CN110166635B - Suspicious terminal identification method and suspicious terminal identification system - Google Patents

Suspicious terminal identification method and suspicious terminal identification system Download PDF

Info

Publication number
CN110166635B
CN110166635B CN201910623219.XA CN201910623219A CN110166635B CN 110166635 B CN110166635 B CN 110166635B CN 201910623219 A CN201910623219 A CN 201910623219A CN 110166635 B CN110166635 B CN 110166635B
Authority
CN
China
Prior art keywords
suspicious
mobile terminals
terminal
terminals
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910623219.XA
Other languages
Chinese (zh)
Other versions
CN110166635A (en
Inventor
袁晓静
翟京卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201910623219.XA priority Critical patent/CN110166635B/en
Publication of CN110166635A publication Critical patent/CN110166635A/en
Application granted granted Critical
Publication of CN110166635B publication Critical patent/CN110166635B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2218Call detail recording
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/36Statistical metering, e.g. recording occasions when traffic exceeds capacity of trunks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42042Notifying the called party of information on the calling party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42348Location-based services which utilize the location information of a target
    • H04M3/42357Location-based services which utilize the location information of a target where the information is provided to a monitoring entity such as a potential calling party or a call processing server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • H04M3/4365Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it based on information specified by the calling party, e.g. priority or subject
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present disclosure provides a suspicious terminal identification method and a suspicious terminal identification system, including: acquiring user behavior characteristic data of a plurality of mobile terminals; aiming at every two mobile terminals in the plurality of mobile terminals, identifying whether the two mobile terminals have a friendly relationship or not according to the user behavior characteristic data of the two mobile terminals; acquiring call record information of the two mobile terminals, and judging whether the two mobile terminals have suspicious incoming call characteristics according to the call record information; when the two mobile terminals are judged to have suspicious incoming call characteristics, determining the normal station positions of the two mobile terminals, and acquiring the position attributes corresponding to the normal station positions; judging whether the position attribute is one of a preset attribute set; and if so, identifying that the two mobile terminals are both suspicious terminals. According to the technical scheme, the identification and marking of the harassing calls in the industries such as mediation, promotion, financing, education and the like can be realized, the corresponding prompt is facilitated for the user before answering the call, and the call experience is improved.

Description

Suspicious terminal identification method and suspicious terminal identification system
Technical Field
The present disclosure relates to the field of mobile communications technologies, and in particular, to a suspicious terminal identification method and a suspicious terminal identification system.
Background
In the daily life, people often receive various harassing calls, most of the existing identification technologies need users or clients to actively mark the harassing calls, inconvenience is brought to the users, early warning cannot be given before some users answer the calls, and conversation experience is reduced.
Disclosure of Invention
The present disclosure is directed to at least one of the technical problems in the prior art, and provides a suspicious terminal identification method and a suspicious terminal identification system.
In order to achieve the above object, an embodiment of the present disclosure provides a suspicious terminal identification method, including:
acquiring user behavior characteristic data of a plurality of mobile terminals;
aiming at every two mobile terminals in the plurality of mobile terminals, identifying whether the two mobile terminals have friendly relation or not according to the user behavior characteristic data of the two mobile terminals; the two mobile terminals with friendly relations are identified to form a friend pair;
for each friend pair, the following steps are executed:
acquiring call record information of two mobile terminals contained in the friend pair, and judging whether the two mobile terminals have suspicious incoming call characteristics according to the call record information;
when the two mobile terminals are judged to have suspicious incoming call characteristics, determining the normal station positions of the two mobile terminals, and acquiring the position attribute corresponding to the normal station positions;
judging whether the position attribute is one of a preset attribute set; and if so, identifying that the two mobile terminals are both suspicious terminals.
In some embodiments, after the step of identifying that the two terminals are both suspicious terminals, the method further includes:
and marking the two mobile terminals by using the position attributes of the common station positions of the two mobile terminals.
In some embodiments, after the step of identifying that the two mobile terminals are both suspicious terminals, the method further includes:
determining other mobile terminals passing in and out of the suspicious position by taking the positions of the ordinary places of the two mobile terminals as the suspicious position so as to be taken as target mobile terminals;
and aiming at each target mobile terminal, judging whether the target mobile terminal is a suspicious terminal according to the user behavior characteristic data of the target mobile terminal.
In some embodiments, the user behavior feature data comprises: real-time location information of the mobile terminal;
the step of judging whether the target mobile terminal is a suspicious terminal according to the user behavior feature data of the target mobile terminal specifically comprises the following steps:
acquiring the total duration of the target mobile terminal in the suspicious position according to the real-time position information of the target mobile terminal;
judging whether the total duration is greater than a preset duration threshold value or not; if yes, the target mobile terminal is judged to be a suspicious terminal.
In some embodiments, further comprising:
and sending the position attribute and the telephone number corresponding to the suspicious terminal to a suspicious telephone processing system.
In order to achieve the above object, an embodiment of the present disclosure provides a suspicious terminal identification system, including:
the first acquisition module is used for acquiring user behavior characteristic data of a plurality of mobile terminals;
the first identification module is used for identifying whether the two mobile terminals have friendly relation or not according to the user behavior characteristic data of the two mobile terminals aiming at any two mobile terminals in the plurality of mobile terminals; the two mobile terminals with friendly relations are identified to form a friend pair;
the second acquisition module is used for acquiring the call record information of the two mobile terminals contained in each friend pair and judging whether the two mobile terminals have suspicious incoming call characteristics according to the call record information;
the first determining module is used for determining the permanent location positions of the two mobile terminals and acquiring the position attribute corresponding to the permanent location positions when the two mobile terminals are judged to have the suspicious incoming call characteristics;
the first judging module is used for judging whether the position attribute is one of a preset attribute set or not;
and the second identification module is used for identifying that the two mobile terminals are suspicious terminals when the first judgment module judges that the position attribute is one of the preset attribute sets.
In some embodiments, the suspicious terminal identification system further comprises:
and the marking module is used for marking the two mobile terminals by using the position attributes of the normal station positions of the two mobile terminals when the second identification module identifies that the two mobile terminals are both suspicious terminals.
In some embodiments, the suspicious terminal identification system further comprises:
the second determining module is used for determining other mobile terminals passing in and out of the suspicious position as target mobile terminals by taking the ordinary station positions of the two mobile terminals as suspicious positions when the second identifying module identifies that the two mobile terminals are both the suspicious terminals;
and the second judgment module is used for judging whether the target mobile terminal is a suspicious terminal or not according to the user behavior characteristic data of the target mobile terminal aiming at each target mobile terminal.
In some embodiments, the user behavior feature data comprises: real-time location information of the mobile terminal;
the second judging module includes:
the acquiring unit is used for acquiring the total duration of the suspicious position of the target mobile terminal according to the real-time position information of the target mobile terminal;
the judging unit is used for judging whether the total duration is greater than a preset duration threshold value or not; if yes, the target mobile terminal is judged to be a suspicious terminal.
In some embodiments, the suspicious terminal identification system further comprises:
and the sending module is used for sending the position attribute and the telephone number corresponding to the suspicious terminal to a suspicious telephone processing system when the second identification module identifies that the two mobile terminals are both the suspicious terminal.
The suspicious terminal identification method and the suspicious terminal identification system provided by the embodiment of the disclosure can realize that the friendly relationship between the mobile terminals is judged by performing linkage identification, whether the mobile terminal with the friendly relationship is a suspicious terminal is judged by using the call record information and the property of the normal position, and meanwhile, more suspicious terminals can be marked according to the normal position of the suspicious terminal, and the suspicious terminal information is sent to the suspicious telephone processing system, so that early warning is provided before the user answers the telephone.
Drawings
Fig. 1 is a flowchart of a suspicious terminal identification method according to an embodiment of the present disclosure;
fig. 2 is a flowchart of another suspicious terminal identification method according to an embodiment of the present disclosure;
fig. 3 is a flowchart of another suspicious terminal identification method according to an embodiment of the present disclosure;
FIG. 4 is a flowchart illustrating a specific implementation of step S9 according to an embodiment of the present disclosure;
fig. 5 is a flowchart of a suspicious terminal identification method according to an embodiment of the present disclosure;
fig. 6 is a block diagram of a suspicious terminal identification system according to an embodiment of the present disclosure.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present disclosure, a suspicious terminal identification method and a suspicious terminal identification system provided by the present disclosure are described in detail below with reference to the accompanying drawings.
The suspicious terminal identification method and the suspicious terminal identification system can be used for judging whether the mobile terminal has suspicious incoming call characteristics according to the friendly relation and the call record information among the mobile terminals, determining whether the mobile terminal is a suspicious terminal according to the position of a permanent station, and determining the attribute type, thereby identifying and marking the suspicious terminal.
Fig. 1 is a flowchart of a suspicious terminal identification method according to an embodiment of the present disclosure.
As shown in fig. 1, the suspicious terminal identification method includes:
and step S1, acquiring user behavior characteristic data of a plurality of mobile terminals.
In practical application, the user behavior feature data is obtained from a user behavior feature library, and the user behavior feature data comprises: traffic usage, software usage, traffic data, user data, location information, and the like.
And step S2, aiming at any two mobile terminals in the plurality of mobile terminals, identifying whether the two mobile terminals have friendly relations or not according to the user behavior characteristic data of the two mobile terminals.
Wherein, two mobile terminals with friendly relations are identified to form a friend pair. Whether two mobile terminals have a friendship or not, i.e. whether the users of both mobile terminals are friendship or not.
In practical applications, taking the co-workers as an example, if the users of two mobile terminals are in the co-workers, the time and the location of using the mobile terminals and the usage of the mobile phone software will have a common point, and the basis for identifying the co-workers includes: the times and time of two mobile terminals entering and exiting the same place reach a certain threshold value, or the mobile phone software interaction condition similar to two users who are mutually WeChat friends is met.
For each friend pair, the following steps S3 to S6 are performed:
and step S3, acquiring the call record information of the two mobile terminals, and judging whether the two mobile terminals have suspicious incoming call characteristics according to the call record information.
In step S3, the two mobile terminals are a buddy pair. When judging that the two mobile terminals do not meet the suspicious incoming call characteristics, completing the identification of the two mobile terminals, namely completing the identification of the current friend pair, and subsequently performing the step S3 again for the next friend pair; when it is determined that both the mobile terminals have the suspicious incoming call feature, step S4 is executed.
In practical applications, the suspicious incoming call features may be specifically expressed as: the outgoing call frequency is greater than the preset frequency threshold value in a certain fixed time period, and the average call duration in the certain fixed time period is less than the preset duration threshold value.
And step S4, determining the normal station positions of the two mobile terminals, and acquiring the position attribute corresponding to the normal station positions.
In practical application, the position coordinates corresponding to the permanent locations of the two mobile terminals are mapped to an actual geographic map, a building or an office place corresponding to the geographic location is obtained, and a location attribute (such as an industry attribute of insurance, mediation, promotion, financing, education and the like) corresponding to the permanent location is obtained. The resident location is a location where the mobile terminal with the suspicious incoming call feature frequently makes a call.
Step S5, determine whether the location attribute is one of the predetermined attribute sets.
In practical applications, the predetermined set of attributes includes: industry attributes such as mediation, promotion, financing, education, etc.; it should be noted that the position attribute included in the predetermined attribute set may be preset and adjusted according to actual needs.
In step S5, if the determination result is yes, go to step S6; and if the judgment result is negative, finishing the identification of the two mobile terminals.
And step S6, identifying that the two mobile terminals are suspicious terminals.
In practical application, when the resident position of the mobile terminal with the suspicious incoming call characteristic is an organization which can achieve the marketing purpose by dialing a harassing call, the mobile terminal is identified as the suspicious terminal.
The embodiment of the disclosure provides a suspicious terminal identification method, which can be used for judging and constructing a friend pair through a friendly relation between mobile terminals, and judging whether two mobile terminals in the friend pair are suspicious terminals or not by using call record information and a permanent location attribute.
Fig. 2 is a flowchart of another suspicious terminal identification method according to an embodiment of the present disclosure. As shown in fig. 2, the suspicious terminal identification method provided in this embodiment not only includes the above steps S1-S6, but also includes, after step S6: step S7. Only step S7 will be described in detail below.
And step S7, marking the two mobile terminals by using the position attributes of the ordinary station positions of the two mobile terminals.
In practical application, the suspicious terminal is marked, so that the attribute mark corresponding to the suspicious terminal is sent to the corresponding called party once the suspicious terminal calls the telephone in the subsequent monitoring of the suspicious terminal, and the reminding effect is achieved.
The embodiment of the disclosure provides a suspicious terminal identification method, which can be used for carrying out attribute marking on an identified mobile terminal so as to remind a harassing call called user in the following process.
Fig. 3 is a flowchart of another suspicious terminal identification method according to an embodiment of the present disclosure. As shown in fig. 3, the suspicious terminal identification method provided in this embodiment not only includes the above steps S1-S6, but also includes, after step S6: step S8 and step S9. Only step S8 and step S9 will be described in detail below.
And step S8, taking the ordinary station positions of the two mobile terminals as suspicious positions, and determining other mobile terminals passing in and out of the suspicious positions as target mobile terminals.
Step S9, for each target mobile terminal, determining whether the target mobile terminal is a suspicious terminal according to the user behavior feature data of the target mobile terminal.
Fig. 4 is a flowchart illustrating a specific implementation method of step S9 according to an embodiment of the disclosure. As shown in fig. 4, the user behavior feature data includes: real-time location information of the mobile terminal. Step S9 specifically includes: step S901 to step S904.
Step S901, obtaining a total duration of the suspicious location of the target mobile terminal according to the real-time location information of the target mobile terminal.
And step S902, judging whether the total time length is greater than a preset time length threshold value.
If yes, go to step S903; if the determination result is negative, step S904 is executed.
And step S903, identifying the target mobile terminal as a suspicious terminal.
And step S904, recognizing that the target mobile terminal is not a suspicious terminal.
In practical application, whether the target mobile terminal is a suspicious terminal or not can be judged by taking the information of the call record, the position of the permanent station and the like as a judgment basis, and specific algorithms are not illustrated one by one here.
The embodiment of the disclosure provides a suspicious terminal identification method, which can be used for selecting a target mobile terminal associated with a determined suspicious terminal through relevance identification, and judging whether the target mobile terminal is the suspicious terminal or not from specific conditions, so as to achieve the purpose of identifying a large number of suspicious terminals.
Fig. 5 is a flowchart of a suspicious terminal identification method according to an embodiment of the present disclosure. As shown in fig. 5, the suspicious terminal identification method provided in this embodiment not only includes the above steps S1-S6, but also includes, after step S6: step S10. Only step S10 will be described in detail below.
And step S10, sending the position attribute and the telephone number corresponding to the suspicious terminal to the suspicious telephone processing system.
In practical application, the suspicious telephone processing system can not only realize monitoring and recording of the suspicious terminal, but also send related information when other systems inquire the suspicious terminal so as to allow other systems to reference the identification result.
It should be noted that different steps in the above embodiments of the present disclosure may be combined with each other to form a new technical solution; specifically, at least two of step S7 in the embodiment shown in fig. 2, step S8 and step S9 in fig. 3, and step S10 in the embodiment shown in fig. 4 are combined with step S1 to step S6 in the embodiment shown in fig. 1.
The embodiment of the disclosure provides a suspicious terminal identification method, which can be used for judging a friendly relationship between mobile terminals, judging whether the mobile terminal with the friendly relationship is a suspicious terminal by using call record information and a permanent location attribute, and finally sending suspicious terminal information to a suspicious telephone processing system so as to realize early warning before a user answers a call.
Fig. 6 is a block diagram of a suspicious terminal identification system according to an embodiment of the present disclosure. As shown in fig. 6, the suspicious terminal identification system may be configured to implement the suspicious terminal identification method provided in the foregoing embodiments, where the suspicious terminal identification system includes: the device comprises a first obtaining module 1, a first identifying module 2, a second obtaining module 3, a first determining module 4, a first judging module 5 and a second identifying module 6.
The first obtaining module 1 is configured to obtain user behavior feature data of a plurality of mobile terminals.
The first identification module 2 is configured to identify, for every two arbitrary mobile terminals in the plurality of mobile terminals, whether the two mobile terminals have a friendship relationship according to the user behavior feature data of the two mobile terminals.
Wherein, two mobile terminals with friendly relations are identified to form a friend pair.
And the second obtaining module 3 is configured to obtain, for each friend pair, call record information of two mobile terminals included in the friend pair, and determine whether the two mobile terminals both have suspicious incoming call features according to the call record information.
And the first determining module 4 is configured to determine the permanent locations of the two mobile terminals and obtain a location attribute corresponding to the permanent location when it is determined that the two mobile terminals both have the suspicious incoming call feature.
A first determining module 5, configured to determine whether the location attribute is one of the predetermined attribute sets.
And the second identification module 6 is configured to identify that the two mobile terminals are both suspicious terminals when the first determination module 5 determines that the location attribute is one of the predetermined attribute sets.
In some embodiments, the suspicious terminal identification system further comprises: a marking module 7.
And the marking module 7 is configured to mark the two mobile terminals by using the position attributes of the ordinary station positions of the two mobile terminals when the second identification module 6 identifies that the two mobile terminals are both suspicious terminals.
In some embodiments, the suspicious terminal identification system further comprises: a second determination module 8 and a second decision module 9.
And the second determining module 8 is configured to determine, when the second identifying module 6 identifies that the two mobile terminals are both suspicious terminals, other mobile terminals that have entered and exited the suspicious locations by using the ordinary station locations of the two mobile terminals as suspicious locations, so as to serve as target mobile terminals.
And a second judging module 9, configured to judge, for each target mobile terminal, whether the target mobile terminal is a suspicious terminal according to the user behavior feature data of the target mobile terminal.
In some embodiments, the user behavior feature data comprises: real-time location information of the mobile terminal. The second determination module 9 includes: an acquisition unit 901 and a judgment unit 902.
An obtaining unit 901, configured to obtain a total duration that the target mobile terminal is located in a suspicious location according to the real-time location information of the target mobile terminal.
A determining unit 902, configured to determine whether the total duration is greater than a predetermined duration threshold.
If the determination result of the determining unit 902 is yes, the second determining module 9 determines that the target mobile terminal is a suspicious terminal.
In some embodiments, the suspicious terminal identification system further comprises: a sending module 10.
And the sending module 10 is configured to send the location attribute and the phone number corresponding to the suspicious terminal to the suspicious phone processing system when the second identifying module 6 identifies that the two mobile terminals are both suspicious terminals.
It should be noted that, for the specific execution process of each module and the relation between each module in this embodiment, reference may be made to corresponding contents in the foregoing suspicious terminal identification method embodiment, and details are not described here again.
The suspicious terminal identification method and the suspicious terminal identification system provided by the embodiment of the disclosure can realize that a friend pair is established by judging the friendly relationship between mobile terminals, whether two mobile terminals in the friend pair are suspicious terminals is judged by using the call record information and the location attribute of a permanent site, then more suspicious terminals are marked from the relevance, and finally the suspicious terminal information is sent to the suspicious telephone processing system, so that the early warning before the user answers the telephone is realized, and the call experience of the user is improved.
It is to be understood that the above embodiments are merely exemplary embodiments that are employed to illustrate the principles of the present disclosure, and that the present disclosure is not limited thereto. It will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the disclosure, and these are to be considered as the scope of the disclosure.

Claims (8)

1. A suspicious terminal identification method is characterized by comprising the following steps:
acquiring user behavior characteristic data of a plurality of mobile terminals;
aiming at every two mobile terminals in the plurality of mobile terminals, identifying whether the two mobile terminals have friendly relation or not according to the user behavior characteristic data of the two mobile terminals; the two mobile terminals with friendly relations are identified to form a friend pair;
for each friend pair, the following steps are executed:
acquiring call record information of two mobile terminals contained in the friend pair, and judging whether the two mobile terminals have suspicious incoming call characteristics according to the call record information;
when the two mobile terminals are judged to have suspicious incoming call characteristics, determining the normal station positions of the two mobile terminals, and acquiring the position attribute corresponding to the normal station positions;
judging whether the position attribute is one of a preset attribute set; if so, identifying that the two mobile terminals are both suspicious terminals;
determining other mobile terminals passing in and out of the suspicious position by taking the positions of the ordinary places of the two mobile terminals as the suspicious position so as to be taken as target mobile terminals;
and aiming at each target mobile terminal, judging whether the target mobile terminal is a suspicious terminal according to the user behavior characteristic data of the target mobile terminal.
2. The method according to claim 1, wherein after the step of identifying that the two terminals are both suspicious terminals, the method further comprises:
and marking the two mobile terminals by using the position attributes of the common station positions of the two mobile terminals.
3. The suspicious terminal identification method according to claim 1, wherein the user behavior feature data comprises: real-time location information of the mobile terminal;
the step of judging whether the target mobile terminal is a suspicious terminal according to the user behavior feature data of the target mobile terminal specifically comprises the following steps:
acquiring the total duration of the target mobile terminal in the suspicious position according to the real-time position information of the target mobile terminal;
judging whether the total duration is greater than a preset duration threshold value or not; if yes, the target mobile terminal is judged to be a suspicious terminal.
4. The suspicious terminal identification method according to any one of claims 1 to 3, characterized by further comprising:
and sending the position attribute and the telephone number corresponding to the suspicious terminal to a suspicious telephone processing system.
5. A suspicious terminal identification system, comprising:
the first acquisition module is used for acquiring user behavior characteristic data of a plurality of mobile terminals;
the first identification module is used for identifying whether the two mobile terminals have friendly relation or not according to the user behavior characteristic data of the two mobile terminals aiming at any two mobile terminals in the plurality of mobile terminals; the two mobile terminals with friendly relations are identified to form a friend pair;
the second acquisition module is used for acquiring the call record information of the two mobile terminals contained in each friend pair and judging whether the two mobile terminals have suspicious incoming call characteristics according to the call record information;
the first determining module is used for determining the permanent location positions of the two mobile terminals and acquiring the position attribute corresponding to the permanent location positions when the two mobile terminals are judged to have the suspicious incoming call characteristics;
the first judging module is used for judging whether the position attribute is one of a preset attribute set or not;
the second identification module is used for identifying that the two mobile terminals are both suspicious terminals when the first judgment module judges that the position attribute is one of the preset attribute sets;
the second determining module is used for determining other mobile terminals passing in and out of the suspicious position as target mobile terminals by taking the ordinary station positions of the two mobile terminals as suspicious positions when the second identifying module identifies that the two mobile terminals are both the suspicious terminals;
and the second judgment module is used for judging whether the target mobile terminal is a suspicious terminal or not according to the user behavior characteristic data of the target mobile terminal aiming at each target mobile terminal.
6. The suspicious terminal identification system according to claim 5, further comprising:
and the marking module is used for marking the two mobile terminals by using the position attributes of the normal station positions of the two mobile terminals when the second identification module identifies that the two mobile terminals are both suspicious terminals.
7. The suspicious terminal identification system according to claim 5, wherein said user behavior feature data comprises: real-time location information of the mobile terminal;
the second judging module includes:
the acquiring unit is used for acquiring the total duration of the suspicious position of the target mobile terminal according to the real-time position information of the target mobile terminal;
the judging unit is used for judging whether the total duration is greater than a preset duration threshold value or not; if yes, the target mobile terminal is judged to be a suspicious terminal.
8. The suspicious terminal identification system according to any one of claims 5 to 7, further comprising:
and the sending module is used for sending the position attribute and the telephone number corresponding to the suspicious terminal to a suspicious telephone processing system when the second identification module identifies that the two mobile terminals are both the suspicious terminal.
CN201910623219.XA 2019-07-11 2019-07-11 Suspicious terminal identification method and suspicious terminal identification system Active CN110166635B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910623219.XA CN110166635B (en) 2019-07-11 2019-07-11 Suspicious terminal identification method and suspicious terminal identification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910623219.XA CN110166635B (en) 2019-07-11 2019-07-11 Suspicious terminal identification method and suspicious terminal identification system

Publications (2)

Publication Number Publication Date
CN110166635A CN110166635A (en) 2019-08-23
CN110166635B true CN110166635B (en) 2021-06-08

Family

ID=67638059

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910623219.XA Active CN110166635B (en) 2019-07-11 2019-07-11 Suspicious terminal identification method and suspicious terminal identification system

Country Status (1)

Country Link
CN (1) CN110166635B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113766069B (en) * 2021-09-06 2023-08-18 中国银行股份有限公司 Harassment call interception method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227511A (en) * 2008-01-30 2008-07-23 中兴通讯股份有限公司 Terminal and method for recognizing and controlling nuisance call
CN106534463A (en) * 2015-09-15 2017-03-22 中国移动通信集团公司 Strange incoming call processing method, device, terminal and server
CN109600344A (en) * 2017-09-30 2019-04-09 腾讯科技(深圳)有限公司 Identify the method, apparatus and electronic equipment of risk group

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101472008B (en) * 2007-12-28 2011-06-15 中国移动通信集团公司 Method and corresponding system for identifying and controlling disturbance telephone
US9179259B2 (en) * 2012-08-01 2015-11-03 Polaris Wireless, Inc. Recognizing unknown actors based on wireless behavior
CN104853357B (en) * 2015-04-21 2018-07-10 杭州东信北邮信息技术有限公司 A kind of method and system of automatic identification and triggering swindle number
CN109819126B (en) * 2017-11-21 2021-08-17 中移(杭州)信息技术有限公司 Abnormal number identification method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227511A (en) * 2008-01-30 2008-07-23 中兴通讯股份有限公司 Terminal and method for recognizing and controlling nuisance call
CN106534463A (en) * 2015-09-15 2017-03-22 中国移动通信集团公司 Strange incoming call processing method, device, terminal and server
CN109600344A (en) * 2017-09-30 2019-04-09 腾讯科技(深圳)有限公司 Identify the method, apparatus and electronic equipment of risk group

Also Published As

Publication number Publication date
CN110166635A (en) 2019-08-23

Similar Documents

Publication Publication Date Title
US7895154B2 (en) Communication reputation
US10154141B2 (en) System and method for automatic intention evaluation and communication routing
CN104821991A (en) Method for mobile terminal to carry out communication and mobile terminal
CN103647882B (en) For the processing method of strangeness numbers, system and equipment in communication
CN102611746B (en) Method and system for sharing contact person information
JP2013005205A (en) Ill-motivated telephone call prevention device and ill-motivated telephone call prevention system
CN105450827A (en) Call processing method, user terminal and server
CN107920154A (en) The processing method and terminal of Stranger Calls
CN109995929A (en) Processing method, the processing method of account information, device and the storage medium of operation
CN104363569A (en) Method for recommending optimal contact ways to mobile subscriber based on context awareness
US20100257157A1 (en) Communication device, communication analysis method, and communication analysis program
CN113727352A (en) Managing spoofed calls to mobile devices
RU2615683C2 (en) Method and device for communication identification performance
CN110166635B (en) Suspicious terminal identification method and suspicious terminal identification system
CN105704337A (en) Number-marking method and system
CN104394258B (en) The method and apparatus that contact method change to communication object is handled
CN1984496B (en) Jamming information in a presence service system
KR101764920B1 (en) Method for determining spam phone number using spam model
CN104506743A (en) Method and device for dynamically intercepting call
CN106888229B (en) Call management method and server
CN103141071B (en) For the method and apparatus managing urgent call
CN108933857A (en) The processing method and processing device of secondary user's harassing call of distributing telephone numbers
CN107018235A (en) Call the treating method and apparatus of unmanned response
CN112307075B (en) User relationship identification method and device
CN114338915A (en) Caller ID risk identification method, caller ID risk identification device, caller ID risk identification equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant