Summary of the invention
In view of the above problems, the present invention has been proposed, in order to a kind of overcome the problems referred to above or the information inquiry that addresses the above problem at least in part and Notification Method and device are provided.
According to one aspect of the present invention, a kind of information inquiry and Notification Method are provided, comprise step: the identity information that reception and authentication of users are submitted to; In the situation that be verified, preserve user's identity information; Travel through on the internet Website page, extraction meets the identity information of predefined identity information rule and sets up index; And the identity information that utilizes described search index user, and to the user notification Query Result.
Alternatively, in information inquiry and Notification Method according to an embodiment of the invention, described identity information comprises one or more in passport NO., finance account number, telephone number, address information, postcode, e-mail address.
Alternatively, in information inquiry and Notification Method according to an embodiment of the invention, in the step of the identity information that described reception and authentication of users are submitted to, the identity information that utilizes predefined identity information database to come authentication of users to submit to.
Alternatively, in information inquiry and Notification Method according to an embodiment of the invention, in the described step that travels through on the internet Website page, utilize web crawlers to travel through on the internet Website page.
Alternatively, in information inquiry and Notification Method according to an embodiment of the invention, utilize described search index user's identity information and in the step of user notification Query Result described, when receiving the query requests of user's proposition, utilize the described user's of described search index identity information, and to described user notification Query Result.
Alternatively, in information inquiry and Notification Method according to an embodiment of the invention, utilize described search index user's identity information and in the step of user notification Query Result described, with the predefined time cycle, utilize described all users' of search index identity information, and when inquiring user's identity information in described index, to corresponding user notification Query Result.
Alternatively, in information inquiry and Notification Method according to an embodiment of the invention, described Query Result comprises quantity, network address, the issuing time of the Website page of the identity information that comprises the user.
According to a further aspect in the invention, also provide a kind of information inquiry and notifying device, having comprised: identity information receives and authentication module, is suitable for receiving and identity information that authentication of users is submitted to; The identity information memory module is suitable in the situation that be verified preservation user's identity information; Identity information extracts and index module, is suitable for traveling through on the internet Website page, extracts meet the identity information of predefined identity information rule and set up index; And inquiry and notification module, be suitable for utilizing described search index user's identity information, and to the user notification Query Result.
Alternatively, in information inquiry and notifying device according to an embodiment of the invention, described identity information comprises one or more in passport NO., finance account number, telephone number, address information, postcode, e-mail address.
Alternatively, in information inquiry and notifying device according to an embodiment of the invention, described identity information receives and authentication module utilizes predefined identity information database to come the identity information of authentication of users submission.
Alternatively, in information inquiry and notifying device according to an embodiment of the invention, described identity information extracts and index module utilizes web crawlers to travel through on the internet Website page.
Alternatively, in information inquiry and notifying device according to an embodiment of the invention, described inquiry and notification module utilize the described user's of described search index identity information when receiving the query requests of user's proposition, and to described user notification Query Result.
Alternatively, in information inquiry and notifying device according to an embodiment of the invention, described inquiry and notification module are with the predefined time cycle, utilize described all users' of search index identity information, and when inquiring user's identity information in described index, to corresponding user notification Query Result.
Alternatively, in information inquiry and notifying device according to an embodiment of the invention, described Query Result comprises quantity, network address, the issuing time of the Website page of the identity information that comprises the user.
The invention provides a kind of information inquiry and Notification Method.According to embodiments of the invention, the identity information that reception and authentication of users are submitted to, in the situation that be verified the identity information of preserving the user, travel through on the internet Website page, extraction meets the identity information of predefined identity information rule and sets up index, utilize described search index user's identity information, and to the user notification Query Result.Thus, the present invention is directed to the internet identity information leaks this great information security issue solution is provided, the user can submit the identity information type of wishing to leak inquiry to, for example ID (identity number) card No., bank's card number etc., know leak case in the situation that exist identity information to leak, in time take corresponding measure, evade that identity information is maliciously usurped by other people and the various risks that produce.In addition, the various advice methods such as mobile phone short message, multimedia message, Email also are convenient to the situation that the user knows that in time identity information leaks.
Above-mentioned explanation is only the general introduction of technical solution of the present invention, for can clearer understanding technological means of the present invention, and can be implemented according to the content of instructions, and for above and other objects of the present invention, feature and advantage can be become apparent, below especially exemplified by the specific embodiment of the present invention.
Embodiment
Exemplary embodiment of the present disclosure is described below with reference to accompanying drawings in more detail.Although shown exemplary embodiment of the present disclosure in accompanying drawing, yet should be appreciated that and to realize the disclosure and the embodiment that should do not set forth limits here with various forms.On the contrary, it is in order to understand the disclosure more thoroughly that these embodiment are provided, and can with the scope of the present disclosure complete convey to those skilled in the art.
Fig. 1 schematically illustrates the process flow diagram of information inquiry according to an embodiment of the invention and Notification Method 100.According to embodiments of the invention, each step in method 100 can be carried out by server end.Alternatively, described server end can comprise one or more servers, and described server can be the server of any type, includes but not limited to file server, database server and apps server etc.
As shown in Figure 1, method 100 starts from step S101, wherein, and the identity information that reception and authentication of users are submitted to.For example, the user can submit the identity information of wishing to carry out the anti-leak inquiry to by the user end to server end.
According to embodiments of the invention, described client can be any electronic equipment with call function, includes but not limited to following electronic equipment: mobile phone, panel computer, notebook, desk-top computer, network telephone, audio/video player, interaction of multimedia information equipment etc.For example, the user can submit identity information to server end by the mode of mobile phone short message, webpage that can be by above-mentioned various electronic equipment access services device ends also can be submitted identity information to server end by Email or other various communication modes to submit identity information to.
According to embodiments of the invention, described identity information can comprise one or more in passport NO. (for example ID (identity number) card No., passport number, drivers license number, number-plate number etc.), finance account number (for example bank account number, bank's card number, network finance account number etc.), telephone number (for example fixed telephone number and Mobile Directory Number etc.), address information, postcode, e-mail address.
In step S101, the identity information that can utilize predefined identity information database to come authentication of users to submit to.Alternatively, described predefined identity information database for example can comprise the information in the telephone number database of the database of national citizen ID certificate number inquiry service centre (NCIIS) and each large telecom operators.For example, when the user submits its ID (identity number) card No. to by the user end to server end, just can utilize the information in described predefined identity information database to verify whether this ID (identity number) card No. is the user's of this name real ID (identity number) card No.; When the user submits its phone number to by the user end to server end, just can utilize the information in described predefined identity information database to verify whether this phone number is this user's real phone number.
Next, in step S103, in the situation that above-mentioned being verified preserved user's identity information.For example, the subscriber identity information that is verified can be saved in the database of server end.And in the unsanctioned situation of above-mentioned checking, the identity information of can refusing user's submitting to.
After step S103, execution in step S105 wherein, travels through Website page on the internet, extracts meet the identity information of predefined identity information rule and set up index.Alternatively, can utilize web crawlers to travel through on the internet Website page.Web crawlers can be sought other webpage by the chained address of webpage, from a certain webpage of website, read the content of webpage, find other chained addresses in this webpage, then seek other webpage by these chained addresses, circulation is so always gone down.Only as a kind of example, principle of the present invention is not limited to this to Adoption Network reptile traversal Website page take the crawl content, and those skilled in the art can also adopt alternate manner to grasp on the internet web page contents.
After grabbing web page contents, just can therefrom extract the identity information that meets predefined identity information rule.According to embodiments of the invention, described predefined identity information rule for example can comprise ID (identity number) card No. proof rule, address information proof rule, postcode proof rule, number verification rule, e-mail address proof rule etc.Take the ID card verification rule as example, can extract independently 15 or 18 bit digital from the web page contents that utilizes web crawlers to grab, verify first whether these 15 or 18 bit digital meet China's resident identification card number composition rule, for legal number, the information of calling again in national citizen ID certificate number inquiry service centre (NCIIS) database is carried out authenticity verification to ID (identity number) card No., and the ID (identity number) card No. that is verified is the identity information that meets predefined identity information rule.And for address information proof rule and postcode proof rule, (for example to extract the address keyword from the web page contents that utilizes web crawlers to grab, Chinese binary based on dictionary is divided word algorithm) and 6 bit digital independently, this 6 bit digital and existing postcode list are compared, to determine that whether this 6 bit digital is as postcode; And the address keyword in address keyword and postal address (ADDR is compared, in the situation that matching degree surpasses predefined threshold value, think that namely this address keyword meets described address information proof rule.Described predefined threshold value can arrange according to actual needs, and higher threshold value can make legal result less, but rate of false alarm is lower; Lower threshold value can make legal result more, but rate of false alarm is higher.
After extraction meets the identity information of predefined identity information rule, just can set up thus index.Alternatively, can also build inquiry system in the database of server end.
After step S105, execution in step S107 wherein, utilizes described search index user's identity information, and to the user notification Query Result.Alternatively, can utilize the described user's of described search index identity information when receiving the query requests of user's proposition, and to described user notification Query Result; Also can utilize described all users' of search index identity information with the predefined time cycle, and when inquiring user's identity information in described index, to corresponding user notification Query Result.That is to say, the mode of inquiry and notice can be divided into passive and initiatively two kinds, both can inquire about when the user proposes query requests and to the user notification Query Result, also can be at set intervals just active inquire about and to the user notification Query Result.In the mode of active inquiry and notice, can only leak ability to the user notification Query Result in the situation that inquire identity information.According to embodiments of the invention, can comprise message etc. in mobile phone short message, multimedia message, Email, identity information query web station to the mode of user notification Query Result.In addition, in the identity information query web, the function that can also provide the historical query result to check and retrieve for the user.
According to embodiments of the invention, described Query Result comprises quantity, network address, the issuing time of the Website page of the identity information that comprises the user.Referring to Fig. 2, wherein show the schematic diagram at the interface of Query Result according to an embodiment of the invention.As shown in Figure 2, in the interface of Query Result, the quantity, network address, issuing time of the Website page of relevant exposure subscriber identity information are provided (namely, " open-assembly time ") information, in addition, also provide about information such as the total identity information leakage rate of all users, inquiry amount, identity information leakage age distribution, area distribution, Sex distributions.
The invention provides a kind of information inquiry and Notification Method.According to embodiments of the invention, the identity information that reception and authentication of users are submitted to, in the situation that be verified the identity information of preserving the user, travel through on the internet Website page, extraction meets the identity information of predefined identity information rule and sets up index, utilize described search index user's identity information, and to the user notification Query Result.Thus, the present invention is directed to the internet identity information leaks this great information security issue solution is provided, the user can submit the identity information type of wishing to leak inquiry to, for example ID (identity number) card No., bank's card number etc., know leak case in the situation that exist identity information to leak, in time take corresponding measure, evade that identity information is maliciously usurped by other people and the various risks that produce.In addition, the various advice methods such as mobile phone short message, multimedia message, Email also are convenient to the situation that the user knows that in time identity information leaks.
Corresponding with said method 100, the present invention also provides a kind of information inquiry and notifying device 200.Fig. 3 schematically illustrates the block diagram of information inquiry according to an embodiment of the invention and notifying device 200, client and internet.As shown in Figure 3, device 200 comprises that identity information receives and authentication module 201, identity information memory module 203, identity information extract and index module 205, inquiry and notification module 207.According to embodiments of the invention, the prison identity information receives and authentication module 201, identity information memory module 203, identity information extract and index module 205, inquiry and notification module 207 can be the modules that is positioned at server end, and they can be respectively used to carry out step S101, S103, S105, S107 in said method 100.
According to embodiments of the invention, identity information receives and authentication module 201 is suitable for receiving and the identity information of authentication of users submission, identity information memory module 203 is suitable in the situation that be verified, preserve user's identity information, identity information extracts and index module 205 is suitable for traveling through on the internet Website page, extraction meets the identity information of predefined identity information rule and sets up index, inquiry and notification module 207 are suitable for utilizing described search index user's identity information, and to the user notification Query Result.
At first, the identity information that identity information receives and authentication module 201 receives and authentication of users is submitted to.For example, the user can receive by the identity information of user end to server end and authentication module 201 is submitted the identity information of wishing to carry out the anti-leak inquiry to.For example, the user can receive and authentication module 201 submission identity informations to identity information by the mode of mobile phone short message, webpage that can be by various electronic equipment access services device ends also can receive and authentication module 201 submission identity informations to identity information by Email or other various communication modes to receive to identity information and authentication module 201 is submitted identity informations to.
According to embodiments of the invention, described identity information can comprise one or more in passport NO. (for example ID (identity number) card No., passport number, drivers license number, number-plate number etc.), finance account number (for example bank account number, bank's card number, network finance account number etc.), telephone number (for example fixed telephone number and Mobile Directory Number etc.), address information, postcode, e-mail address.
The identity information that identity information receives and authentication module 201 can utilize predefined identity information database to come authentication of users to submit to.Alternatively, described predefined identity information database for example can comprise the information in the telephone number database of the database of national citizen ID certificate number inquiry service centre (NCIIS) and each large telecom operators.For example, when the user receives and authentication module 201 ends when submitting its ID (identity number) card No. to identity information by client, identity information reception and authentication module 201 just can utilize the information in described predefined identity information database to verify whether this ID (identity number) card No. is the user's of this name real ID (identity number) card No.; When the user receives and authentication module 201 when submitting its phone number to identity information by client, identity information reception and authentication module 201 just can utilize the information in described predefined identity information database to verify whether this phone number is this user's real phone number.
Next, identity information memory module 203 is in the situation that above-mentioned being verified preserved the subscriber identity information by identity information receives and authentication module 201 obtains.For example, identity information memory module 203 can be saved in the subscriber identity information that is verified in the database of server end.And in the unsanctioned situation of above-mentioned checking, the identity information that 203 of identity information memory modules can refusing user's be submitted to.
Then, identity information extracts and index module 205 travels through Website page on the internet, extracts meet the identity information of predefined identity information rule and set up index.Alternatively, identity information extraction and index module 205 can utilize web crawlers to travel through on the internet Website page.Identity information extracts and index module 205 can utilize web crawlers to seek other webpage by the chained address of webpage, from a certain webpage of website, read the content of webpage, find other chained addresses in this webpage, then seek other webpage by these chained addresses, circulation is so always gone down.Identity information extracts and index module 205 Adoption Network reptiles travel through Website pages to grasp content only as a kind of example, principle of the present invention is not limited to this, and those skilled in the art can also extract with index module 205 by identity information and adopt alternate manners to grasp on the internet web page contents.
Identity information extraction and index module 205 just can therefrom be extracted the identity information that meets predefined identity information rule after grabbing web page contents.According to embodiments of the invention, described predefined identity information rule for example can comprise ID (identity number) card No. proof rule, address information proof rule, postcode proof rule, number verification rule, e-mail address proof rule etc.Take the ID card verification rule as example, identity information extracts and index module 205 can be extracted independently 15 or 18 bit digital from the web page contents that utilizes web crawlers to grab, verify first whether these 15 or 18 bit digital meet China's resident identification card number composition rule, for legal number, the information of calling again in national citizen ID certificate number inquiry service centre (NCIIS) database is carried out authenticity verification to ID (identity number) card No., and the ID (identity number) card No. that is verified is the identity information that meets predefined identity information rule.And for address information proof rule and postcode proof rule, identity information extracts and index module 205 can (for example be extracted the address keyword from the web page contents that utilizes web crawlers to grab, Chinese binary based on dictionary is divided word algorithm) and 6 bit digital independently, this 6 bit digital and existing postcode list are compared, to determine that whether this 6 bit digital is as postcode; And the address keyword in address keyword and postal address (ADDR is compared, in the situation that matching degree surpasses predefined threshold value, think that namely this address keyword meets described address information proof rule.Described predefined threshold value can arrange according to actual needs, and higher threshold value can make legal result less, but rate of false alarm is lower; Lower threshold value can make legal result more, but rate of false alarm is higher.
Identity information extraction and index module 205 just can be set up index thus after extraction meets the identity information of predefined identity information rule.Alternatively, identity information extraction and index module 205 can also build inquiry system in the database of server end.
Afterwards, inquiry and notification module 207 utilize the user's of described search index identity information memory module 203 preservations identity information, and to the user (for example, one or more client 300-1 shown in Figure 3 ..., 300-n) notice Query Result.Alternatively, inquiry and notification module 207 can utilize the described user's of described search index identity information when receiving the query requests of user's proposition, and to described user notification Query Result; Inquiry and notification module 207 also can utilize described all users' of search index identity information with the predefined time cycle, and when inquiring user's identity information in described index, to corresponding user notification Query Result.That is to say, inquiry and notification module 207 are inquired about and the mode notified can be divided into passive and two kinds of actives, inquiry and notification module 207 both can have been inquired about when the user proposes query requests and to the user notification Query Result also can be inquired about with regard to active and at set intervals to the user notification Query Result.In the mode of active inquiry and notice, inquiry and notification module 207 can only leak ability to the user notification Query Result in the situation that inquire identity information.According to embodiments of the invention, inquiry and notification module 207 can comprise message etc. in mobile phone short message, multimedia message, Email, identity information query web station to the mode of user notification Query Result.In addition, in the identity information query web, the function that inquiry and notification module 207 can also provide the historical query result to check and retrieve for the user.
According to embodiments of the invention, described Query Result comprises quantity, network address, the issuing time of the Website page of the identity information that comprises the user.Referring to Fig. 2, wherein show the schematic diagram at the interface of Query Result according to an embodiment of the invention.As shown in Figure 2, in the interface of Query Result, quantity, network address, issuing time that inquiry and notification module 207 provide the Website page of relevant exposure subscriber identity information are (namely, " open-assembly time ") information, in addition, inquiry and notification module 207 can also provide and leak the information such as age distribution, area distribution, Sex distribution about the total identity information leakage rate of all users, inquiry amount, identity information.
Respectively to install embodiment corresponding with aforementioned approaches method embodiment due to above-mentioned, therefore no longer each apparatus embodiments is described in detail.
Intrinsic not relevant to any certain computer, virtual system or miscellaneous equipment with demonstration at this algorithm that provides.Various general-purpose systems also can with based on using together with this teaching.According to top description, it is apparent constructing the desired structure of this type systematic.In addition, the present invention is not also for any certain programmed language.Should be understood that and to utilize various programming languages to realize content of the present invention described here, and the top description that language-specific is done is in order to disclose preferred forms of the present invention.
In the instructions that provides herein, a large amount of details have been described.Yet, can understand, embodiments of the invention can be in the situation that do not have these details to put into practice.In some instances, be not shown specifically known method, structure and technology, so that not fuzzy understanding of this description.
Similarly, be to be understood that, in order to simplify the disclosure and to help to understand one or more in each inventive aspect, in the description to exemplary embodiment of the present invention, each feature of the present invention is grouped together in single embodiment, figure or the description to it sometimes in the above.Yet the method for the disclosure should be construed to the following intention of reflection: namely the present invention for required protection requires the more feature of feature clearly put down in writing than institute in each claim.Or rather, as following claims reflected, inventive aspect was to be less than all features of the disclosed single embodiment in front.Therefore, follow claims of embodiment and incorporate clearly thus this embodiment into, wherein each claim itself is as independent embodiment of the present invention.
Those skilled in the art are appreciated that and can adaptively change and they are arranged in one or more devices different from this embodiment the module in the device in embodiment.Can become the some module combinations in embodiment a module or unit or assembly, and can put them into a plurality of submodules or subelement or sub-component in addition.At least some in such feature and/or process or module are mutually repelling, and can adopt any combination to disclosed all features in this instructions (comprising claim, summary and the accompanying drawing followed) and so all processes or the unit of disclosed any method or equipment make up.Unless clearly statement in addition, in this instructions (comprising claim, summary and the accompanying drawing followed), disclosed each feature can be by providing identical, being equal to or similar purpose alternative features replaces.
In addition, those skilled in the art can understand, although embodiment more described herein comprise some feature rather than further feature included in other embodiment, the combination of the feature of different embodiment mean be in scope of the present invention within and form different embodiment.For example, in claims, the one of any of embodiment required for protection can be used with array mode arbitrarily.
Each device embodiment of the present invention can realize with hardware, perhaps realizes with the software module of moving on one or more processor, and perhaps the combination with them realizes.It will be understood by those of skill in the art that and to use in practice microprocessor or digital signal processor (DSP) to realize according to some or all some or repertoire of modules in the device of the embodiment of the present invention.The present invention can also be embodied as be used to part or all the device program (for example, computer program and computer program) of carrying out method as described herein.The program of the present invention that realizes like this can be stored on computer-readable medium, perhaps can have the form of one or more signal.Such signal can be downloaded from internet website and obtain, and perhaps provides on carrier signal, perhaps provides with any other form.
It should be noted above-described embodiment the present invention will be described rather than limit the invention, and those skilled in the art can design alternative embodiment in the situation that do not break away from the scope of claims.In the claims, any reference symbol between bracket should be configured to limitations on claims.Word " comprises " not to be got rid of existence and is not listed in element or step in claim.Being positioned at word " " before element or " one " does not get rid of and has a plurality of such elements.The present invention can realize by means of the hardware that includes some different elements and by means of the computing machine of suitably programming.In having enumerated the unit claim of some devices, several in these devices can be to come imbody by same hardware branch.The use of word first, second and C grade does not represent any order.Can be title with these word explanations.