obtaining;
Wherein, middle database can be that one or more oracle shows, and is specifically designed to the suspect's hints data deposited and inquire.
Step 206, reading configuration file obtain and determine rule;
Wherein, determine that the specific implementation of rule can for determining a rope of serving as theme in many suspect's hints data, for sky, attribute corresponding after this main thread then can not assert that this main thread uniquely can determine suspect's identity, if attribute corresponding after this main thread is empty, then this attribute another interrogation model corresponding, inquires about finally to determine unique suspect by this interrogation model again.
The suspect's hints data preserved in step 207, reading middle database, and according to determining that rule obtains suspect's information;
Wherein, suspect's information directly can generate according to suspect's hints data, and the attribute as corresponding after main thread in step 206 is empty; Or according to suspect's hints data Query Database again, generate suspect information, if attribute information corresponding after the main thread data determined in step 206 is for empty.
Step 208, judge whether all conditions inquiry complete, if inquire about complete, perform step 209, if do not inquire about complete, perform step 203.
Step 209, end.
The technical scheme of the present embodiment, determine to inquire about clue by reading configuration file and local data base, obtain suspect's hints data by inquiry clue recursive call external interface Query Database and finally obtain the suspect's information uniquely can determining suspect, solve personnel in charge of the case to need on purpose find in mass data by rule of thumb and oneself think valuable information and the inefficiency brought and the problem that suspect cannot be determined the very first time, find valuable information to help personnel in charge of the case's quick position in mass data and automatically determine suspect, save plenty of time and police strength, simultaneity factor operational efficiency is high, can find the very first time and lock potential danger object.
Embodiment three
Figure 3 shows that the structural representation of the data analysis system that the embodiment of the present invention three provides, the present embodiment is applicable to personnel in charge of the case and finds according to self demand of handling a case and determine the situation of potential danger object, and the concrete structure of this system comprises:
Configuration file editor module 31, for editing configuration file;
Inquiry clue generation module 32, for according to described configuration file generated query clue;
Hints data acquisition module 33, for obtaining suspect's hints data according to described inquiry clue Query Database;
Statistical information generation module 34, for generating suspect's information according to described configuration file and described suspect's hints data.
The technical scheme of the present embodiment, the editor of configuration file is completed by configuration file editor module 31, utilize inquiry clue generation module 32 generated query clue, and then obtain suspect's hints data by hints data acquisition module 33 and obtain suspect's information eventually through statistical information generation module 34, solve personnel in charge of the case to need on purpose find in mass data by rule of thumb and oneself think valuable information and the inefficiency brought and the problem that suspect cannot be determined the very first time, find valuable information to help personnel in charge of the case's quick position in mass data and automatically determine suspect, save plenty of time and police strength, simultaneity factor operational efficiency is high, can find the very first time and lock potential danger object.
Further, configuration file comprises theme, finds rule, determines at least one in rule and filtercondition.
Further, inquire about clue generation module 32 specifically for: according to described configuration file and local data base generated query clue.
Further, inquire about clue and comprise the database-name of inquiry and the field of suspicion data.
Further, hints data acquisition module 33 specifically for: according to inquiry clue by query interface inquiry external data base obtain suspect's hints data, external data base comprises at least one in basic database, high-volume database and full-text database.
Further, the data recorded in basic database comprise at least one in phone number, ID (identity number) card No., name, sex and age, the data recorded in high-volume database comprise at least one in the web site name of login, network address, login time, login place and login account, and the data recorded in full-text database comprise at least one in mail text, short message text and message text.
Further, suspect's hints data comprises at least one in the login account of suspect, user name, name, age, sex, telephone number, mailbox, address and identification card number.
Further, hints data acquisition module 33, also for: by suspect's hints data preserve in the buffer and synchronized update suspect hints data in local data base.
Further, statistical information generation module 34 specifically for: directly generate suspect's information according to configuration file and suspect's hints data; Or according to configuration file and suspect's hints data Query Database, generate suspect's information, wherein suspect's information comprises suspect's identification card number and suspect location.
Embodiment four
The structural representation of the data analysis system that Fig. 4 provides for the embodiment of the present invention four, the present embodiment is applicable to personnel in charge of the case and is found by configuration file and determine potential danger object, and the concrete structure of this system comprises: suspect builds module 41, database operating modules 42, data analysis extraction module 43, suspect's hints data operational module 44, suspect's information operating module 45 and cache interface 46.As shown in Figure 5, Fig. 5 is the sequence chart of the data analysis system that the embodiment of the present invention four provides to work schedule between modules.As shown in the figure, suspect builds module and fetches data from database operating modules, call to analyze after receiving feedback information and extract operation layer, first data analysis extraction module reads buffer memory extracting rule configuration information, afterwards data analysis is extracted and build suspect, then the suspect's persistence process constructed is carried out ASSOCIATE STATISTICS operation by suspect's information operating module to the suspect built.
The technical scheme of the present embodiment, solve personnel in charge of the case to need on purpose find in mass data by rule of thumb and oneself think valuable information and the inefficiency brought and the problem that suspect cannot be determined the very first time, find valuable information to help personnel in charge of the case's quick position in mass data and automatically determine suspect, save plenty of time and police strength, simultaneity factor operational efficiency is high, can find the very first time and lock potential danger object.
The said goods can perform the method that any embodiment of the present invention provides, and possesses the corresponding functional module of manner of execution and beneficial effect.
Embodiment five
Fig. 6 is the process flow diagram of the data analysing method that the embodiment of the present invention five provides.The present embodiment based on above-described embodiment, can provide a kind of preferred embodiment.
More succinct language is adopted to be described this programme in the present embodiment.
As shown in the figure, first get a day data and be loaded on buffer memory from middle database, the object being loaded on buffer memory is entire system travelling speed is accelerated.Specify corresponding data object after loaded, reading local data base builds and waits to land and land data to internal memory simultaneously.Wherein data to be landed are directly to determine the data of suspect, and as user name, website log account etc., data of having landed are the data message uniquely can specifying suspect, as ID (identity number) card No. etc.In the present embodiment, the discovery procedure of suspect and building process (namely land process) are combined, in discovery and building process, different model rule is called for different data messages, as shown in the figure, when the data message obtained is cell-phone number, IMSI number and ADSL time-division three kinds of different situations process, first branches into according to cell-phone number/IMSI number structure suspect, second branches into according to cell-phone number, IMSI number and ADSL tri-kinds of information architecture suspects, 3rd branches into according to No. ADSL structure suspect, if judge in the 3rd branch, the ADSL virtual identity got in three months is greater than 20 and namely thinks that this ADSL is that public network uses, suspect is not built to the virtual identity got, if the virtual identity obtained in three months is less than 20, think that this ADSL virtual identity possesses certain component suspect and is worth, so carry out the operation building suspect.Wherein, namely the first two branch completes the data encapsulation object of " one-time authentication " after building, if the result obtained is landed, clue input database be synchronized to buffer memory will be landed, land data landed objects of statistics according to this, and can be used for further analysis and landed suspect.If this result is data to be landed, then will data inputting database be landed be synchronized to buffer memory and obtain objects of statistics to be landed.Though obtain be landed objects of statistics or objects of statistics to be landed all will by next round inquire about obtain, as the information source of " secondary checking ", until data are all landed i.e. suspect's identity and uniquely confirmed.
Note, above are only preferred embodiment of the present invention and institute's application technology principle.Skilled person in the art will appreciate that and the invention is not restricted to specific embodiment described here, various obvious change can be carried out for a person skilled in the art, readjust and substitute and can not protection scope of the present invention be departed from.Therefore, although be described in further detail invention has been by above embodiment, the present invention is not limited only to above embodiment, when not departing from the present invention's design, can also comprise other Equivalent embodiments more, and scope of the present invention is determined by appended right.

Claims (10)

1. a data analysing method, is characterized in that, comprising:
Editor's configuration file;
According to described configuration file generated query clue;
Suspect's hints data is obtained according to described inquiry clue Query Database;
Suspect's information is generated according to described configuration file and described suspect's hints data.
2. data analysing method according to claim 1, is characterized in that, described configuration file comprises theme, finds rule, determines at least one in rule and filtercondition.
3. data analysing method according to claim 1, is characterized in that, describedly comprises according to described configuration file generated query clue:
According to described configuration file and local data base generated query clue.
4. data analysing method according to claim 3, is characterized in that, described inquiry clue comprises the database-name of inquiry and the field of suspicion data.
5. data analysing method according to claim 1, is characterized in that, describedly obtains suspect's hints data according to described inquiry clue Query Database and comprises:
Obtain suspect's hints data according to described inquiry clue by query interface inquiry external data base, described external data base comprises at least one in basic database, high-volume database and full-text database.
6. data analysing method according to claim 5, it is characterized in that, the data recorded in described basic database comprise at least one in phone number, ID (identity number) card No., name, the data recorded in described high-volume database comprise at least one in the web site name of login, ip address, network account, adsl information, domain name, network address, login time, login place and login account, and the data recorded in described full-text database comprise at least one in mail text, short message text and message text.
7. data analysing method according to claim 5, is characterized in that, described suspect's hints data comprises at least one in the login account of suspect, user name, name, telephone number, mailbox, address and identification card number.
8. data analysing method according to claim 3, is characterized in that, described obtain suspect's hints data according to described inquiry clue Query Database after, also comprise:
Described suspect's hints data to be preserved in the buffer and in suspect's hints data to described local data base described in synchronized update.
9. data analysing method according to claim 1, is characterized in that, describedly generates suspect's information according to described configuration file and described suspect's hints data and comprises:
Suspect's information is directly generated according to described configuration file and described suspect's hints data; Or
According to described configuration file and described suspect's hints data Query Database, generate suspect's information, wherein said suspect's information comprises suspect's identification card number and suspect location.
10. a data analysis system, is characterized in that, comprising:
Configuration file editor module, for editing configuration file;
Inquiry clue generation module, for according to described configuration file generated query clue;
Hints data acquisition module, for obtaining suspect's hints data according to described inquiry clue Query Database;
Statistical information generation module, for generating suspect's information according to described configuration file and described suspect's hints data.
CN201510955402.1A 2015-12-17 2015-12-17 Data analysis method and analysis system Pending CN105574172A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510955402.1A CN105574172A (en) 2015-12-17 2015-12-17 Data analysis method and analysis system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510955402.1A CN105574172A (en) 2015-12-17 2015-12-17 Data analysis method and analysis system

Publications (1)

Publication Number Publication Date
CN105574172A true CN105574172A (en) 2016-05-11

Family

ID=55884303

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510955402.1A Pending CN105574172A (en) 2015-12-17 2015-12-17 Data analysis method and analysis system

Country Status (1)

Country Link
CN (1) CN105574172A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107870988A (en) * 2017-10-17 2018-04-03 厦门市美亚柏科信息股份有限公司 A kind of information verification method, terminal device and storage medium
CN108334529A (en) * 2017-03-31 2018-07-27 北京安天网络安全技术有限公司 It is a kind of to utilize the method and system for disclosing big data acquisition attacker's information
CN109558420A (en) * 2018-11-23 2019-04-02 北京锐安科技有限公司 Data query method, apparatus, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102789482A (en) * 2012-06-29 2012-11-21 安科智慧城市技术(中国)有限公司 Method and system for identifying criminal suspect by utilizing oral confession and electronic equipment
US20140101124A1 (en) * 2012-10-09 2014-04-10 The Dun & Bradstreet Corporation System and method for recursively traversing the internet and other sources to identify, gather, curate, adjudicate, and qualify business identity and related data
CN103914532A (en) * 2014-03-31 2014-07-09 安徽新华博信息技术股份有限公司 Analyzing method for automatically troubleshooting suspects
CN104202578A (en) * 2014-09-27 2014-12-10 江阴延利汽车饰件股份有限公司 Method for automatically identifying criminal suspects
CN104572615A (en) * 2014-12-19 2015-04-29 深圳中创华安科技有限公司 Method and system for on-line case investigation processing
CN104717073A (en) * 2015-03-19 2015-06-17 张文 Personal information sharing, personal information sharing method and identity authentication method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102789482A (en) * 2012-06-29 2012-11-21 安科智慧城市技术(中国)有限公司 Method and system for identifying criminal suspect by utilizing oral confession and electronic equipment
US20140101124A1 (en) * 2012-10-09 2014-04-10 The Dun & Bradstreet Corporation System and method for recursively traversing the internet and other sources to identify, gather, curate, adjudicate, and qualify business identity and related data
CN103914532A (en) * 2014-03-31 2014-07-09 安徽新华博信息技术股份有限公司 Analyzing method for automatically troubleshooting suspects
CN104202578A (en) * 2014-09-27 2014-12-10 江阴延利汽车饰件股份有限公司 Method for automatically identifying criminal suspects
CN104572615A (en) * 2014-12-19 2015-04-29 深圳中创华安科技有限公司 Method and system for on-line case investigation processing
CN104717073A (en) * 2015-03-19 2015-06-17 张文 Personal information sharing, personal information sharing method and identity authentication method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
何军: "大数据与侦查模式变革研究", 《中国人民公安大学学报(社会科学版)》 *
毛鹤: "浅谈"大数据"背景下侦查工作的变化与发展", 《佳木斯职业学院学报》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108334529A (en) * 2017-03-31 2018-07-27 北京安天网络安全技术有限公司 It is a kind of to utilize the method and system for disclosing big data acquisition attacker's information
CN107870988A (en) * 2017-10-17 2018-04-03 厦门市美亚柏科信息股份有限公司 A kind of information verification method, terminal device and storage medium
CN109558420A (en) * 2018-11-23 2019-04-02 北京锐安科技有限公司 Data query method, apparatus, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110309264B (en) Method and device for acquiring geographic product data based on knowledge graph
CN103929429B (en) Network Vulnerability Scanning System and method based on RESTful Web services
Zhang et al. A historical probability based noise generation strategy for privacy protection in cloud computing
US9905051B2 (en) Context-aware tagging for augmented reality environments
CN104809404A (en) Data layer system of information security attack-defense platform
CN112165462A (en) Attack prediction method and device based on portrait, electronic equipment and storage medium
CN111104579A (en) Identification method and device for public network assets and storage medium
CN106650799A (en) Electronic evidence classification extraction method and system
CN109684402A (en) One kind being based on big data platform metadata genetic connection implementation method
Feng et al. Digital forensics challenges to big data in the cloud
CN106534784A (en) Acquisition analysis storage statistical system for video analysis data result set
CN107103011A (en) The implementation method and device of terminal data search
CN111488594A (en) Authority checking method and device based on cloud server, storage medium and terminal
CN103731429A (en) Method and device for web application vulnerability detection
CN105574172A (en) Data analysis method and analysis system
Actoriano et al. Forensic Investigation on WhatsApp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2
CN109905492A (en) Operation safety management system and method based on distributed modular data center
CN113923003A (en) Attacker portrait generation method, system, equipment and medium
CN106294401A (en) Automatically the method and device in SQL list storehouse is set up
CN103763150A (en) Data acquisition system
CN112003884B (en) Method for collecting network assets and retrieving natural language
CN107862016A (en) A kind of collocation method of the thematic page
Benkhelifa et al. Framework for mobile devices analysis
CN109408479A (en) Daily record data adding method, system, computer equipment and storage medium
CN107220262A (en) Information processing method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160511