Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, terminal equipment and storage medium for automatically mining business middlemen

An automatic mining and intermediary technology, applied in the field of information processing, can solve problems such as the inability to quickly locate the hierarchical relationship of the industrial chain, difficulty in tracking, and difficulty in meeting the needs of actual combat, so as to reduce the workload of research and judgment and facilitate the analysis of research and judgment.

Active Publication Date: 2020-10-09
XIAMEN MEIYA PICO INFORMATION
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the current mobile phone forensics products, only the communication between two people can be displayed, and there is no effective means to analyze and locate the business intermediary in the industry chain, and then comprehensively analyze the relationship of the entire industry chain. Difficult dilemma
[0004] With the increasing storage capacity of smartphones and the emergence of various applications, the amount of mobile phone forensics data is increasing. By manually analyzing the relationship between the two, it is impossible to quickly locate the hierarchical relationship of the entire industrial chain, and it is easy Missing hidden clue information, it is difficult to meet the needs of actual combat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, terminal equipment and storage medium for automatically mining business middlemen
  • Method, terminal equipment and storage medium for automatically mining business middlemen
  • Method, terminal equipment and storage medium for automatically mining business middlemen

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0039] see Figure 1-Figure 5 As shown, the present invention provides a method for automatically mining business intermediaries,

[0040] The concrete process of the method described in the present invention is as follows:

[0041] S1: Extracting the identity feature attribute of the object to be mined from the mobile phone forensic data: input the mobile phone forensic data, extract at least one identity feature attribute of the object to be mined from the input mobile phone forensic data,

[0042] In addition, a user-specified value can be input, and the user-specified value is an attribute value of an identity characteristic of a known business intermediary associated with the object to be mined, so as to improve the correctness of the analysis result. That is, in order to improve the correctness of identity feature analysis, users are allowed to specify some known attribute values ​​in advance during identity feature analysis. For example, users can manually set a certai...

Embodiment 2

[0067] The present invention also provides a terminal device for automatically mining business intermediaries, including a memory, a processor, and a computer program stored in the memory and operable on the processor. When the processor executes the computer program, the The steps in the above-mentioned method embodiments of the embodiments of the present invention, for example Figure 1-Figure 4 Method steps for steps shown.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for automatically mining business middlemen. The method includes steps of S1, inputting mobile phone forensics data, extracting at least one identity characteristic attribute of each to-be-mined object from the inputted mobile phone forensics data and carrying out the step S2; S2, calling corresponding analytical models to carry out mining analysis on the to-be-mined objects according to each identity characteristic attribute, extracted at the step S1, of each to-be-mined object, acquiring credibility values of types of the business middlemen corresponding to each identity characteristic attribute and carrying out the step S3; S3, comprehensively computing credibility values of the to-be-mined objects according to the credibility values, obtained at the step S2, of the types of the business middlemen corresponding to each identity characteristic attribute of each to-be-mined object and weights of the types of the business middlemen so as to obtain certain business middleman belonging results of the to-be-mined objects. The to-be-mined objects with the credibility values comprehensively computed at the step S3 belong to the types of the certain business middlemen.

Description

technical field [0001] The invention relates to the technical field of information processing, in particular to a method for automatically mining a business middleman, a terminal device and a storage medium. Background technique [0002] At this stage, most of the cybercrimes are organized and divided criminal groups, and present a trend of industrialization. [0003] In the current mobile phone forensics products, only the communication between two people can be displayed, and there is no effective means to analyze and locate the business intermediary in the industry chain, and then comprehensively analyze the relationship of the entire industry chain. Difficult predicament. [0004] With the increasing storage capacity of smartphones and the emergence of various applications, the amount of mobile phone forensics data is increasing. By manually analyzing the relationship between the two, it is impossible to quickly locate the hierarchical relationship of the entire industr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/2458G06F16/28
Inventor 林文楷江汉祥曾超蔡淋强
Owner XIAMEN MEIYA PICO INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products