CN108513717B - A prompting method, terminal and server - Google Patents

A prompting method, terminal and server Download PDF

Info

Publication number
CN108513717B
CN108513717B CN201780005192.7A CN201780005192A CN108513717B CN 108513717 B CN108513717 B CN 108513717B CN 201780005192 A CN201780005192 A CN 201780005192A CN 108513717 B CN108513717 B CN 108513717B
Authority
CN
China
Prior art keywords
information
base station
terminal
server
pseudo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201780005192.7A
Other languages
Chinese (zh)
Other versions
CN108513717A (en
Inventor
朱振华
张小菊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN108513717A publication Critical patent/CN108513717A/en
Application granted granted Critical
Publication of CN108513717B publication Critical patent/CN108513717B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application discloses a prompting method, which is used for acquiring information of a real base station and information of a pseudo base station by a server according to information of events sent by a plurality of terminals, and the server obtains the information of the real base station and the information of the pseudo base station according to calculation of big data, so that the accuracy rate is higher. The embodiment of the application comprises the following steps: the server receives the information of events sent by a plurality of terminals; and the server acquires the information of the real base station and the information of the pseudo base station according to the information of the events sent by the plurality of terminals. The embodiment of the application also provides a server and a terminal.

Description

一种提示方法、终端以及服务器A prompting method, terminal and server

本申请要求于2017年1月22日提交中国专利局、申请号为201710052278.7、发明名称为“一种防范伪基站诈骗方法和设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application filed on January 22, 2017 with the application number 201710052278.7 and the title of the invention is "A method and device for preventing fake base station fraud", the entire contents of which are incorporated herein by reference Applying.

技术领域technical field

本申请涉及通信领域,尤其涉及一种提示方法、终端以及服务器。The present application relates to the field of communications, and in particular, to a prompting method, a terminal, and a server.

背景技术Background technique

随着通信技术的发展,电信诈骗的案例和手段越来越多。在众多的电信诈骗技术中,通过非法基站或者称为伪基站实施作案已经成为主流手段。这些伪基站可以伪装成运营商的基站,假冒他人号码发送诈骗短信。基于伪基站发送的短信,因为可以伪造号码所以具有非常大的迷惑性,终端用户难以辨别真假。With the development of communication technology, there are more and more cases and means of telecom fraud. Among the numerous telecommunication fraud techniques, committing crimes through illegal base stations or pseudo base stations has become the mainstream means. These fake base stations can pretend to be the base stations of operators and send fraudulent text messages using other people's numbers. The short message sent by the pseudo base station is very confusing because the number can be forged, and it is difficult for the end user to distinguish the true and false.

在现有技术中,通常识别伪基站的方法为通过终端对比基站特征参数来识别伪基站的方法和基于基站位置识别伪基站的方法。通过终端对比基站特征参数来识别伪基站的方法是:终端解析基站的特征参数,与本地预置的特征参数库进行匹配,如果在合法范围内就认为是合法的基站。否则认为是伪基站,直接从终端屏蔽接入伪基站。但是,该判断逻辑完全依赖终端,无法进行系统升级。随着伪基站技术的发展一些特征参数也是可以进行调整的,但是终端无法动态获得,容易导致误判。In the prior art, methods for identifying pseudo base stations are generally a method for identifying pseudo base stations by comparing characteristic parameters of base stations by a terminal, and a method for identifying pseudo base stations based on base station locations. The method of identifying the pseudo base station by comparing the characteristic parameters of the base station by the terminal is as follows: the terminal analyzes the characteristic parameters of the base station and matches with the local preset characteristic parameter library. If it is within the legal range, it is considered as a legal base station. Otherwise, it is considered to be a pseudo base station, and the pseudo base station is directly shielded from the terminal. However, the judgment logic is completely dependent on the terminal, and the system cannot be upgraded. With the development of pseudo base station technology, some characteristic parameters can also be adjusted, but the terminal cannot obtain it dynamically, which may easily lead to misjudgment.

基于基站位置识别伪基站的方法为:当终端收到通知类短信时,会上报短信及终端位置信息到服务器。服务器根据大量终端上报的信息进行计算,获得某个区域内的基站信息,然后与运营商基站库中的位置进行对比,不在运营商基站库中的就认为是伪基站。但是,这样的判断方式仅针对通知类消息进行判断存在风险,伪基站可以构造任意号码,所以发送的短信不一定都是通知类短信;运营商自身也存在移动基站,单从位置上比对并不完全可靠;另外终端上报的基站位置是通过算法计算获得的,本身存在误差。The method for identifying the pseudo base station based on the base station location is as follows: when the terminal receives the notification type short message, it will report the short message and the terminal location information to the server. The server calculates according to the information reported by a large number of terminals, obtains the base station information in a certain area, and then compares it with the location in the operator's base station database. If it is not in the operator's base station database, it is regarded as a pseudo base station. However, there is a risk in this judgment method only for notification messages. The pseudo base station can construct any number, so the text messages sent are not necessarily notification text messages; the operator also has mobile base stations. Not completely reliable; in addition, the base station location reported by the terminal is obtained through algorithm calculation, and there is an error in itself.

发明内容SUMMARY OF THE INVENTION

本申请实施例提供了一种提示方法、终端以及服务器,用于服务器根据多个终端上报的大数据来获取准确率比较高的真实基站的信息和伪基站的信息。Embodiments of the present application provide a prompting method, a terminal, and a server, for the server to obtain information of real base stations and information of pseudo base stations with relatively high accuracy according to big data reported by multiple terminals.

本申请实施例的第一方面提供一种提示方法,所述方法可以应用在服务器连接有多个终端的场景,所述方法可以包括:服务器接收多个终端发送的事件的信息;所述事件可以接收短信和/或来电;应理解,所述事件的信息可以是服务器接收一定数量阈值的终端上报的事件的信息,也可以是服务器接收特定阈值数量的事件的信息,还可以是,服务器接收预置时长内终端上报的事件的信息,具体此处不做限定。所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。即服务器可以根据多个终端上报的大数据进行计算,获取的真实基站的信息和伪基站的信息的准确率比较高。应理解,虽然说终端上报的数据越多,服务器所获取的真实基站的信息和伪基站的信息也就越准确,但是,这些需要在服务器的负载范围内。这里服务器获取真实基站的信息和伪基站的信息需要保存,可以确定多个终端中接入伪基站的目标终端,也可以确定下次接收第一终端上报的第一事件的信息,可以确定第一终端接入的第一基站的真伪。A first aspect of the embodiments of the present application provides a prompting method. The method can be applied to a scenario where multiple terminals are connected to a server. The method may include: the server receives event information sent by multiple terminals; the event may be Receive short messages and/or incoming calls; it should be understood that the information of the event may be the information of the event reported by the terminal with a certain threshold number received by the server, or the information of the event received by the server with a specific threshold number, or the information of the event received by the server Information about the events reported by the terminal within the set duration, which is not limited here. The server acquires the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals. That is, the server can perform calculation according to the big data reported by multiple terminals, and the obtained information of the real base station and the information of the pseudo base station has a relatively high accuracy. It should be understood that although the more data reported by the terminal, the more accurate the information of the real base station and the information of the pseudo base station acquired by the server, but these need to be within the load range of the server. Here, the server obtains the information of the real base station and the information of the pseudo base station and needs to be saved. It can determine the target terminal that accesses the pseudo base station among the multiple terminals, and can also determine the information about the first event reported by the first terminal next time. The authenticity of the first base station accessed by the terminal.

结合本申请实施例的第一方面,在本申请实施例的第一方面的第一种实现方式中,所述方法还可以包括:所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;所述服务器向所述目标终端发送伪基站的指示信息。服务器确定有接入伪基站的目标终端后,可以向目标终端发送伪基站的指示信息,所述伪基站的指示信息用于目标终端提示,使得用户对目标终端上发生的事件引起警惕,小心上当受骗。With reference to the first aspect of the embodiments of the present application, in a first implementation manner of the first aspect of the embodiments of the present application, the method may further include: the server according to the information of the real base station and the information of the pseudo base station information to determine a target terminal accessing the pseudo base station among the multiple terminals; the server sends the indication information of the pseudo base station to the target terminal. After the server determines that there is a target terminal accessing the pseudo base station, it can send the indication information of the pseudo base station to the target terminal. The indication information of the pseudo base station is used to prompt the target terminal, so that the user can be alert to the events that occur on the target terminal and be careful to be fooled. deceived.

结合本申请实施例的第一方面、第一方面的第一种实现方式,在本申请实施例的第一方面的第二种实现方式中,所述事件的信息包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。所述事件的信息还可以包括短信内容和/或来电号码。应理解,所述事件的信息包括但不限于上述所提及的信息,所述事件的信息可以用于服务器进行大数据的计算,得到真实基站的信息和伪基站的信息。With reference to the first aspect of the embodiments of the present application and the first implementation manner of the first aspect, in the second implementation manner of the first aspect of the embodiments of the present application, the information of the event includes a terminal identifier and location information of the terminal , the information of the base station accessed when the event occurs, and the time when the event occurs. The information of the event may also include the content of the short message and/or the number of the incoming call. It should be understood that the information of the event includes but is not limited to the information mentioned above, and the information of the event can be used for the server to perform big data calculation to obtain the information of the real base station and the information of the pseudo base station.

结合本申请实施例第一方面的第二种实现方式,在本申请实施例的第一方面的第三种实现方式中,所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息,可以包括:所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;这里可以得到多组关于经度、纬度、日期的数据。所述服务器从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;这里的第一阈值可以是一个经验值,也可以根据实际情况而设定。所述服务器去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;所述服务器确定所述筛选基站的信息为真实基站的信息。在本申请实施例中,提供了一种获取真实基站的信息的实现方式,增加了方案的可行性。With reference to the second implementation manner of the first aspect of the embodiments of the present application, in the third implementation manner of the first aspect of the embodiments of the present application, the server obtains the real base station according to the event information sent by the multiple terminals information, which may include: the server determines, according to the location information of the terminals sent by the multiple terminals, the information of the base station accessed when the event occurs, the time when the event occurs, and the preset location calculation accuracy. Information about the initial base station of longitude, latitude, and date; here you can get multiple sets of data about longitude, latitude, and date. The server deletes, from the information about the initial base station of longitude, latitude, and date, the information of the initial base station whose number of occurrences in consecutive days is less than the first threshold; the first threshold here may be an empirical value, or may be based on set according to the actual situation. The server removes the date, and combines the information of other initial base stations to obtain the information about the longitude and latitude of the screening base station; the server determines that the information of the screening base station is the information of the real base station. In the embodiment of the present application, an implementation manner of acquiring information of a real base station is provided, which increases the feasibility of the solution.

结合本申请实施例第一方面的第二种实现方式,在本申请实施例的第一方面的第四种实现方式中,所述服务器根据所述多个终端发送的事件的信息,获取伪基站的信息,可以包括:即服务器利用伪基站移动的特点(可移动,突然出现并消失),识别出可能潜在的伪基站。所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;所述服务器根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;所述服务器确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述服务器确定所述目标基站的信息为伪基站的信息。在本申请实施例中,提供了一种获取真实伪基站的信息的实现方式,增加了方案的可行性。With reference to the second implementation manner of the first aspect of the embodiments of the present application, in the fourth implementation manner of the first aspect of the embodiments of the present application, the server acquires the pseudo base station according to the event information sent by the multiple terminals The information can include: that is, the server uses the mobile characteristics of the pseudo base station (movable, suddenly appears and disappears), and identifies a possible potential pseudo base station. The server determines, according to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurs, and the time when the event occurs, the location information of the terminal accessed by the target base station at the first time, and The location information of the terminal accessed at the second time, the target base station is any base station accessed by the multiple terminals when the event occurs; the server is based on the information of the terminal accessed by the target base station at the first time. position information, calculate the first central position of the terminal to be accessed, and calculate the second central position of the terminal to be accessed according to the position information of the terminal accessed by the target base station at the second time; the server determines the The first center position is the first position of the target base station, and the second center position is determined to be the second position of the target base station; if the absolute value of the difference between the first position and the second position is greater than the second threshold, the server determines that the information of the target base station is information of the pseudo base station. In the embodiment of the present application, an implementation manner of acquiring information of a real pseudo base station is provided, which increases the feasibility of the solution.

结合本申请实施例的第一方面、本申请实施例的第一方面的第一种至第四种实现方式中的任意一种,在本申请实施例的第一方面的第五种实现方式中,所述方法还可以包括:所述服务器标记所述真实基站和所述伪基站的可疑概率;服务器可以将真实基站的可疑概率标记为0,伪基站的可疑概率标为100%,也可以根据实际情况而标记。所述服务器接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;即服务器将伪基站的指示信息向目标终端发送后,目标终端会提示伪基站的指示信息,而有的目标终端上会接收用户输入的反馈信息,这些收到反馈信息的目标终端可以称为第一目标终端,第一目标终端将反馈信息上报给服务器。所述服务器根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率。从而对保存的真实基站的信息和伪基站的信息进行更新,使得保存的真实基站的信息和伪基站的信息是最新的记录。With reference to the first aspect of the embodiments of the present application and any one of the first to fourth implementation manners of the first aspect of the embodiments of the present application, in the fifth implementation manner of the first aspect of the embodiments of the present application , the method may further include: the server marks the suspicious probability of the real base station and the pseudo base station; the server may mark the suspicious probability of the real base station as 0, and the suspicious probability of the pseudo base station as 100%, or according to Mark the actual situation. The server receives feedback information sent by the first target terminal, where the feedback information is input information entered by the user as to whether the indication information that the base station accessed by the first target terminal when the event occurs is a pseudo base station is accurate; that is, After the server sends the indication information of the pseudo base station to the target terminal, the target terminal will prompt the indication information of the pseudo base station, and some target terminals will receive the feedback information input by the user. These target terminals that receive the feedback information can be called the first The target terminal, the first target terminal reports the feedback information to the server. The server modifies the suspicious probability of the pseudo base station correspondingly according to the feedback information, and obtains the modified suspicious probability of the pseudo base station. Thus, the stored information of the real base station and the information of the pseudo base station is updated, so that the stored information of the real base station and the information of the pseudo base station are the latest records.

在本申请实施例中,服务器接收第一目标终端上报的反馈信息后,就可以对保存的真实基站的信息和伪基站的信息的可疑概率进行修改,从而更新真实基站的信息和伪基站的信息。使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。In the embodiment of the present application, after receiving the feedback information reported by the first target terminal, the server can modify the stored suspicious probability of the information of the real base station and the information of the pseudo base station, thereby updating the information of the real base station and the information of the pseudo base station . so that when the server receives the information of the first event reported by the first terminal next time, it can determine whether the first base station accessed by the terminal when the first event occurs is a pseudo base station according to the updated information of the real base station and the information of the pseudo base station, In this way, the accuracy of the result judged according to the real base station information and the pseudo base station information updated in real time is higher.

结合本申请实施例第一方面的第五种实现方式中的任意一种,在本申请实施例的第一方面的第六种实现方式中,所述方法还可以包括:所述服务器确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息、可疑概率小于第四阈值的基站的信息为目标真实基站的信息;这些目标真实基站的信息和目标伪基站的信息包括但不限于(cellidentification,CID)、位置区标识(location area code,LAC)、信号强度、采集时间与上报时间的差异等信息。所述服务器根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到基站的信息中包括的各个特征的参考权重。With reference to any one of the fifth implementation manners of the first aspect of the embodiments of the present application, in the sixth implementation manner of the first aspect of the embodiments of the present application, the method may further include: the server determining a suspicious probability The information of the base station greater than the third threshold is the information of the target pseudo base station, and the information of the base station whose suspicious probability is less than the fourth threshold is the information of the target real base station; the information of these target real base stations and the information of the target pseudo base station include but not limited to (cellidentification , CID), location area code (LAC), signal strength, difference between acquisition time and reporting time, etc. The server performs model training according to the information of the target pseudo base station and the information of the target real base station, and obtains the reference weight of each feature included in the information of the base station.

在本申请实施例中,如果得到基站的信息中包括的各个特征的参考权重,那么就可以对下次第一终端上报的第一事件的信息中第一基站的信息进行计算,得到第一基站的目标可疑概率,从而,判断第一基站的真伪,提供了一种确定第一基站是真实基站或者伪基站的实现方式,使得本申请实施例更加完善。In the embodiment of the present application, if the reference weight of each feature included in the information of the base station is obtained, then the information of the first base station in the information of the first event reported by the first terminal next time can be calculated to obtain the first base station Therefore, the authenticity of the first base station is judged, and an implementation manner of determining whether the first base station is a real base station or a fake base station is provided, which makes the embodiments of the present application more perfect.

结合本申请实施例第一方面的第六种实现方式中的任意一种,在本申请实施例的第一方面的第七种实现方式中,所述方法还可以包括:所述服务器接收第一终端发送的第一事件的信息,所述第一事件的信息可以包括发生所述第一事件时接入的第一基站的信息;若所述第一基站的信息在所述伪基站的信息中,则所述服务器向所述第一终端发送伪基站的指示信息。应理解,第一事件的信息包括但不限于上述所提及的信息。所述第一事件的信息还可以包括所述第一终端标识、所述第一终端的位置信息、发生所述第一事件的时间。With reference to any one of the sixth implementation manners of the first aspect of the embodiments of the present application, in the seventh implementation manner of the first aspect of the embodiments of the present application, the method may further include: the server receiving the first The information of the first event sent by the terminal, the information of the first event may include the information of the first base station accessed when the first event occurs; if the information of the first base station is in the information of the pseudo base station , the server sends the indication information of the pseudo base station to the first terminal. It should be understood that the information of the first event includes but is not limited to the information mentioned above. The information of the first event may further include the identifier of the first terminal, the location information of the first terminal, and the time when the first event occurs.

在本申请实施例中,提供了一种确定伪基站的实现方式,服务器可以根据之前计算出来的真实基站的信息和伪基站的信息来确定第一基站的信息是否在其中。若第一基站在伪基站的信息中,则说明第一基站为伪基站,那么,服务器可以向第一终端发送伪基站的指示信息,又因为根据大数据计算出来的伪基站的信息和真实基站的准确率比较高,所以,这样确定出第一基站为伪基站的准确率也比较高。In the embodiment of the present application, an implementation manner of determining a pseudo base station is provided, and the server can determine whether the information of the first base station is in it according to the information of the real base station and the information of the pseudo base station calculated before. If the first base station is in the information of the pseudo base station, it means that the first base station is a pseudo base station. Then, the server can send the indication information of the pseudo base station to the first terminal, because the information of the pseudo base station calculated according to the big data and the real base station Therefore, the accuracy of determining that the first base station is a pseudo base station is also relatively high.

结合本申请实施例第一方面的第七种实现方式中的任意一种,在本申请实施例的第一方面的第八种实现方式中,所述方法还可以包括:若所述第一基站的信息未在所述伪基站的信息中,则所述服务器根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率;若所述目标概率小于等于所述第五阈值,则所述服务器确定所述第一基站为伪基站;所述服务器向所述第一终端发送伪基站的指示信息。在本申请实施例中,是根据基站的信息中各个特征的参考权重,计算得出第一基站是否为伪基站,为本申请实施例提供了一种可选的实现方式。With reference to any one of the seventh implementation manners of the first aspect of the embodiments of the present application, in the eighth implementation manner of the first aspect of the embodiments of the present application, the method may further include: if the first base station If the information of the pseudo base station is not in the information of the pseudo base station, the server determines the target probability of the first base station according to the information of the first event and the reference weight of each feature included in the information of the base station; If the target probability is less than or equal to the fifth threshold, the server determines that the first base station is a pseudo base station; the server sends indication information of the pseudo base station to the first terminal. In the embodiment of the present application, whether the first base station is a pseudo base station is calculated according to the reference weight of each feature in the information of the base station, which provides an optional implementation manner of the embodiment of the present application.

结合本申请实施例的第一方面、本申请实施例的第一方面的第一种至第八种实现方式中的任意一种,在本申请实施例的第一方面的第九种实现方式中,所述事件可以包括:接收短信和/或来电;所述事件的信息还可以包括:所述短信的内容和/或所述来电的号码。With reference to the first aspect of the embodiments of the present application and any one of the first to eighth implementation manners of the first aspect of the embodiments of the present application, in the ninth implementation manner of the first aspect of the embodiments of the present application , the event may include: receiving a short message and/or an incoming call; the event information may further include: the content of the short message and/or the number of the incoming call.

本申请实施例第二方面提供了一种提示方法,可以包括:终端检测事件发生并采集所述事件的信息;所述终端向服务器发送所述事件的信息;如果有多个终端向服务器发送事件的信息,那么,服务器就可以根据多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息,从而,就可以确定终端接入的是否为伪基站。所述终端接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的;所述终端提示所述伪基站的指示信息。终端如果提示伪基站的指示信息,就可以使得用户对目标终端上发生的事件引起警惕,小心上当受骗。A second aspect of the embodiments of the present application provides a prompting method, which may include: a terminal detects the occurrence of an event and collects information of the event; the terminal sends the information of the event to a server; if multiple terminals send an event to the server Then, the server can obtain the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals, so as to determine whether the terminal access is a pseudo base station. The terminal receives the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event; the terminal prompts the indication information of the pseudo base station. If the terminal prompts the instruction information of the pseudo base station, the user can be alerted to the events occurring on the target terminal and be careful to be deceived.

结合本申请实施例的第二方面,在本申请实施例的第二方面的第一种实现方式中,所述事件的信息可以包括所述终端标识、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。所述事件的信息还可以包括短信内容和/或来电号码。应理解,所述事件的信息包括但不限于上述所提及的信息,所述事件的信息可以用于服务器进行大数据的计算,得到真实基站的信息和伪基站的信息。With reference to the second aspect of the embodiments of the present application, in a first implementation manner of the second aspect of the embodiments of the present application, the information of the event may include the terminal identifier, the location information of the terminal, the occurrence of the event information of the base station accessed at the time, and the time when the event occurred. The information of the event may also include the content of the short message and/or the number of the incoming call. It should be understood that the information of the event includes but is not limited to the information mentioned above, and the information of the event can be used for the server to perform big data calculation to obtain the information of the real base station and the information of the pseudo base station.

结合本申请实施例的第二方面、第二方面的第一种实现方式,在本申请实施例的第二方面的第二种实现方式中,所述方法还可以包括:所述终端接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;所述终端向所述服务器发送所述反馈信息,所述反馈信息用于所述服务器对所述伪基站的可疑概率进行修改。应理解,假设,这里接收反馈信息的终端称为第一目标终端。在本申请实施例中,服务器接收第一目标终端上报的反馈信息后,就可以对保存的真实基站的信息和伪基站的信息的可疑概率进行修改,从而更新真实基站的信息和伪基站的信息。从而使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。With reference to the second aspect of the embodiments of the present application and the first implementation manner of the second aspect, in the second implementation manner of the second aspect of the embodiments of the present application, the method may further include: the terminal receiving feedback information , the feedback information is input information input by the user to indicate whether the base station accessed by the terminal when the event occurs is a pseudo base station is accurate; the terminal sends the feedback information to the server, and the feedback The information is used by the server to modify the suspicious probability of the pseudo base station. It should be understood that it is assumed that the terminal that receives the feedback information is referred to as the first target terminal. In the embodiment of the present application, after receiving the feedback information reported by the first target terminal, the server can modify the stored suspicious probability of the information of the real base station and the information of the pseudo base station, thereby updating the information of the real base station and the information of the pseudo base station . Therefore, when the server receives the information of the first event reported by the first terminal next time, it can determine whether the first base station accessed by the terminal when the first event occurs is a pseudo base station according to the updated information of the real base station and the information of the pseudo base station. , so that the accuracy of the result judged according to the real-time updated information of the real base station and the information of the pseudo base station is higher.

结合本申请实施例的第二方面、第二方面的第一种实现方式、第二方面的第二种实现方式,在本申请实施例的第二方面的第三种实现方式中,所述终端提示所述伪基站的指示信息,可以包括:所述终端通过文字显示所述伪基站的指示信息;和/或,所述终端通过危险标识显示所述伪基站的指示信息;和/或,所述终端通过语音提示所述伪基站的指示信息。需要说明的是,终端通过所述事件对应的应用界面显示事件的信息,所述事件的信息可以包括短信内容和/或来电号码,并可以在所述应用界面上提示所述伪基站的提示信息。该应用界面可以是短信界面或者来电界面。With reference to the second aspect of the embodiments of the present application, the first implementation manner of the second aspect, and the second implementation manner of the second aspect, in the third implementation manner of the second aspect of the embodiments of the present application, the terminal Prompting the indication information of the pseudo base station may include: the terminal displays the indication information of the pseudo base station through text; and/or the terminal displays the indication information of the pseudo base station through a danger sign; and/or, the The terminal prompts the indication information of the pseudo base station by voice. It should be noted that the terminal displays the information of the event through the application interface corresponding to the event, the information of the event may include the content of the short message and/or the caller number, and may prompt the prompt information of the pseudo base station on the application interface . The application interface may be a text message interface or an incoming call interface.

结合本申请实施例的第二方面、第二方面的第一种实现方式、第二方面的第二种实现方式、第二方面的第三种实现方式,在本申请实施例的第二方面的第四种实现方式中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。With reference to the second aspect of the embodiments of the present application, the first implementation manner of the second aspect, the second implementation manner of the second aspect, and the third implementation manner of the second aspect, in the second aspect of the embodiments of the present application In a fourth implementation manner, the event includes: receiving a short message and/or an incoming call; the event information further includes: the content of the short message and/or the number of the incoming call.

本申请实施例第三方面提供一种服务器,具有实现对应于上述第一方面提供的获取真实基站的信息和伪基站的信息的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。A third aspect of the embodiments of the present application provides a server, which has a function of acquiring information of a real base station and information of a pseudo base station corresponding to the above-mentioned first aspect. This function can be implemented by hardware or by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above functions.

本申请实施例第四方面提供一种终端,具有实现对应于上述第二方面提供的提示伪基站的指示信息的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。A fourth aspect of the embodiments of the present application provides a terminal, which has a function of implementing indication information corresponding to the pseudo base station provided in the second aspect. This function can be implemented by hardware or by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above functions.

本申请实施例第五方面提供一种服务器,可以包括:收发器,处理器,存储器和总线,所述收发器、所述处理器和所述存储器通过所述总线连接;A fifth aspect of an embodiment of the present application provides a server, which may include: a transceiver, a processor, a memory, and a bus, where the transceiver, the processor, and the memory are connected through the bus;

所述存储器,用于存储操作指令;the memory for storing operation instructions;

所述收发器,用于接收多个终端发送的事件的信息;the transceiver, configured to receive event information sent by multiple terminals;

所述处理器,用于调用所述操作指令,根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。The processor is used for invoking the operation instruction, and acquiring the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals.

在一种可能的设计中,所述处理器,还用于根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;In a possible design, the processor is further configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal accessing the pseudo base station among the multiple terminals;

所述收发器,还用于向所述目标终端发送伪基站的指示信息。The transceiver is further configured to send the indication information of the pseudo base station to the target terminal.

在一种可能的设计中,所述事件的信息包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。In a possible design, the information of the event includes a terminal identifier, location information of the terminal, information of a base station accessed when the event occurs, and time when the event occurs.

在一种可能的设计中,所述处理器具体用于执行以下步骤:In a possible design, the processor is specifically configured to perform the following steps:

根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;确定所述筛选基站的信息为真实基站的信息。According to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurs, the time when the event occurs, and the preset position calculation accuracy, determine the initial base station with respect to longitude, latitude, and date information; from the information about the initial base stations of the longitude, latitude, and date, delete the information of the initial base station whose number of occurrences in consecutive days is less than the first threshold; remove the date, and combine the information of other initial base stations to obtain Information about the longitude and latitude of the screening base station; determine that the information of the screening base station is the information of the real base station.

在一种可能的设计中,所述处理器具体用于执行以下步骤:In a possible design, the processor is specifically configured to perform the following steps:

根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述处理器确定所述目标基站的信息为伪基站的信息。Determine the location information of the terminal accessed by the target base station at the first time and the second time according to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurs, and the time when the event occurs The location information of the accessed terminal, the target base station is any base station accessed by the multiple terminals when the event occurs; according to the location information of the terminal accessed by the target base station at the first time, the access point is calculated. the first center position of the incoming terminal, and calculate the second center position of the accessed terminal according to the position information of the terminal accessed by the target base station at the second time; determine the first center position as the target base station The first position of the target base station is determined as the second position of the target base station; if the absolute value of the difference between the first position and the second position is greater than the second threshold, the processing The controller determines that the information of the target base station is the information of the pseudo base station.

在一种可能的设计中,所述处理器还用于执行以下步骤:标记所述真实基站和所述伪基站的可疑概率;根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率;In a possible design, the processor is further configured to perform the following steps: marking the suspicious probability of the real base station and the pseudo base station; according to the feedback information, correspondingly modifying the suspicious probability of the pseudo base station to obtain Modified suspicious probability of the pseudo base station;

所述收发器还用于执行以下步骤:接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息。The transceiver is further configured to perform the following step: receiving feedback information sent by the first target terminal, where the feedback information is an indication entered by the user that the base station accessed by the first target terminal when the event occurs is a pseudo base station Whether the information is accurate as entered information.

在一种可能的设计中,所述处理器,还用于执行以下步骤:In a possible design, the processor is further configured to perform the following steps:

确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息、可疑概率小于第四阈值的基站的信息为目标真实基站的信息;根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到基站的信息中包括的各个特征的参考权重。It is determined that the information of the base station with the suspicious probability greater than the third threshold is the information of the target pseudo base station, and the information of the base station with the suspicious probability less than the fourth threshold is the information of the target real base station; according to the information of the target pseudo base station and the target real base station information; information, perform model training, and obtain the reference weights of each feature included in the information of the base station.

在一种可能的设计中,所述收发器,还用于执行以下步骤:In one possible design, the transceiver is further configured to perform the following steps:

接收第一终端发送的第一事件的信息,所述第一事件的信息发生所述第一事件时接入的第一基站的信息;若所述第二基站的信息在所述伪基站的信息中,则所述收发器向所述第一终端发送伪基站的指示信息。Receive the information of the first event sent by the first terminal, the information of the first event is the information of the first base station accessed when the first event occurs; if the information of the second base station is in the information of the pseudo base station , the transceiver sends the indication information of the pseudo base station to the first terminal.

在一种可能的设计中,所述处理器还用于执行以下步骤:In one possible design, the processor is further configured to perform the following steps:

若所述第一基站的信息未在所述伪基站的信息中,则所述处理器模块根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率;若所述目标概率小于等于所述第五阈值,则所述处理器确定所述第一基站为伪基站;If the information of the first base station is not in the information of the pseudo base station, the processor module determines the the target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the processor determines that the first base station is a pseudo base station;

所述收发器还用于执行以下步骤:向所述第一终端发送伪基站的指示信息。The transceiver is further configured to perform the following step: sending the indication information of the pseudo base station to the first terminal.

在一种可能的设计中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。In a possible design, the event includes: receiving a short message and/or an incoming call; the information of the event further includes: the content of the short message and/or the number of the incoming call.

本申请实施例第六方面提供一种终端,可以包括:处理器,通信接口,存储器,输出单元和总线,所述处理器、所述通信接口、所述输出单元和所述存储器通过所述总线连接;A sixth aspect of an embodiment of the present application provides a terminal, which may include: a processor, a communication interface, a memory, an output unit, and a bus, where the processor, the communication interface, the output unit, and the memory pass through the bus connect;

所述存储器,用于存储操作指令;the memory for storing operation instructions;

所述处理器,用于调用所述操作指令,检测事件发生并采集所述事件的信息;The processor is used for calling the operation instruction, detecting the occurrence of an event and collecting the information of the event;

所述通信接口,用于向服务器发送所述事件的信息;接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的;The communication interface is used for sending the information of the event to the server; receiving the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event;

所述输出单元,用于提示所述伪基站的指示信息。The output unit is used for prompting the indication information of the pseudo base station.

在一种可能的设计中,所述事件的信息包括所述终端标识、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间;提示所述伪基站的指示信息。In a possible design, the information of the event includes the identifier of the terminal, the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs; prompting the pseudo base station instruction information.

在一种可能的设计中,所述终端还包括输入单元,所述输入单元,还用于接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;In a possible design, the terminal further includes an input unit, and the input unit is further configured to receive feedback information, where the feedback information is input by the user about the base station accessed by the terminal when the event occurs. Whether the indication information of the pseudo base station is accurate input information;

所述通信接口,还用于向所述服务器发送所述反馈信息,所述反馈信息用于所述服务器对所述伪基站的可疑概率进行修改。The communication interface is further configured to send the feedback information to the server, where the feedback information is used by the server to modify the suspicious probability of the pseudo base station.

在一种可能的设计中,所述输出单元包括显示单元,所述显示单元,用于通过文字显示所述伪基站的指示信息。In a possible design, the output unit includes a display unit, and the display unit is configured to display the indication information of the pseudo base station through text.

在一种可能的设计中,所述输出单元包括显示单元,所述显示单元,用于通过危险标识显示所述伪基站的指示信息。In a possible design, the output unit includes a display unit, and the display unit is configured to display the indication information of the pseudo base station through a danger sign.

在一种可能的设计中,所述输出单元包括音频电路,所述音频电路,用于通过语音提示所述伪基站的指示信息。In a possible design, the output unit includes an audio circuit, and the audio circuit is used to prompt the indication information of the pseudo base station by voice.

本申请实施例第七方面提供一种通信系统,所述通信系统包括服务器和终端,所述服务器为执行本申请第一方面或第一方面任一可选实现方式中所述的服务器;所述终端为执行本申请第二方面或第二方面任一可选实现方式中所述的终端。A seventh aspect of an embodiment of the present application provides a communication system, where the communication system includes a server and a terminal, and the server is a server that executes the first aspect of the present application or any optional implementation manner of the first aspect; the The terminal is the terminal that executes the second aspect or any optional implementation manner of the second aspect of this application.

本发明实施例第八方面提供一种存储介质,需要说明的是,本发的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产口的形式体现出来,该计算机软件产品存储在一个存储介质中,用于储存为上述设备所用的计算机软件指令,其包含用于执行上述第一方面、第二方面、第三方面或第四方面为服务器或者终端所设计的程序。The eighth aspect of the embodiments of the present invention provides a storage medium. It should be noted that the technical solution of the present invention is essentially or the part that contributes to the prior art, or all or part of the technical solution can be produced by software. It is embodied in the form that the computer software product is stored in a storage medium for storing computer software instructions used by the above-mentioned device, which includes a server for executing the above-mentioned first aspect, the second aspect, the third aspect or the fourth aspect Or programs designed by the terminal.

该存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。The storage medium includes: U disk, removable hard disk, Read-Only Memory (ROM, Read-Only Memory), Random Access Memory (RAM, Random Access Memory), magnetic disk or optical disk and other media that can store program codes.

本发明实施例第九方面提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如本申请第一方面或第一方面任一可选实现方式中所述的方法。A ninth aspect of the embodiments of the present invention provides a computer program product including instructions, which, when run on a computer, causes the computer to execute the method described in the first aspect or any optional implementation manner of the first aspect of the present application.

本发明实施例第十方面提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如本申请第二方面或第二方面任一可选实现方式中所述的方法。A tenth aspect of the embodiments of the present invention provides a computer program product including instructions, which, when executed on a computer, causes the computer to execute the method described in the second aspect or any optional implementation manner of the second aspect of the present application.

本申请实施例提供的技术方案中,具有以下有益效果:In the technical solutions provided in the embodiments of the present application, there are the following beneficial effects:

在本申请实施例中,服务器是根据多个终端上报的大数据来获取真实基站的信息和伪基站的信息,所以,得到的真实基站的信息和伪基站的信息的准确率比较高。即服务器接收多个终端发送的事件的信息,事件的信息可以包括终端标识、终端的位置信息、发生事件时接入的基站的信息、发生事件的时间。服务器根据所述多个终端发送的事件的信息获取真实基站的信息和伪基站的信息。服务器还可以根据真实基站的信息和伪基站的信息,再确定所述多个终端中接入伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对目标终端上发生的事件引起警惕,小心上当受骗。In the embodiment of the present application, the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by multiple terminals, so the obtained information of the real base station and the information of the pseudo base station has a relatively high accuracy. That is, the server receives event information sent by multiple terminals, and the event information may include terminal identification, location information of the terminal, information of the base station accessed when the event occurs, and time when the event occurs. The server obtains the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals. The server may further determine the target terminal that accesses the pseudo base station among the multiple terminals according to the information of the real base station and the information of the pseudo base station; and send the indication information of the pseudo base station to the target terminal, so that the user can cause the event on the target terminal to cause Be vigilant and beware of being deceived.

附图说明Description of drawings

图1为本申请实施例中所应用的一个通信系统框架图;FIG. 1 is a frame diagram of a communication system applied in the embodiment of the application;

图2为本申请实施例中所应用的一个场景示意图;FIG. 2 is a schematic diagram of a scenario applied in the embodiment of the application;

图3为本申请实施例中提示方法的一个实施例示意图;3 is a schematic diagram of an embodiment of the prompting method in the embodiment of the present application;

图4(a)为本申请实施例中终端接收短信界面显示的一个示意图;FIG. 4(a) is a schematic diagram of an interface displayed by a terminal for receiving a short message in an embodiment of the application;

图4(b)为本申请实施例中终端接收来电界面显示的一个示意图;FIG. 4(b) is a schematic diagram of a terminal receiving an incoming call interface display in an embodiment of the application;

图4(c)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;Fig. 4(c) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the application;

图4(d)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(d) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the application;

图4(e)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(e) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the application;

图4(f)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(f) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(g)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(g) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the application;

图4(h)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(h) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the application;

图4(i)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(i) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the application;

图4(j)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(j) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the application;

图4(k)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(k) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(l)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(1) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the application;

图4(m)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(m) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(n)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(n) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(o)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(o) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(p)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(p) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图5为本申请实施例中提示方法的另一个实施例示意图;FIG. 5 is a schematic diagram of another embodiment of the prompting method in the embodiment of the present application;

图6(a)为本申请实施例中终端在短信界面上显示输入反馈信息的一个示意图;Fig. 6(a) is a schematic diagram of displaying input feedback information on a short message interface by a terminal in an embodiment of the application;

图6(b)为本申请实施例中终端在短信界面上显示输入反馈信息的另一个示意图;FIG. 6(b) is another schematic diagram of displaying input feedback information on a short message interface by a terminal in an embodiment of the application;

图6(c)为本申请实施例中终端在来电界面上显示输入反馈信息的一个示意图;Fig. 6(c) is a schematic diagram of displaying input feedback information on an incoming call interface by a terminal in an embodiment of the application;

图6(d)为本申请实施例中终端在来电界面上显示输入反馈信息的另一个示意图;FIG. 6(d) is another schematic diagram of the terminal displaying input feedback information on the incoming call interface in the embodiment of the application;

图7为本申请实施例中提示方法的另一个实施例示意图;FIG. 7 is a schematic diagram of another embodiment of the prompting method in the embodiment of the present application;

图8为本申请实施例中提示方法的另一个实施例示意图;FIG. 8 is a schematic diagram of another embodiment of the prompting method in the embodiment of the present application;

图9(a)为本申请实施例中服务器的一个实施例示意图;FIG. 9(a) is a schematic diagram of an embodiment of a server in an embodiment of the present application;

图9(b)为本申请实施例中服务器的一个实施例示意图;FIG. 9(b) is a schematic diagram of an embodiment of a server in an embodiment of the present application;

图9(c)为本申请实施例中服务器的一个实施例示意图;FIG. 9(c) is a schematic diagram of an embodiment of a server in an embodiment of the present application;

图9(d)为本申请实施例中服务器的一个实施例示意图;FIG. 9(d) is a schematic diagram of an embodiment of a server in an embodiment of the present application;

图10为本申请实施例中终端的一个实施例示意图;FIG. 10 is a schematic diagram of an embodiment of a terminal in an embodiment of the present application;

图11为本申请实施例中服务器的另一个实施例示意图;FIG. 11 is a schematic diagram of another embodiment of the server in the embodiment of the present application;

图12为本申请实施例中终端的另一个实施例示意图。FIG. 12 is a schematic diagram of another embodiment of the terminal in the embodiment of the present application.

具体实施方式Detailed ways

下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, rather than all the embodiments. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without creative efforts shall fall within the protection scope of this application.

关于前面所说的通过终端对比基站特征参数来识别伪基站的方法为:当终端接入基站时,解析基站的特征参数,包括小区标识或者称为基站的扇区标识(cellidentification,CID)、位置区标识(location area code,LAC)及系统信息等。然后将特征参数与本地预置的参数库进行匹配,如果在合法范围内就认为是合法的基站。否则认为是伪基站,直接从终端屏蔽接入伪基站。该方法的判断逻辑直接预置在终端芯片上,判断后可以直接屏蔽终端设备接入基站。但是,该判断逻辑完全依赖终端,无法进行系统升级。随着伪基站技术的发展一些特征参数也是可以进行调整的,但是终端无法动态获得,容易导致误判。Regarding the above-mentioned method of identifying the pseudo base station by comparing the characteristic parameters of the base station by the terminal: when the terminal accesses the base station, analyze the characteristic parameters of the base station, including the cell identification or the cell identification (CID) of the base station, the location Area identification (location area code, LAC) and system information. Then, the characteristic parameters are matched with the locally preset parameter library, and if they are within the legal range, it is considered to be a legal base station. Otherwise, it is considered to be a pseudo base station, and the pseudo base station is directly shielded from the terminal. The judgment logic of the method is directly preset on the terminal chip, and after judgment, the terminal equipment can be directly blocked from accessing the base station. However, the judgment logic is completely dependent on the terminal, and the system cannot be upgraded. With the development of pseudo base station technology, some characteristic parameters can also be adjusted, but the terminal cannot obtain it dynamically, which may easily lead to misjudgment.

而基于基站位置识别伪基站的方法为仅针对通知类消息进行判断存在风险,伪基站可以构造任意号码不一定都是通知类短信;运营商自身也存在移动基站,单从位置上比对并不完全可靠;另外设备侧上报的基站位置是通过算法计算获得的,本身存在误差。However, the method of identifying pseudo base stations based on the location of the base station is risky for judging only notification messages. The pseudo base station can construct any number that is not necessarily notification SMS; the operator also has mobile base stations. Completely reliable; in addition, the base station location reported by the device side is obtained through algorithm calculation, and there is an error in itself.

在本申请实施例中,本申请技术方案主要解决本地参数库无法及时更新导致的判断准确率问题以及使用服务器进行判断时由于数据上报来源限于通知类短信和运营商移动基站导致的判断准确率问题。In the embodiment of the present application, the technical solution of the present application mainly solves the problem of the accuracy of judgment caused by the inability to update the local parameter database in time, and the problem of the accuracy of judgment caused by the fact that the source of data reporting is limited to notification-type short messages and the operator's mobile base station when using the server for judgment. .

本申请实施例应用的通信系统框架图如图1所示,该通信系统可以包括终端和服务器。如图2所示,为本申请实施例所应用的一个场景示意图,A区域终端可以接入的合法基站有2号基站,B区域可以接入的正确基站有2、3、4号基站。A frame diagram of a communication system applied by the embodiment of the present application is shown in FIG. 1 , and the communication system may include a terminal and a server. As shown in FIG. 2 , which is a schematic diagram of a scenario applied by the embodiments of the present application, the legal base stations that terminals in area A can access include base station No. 2, and the correct base stations that can be accessed in area B are base stations No. 2, 3, and 4.

在本申请实施例中,服务器可以接收大量终端上报的事件的信息,事件的信息可以包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,所述事件可以为接收短信或者接收来电。再根据所述大量终端上报的事件的信息,获取真实基站的信息和伪基站的信息;所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述大量终端中接入伪基站的目标终端;所述服务器向所述目标终端发送伪基站的指示信息。这里对于确定伪基站的信息和真实基站的信息,如果越多的终端上报事件的信息,服务器所确定的结果就越准确。服务器再可以根据确定的真实基站的信息和伪基站的信息,再确定所述多个终端中接入基站为伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对终端上发生的事件引起警惕,小心上当受骗。In this embodiment of the present application, the server may receive information about events reported by a large number of terminals, and the event information may include terminal identification, location information of the terminal, information of the base station accessed when the event occurs, and the time when the event occurs, The event may be receiving a short message or receiving an incoming call. Then, according to the information of the events reported by the large number of terminals, obtain the information of the real base station and the information of the fake base station; the server determines the access fake base station in the large number of terminals according to the information of the real base station and the information of the fake base station. The target terminal of the base station; the server sends the indication information of the pseudo base station to the target terminal. Here, for determining the information of the pseudo base station and the information of the real base station, if more terminals report the information of the event, the result determined by the server is more accurate. The server can then determine, according to the determined information of the real base station and the information of the pseudo base station, the target terminal whose access base station is the pseudo base station among the multiple terminals; The incident aroused vigilance, beware of being deceived.

在本申请的实施例中,服务器还可以利用伪基站移动的特点结合终端的反馈信息,修改伪基站的可疑概率,更新真实基站的信息和伪基站的信息,从而使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。In the embodiment of the present application, the server can also use the characteristics of the movement of the pseudo base station and the feedback information of the terminal to modify the suspicious probability of the pseudo base station, update the information of the real base station and the information of the pseudo base station, so that the server receives the first terminal next time. When reporting the information of the first event, it can be determined whether the first base station accessed by the terminal when the first event occurs is a pseudo base station according to the updated information of the real base station and the information of the pseudo base station. The accuracy of the result judged by the information and the information of the pseudo base station is higher.

在本申请的实施例中,服务器还可以根据真实基站的信息和伪基站的信息对应的可疑概率,选择一批可疑概率最高的基站的信息作为正例,可疑概率最低的基站的信息作为负例,进行模型训练,得到各个基站的信息中包括的各个特征的参考权重。这些各个特征的参考权重,可以用于服务器下次接收第一终端上报的第一事件的信息时,根据各个特征的参考权重和第一事件的信息,来计算发生第一事件时接入的第一基站的目标概率。若目标概率大于预设阈值,则服务器确定第一基站为真实基站;若目标概率小于等于所述预设阈值,则服务器确定第一基站为伪基站,服务器向该终端发送伪基站的指示信息。这样,服务器就可以根据各个特征的参考权重和第一事件的信息,来计算服务器新接收的终端发生第一事件时接入的第一基站是否为伪基站,提供了另外一种确定伪基站的实现方式,增加了方案的可行性。In the embodiment of the present application, the server may also select the information of a batch of base stations with the highest suspicious probability as a positive example, and the information of the base station with the lowest suspicious probability as a negative example according to the suspicious probability corresponding to the information of the real base station and the information of the pseudo base station , and perform model training to obtain the reference weight of each feature included in the information of each base station. The reference weights of these features can be used for the next time the server receives the information of the first event reported by the first terminal, according to the reference weights of the features and the information of the first event, to calculate the first access when the first event occurs. The target probability of a base station. If the target probability is greater than the preset threshold, the server determines that the first base station is a real base station; if the target probability is less than or equal to the preset threshold, the server determines that the first base station is a pseudo base station, and the server sends indication information of the pseudo base station to the terminal. In this way, the server can calculate whether the first base station accessed by the terminal newly received by the server when the first event occurs is a pseudo base station according to the reference weight of each feature and the information of the first event, and provides another method for determining the pseudo base station. The realization method increases the feasibility of the scheme.

下面以实施例的方式,对本申请实施例中服务器接收多个终端上报信息进行具体说明。如图3所示,为本申请实施例中提示方法的一个实施例示意图,包括:In the following, the information reported by a plurality of terminals received by the server in the embodiment of the present application will be specifically described by way of an embodiment. As shown in FIG. 3, it is a schematic diagram of an embodiment of the prompting method in the embodiment of the present application, including:

301、服务器接收多个终端发送的事件的信息。301. The server receives event information sent by multiple terminals.

在本申请实施例中,在服务器接收多个终端发送的事件的信息之前,终端发生检测事件发生并采集所述事件的信息,所述事件的信息可以包括所述终端标识(International Mobile Equipment Identity,IMEI)、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,发生事件的时间也可以称为时间戳(timestamp)。终端向服务器发送所述事件的信息,应理解,该事件可以包括接收短信和/或接收来电。该事件的信息还可以包括短信的内容和/或来电的号码等信息。In this embodiment of the present application, before the server receives the event information sent by multiple terminals, the terminal detects the occurrence of an event and collects the event information, where the event information may include the terminal identifier (International Mobile Equipment Identity, IMEI), the location information of the terminal, the information of the base station accessed when the event occurs, the time when the event occurs, and the time when the event occurs may also be referred to as a timestamp (timestamp). The terminal sends the information of the event to the server, and it should be understood that the event may include receiving a short message and/or receiving an incoming call. The information of the event may also include information such as the content of the short message and/or the number of the incoming call.

该终端可以为包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑等任意终端设备,在下述的示例中,可以以终端为手机为例进行说明。如图4(a)所示,为手机接收短信界面显示的一个示意图。如图4(b)所示,为手机接收来电界面显示的一个示意图。The terminal can be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales, a sales terminal), a vehicle-mounted computer, etc. In the following example, the terminal can be a mobile phone as example to illustrate. As shown in Figure 4(a), it is a schematic diagram of the interface displayed on the mobile phone for receiving short messages. As shown in Figure 4(b), it is a schematic diagram of the interface displayed on the mobile phone for receiving an incoming call.

其中,终端的位置信息可以利用全球定位系统(Global Positioning System,GPS)获得经纬度、或者利用网络计算经纬度。终端的位置信息可以包括但不限于经纬度、接入无线保真(Wireless Fidelity,WiFi)的无线接入点的物理地址(Basic Service Setidentifier,BSSID)/无线接入点的标识或服务集标识(Service Set Identifier,SSID)/媒体接入控制地址(Medium Access Control address,MAC addr)/网络标识(NetworkID),当前扫描到的WiFi SSID等信息。发生事件时接入的基站的信息可以包括基站的扇区标识、也可以称为小区标识(cell identification,CID)、LAC、相邻的CID,还可以包括信号强度、小区信息等信息。The position information of the terminal may be obtained by using a global positioning system (Global Positioning System, GPS), or by using a network to calculate the longitude and latitude. The location information of the terminal may include, but is not limited to, the latitude and longitude, the physical address (Basic Service Setidentifier, BSSID) of the wireless access point that accesses wireless fidelity (Wireless Fidelity, WiFi)/the identifier of the wireless access point or the service set identifier (Service set identifier). Set Identifier, SSID)/Medium Access Control address (Medium Access Control address, MAC addr)/Network ID (NetworkID), the currently scanned WiFi SSID and other information. The information of the base station accessed when the event occurs may include the sector identification of the base station, also called cell identification (cell identification, CID), LAC, adjacent CIDs, and may also include information such as signal strength and cell information.

应理解,这里的多个终端发生事件时接入的基站的信息可以相同,也可以不同,发生事件的时间可以相同,也可以不同。还有可能是相同的终端发送多个事件的信息,这多个事件的信息可以相同,也可以不同,由终端实际采集的事件的信息所决定。It should be understood that the information of the base stations accessed by multiple terminals when an event occurs here may be the same or different, and the time at which the event occurs may be the same or different. It is also possible that the same terminal sends information of multiple events, and the information of the multiple events may be the same or different, and is determined by the information of the events actually collected by the terminal.

302、所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。302. The server acquires the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals.

服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。所述服务器可以通过大数据的计算获取真实基站的信息和伪基站的信息。关于多个终端发送的事件的信息的说明,下面举例说明:The server obtains the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals. The server can acquire the information of the real base station and the information of the pseudo base station through the calculation of big data. For the description of the event information sent by multiple terminals, the following example illustrates:

例如,在一种可能的实现方式中,服务器可以设置一个数量阈值,当接收发送事件的信息的终端数量超过该数量阈值时,服务器可以根据这些超过数量阈值的终端发送的事件的信息,获取真实基站的信息和伪基站的信息。For example, in a possible implementation manner, the server may set a quantity threshold, and when the number of terminals that receive and send event information exceeds the quantity threshold, the server may obtain the real The information of the base station and the information of the pseudo base station.

在另一种可能的实现方式中,服务器还可以设置一个特定阈值,该特定阈值是针对事件的信息的数量来说的,即当服务器收到超过特定阈值的事件的信息,服务器可以根据超过特定阈值的事件的信息获取真实基站的信息和伪基站的信息。In another possible implementation manner, the server may further set a specific threshold, and the specific threshold is based on the quantity of the information of the event, that is, when the server receives the information of the event that exceeds the specific threshold, the server can The information of the threshold event obtains the information of the real base station and the information of the pseudo base station.

在另一种可能的实现方式中,服务器还可以设置一个预置时长,服务器可以根据在预置时长内接收的多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。还可以有其他对多个终端发送的事件的信息的说明,此处不做限定。In another possible implementation manner, the server may further set a preset duration, and the server may obtain the information of the real base station and the information of the pseudo base station according to the information of events sent by multiple terminals received within the preset duration. There may also be other descriptions of the event information sent by multiple terminals, which are not limited here.

服务器可以通过多种方式根据多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。下面将举例分别进行说明:The server can obtain the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals in various ways. The following examples will be used to illustrate:

服务器可以根据多个终端发送的事件的信息,获取真实基站的信息,可以包括:The server can obtain the information of the real base station according to the information of the events sent by the multiple terminals, which can include:

所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;所述服务器从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;所述服务器去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;所述服务器确定所述筛选基站的信息为真实基站的信息。The server determines the information about the longitude, latitude, and date according to the location information of the terminals sent by the multiple terminals, the information of the base station accessed when the event occurs, the time when the event occurs, and the preset location calculation accuracy. The information of the initial base station; the server deletes the information of the initial base station whose number of occurrences in consecutive days is less than the first threshold from the information of the initial base station about the longitude, latitude and date; the server removes the date, The information of other initial base stations is combined to obtain the information about the longitude and latitude of the screened base station; the server determines that the information of the screened base station is the information of the real base station.

举例1:服务器根据大量终端的位置信息(终端利用全球定位系统(GlobalPositioning System,GPS)获得的经纬度、或利用网络计算的经纬度)、终端在接收短信和/或来电时接入的基站信息(这里以CID和LAC进行说明)、接收短信和/或来电的时间,或终端当前接入的基站信息,相邻CID信息等信息来确定真实基站的信息。Example 1: According to the location information of a large number of terminals (the latitude and longitude obtained by the terminal using the Global Positioning System (GPS), or the latitude and longitude calculated by the network), the base station information accessed by the terminal when receiving a short message and/or an incoming call (here The information of the real base station is determined by the information such as CID and LAC), the time of receiving the short message and/or the incoming call, or the information of the base station currently accessed by the terminal, the information of the adjacent CID and so on.

首先,地理位置采取一定的计算精度(如对经纬度小数位进行限制,如精确到5位小数),再结合数据的采集日期,即经度(longitude,lng)、纬度(latitude,lat)、日期(date),那么,此时可以获得一组关于经度、纬度、日期的数据[lat,lng,date]={cid,lac;cid,lac;…};需要说明的是,这里由于lat、lng、date实际取值的不同,可以得到多组关于经度、纬度、日期的数据。First, the geographic location adopts a certain calculation precision (such as limiting the decimal places of longitude and latitude, such as being accurate to 5 decimal places), and then combining the data collection date, that is, longitude (longitude, lng), latitude (latitude, lat), date ( date), then, a set of data about longitude, latitude, and date can be obtained at this time [lat, lng, date]={cid, lac; cid, lac; ...}; it should be noted that here, due to lat, lng, Depending on the actual value of date, multiple sets of data about longitude, latitude, and date can be obtained.

例如:[lat1,lng1,date1]={cid1,lac1;cid2,lac2;cid3,lac3};For example: [lat1,lng1,date1]={cid1,lac1;cid2,lac2;cid3,lac3};

[lat1,lng2,date1]={cid1,lac1;cid3,lac3;cid4,lac4};[lat1,lng2,date1]={cid1,lac1;cid3,lac3;cid4,lac4};

[lat1,lng2,date2]={cid2,lac2;cid3,lac3;cid4,lac4};[lat1,lng2,date2]={cid2,lac2;cid3,lac3;cid4,lac4};

[lat2,lng1,date1]={cid8,lac8;cid5,lac5;cid6,lac6};[lat2,lng1,date1]={cid8,lac8;cid5,lac5;cid6,lac6};

[lat2,lng2,date1]={cid5,lac5;cid6,lac6;cid7,lac7};[lat2,lng2,date1]={cid5,lac5;cid6,lac6;cid7,lac7};

[lat2,lng2,date2]={cid5,lac5;cid6,lac6;cid7,lac7}。[lat2,lng2,date2]={cid5,lac5;cid6,lac6;cid7,lac7}.

需要说明的是,上述只是以这几组数据来进行举例说明,实际应用中,数量要比上述这几组数据多的多,因为少量的数据,所确定的结果没有太大的参考性,本实施例就是为了提高获取的伪基站的准确率所提出的方案,所以,数据越多,所确定的结果也就越准确,当然,这些数据的处理需要在服务器的负载范围内。It should be noted that the above are only examples of these groups of data. In practical applications, the number is much larger than the above-mentioned groups of data. Because of a small amount of data, the determined results are not very informative. The embodiment is a solution proposed to improve the accuracy of the obtained pseudo base station. Therefore, the more data there is, the more accurate the determined result will be. Of course, the processing of these data needs to be within the load range of the server.

其次,服务器再根据得到的大量关于经度、纬度、日期的数据,按照经纬度进行数据合并,合并过程中,对于连续日期内出现接入不稳定的基站(如某一区域内仅出现过一天接入的基站)进行剔除,可以获得关于经度、纬度的数据[lat,lng]={cid,lac;cid,lac…},即表示在区域[lat,lng]范围内接入的基站是合法基站,也就是真实基站。Secondly, the server merges the data according to the longitude and latitude according to the obtained large amount of data about the longitude, latitude and date. The base station of the latitude and longitude) is eliminated, and the data about the longitude and latitude can be obtained [lat, lng]={cid, lac; cid, lac...}, which means that the base station accessed within the range of the area [lat, lng] is a legal base station, That is, the real base station.

那么,在上述的示例中,因为{cid8,lac8}的基站信息只出现过一次,可以将{cid8,lac8}的基站信息删除,其他基站信息进行合并。有[lat1,lng1]={cid1,lac1;cid2,lac2;cid3,lac3};Then, in the above example, since the base station information of {cid8, lac8} appears only once, the base station information of {cid8, lac8} can be deleted, and other base station information can be combined. have[lat1,lng1]={cid1,lac1;cid2,lac2;cid3,lac3};

[lat1,lng2]={cid1,lac1;cid2,lac2;cid3,lac3;cid4,lac4};[lat1,lng2]={cid1,lac1;cid2,lac2;cid3,lac3;cid4,lac4};

[lat2,lng1]={cid8,lac8;cid5,lac5;cid6,lac6};[lat2,lng1]={cid8,lac8;cid5,lac5;cid6,lac6};

[lat2,lng2]={cid5,lac5;cid6,lac6;cid7,lac7},这些信息就是筛选基站的信息。[lat2, lng2]={cid5, lac5; cid6, lac6; cid7, lac7}, these pieces of information are the information for screening base stations.

最后,服务器就得到一组筛选基站的信息数据[lat,lng]={cid,lac;cid,lac…},那么CC=[lat,lng]={cid,lac;cid,lac…},CC表示真实基站并可以标注可疑概率为0。Finally, the server obtains a set of information data for screening base stations [lat, lng]={cid, lac; cid, lac...}, then CC=[lat, lng]={cid, lac; cid, lac...}, CC Represents the real base station and can mark the suspicious probability as 0.

在上述的示例中,在[lat1,lng1]这个区域内,真实基站的信息包括{cid1,lac1;cid2,lac2;cid3,lac3};在[lat1,lng2]这个区域内,真实基站的信息包括{cid1,lac1;cid2,lac2;cid3,lac3;cid4,lac4};在[lat2,lng1]这个区域内,真实基站的信息包括{cid8,lac8;cid5,lac5;cid6,lac6};在[lat2,lng2]这个区域内,真实基站的信息包括{cid5,lac5;cid6,lac6;cid7,lac7}。In the above example, in the area of [lat1, lng1], the information of the real base station includes {cid1, lac1; cid2, lac2; cid3, lac3}; in the area of [lat1, lng2], the information of the real base station includes {cid1, lac1; cid2, lac2; cid3, lac3; cid4, lac4}; in the area of [lat2, lng1], the real base station information includes {cid8, lac8; cid5, lac5; cid6, lac6}; , lng2] In this area, the information of the real base station includes {cid5, lac5; cid6, lac6; cid7, lac7}.

服务器可以根据多个终端发送的事件的信息,获取伪基站的信息,可以包括:The server may obtain information about the pseudo base station according to the information of events sent by multiple terminals, which may include:

所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;所述服务器根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;所述服务器确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述服务器确定所述目标基站的信息为伪基站的信息。The server determines, according to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurs, and the time when the event occurs, the location information of the terminal accessed by the target base station at the first time, and The location information of the terminal accessed at the second time, the target base station is any base station accessed by the multiple terminals when the event occurs; the server is based on the information of the terminal accessed by the target base station at the first time. position information, calculate the first central position of the terminal to be accessed, and calculate the second central position of the terminal to be accessed according to the position information of the terminal accessed by the target base station at the second time; the server determines the The first center position is the first position of the target base station, and the second center position is determined to be the second position of the target base station; if the absolute value of the difference between the first position and the second position is greater than the second threshold, the server determines that the information of the target base station is information of the pseudo base station.

举例2:服务器根据大量终端的位置信息、终端在接收短信和/或来电时接入的基站信息(这里以CID和LAC进行说明)、接收短信和/或来电的时间来确定伪基站的信息,即服务器利用伪基站移动的特点(可移动,突然出现并消失),识别出可能潜在的伪基站。Example 2: The server determines the information of the pseudo base station according to the location information of a large number of terminals, the base station information that the terminal accesses when receiving short messages and/or incoming calls (here, CID and LAC are used for description), and the time of receiving short messages and/or incoming calls, That is, the server uses the moving characteristics of the pseudo base station (movable, suddenly appearing and disappearing) to identify possible potential pseudo base stations.

首先,服务器可以根据多个终端上报的事件的信息,获取终端的位置信息与终端在接收短信或者来电时接入的基站信息:[lat,lng,date]={cid,lac;cid,lac…}。获得每个基站出现时接入该基站的一组终端的位置信息:[cid,lac,timestamp]={lat,lng;lat,lng;…}。First, the server can obtain the location information of the terminal and the base station information that the terminal accesses when receiving a short message or an incoming call according to the event information reported by multiple terminals: [lat, lng, date]={cid, lac; cid, lac… }. Obtain the location information of a group of terminals accessing the base station when each base station appears: [cid, lac, timestamp]={lat, lng; lat, lng; ...}.

可以以基站1为例来进行说明,假设这个基站1的信息用[cid8,lac8]来表示,在第一时间接入的终端的位置信息包括:[cid8,lac8,timestamp1]={lat1,lng1;lat5,lng5;lat6,lng6;lat9,lng9;lat10,lng10;lat12,lng12};The base station 1 can be used as an example for description. Suppose the information of this base station 1 is represented by [cid8, lac8], and the location information of the terminal accessing at the first time includes: [cid8, lac8, timestamp1]={lat1, lng1 ;lat5,lng5;lat6,lng6;lat9,lng9;lat10,lng10;lat12,lng12};

在第二时间接入的终端的位置信息包括:[cid8,lac8,timestamp2]={lat1,lng1;lat3,lng3;lat4,lng4;lat5,lng5;lat10,lng10;lat11,lng11};The location information of the terminal accessed at the second time includes: [cid8, lac8, timestamp2]={lat1, lng1; lat3, lng3; lat4, lng4; lat5, lng5; lat10, lng10; lat11, lng11};

在第三时间接入的终端的位置信息包括:[cid8,lac8,timestamp3]={lat1,lng1;lat3,lng3;lat4,lng4;lat5,lng5;lat9,lng9;lat12,lng12};The location information of the terminal accessed at the third time includes: [cid8, lac8, timestamp3]={lat1, lng1; lat3, lng3; lat4, lng4; lat5, lng5; lat9, lng9; lat12, lng12};

在第四时间接入的终端的位置信息包括:[cid8,lac8,timestamp4]={lat1,lng1;lat2,lng2;lat4,lng4;lat5,lng5;lat10,lng10;lat11,lng11}。The location information of the terminal accessed at the fourth time includes: [cid8, lac8, timestamp4]={lat1, lng1; lat2, lng2; lat4, lng4; lat5, lng5; lat10, lng10; lat11, lng11}.

其次,服务器可以计算出在第一时间这一组终端的第一中心位置,在第二时间这一组终端的第二中心位置,在第三时间这一组终端的第三中心位置,在第四时间这一组终端的第四中心位置。那么,可以认为第一中心位置是基站1在第一时间的位置,第二中心位置是基站1在第二时间的位置,第三中心位置是基站1在第三时间的位置,第四中心位置是基站1在第四时间的位置。Secondly, the server can calculate the first center position of the group of terminals at the first time, the second center position of the group of terminals at the second time, the third center position of the group of terminals at the third time, and the third center position of the group of terminals at the third time. The fourth central position of this group of terminals at four times. Then, it can be considered that the first central position is the position of base station 1 at the first time, the second central position is the position of base station 1 at the second time, the third central position is the position of base station 1 at the third time, and the fourth central position is the position of base station 1 at the fourth time.

最后,对于基站1在不同时间的位置,偏差在一定距离(例如500m)内的属于正常范围;偏差在500m以上的可以认为是移动基站。从而获得一组疑似移动基站的信息:MC={cid,lac;cid,lac;…}。Finally, for the position of the base station 1 at different times, the deviation within a certain distance (for example, 500m) belongs to the normal range; the deviation above 500m can be considered as a mobile base station. Thereby, a group of information of a suspected mobile base station is obtained: MC={cid, lac; cid, lac; ...}.

假设,经过上述的计算,基站1在不同时间的位置的差值的绝对值超过500m了,那么,就可以认为基站1为移动基站。上述只是以基站1为例来进行说明,其他的基站也是类似的处理方法,此处不再赘述。Assuming that, after the above calculation, the absolute value of the difference between the positions of the base station 1 at different times exceeds 500m, then the base station 1 can be considered as a mobile base station. The above only takes the base station 1 as an example for description, and other base stations also have similar processing methods, which will not be repeated here.

在MC的基础上,再次对比基站出现的时间,对于出现时间较短例如小于1天就消失的基站,形成可疑基站的信息:SC={cid,lac;cid,lac;…}。On the basis of MC, the appearance time of the base station is compared again, and for the base station whose appearance time is shorter, for example, disappears in less than 1 day, the information of the suspicious base station is formed: SC={cid, lac; cid, lac; ...}.

假设,对基站1位置的计算,上述的第一时间、第二时间、第三时间和第四时间在同一天,之前或者之后再没出现过这个基站,那么,这个基站1很大概率就是伪基站了。应理解,MC,SC都可以认为是伪基站的信息,并可以标识可疑概率为100%。Suppose, for the calculation of the position of base station 1, the above-mentioned first time, second time, third time and fourth time are on the same day, and this base station has never appeared before or after, then, this base station 1 has a high probability of being false base station. It should be understood that both MC and SC can be regarded as information of the pseudo base station, and can identify the suspicious probability as 100%.

需要说明的是,在上面计算出第一中心位置之后,还可以对偏离该第一中心位置较大的终端位置进行排除后,再计算一次这一组终端(排除了偏离第一中心位置较大的终端)的第一目标中心位置;同样的,对于计算出第二中心位置之后,还可以对偏离该第二中心位置较大的终端位置进行排除后,再计算一次这一组终端(排除了偏离第二中心位置较大的终端)的第二目标中心位置;其他都可以类似处理,此处不再赘述。因为如果终端的位置与第一中心位置和第二中心位置偏差太远的话,那就说明,计算出的这个中心位置与基站的位置偏差较大,用来表示基站的位置的可靠性较差,所以,可以排除掉偏差较大的终端位置,再进行一次计算,用来表示基站的位置,准确率就相对高些。这里用第一目标中心位置和第二目标中心位置表示基站在不同时间的位置,后续的计算方法和上述的描述类似,此处不再赘述。It should be noted that, after the first center position is calculated above, it is also possible to exclude the terminal position that deviates from the first center position, and then calculate this group of terminals again (excluding the terminal position that deviates greatly from the first center position). The first target center position of the terminal); similarly, after calculating the second center position, it is also possible to exclude the terminal position that deviates from the second center position, and then calculate this group of terminals (excluding the second center position) again. The second target center position of the terminal with a larger deviation from the second center position); others can be processed similarly, and details are not repeated here. Because if the position of the terminal deviates too far from the first center position and the second center position, it means that the calculated center position has a large deviation from the position of the base station, which means that the reliability of the position of the base station is poor. Therefore, the terminal position with a large deviation can be excluded, and a calculation is performed again to represent the position of the base station, and the accuracy rate is relatively high. Here, the first target center position and the second target center position are used to represent the positions of the base station at different times. The subsequent calculation method is similar to the above description, and will not be repeated here.

还需要说明的是,服务器根据多个终端发送的事件的信息来获取真实基站的信息和伪基站的信息包括但不限于上述所提及的方法。例如,如果获取了伪基站的信息,那么,服务器可以根据多个终端上报的所有基站的信息,确定除了伪基站的信息,剩下的可以认为是真实基站的信息;也可以是获取了真实基站的信息,那么,服务器可以根据多个终端上报的所有基站的信息,确定除了真实基站的信息,剩下的可以认为是伪基站的信息。It should also be noted that the server acquiring the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals includes but is not limited to the methods mentioned above. For example, if the information of the pseudo base station is obtained, the server can determine, according to the information of all base stations reported by multiple terminals, that the information of the pseudo base station is the rest, and the rest can be regarded as the information of the real base station; or the real base station is obtained. information, then the server can determine, according to the information of all base stations reported by multiple terminals, that in addition to the information of the real base station, the rest can be regarded as the information of the pseudo base station.

303、所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端。303. The server determines, according to the information of the real base station and the information of the pseudo base station, a target terminal of the plurality of terminals accessing the pseudo base station.

在本申请实施例中,举例说明,真实基站的信息如下表1所示:In the embodiment of the present application, for example, the information of the real base station is shown in Table 1 below:

Figure BDA0001708519670000131
Figure BDA0001708519670000131

表1Table 1

伪基站的信息如下表2所示:The information of the pseudo base station is shown in Table 2 below:

Figure BDA0001708519670000141
Figure BDA0001708519670000141

表2Table 2

所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端,可以是确定所述多个终端中发生所述事件时接入的基站为伪基站的目标终端,假设有100个终端接入的是伪基站,那么服务器可以向这100个终端发送伪基站的指示信息。The server determines, according to the information of the real base station and the information of the pseudo base station, the target terminal that accesses the pseudo base station among the multiple terminals, which may be determined to be accessed when the event occurs among the multiple terminals. The base station is the target terminal of the pseudo base station. Assuming that 100 terminals access the pseudo base station, the server can send the indication information of the pseudo base station to the 100 terminals.

304、所述服务器将伪基站的指示信息发送给所述目标终端。304. The server sends the indication information of the pseudo base station to the target terminal.

示例性的,服务器向这100个终端发送伪基站的指示信息可以同时发送,也可以根据终端的优先级来发送伪基站的指示信息,具体此处不做限定。需要说明的是,在实际应用中,服务器也可以向所述多个终端中发生事件时接入的基站为真实基站的终端发送真实基站的指示信息。Exemplarily, the server may send the indication information of the pseudo base station to the 100 terminals at the same time, or may send the indication information of the pseudo base station according to the priority of the terminals, which is not specifically limited here. It should be noted that, in practical applications, the server may also send indication information of the real base station to the terminal whose base station is the real base station when the event occurs among the multiple terminals.

305、所述目标终端提示所述伪基站的指示信息。305. The target terminal prompts the indication information of the pseudo base station.

在本申请实施例中,目标终端可以通过所述事件对应的应用界面显示所述事件的信息,所述事件的信息可以包括短信内容和/或来电号码。所述目标终端提示所述伪基站的指示信息,可以包括但不限于以下几种实现方式:In this embodiment of the present application, the target terminal may display the information of the event through the application interface corresponding to the event, and the information of the event may include the content of the short message and/or the caller number. The indication information that the target terminal prompts the pseudo base station may include but is not limited to the following implementations:

方式1:所述终端通过文字显示所述伪基站的指示信息。Manner 1: The terminal displays the indication information of the pseudo base station through text.

方式2:所述终端通过语音提示所述伪基站的指示信息。Manner 2: The terminal prompts the indication information of the pseudo base station by voice.

方式3:所述终端通过危险标识显示所述伪基站的指示信息。Manner 3: The terminal displays the indication information of the pseudo base station through a danger sign.

目标终端上可以通过所述事件对应的应用界面提示所述伪基站的信息。即手机可以通过短信对应的短信界面,和/或,来电对应的来电界面,和/或,语音提示所述伪基站的指示信息。这里的目标终端可以指上述的100个终端,以其中的一个为例(如手机)来进行说明。The target terminal may prompt the information of the pseudo base station through the application interface corresponding to the event. That is, the mobile phone can prompt the instruction information of the pseudo base station through the short message interface corresponding to the short message, and/or the incoming call interface corresponding to the incoming call, and/or voice. The target terminal here may refer to the above-mentioned 100 terminals, and one of them (such as a mobile phone) is used as an example for description.

在一种可能的实现方式中,终端可以通过文字显示伪基站的指示信息。假设,手机接收短信显示的短信内容11,在短信界面上通过文字21显示伪基站的指示信息。如图4(c)所示,为手机通过短信界面显示伪基站的指示信息的一个示意图。在图4(c)中,伪基站的指示信息为“疑似欺诈短信”的文字指示。假设,手机接收来电显示的来电号码12,在来电界面上通过文字21显示伪基站的指示信息。如图4(d)所示,为手机通过来电界面显示伪基站的指示信息的另一个示意图。在图4(d)中,伪基站的指示信息为“疑似欺诈来电”的文字指示。需要说明的是,关于文字提示还可以是高风险短信或者高风险来点等提示,具体不做限定。In a possible implementation manner, the terminal may display the indication information of the pseudo base station through text. It is assumed that the mobile phone receives the short message content 11 displayed by the short message, and displays the instruction information of the pseudo base station through the text 21 on the short message interface. As shown in FIG. 4( c ), it is a schematic diagram of the mobile phone displaying the indication information of the pseudo base station through the short message interface. In Fig. 4(c), the indication information of the pseudo base station is a text indication of "suspected fraudulent short message". It is assumed that the mobile phone receives the caller ID 12 of the caller ID, and displays the instruction information of the pseudo base station through the text 21 on the caller interface. As shown in FIG. 4(d), it is another schematic diagram of the mobile phone displaying the indication information of the pseudo base station through the incoming call interface. In Fig. 4(d), the indication information of the pseudo base station is a text indication of "suspected fraudulent call". It should be noted that the text prompt may also be a prompt such as a high-risk short message or a high-risk call point, which is not specifically limited.

在另一种可能的实现方式中,终端可以通过语音提示伪基站的指示信息。假设,手机接收短信显示的短信内容11,在短信界面上通过语音22提示伪基站的指示信息。如图4(e)所示,为手机根据伪基站的指示信息对接收的短信进行语音提醒的一个示意图。在图4(e)中,伪基站的指示信息会触发预置的语音功能,手机通过播放语音(例如预置的语音可以是此短信可能是欺诈短信等,或者是由*******号码发送的短信可能是欺诈短信等)来提醒用户。假设,手机接收来电显示的来电号码12,在来电界面上通过语音22提示伪基站的指示信息。如图4(f)所示,为手机根据伪基站的指示信息对接收的来电进行语音提醒的一个示意图。在图4(f)中,伪基站的指示信息会触发预置的语音功能,手机通过播放语音(例如预置的语音可以是此号码可能是欺诈号码,请谨慎接听等)来提醒用户。In another possible implementation manner, the terminal may prompt the indication information of the pseudo base station by voice. It is assumed that the mobile phone receives the short message content 11 displayed by the short message, and prompts the pseudo base station instruction information by voice 22 on the short message interface. As shown in FIG. 4( e ), it is a schematic diagram of the mobile phone performing voice reminder for the received short message according to the instruction information of the pseudo base station. In Figure 4(e), the indication information of the pseudo base station will trigger the preset voice function, and the mobile phone will play the voice (for example, the preset voice can be that this short message may be a fraudulent short message, etc. *The text messages sent by the number may be fraudulent text messages, etc.) to alert the user. It is assumed that the mobile phone receives the caller number 12 displayed on the caller ID, and prompts the pseudo base station instruction information by voice 22 on the caller interface. As shown in FIG. 4( f ), it is a schematic diagram of the mobile phone giving a voice reminder to the incoming call according to the instruction information of the pseudo base station. In Figure 4(f), the indication information of the pseudo base station will trigger the preset voice function, and the mobile phone will remind the user by playing the voice (for example, the preset voice can be that this number may be a fraudulent number, please answer carefully, etc.).

在另一种可能的实现方式中,终端可以通过危险图标提示伪基站的指示信息。假设,手机接收短信显示的短信内容11,在短信界面上通过危险图标23提示伪基站的指示信息。如图4(g)所示,为手机根据伪基站的指示信息通过危险图标对接收的短信进行提醒的一个示意图。在图4(g)中,伪基站的指示信息会触发危险图标,手机通过短信界面显示危险图标来提醒用户。假设,手机接收来电显示的来电号码12,在来电界面上通过危险图标23提示伪基站的指示信息。如图4(h)所示,为手机根据伪基站的指示信息通过危险图标对接收的来电进行提醒的一个示意图。在图4(h)中,伪基站的指示信息会触发危险图标,手机通过来电界面显示危险图标来提醒用户。需要说明的是,危险图标可以包括但不限于图4(g)和4(h)中所示的三角加感叹号的提示,还可以直接是三角图标的提示或者感叹号图标或者其他的危险提示方式。In another possible implementation manner, the terminal may prompt the indication information of the pseudo base station through a danger icon. It is assumed that the mobile phone receives the short message content 11 displayed by the short message, and prompts the instruction information of the pseudo base station through the danger icon 23 on the short message interface. As shown in FIG. 4( g ), it is a schematic diagram of the mobile phone reminding the received short message through the danger icon according to the instruction information of the pseudo base station. In Figure 4(g), the indication information of the pseudo base station will trigger a danger icon, and the mobile phone displays the danger icon through the SMS interface to remind the user. It is assumed that the mobile phone receives the caller number 12 displayed on the caller ID, and prompts the pseudo base station instruction information through the danger icon 23 on the caller interface. As shown in Figure 4(h), it is a schematic diagram of the mobile phone reminding the incoming call through the danger icon according to the instruction information of the pseudo base station. In Figure 4(h), the indication information of the pseudo base station will trigger the danger icon, and the mobile phone will display the danger icon through the incoming call interface to remind the user. It should be noted that the danger icons may include, but are not limited to, the prompts of triangles and exclamation marks shown in Figures 4(g) and 4(h), and may also directly be the prompts of triangle icons or exclamation mark icons or other danger prompts.

需要说明的是,关于伪基站的指示信息的提示包括但不限于上述所提及的几种实现方式,还可以通过其他方式来实现,具体不做限定。例如:文字+语音的提示方式:如图4(i)所示,为手机根据伪基站的指示信息通过文字和语音对接收的短信进行提醒的一个示意图。如图4(j)所示,为手机根据伪基站的指示信息通过文字和语音对接收的来电进行提醒的一个示意图。It should be noted that the prompt about the indication information of the pseudo base station includes, but is not limited to, the several implementation manners mentioned above, and may also be implemented in other manners, which are not specifically limited. For example: text + voice prompting method: as shown in Figure 4(i), it is a schematic diagram of the mobile phone prompting the received short message through text and voice according to the instruction information of the pseudo base station. As shown in FIG. 4(j), it is a schematic diagram of the mobile phone reminding the incoming call through text and voice according to the instruction information of the pseudo base station.

文字+危险图标的提示方式:如图4(k)所示,为手机根据伪基站的指示信息通过文字和危险图标对接收的短信进行提醒的一个示意图。如图4(l)所示,为手机根据伪基站的指示信息通过文字和危险图标对接收的来电进行提醒的一个示意图。Prompt mode of text + danger icon: As shown in Figure 4(k), it is a schematic diagram of the mobile phone reminding the received short message through text and danger icon according to the instruction information of the pseudo base station. As shown in FIG. 4(1), it is a schematic diagram of the mobile phone reminding the incoming call through text and danger icons according to the instruction information of the pseudo base station.

语音+危险图标的提示方式:如图4(m)所示,为手机根据伪基站的指示信息通过语音和危险图标对接收的短信进行提醒的一个示意图。如图4(n)所示,为手机根据伪基站的指示信息通过语音和危险图标对接收的来电进行提醒的一个示意图。Prompt mode of voice + danger icon: As shown in Figure 4(m), it is a schematic diagram of the mobile phone reminding the received short message through voice and danger icon according to the instruction information of the pseudo base station. As shown in Fig. 4(n), it is a schematic diagram of the mobile phone reminding the incoming call through voice and danger icon according to the instruction information of the pseudo base station.

在另一种可能的实现方式中,对于短信,终端可以将短信自动归类到垃圾短信列表中来提示伪基站的指示信息,如图4(o)所示,为手机将短信自动归类到垃圾短信列表中来提示伪基站的指示信息。对于来电,终端可以通过自动拒绝接听来电来提示伪基站的指示信息,如图4(p)所示,为手机自动拒绝接听来电提示伪基站的指示信息的一个示意图。应理解,在上述短信界面或者来电界面上,对于文字提示伪基站的指示信息和图标提示伪基站的指示信息,其实现方式可以是弹框形式、悬浮形式或者气泡等其他形式,具体不做限定。步骤303-305是可选的步骤。In another possible implementation manner, for the short message, the terminal can automatically classify the short message into the junk short message list to prompt the indication information of the pseudo base station, as shown in Figure 4(o), for the mobile phone to automatically classify the short message into In the junk short message list to prompt the instruction information of the pseudo base station. For incoming calls, the terminal can prompt the pseudo base station instruction information by automatically rejecting the incoming call. It should be understood that on the above-mentioned text message interface or incoming call interface, for the indication information indicating the pseudo base station by text and the indication information indicating the pseudo base station by the icon, the implementation method may be in the form of a pop-up box, a floating form, or a bubble, etc., which is not specifically limited. . Steps 303-305 are optional steps.

在本申请实施例中,服务器是根据多个终端上报的大数据来获取真实基站的信息和伪基站的信息,所以,得到的真实基站的信息和伪基站的信息的准确率比较高。即服务器接收多个终端发送的事件的信息,事件的信息可以包括终端标识、终端的位置信息、发生事件时接入的基站的信息、发生事件的时间。服务器根据所述多个终端发送的事件的信息获取真实基站的信息和伪基站的信息。服务器还可以根据真实基站的信息和伪基站的信息,再确定所述多个终端中接入伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对目标终端上发生的事件引起警惕,小心上当受骗。In the embodiment of the present application, the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by multiple terminals, so the obtained information of the real base station and the information of the pseudo base station has a relatively high accuracy. That is, the server receives event information sent by multiple terminals, and the event information may include terminal identification, location information of the terminal, information of the base station accessed when the event occurs, and time when the event occurs. The server obtains the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals. The server may further determine the target terminal that accesses the pseudo base station among the multiple terminals according to the information of the real base station and the information of the pseudo base station; and send the indication information of the pseudo base station to the target terminal, so that the user can cause the event on the target terminal to cause Be vigilant and beware of being deceived.

如图5所示,为本申请实施例中提示方法的另一个实施例示意图,包括:As shown in FIG. 5 , it is a schematic diagram of another embodiment of the prompting method in the embodiment of the present application, including:

501、服务器接收多个终端发送的事件的信息。501. The server receives event information sent by multiple terminals.

502、所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。502. The server acquires the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals.

503、所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端。503. The server determines, according to the information of the real base station and the information of the pseudo base station, a target terminal of the multiple terminals that accesses the pseudo base station.

504、所述服务器将伪基站的指示信息发送给所述目标终端。504. The server sends the indication information of the pseudo base station to the target terminal.

505、所述目标终端提示所述伪基站的指示信息。505. The target terminal prompts the indication information of the pseudo base station.

在本申请实施例中,步骤501-505与上述图3所示实施例中的步骤301-305类似,此处不再赘述。In this embodiment of the present application, steps 501-505 are similar to steps 301-305 in the above-mentioned embodiment shown in FIG. 3 , and details are not repeated here.

506、所述服务器标记所述真实基站和所述伪基站的可疑概率。506. The server marks the suspicious probability of the real base station and the fake base station.

在本申请实施例中,服务器根据多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息之后,对真实基站和伪基站的可疑概率可以进行标记,例如,标记真实基站的可疑概率为0,标记伪基站的可疑概率为100%。In the embodiment of the present application, after acquiring the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals, the server may mark the suspicious probability of the real base station and the pseudo base station, for example, mark the suspicious probability of the real base station The probability is 0, and the suspicious probability of flagging a fake base station is 100%.

举例1:如下述表3所示,为不同区域内关于真实基站和可疑概率的对应关系。Example 1: As shown in Table 3 below, it is the correspondence between real base stations and suspicious probabilities in different areas.

Figure BDA0001708519670000161
Figure BDA0001708519670000161

表3table 3

举例2:如果将可疑基站和移动基站都认为是伪基站,如下述表4所示,为关于可疑基站、移动基站和可疑概率的对应关系。Example 2: If both the suspicious base station and the mobile base station are considered to be pseudo base stations, as shown in Table 4 below, it is the corresponding relationship between the suspicious base station, the mobile base station and the suspicious probability.

可疑基站suspicious base station 可疑概率suspicious probability 移动基站mobile base station 可疑概率suspicious probability {cid8,lac8}{cid8, lac8} 100%100% {cid12,lac12}{cid12, lac12} 100%100% {cid15,lac15}{cid15, lac15} 100%100% {cid8,lac8}{cid8, lac8} 100%100% {cid19,lac19}{cid19, lac19} 100%100% {cid19,lac19}{cid19, lac19} 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid15,lac15}{cid15, lac15} 100%100% {cid36,lac36}{cid36, lac36} 100%100% {cid40,lac40}{cid40, lac40} 100%100%

表4Table 4

需要说明的是,在表4所示的移动基站和可疑基站可以认为是伪基站,只不过可疑基站是伪基站的可疑概率可能更高一些。因为在运营商中也存在移动基站,所以,移动基站是伪基站的可疑概率相对低一些。It should be noted that the mobile base station and the suspicious base station shown in Table 4 can be considered as pseudo base stations, but the suspicious probability that the suspicious base station is a pseudo base station may be higher. Because the mobile base station also exists in the operator, the suspected probability that the mobile base station is a pseudo base station is relatively low.

举例3:还可以将移动基站中除可疑基站的其他基站的可疑概率标记的低一些,如下述表5所示,为关于可疑基站、移动基站和可疑概率的对应关系。Example 3: The suspicious probability of other base stations other than the suspicious base station in the mobile base station can also be marked lower, as shown in Table 5 below, which is the corresponding relationship between the suspicious base station, the mobile base station and the suspicious probability.

可疑基站suspicious base station 可疑概率suspicious probability 移动基站mobile base station 可疑概率suspicious probability {cid8,lac8}{cid8, lac8} 100%100% {cid12,lac12}{cid12, lac12} 80%80% {cid15,lac15}{cid15, lac15} 100%100% {cid8,lac8}{cid8, lac8} 100%100% {cid19,lac19}{cid19, lac19} 100%100% {cid19,lac19}{cid19, lac19} 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid15,lac15}{cid15, lac15} 100%100% {cid36,lac36}{cid36, lac36} 80%80% {cid40,lac40}{cid40, lac40} 80%80%

表5table 5

需要说明的是,步骤506的时序可以在步骤502之后、507之前。It should be noted that the sequence of step 506 may be after step 502 and before step 507 .

507、第一目标终端接收反馈信息。507. The first target terminal receives the feedback information.

在本申请实施例中,第一目标终端可能是上述目标终端中的一个终端,也可能是上述目标终端中的多个终端,具体可根据实际情况确定。所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息。In this embodiment of the present application, the first target terminal may be one terminal in the above target terminals, or may be multiple terminals in the above target terminals, which may be specifically determined according to the actual situation. The feedback information is input information entered by the user as to whether the indication information that the base station accessed by the terminal when the event occurs is a pseudo base station is accurate.

第一目标终端接收伪基站的指示信息后,第一目标终端会提示伪基站的指示信息。下面可以举例进行说明:如图6(a)所示,为手机在短信界面上显示输入反馈信息的一个示意图,还可以在短信界面上显示“请用户反馈一下,该短信是否为欺诈短信”,用户可以在可编辑的文本框31输入反馈信息。如图6(b)所示,为手机在短信界面上显示输入反馈信息的另一个示意图,也可以在短信界面上显示“是”和“否”标识32,用户直接点击“是”或者“否”的标识即可。当然,短信界面上还可以显示“忽视”的标识,或者没有输入文字,那么就代表这个反馈信息没有意义,不用上报给服务器。当用户在文本框输入反馈信息或者点击“是”或“否”的标识后,终端就可以接收对应的反馈信息。After the first target terminal receives the indication information of the pseudo base station, the first target terminal will prompt the indication information of the pseudo base station. An example can be used to illustrate: as shown in Figure 6(a), it is a schematic diagram of the mobile phone displaying input feedback information on the SMS interface, and it can also display on the SMS interface "Please give feedback from the user, whether the SMS is a fraudulent SMS", The user can enter feedback information in the editable text box 31 . As shown in Figure 6(b), it is another schematic diagram of the mobile phone displaying input feedback information on the SMS interface, and the "Yes" and "No" signs 32 can also be displayed on the SMS interface, and the user directly clicks "Yes" or "No" ” logo can be used. Of course, the "ignored" logo can also be displayed on the SMS interface, or no text is entered, which means that the feedback information is meaningless and does not need to be reported to the server. After the user inputs feedback information in the text box or clicks the "Yes" or "No" sign, the terminal can receive the corresponding feedback information.

如图6(c)所示,为手机在来电界面上显示输入反馈信息的一个示意图,手机在来电界面上显示“请用户反馈一下,该来电是否为欺诈来电”,用户可以在可编辑的文本框31输入反馈信息。如图6(d)所示,为手机在来电界面上显示输入反馈信息的一个示意图,也可以在来电界面上显示“是”和“否”标识32,用户直接点击“是”或者“否”的标识即可。当然,来电界面上还可以显示“忽视”的标识,或者没有输入文字,那么就代表这个反馈信息没有意义,不用上报给服务器。从便利的角度来考虑,点击的操作对用户来说可能更方便一些。在来电界面上显示输入反馈信息还可以是在用户挂断电话后显示。当用户在文本框输入反馈信息或者点击“是”或“否”的标识后,终端就可以接收对应的反馈信息。As shown in Figure 6(c), it is a schematic diagram of the mobile phone displaying input feedback information on the incoming call interface. The mobile phone displays “Please feedback from the user, whether the incoming call is a fraudulent incoming call” on the incoming call interface, and the user can edit the text in the editable text Block 31 enters feedback information. As shown in Figure 6(d), it is a schematic diagram of the mobile phone displaying input feedback information on the incoming call interface, and the "Yes" and "No" signs 32 can also be displayed on the incoming call interface, and the user directly clicks "Yes" or "No" 's identification. Of course, the "ignored" logo can also be displayed on the incoming call interface, or no text is entered, which means that the feedback information is meaningless and does not need to be reported to the server. From the point of view of convenience, the operation of clicking may be more convenient for the user. The input feedback information displayed on the incoming call interface may also be displayed after the user hangs up the call. After the user inputs feedback information in the text box or clicks the "Yes" or "No" sign, the terminal can receive the corresponding feedback information.

需要说明的是,关于终端如何显示输入反馈信息的示意图可以包括但不限于上述所述的几种方式。关于用户输入反馈信息的说明可以是有些用户可能之前接收过该号码发送的短信或者接收过该号码的来电,再次接收相同号码发送的来电或者短信时,可以确定是否为欺诈短信或者欺诈来电,也可以是通过这次的通话,确定是否为欺诈来电,从而用户可以输入对应的反馈信息。在上述图6(a)-图6(d)任一显示输入反馈信息是以文字提示伪基站的指示信息来说明的,以语音提示伪基站的指示信息或者危险图标提示伪基站的指示信息时,显示输入反馈信息的示意图和图6(a)-图6(d)类似,此处不再赘述。It should be noted that the schematic diagram of how the terminal displays the input feedback information may include but not limited to the above-mentioned several manners. The description about the feedback information input by the user may be that some users may have received a text message from this number or a call from this number before, and when they receive a call or text message from the same number again, they can determine whether it is a fraudulent text message or a fraudulent call. It may be through this call to determine whether it is a fraudulent call, so that the user can input corresponding feedback information. When any of the above-mentioned Fig. 6(a)-Fig. 6(d) shows that the input feedback information is explained by text prompting the instruction information of the pseudo base station, when the instruction information of the pseudo base station is prompted by voice or a danger icon prompts the pseudo base station instruction information , the schematic diagrams for displaying the input feedback information are similar to those in FIG. 6(a)-FIG. 6(d), which will not be repeated here.

508、第一目标终端将反馈信息发送给服务器。508. The first target terminal sends the feedback information to the server.

在本申请实施例中,假设,服务器之前确定接入伪基站的目标终端有100个,服务器向这100个目标终端发送了伪基站的指示信息。但是这100个目标终端只有50个接收到了用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息。那么,这50个目标终端可以将反馈信息上报给服务器。假设,有45个用户输入的是“否”的反馈信息,5个用户输入的是“是”的反馈信息。In the embodiment of the present application, it is assumed that the server previously determined that there are 100 target terminals accessing the pseudo base station, and the server sends indication information of the pseudo base station to the 100 target terminals. However, only 50 of the 100 target terminals have received input information from the user indicating whether the base station accessed by the terminal when the event occurs is a pseudo base station is accurate. Then, the 50 target terminals can report the feedback information to the server. Assume that 45 users input "No" feedback information, and 5 users input "Yes" feedback information.

509、所述服务器根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率。509. The server correspondingly modifies the suspicious probability of the pseudo base station according to the feedback information, and obtains the modified suspicious probability of the pseudo base station.

在本申请实施例中,假设,上述50个目标终端上报的反馈信息是针对基站{cid15,lac15}的,基站{cid15,lac15}对应的有45个“否”的反馈信息,5个“是”的反馈信息。那么,服务器可以确定基站{cid15,lac15}有90%的概率不是伪基站,10%的概率是伪基站。即对应的在上述表4和表5中可以将基站{cid15,lac15}的可疑概率修改为10%。当可疑概率小于等于可疑概率阈值时,可以认为这个基站为真实基站,这里假设这个可疑概率阈值为20%,那么,服务器可以将基站{cid15,lac15}的信息更新到真实基站的信息中,假设基站{cid15,lac15}出现的区域为[lat7,lng7],将基站{cid15,lac15}的信息更新到上述表3中,在表4和表5中删除基站{cid15,lac15}的信息。In the embodiment of the present application, it is assumed that the feedback information reported by the above-mentioned 50 target terminals is for the base station {cid15, lac15}, and the base station {cid15, lac15} corresponds to 45 "No" feedback information, 5 "Yes" feedback information ” feedback. Then, the server can determine that the base station {cid15, lac15} is not a pseudo base station with a 90% probability and a pseudo base station with a 10% probability. That is, correspondingly, the suspicious probability of the base station {cid15, lac15} can be modified to 10% in Table 4 and Table 5 above. When the suspicious probability is less than or equal to the suspicious probability threshold, the base station can be considered as a real base station. Here, it is assumed that the suspicious probability threshold is 20%. Then, the server can update the information of the base stations {cid15, lac15} to the information of the real base station. The area where base station {cid15, lac15} appears is [lat7, lng7], update the information of base station {cid15, lac15} to the above Table 3, delete the information of base station {cid15, lac15} in Table 4 and Table 5.

如表6所示,为更新后的表3关于真实基站的信息和可疑概率的对应关系,如下所示:As shown in Table 6, the corresponding relationship between the information about the real base station and the suspicious probability of the updated Table 3 is as follows:

Figure BDA0001708519670000181
Figure BDA0001708519670000181

表6Table 6

如表7所示,为更新后的表4关于可疑基站、移动基站和可疑概率的对应关系,如下所示:As shown in Table 7, the updated Table 4 shows the correspondence between suspicious base stations, mobile base stations and suspicious probability, as follows:

可疑基站suspicious base station 可疑概率suspicious probability 移动基站mobile base station 可疑概率suspicious probability {cid8,lac8}{cid8, lac8} 100%100% {cid12,lac12}{cid12, lac12} 100%100% {cid19,lac19}{cid19, lac19} 100%100% {cid8,lac8}{cid8, lac8} 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid19,lac19}{cid19, lac19} 100%100% 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid36,lac36}{cid36, lac36} 100%100% {cid40,lac40}{cid40, lac40} 100%100%

表7Table 7

如表8所示,为更新后的表5关于可疑基站、移动基站和可疑概率的对应关系,如下所示:As shown in Table 8, the updated Table 5 shows the correspondence between suspicious base stations, mobile base stations and suspicious probability, as follows:

可疑基站suspicious base station 可疑概率suspicious probability 移动基站mobile base station 可疑概率suspicious probability {cid8,lac8}{cid8, lac8} 100%100% {cid12,lac12}{cid12, lac12} 80%80% {cid19,lac19}{cid19, lac19} 100%100% {cid8,lac8}{cid8, lac8} 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid19,lac19}{cid19, lac19} 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid36,lac36}{cid36, lac36} 80%80% {cid40,lac40}{cid40, lac40} 80%80%

表8Table 8

需要说明的是,在实际应用中,服务器接收的反馈信息可能是针对同一个基站,也可能是针对不同的基站,修改可疑概率的方式和上述类似,此处不再赘述。而且,更新真实基站的信息和伪基站的信息包括但不限于其他的实现方式,例如,对同一个基站来说,服务器在第一个时长内接收的反馈信息中,有2个“是”的反馈信息,6个“否”的反馈信息;在第二个时长内接收的反馈信息中,有1个“是”的反馈信息,8个“否”的反馈信息;在第三个时长内接收的反馈信息中,有0个“是”的反馈信息,10个“否”的反馈信息;可能这3次修改后,该基站的可疑概率还没有低于可疑概率阈值20%,但是服务器根据接收的反馈信息发现反馈“是”的反馈信息的数量越来越少,反馈“否”反馈信息的数量越来越多,那么,就可以认为该基站不是伪基站的可能性很大,服务器可以将该基站更新在真实基站的信息中。It should be noted that, in practical applications, the feedback information received by the server may be directed to the same base station or may be directed to different base stations, and the manner of modifying the suspicious probability is similar to the above, and will not be repeated here. Moreover, updating the information of the real base station and the information of the pseudo base station includes, but is not limited to, other implementation manners. For example, for the same base station, in the feedback information received by the server in the first period of time, there are two "yes" Feedback information, 6 "No" feedback messages; 1 "Yes" feedback message and 8 "No" feedback messages among the feedback messages received in the second duration; Received in the third duration In the feedback information, there are 0 "Yes" feedback information and 10 "No" feedback information; maybe after these 3 revisions, the suspicious probability of the base station has not been lower than the suspicious probability threshold 20%, but the server according to the received It is found that the number of feedback "Yes" feedback information is getting smaller and smaller, and the number of feedback "No" feedback information is increasing, then it can be considered that the base station is not a pseudo base station. The base station is updated in the information of the real base station.

在本申请实施例中,服务器是根据多个终端上报的大数据来获取真实基站的信息和伪基站的信息,所以,得到的真实基站的信息和伪基站的信息的准确率比较高。即服务器接收多个终端发送的事件的信息,该事件的信息可以包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。服务器根据所述多个终端发送的事件的信息获取真实基站的信息和伪基站的信息。服务器还可以根据确定的真实基站的信息和伪基站的信息,再确定所述多个终端中接入伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对目标终端上发生的事件引起警惕,小心上当受骗。In the embodiment of the present application, the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by multiple terminals, so the obtained information of the real base station and the information of the pseudo base station has a relatively high accuracy. That is, the server receives event information sent by multiple terminals, and the event information may include terminal identification, location information of the terminal, information of the base station accessed when the event occurs, and time when the event occurs. The server obtains the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals. The server may also determine, according to the determined information of the real base station and the information of the pseudo base station, the target terminal accessing the pseudo base station among the multiple terminals; The incident aroused vigilance, beware of being deceived.

进一步的,服务器还可以利用伪基站移动的特点结合终端的反馈信息,修改伪基站的可疑概率,更新真实基站的信息和伪基站的信息,从而使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。Further, the server can also use the characteristics of the movement of the pseudo base station and the feedback information of the terminal to modify the suspicious probability of the pseudo base station, and update the information of the real base station and the information of the pseudo base station, so that the server receives the first event reported by the first terminal next time. When the information of the real base station is updated, it can be determined whether the first base station accessed by the terminal when the first event occurs is a pseudo base station according to the updated information of the real base station and the information of the pseudo base station. The information judged results are more accurate.

如图7所示,为本申请实施例中提示方法的一个实施例示意图,包括:As shown in FIG. 7, it is a schematic diagram of an embodiment of the prompting method in the embodiment of the present application, including:

701、服务器接收多个终端发送的事件的信息。701. The server receives event information sent by multiple terminals.

702、所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。702. The server acquires the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals.

703、所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端。703. The server determines, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals.

704、所述服务器将伪基站的指示信息发送给所述目标终端。704. The server sends the indication information of the pseudo base station to the target terminal.

705、所述目标终端提示所述伪基站的指示信息。705. The target terminal prompts the indication information of the pseudo base station.

706、所述服务器标记所述真实基站和所述伪基站的可疑概率。706. The server marks the suspicious probability of the real base station and the fake base station.

707、第一目标终端接收反馈信息。707. The first target terminal receives the feedback information.

708、第一目标终端将反馈信息发送给服务器。708. The first target terminal sends the feedback information to the server.

709、所述服务器根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率。709. The server correspondingly modifies the suspicious probability of the pseudo base station according to the feedback information, and obtains the modified suspicious probability of the pseudo base station.

在本申请实施例中,步骤701-509与上述图5所示实施例中的步骤501-509类似,此处不再赘述。In this embodiment of the present application, steps 701-509 are similar to steps 501-509 in the above-mentioned embodiment shown in FIG. 5 , and details are not repeated here.

710、所述服务器确定目标伪基站的信息和目标真实基站的信息。710. The server determines the information of the target pseudo base station and the information of the target real base station.

在本申请实施例中,所述服务器可以根据真实基站的信息和伪基站的信息对应的可疑概率,确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息,可疑概率小于第四阈值的基站的信息为目标真实基站的信息。这些目标真实基站的信息和目标伪基站的信息包括但不限于cid、lac、信号强度、采集时间与上报时间的差异等信息。其中,采集时间指的是对应的终端发生事件的时间,上报时间指的是,终端向服务器发送事件的信息的时间,采集时间可以和上报时间相同,或者,上报时间在采集时间之后。In this embodiment of the present application, the server may, according to the suspicious probability corresponding to the information of the real base station and the information of the pseudo base station, determine that the information of the base station with the suspicious probability greater than the third threshold is the information of the target pseudo base station, and the suspicious probability is less than the fourth threshold The information of the base station is the information of the target real base station. The information of the target real base station and the target pseudo base station includes but is not limited to information such as cid, lac, signal strength, and the difference between the acquisition time and the reporting time. The collection time refers to the time when the corresponding terminal occurs, and the reporting time refers to the time when the terminal sends event information to the server. The collection time may be the same as the reporting time, or the reporting time may be after the collection time.

711、所述服务器根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到基站的信息中包括的各个特征的参考权重。711. The server performs model training according to the information of the target pseudo base station and the information of the target real base station, and obtains a reference weight of each feature included in the information of the base station.

在本申请实施例中,服务器根据所述目标伪基站的信息和所述目标真实基站的信息,可以使用Logistics算法等其他算法进行模型训练,得到基站的信息中包括的各个特征的参考权重。例如:cid=w1,lac=w2,信号强度=w3,时间差=w4……In the embodiment of the present application, the server may use other algorithms such as the Logistics algorithm to perform model training according to the information of the target pseudo base station and the information of the target real base station, and obtain the reference weight of each feature included in the information of the base station. For example: cid=w1, lac=w2, signal strength=w3, time difference=w4…

712、第一终端检测第一事件发生并采集所述第一事件的信息。712. The first terminal detects the occurrence of a first event and collects information of the first event.

在本申请实施例中,第一终端检测第一事件发生并采集所述第一事件的信息。所述第一事件的信息可以包括发生所述第一事件时接入的基站的信息,应理解,所述第一事件的信息还可以包括所述第一终端标识、所述第一终端的位置信息、发生所述第一事件的时间、第一短信的内容和/或第一来电的号码等信息。所述第一事件可以包括接收第一短信和/或第一来电。关于第一终端接收第一短信或者第一来电的示意图可以参考上述图4(a)和图4(b)所示,此处不再赘述。In this embodiment of the present application, the first terminal detects the occurrence of a first event and collects information of the first event. The information of the first event may include information of the base station accessed when the first event occurs, and it should be understood that the information of the first event may also include the identifier of the first terminal and the location of the first terminal information, the time when the first event occurred, the content of the first short message, and/or the number of the first incoming call. The first event may include receiving a first short message and/or a first incoming call. For a schematic diagram of the first terminal receiving the first short message or the first incoming call, reference may be made to the above-mentioned FIG. 4( a ) and FIG. 4( b ), which will not be repeated here.

需要说明的是,步骤712可以在步骤702-713之间。It should be noted that step 712 may be between steps 702-713.

713、第一终端将第一事件的信息发送给服务器。713. The first terminal sends the information of the first event to the server.

在本申请实施例中,所述服务器接收第一终端发送的第一事件的信息。需要说明的是,第一终端可以是前面所述多个终端中的终端,也可以是所述多个终端之外新接入的其他终端。而且,第一终端表示的数量不做限定,可以指代一个终端,也可以指代多个终端。在下述的说明中,以第一终端为手机1为例来进行说明。即服务器接收手机1发送的第一事件的信息,所述第一事件的信息包括所述手机1标识、所述手机1的位置信息、发生所述第一事件时接入的第一基站的信息、发生所述第一事件的时间。In this embodiment of the present application, the server receives the information of the first event sent by the first terminal. It should be noted that the first terminal may be a terminal among the aforementioned multiple terminals, or may be another terminal newly accessed outside the multiple terminals. Moreover, the number represented by the first terminal is not limited, and may refer to one terminal, or may refer to multiple terminals. In the following description, the first terminal is the mobile phone 1 as an example for description. That is, the server receives the information of the first event sent by the mobile phone 1, and the information of the first event includes the identification of the mobile phone 1, the location information of the mobile phone 1, and the information of the first base station accessed when the first event occurs. , the time when the first event occurs.

其中,手机1的位置信息可以利用全球定位系统(Global Positioning System,GPS)获得的经纬度、或者利用网络计算的经纬度,手机的位置信息包括但不限于经纬度、接入无线保真(Wireless Fidelity,WiFi)的无线接入点的物理地址(Basic Service Setidentifier,BSSID)/无线接入点的标识或服务集标识(Service Set Identifier,SSID)/媒体接入控制地址(Medium Access Control address,MAC addr)/网络标识(NetworkID),当前扫描到的WiFi SSID等信息。手机1发生第一事件时接入的第一基站的信息可以包括基站的扇区标识、也可以称为小区标识(cell identification,CID)、LAC、相邻的CID,还可以包括信号强度、小区信息等信息。Wherein, the location information of the mobile phone 1 can be obtained by using the global positioning system (Global Positioning System, GPS), or the longitude and latitude calculated by using the network. ) physical address of the wireless access point (Basic Service Setidentifier, BSSID)/identity of the wireless access point or service set identifier (Service Set Identifier, SSID)/Medium Access Control address (Medium Access Control address, MAC addr)/ Network ID (NetworkID), the currently scanned WiFi SSID and other information. The information of the first base station accessed by the mobile phone 1 when the first event occurs may include the sector identification of the base station, also known as cell identification (cell identification, CID), LAC, and adjacent CIDs, and may also include signal strength, cell identification, and cell identification. information, etc.

714、服务器确定第一基站是否为伪基站。714. The server determines whether the first base station is a pseudo base station.

在本申请实施例中,第一基站的真伪确定可以有几种不同的实现方式,下面分别进行说明:In the embodiment of the present application, the authenticity determination of the first base station can be implemented in several different ways, which are described below:

第一种方式:服务器在数据库中保存的真实基站的信息和伪基站的信息中进行查找确定。The first way: the server searches and determines the information of the real base station and the information of the pseudo base station stored in the database.

若步骤712在步骤702之后、步骤709之前,服务器可以在根据多个终端发送的事件的信息获取的真实基站的信息和伪基站的信息中进行查找,若第一基站的信息在伪基站的信息中,则认为第一基站为伪基站,服务器可以向手机1发送伪基站的指示信息;若第一基站的信息在真实基站的信息中,则说明第一基站为真实基站,服务器可以不向手机1发送真实基站的指示信息。If step 712 is after step 702 and before step 709, the server may search the information of the real base station and the information of the pseudo base station obtained according to the information of events sent by multiple terminals. If the information of the first base station is in the information of the pseudo base station If the information of the first base station is in the information of the real base station, it means that the first base station is a real base station, and the server may not send the information of the pseudo base station to the mobile phone 1. 1 Send the indication information of the real base station.

若步骤712在步骤709之后、步骤713之前,服务器可以在更新后的真实基站的信息和伪基站的信息中进行查找,若第一基站的信息在更新后的伪基站的信息中,则认为第一基站为伪基站,服务器可以向手机1发送伪基站的指示信息,若第一基站的信息在更新后的真实基站的信息中,则说明第一基站为真实基站,服务器可以不向手机1发送真实基站的指示信息。If step 712 is after step 709 and before step 713, the server can search in the updated real base station information and pseudo base station information, if the first base station information is in the updated pseudo base station information, it is considered that the first base station information If a base station is a pseudo base station, the server can send the indication information of the pseudo base station to the mobile phone 1. If the information of the first base station is in the updated information of the real base station, it means that the first base station is a real base station, and the server may not send it to the mobile phone 1. Indication information of the real base station.

第二种方式:若步骤712在步骤702之后、步骤709之前,服务器可以在数据库中保存的伪基站的信息和真实的伪基站的信息先查找第一基站的信息。或者,若步骤712在步骤709之后、步骤713之前,服务器可以在数据库中保存的更新的真实基站的信息和更新的伪基站的信息中先查找第一基站的信息。The second way: if step 712 is after step 702 and before step 709, the server can first search the information of the first base station in the information of the pseudo base station and the information of the real pseudo base station saved in the database. Alternatively, if step 712 is after step 709 and before step 713, the server may first search for the information of the first base station in the updated real base station information and the updated pseudo base station information saved in the database.

如果没有查找到第一基站的信息,则所述服务器可以根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率。服务器确定第一基站的目标可疑概率Rate=sum(特征*权重)=cid*w1+lac*w2+信号强度*w3+时间差*w4+……。若所述目标概率小于等于所述第五阈值,则所述服务器确定所述第一站为伪基站。If the information of the first base station is not found, the server may determine the target probability of the first base station according to the information of the first event and the reference weight of each feature included in the information of the base station. The server determines the target suspicious probability of the first base station Rate=sum (feature*weight)=cid*w1+lac*w2+signal strength*w3+time difference*w4+…. If the target probability is less than or equal to the fifth threshold, the server determines that the first station is a pseudo base station.

需要说明的是,根据参考权重计算出来的目标概率范围在0和1之间,趋近于1的可以认为是真实基站,趋近于0的可以认为是伪基站。假设这里计算出来的目标概率为0.8,第五阈值可以设为0.6,0.8大于0.6,所以,服务器确定第一基站为真实基站。假设这里计算出来的目标概率为0.3,第五阈值可以设为0.6,0.3小于0.6,所以,服务器确定第一基站为伪基站。It should be noted that the target probability range calculated according to the reference weight is between 0 and 1, and those close to 1 can be regarded as real base stations, and those close to 0 can be regarded as pseudo base stations. Assuming that the target probability calculated here is 0.8, the fifth threshold can be set to 0.6, and 0.8 is greater than 0.6, so the server determines that the first base station is a real base station. Assuming that the target probability calculated here is 0.3, the fifth threshold may be set to 0.6, and 0.3 is less than 0.6, so the server determines that the first base station is a pseudo base station.

第三种方式:所述服务器直接根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率。即服务器确定第一基站的目标可疑概率Rate=sum(特征*权重)=cid*w1+lac*w2+信号强度*w3+时间差*w4+……。若所述目标概率小于等于所述第五阈值,则所述服务器确定所述第一基站为伪基站。The third manner: the server directly determines the target probability of the first base station according to the information of the first event and the reference weight of each feature included in the information of the base station. That is, the server determines the target suspicious probability of the first base station Rate=sum (feature*weight)=cid*w1+lac*w2+signal strength*w3+time difference*w4+…. If the target probability is less than or equal to the fifth threshold, the server determines that the first base station is a pseudo base station.

715、若第一基站为伪基站,则所述服务器向所述第一终端发送伪基站的指示信息。715. If the first base station is a pseudo base station, the server sends the indication information of the pseudo base station to the first terminal.

在本申请实施例中,若经过步骤714中所述的任意一种确定第一基站的真伪的方式,确定出第一基站是伪基站的话,所述服务器向所述第一终端发送伪基站的指示信息。In this embodiment of the present application, if it is determined that the first base station is a pseudo base station through any of the methods for determining the authenticity of the first base station described in step 714, the server sends the pseudo base station to the first terminal instruction information.

716、所述第一终端提示伪基站的指示信息。716. The first terminal prompts the indication information of the pseudo base station.

这里第一终端提示伪基站的指示信息的方式可以参考上述图4(c)-图4(p)任一的提示方式,此处不再赘述。Here, the manner in which the first terminal prompts the indication information of the pseudo base station may refer to the prompt manner in any of the above-mentioned Fig. 4(c)-Fig.

在本申请实施例中,服务器是根据多个终端上报的大数据来获取真实基站的信息和伪基站的信息,所以,得到的真实基站的信息和伪基站的信息的准确率比较高。即服务器接收多个终端发送的事件的信息,事件的信息可以包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。服务器根据所述多个终端发送的事件的信息确定真实基站的信息和伪基站的信息。服务器还可以根据确定的真实基站的信息和伪基站的信息,再确定所述多个终端中接入伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对目标终端上发生的第一事件引起警惕,小心上当受骗。In the embodiment of the present application, the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by multiple terminals, so the obtained information of the real base station and the information of the pseudo base station has a relatively high accuracy. That is, the server receives event information sent by multiple terminals, and the event information may include terminal identification, location information of the terminal, information of the base station accessed when the event occurs, and time when the event occurs. The server determines the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals. The server may also determine, according to the determined information of the real base station and the information of the pseudo base station, the target terminal accessing the pseudo base station among the multiple terminals; The first incident aroused vigilance, beware of being deceived.

进一步的,服务器还可以利用伪基站移动的特点结合终端的反馈信息,修改伪基站的可疑概率,更新真实基站的信息和伪基站的信息,从而使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。Further, the server can also use the characteristics of the movement of the pseudo base station and the feedback information of the terminal to modify the suspicious probability of the pseudo base station, and update the information of the real base station and the information of the pseudo base station, so that the server receives the first event reported by the first terminal next time. When the information of the real base station is updated, it can be determined whether the first base station accessed by the terminal when the first event occurs is a pseudo base station according to the updated information of the real base station and the information of the pseudo base station. The information judged results are more accurate.

更进一步的,服务器还可以根据真实基站的信息和伪基站的信息对应的可疑概率,选择一批可疑概率最高的基站的信息作为正例,可疑概率最低的基站的信息作为负例,进行模型训练,得到基站的信息包括的各个特征的参考权重。这些参考权重,可以用于服务器下次接收第一终端上报的第一事件的信息时,根据各个特征的参考权重和第一基站的信息,来计算发生第一事件时接入的第一基站的目标概率。若目标概率大于预设阈值,则服务器确定第一基站为真实基站;若目标概率小于等于所述预设阈值,则服务器确定第一基站为伪基站,服务器向该终端发送伪基站的指示信息。这样,服务器就可以根据基站的信息中包括的各个特征的参考权重,来计算服务器新接收的第一终端发生第一事件时接入是不是伪基站,提供了另外一种确定伪基站的实现方式,增加了方案的可行性。Further, the server can also select the information of a batch of base stations with the highest suspicious probability as positive examples, and the information of the base stations with the lowest suspicious probability as negative examples, according to the suspicious probability corresponding to the information of the real base station and the information of the pseudo base station, and perform model training. , to obtain the reference weight of each feature included in the information of the base station. These reference weights can be used for the next time the server receives the information of the first event reported by the first terminal, according to the reference weights of each feature and the information of the first base station, to calculate the information of the first base station accessed when the first event occurs. target probability. If the target probability is greater than the preset threshold, the server determines that the first base station is a real base station; if the target probability is less than or equal to the preset threshold, the server determines that the first base station is a pseudo base station, and the server sends indication information of the pseudo base station to the terminal. In this way, the server can calculate whether the access of the first terminal newly received by the server when the first event occurs is a pseudo base station according to the reference weight of each feature included in the information of the base station, which provides another way of determining the pseudo base station. , which increases the feasibility of the scheme.

另一方面,根据大量终端上报的事件的信息以及用户的反馈信息可以对真实基站和伪基站的可疑概率进行不断的学习优化和校正,会大大提升判断的准确率;相对于“基于基站位置的识别方法”只能和运营商的已有基站数据进行对比分析,在判断移动基站的情况下有较高的准确率。服务器根据目标真实基站的信息和目标伪基站的信息实时进行模型训练,能够确保识别的准确性和实时性,对于新的伪基站可以及时发现;还可以根据大数据的技术,识别出伪基站的运动轨迹,进而可以更有效的预防伪基站诈骗甚至捕获伪基站。On the other hand, according to the information of events reported by a large number of terminals and the feedback information of users, the suspicious probability of real base stations and pseudo base stations can be continuously learned, optimized and corrected, which will greatly improve the accuracy of judgment; "Recognition method" can only be compared and analyzed with the operator's existing base station data, and has a high accuracy rate in the case of judging mobile base stations. The server performs model training in real time according to the information of the target real base station and the information of the target pseudo base station, which can ensure the accuracy and real-time performance of the identification, and can discover new pseudo base stations in time; it can also identify the pseudo base station according to the big data technology. Motion trajectory, which can more effectively prevent fake base station fraud or even capture fake base station.

如图8所示,为本申请实施例中提示方法的一个实施例示意图,包括:As shown in FIG. 8, it is a schematic diagram of an embodiment of the prompting method in the embodiment of the present application, including:

801、第一终端检测第一事件发生并采集所述第一事件的信息;801. A first terminal detects the occurrence of a first event and collects information of the first event;

在本申请实施例中,该第一事件可以是第一终端上安装的应用所发生的第一事件,所述第一事件的信息可以包括所述第一终端标识、所述第一终端的位置信息、发生所述第一事件时接入的第一基站的信息、发生所述第一事件的时间,发生第一事件的时间也可以称为时间戳。该第一事件的信息还可以包括短信的内容和/或来电的号码等信息。第一终端上安装的应用可以是短信应用、呼叫应用等其他应用,此处不做限定。例如,第一终端检测到接收短消息,第一终端采集接收短消息的信息,或者,第一终端检测到接收来电,第一终端采集接收来电的信息。接收短消息或者接收来电的示意图可以参考图4(a)和4(b)所示,此处不再赘述。In this embodiment of the present application, the first event may be a first event that occurs in an application installed on a first terminal, and the information of the first event may include an identifier of the first terminal and a location of the first terminal The information, the information of the first base station accessed when the first event occurs, the time at which the first event occurs, and the time at which the first event occurs may also be referred to as a timestamp. The information of the first event may also include information such as the content of the short message and/or the number of the incoming call. The application installed on the first terminal may be other applications such as a short message application and a calling application, which are not limited here. For example, the first terminal detects that a short message is received, and the first terminal collects information about the received short message, or the first terminal detects that an incoming call is received, and the first terminal collects information about the incoming call. The schematic diagrams of receiving a short message or receiving an incoming call can be referred to as shown in FIGS. 4( a ) and 4 ( b ), which will not be repeated here.

802、第一终端将所述第一事件的信息发送给服务器;802. The first terminal sends the information of the first event to the server;

在本申请实施例中,第一终端可以将采集的接收短消息的信息,或者,接收采集的来电的信息发送给服务器。需要说明的是,当第一终端接收短消息或者接收来电时,接入的基站为伪基站,那么,第一终端是处于断网状态的,没法向服务器上报第一事件的信息,所以,第一终端需要等到处于网络连接状态的时候,发送所述第一事件的信息。In this embodiment of the present application, the first terminal may send the collected information of receiving a short message, or the collected information of receiving an incoming call, to the server. It should be noted that when the first terminal receives a short message or receives an incoming call, the base station accessed is a pseudo base station. Then, the first terminal is in a disconnected state and cannot report the information of the first event to the server. Therefore, The first terminal needs to wait until it is in a network connection state to send the information of the first event.

803、第一终端接收所述服务器发送的伪基站的指示信息。803. The first terminal receives the indication information of the pseudo base station sent by the server.

在本申请实施例中,如果服务器确定第一终端接入的是伪基站,服务器向第一终端发送伪基站的指示信息。关于服务器确定伪基站的方式,可以包括但不限于以下几种实现方式,下面以手机为例进行说明,如下所示:In this embodiment of the present application, if the server determines that the first terminal is accessing a pseudo base station, the server sends indication information of the pseudo base station to the first terminal. The manner in which the server determines the pseudo base station may include, but is not limited to, the following implementation manners. The following uses a mobile phone as an example for description, as shown below:

举例1:服务器在上述图3所示的实施例中获取的真实基站的信息和伪基站的信息中进行查找确定。Example 1: The server searches and determines the information of the real base station and the information of the pseudo base station obtained in the embodiment shown in FIG. 3 above.

服务器可以在根据多个终端发送的事件的信息获取的真实基站的信息和伪基站的信息中进行查找,若第一基站的信息在伪基站的信息中,则认为第一基站为伪基站,服务器可以向手机发送伪基站的指示信息;若第一基站的信息在真实基站的信息中,则说明第一基站为真实基站,服务器可以不向手机发送真实基站的指示信息。The server may search the information of the real base station and the information of the pseudo base station obtained according to the information of events sent by multiple terminals. If the information of the first base station is in the information of the pseudo base station, the first base station is considered to be a pseudo base station, and the server The indication information of the pseudo base station can be sent to the mobile phone; if the information of the first base station is in the information of the real base station, it means that the first base station is a real base station, and the server may not send the indication information of the real base station to the mobile phone.

举例2:服务器在上述图5所示的实施例中更新的真实基站的信息和伪基站的信息中进行查找确定。Example 2: The server searches and determines the information of the real base station and the information of the pseudo base station updated in the above-mentioned embodiment shown in FIG. 5 .

服务器可以在上述图5所示的实施例中,根据更新的真实基站的信息和伪基站的信息中进行查找确定,若第一基站的信息在更新的伪基站的信息中,则认为第一基站为伪基站,服务器可以向手机发送伪基站的指示信息;若第一基站的信息在更新的真实基站的信息中,则说明第一基站为真实基站,服务器可以不向手机发送真实基站的指示信息。In the embodiment shown in FIG. 5 above, the server may search and determine according to the updated information of the real base station and the information of the pseudo base station. If the information of the first base station is in the updated information of the pseudo base station, it is considered that the first base station It is a pseudo base station, and the server can send the indication information of the pseudo base station to the mobile phone; if the information of the first base station is in the updated information of the real base station, it means that the first base station is a real base station, and the server may not send the indication information of the real base station to the mobile phone. .

举例3:服务器在上述图7所示的实施例中根据得到的基站的信息中包括的各个特征的参考权重来进行确定。Example 3: In the above-mentioned embodiment shown in FIG. 7 , the server determines according to the reference weight of each feature included in the obtained information of the base station.

如果在上述图3或者图5所示的实施例中都未查找到第一基站是真实基站还是伪基站,可以采用上述图7所示的实施例中根据得到的基站的信息中包括的各个特征的参考权重来进行确定。或者,直接采用上述图7所示的实施例中根据得到的基站的信息中包括的各个特征的参考权重来进行确定。具体实现方式可以参考上述实施例7中步骤714的说明,此处不再赘述。If it is not found whether the first base station is a real base station or a pseudo base station in the above-mentioned embodiment shown in FIG. 3 or FIG. 5 , various features included in the obtained base station information in the above-mentioned embodiment shown in FIG. 7 may be used. to determine the reference weight. Alternatively, the reference weight of each feature included in the obtained base station information in the embodiment shown in FIG. 7 is directly used for determination. For a specific implementation manner, reference may be made to the description of step 714 in the above-mentioned Embodiment 7, and details are not repeated here.

举例4:服务器在上述图3所示的实施例中根据接收的多个终端发送的事件的信息,再进行一次大数据的计算,获取真实基站的信息和伪基站的信息,从而,确定该第一基站是否为伪基站。Example 4: In the embodiment shown in FIG. 3 above, the server performs a big data calculation again according to the received information of events sent by multiple terminals, and obtains the information of the real base station and the information of the pseudo base station, so as to determine the first Whether a base station is a pseudo base station.

804、第一终端提示所述伪基站的指示信息。804. The first terminal prompts the indication information of the pseudo base station.

在本申请实施例中,第一终端提示所述伪基站的指示信息,可以包括但不限于以下几种实现方式:In this embodiment of the present application, the first terminal prompts the indication information of the pseudo base station, which may include but is not limited to the following implementations:

举例1:所述终端通过文字显示所述伪基站的指示信息;具体可以参考上述图4(c)和4(d)所示,此处不再赘述。Example 1: The terminal displays the indication information of the pseudo base station through text; for details, reference may be made to those shown in Figures 4(c) and 4(d) above, which will not be repeated here.

举例2:所述终端通过语音提示所述伪基站的指示信息;具体可以参考上述图4(e)和4(f)所示,此处不再赘述。Example 2: The terminal prompts the indication information of the pseudo base station by voice; for details, reference may be made to those shown in Figures 4(e) and 4(f) above, which will not be repeated here.

举例3:所述终端通过危险标识显示所述伪基站的指示信息;具体可以参考上述图4(g)和4(h)所示,此处不再赘述。Example 3: The terminal displays the indication information of the pseudo base station through the danger sign; for details, reference may be made to those shown in Figures 4(g) and 4(h) above, which will not be repeated here.

可选的,在其他提示伪基站的指示信息,可以参考上述图4(i)-4(p)的实现方式,此处不再赘述。Optionally, for other indication information prompting the pseudo base station, reference may be made to the implementation manners of FIGS. 4(i)-4(p) above, which will not be repeated here.

在本申请实施例中,对于第一终端来说,主要是上报采集的事件的信息,该事件的信息可以用于服务器获取伪基站的信息,而服务器确定的方式可以有多种,上述已经进行说明,但服务器确定方式是根据大数据的计算得到的,因此,所判断出来的结果可靠性比较高,得到的结果也就越准确。如果终端上接入的是伪基站,那么,服务器会向终端发送伪基站的指示信息,从而,终端可以提示伪基站的指示信息,使得用户对第一终端上发生的第一事件引起警惕,小心上当受骗。In the embodiment of the present application, for the first terminal, it mainly reports the information of the collected event. The information of the event can be used by the server to obtain the information of the pseudo base station, and the server can determine the information in various ways. The above has been done. However, the server determination method is obtained based on the calculation of big data. Therefore, the reliability of the judged results is relatively high, and the obtained results are more accurate. If the terminal is connected to a pseudo base station, the server will send the pseudo base station indication information to the terminal, so that the terminal can prompt the pseudo base station indication information, so that the user can be alert to the first event that occurs on the first terminal, be careful deceived.

上面对本申请实施例中提示方法进行了描述,下面对本申请实施例中的服务器和终端进行描述,如图9(a)所示,为本申请实施例中服务器的一个实施例示意图,包括:The prompting method in the embodiment of the present application is described above, and the server and the terminal in the embodiment of the present application are described below. As shown in FIG. 9(a), it is a schematic diagram of an embodiment of the server in the embodiment of the present application, including:

接收模块901,用于接收多个终端发送的事件的信息;A receiving module 901, configured to receive event information sent by multiple terminals;

获取模块902,用于根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。The obtaining module 902 is configured to obtain the information of the real base station and the information of the pseudo base station according to the information of the events sent by the multiple terminals.

可选的,在本申请的一些实施例中,在上述图9(a)所示的基础上,如图9(b)所示,为服务器的另一个实施例示意图,所述服务器还包括:Optionally, in some embodiments of the present application, on the basis shown in FIG. 9( a ) above, as shown in FIG. 9( b ), it is a schematic diagram of another embodiment of the server, and the server further includes:

确定模块903,用于根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;A determination module 903, configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal accessing the pseudo base station among the multiple terminals;

发送模块904,用于向所述目标终端发送伪基站的指示信息。The sending module 904 is configured to send the indication information of the pseudo base station to the target terminal.

可选的,在本申请的一些实施例中,所述事件的信息包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。Optionally, in some embodiments of the present application, the information of the event includes a terminal identifier, location information of the terminal, information of a base station accessed when the event occurs, and a time when the event occurs.

可选的,在本申请的一些实施例中,所述获取模块902,具体用于:Optionally, in some embodiments of the present application, the obtaining module 902 is specifically configured to:

根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;According to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurs, the time when the event occurs, and the preset position calculation accuracy, determine the initial base station with respect to longitude, latitude, and date Information;

从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;From the information about the initial base station of longitude, latitude, and date, delete the information of the initial base station whose number of occurrences in consecutive days is less than the first threshold;

去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;Remove the date, and combine the information of other initial base stations to obtain the information about the longitude and latitude of the screening base station;

确定所述筛选基站的信息为真实基站的信息。It is determined that the information of the screening base station is the information of the real base station.

可选的,在本申请的一些实施例中,所述获取模块902,具体还用于:Optionally, in some embodiments of the present application, the obtaining module 902 is further configured to:

根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;Determine the location information of the terminal accessed by the target base station at the first time and the second time according to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurs, and the time when the event occurs location information of the accessed terminal, the target base station is any base station accessed by the multiple terminals when the event occurs;

根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;According to the location information of the terminal accessed by the target base station at the first time, the first center position of the accessed terminal is calculated, and the access terminal is calculated according to the location information of the terminal accessed by the target base station at the second time. the second center position of the terminal;

确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;determining that the first center position is the first position of the target base station, and determining that the second center position is the second position of the target base station;

若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述获取模块确定所述目标基站的信息为伪基站的信息。If the absolute value of the difference between the first position and the second position is greater than a second threshold, the obtaining module determines that the information of the target base station is information of the pseudo base station.

可选的,在本申请的一些实施例中,在上述图9(b)所示的基础上,如图9(c)所示,为服务器的另一个实施例示意图,所述服务器还包括:Optionally, in some embodiments of the present application, based on the above shown in FIG. 9(b), as shown in FIG. 9(c), it is a schematic diagram of another embodiment of the server, and the server further includes:

标记模块905,用于标记所述真实基站和所述伪基站的可疑概率;a marking module 905, configured to mark the suspicious probability of the real base station and the pseudo base station;

所述接收模块901,还用于接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;The receiving module 901 is further configured to receive feedback information sent by the first target terminal, where the feedback information is whether the user input indicates whether the base station accessed by the first target terminal when the event occurs is a pseudo base station. accurate input information;

修改模块906,用于根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率。The modifying module 906 is configured to correspondingly modify the suspicious probability of the pseudo base station according to the feedback information, so as to obtain the modified suspicious probability of the pseudo base station.

可选的,在本申请的一些实施例中,在上述图9(c)所示的基础上,如图9(d)所示,为服务器的另一个实施例示意图,所述服务器还包括:Optionally, in some embodiments of the present application, on the basis shown in FIG. 9( c ) above, as shown in FIG. 9( d ), it is a schematic diagram of another embodiment of the server, and the server further includes:

所述确定模块903,还用于确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息、可疑概率小于第四阈值的基站的信息为目标真实基站的信息;The determining module 903 is further configured to determine that the information of the base station with the suspicious probability greater than the third threshold is the information of the target pseudo base station, and the information of the base station with the suspicious probability less than the fourth threshold is the information of the target real base station;

模型训练模块907,用于根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到不同基站的信息中包括的各个特征的参考权重。The model training module 907 is configured to perform model training according to the information of the target pseudo base station and the information of the target real base station to obtain reference weights of each feature included in the information of different base stations.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述接收模块901,还用于接收第一终端发送的第一事件的信息,所述第一事件的信息包括发生所述第一事件时接入的第一基站的信息;The receiving module 901 is further configured to receive information of a first event sent by a first terminal, where the information of the first event includes information of the first base station accessed when the first event occurs;

所述发送模块904,还用于若所述第一基站的信息在所述伪基站的信息中,则所述发送模块向所述第一终端发送伪基站的指示信息。The sending module 904 is further configured to send the indication information of the pseudo base station to the first terminal if the information of the first base station is in the information of the pseudo base station.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述确定模块903,还用于若所述第一基站的信息未在所述伪基站的信息中,则所述确定模块903根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率;若所述目标概率小于等于所述第五阈值,则所述确定模块903确定所述第一基站为伪基站;The determining module 903 is further configured to: if the information of the first base station is not in the information of the pseudo base station, the determining module 903 is further configured to perform the determining according to the information of the first event and the information included in the information of the base station. The reference weight of each feature determines the target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the determining module 903 determines that the first base station is a pseudo base station;

所述发送模块904,还用于向所述第一终端发送伪基站的指示信息。The sending module 904 is further configured to send the indication information of the pseudo base station to the first terminal.

可选的,在本申请的一些实施例中,所述事件包括:接收短信和/或来电;Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call;

所述事件的信息还包括:所述短信的内容和/或所述来电的号码。The event information further includes: the content of the short message and/or the number of the incoming call.

如图10所示,为本申请实施例中终端的一个实施例示意图,包括:As shown in FIG. 10, it is a schematic diagram of an embodiment of the terminal in the embodiment of the present application, including:

采集模块1001,用于终端检测事件发生并采集所述事件的信息;The acquisition module 1001 is used for the terminal to detect the occurrence of an event and collect the information of the event;

发送模块1002,用于向服务器发送所述事件的信息;A sending module 1002, configured to send the information of the event to the server;

接收模块1003,用于接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的;A receiving module 1003, configured to receive the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event;

提示模块1004,用于提示所述伪基站的指示信息。The prompting module 1004 is configured to prompt the indication information of the pseudo base station.

可选的,在本申请的一些实施例中,所述事件的信息包括所述终端标识、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。Optionally, in some embodiments of the present application, the information of the event includes the identifier of the terminal, the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述接收模块1003,还用于接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;The receiving module 1003 is further configured to receive feedback information, where the feedback information is input information entered by the user as to whether the indication information that the base station accessed by the terminal when the event occurs is a pseudo base station is accurate;

所述发送模块1004,还用于向所述服务器发送所述反馈信息,所述反馈信息用于所述服务器对所述伪基站的可疑概率进行修改。The sending module 1004 is further configured to send the feedback information to the server, where the feedback information is used by the server to modify the suspicious probability of the pseudo base station.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述提示模块1004,具体用于通过文字显示所述伪基站的指示信息。The prompting module 1004 is specifically configured to display the indication information of the pseudo base station through text.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述提示模块1004,具体用于通过危险标识显示所述伪基站的指示信息。The prompting module 1004 is specifically configured to display the indication information of the pseudo base station through a danger sign.

所述提示模块1004,具体用于通过语音提示所述伪基站的指示信息。The prompting module 1004 is specifically configured to prompt the indication information of the pseudo base station by voice.

可选的,在本申请的一些实施例中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call; the information of the event further includes: the content of the short message and/or the number of the incoming call.

如图11所示,为本申请实施例中服务器的另一个实施例示意图。As shown in FIG. 11 , it is a schematic diagram of another embodiment of the server in the embodiment of the present application.

该服务器可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上有线或无线网络接口1150,有线或无线网络接口也可以称为收发器,一个或一个以上中央处理器(central processing units,CPU)1122(例如,一个或一个以上处理器)和存储器1132,一个或一个以上存储应用程序1142或数据1144的存储介质1130(例如一个或一个以上海量存储设备)。The server may vary greatly due to different configurations or performance, and may include one or more wired or wireless network interfaces 1150, which may also be referred to as transceivers, and one or more central processing units (central processing units). units, CPU) 1122 (eg, one or more processors) and memory 1132, one or more storage media 1130 (eg, one or more mass storage devices) that store applications 1142 or data 1144.

本申请实施例中,有线或无线网络接口1150可以接收多个终端发送的事件的信息;中央处理器1122根据有线或无线网络接口1150接收的多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。对于在目标终端上提示所述伪基站的指示信息,可以包括但不限于图4(c)-图4(p)所示的实现方式。In this embodiment of the present application, the wired or wireless network interface 1150 can receive information about events sent by multiple terminals; the central processor 1122 obtains information about real base stations according to the information about events sent by multiple terminals received by the wired or wireless network interface 1150 and pseudo base station information. The indication information for prompting the pseudo base station on the target terminal may include, but is not limited to, the implementations shown in FIG. 4(c)-FIG. 4(p).

其中,存储器1132和存储介质1130可以是短暂存储或持久存储。存储在存储介质1130的程序可以包括一个或一个以上模块(图示没标出),每个模块可以包括对服务器中的一系列指令操作。更进一步地,中央处理器1122可以设置为与存储介质1130通信,在服务器1100上执行存储介质1130中的一系列指令操作。Among them, the memory 1132 and the storage medium 1130 may be short-term storage or persistent storage. The program stored in the storage medium 1130 may include one or more modules (not shown in the figure), and each module may include a series of instruction operations on the server. Furthermore, the central processing unit 1122 may be configured to communicate with the storage medium 1130 to execute a series of instruction operations in the storage medium 1130 on the server 1100 .

服务器1100还可以包括一个或一个以上电源1126,一个或一个以上输入输出接口1158,和/或,一个或一个以上操作系统1141,例如Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM等等。Server 1100 may also include one or more power supplies 1126, one or more input/output interfaces 1158, and/or, one or more operating systems 1141, such as Windows Server™, Mac OS X™, Unix™, Linux™, FreeBSD™, and the like.

上述实施例中由服务器所执行的步骤可以基于该图11所示的服务器结构。The steps performed by the server in the above embodiment may be based on the server structure shown in FIG. 11 .

可选的,在本申请的一些实施例中,中央处理器1122,还用于执行以下步骤:根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;Optionally, in some embodiments of the present application, the central processing unit 1122 is further configured to perform the following step: according to the information of the real base station and the information of the pseudo base station, determine the access pseudo base station among the multiple terminals the target terminal of the base station;

有线或无线网络接口1150,还用于执行以下步骤:向所述目标终端发送伪基站的指示信息。The wired or wireless network interface 1150 is further configured to perform the following step: sending the indication information of the pseudo base station to the target terminal.

可选的,在本申请的一些实施例中,所述事件的信息包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。Optionally, in some embodiments of the present application, the information of the event includes a terminal identifier, location information of the terminal, information of a base station accessed when the event occurs, and a time when the event occurs.

可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤:Optionally, in some embodiments of the present application, the central processing unit 1122 is specifically configured to perform the following steps:

根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;According to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurs, the time when the event occurs, and the preset position calculation accuracy, determine the initial base station with respect to longitude, latitude, and date Information;

从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;From the information about the initial base station of longitude, latitude, and date, delete the information of the initial base station whose number of occurrences in consecutive days is less than the first threshold;

去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;Remove the date, and combine the information of other initial base stations to obtain the information about the longitude and latitude of the screening base station;

确定所述筛选基站的信息为真实基站的信息。It is determined that the information of the screening base station is the information of the real base station.

可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤:Optionally, in some embodiments of the present application, the central processing unit 1122 is specifically configured to perform the following steps:

所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;The server determines, according to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurs, and the time when the event occurs, the location information of the terminal accessed by the target base station at the first time, and Location information of the terminal accessed at the second time, the target base station is any base station accessed by the multiple terminals when the event occurs;

根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;According to the location information of the terminal accessed by the target base station at the first time, the first center position of the accessed terminal is calculated, and the access terminal is calculated according to the location information of the terminal accessed by the target base station at the second time. the second center position of the terminal;

确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;determining that the first center position is the first position of the target base station, and determining that the second center position is the second position of the target base station;

若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述中央处理器确定所述目标基站的信息为伪基站的信息。If the absolute value of the difference between the first position and the second position is greater than a second threshold, the central processor determines that the information of the target base station is the information of the pseudo base station.

可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤:标记所述真实基站和所述伪基站的可疑概率;根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率;Optionally, in some embodiments of the present application, the central processing unit 1122 is specifically configured to perform the following steps: marking the suspicious probability of the real base station and the pseudo base station; and correspondingly modifying the The suspicious probability of the pseudo base station is obtained, and the modified suspicious probability of the pseudo base station is obtained;

有线或无线网络接口1150还用于执行以下步骤:接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息。The wired or wireless network interface 1150 is further configured to perform the following steps: receiving feedback information sent by the first target terminal, where the feedback information is input by the user and the base station accessed by the first target terminal when the event occurs is a pseudo base station indicates whether the information is accurate or not.

可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤:Optionally, in some embodiments of the present application, the central processing unit 1122 is specifically configured to perform the following steps:

确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息、可疑概率小于第四阈值的基站的信息为目标真实基站的信息;It is determined that the information of the base station with the suspicious probability greater than the third threshold is the information of the target pseudo base station, and the information of the base station with the suspicious probability less than the fourth threshold is the information of the target real base station;

根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到基站的信息中包括的各个特征的参考权重。According to the information of the target pseudo base station and the information of the target real base station, model training is performed to obtain the reference weight of each feature included in the information of the base station.

可选的,在本申请的一些实施例中,有线或无线网络接口1150还用于执行以下步骤:Optionally, in some embodiments of the present application, the wired or wireless network interface 1150 is further configured to perform the following steps:

接收第一终端发送的第一事件的信息,所述第一事件的信息包括发生所述第一事件时接入的第一基站的信息;receiving information about a first event sent by a first terminal, where the information about the first event includes information about the first base station accessed when the first event occurs;

若所述第一基站的信息在所述伪基站的信息中,则所述有线或无线网络接口1150向所述第一终端发送伪基站的指示信息。If the information of the first base station is in the information of the pseudo base station, the wired or wireless network interface 1150 sends the indication information of the pseudo base station to the first terminal.

可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤:Optionally, in some embodiments of the present application, the central processing unit 1122 is specifically configured to perform the following steps:

若所述第一基站的信息未在所述伪基站的信息中,则所述中央处理器1122根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率;若所述目标概率小于等于所述第五阈值,则所述中央处理器1122确定所述第一基站为伪基站;If the information of the first base station is not in the information of the pseudo base station, the central processor 1122 determines the information of the first event and the reference weight of each feature included in the information of the base station according to the information of the first event. the target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the central processor 1122 determines that the first base station is a pseudo base station;

有线或无线网络接口1150还用于执行以下步骤:向所述第一终端发送伪基站的指示信息。The wired or wireless network interface 1150 is further configured to perform the following step: sending the indication information of the pseudo base station to the first terminal.

可选的,在本申请的一些实施例中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call; the information of the event further includes: the content of the short message and/or the number of the incoming call.

如图12所示,为本申请实施例中终端的另一个实施例示意图。As shown in FIG. 12 , it is a schematic diagram of another embodiment of the terminal in the embodiment of the present application.

为了便于说明,图12仅示出了与本申请实施例相关的部分,具体技术细节未揭示的,请参照本申请实施例方法部分。该终端可以为包括手机、平板电脑、PDA(PersonalDigital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑等任意终端设备,以终端为手机为例:For the convenience of description, FIG. 12 only shows the part related to the embodiment of the present application, and the specific technical details are not disclosed, please refer to the method part of the embodiment of the present application. The terminal can be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant, personal digital assistant), a POS (Point of Sales, a sales terminal), a vehicle-mounted computer, etc. The terminal is a mobile phone as an example:

图12示出的是与本申请实施例提供的终端相关的手机的部分结构的框图。参考图12,手机包括:处理器1280、通信接口1210、输出单元1270、存储器1220、输入单元1230、传感器1250、以及电源1290等部件。其中,通信接口1210可以包括射频(Radio Frequency,RF)电路1211、无线保真(wireless fidelity,WiFi)模块1212等部件;输出单元1270可以包括显示单元1240、音频电路1260等部件。本领域技术人员可以理解,图12中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。FIG. 12 is a block diagram showing a partial structure of a mobile phone related to a terminal provided by an embodiment of the present application. Referring to FIG. 12 , the mobile phone includes: a processor 1280 , a communication interface 1210 , an output unit 1270 , a memory 1220 , an input unit 1230 , a sensor 1250 , and a power supply 1290 and other components. The communication interface 1210 may include components such as a radio frequency (Radio Frequency, RF) circuit 1211, a wireless fidelity (wireless fidelity, WiFi) module 1212, and the like; the output unit 1270 may include components such as a display unit 1240, an audio circuit 1260, and the like. Those skilled in the art can understand that the structure of the mobile phone shown in FIG. 12 does not constitute a limitation on the mobile phone, and may include more or less components than the one shown, or combine some components, or arrange different components.

下面结合图12对手机的各个构成部件进行具体的介绍:The following is a detailed introduction to each component of the mobile phone with reference to Figure 12:

处理器1280是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1220内的软件程序和/或模块,以及调用存储在存储器1220内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。在本申请实施例中,所述处理器1280检测事件发生并采集所述事件的信息。可选的,处理器1280可包括一个或多个处理单元;优选的,处理器1280可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1280中。The processor 1280 is the control center of the mobile phone, and uses various interfaces and lines to connect various parts of the entire mobile phone, by running or executing the software programs and/or modules stored in the memory 1220, and calling the data stored in the memory 1220. Various functions of the mobile phone and processing data, so as to monitor the mobile phone as a whole. In this embodiment of the present application, the processor 1280 detects the occurrence of an event and collects information of the event. Optionally, the processor 1280 may include one or more processing units; preferably, the processor 1280 may integrate an application processor and a modem processor, wherein the application processor mainly processes the operating system, user interface, and application programs, etc. , the modem processor mainly deals with wireless communication. It can be understood that, the above-mentioned modulation and demodulation processor may not be integrated into the processor 1280.

RF电路1211可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器1280处理;另外,将设计上行的数据发送给基站。在本申请实施例中,RF电路1211可以向服务器发送处理器1280所采集的所述事件的信息,接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的。The RF circuit 1211 can be used for receiving and sending signals during transmission and reception of information or during a call. In particular, after receiving the downlink information of the base station, it is processed by the processor 1280; in addition, it sends the designed uplink data to the base station. In this embodiment of the present application, the RF circuit 1211 may send the information of the event collected by the processor 1280 to the server, and receive the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is based on the Information about the event is obtained.

通常,RF电路1211包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路1211还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。Generally, the RF circuit 1211 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuit 1211 can also communicate with the network and other devices through wireless communication. The above-mentioned wireless communication can use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division) Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (Long Term Evolution, LTE), email, Short Messaging Service (Short Messaging Service, SMS), etc.

存储器1220可用于存储软件程序以及模块,处理器1280通过运行存储在存储器1220的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器1220可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器1220可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 1220 can be used to store software programs and modules, and the processor 1280 executes various functional applications and data processing of the mobile phone by running the software programs and modules stored in the memory 1220 . The memory 1220 may mainly include a stored program area and a stored data area, wherein the stored program area may store an operating system, an application program required for at least one function (such as a sound playback function, an image playback function, etc.), etc.; Data created by the use of the mobile phone (such as audio data, phone book, etc.), etc. Additionally, memory 1220 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.

输入单元1230可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。如图6(a)和6(b)中,若用户输入反馈信息,那么该反馈信息可以通过输入单元1230被手机接收。具体地,输入单元1230可包括触控面板1231以及其他输入设备1232。触控面板1231,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1231上或在触控面板1231附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板1231可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1280,并能接收处理器1280发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板1231。除了触控面板1231,输入单元1230还可以包括其他输入设备1232。具体地,其他输入设备1232可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The input unit 1230 can be used to receive inputted numerical or character information, and generate key signal input related to user setting and function control of the mobile phone. As shown in FIGS. 6( a ) and 6 ( b ), if the user inputs feedback information, the feedback information can be received by the mobile phone through the input unit 1230 . Specifically, the input unit 1230 may include a touch panel 1231 and other input devices 1232 . The touch panel 1231, also known as a touch screen, can collect the user's touch operations on or near it (such as the user's finger, stylus, etc., any suitable object or attachment on or near the touch panel 1231). operation), and drive the corresponding connection device according to the preset program. Optionally, the touch panel 1231 may include two parts, a touch detection device and a touch controller. Among them, the touch detection device detects the user's touch orientation, detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and then sends it to the touch controller. To the processor 1280, and can receive the command sent by the processor 1280 and execute it. In addition, the touch panel 1231 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves. Besides the touch panel 1231 , the input unit 1230 may also include other input devices 1232 . Specifically, other input devices 1232 may include, but are not limited to, one or more of physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, joysticks, and the like.

输出单元1270可以包括显示单元1240、音频电路1260等部件。在本申请实施例中,输出单元1270可以用于提示所述伪基站的指示信息。The output unit 1270 may include components such as the display unit 1240, the audio circuit 1260, and the like. In this embodiment of the present application, the output unit 1270 may be configured to prompt the indication information of the pseudo base station.

显示单元1240可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。如图4(a)-4(p),图6(a)-图6(d)所示的界面,都是通过显示单元1240来显示的。显示单元1240可包括显示面板1241,可选的,可以采用液晶显示器(Liquid CrystalDisplay,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板1241。进一步的,触控面板1231可覆盖显示面板1241,当触控面板1231检测到在其上或附近的触摸操作后,传送给处理器1280以确定触摸事件的类型,随后处理器1280根据触摸事件的类型在显示面板1241上提供相应的视觉输出。虽然在图12中,触控面板1231与显示面板1241是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板1231与显示面板1241集成而实现手机的输入和输出功能。The display unit 1240 may be used to display information input by the user or information provided to the user and various menus of the mobile phone. The interfaces shown in FIGS. 4( a ) to 4 ( p ) and FIGS. 6 ( a ) to 6 ( d ) are all displayed by the display unit 1240 . The display unit 1240 may include a display panel 1241, and optionally, the display panel 1241 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD), an organic light-emitting diode (Organic Light-Emitting Diode, OLED), or the like. Further, the touch panel 1231 can cover the display panel 1241, and when the touch panel 1231 detects a touch operation on or near it, it transmits it to the processor 1280 to determine the type of the touch event, and then the processor 1280 determines the type of the touch event according to the touch event. Type provides corresponding visual output on display panel 1241. Although in FIG. 12, the touch panel 1231 and the display panel 1241 are used as two independent components to realize the input and input functions of the mobile phone, in some embodiments, the touch panel 1231 and the display panel 1241 can be integrated to form Realize the input and output functions of the mobile phone.

音频电路1260、扬声器1261,传声器1262可提供用户与手机之间的音频接口。如图4(e)、图4(f)所示、图4(i)、图4(j)所示、图4(m)、图4(n)所示,可以通过音频电路1260,来向用户提示伪基站的指示信息。音频电路1260可将接收到的音频数据转换后的电信号,传输到扬声器1261,由扬声器1261转换为声音信号输出;另一方面,传声器1262将收集的声音信号转换为电信号,由音频电路1260接收后转换为音频数据,再将音频数据输出处理器1280处理后,经RF电路1211以发送给比如另一手机,或者将音频数据输出至存储器1220以便进一步处理。The audio circuit 1260, the speaker 1261, and the microphone 1262 can provide an audio interface between the user and the mobile phone. As shown in FIG. 4(e), FIG. 4(f), FIG. 4(i), FIG. 4(j), FIG. 4(m), and FIG. 4(n), the audio circuit 1260 can be used to The indication information of the pseudo base station is prompted to the user. The audio circuit 1260 can transmit the received audio data converted electrical signals to the speaker 1261, and the speaker 1261 converts them into sound signals for output; on the other hand, the microphone 1262 converts the collected sound signals into electrical signals, and the audio circuit 1260 converts the collected sound signals into electrical signals. After receiving, it is converted into audio data, and then the audio data is output to the processor 1280 for processing, and then sent to, for example, another mobile phone via the RF circuit 1211, or the audio data is output to the memory 1220 for further processing.

手机还可包括至少一种传感器1250,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板1241的亮度,接近传感器可在手机移动到耳边时,关闭显示面板1241和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The cell phone may also include at least one sensor 1250, such as a light sensor, a motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1241 according to the brightness of the ambient light, and the proximity sensor may turn off the display panel 1241 and/or when the mobile phone is moved to the ear. or backlight. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes), and can detect the magnitude and direction of gravity when it is stationary. games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, etc. Repeat.

WiFi属于短距离无线传输技术,手机通过WiFi模块1212可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图12示出了WiFi模块1212,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变申请的本质的范围内而省略。WiFi is a short-distance wireless transmission technology. The mobile phone can help users to send and receive emails, browse web pages, and access streaming media through the WiFi module 1212. It provides users with wireless broadband Internet access. Although FIG. 12 shows the WiFi module 1212, it can be understood that it is not a necessary component of the mobile phone, and can be completely omitted as required within the scope of not changing the essence of the application.

手机还包括给各个部件供电的电源1290(比如电池),优选的,电源可以通过电源管理系统与处理器1280逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The mobile phone also includes a power supply 1290 (such as a battery) for supplying power to various components. Preferably, the power supply can be logically connected to the processor 1280 through a power management system, so as to manage charging, discharging, and power consumption management functions through the power management system.

尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown, the mobile phone may also include a camera, a Bluetooth module, and the like, which will not be repeated here.

上述实施例中由终端所执行的步骤可以基于该图12所示的终端结构。The steps performed by the terminal in the above embodiment may be based on the terminal structure shown in FIG. 12 .

可选的,在本申请的一些实施例中,所述事件的信息包括所述终端标识、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。Optionally, in some embodiments of the present application, the information of the event includes the identifier of the terminal, the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述输入单元1230,还用于接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;The input unit 1230 is further configured to receive feedback information, where the feedback information is input information entered by the user as to whether the indication information that the base station accessed by the terminal when the event occurs is a pseudo base station is accurate;

所述射频电路1211,还用于向所述服务器发送所述反馈信息,所述反馈信息用于所述服务器对所述伪基站的可疑概率进行修改。The radio frequency circuit 1211 is further configured to send the feedback information to the server, where the feedback information is used by the server to modify the suspicious probability of the pseudo base station.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述显示单元1240,还用于通过文字显示所述伪基站的指示信息。The display unit 1240 is further configured to display the indication information of the pseudo base station through text.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述显示单元1240,还用于通过危险标识显示所述伪基站的指示信息。The display unit 1240 is further configured to display the indication information of the pseudo base station through a danger sign.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述音频电路1260,还用于通过语音提示所述伪基站的指示信息。The audio circuit 1260 is further configured to prompt the indication information of the pseudo base station by voice.

可选的,在本申请的一些实施例中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call; the information of the event further includes: the content of the short message and/or the number of the incoming call.

在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。In the above-mentioned embodiments, it may be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented in software, it can be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present invention are generated. The computer may be a general purpose computer, special purpose computer, computer network, or other programmable device. The computer instructions may be stored in or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server or data center Transmission to another website site, computer, server, or data center is by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that includes an integration of one or more available media. The usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), among others.

可选的,在本申请的一些实施例中,提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如服务器在上述图3、图5、图7或图8所示的方法,其相同或相应的技术特征可援引在本实施例中。Optionally, in some embodiments of the present application, a computer program product containing instructions is provided, when it runs on a computer, the computer causes the computer to execute as shown in the above-mentioned FIG. 3 , FIG. 5 , FIG. 7 or FIG. 8 . The same or corresponding technical features can be cited in this embodiment.

可选的,在本申请的一些实施例中,提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如终端在上述图3、图5、图7或图8所示的方法,其相同或相应的技术特征可援引在本实施例中。Optionally, in some embodiments of the present application, a computer program product containing instructions is provided, when it is run on a computer, the computer is made to execute the terminal as shown in FIG. 3 , FIG. 5 , FIG. 7 or FIG. 8 . The same or corresponding technical features can be cited in this embodiment.

本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”、“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of this application and the above-mentioned drawings are used to distinguish similar objects and are not necessarily used to describe a specific order or sequence. It is to be understood that data so used may be interchanged under appropriate circumstances so that the embodiments described herein can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having" and any variations thereof, are intended to cover non-exclusive inclusion, for example, a process, method, system, product or device comprising a series of steps or units is not necessarily limited to those expressly listed Rather, those steps or units may include other steps or units not expressly listed or inherent to these processes, methods, products or devices.

Claims (28)

1. A method of prompting, comprising:
the server receives the information of events sent by a plurality of terminals;
the server acquires information of a real base station and information of a pseudo base station according to the information of the events sent by the plurality of terminals;
the server acquires the information of the real base station according to the information of the events sent by the plurality of terminals, and the method comprises the following steps:
the server determines initial base station information about longitude, latitude and date according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and preset position calculation precision;
the server deletes information of the initial base station, the occurrence number of which is less than a first threshold value in continuous dates, from the information of the initial base stations about longitude, latitude and date;
the server removes the date, and the information of other initial base stations is combined to obtain the information of the screening base stations about longitude and latitude;
and the server determines that the information of the screening base station is the information of the real base station.
2. The method of claim 1, further comprising:
the server determines a target terminal accessed to a pseudo base station in the plurality of terminals according to the information of the real base station and the information of the pseudo base station;
and the server sends the indication information of the pseudo base station to the target terminal.
3. The method according to claim 1 or 2, wherein the server obtains information of the pseudo base station according to the information of the event sent by the plurality of terminals, and comprises:
the server determines the position information of a terminal accessed by a target base station at a first time and the position information of a terminal accessed at a second time according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs and the time when the event occurs, wherein the target base station is any one of the base stations accessed when the plurality of terminals occur;
the server calculates a first central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the first time, and calculates a second central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the second time;
the server determines that the first central position is a first position of the target base station, and determines that the second central position is a second position of the target base station;
and if the absolute value of the difference between the first position and the second position is greater than a second threshold, the server determines that the information of the target base station is the information of the pseudo base station.
4. The method according to claim 1 or 2, characterized in that the method further comprises:
the server marks the suspicious probabilities of the real base stations and the pseudo base stations;
the server receives feedback information sent by a first target terminal, wherein the feedback information is input information which is input by a user and indicates whether indication information of a base station accessed when the first target terminal has the event is a pseudo base station is accurate or not;
and the server correspondingly modifies the suspicious probability of the pseudo base station according to the feedback information to obtain the modification suspicious probability of the pseudo base station.
5. A method of prompting, comprising:
a terminal detects the occurrence of an event and collects the information of the event;
the terminal sends the information of the event to a server;
the terminal receives indication information of a pseudo base station sent by the server, wherein the indication information of the pseudo base station is obtained by searching in the information of the real base station and the information of the pseudo base station after the server obtains the information of the real base station and the information of the pseudo base station according to the information of the event;
the terminal prompts the indication information of the pseudo base station;
the information of the real base station is obtained by the server according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and the preset position calculation precision, determining the information of the initial base station about longitude, latitude and date, deleting the information of the initial base station with the occurrence frequency less than a first threshold value in continuous date from the information of the initial base station about longitude, latitude and date, removing the date and combining the information of other initial base stations to obtain the information of the screening base station about longitude and latitude, and determining the information of the screening base station to be the information of the real base station.
6. The method of claim 5, further comprising:
the terminal receives feedback information, wherein the feedback information is input information which is input by a user and indicates whether the indication information of the base station accessed when the terminal generates the event is a pseudo base station is accurate or not;
and the terminal sends the feedback information to the server, wherein the feedback information is used for the server to modify the suspicious probability of the pseudo base station.
7. The method according to claim 5 or 6, wherein the prompting, by the terminal, of the indication information of the pseudo base station comprises:
and the terminal displays the indication information of the pseudo base station through characters.
8. The method according to claim 5 or 6, wherein the prompting, by the terminal, of the indication information of the pseudo base station comprises:
and the terminal displays the indication information of the pseudo base station through the danger identification.
9. The method according to claim 5 or 6, wherein the prompting, by the terminal, of the indication information of the pseudo base station comprises:
and the terminal prompts the indication information of the pseudo base station through voice.
10. A server, comprising:
the receiving module is used for receiving the information of the events sent by the plurality of terminals;
the acquisition module is used for acquiring the information of the real base station and the information of the pseudo base station according to the information of the events sent by the plurality of terminals;
the acquisition module is specifically configured to:
determining initial base station information about longitude, latitude and date according to the position information of the terminals sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and preset position calculation precision;
deleting information of the initial base station with the occurrence number less than a first threshold value in continuous dates from the information of the initial base stations with the longitude, the latitude and the dates;
removing the date, and combining the information of other initial base stations to obtain information about screening base stations of longitude and latitude;
and determining the information of the screening base station as the information of the real base station.
11. The server according to claim 10, further comprising:
a determining module, configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal that is accessed to the pseudo base station from among the multiple terminals;
and the sending module is used for sending the indication information of the pseudo base station to the target terminal.
12. The server according to claim 10 or 11, wherein the obtaining module is further configured to:
determining the position information of a terminal accessed by a target base station at a first time and the position information of a terminal accessed at a second time according to the position information of the terminal sent by the plurality of terminals, the information of the accessed base station when the event occurs and the time when the event occurs, wherein the target base station is any one of the base stations accessed by the plurality of terminals when the event occurs;
calculating a first central position of an accessed terminal according to the position information of the terminal accessed by the target base station at the first time, and calculating a second central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the second time;
determining the first central position as a first position of the target base station, and determining the second central position as a second position of the target base station;
if the absolute value of the difference between the first position and the second position is greater than a second threshold, the obtaining module determines that the information of the target base station is the information of the pseudo base station.
13. The server according to claim 10 or 11, wherein the server further comprises:
a marking module for marking the suspicious probabilities of the real base stations and the pseudo base stations;
the receiving module is further configured to receive feedback information sent by the first target terminal, where the feedback information is input information indicating whether the indication information, which is input by the user and used for indicating that the base station accessed when the event occurs in the first target terminal is a pseudo base station, is accurate;
and the modification module is used for correspondingly modifying the suspicious probability of the pseudo base station according to the feedback information to obtain the modified suspicious probability of the pseudo base station.
14. A terminal, comprising:
the acquisition module is used for detecting the occurrence of an event and acquiring the information of the event;
the sending module is used for sending the information of the event to a server;
the receiving module is used for receiving indication information of the pseudo base station sent by the server, wherein the indication information of the pseudo base station is obtained by searching in the information of the real base station and the information of the pseudo base station after the server obtains the information of the real base station and the information of the pseudo base station according to the information of the event;
the prompting module is used for prompting the indication information of the pseudo base station;
the information of the real base station is obtained by the server according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and the preset position calculation precision, determining the information of the initial base station about longitude, latitude and date, deleting the information of the initial base station with the occurrence frequency less than a first threshold value in continuous date from the information of the initial base station about longitude, latitude and date, removing the date and combining the information of other initial base stations to obtain the information of the screening base station about longitude and latitude, and determining the information of the screening base station to be the information of the real base station.
15. The terminal of claim 14,
the receiving module is further configured to receive feedback information, where the feedback information is input information that is input by a user and indicates whether the indication information that the base station accessed when the event occurs in the terminal is a pseudo base station is accurate;
the sending module is further configured to send the feedback information to the server, where the feedback information is used for the server to modify the suspicious probability of the pseudo base station.
16. The terminal according to claim 14 or 15,
the prompting module is specifically used for displaying the indication information of the pseudo base station through characters.
17. The terminal according to claim 14 or 15,
the prompt module is specifically configured to display indication information of the pseudo base station through a danger identifier.
18. The terminal according to claim 14 or 15,
the prompting module is specifically used for prompting the indication information of the pseudo base station through voice.
19. A server, comprising:
a transceiver, a processor, a memory and a bus through which the transceiver, the processor and the memory are connected;
the memory for storing a computer program;
the transceiver is used for receiving information of events sent by a plurality of terminals;
the processor is configured to call the computer program, and obtain information of a real base station and information of a pseudo base station according to the information of the event sent by the plurality of terminals;
the processor is specifically configured to perform the steps of:
determining initial base station information about longitude, latitude and date according to the position information of the terminals sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and preset position calculation precision;
deleting information of the initial base station with the occurrence number less than a first threshold value in continuous dates from the information of the initial base stations with the longitude, the latitude and the dates;
removing the date, and combining the information of other initial base stations to obtain information about screening base stations of longitude and latitude;
and determining the information of the screening base station as the information of the real base station.
20. The server according to claim 19,
the processor is further configured to determine a target terminal accessing a pseudo base station from the plurality of terminals according to the information of the real base station and the information of the pseudo base station;
the transceiver is further configured to send indication information of a pseudo base station to the target terminal.
21. The server according to claim 19 or 20, wherein the processor is specifically configured to perform the steps of:
determining the position information of a terminal accessed by a target base station at a first time and the position information of a terminal accessed at a second time according to the position information of the terminal sent by the plurality of terminals, the information of the accessed base station when the event occurs and the time when the event occurs, wherein the target base station is any one of the base stations accessed by the plurality of terminals when the event occurs;
calculating a first central position of an accessed terminal according to the position information of the terminal accessed by the target base station at the first time, and calculating a second central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the second time;
determining the first central position as a first position of the target base station, and determining the second central position as a second position of the target base station;
and if the absolute value of the difference between the first position and the second position is greater than a second threshold, the processor determines that the information of the target base station is the information of the pseudo base station.
22. The server according to claim 19 or 20, wherein the processor is further configured to perform the steps of:
marking the suspicious probabilities of the real base station and the pseudo base station;
correspondingly modifying the suspicious probability of the pseudo base station according to the feedback information to obtain the modification suspicious probability of the pseudo base station;
the transceiver is further configured to perform the steps of:
and receiving feedback information sent by a first target terminal, wherein the feedback information is input information which is input by a user and indicates whether the base station accessed when the first target terminal has the event is a pseudo base station is accurate or not.
23. A terminal, comprising:
the device comprises a processor, a communication interface, a memory, an output unit and a bus, wherein the processor, the communication interface, the output unit and the memory are connected through the bus;
the memory for storing a computer program;
the processor is used for calling the computer program, detecting the occurrence of an event and collecting the information of the event;
the communication interface is used for sending the information of the event to a server; receiving indication information of a pseudo base station sent by the server, wherein the indication information of the pseudo base station is obtained by searching in the information of the real base station and the information of the pseudo base station after the server obtains the information of the real base station and the information of the pseudo base station according to the information of the event;
the output unit is used for prompting the indication information of the pseudo base station;
the information of the real base station is obtained by the server according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and the preset position calculation precision, determining the information of the initial base station about longitude, latitude and date, deleting the information of the initial base station with the occurrence frequency less than a first threshold value in continuous date from the information of the initial base station about longitude, latitude and date, removing the date and combining the information of other initial base stations to obtain the information of the screening base station about longitude and latitude, and determining the information of the screening base station to be the information of the real base station.
24. The terminal according to claim 23, characterized in that the terminal further comprises an input unit,
the input unit is further configured to receive feedback information, where the feedback information is input information indicating whether the indication information, which is input by the user and is used for indicating that the base station accessed when the event occurs in the terminal is a pseudo base station, is accurate;
the communication interface is further configured to send the feedback information to the server, where the feedback information is used for the server to modify the suspicious probability of the pseudo base station.
25. The terminal according to claim 23 or 24, wherein the output unit comprises a display unit,
and the display unit is used for displaying the indication information of the pseudo base station through characters.
26. The terminal according to claim 23 or 24, wherein the output unit comprises a display unit,
and the display unit is used for displaying the indication information of the pseudo base station through the danger identification.
27. The terminal according to claim 23 or 24, wherein the output unit comprises an audio circuit,
and the audio circuit is used for prompting the indication information of the pseudo base station through voice.
28. A computer-readable storage medium storing a computer program for execution by a processor to implement the method of any one of claims 1-9.
CN201780005192.7A 2017-01-22 2017-05-31 A prompting method, terminal and server Active CN108513717B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN2017100522787 2017-01-22
CN201710052278 2017-01-22
PCT/CN2017/086643 WO2018133284A1 (en) 2017-01-22 2017-05-31 Prompting method, terminal, and server

Publications (2)

Publication Number Publication Date
CN108513717A CN108513717A (en) 2018-09-07
CN108513717B true CN108513717B (en) 2020-09-04

Family

ID=62907654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780005192.7A Active CN108513717B (en) 2017-01-22 2017-05-31 A prompting method, terminal and server

Country Status (2)

Country Link
CN (1) CN108513717B (en)
WO (1) WO2018133284A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124698A (en) * 2018-10-30 2020-05-08 北京奇虎科技有限公司 Communication event identification method and device, electronic equipment and readable storage medium
CN110213724B (en) * 2019-05-17 2020-10-20 国家计算机网络与信息安全管理中心 Pseudo base station motion trajectory identification method
CN111582679B (en) * 2020-04-24 2023-04-18 腾讯科技(成都)有限公司 Processing method, device and equipment for application service partition and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430653B (en) * 2014-09-19 2020-11-06 中国电信股份有限公司 Pseudo base station discovery method and system
CN105764059B (en) * 2014-12-15 2018-11-13 北京新讯世纪信息技术有限公司 A method of pseudo-base station is identified based on terminal positional information
US9867039B2 (en) * 2015-06-26 2018-01-09 Futurewei Technologies, Inc. System and method for faked base station detection
CN105744527B (en) * 2016-03-28 2018-11-09 河海大学 A kind of pseudo-base station detection method and system based on big data and cloud computing

Also Published As

Publication number Publication date
WO2018133284A1 (en) 2018-07-26
CN108513717A (en) 2018-09-07

Similar Documents

Publication Publication Date Title
US9813860B2 (en) Geo-fencing based location detection method and electronic device
CN107480533B (en) Vulnerability repairing method and device and storage medium
CN104735671B (en) A kind of method and apparatus of identification malicious call
US10785369B1 (en) Multi-factor scam call detection and alerting
CN111125523B (en) Searching method, searching device, terminal equipment and storage medium
CN108235308B (en) Data reporting method and device, mobile terminal and computer readable medium
US20170353593A1 (en) Communication event processing method and apparatus
CN104135500A (en) Method and system for prompting application update
CN110278329B (en) Notification message management method and mobile terminal
CN106161749A (en) A kind of malicious call recognition methods, and device
CN108600516B (en) Data acquisition method, mobile terminal and computer readable storage medium
CN108513717B (en) A prompting method, terminal and server
US10298590B2 (en) Application-based service providing method, apparatus, and system
CN107895119A (en) Program installation packet inspection method, device and electronic equipment
CN112351441B (en) A data processing method, device and electronic equipment
CN106020945B (en) Shortcut item adding method and device
CN108959960B (en) Method, device and computer readable storage medium for preventing privacy disclosure
CN109067979B (en) Prompting method and mobile terminal
CN106980778B (en) Information identification method and device and terminal equipment
CN108171000B (en) Method and device for early warning of water damage disasters of oil and gas pipelines
CN110224925B (en) Message management and mobile terminal
CN107390857A (en) The method and apparatus and mobile terminal of a kind of temperature control
CN113190774A (en) Object display method and device, electronic equipment and storage medium
CN107800880B (en) Method, device, mobile terminal and storage medium for displaying number of unread messages
CN108449259B (en) Communication processing method and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant