CN101437255A - Method for filtering and dogging theft suspect mobile phone number of mobile communication base station - Google Patents

Method for filtering and dogging theft suspect mobile phone number of mobile communication base station Download PDF

Info

Publication number
CN101437255A
CN101437255A CNA2007100098315A CN200710009831A CN101437255A CN 101437255 A CN101437255 A CN 101437255A CN A2007100098315 A CNA2007100098315 A CN A2007100098315A CN 200710009831 A CN200710009831 A CN 200710009831A CN 101437255 A CN101437255 A CN 101437255A
Authority
CN
China
Prior art keywords
base station
numbers
suspicion
occur
mobile communication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CNA2007100098315A
Other languages
Chinese (zh)
Inventor
邱明
林妙钦
张锦辉
吴远恒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Fujian Co Ltd
Original Assignee
China Mobile Group Fujian Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Fujian Co Ltd filed Critical China Mobile Group Fujian Co Ltd
Priority to CNA2007100098315A priority Critical patent/CN101437255A/en
Publication of CN101437255A publication Critical patent/CN101437255A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a method for screening and locking mobile phone numbers of suspects stealing a mobile communication base station, which is characterized by comprising the following steps: immediately extracting mobile phone numbers registered in the base station in the time period when a communication base station gives an alarm; extracting mobile phone numbers registered in the base station again after predicting that a stealer needs N hours to leave a coverage area of the station; comparing the numbers extracted twice and eliminating repeated numbers and numbers which do not appear in the first extraction, classifying the remaining numbers as first class numbers and storing the numbers in a suspicion number base; comparing the numbers in the suspicion number base and screening key suspicion numbers according to repeated times of the numbers; and locking and tracking the key suspicion numbers in real time through an LCS system. The method can determine the stealing suspects.

Description

Screening of suspect's phone number and locking means are stolen in the mobile communication base station
Technical field
The present invention relates to the mobile communication base station and steal screening of suspect's phone number and the method and apparatus that locks.
Background technology
The mobile communications network scale enlarges day by day in recent years; for satisfying communication requirement; the communication base station layout is also progressively enlarging; coverage is more and more wider; but the problem of following is the base station, and stolen case rises year by year, causes the mobile communication base station signal blocker, influences users' communication; bring very big being stranded to scratch for daily base station maintenance work, mobile communication enterprise is caused great direct economic loss.
The stolen phenomenon in base station mainly occurs in the base station, suburb of personnel's rareness, it is short to steal the molecule crime time, and has very strong flowability and sudden, when attendant and public security officer are on the scene, steal molecule and make an escape already, can't carry out timely and effective strike stealing the behavior of destruction communications facility.
Along with developing rapidly of mobile communication and finishing smoothly of project of "Communication with Every Village", the popularity rate of mobile phone is very high, steals the lawless person of base station, connects each other during for crime, and mobile phone is its indispensable means of communication.At present, by mobile communications network network management monitoring platform, can inquire a certain moment, receive all phone numbers of a certain stolen base station signal, be the suspicion number but can't discern which phone number, and which phone number is general user's number.
Summary of the invention
Technical problem to be solved by this invention is that exploitation one cover filters out suspect's number of stealing communication base station and locks and real-time tracking in conjunction with the system of the stolen alarm in base station, pilferage suspect phone number screening and LCS location.
Solve the problems of the technologies described above, the invention provides a kind of screening and lock the method for stealing mobile communication base station suspect's phone number, it is characterized in that may further comprise the steps:
When communication base station is alarmed, extract this time immediately in this base station mobile phone numbers registered;
Estimating that stealing molecule left this overlay area, station after required time N hour, was extracted in this base station mobile phone numbers registered once more;
The number of extracted twice is compared, reject number that repeats and the number that in extracting for the first time, does not occur, the remainder number is decided to be the one-level number, deposit suspicion number storehouse in;
Number in the suspicion number storehouse is compared,, be decided to be the secondary number if occur in record that secondary repeats and be the number that extracts from same base station;
If in record, occur repeating for three times and be extract from same base station or occur that secondary repeats but the number that extracts from different base stations is decided to be three grades of numbers;
If in record, occur repeating for four times and be extract from same base station or occur repeating for three times but the number that extracts from different base stations is decided to be the level Four number;
If in record, occur repeating more than four times and be extract from same base station or occur repeating more than three times but the number that extracts from different base stations is decided to be the Pyatyi number.
Level Four, Pyatyi number are defined as emphasis suspicion number, by locking of LCS navigation system and real-time tracking.
The present invention also provides a kind of screening and locking to steal the device of mobile communication base station suspect's phone number, it is characterized in that comprising:
The mobile communication base station watch-dog is used to judge that the mobile communication base station is stolen;
The phone number comparative device is used for extracting, filters out suspicion number and deciding grade and level;
The phone number locator is used to lock emphasis suspicion number and real-time tracking.
Description of drawings
In conjunction with the accompanying drawings, other characteristics of the present invention and advantage can be from below by becoming clearer the explanation of giving an example the preferred implementation that principle of the present invention is made an explanation.
Fig. 1 is a flow chart of stealing screening of suspect's phone number and locking means according to an embodiment of the present invention mobile communication base station.
Fig. 2 is used for the schematic configuration diagram that the device of screening of suspect's phone number and locking is stolen in the mobile communication base station according to an embodiment of the present invention.
Embodiment
Below in conjunction with accompanying drawing the specific embodiment of the present invention is described in detail.
Fig. 1 is a flow chart of stealing screening of suspect's phone number and locking means according to an embodiment of the present invention mobile communication base station.This flow process starts from step 101.
In step 101, stolen alarm takes place in communication base station, the pilferage incident can be passed through the base station monitoring-controlling system preliminary judgement, when transformer, cable stolen, the alarm of civil power generation aborted takes place, base station air conditioner off-premises station, station equipment are stolen, base station intelligent door lock system generation illegal invasion or infrared warning;
In step 102, extract all phone numbers and the geographical location information of alarm time of origin in the registration of stolen base station, setting the data record of extracting is A;
In step 103, estimate to steal the suspect and left this base station signal overlay area required time N hour, after N hour, be extracted in all phone numbers and the geographical location information of stolen base station registration once more, setting the data record of extracting is B;
In step 104, relatively the data record A and the B of extracted twice reject number that repeats and the number that does not occur in extracting for the first time, and the remainder number is decided to be the one-level number, deposit suspicion number storehouse in;
In step 105, the one-level number in the suspicion number storehouse relatively if occur in record that secondary repeats and be the number that extracts from same base station, is decided to be the secondary number; If in record, occur repeating for three times and be extract from same base station or occur that secondary repeats but the number that extracts from different base stations is decided to be three grades of numbers; If in record, occur repeating for four times and be extract from same base station or occur repeating for three times but the number that extracts from different base stations is decided to be the level Four number; If in record, occur repeating more than four times and be extract from same base station or occur repeating more than three times but the number that extracts from different base stations is decided to be the Pyatyi number;
In step 106,, filter out the level Four number and be uploaded to the LCS system according to the comparative result of step 105;
In step 107,, filter out the Pyatyi number and be uploaded to the LCS system according to the comparative result of step 105;
In step 108, by LCS navigation system locking level Four, Pyatyi number, and real-time tracking.
This flow process ends at step 108.
Fig. 2 is used for the schematic configuration diagram that the device of screening of suspect's phone number and locking is stolen in the mobile communication base station according to an embodiment of the present invention.Comprise mobile communication base station watch-dog 20l, when the base station takes place stolen, watch-dog sends stolen alarm, system extracts alarm time immediately in this base station mobile phone numbers registered, estimating that stealing the suspect left this base station signal overlay area after required time N hour, be extracted in this base station mobile phone numbers registered once more, compare by phone number comparative device 202, according to the number of times that duplicates of number in the record, filter out emphasis suspicion number, carry out real-time tracking by phone number locator 203 locking suspect phone numbers then.
Though described embodiments of the present invention in conjunction with the accompanying drawings, those of ordinary skills can make various distortion or modification within the scope of the appended claims, and do not deviate from principle of the present invention and essence.Scope of the present invention is only limited by appended claims.

Claims (2)

1, a kind of screening and the method that locks pilferage mobile communication base station suspect's phone number is characterized in that may further comprise the steps:
When communication base station is alarmed, extract this time immediately in this base station mobile phone numbers registered;
Estimating that stealing molecule left this overlay area, station after required time N hour, was extracted in this base station mobile phone numbers registered once more;
The number of extracted twice is compared, reject number that repeats and the number that in extracting for the first time, does not occur, the remainder number is decided to be the one-level number, deposit suspicion number storehouse in;
Number in the suspicion number storehouse is compared,, be decided to be the secondary number if occur in record that secondary repeats and be the number that extracts from same base station;
If in record, occur repeating for three times and be extract from same base station or occur that secondary repeats but the number that extracts from different base stations is decided to be three grades of numbers;
If in record, occur repeating for four times and be extract from same base station or occur repeating for three times but the number that extracts from different base stations is decided to be the level Four number;
If in record, occur repeating more than four times and be extract from same base station or occur repeating more than three times but the number that extracts from different base stations is decided to be the Pyatyi number.
Level Four, Pyatyi number are defined as emphasis suspicion number, by locking of LCS navigation system and real-time tracking.
2, a kind of screening and the device that locks pilferage mobile communication base station suspect's phone number is characterized in that comprising:
The mobile communication base station watch-dog is used to judge that the mobile communication base station is stolen;
The phone number comparative device is used for extracting, filters out suspicion number and deciding grade and level;
The phone number locator is used to lock emphasis suspicion number and real-time tracking.
CNA2007100098315A 2007-11-16 2007-11-16 Method for filtering and dogging theft suspect mobile phone number of mobile communication base station Pending CN101437255A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNA2007100098315A CN101437255A (en) 2007-11-16 2007-11-16 Method for filtering and dogging theft suspect mobile phone number of mobile communication base station

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNA2007100098315A CN101437255A (en) 2007-11-16 2007-11-16 Method for filtering and dogging theft suspect mobile phone number of mobile communication base station

Publications (1)

Publication Number Publication Date
CN101437255A true CN101437255A (en) 2009-05-20

Family

ID=40711427

Family Applications (1)

Application Number Title Priority Date Filing Date
CNA2007100098315A Pending CN101437255A (en) 2007-11-16 2007-11-16 Method for filtering and dogging theft suspect mobile phone number of mobile communication base station

Country Status (1)

Country Link
CN (1) CN101437255A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010145172A1 (en) * 2009-09-23 2010-12-23 中兴通讯股份有限公司 Mobile-network-based interception and analysis method and system thereof
CN106102082A (en) * 2016-06-17 2016-11-09 中国联合网络通信集团有限公司 A kind of suspicion number determines method, device, system
CN107784769A (en) * 2016-08-26 2018-03-09 杭州海康威视系统技术有限公司 A kind of alarm method, apparatus and system
CN108540758A (en) * 2017-03-01 2018-09-14 中国电信股份有限公司 The processing method and system of image data
CN109151733A (en) * 2018-08-03 2019-01-04 中国联合网络通信集团有限公司 A kind of localization method and device of suspect
CN109905524A (en) * 2017-12-11 2019-06-18 中国移动通信集团湖北有限公司 Telephone number recognition methods, device, computer equipment and computer storage medium

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2010145172A1 (en) * 2009-09-23 2010-12-23 中兴通讯股份有限公司 Mobile-network-based interception and analysis method and system thereof
CN106102082A (en) * 2016-06-17 2016-11-09 中国联合网络通信集团有限公司 A kind of suspicion number determines method, device, system
CN106102082B (en) * 2016-06-17 2019-08-02 中国联合网络通信集团有限公司 A kind of suspicion number determines method, apparatus, system
CN107784769A (en) * 2016-08-26 2018-03-09 杭州海康威视系统技术有限公司 A kind of alarm method, apparatus and system
CN107784769B (en) * 2016-08-26 2020-07-31 杭州海康威视系统技术有限公司 Alarm method, device and system
CN108540758A (en) * 2017-03-01 2018-09-14 中国电信股份有限公司 The processing method and system of image data
CN109905524A (en) * 2017-12-11 2019-06-18 中国移动通信集团湖北有限公司 Telephone number recognition methods, device, computer equipment and computer storage medium
CN109905524B (en) * 2017-12-11 2020-11-20 中国移动通信集团湖北有限公司 Telephone number identification method and device, computer equipment and computer storage medium
CN109151733A (en) * 2018-08-03 2019-01-04 中国联合网络通信集团有限公司 A kind of localization method and device of suspect
CN109151733B (en) * 2018-08-03 2020-10-23 中国联合网络通信集团有限公司 Criminal suspect positioning method and device

Similar Documents

Publication Publication Date Title
CN109886204A (en) A kind of Multidimensional Awareness system based on the application of big data police service
CN101437255A (en) Method for filtering and dogging theft suspect mobile phone number of mobile communication base station
CN201508555U (en) Internet bar management system based on face recognition
CN102622818A (en) All-directional intelligent monitoring method for bank ATMs
CN102542807A (en) RFID/VFID (Radio Frequency Identification Device/Video Frequency Identification Device) comprehensive comparison intelligent vehicle management system and method
CN103489291A (en) Omni-directional wireless intelligent integrated security system
CN102956107A (en) Parking lot vehicle parking information acquisition and false license, slip license and illegal vehicle recognition system and method
CN104794795A (en) Intelligent anti-theft parking system and vehicle management method used for system
CN111710086A (en) Park passage management system and method
CN106161476A (en) A kind of security protection method and system of data in mobile phone
CN201435736Y (en) Real-name registration surfing intelligent monitoring system used in internet bars
KR20070101963A (en) Vehicle security structure based on face recognition
CN112380892A (en) Image identification method, device, equipment and medium
CN106611500A (en) Violation evidence taking and punishing device and method and violation management system
CN102426762A (en) Double-network intelligent antitheft alarm system
CN1131155C (en) Security device for the globe protection with objects with electronics components
CN1549210A (en) Vehicle parking antitheft management method and system thereof
CN113112744A (en) Security management method and device, electronic equipment and storage medium
CN108533074A (en) A kind of cloud lock theft preventing method based on NB-IOT
CN204650623U (en) Intelligent anti-theft shutdown system
CN202120325U (en) Automobile lease security management information system
CN102364529A (en) System and method for protecting manhole cover against theft
CN110070748A (en) Parking management system applied to open parking stall
CN102457612A (en) Intelligent anti-theft mobile phone
CN111489276B (en) Personnel management method and related device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication

Open date: 20090520