CN108513717B - Prompting method, terminal and server - Google Patents

Prompting method, terminal and server Download PDF

Info

Publication number
CN108513717B
CN108513717B CN201780005192.7A CN201780005192A CN108513717B CN 108513717 B CN108513717 B CN 108513717B CN 201780005192 A CN201780005192 A CN 201780005192A CN 108513717 B CN108513717 B CN 108513717B
Authority
CN
China
Prior art keywords
information
base station
terminal
server
pseudo
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201780005192.7A
Other languages
Chinese (zh)
Other versions
CN108513717A (en
Inventor
朱振华
张小菊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN108513717A publication Critical patent/CN108513717A/en
Application granted granted Critical
Publication of CN108513717B publication Critical patent/CN108513717B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application discloses a prompting method, which is used for acquiring information of a real base station and information of a pseudo base station by a server according to information of events sent by a plurality of terminals, and the server obtains the information of the real base station and the information of the pseudo base station according to calculation of big data, so that the accuracy rate is higher. The embodiment of the application comprises the following steps: the server receives the information of events sent by a plurality of terminals; and the server acquires the information of the real base station and the information of the pseudo base station according to the information of the events sent by the plurality of terminals. The embodiment of the application also provides a server and a terminal.

Description

Prompting method, terminal and server
The present application claims priority from the chinese patent application entitled "a method and apparatus for preventing false base station fraud" filed by the chinese patent office on 22/1/2017 with application number 201710052278.7, the entire contents of which are incorporated herein by reference.
Technical Field
The present application relates to the field of communications, and in particular, to a prompting method, a terminal, and a server.
Background
With the development of communication technology, the cases and means of telecommunication fraud are more and more. Among the numerous telecommunication fraud technologies, the implementation of a scheme through an illegal base station or a so-called pseudo base station has become a mainstream approach. These pseudo base stations can be disguised as base stations of operators and fake others' numbers to send fraud short messages. Based on the short message sent by the pseudo base station, the number can be forged, so that the method has great confusion, and the end user has difficulty in distinguishing true and false.
In the prior art, methods for identifying a pseudo base station are a method for identifying a pseudo base station by comparing characteristic parameters of the base station with a terminal and a method for identifying a pseudo base station based on a base station position. The method for identifying the pseudo base station by comparing the characteristic parameters of the base station through the terminal comprises the following steps: and the terminal analyzes the characteristic parameters of the base station, matches the characteristic parameters with a locally preset characteristic parameter library, and if the characteristic parameters are in a legal range, the base station is considered to be a legal base station. Otherwise, the terminal is regarded as a pseudo base station, and the pseudo base station is directly shielded and accessed from the terminal. However, the judgment logic is completely dependent on the terminal, and system upgrade cannot be performed. Some characteristic parameters can be adjusted along with the development of the pseudo base station technology, but the terminal cannot dynamically obtain the characteristic parameters, so that misjudgment is easily caused.
The method for identifying the pseudo base station based on the base station position comprises the following steps: when the terminal receives the notice short message, the short message and the terminal position information are reported to the server. The server calculates according to the information reported by a large number of terminals to obtain the base station information in a certain area, and then compares the base station information with the position in the operator base station library, and the base station is regarded as a pseudo base station if the base station information is not in the operator base station library. However, the judgment mode only judges the notification type message, and any number can be constructed by the pseudo base station, so that the sent short message is not necessarily the notification type short message; the operator also has a mobile base station, and the comparison is not completely reliable in position; in addition, the position of the base station reported by the terminal is obtained through algorithm calculation, and an error exists in the position.
Disclosure of Invention
The embodiment of the application provides a prompting method, a terminal and a server, which are used for acquiring information of a real base station and information of a pseudo base station with high accuracy by the server according to big data reported by a plurality of terminals.
A first aspect of an embodiment of the present application provides a prompting method, where the method may be applied to a scenario in which a server is connected to multiple terminals, and the method may include: the server receives the information of events sent by a plurality of terminals; the event can receive a short message and/or an incoming call; it should be understood that the event information may be information of events reported by a certain number of terminals received by the server, may also be information of events reported by a certain number of terminals received by the server, and may also be information of events reported by terminals received by the server within a preset time duration, which is not limited herein. And the server acquires the information of the real base station and the information of the pseudo base station according to the information of the events sent by the plurality of terminals. That is, the server can perform calculation according to the big data reported by the plurality of terminals, and the accuracy of the obtained information of the real base station and the information of the pseudo base station is higher. It should be understood that, although the more data the terminal reports, the more accurate the information of the real base station and the information of the pseudo base station are obtained by the server, these need to be within the load range of the server. The server acquires the information of the real base station and the information of the pseudo base station to be stored, can determine a target terminal accessed to the pseudo base station from a plurality of terminals, can also determine the information of a first event reported by a first terminal in the next receiving, and can determine the authenticity of the first base station accessed by the first terminal.
With reference to the first aspect of the embodiment of the present application, in a first implementation manner of the first aspect of the embodiment of the present application, the method may further include: the server determines a target terminal accessed to a pseudo base station in the plurality of terminals according to the information of the real base station and the information of the pseudo base station; and the server sends the indication information of the pseudo base station to the target terminal. After determining that the target terminal is accessed with the pseudo base station, the server can send the indication information of the pseudo base station to the target terminal, wherein the indication information of the pseudo base station is used for prompting by the target terminal, so that a user is vigilant to an event occurring on the target terminal and is reasonably cheated carefully.
With reference to the first aspect of the embodiment of the present application and the first implementation manner of the first aspect, in a second implementation manner of the first aspect of the embodiment of the present application, the information of the event includes a terminal identifier, location information of the terminal, information of a base station accessed when the event occurs, and a time when the event occurs. The information of the event can also comprise short message content and/or an incoming call number. It should be understood that the information of the event includes, but is not limited to, the above-mentioned information, and the information of the event can be used for the server to perform calculation of big data, resulting in information of the real base station and information of the pseudo base station.
With reference to the second implementation manner of the first aspect of the embodiment of the present application, in a third implementation manner of the first aspect of the embodiment of the present application, the obtaining, by the server, information of the real base station according to the information of the events sent by the multiple terminals may include: the server determines initial base station information about longitude, latitude and date according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and preset position calculation precision; here, a plurality of sets of data on longitude, latitude, and date can be obtained. The server deletes information of the initial base station, the occurrence number of which is less than a first threshold value in continuous dates, from the information of the initial base stations about longitude, latitude and date; the first threshold value may be an empirical value or may be set according to actual conditions. The server removes the date, and the information of other initial base stations is combined to obtain the information of the screening base stations about longitude and latitude; and the server determines that the information of the screening base station is the information of the real base station. In the embodiment of the application, an implementation mode for acquiring the information of the real base station is provided, and the feasibility of the scheme is improved.
With reference to the second implementation manner of the first aspect of the embodiment of the present application, in a fourth implementation manner of the first aspect of the embodiment of the present application, the obtaining, by the server, information of the pseudo base station according to the information of the events sent by the multiple terminals may include: that is, the server identifies a possible potential pseudo base station by using the characteristics of pseudo base station movement (movement, sudden appearance and disappearance). The server determines the position information of a terminal accessed by a target base station at a first time and the position information of a terminal accessed at a second time according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs and the time when the event occurs, wherein the target base station is any one of the base stations accessed when the plurality of terminals occur; the server calculates a first central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the first time, and calculates a second central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the second time; the server determines that the first central position is a first position of the target base station, and determines that the second central position is a second position of the target base station; and if the absolute value of the difference between the first position and the second position is greater than a second threshold, the server determines that the information of the target base station is the information of the pseudo base station. In the embodiment of the application, an implementation mode for acquiring the information of the real pseudo base station is provided, and feasibility of the scheme is improved.
With reference to the first aspect of the embodiment of the present application and any one of the first to fourth implementation manners of the first aspect of the embodiment of the present application, in a fifth implementation manner of the first aspect of the embodiment of the present application, the method may further include: the server marks the suspicious probabilities of the real base stations and the pseudo base stations; the server may mark the suspicious probability of the real base station as 0 and the suspicious probability of the pseudo base station as 100%, or mark the suspicious probability according to the actual situation. The server receives feedback information sent by a first target terminal, wherein the feedback information is input information which is input by a user and indicates whether indication information of a base station accessed when the first target terminal has the event is a pseudo base station is accurate or not; that is, after the server sends the indication information of the pseudo base station to the target terminal, the target terminal will prompt the indication information of the pseudo base station, and some target terminals will receive feedback information input by the user, and these target terminals receiving the feedback information may be referred to as first target terminals, and the first target terminals report the feedback information to the server. And the server correspondingly modifies the suspicious probability of the pseudo base station according to the feedback information to obtain the modification suspicious probability of the pseudo base station. And updating the stored information of the real base station and the information of the pseudo base station, so that the stored information of the real base station and the stored information of the pseudo base station are the latest records.
In the embodiment of the application, after receiving the feedback information reported by the first target terminal, the server may modify the suspicious probability of the stored information of the real base station and the stored information of the pseudo base station, so as to update the information of the real base station and the information of the pseudo base station. When the server receives the information of the first event reported by the first terminal next time, whether the first base station accessed when the first event occurs to the terminal is the pseudo base station can be determined according to the updated information of the real base station and the information of the pseudo base station, so that the result accuracy determined according to the real base station information and the pseudo base station information updated in real time is higher.
With reference to any one of the fifth implementation manners of the first aspect of the embodiment of the present application, in a sixth implementation manner of the first aspect of the embodiment of the present application, the method may further include: the server determines that the information of the base station with the suspicious probability greater than the third threshold is the information of the target pseudo base station, and the information of the base station with the suspicious probability less than the fourth threshold is the information of the target real base station; the information of the target real base station and the information of the target pseudo base station include, but are not limited to, information such as (CID), Location Area Code (LAC), signal strength, and difference between acquisition time and reporting time. And the server performs model training according to the information of the target pseudo base station and the information of the target real base station to obtain the reference weight of each feature included in the information of the base station.
In the embodiment of the present application, if the reference weight of each feature included in the information of the base station is obtained, the information of the first base station in the information of the first event reported by the first terminal next time may be calculated to obtain the target suspicious probability of the first base station, so as to determine whether the first base station is true or false.
With reference to any one of the sixth implementation manners of the first aspect of the embodiment of the present application, in a seventh implementation manner of the first aspect of the embodiment of the present application, the method may further include: the server receives information of a first event sent by a first terminal, wherein the information of the first event may include information of a first base station accessed when the first event occurs; and if the information of the first base station is in the information of the pseudo base station, the server sends indication information of the pseudo base station to the first terminal. It should be understood that the information of the first event includes, but is not limited to, the above-mentioned information. The information of the first event may further include the identifier of the first terminal, location information of the first terminal, and a time when the first event occurs.
In the embodiment of the present application, an implementation manner of determining a pseudo base station is provided, and a server may determine whether information of a first base station is in the pseudo base station according to previously calculated information of a real base station and information of the pseudo base station. If the first base station is in the information of the pseudo base station, it indicates that the first base station is the pseudo base station, then the server may send the indication information of the pseudo base station to the first terminal, and since the accuracy of the pseudo base station calculated according to the big data is higher than that of the real base station, the accuracy of determining that the first base station is the pseudo base station is also higher.
With reference to any one of the seventh implementation manner of the first aspect of the embodiment of the present application, in an eighth implementation manner of the first aspect of the embodiment of the present application, the method may further include: if the information of the first base station is not in the information of the pseudo base station, the server determines the target probability of the first base station according to the information of the first event and the reference weight of each feature included in the information of the base station; if the target probability is less than or equal to the fifth threshold, the server determines that the first base station is a pseudo base station; and the server sends the indication information of the pseudo base station to the first terminal. In the embodiment of the present application, whether the first base station is a pseudo base station is calculated according to the reference weight of each feature in the information of the base station, which provides an optional implementation manner for the embodiment of the present application.
With reference to the first aspect of the embodiment of the present application and any one of the first to eighth implementation manners of the first aspect of the embodiment of the present application, in a ninth implementation manner of the first aspect of the embodiment of the present application, the event may include: receiving a short message and/or an incoming call; the information of the event may further include: the content of the short message and/or the number of the incoming call.
A second aspect of the present application provides a prompting method, which may include: a terminal detects the occurrence of an event and collects the information of the event; the terminal sends the information of the event to a server; if a plurality of terminals send the event information to the server, the server can acquire the information of the real base station and the information of the pseudo base station according to the event information sent by the plurality of terminals, and therefore whether the terminal is accessed to the pseudo base station can be determined. The terminal receives indication information of a pseudo base station sent by the server, wherein the indication information of the pseudo base station is acquired by the server according to the event information; and the terminal prompts the indication information of the pseudo base station. If the terminal prompts the indication information of the pseudo base station, the user can be alerted to the event happening on the target terminal and be cheated carefully.
With reference to the second aspect of the embodiment of the present application, in a first implementation manner of the second aspect of the embodiment of the present application, the information of the event may include the terminal identifier, the location information of the terminal, information of a base station accessed when the event occurs, and a time when the event occurs. The information of the event can also comprise short message content and/or an incoming call number. It should be understood that the information of the event includes, but is not limited to, the above-mentioned information, and the information of the event can be used for the server to perform calculation of big data, resulting in information of the real base station and information of the pseudo base station.
With reference to the second aspect of the embodiment of the present application and the first implementation manner of the second aspect, in a second implementation manner of the second aspect of the embodiment of the present application, the method may further include: the terminal receives feedback information, wherein the feedback information is input information which is input by a user and indicates whether the indication information of the base station accessed when the terminal generates the event is a pseudo base station is accurate or not; and the terminal sends the feedback information to the server, wherein the feedback information is used for the server to modify the suspicious probability of the pseudo base station. It should be understood that it is assumed that the terminal receiving the feedback information is referred to herein as a first target terminal. In the embodiment of the application, after receiving the feedback information reported by the first target terminal, the server may modify the suspicious probability of the stored information of the real base station and the stored information of the pseudo base station, so as to update the information of the real base station and the information of the pseudo base station. Therefore, when the server receives the information of the first event reported by the first terminal next time, whether the first base station accessed when the first event occurs to the terminal is the pseudo base station can be determined according to the updated information of the real base station and the information of the pseudo base station, and the result accuracy determined according to the real base station information and the pseudo base station information updated in real time is higher.
With reference to the second aspect of the embodiment of the present application, the first implementation manner of the second aspect, and the second implementation manner of the second aspect, in a third implementation manner of the second aspect of the embodiment of the present application, the prompting, by the terminal, the indication information of the pseudo base station may include: the terminal displays the indication information of the pseudo base station through characters; and/or the terminal displays the indication information of the pseudo base station through a danger identifier; and/or the terminal prompts the indication information of the pseudo base station through voice. It should be noted that the terminal displays the information of the event through the application interface corresponding to the event, where the information of the event may include short message content and/or an incoming call number, and may prompt the prompt information of the pseudo base station on the application interface. The application interface can be a short message interface or an incoming call interface.
With reference to the second aspect of the embodiment of the present application, the first implementation manner of the second aspect, the second implementation manner of the second aspect, and the third implementation manner of the second aspect, in a fourth implementation manner of the second aspect of the embodiment of the present application, the event includes: receiving a short message and/or an incoming call; the information of the event further includes: the content of the short message and/or the number of the incoming call.
A third aspect of the embodiments of the present application provides a server, which has a function of acquiring information of a real base station and information of a pseudo base station, where the function corresponds to the function of acquiring information of a real base station and the function of acquiring information of a pseudo base station provided in the first aspect. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
A fourth aspect of the embodiments of the present application provides a terminal, which has a function of implementing indication information for prompting a pseudo base station, where the indication information corresponds to the indication information provided in the second aspect. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above.
A fifth aspect of an embodiment of the present application provides a server, which may include: a transceiver, a processor, a memory and a bus through which the transceiver, the processor and the memory are connected;
the memory is used for storing operation instructions;
the transceiver is used for receiving information of events sent by a plurality of terminals;
and the processor is used for calling the operation instruction and acquiring the information of the real base station and the information of the pseudo base station according to the event information sent by the plurality of terminals.
In one possible design, the processor is further configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal of the plurality of terminals to access the pseudo base station;
the transceiver is further configured to send indication information of a pseudo base station to the target terminal.
In one possible design, the information of the event includes an identifier of the terminal, location information of the terminal, information of a base station accessed when the event occurs, and a time when the event occurs.
In one possible design, the processor is specifically configured to perform the steps of:
determining initial base station information about longitude, latitude and date according to the position information of the terminals sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and preset position calculation precision; deleting information of the initial base station with the occurrence number less than a first threshold value in continuous dates from the information of the initial base stations with the longitude, the latitude and the dates; removing the date, and combining the information of other initial base stations to obtain information about screening base stations of longitude and latitude; and determining the information of the screening base station as the information of the real base station.
In one possible design, the processor is specifically configured to perform the steps of:
determining the position information of a terminal accessed by a target base station at a first time and the position information of a terminal accessed at a second time according to the position information of the terminal sent by the plurality of terminals, the information of the accessed base station when the event occurs and the time when the event occurs, wherein the target base station is any one of the base stations accessed by the plurality of terminals when the event occurs; calculating a first central position of an accessed terminal according to the position information of the terminal accessed by the target base station at the first time, and calculating a second central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the second time; determining the first central position as a first position of the target base station, and determining the second central position as a second position of the target base station; and if the absolute value of the difference between the first position and the second position is greater than a second threshold, the processor determines that the information of the target base station is the information of the pseudo base station.
In one possible design, the processor is further configured to perform the following steps: marking the suspicious probabilities of the real base station and the pseudo base station; correspondingly modifying the suspicious probability of the pseudo base station according to the feedback information to obtain the modification suspicious probability of the pseudo base station;
the transceiver is further configured to perform the steps of: and receiving feedback information sent by a first target terminal, wherein the feedback information is input information which is input by a user and indicates whether the base station accessed when the first target terminal has the event is a pseudo base station is accurate or not.
In one possible design, the processor is further configured to perform the following steps:
determining the information of the base station with the suspicious probability being larger than the third threshold as the information of the target pseudo base station, and determining the information of the base station with the suspicious probability being smaller than the fourth threshold as the information of the target real base station; and performing model training according to the information of the target pseudo base station and the information of the target real base station to obtain the reference weight of each feature included in the information of the base station.
In one possible design, the transceiver is further configured to perform the following steps:
receiving information of a first event sent by a first terminal, wherein the information of the first event is information of a first base station accessed when the first event occurs; and if the information of the second base station is in the information of the pseudo base station, the transceiver sends indication information of the pseudo base station to the first terminal.
In one possible design, the processor is further configured to perform the following steps:
if the information of the first base station is not in the information of the pseudo base station, the processor module determines a target probability of the first base station according to the information of the first event and the reference weight of each feature included in the information of the base station; if the target probability is less than or equal to the fifth threshold, the processor determines that the first base station is a pseudo base station;
the transceiver is further configured to perform the steps of: and sending indication information of the pseudo base station to the first terminal.
In one possible design, the event includes: receiving a short message and/or an incoming call; the information of the event further includes: the content of the short message and/or the number of the incoming call.
A sixth aspect of an embodiment of the present application provides a terminal, which may include: the device comprises a processor, a communication interface, a memory, an output unit and a bus, wherein the processor, the communication interface, the output unit and the memory are connected through the bus;
the memory is used for storing operation instructions;
the processor is used for calling the operation instruction, detecting the occurrence of an event and acquiring the information of the event;
the communication interface is used for sending the information of the event to a server; receiving indication information of a pseudo base station sent by the server, wherein the indication information of the pseudo base station is acquired by the server according to the event information;
and the output unit is used for prompting the indication information of the pseudo base station.
In one possible design, the information of the event includes the terminal identifier, location information of the terminal, information of a base station accessed when the event occurs, and a time when the event occurs; and prompting the indication information of the pseudo base station.
In a possible design, the terminal further includes an input unit, and the input unit is further configured to receive feedback information, where the feedback information is input information indicating whether the indication information, which is input by the user and is used for indicating that the base station accessed when the event occurs in the terminal is a pseudo base station, is accurate;
the communication interface is further configured to send the feedback information to the server, where the feedback information is used for the server to modify the suspicious probability of the pseudo base station.
In a possible design, the output unit includes a display unit, and the display unit is configured to display the indication information of the pseudo base station by text.
In one possible design, the output unit includes a display unit, and the display unit is configured to display indication information of the pseudo base station through a danger indicator.
In one possible design, the output unit includes an audio circuit configured to prompt the pseudo base station for indication information by voice.
A seventh aspect of the embodiments of the present application provides a communication system, where the communication system includes a server and a terminal, where the server is the server in any optional implementation manner of the first aspect or the first aspect of the present application; the terminal is the terminal described in the second aspect or any optional implementation manner of the second aspect of the present application.
An eighth aspect of the embodiments of the present invention provides a storage medium, and it should be noted that a part of the technical solution of the present invention or a whole or part of the technical solution may be embodied in the form of a software product, and the computer software product is stored in a storage medium, and is used for storing computer software instructions for the above apparatus, and includes a program designed for executing the first aspect, the second aspect, the third aspect or the fourth aspect for a server or a terminal.
The storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
A ninth aspect of embodiments of the present invention provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method as described in the first aspect of the present application or any one of the alternative implementations of the first aspect.
A tenth aspect of embodiments of the present invention provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method as described in the second aspect of the present application or any of the alternative implementations of the second aspect.
According to the technical scheme provided by the embodiment of the application, the method has the following beneficial effects:
in the embodiment of the application, the server acquires the information of the real base station and the information of the pseudo base station according to the big data reported by the plurality of terminals, so that the accuracy rate of the acquired information of the real base station and the acquired information of the pseudo base station is higher. That is, the server receives information of events sent by a plurality of terminals, and the information of the events may include terminal identifications, location information of the terminals, information of base stations accessed when the events occur, and times of the events. And the server acquires the information of the real base station and the information of the pseudo base station according to the information of the events sent by the plurality of terminals. The server can also determine a target terminal accessed to the pseudo base station in the plurality of terminals according to the information of the real base station and the information of the pseudo base station; and sending indication information of the pseudo base station to the target terminal, so that the user is vigilant and is reasonably cheated about the event occurring on the target terminal.
Drawings
FIG. 1 is a diagram of a communication system framework employed in an embodiment of the present application;
FIG. 2 is a schematic view of a scenario applied in an embodiment of the present application;
FIG. 3 is a schematic diagram of an embodiment of a hinting method in an embodiment of the present application;
fig. 4(a) is a schematic view of a short message receiving interface display of a terminal in the embodiment of the present application;
FIG. 4(b) is a diagram illustrating an incoming call receiving interface display of the terminal according to an embodiment of the present application;
fig. 4(c) is another schematic diagram of the indication information that the terminal prompts the pseudo base station in the embodiment of the present application;
fig. 4(d) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;
fig. 4(e) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;
fig. 4(f) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;
fig. 4(g) is another schematic diagram of indication information that a terminal prompts a pseudo base station in the embodiment of the present application;
fig. 4(h) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;
fig. 4(i) is another schematic diagram of indication information that a terminal prompts a pseudo base station in the embodiment of the present application;
fig. 4(j) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;
fig. 4(k) is another schematic diagram of the indication information that the terminal prompts the pseudo base station in the embodiment of the present application;
fig. 4(l) is another schematic diagram of indication information for prompting a pseudo base station by a terminal in the embodiment of the present application;
fig. 4(m) is another schematic diagram of indication information for prompting a pseudo base station by a terminal in the embodiment of the present application;
fig. 4(n) is another schematic diagram of indication information that a terminal prompts a pseudo base station in the embodiment of the present application;
fig. 4(o) is another schematic diagram of indication information that a terminal prompts a pseudo base station in the embodiment of the present application;
fig. 4(p) is another schematic diagram of indication information for prompting a pseudo base station by a terminal in the embodiment of the present application;
FIG. 5 is a schematic diagram of another embodiment of the prompting method in the embodiment of the application;
fig. 6(a) is a schematic diagram illustrating that a terminal displays input feedback information on a short message interface in the embodiment of the present application;
fig. 6(b) is another schematic diagram illustrating that the terminal displays input feedback information on the short message interface in the embodiment of the present application;
fig. 6(c) is a schematic diagram illustrating the terminal displaying the input feedback information on the incoming call interface in the embodiment of the present application;
fig. 6(d) is another schematic diagram of the terminal displaying input feedback information on the incoming call interface in the embodiment of the present application;
FIG. 7 is a schematic diagram of another embodiment of the prompting method in the embodiment of the application;
FIG. 8 is a schematic diagram of another embodiment of the prompting method in the embodiment of the application;
FIG. 9(a) is a schematic diagram of an embodiment of a server in the embodiment of the present application;
FIG. 9(b) is a schematic diagram of an embodiment of a server in the embodiment of the present application;
FIG. 9(c) is a schematic diagram of an embodiment of a server in the embodiment of the present application;
FIG. 9(d) is a schematic diagram of an embodiment of a server in the embodiment of the present application;
FIG. 10 is a diagram of an embodiment of a terminal in an embodiment of the application;
FIG. 11 is a schematic diagram of another embodiment of a server in the embodiment of the present application;
fig. 12 is a schematic diagram of another embodiment of the terminal in the embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The method for identifying the pseudo base station by comparing the characteristic parameters of the base station through the terminal comprises the following steps: when the terminal accesses the base station, the characteristic parameters of the base station are analyzed, including a cell identifier or a sector identifier (CID) called the base station, a location area identifier (LAC), system information, and the like. And then matching the characteristic parameters with a locally preset parameter library, and if the characteristic parameters are within a legal range, determining that the base station is a legal base station. Otherwise, the terminal is regarded as a pseudo base station, and the pseudo base station is directly shielded and accessed from the terminal. The judgment logic of the method is directly preset on the terminal chip, and the access of the terminal equipment to the base station can be directly shielded after the judgment. However, the judgment logic is completely dependent on the terminal, and system upgrade cannot be performed. Some characteristic parameters can be adjusted along with the development of the pseudo base station technology, but the terminal cannot dynamically obtain the characteristic parameters, so that misjudgment is easily caused.
The method for identifying the pseudo base station based on the base station position only judges that the notification message has risk, and the pseudo base station can construct a notification short message with any number; the operator also has a mobile base station, and the comparison is not completely reliable in position; in addition, the position of the base station reported by the equipment side is obtained through algorithm calculation, and an error exists in the position.
In the embodiment of the application, the technical scheme mainly solves the problem of judgment accuracy rate caused by the fact that a local parameter base cannot be updated timely and the problem of judgment accuracy rate caused by the fact that data reporting sources are limited to notification short messages and operator mobile base stations when a server is used for judging.
A communication system framework diagram applied in the embodiment of the present application is shown in fig. 1, and the communication system may include a terminal and a server. As shown in fig. 2, which is a scene diagram applied in the embodiment of the present application, a legal base station that a terminal in area a can access includes a base station No. 2, and a correct base station that a terminal in area B can access includes base stations No. 2, 3, and 4.
In the embodiment of the application, the server may receive a large amount of event information reported by the terminal, where the event information may include a terminal identifier, location information of the terminal, information of a base station accessed when the event occurs, and a time when the event occurs, and the event may be receiving a short message or receiving an incoming call. Then, according to the information of the events reported by the plurality of terminals, the information of the real base station and the information of the pseudo base station are obtained; the server determines a target terminal accessed to the pseudo base station from the plurality of terminals according to the information of the real base station and the information of the pseudo base station; and the server sends the indication information of the pseudo base station to the target terminal. Here, for the information of the pseudo base station and the information of the real base station, if more terminals report the information of the event, the more accurate the result determined by the server is. The server can determine the access base station in the plurality of terminals as a target terminal of the pseudo base station according to the determined information of the real base station and the information of the pseudo base station; and sending indication information of the pseudo base station to the target terminal, so that the user is vigilant and is carefully and reasonably cheated about the event occurring on the terminal.
In the embodiment of the application, the server may further modify the suspicious probability of the pseudo base station by using the characteristic that the pseudo base station moves in combination with the feedback information of the terminal, and update the information of the real base station and the information of the pseudo base station, so that when the server receives the information of the first event reported by the first terminal next time, whether the first base station accessed when the first event occurs in the terminal is the pseudo base station can be determined according to the updated information of the real base station and the updated information of the pseudo base station, and thus, the result accuracy determined according to the real base station information updated in real time and the pseudo base station information is higher.
In the embodiment of the application, the server may further select, according to the suspicious probabilities corresponding to the information of the real base station and the information of the pseudo base station, information of a group of base stations with the highest suspicious probability as positive examples, and information of a base station with the lowest suspicious probability as negative examples, perform model training, and obtain the reference weight of each feature included in the information of each base station. The reference weights of the features may be used for calculating, when the server receives information of a first event reported by the first terminal next time, a target probability of the first base station accessed when the first event occurs according to the reference weights of the features and the information of the first event. If the target probability is larger than a preset threshold value, the server determines that the first base station is a real base station; and if the target probability is less than or equal to the preset threshold, the server determines that the first base station is a pseudo base station, and the server sends indication information of the pseudo base station to the terminal. Therefore, the server can calculate whether the first base station accessed by the terminal newly received by the server when the first event occurs is the pseudo base station according to the reference weight of each characteristic and the information of the first event, and another implementation mode for determining the pseudo base station is provided, so that the feasibility of the scheme is increased.
The following describes an embodiment of receiving information reported by multiple terminals by a server. As shown in fig. 3, a schematic diagram of an embodiment of the prompting method in the embodiment of the present application includes:
301. the server receives information of events transmitted by a plurality of terminals.
In this embodiment of the present application, before a server receives information of events sent by a plurality of terminals, a terminal detects occurrence of the events and collects information of the events, where the information of the events may include a terminal identifier (International Mobile Equipment Identity, IMEI), location information of the terminal, information of a base station accessed when the events occur, and a time when the events occur, and the time when the events occur may also be referred to as a timestamp (timestamp). The terminal sends information of the event to the server, and it should be understood that the event may include receiving a short message and/or receiving an incoming call. The information of the event can also comprise the content of the short message and/or the number of the incoming call and the like.
The terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, etc., and in the following example, the terminal may be a mobile phone as an example. As shown in fig. 4(a), a schematic view of a mobile phone short message receiving interface is shown. As shown in fig. 4(b), a schematic diagram of an interface display for receiving an incoming call for a mobile phone is shown.
The position information of the terminal may be obtained by using a Global Positioning System (GPS) to obtain the longitude and latitude, or may be calculated by using a network. The location information of the terminal may include, but is not limited to, latitude and longitude, a physical address (BSSID) of a Wireless Access point accessing Wireless Fidelity (WiFi), an Identifier or Service Set Identifier (SSID)/a media Access Control address (MAC address)/a network Identifier (network id) of the Wireless Access point, a currently scanned WiFi SSID, and so on. The information of the base station accessed when the event occurs may include a sector identifier, which may also be referred to as a Cell Identification (CID), an LAC, and an adjacent CID of the base station, and may also include information such as signal strength and cell information.
It should be understood that, in this embodiment, the information of the base station accessed when the event occurs in the plurality of terminals may be the same or different, and the time of the event occurrence may be the same or different. It is also possible that the same terminal transmits information of a plurality of events, and the information of the plurality of events may be the same or different, and is determined by the information of the event actually collected by the terminal.
302. And the server acquires the information of the real base station and the information of the pseudo base station according to the information of the events sent by the plurality of terminals.
And the server acquires the information of the real base station and the information of the pseudo base station according to the information of the events sent by the plurality of terminals. The server can acquire the information of the real base station and the information of the pseudo base station through calculation of big data. The following description of information about events transmitted by a plurality of terminals is given as an example:
for example, in one possible implementation manner, the server may set a number threshold, and when the number of terminals receiving the information about the transmission event exceeds the number threshold, the server may obtain information about the real base station and information about the pseudo base station according to the information about the event transmitted by the terminals exceeding the number threshold.
In another possible implementation manner, the server may further set a specific threshold, where the specific threshold is for the amount of the information of the event, that is, when the server receives the information of the event exceeding the specific threshold, the server may obtain the information of the real base station and the information of the pseudo base station according to the information of the event exceeding the specific threshold.
In another possible implementation manner, the server may further set a preset time duration, and the server may obtain information of the real base station and information of the pseudo base station according to the information of the events sent by the plurality of terminals received within the preset time duration. There may be other descriptions of event information transmitted by a plurality of terminals, and the description is not limited herein.
The server can acquire the information of the real base station and the information of the pseudo base station in various ways according to the information of the events sent by the terminals. The following examples will be described separately:
the server may obtain information of the real base station according to the information of the event sent by the multiple terminals, and the method may include:
the server determines initial base station information about longitude, latitude and date according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and preset position calculation precision; the server deletes information of the initial base station, the occurrence number of which is less than a first threshold value in continuous dates, from the information of the initial base stations about longitude, latitude and date; the server removes the date, and the information of other initial base stations is combined to obtain the information of the screening base stations about longitude and latitude; and the server determines that the information of the screening base station is the information of the real base station.
Example 1: the server determines information of a real base station according to information such as location information (latitude and longitude obtained by a Global Positioning System (GPS) of the terminal or latitude and longitude calculated by a network), information of a base station accessed when the terminal receives a short message and/or an incoming call (here, CID and LAC are used for explanation), time of receiving the short message and/or the incoming call, information of the base station currently accessed by the terminal, information of an adjacent CID and the like of the terminal.
Firstly, the geographic location is calculated with a certain precision (for example, limited to a decimal place of longitude and latitude, for example, the precision is 5 decimal places), and then the date of data collection, namely longitude (long ), latitude (latitude, lat), date (date) is combined, so that a set of data [ lat, long, date ] { cid, lac; cid, lac; … }; here, a plurality of sets of data on the longitude, latitude, and date can be obtained due to the difference in actual values of lat, lng, and date.
For example: [ lat1, ng1, date1] ═ cid1, lac 1; cid2, lac 2; cid3, lac3 };
[lat1,lng2,date1]={cid1,lac1;cid3,lac3;cid4,lac4};
[lat1,lng2,date2]={cid2,lac2;cid3,lac3;cid4,lac4};
[lat2,lng1,date1]={cid8,lac8;cid5,lac5;cid6,lac6};
[lat2,lng2,date1]={cid5,lac5;cid6,lac6;cid7,lac7};
[lat2,lng2,date2]={cid5,lac5;cid6,lac6;cid7,lac7}。
it should be noted that, the above is only exemplified by the several sets of data, in practical applications, the number of the data is more than the several sets of data, because a small amount of data does not have too large referential of the determined result, this embodiment is a scheme proposed to improve the accuracy of the acquired pseudo base station, so that the more the data is, the more accurate the determined result is, and of course, the processing of the data needs to be within the load range of the server.
Secondly, the server merges data according to the longitude and latitude according to a large amount of obtained data about the longitude, the latitude and the date, and in the merging process, a base station with unstable access in continuous dates (for example, a base station accessed in a certain area only appears in a day) is eliminated, so that data about the longitude and the latitude [ lat, long ] ═ cid, lac can be obtained; cid, lac …, which means that the base station accessed in the area [ lat, lng ] is a legal base station, i.e. a real base station.
Then, in the above example, since the base station information of cid8, lac8 appears only once, the base station information of cid8, lac8 may be deleted and other base station information may be combined. There are [ lat1, lng1] ═ cid1, lac 1; cid2, lac 2; cid3, lac3 };
[lat1,lng2]={cid1,lac1;cid2,lac2;cid3,lac3;cid4,lac4};
[lat2,lng1]={cid8,lac8;cid5,lac5;cid6,lac6};
[ lat2, lng2] ═ cid5, lac 5; cid6, lac 6; cid7, lac7, which are information for screening base stations.
Finally, the server obtains a group of information data [ lat, lng ] ═ cid, lac of the screened base stations; cid, lac … }, then CC [ lat, lng ] ] [ { cid, lac; cid, lac … }, CC denotes the real base station and may be labeled as suspicious probability 0.
In the above example, in the [ lat1, ln 1] region, the information of the real base station includes { cid1, lac 1; cid2, lac 2; cid3, lac3 }; in the area of [ lat1, ng2], the information of the real base station includes { cid1, lac 1; cid2, lac 2; cid3, lac 3; cid4, lac4 }; in the area of [ lat2, ng1], the information of the real base station includes { cid8, lac 8; cid5, lac 5; cid6, lac6 }; in the area of [ lat2, ng2], the information of the real base station includes { cid5, lac 5; cid6, lac 6; cid7, lac7 }.
The server may obtain information of the pseudo base station according to information of events sent by multiple terminals, and the method may include:
the server determines the position information of a terminal accessed by a target base station at a first time and the position information of a terminal accessed at a second time according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs and the time when the event occurs, wherein the target base station is any one of the base stations accessed when the plurality of terminals occur; the server calculates a first central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the first time, and calculates a second central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the second time; the server determines that the first central position is a first position of the target base station, and determines that the second central position is a second position of the target base station; and if the absolute value of the difference between the first position and the second position is greater than a second threshold, the server determines that the information of the target base station is the information of the pseudo base station.
Example 2: the server determines the information of the pseudo base station according to the position information of a large number of terminals, the base station information (herein, CID and LAC) accessed by the terminals when receiving the short message and/or the incoming call, and the time of receiving the short message and/or the incoming call, namely, the server identifies the possible potential pseudo base station by utilizing the characteristics (movable, suddenly appeared and disappeared) of the pseudo base station.
Firstly, the server can obtain the position information of the terminal and the information of the base station accessed by the terminal when receiving the short message or the incoming call according to the information of the events reported by the plurality of terminals: [ lat, lng, date ] ═ { cid, lac; cid, lac … }. Obtaining location information for a set of terminals accessing each base station when the base station is present: [ cid, lac, timestamp ] ═ { lat, lng; lat, lng; … }.
Taking the base station 1 as an example, it is assumed that the information of this base station 1 is represented by [ cid8, lac8], and the location information of the terminal accessed at the first time includes: [ cid8, lac8, timestamp1] ═ lat1, lng 1; lat5, lng 5; lat6, lng 6; lat9, lng 9; lat10, lng 10; lat12, ng12 };
the location information of the terminal accessed at the second time includes: [ cid8, lac8, timestamp2] ═ lat1, lng 1; lat3, lng 3; lat4, lng 4; lat5, lng 5; lat10, lng 10; lat11, ng11 };
the location information of the terminal accessed at the third time includes: [ cid8, lac8, timestamp3] ═ lat1, lng 1; lat3, lng 3; lat4, lng 4; lat5, lng 5; lat9, lng 9; lat12, ng12 };
the location information of the terminal accessed at the fourth time includes: [ cid8, lac8, timestamp4] ═ lat1, lng 1; lat2, lng 2; lat4, lng 4; lat5, lng 5; lat10, lng 10; lat11, ng11 }.
Second, the server may calculate a first center position of the set of terminals at a first time, a second center position of the set of terminals at a second time, a third center position of the set of terminals at a third time, and a fourth center position of the set of terminals at a fourth time. Then, the first center position can be considered to be the position of the base station 1 at the first time, the second center position is the position of the base station 1 at the second time, the third center position is the position of the base station 1 at the third time, and the fourth center position is the position of the base station 1 at the fourth time.
Finally, for the positions of the base station 1 at different times, the deviation within a certain distance (e.g. 500m) falls within the normal range; a deviation of 500m or more may be considered as a mobile base station. Thereby obtaining information of a set of suspected mobile stations: MC ═ { cid, lac; cid, lac; … }.
Assuming that the absolute value of the difference between the positions of the base station 1 at different times exceeds 500m through the above calculation, the base station 1 can be considered as a mobile base station. The above is only described by taking the base station 1 as an example, and other base stations are similar processing methods, which are not described herein again.
On the basis of the MC, comparing the appearing time of the base station again, and forming the information of the suspicious base station for the base station which disappears in a short appearing time, such as less than 1 day: SC ═ { cid, lac; cid, lac; … }.
Assuming that the base station 1 is calculated, the first time, the second time, the third time and the fourth time are on the same day, and the base station is not present before or after the first time, the base station 1 is probably a pseudo base station. It should be understood that both MC, SC may be considered information of the pseudo base station and may identify the suspicious probability as 100%.
It should be noted that, after the first center position is calculated above, the first target center position of the group of terminals (excluding the terminals with larger deviation from the first center position) may be calculated again after excluding the terminal position with larger deviation from the first center position; similarly, after the second center position is calculated, the second target center position of the group of terminals (excluding the terminals with larger deviation from the second center position) may be calculated again after excluding the terminal position with larger deviation from the second center position; others may be similarly processed and will not be described further herein. Since if the position of the terminal deviates too far from the first center position and the second center position, it means that the calculated position of the center position deviates too much from the position of the base station, and the reliability of the position of the base station is poor, the terminal position with large deviation can be excluded, and the calculation is performed again to represent the position of the base station, so that the accuracy is relatively high. Here, the first target center position and the second target center position are used to represent the positions of the base station at different times, and the subsequent calculation method is similar to the above description and is not described herein again.
It should be further noted that the server obtains the information of the real base station and the information of the pseudo base station according to the information of the event sent by the plurality of terminals, including but not limited to the above mentioned methods. For example, if the information of the pseudo base station is obtained, the server may determine, according to the information of all base stations reported by the multiple terminals, information of a real base station that is left except the information of the pseudo base station; or the information of the real base station is acquired, then, the server may determine, according to the information of all base stations reported by the plurality of terminals, information that can be regarded as a pseudo base station in addition to the information of the real base station.
303. And the server determines a target terminal accessed to the pseudo base station in the plurality of terminals according to the information of the real base station and the information of the pseudo base station.
In the embodiment of the present application, for example, the information of the real base station is shown in table 1 below:
Figure BDA0001708519670000131
TABLE 1
The information of the pseudo base station is shown in table 2 below:
Figure BDA0001708519670000141
TABLE 2
The server determines, according to the information of the real base station and the information of the pseudo base station, a target terminal accessing the pseudo base station from the multiple terminals, where the target terminal may be the base station accessed when the event occurs in the multiple terminals, and if 100 terminals access the pseudo base station, the server may send indication information of the pseudo base station to the 100 terminals.
304. And the server sends the indication information of the pseudo base station to the target terminal.
For example, the server may send the indication information of the pseudo base station to the 100 terminals at the same time, or send the indication information of the pseudo base station according to the priority of the terminal, which is not limited herein. It should be noted that, in practical applications, the server may also send the indication information of the real base station to the terminal whose base station accessed when the event occurs among the plurality of terminals is the real base station.
305. And the target terminal prompts the indication information of the pseudo base station.
In the embodiment of the application, the target terminal may display the information of the event through an application interface corresponding to the event, where the information of the event may include short message content and/or an incoming call number. The indication information that the target terminal prompts the pseudo base station may include, but is not limited to, the following several implementation manners:
mode 1: and the terminal displays the indication information of the pseudo base station through characters.
Mode 2: and the terminal prompts the indication information of the pseudo base station through voice.
Mode 3: and the terminal displays the indication information of the pseudo base station through the danger identification.
And the target terminal can prompt the information of the pseudo base station through an application interface corresponding to the event. Namely, the mobile phone can prompt the indication information of the pseudo base station through a short message interface corresponding to a short message, and/or a call interface corresponding to a call, and/or voice. The target terminal may refer to the above-mentioned 100 terminals, and one of them is taken as an example (e.g., a mobile phone).
In a possible implementation manner, the terminal may display the indication information of the pseudo base station by text. Suppose that the mobile phone receives the short message content 11 displayed by the short message, and the indication information of the pseudo base station is displayed on the short message interface through the characters 21. As shown in fig. 4(c), a schematic diagram of displaying the indication information of the pseudo base station through a short message interface is shown. In fig. 4(c), the indication information of the pseudo base station is a text indication of "suspected fraud short message". Suppose that the mobile phone receives the incoming number 12 of the incoming display and displays the indication information of the pseudo base station on the incoming interface through the characters 21. As shown in fig. 4(d), another schematic diagram of displaying indication information of the pseudo base station for the mobile phone through the incoming call interface is shown. In fig. 4(d), the indication information of the pseudo base station is a text indication of "suspected fraudulent incoming call". It should be noted that the text prompt may also be a high-risk short message or a high-risk incoming point, and is not limited specifically.
In another possible implementation manner, the terminal may prompt the indication information of the pseudo base station through voice. Suppose that the mobile phone receives the short message content 11 displayed by the short message, and prompts the indication information of the pseudo base station through the voice 22 on the short message interface. As shown in fig. 4(e), it is a schematic diagram of performing voice reminding on a received short message by a mobile phone according to indication information of a pseudo base station. In fig. 4(e), the indication information of the pseudo base station triggers a preset voice function, and the mobile phone reminds the user by playing voice (for example, the preset voice may be that the short message may be a fraud short message, or the like, or the short message sent by the number may be a fraud short message, or the like). Suppose that the handset receives the incoming call number 12 of the incoming call display, and prompts the indication information of the pseudo base station through voice 22 on the incoming call interface. As shown in fig. 4(f), it is a schematic diagram of the mobile phone performing voice reminding on the received incoming call according to the indication information of the pseudo base station. In fig. 4(f), the indication information of the pseudo base station triggers a preset voice function, and the handset reminds the user by playing voice (for example, the preset voice may be that the number is a fraud number, please answer cautiously, etc.).
In another possible implementation manner, the terminal may prompt indication information of the pseudo base station through a danger icon. Suppose that the mobile phone receives the short message content 11 displayed by the short message, and prompts the indication information of the pseudo base station through the danger icon 23 on the short message interface. As shown in fig. 4(g), it is a schematic diagram that the mobile phone reminds the received short message through a danger icon according to the indication information of the pseudo base station. In fig. 4(g), the indication information of the pseudo base station triggers a danger icon, and the mobile phone displays the danger icon through the short message interface to remind the user. Suppose that the mobile phone receives the incoming number 12 of the incoming display, and prompts indication information of the pseudo base station through a dangerous icon 23 on the incoming interface. As shown in fig. 4(h), it is a schematic diagram that the mobile phone reminds the received incoming call through a dangerous icon according to the indication information of the pseudo base station. In fig. 4(h), the indication information of the pseudo base station triggers a danger icon, and the mobile phone displays the danger icon through the incoming call interface to remind the user. The danger icon may include, but is not limited to, the indication of the triangle plus exclamation mark shown in fig. 4(g) and 4(h), or may be the indication of the triangle icon, the exclamation mark icon, or other danger indication methods.
It should be noted that the indication information about the pseudo base station includes, but is not limited to, several implementation manners mentioned above, and may also be implemented by other manners, which are not limited specifically. For example: text + voice prompt mode: as shown in fig. 4(i), it is a schematic diagram that the mobile phone reminds the received short message through text and voice according to the indication information of the pseudo base station. As shown in fig. 4(j), it is a schematic diagram that the mobile phone reminds the received incoming call through text and voice according to the indication information of the pseudo base station.
The prompting mode of the characters and the dangerous icons is as follows: as shown in fig. 4(k), it is a schematic diagram that the mobile phone reminds the received short message through the text and the dangerous icon according to the indication information of the pseudo base station. As shown in fig. 4(l), it is a schematic diagram that the mobile phone reminds the received incoming call through the text and the dangerous icon according to the indication information of the pseudo base station.
Prompting mode of voice + dangerous icon: as shown in fig. 4(m), it is a schematic diagram that the mobile phone reminds the received short message through voice and a dangerous icon according to the indication information of the pseudo base station. As shown in fig. 4(n), it is a schematic diagram that the mobile phone reminds the received incoming call through voice and dangerous icons according to the indication information of the pseudo base station.
In another possible implementation manner, for the short message, the terminal may automatically classify the short message into a spam list to prompt the indication information of the pseudo base station, as shown in fig. 4(o), and automatically classify the short message into the spam list for the mobile phone to prompt the indication information of the pseudo base station. For an incoming call, the terminal may prompt the indication information of the pseudo base station by automatically rejecting to answer the incoming call, as shown in fig. 4(p), which is a schematic diagram of the indication information of the pseudo base station for prompting that the mobile phone automatically rejects to answer the incoming call. It should be understood that, on the short message interface or the incoming call interface, the implementation manner of the indication information of the character prompting pseudo base station and the indication information of the icon prompting pseudo base station may be in a pop-up frame form, a floating form, or other forms such as an air bubble, and is not limited specifically. Step 303-305 is an optional step.
In the embodiment of the application, the server acquires the information of the real base station and the information of the pseudo base station according to the big data reported by the plurality of terminals, so that the accuracy rate of the acquired information of the real base station and the acquired information of the pseudo base station is higher. That is, the server receives information of events sent by a plurality of terminals, and the information of the events may include terminal identifications, location information of the terminals, information of base stations accessed when the events occur, and times of the events. And the server acquires the information of the real base station and the information of the pseudo base station according to the information of the events sent by the plurality of terminals. The server can also determine a target terminal accessed to the pseudo base station in the plurality of terminals according to the information of the real base station and the information of the pseudo base station; and sending indication information of the pseudo base station to the target terminal, so that the user is vigilant and is reasonably cheated about the event occurring on the target terminal.
As shown in fig. 5, a schematic diagram of another embodiment of the prompting method in the embodiment of the present application includes:
501. the server receives information of events transmitted by a plurality of terminals.
502. And the server acquires the information of the real base station and the information of the pseudo base station according to the information of the events sent by the plurality of terminals.
503. And the server determines a target terminal accessed to the pseudo base station in the plurality of terminals according to the information of the real base station and the information of the pseudo base station.
504. And the server sends the indication information of the pseudo base station to the target terminal.
505. And the target terminal prompts the indication information of the pseudo base station.
In the embodiment of the present application, the steps 501-505 are similar to the steps 301-305 in the embodiment shown in fig. 3, and are not described herein again.
506. The server marks the suspicious probabilities of the real base stations and the pseudo base stations.
In this embodiment of the application, after the server obtains the information of the real base station and the information of the pseudo base station according to the information of the event sent by the multiple terminals, the server may mark the suspicious probabilities of the real base station and the pseudo base station, for example, the suspicious probability of marking the real base station is 0, and the suspicious probability of marking the pseudo base station is 100%.
Example 1: as shown in table 3 below, the correspondence between the true base station and the suspicious probability in different areas is shown.
Figure BDA0001708519670000161
TABLE 3
Example 2: if the suspicious base station and the mobile base station are both considered as the pseudo base station, as shown in the following table 4, the suspicious base station, the mobile base station and the suspicious probability are associated with each other.
Suspicious base station Probability of suspicion Mobile base station Probability of suspicion
{cid8,lac8} 100% {cid12,lac12} 100%
{cid15,lac15} 100% {cid8,lac8} 100%
{cid19,lac19} 100% {cid19,lac19} 100%
{cid20,lac20} 100% {cid20,lac20} 100%
{cid15,lac15} 100%
{cid36,lac36} 100%
{cid40,lac40} 100%
TABLE 4
It should be noted that the mobile base station and the suspicious base station shown in table 4 may be considered as a pseudo base station, but the probability of the suspicious base station being a pseudo base station may be higher. Since there are also mobile base stations in the operator, the probability of suspicion that a mobile base station is a pseudo base station is relatively low.
Example 3: the suspicious probability of other base stations except the suspicious base station in the mobile base station may be marked lower, as shown in table 5 below, as the corresponding relationship between the suspicious base station, the mobile base station and the suspicious probability.
Suspicious base station Probability of suspicion Mobile base station Probability of suspicion
{cid8,lac8} 100% {cid12,lac12} 80%
{cid15,lac15} 100% {cid8,lac8} 100%
{cid19,lac19} 100% {cid19,lac19} 100%
{cid20,lac20} 100% {cid20,lac20} 100%
{cid15,lac15} 100%
{cid36,lac36} 80%
{cid40,lac40} 80%
TABLE 5
It should be noted that the timing sequence of step 506 may be after step 502 and before step 507.
507. The first target terminal receives the feedback information.
In this embodiment, the first target terminal may be one of the target terminals, or may be multiple terminals in the target terminals, and may be determined according to actual situations. The feedback information is input information which is input by a user and indicates whether the indication information of the base station accessed when the terminal has the event is a pseudo base station is accurate or not.
After the first target terminal receives the indication information of the pseudo base station, the first target terminal prompts the indication information of the pseudo base station. The following may be exemplified: as shown in fig. 6(a), a schematic diagram of inputting feedback information displayed on the short message interface by the mobile phone is shown, and "please ask the user to feed back whether the short message is a fraudulent short message" may also be displayed on the short message interface, and the user may input feedback information in the editable text box 31. As shown in fig. 6(b), another schematic diagram of inputting feedback information displayed on the short message interface by the mobile phone is shown, and the "yes" and "no" identifiers 32 may also be displayed on the short message interface, and the user may directly click the "yes" or "no" identifier. Of course, the short message interface can also display the identifier of 'ignore' or input no words, so that the feedback information is meaningless and does not need to be reported to the server. When the user inputs feedback information in the text box or clicks the "yes" or "no" mark, the terminal can receive the corresponding feedback information.
As shown in fig. 6(c), for the mobile phone to display an illustration of inputting feedback information on the incoming call interface, the mobile phone displays "please give feedback to the user if the incoming call is a fraudulent incoming call" on the incoming call interface, and the user can input feedback information in the editable text box 31. As shown in fig. 6(d), a schematic diagram of inputting feedback information displayed on the incoming call interface for the mobile phone is shown, and the "yes" and "no" identifiers 32 may also be displayed on the incoming call interface, and the user may directly click the "yes" or "no" identifier. Of course, the caller interface can also display the identifier of 'ignore' or no words are input, so that the feedback information is meaningless and does not need to be reported to the server. The operation of clicking may be more convenient for the user from a convenience point of view. The input feedback information may be displayed on the incoming call interface after the user hangs up the phone. When the user inputs feedback information in the text box or clicks the "yes" or "no" mark, the terminal can receive the corresponding feedback information.
It should be noted that the schematic diagram of how the terminal displays the input feedback information may include, but is not limited to, the above-mentioned several ways. The description about the user inputting the feedback information may be that some users may receive the short message sent by the number before or receive the incoming call of the number, and when receiving the incoming call or the short message sent by the same number again, it may be determined whether the incoming call is a fraudulent short message or a fraudulent incoming call, or it may be determined whether the incoming call is a fraudulent incoming call through the current call, so that the users may input the corresponding feedback information. Any one of the input feedback information displayed in fig. 6(a) -6 (d) is described by using a text to prompt the indication information of the pseudo base station, and when the indication information of the pseudo base station is prompted by using a voice or a danger icon, the schematic diagram of the input feedback information displayed in fig. 6(a) -6 (d) is similar to that in fig. 6(a) -6 (d), and details are not repeated here.
508. And the first target terminal sends the feedback information to the server.
In the embodiment of the present application, it is assumed that the server previously determines that there are 100 target terminals accessing the pseudo base station, and the server sends indication information of the pseudo base station to the 100 target terminals. But the 100 target terminals only receive the input information of whether the indication information of the base station accessed by the terminal when the event happens, which is input by the user, is the pseudo base station is accurate or not. Then, the 50 target terminals can report the feedback information to the server. Assume that there are 45 users who input yes feedback information and 5 users who input yes feedback information.
509. And the server correspondingly modifies the suspicious probability of the pseudo base station according to the feedback information to obtain the modification suspicious probability of the pseudo base station.
In this embodiment, it is assumed that the feedback information reported by the 50 target terminals is 45 pieces of "no" feedback information and 5 pieces of "yes" feedback information corresponding to the base station { cid15, lac15}, the base station { cid15, lac15 }. Then the server may determine that base station { cid15, lac15} has a 90% probability of not being a pseudo base station and a 10% probability of being a pseudo base station. That is, the suspicion probability of the bs { cid15, lac15} can be modified to 10% correspondingly in table 4 and table 5. When the suspicious probability is less than or equal to the suspicious probability threshold, the base station can be considered as a real base station, and the suspicious probability threshold is assumed to be 20%, then the server can update the information of the base station { cid15, lac15} into the information of the real base station, and update the information of the base station { cid15, lac15} into the above table 3, and delete the information of the base station { cid15, lac15} in the tables 4 and 5, assuming that the area where the base station { cid15, lac15} appears is [ lat7, long 7 ].
As shown in table 6, the updated correspondence between the information about the real base station and the suspicious probability in table 3 is as follows:
Figure BDA0001708519670000181
TABLE 6
As shown in table 7, the updated correspondence relationship between the suspicious base station, the mobile base station and the suspicious probability in table 4 is as follows:
suspicious base station Probability of suspicion Mobile base station Probability of suspicion
{cid8,lac8} 100% {cid12,lac12} 100%
{cid19,lac19} 100% {cid8,lac8} 100%
{cid20,lac20} 100% {cid19,lac19} 100%
100% {cid20,lac20} 100%
{cid36,lac36} 100%
{cid40,lac40} 100%
TABLE 7
As shown in table 8, the updated correspondence relationship between the suspicious base station, the mobile base station and the suspicious probability in table 5 is as follows:
suspicious base station Probability of suspicion Mobile base station Probability of suspicion
{cid8,lac8} 100% {cid12,lac12} 80%
{cid19,lac19} 100% {cid8,lac8} 100%
{cid20,lac20} 100% {cid19,lac19} 100%
{cid20,lac20} 100%
{cid36,lac36} 80%
{cid40,lac40} 80%
TABLE 8
It should be noted that, in practical applications, the feedback information received by the server may be for the same base station, or may be for different base stations, and the manner of modifying the suspicious probability is similar to that described above, and is not described here again. Moreover, the information for updating the real base station and the information for updating the pseudo base station include, but are not limited to, other implementation manners, for example, for the same base station, among the feedback information received by the server in the first time period, there are 2 pieces of "yes" feedback information and 6 pieces of "no" feedback information; in the feedback information received in the second time length, 1 feedback information of 'yes' and 8 feedback information of 'no' exist; in the feedback information received in the third time length, there are 0 pieces of yes feedback information and 10 pieces of no feedback information; after the 3 modifications, the suspicious probability of the base station is not lower than the suspicious probability threshold value by 20%, but the server finds that the number of feedback information fed back by "yes" is less and less according to the received feedback information, and the number of feedback information fed back by "no" is more and more, so that the base station is considered to be a very high possibility of not being a pseudo base station, and the server can update the base station in the information of a real base station.
In the embodiment of the application, the server acquires the information of the real base station and the information of the pseudo base station according to the big data reported by the plurality of terminals, so that the accuracy rate of the acquired information of the real base station and the acquired information of the pseudo base station is higher. That is, the server receives information of events sent by a plurality of terminals, and the information of the events can include terminal identifications, position information of the terminals, information of base stations accessed when the events occur, and the time when the events occur. And the server acquires the information of the real base station and the information of the pseudo base station according to the information of the events sent by the plurality of terminals. The server can also determine a target terminal accessed to the pseudo base station in the plurality of terminals according to the determined information of the real base station and the information of the pseudo base station; and sending indication information of the pseudo base station to the target terminal, so that the user is vigilant and is reasonably cheated about the event occurring on the target terminal.
Furthermore, the server can also modify the suspicious probability of the pseudo base station by utilizing the characteristic of the movement of the pseudo base station in combination with the feedback information of the terminal, and update the information of the real base station and the information of the pseudo base station, so that when the server receives the information of the first event reported by the first terminal next time, whether the first base station accessed when the first event occurs to the terminal is the pseudo base station can be determined according to the updated information of the real base station and the information of the pseudo base station, and the result accuracy determined according to the real base station information and the pseudo base station information updated in real time is higher.
As shown in fig. 7, a schematic diagram of an embodiment of the prompting method in the embodiment of the present application includes:
701. the server receives information of events transmitted by a plurality of terminals.
702. And the server acquires the information of the real base station and the information of the pseudo base station according to the information of the events sent by the plurality of terminals.
703. And the server determines a target terminal accessed to the pseudo base station in the plurality of terminals according to the information of the real base station and the information of the pseudo base station.
704. And the server sends the indication information of the pseudo base station to the target terminal.
705. And the target terminal prompts the indication information of the pseudo base station.
706. The server marks the suspicious probabilities of the real base stations and the pseudo base stations.
707. The first target terminal receives the feedback information.
708. And the first target terminal sends the feedback information to the server.
709. And the server correspondingly modifies the suspicious probability of the pseudo base station according to the feedback information to obtain the modification suspicious probability of the pseudo base station.
In the embodiment of the present application, the steps 701-509 are similar to the steps 501-509 in the embodiment shown in fig. 5, and are not described herein again.
710. The server determines information of a target pseudo base station and information of a target real base station.
In this embodiment of the application, the server may determine, according to the information of the real base station and the suspicious probability corresponding to the information of the pseudo base station, that the information of the base station whose suspicious probability is greater than the third threshold is the information of the target pseudo base station, and that the information of the base station whose suspicious probability is less than the fourth threshold is the information of the target real base station. The information of the target real base station and the information of the target pseudo base station include, but are not limited to, cid, lac, signal strength, difference between acquisition time and reporting time, and the like. The acquisition time refers to the time when the corresponding terminal occurs an event, and the reporting time refers to the time when the terminal sends the information of the event to the server, and the acquisition time may be the same as the reporting time, or the reporting time is after the acquisition time.
711. And the server performs model training according to the information of the target pseudo base station and the information of the target real base station to obtain the reference weight of each feature included in the information of the base station.
In this embodiment, the server may perform model training using other algorithms such as a logistic algorithm according to the information of the target pseudo base station and the information of the target real base station, to obtain reference weights of each feature included in the information of the base station. For example: cid-w 1, lac-w 2, signal strength-w 3, time difference-w 4 … …
712. The first terminal detects the occurrence of a first event and collects information of the first event.
In the embodiment of the application, the first terminal detects the occurrence of a first event and collects information of the first event. The information of the first event may include information of a base station accessed when the first event occurs, and it should be understood that the information of the first event may further include information of an identifier of the first terminal, location information of the first terminal, time of occurrence of the first event, content of the first short message and/or a first incoming call number, and the like. The first event may include receiving a first short message and/or a first incoming call. For the schematic diagram of the first terminal receiving the first short message or the first incoming call, reference may be made to fig. 4(a) and fig. 4(b), which is not described herein again.
It should be noted that step 712 may be between steps 702-713.
713. The first terminal sends the information of the first event to the server.
In the embodiment of the application, the server receives information of a first event sent by a first terminal. The first terminal may be one of the terminals described above, or may be another terminal newly accessed besides the terminals. The number of the first terminal representations is not limited, and may refer to one terminal or a plurality of terminals. In the following description, the first terminal is taken as the mobile phone 1 as an example. Namely, the server receives information of a first event sent by a mobile phone 1, where the information of the first event includes an identifier of the mobile phone 1, location information of the mobile phone 1, information of a first base station accessed when the first event occurs, and time when the first event occurs.
The location information of the mobile phone 1 may be latitude and longitude obtained by using a Global Positioning System (GPS), or latitude and longitude calculated by using a network, and the location information of the mobile phone includes, but is not limited to, latitude and longitude, and a physical address (BSSID)/an Identifier of a Wireless Access point or a Service Set Identifier (SSID)/a media Access Control address (MAC address)/network Identifier (NetworkID) of a Wireless Access point accessing Wireless Fidelity (WiFi), and information such as a currently scanned WiFi SSID. The information of the first base station accessed when the first event occurs in the mobile phone 1 may include a sector identifier of the base station, which may also be referred to as a Cell Identity (CID), an LAC, an adjacent CID, and may also include information such as signal strength and cell information.
714. The server determines whether the first base station is a pseudo base station.
In the embodiment of the present application, there may be several different implementations of determining the authenticity of the first base station, which are described below:
the first mode is as follows: and the server searches and determines the information of the real base station and the information of the pseudo base station which are stored in the database.
If step 712 is after step 702 and before step 709, the server may search the information of the real base station and the information of the pseudo base station, which are obtained according to the information of the events sent by the multiple terminals, and if the information of the first base station is in the information of the pseudo base station, the first base station is considered as the pseudo base station, and the server may send the indication information of the pseudo base station to the handset 1; if the information of the first base station is in the information of the real base station, it indicates that the first base station is the real base station, and the server may not send the indication information of the real base station to the mobile phone 1.
If step 712 is after step 709 and before step 713, the server may perform a search in the updated information of the real base station and the information of the pseudo base station, and if the information of the first base station is in the updated information of the pseudo base station, the server may consider the first base station as the pseudo base station, and send the indication information of the pseudo base station to the handset 1, and if the information of the first base station is in the updated information of the real base station, it indicates that the first base station is the real base station, and the server may not send the indication information of the real base station to the handset 1.
The second mode is as follows: if step 712 is after step 702 and before step 709, the server may first search the information of the first base station from the information of the pseudo base station and the information of the real pseudo base station stored in the database. Alternatively, if step 712 is after step 709 and before step 713, the server may first search the updated information of the real base station and the updated information of the pseudo base station in the database for the information of the first base station.
If the information of the first base station is not found, the server may determine the target probability of the first base station according to the information of the first event and the reference weight of each feature included in the information of the base station. The server determines the target suspicious probability Rate of the first base station sum (feature weight) cid w1+ lac w2+ signal strength w3+ time difference w4+ … …. And if the target probability is less than or equal to the fifth threshold, the server determines that the first station is a pseudo base station.
It should be noted that the target probability range calculated according to the reference weight is between 0 and 1, and a base station approaching 1 can be regarded as a real base station, and a base station approaching 0 can be regarded as a pseudo base station. Assuming that the target probability calculated here is 0.8, the fifth threshold may be set to 0.6, and 0.8 is greater than 0.6, so the server determines that the first base station is a real base station. Assuming that the target probability calculated here is 0.3, the fifth threshold may be set to 0.6, and 0.3 is less than 0.6, so the server determines the first base station as a pseudo base station.
The third mode is as follows: and the server directly determines the target probability of the first base station according to the information of the first event and the reference weight of each feature included in the information of the base station. That is, the server determines the target suspicious probability Rate of the first base station, (sum (feature weight), cid, w1+ lac, w2+ signal strength, w3+ time difference, w4+ … …. And if the target probability is less than or equal to the fifth threshold, the server determines that the first base station is a pseudo base station.
715. And if the first base station is a pseudo base station, the server sends indication information of the pseudo base station to the first terminal.
In this embodiment, if the first base station is determined to be a pseudo base station through any one of the manners of determining the authenticity of the first base station described in step 714, the server sends indication information of the pseudo base station to the first terminal.
716. And the first terminal prompts the indication information of the pseudo base station.
Here, the manner of prompting the indication information of the pseudo base station by the first terminal may refer to any prompting manner of fig. 4(c) -fig. 4(p), which is not described herein again.
In the embodiment of the application, the server acquires the information of the real base station and the information of the pseudo base station according to the big data reported by the plurality of terminals, so that the accuracy rate of the acquired information of the real base station and the acquired information of the pseudo base station is higher. That is, the server receives information of events sent by a plurality of terminals, and the information of the events may include terminal identifications, location information of the terminals, information of base stations accessed when the events occur, and times when the events occur. And the server determines the information of the real base station and the information of the pseudo base station according to the information of the events sent by the plurality of terminals. The server can also determine a target terminal accessed to the pseudo base station in the plurality of terminals according to the determined information of the real base station and the information of the pseudo base station; and sending indication information of the pseudo base station to the target terminal, so that the user is vigilant and is carefully and reasonably cheated about the first event occurring on the target terminal.
Furthermore, the server can also modify the suspicious probability of the pseudo base station by utilizing the characteristic of the movement of the pseudo base station in combination with the feedback information of the terminal, and update the information of the real base station and the information of the pseudo base station, so that when the server receives the information of the first event reported by the first terminal next time, whether the first base station accessed when the first event occurs to the terminal is the pseudo base station can be determined according to the updated information of the real base station and the information of the pseudo base station, and the result accuracy determined according to the real base station information and the pseudo base station information updated in real time is higher.
Furthermore, the server may further select, according to the suspicious probabilities corresponding to the information of the real base station and the information of the pseudo base stations, information of a group of base stations with the highest suspicious probability as positive examples and information of base stations with the lowest suspicious probability as negative examples, and perform model training to obtain reference weights of each feature included in the information of the base stations. The reference weights may be used for calculating, when the server receives information of a first event reported by the first terminal next time, a target probability of the first base station accessed when the first event occurs according to the reference weights of the respective characteristics and the information of the first base station. If the target probability is larger than a preset threshold value, the server determines that the first base station is a real base station; and if the target probability is less than or equal to the preset threshold, the server determines that the first base station is a pseudo base station, and the server sends indication information of the pseudo base station to the terminal. Therefore, the server can calculate whether the access of the first terminal newly received by the server is the pseudo base station when the first event occurs according to the reference weight of each characteristic included in the information of the base station, and another implementation mode for determining the pseudo base station is provided, so that the feasibility of the scheme is increased.
On the other hand, according to the information of the events reported by a large number of terminals and the feedback information of the user, the suspicious probabilities of the real base station and the pseudo base station can be continuously learned, optimized and corrected, so that the accuracy of judgment can be greatly improved; compared with the 'identification method based on the base station position', the method can only compare and analyze the existing base station data of the operator, and has higher accuracy rate under the condition of judging the mobile base station. The server carries out model training in real time according to the information of the target real base station and the information of the target pseudo base station, so that the accuracy and the real-time performance of recognition can be ensured, and a new pseudo base station can be found in time; the motion trail of the pseudo base station can be identified according to the big data technology, and therefore the pseudo base station can be effectively prevented from being cheated and even captured.
As shown in fig. 8, a schematic diagram of an embodiment of the prompting method in the embodiment of the present application includes:
801. a first terminal detects the occurrence of a first event and collects the information of the first event;
in this embodiment of the present application, the first event may be a first event occurring in an application installed on a first terminal, where the information of the first event may include an identifier of the first terminal, location information of the first terminal, information of a first base station accessed when the first event occurs, and a time when the first event occurs, and the time when the first event occurs may also be referred to as a timestamp. The information of the first event may also include information such as the content of the short message and/or the number of the incoming call. The application installed on the first terminal may be a short message application, a call application, or other applications, and is not limited herein. For example, the first terminal detects that a short message is received and collects information of the received short message, or the first terminal detects that an incoming call is received and collects information of the received incoming call. Fig. 4(a) and 4(b) may be referred to for a schematic diagram of receiving a short message or receiving an incoming call, which is not described herein again.
802. The first terminal sends the information of the first event to a server;
in this embodiment, the first terminal may send the collected information of receiving the short message, or the collected information of receiving the incoming call to the server. It should be noted that, when the first terminal receives a short message or receives an incoming call, the accessed base station is a pseudo base station, and then the first terminal is in a network disconnection state, and the information of the first event is not reported to the server, so that the first terminal needs to wait until the first terminal is in a network connection state, and send the information of the first event.
803. And the first terminal receives the indication information of the pseudo base station sent by the server.
In the embodiment of the application, if the server determines that the first terminal accesses the pseudo base station, the server sends indication information of the pseudo base station to the first terminal. The method for determining the pseudo base station by the server may include, but is not limited to, the following several implementation manners, which are described below by taking a mobile phone as an example, as follows:
example 1: the server performs search determination in the information of the real base station and the information of the pseudo base station acquired in the embodiment shown in fig. 3.
The server can search the information of the real base station and the information of the pseudo base station, which are acquired according to the information of the events sent by the plurality of terminals, and if the information of the first base station is in the information of the pseudo base station, the first base station is considered as the pseudo base station, and the server can send the indication information of the pseudo base station to the mobile phone; if the information of the first base station is in the information of the real base station, it indicates that the first base station is the real base station, and the server may not send the indication information of the real base station to the mobile phone.
Example 2: the server performs the search determination in the updated information of the real base station and the information of the pseudo base station in the embodiment shown in fig. 5.
In the embodiment shown in fig. 5, the server may perform searching and determining according to the updated information of the real base station and the updated information of the pseudo base station, and if the information of the first base station is in the updated information of the pseudo base station, the first base station is considered as the pseudo base station, and the server may send the indication information of the pseudo base station to the mobile phone; if the information of the first base station is in the updated information of the real base station, it indicates that the first base station is the real base station, and the server may not send the indication information of the real base station to the mobile phone.
Example 3: the server makes the determination based on the reference weights of the respective features included in the obtained information of the base station in the embodiment shown in fig. 7 described above.
If it is not found in the embodiments shown in fig. 3 or fig. 5 that the first base station is a real base station or a pseudo base station, the determination may be performed according to the reference weight of each feature included in the obtained information of the base station in the embodiment shown in fig. 7. Alternatively, the determination is performed directly by using the reference weights of the features included in the obtained information of the base station in the embodiment shown in fig. 7. For a specific implementation manner, reference may be made to the description of step 714 in embodiment 7, and details are not described here.
Example 4: in the embodiment shown in fig. 3, the server performs a big data calculation again according to the received event information sent by the multiple terminals, and obtains the information of the real base station and the information of the pseudo base station, thereby determining whether the first base station is a pseudo base station.
804. And the first terminal prompts the indication information of the pseudo base station.
In this embodiment of the present application, the indication information that the first terminal prompts the pseudo base station may include, but is not limited to, the following implementation manners:
example 1: the terminal displays the indication information of the pseudo base station through characters; specifically, reference may be made to fig. 4(c) and 4(d), which are not described herein again.
Example 2: the terminal prompts the indication information of the pseudo base station through voice; specifically, reference may be made to fig. 4(e) and 4(f), which are not described herein again.
Example 3: the terminal displays the indication information of the pseudo base station through a danger identifier; specifically, reference may be made to fig. 4(g) and 4(h), which are not described herein again.
Optionally, in other indication information for prompting the pseudo base station, reference may be made to the implementation manners of fig. 4(i) -4(p), which are not described herein again.
In the embodiment of the present application, for the first terminal, the information of the collected event is mainly reported, the information of the event may be used for the server to obtain the information of the pseudo base station, and there are various manners for determining by the server. If the terminal is accessed with the pseudo base station, the server sends the indication information of the pseudo base station to the terminal, so that the terminal can prompt the indication information of the pseudo base station, and a user is vigilant and is carefully and reasonably cheated about a first event occurring on the first terminal.
As described above for the prompting method in the embodiment of the present application, the following describes a server and a terminal in the embodiment of the present application, and as shown in fig. 9(a), the server in the embodiment of the present application is schematically illustrated, and the method includes:
a receiving module 901, configured to receive information of events sent by multiple terminals;
an obtaining module 902, configured to obtain information of a real base station and information of a pseudo base station according to the information of the event sent by the multiple terminals.
Optionally, in some embodiments of the present application, on the basis of the foregoing fig. 9(a), as shown in fig. 9(b), the server is a schematic diagram of another embodiment of the server, and the server further includes:
a determining module 903, configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal that is accessed to the pseudo base station from among the multiple terminals;
a sending module 904, configured to send indication information of the pseudo base station to the target terminal.
Optionally, in some embodiments of the present application, the information of the event includes a terminal identifier, location information of the terminal, information of a base station accessed when the event occurs, and a time when the event occurs.
Optionally, in some embodiments of the present application, the obtaining module 902 is specifically configured to:
determining initial base station information about longitude, latitude and date according to the position information of the terminals sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and preset position calculation precision;
deleting information of the initial base station with the occurrence number less than a first threshold value in continuous dates from the information of the initial base stations with the longitude, the latitude and the dates;
removing the date, and combining the information of other initial base stations to obtain information about screening base stations of longitude and latitude;
and determining the information of the screening base station as the information of the real base station.
Optionally, in some embodiments of the present application, the obtaining module 902 is further specifically configured to:
determining the position information of a terminal accessed by a target base station at a first time and the position information of a terminal accessed at a second time according to the position information of the terminal sent by the plurality of terminals, the information of the accessed base station when the event occurs and the time when the event occurs, wherein the target base station is any one of the base stations accessed by the plurality of terminals when the event occurs;
calculating a first central position of an accessed terminal according to the position information of the terminal accessed by the target base station at the first time, and calculating a second central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the second time;
determining the first central position as a first position of the target base station, and determining the second central position as a second position of the target base station;
if the absolute value of the difference between the first position and the second position is greater than a second threshold, the obtaining module determines that the information of the target base station is the information of the pseudo base station.
Optionally, in some embodiments of the present application, on the basis of the foregoing fig. 9(b), as shown in fig. 9(c), the server is a schematic diagram of another embodiment of the server, and the server further includes:
a marking module 905, configured to mark suspicious probabilities of the real base station and the pseudo base station;
the receiving module 901 is further configured to receive feedback information sent by a first target terminal, where the feedback information is input information that is input by a user and indicates whether an indication information that an access base station is a pseudo base station when the event occurs in the first target terminal is accurate;
a modifying module 906, configured to correspondingly modify the suspicious probability of the pseudo base station according to the feedback information, so as to obtain a modified suspicious probability of the pseudo base station.
Optionally, in some embodiments of the present application, on the basis shown in fig. 9(c) above, as shown in fig. 9(d), the server is a schematic diagram of another embodiment of the server, and the server further includes:
the determining module 903 is further configured to determine that the information of the base station whose suspicious probability is greater than the third threshold is information of the target pseudo base station, and the information of the base station whose suspicious probability is less than the fourth threshold is information of the target real base station;
and a model training module 907, configured to perform model training according to the information of the target pseudo base station and the information of the target real base station, so as to obtain reference weights of various features included in the information of different base stations.
Alternatively, in some embodiments of the present application,
the receiving module 901 is further configured to receive information of a first event sent by a first terminal, where the information of the first event includes information of a first base station accessed when the first event occurs;
the sending module 904 is further configured to send instruction information of a pseudo base station to the first terminal if the information of the first base station is in the information of the pseudo base station.
Alternatively, in some embodiments of the present application,
the determining module 903 is further configured to, if the information of the first base station is not in the information of the pseudo base station, determine, by the determining module 903, a target probability of the first base station according to the information of the first event and reference weights of features included in the information of the base station; if the target probability is less than or equal to the fifth threshold, the determining module 903 determines that the first base station is a pseudo base station;
the sending module 904 is further configured to send indication information of a pseudo base station to the first terminal.
Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call;
the information of the event further includes: the content of the short message and/or the number of the incoming call.
As shown in fig. 10, a schematic diagram of an embodiment of a terminal in the embodiment of the present application includes:
an acquisition module 1001, configured to detect an event occurrence and acquire information of the event;
a sending module 1002, configured to send information of the event to a server;
a receiving module 1003, configured to receive indication information of a pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the event information;
a prompting module 1004, configured to prompt indication information of the pseudo base station.
Optionally, in some embodiments of the present application, the information of the event includes the terminal identifier, the location information of the terminal, information of a base station accessed when the event occurs, and a time when the event occurs.
Alternatively, in some embodiments of the present application,
the receiving module 1003 is further configured to receive feedback information, where the feedback information is input information that is input by a user and indicates whether the indication information that the base station accessed when the event occurs to the terminal is a pseudo base station is accurate;
the sending module 1004 is further configured to send the feedback information to the server, where the feedback information is used for the server to modify the suspicious probability of the pseudo base station.
Alternatively, in some embodiments of the present application,
the prompting module 1004 is specifically configured to display the indication information of the pseudo base station through a text.
Alternatively, in some embodiments of the present application,
the prompting module 1004 is specifically configured to display indication information of the pseudo base station through a danger identifier.
The prompting module 1004 is specifically configured to prompt the indication information of the pseudo base station through voice.
Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call; the information of the event further includes: the content of the short message and/or the number of the incoming call.
Fig. 11 is a schematic diagram of another embodiment of the server in the embodiment of the present application.
The server may vary widely in configuration or performance and may include one or more wired or wireless network interfaces 1150, which may also be referred to as transceivers, one or more Central Processing Units (CPUs) 1122 (e.g., one or more processors) and memory 1132, one or more storage media 1130 (e.g., one or more mass storage devices) storing applications 1142 or data 1144.
In this embodiment, the wired or wireless network interface 1150 may receive information of events sent by a plurality of terminals; the cpu 1122 obtains information of the real base station and information of the pseudo base station according to the information of the events sent by the plurality of terminals received by the wired or wireless network interface 1150. The indication information for prompting the pseudo base station on the target terminal may include, but is not limited to, the implementations shown in fig. 4(c) -fig. 4 (p).
Memory 1132 and storage media 1130 may be, among other things, transient storage or persistent storage. The program stored on the storage medium 1130 may include one or more modules (not shown), each of which may include a series of instruction operations for the server. Still further, the central processor 1122 may be provided in communication with the storage medium 1130 to execute a series of instruction operations in the storage medium 1130 on the server 1100.
The server 1100 may also include one or more power supplies 1126, one or more input-output interfaces 1158, and/or one or more operating systems 1141, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and the like.
The steps performed by the server in the above embodiment may be based on the server structure shown in fig. 11.
Optionally, in some embodiments of the present application, the central processor 1122 is further configured to perform the following steps: determining a target terminal accessed to a pseudo base station in the plurality of terminals according to the information of the real base station and the information of the pseudo base station;
a wired or wireless network interface 1150, further configured to perform the following steps: and sending indication information of the pseudo base station to the target terminal.
Optionally, in some embodiments of the present application, the information of the event includes a terminal identifier, location information of the terminal, information of a base station accessed when the event occurs, and a time when the event occurs.
Optionally, in some embodiments of the present application, the central processor 1122 is specifically configured to perform the following steps:
determining initial base station information about longitude, latitude and date according to the position information of the terminals sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and preset position calculation precision;
deleting information of the initial base station with the occurrence number less than a first threshold value in continuous dates from the information of the initial base stations with the longitude, the latitude and the dates;
removing the date, and combining the information of other initial base stations to obtain information about screening base stations of longitude and latitude;
and determining the information of the screening base station as the information of the real base station.
Optionally, in some embodiments of the present application, the central processor 1122 is specifically configured to perform the following steps:
the server determines the position information of a terminal accessed by a target base station at a first time and the position information of a terminal accessed at a second time according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs and the time when the event occurs, wherein the target base station is any one of the base stations accessed when the plurality of terminals occur;
calculating a first central position of an accessed terminal according to the position information of the terminal accessed by the target base station at the first time, and calculating a second central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the second time;
determining the first central position as a first position of the target base station, and determining the second central position as a second position of the target base station;
and if the absolute value of the difference between the first position and the second position is greater than a second threshold, the central processing unit determines that the information of the target base station is the information of the pseudo base station.
Optionally, in some embodiments of the present application, the central processor 1122 is specifically configured to perform the following steps: marking the suspicious probabilities of the real base station and the pseudo base station; correspondingly modifying the suspicious probability of the pseudo base station according to the feedback information to obtain the modification suspicious probability of the pseudo base station;
the wired or wireless network interface 1150 is also used to perform the following steps: and receiving feedback information sent by a first target terminal, wherein the feedback information is input information which is input by a user and indicates whether the base station accessed when the first target terminal has the event is a pseudo base station is accurate or not.
Optionally, in some embodiments of the present application, the central processor 1122 is specifically configured to perform the following steps:
determining the information of the base station with the suspicious probability being larger than the third threshold as the information of the target pseudo base station, and determining the information of the base station with the suspicious probability being smaller than the fourth threshold as the information of the target real base station;
and performing model training according to the information of the target pseudo base station and the information of the target real base station to obtain the reference weight of each feature included in the information of the base station.
Optionally, in some embodiments of the present application, the wired or wireless network interface 1150 is further configured to perform the following steps:
receiving information of a first event sent by a first terminal, wherein the information of the first event comprises information of a first base station accessed when the first event occurs;
if the information of the first base station is in the information of the pseudo base station, the wired or wireless network interface 1150 sends indication information of the pseudo base station to the first terminal.
Optionally, in some embodiments of the present application, the central processor 1122 is specifically configured to perform the following steps:
if the information of the first base station is not in the information of the pseudo base station, the central processor 1122 determines the target probability of the first base station according to the information of the first event and the reference weight of each feature included in the information of the base station; if the target probability is less than or equal to the fifth threshold, the central processor 1122 determines that the first base station is a pseudo base station;
the wired or wireless network interface 1150 is also used to perform the following steps: and sending indication information of the pseudo base station to the first terminal.
Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call; the information of the event further includes: the content of the short message and/or the number of the incoming call.
Fig. 12 is a schematic diagram of another embodiment of the terminal in the embodiment of the present application.
For convenience of explanation, fig. 12 only shows a part related to the embodiment of the present application, and details of the technology are not disclosed, please refer to the method part of the embodiment of the present application. The terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (personal digital Assistant), a POS (Point of Sales), a vehicle-mounted computer, etc., taking the terminal as the mobile phone as an example:
fig. 12 is a block diagram illustrating a partial structure of a mobile phone related to a terminal provided in an embodiment of the present application. Referring to fig. 12, the cellular phone includes: components such as processor 1280, communication interface 1210, output unit 1270, memory 1220, input unit 1230, sensors 1250, and power supply 1290. The communication interface 1210 may include a Radio Frequency (RF) circuit 1211, a wireless fidelity (WiFi) module 1212, and other components; the output unit 1270 may include a display unit 1240, an audio circuit 1260, and the like. Those skilled in the art will appreciate that the handset configuration shown in fig. 12 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 12:
the processor 1280 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 1220 and calling data stored in the memory 1220, thereby performing overall monitoring of the mobile phone. In this embodiment, the processor 1280 detects an event and collects information about the event. Optionally, processor 1280 may include one or more processing units; preferably, the processor 1280 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It is to be appreciated that the modem processor described above may not be integrated into the processor 1280.
RF circuit 1211 may be configured to receive and transmit signals during a call or a message transmission process, and in particular, receive downlink information from a base station and process the received downlink information to processor 1280; in addition, the data for designing uplink is transmitted to the base station. In this embodiment, the RF circuit 1211 may send, to the server, the information of the event collected by the processor 1280, and receive indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event.
In general, RF circuits 1211 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuit 1211 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
The memory 1220 may be used to store software programs and modules, and the processor 1280 executes various functional applications and data processing of the mobile phone by operating the software programs and modules stored in the memory 1220. The memory 1220 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 1220 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 1230 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. As shown in fig. 6(a) and 6(b), if the user inputs feedback information, the feedback information may be received by the mobile phone through the input unit 1230. Specifically, the input unit 1230 may include a touch panel 1231 and other input devices 1232. The touch panel 1231, also referred to as a touch screen, can collect touch operations of a user (e.g., operations of the user on or near the touch panel 1231 using any suitable object or accessory such as a finger, a stylus, etc.) thereon or nearby, and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 1231 may include two portions, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, and sends the touch point coordinates to the processor 1280, and can receive and execute commands sent by the processor 1280. In addition, the touch panel 1231 may be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 1230 may include other input devices 1232 in addition to the touch panel 1231. In particular, other input devices 1232 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The output unit 1270 may include a display unit 1240, an audio circuit 1260, and the like. In this embodiment, the output unit 1270 may be configured to prompt the indication information of the pseudo base station.
The display unit 1240 may be used to display information input by the user or information provided to the user and various menus of the cellular phone. The interfaces shown in fig. 4(a) -4(p) and fig. 6(a) -6 (d) are all displayed by the display unit 1240. The display unit 1240 may include a display panel 1241, and optionally, the display panel 1241 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, touch panel 1231 can overlay display panel 1241, and when touch panel 1231 detects a touch operation thereon or nearby, the touch panel 1231 can transmit the touch operation to processor 1280 to determine the type of the touch event, and then processor 1280 can provide a corresponding visual output on display panel 1241 according to the type of the touch event. Although in fig. 12, the touch panel 1231 and the display panel 1241 are implemented as two independent components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 1231 and the display panel 1241 may be integrated to implement the input and output functions of the mobile phone.
Audio circuitry 1260, speaker 1261, and microphone 1262 can provide an audio interface between a user and a cell phone. As shown in fig. 4(e), 4(f), 4(i), 4(j), 4(m), and 4(n), indication information of the pseudo base station may be presented to the user through the audio circuit 1260. The audio circuit 1260 can transmit the received electrical signal converted from the audio data to the speaker 1261, and the audio signal is converted into a sound signal by the speaker 1261 and output; on the other hand, the microphone 1262 converts the collected sound signal into an electric signal, converts the electric signal into audio data after being received by the audio circuit 1260, and outputs the audio data to the processor 1280 for processing, and then transmits the audio data to, for example, another cellular phone through the RF circuit 1211, or outputs the audio data to the memory 1220 for further processing.
The cell phone may also include at least one sensor 1250, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1241 according to the brightness of ambient light, and the proximity sensor may turn off the display panel 1241 and/or the backlight when the mobile phone moves to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
WiFi belongs to short-distance wireless transmission technology, and the cell phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 1212, and provides wireless broadband internet access for the user. Although fig. 12 shows the WiFi module 1212, it is understood that it does not belong to the essential constitution of the handset, and may be omitted entirely as needed within the scope not changing the essence of the application.
The handset also includes a power supply 1290 (e.g., a battery) for powering the various components, and preferably, the power supply may be logically connected to the processor 1280 via a power management system, so that the power management system may manage the charging, discharging, and power consumption.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which are not described herein.
The steps performed by the terminal in the above embodiment may be based on the terminal structure shown in fig. 12.
Optionally, in some embodiments of the present application, the information of the event includes the terminal identifier, the location information of the terminal, information of a base station accessed when the event occurs, and a time when the event occurs.
Alternatively, in some embodiments of the present application,
the input unit 1230 is further configured to receive feedback information, where the feedback information is input information that is input by a user and indicates whether the base station accessed when the event occurs in the terminal is a pseudo base station;
the radio frequency circuit 1211 is further configured to send the feedback information to the server, where the feedback information is used for the server to modify the suspected probability of the pseudo base station.
Alternatively, in some embodiments of the present application,
the display unit 1240 is further configured to display the indication information of the pseudo base station through text.
Alternatively, in some embodiments of the present application,
the display unit 1240 is further configured to display indication information of the pseudo base station through a danger indicator.
Alternatively, in some embodiments of the present application,
the audio circuit 1260 is further configured to prompt the indication information of the pseudo base station through voice.
Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call; the information of the event further includes: the content of the short message and/or the number of the incoming call.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
Optionally, in some embodiments of the present application, a computer program product containing instructions is provided, which when run on a computer, causes the computer to perform the method as shown in the server in fig. 3, fig. 5, fig. 7 or fig. 8, and the same or corresponding technical features thereof may be cited in this embodiment.
Optionally, in some embodiments of the present application, a computer program product containing instructions is provided, which when run on a computer, causes the computer to perform the method as shown in the terminal in fig. 3, fig. 5, fig. 7 or fig. 8, and the same or corresponding technical features thereof may be cited in this embodiment.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims of the present application and in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.

Claims (28)

1. A method of prompting, comprising:
the server receives the information of events sent by a plurality of terminals;
the server acquires information of a real base station and information of a pseudo base station according to the information of the events sent by the plurality of terminals;
the server acquires the information of the real base station according to the information of the events sent by the plurality of terminals, and the method comprises the following steps:
the server determines initial base station information about longitude, latitude and date according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and preset position calculation precision;
the server deletes information of the initial base station, the occurrence number of which is less than a first threshold value in continuous dates, from the information of the initial base stations about longitude, latitude and date;
the server removes the date, and the information of other initial base stations is combined to obtain the information of the screening base stations about longitude and latitude;
and the server determines that the information of the screening base station is the information of the real base station.
2. The method of claim 1, further comprising:
the server determines a target terminal accessed to a pseudo base station in the plurality of terminals according to the information of the real base station and the information of the pseudo base station;
and the server sends the indication information of the pseudo base station to the target terminal.
3. The method according to claim 1 or 2, wherein the server obtains information of the pseudo base station according to the information of the event sent by the plurality of terminals, and comprises:
the server determines the position information of a terminal accessed by a target base station at a first time and the position information of a terminal accessed at a second time according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs and the time when the event occurs, wherein the target base station is any one of the base stations accessed when the plurality of terminals occur;
the server calculates a first central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the first time, and calculates a second central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the second time;
the server determines that the first central position is a first position of the target base station, and determines that the second central position is a second position of the target base station;
and if the absolute value of the difference between the first position and the second position is greater than a second threshold, the server determines that the information of the target base station is the information of the pseudo base station.
4. The method according to claim 1 or 2, characterized in that the method further comprises:
the server marks the suspicious probabilities of the real base stations and the pseudo base stations;
the server receives feedback information sent by a first target terminal, wherein the feedback information is input information which is input by a user and indicates whether indication information of a base station accessed when the first target terminal has the event is a pseudo base station is accurate or not;
and the server correspondingly modifies the suspicious probability of the pseudo base station according to the feedback information to obtain the modification suspicious probability of the pseudo base station.
5. A method of prompting, comprising:
a terminal detects the occurrence of an event and collects the information of the event;
the terminal sends the information of the event to a server;
the terminal receives indication information of a pseudo base station sent by the server, wherein the indication information of the pseudo base station is obtained by searching in the information of the real base station and the information of the pseudo base station after the server obtains the information of the real base station and the information of the pseudo base station according to the information of the event;
the terminal prompts the indication information of the pseudo base station;
the information of the real base station is obtained by the server according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and the preset position calculation precision, determining the information of the initial base station about longitude, latitude and date, deleting the information of the initial base station with the occurrence frequency less than a first threshold value in continuous date from the information of the initial base station about longitude, latitude and date, removing the date and combining the information of other initial base stations to obtain the information of the screening base station about longitude and latitude, and determining the information of the screening base station to be the information of the real base station.
6. The method of claim 5, further comprising:
the terminal receives feedback information, wherein the feedback information is input information which is input by a user and indicates whether the indication information of the base station accessed when the terminal generates the event is a pseudo base station is accurate or not;
and the terminal sends the feedback information to the server, wherein the feedback information is used for the server to modify the suspicious probability of the pseudo base station.
7. The method according to claim 5 or 6, wherein the prompting, by the terminal, of the indication information of the pseudo base station comprises:
and the terminal displays the indication information of the pseudo base station through characters.
8. The method according to claim 5 or 6, wherein the prompting, by the terminal, of the indication information of the pseudo base station comprises:
and the terminal displays the indication information of the pseudo base station through the danger identification.
9. The method according to claim 5 or 6, wherein the prompting, by the terminal, of the indication information of the pseudo base station comprises:
and the terminal prompts the indication information of the pseudo base station through voice.
10. A server, comprising:
the receiving module is used for receiving the information of the events sent by the plurality of terminals;
the acquisition module is used for acquiring the information of the real base station and the information of the pseudo base station according to the information of the events sent by the plurality of terminals;
the acquisition module is specifically configured to:
determining initial base station information about longitude, latitude and date according to the position information of the terminals sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and preset position calculation precision;
deleting information of the initial base station with the occurrence number less than a first threshold value in continuous dates from the information of the initial base stations with the longitude, the latitude and the dates;
removing the date, and combining the information of other initial base stations to obtain information about screening base stations of longitude and latitude;
and determining the information of the screening base station as the information of the real base station.
11. The server according to claim 10, further comprising:
a determining module, configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal that is accessed to the pseudo base station from among the multiple terminals;
and the sending module is used for sending the indication information of the pseudo base station to the target terminal.
12. The server according to claim 10 or 11, wherein the obtaining module is further configured to:
determining the position information of a terminal accessed by a target base station at a first time and the position information of a terminal accessed at a second time according to the position information of the terminal sent by the plurality of terminals, the information of the accessed base station when the event occurs and the time when the event occurs, wherein the target base station is any one of the base stations accessed by the plurality of terminals when the event occurs;
calculating a first central position of an accessed terminal according to the position information of the terminal accessed by the target base station at the first time, and calculating a second central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the second time;
determining the first central position as a first position of the target base station, and determining the second central position as a second position of the target base station;
if the absolute value of the difference between the first position and the second position is greater than a second threshold, the obtaining module determines that the information of the target base station is the information of the pseudo base station.
13. The server according to claim 10 or 11, wherein the server further comprises:
a marking module for marking the suspicious probabilities of the real base stations and the pseudo base stations;
the receiving module is further configured to receive feedback information sent by the first target terminal, where the feedback information is input information indicating whether the indication information, which is input by the user and used for indicating that the base station accessed when the event occurs in the first target terminal is a pseudo base station, is accurate;
and the modification module is used for correspondingly modifying the suspicious probability of the pseudo base station according to the feedback information to obtain the modified suspicious probability of the pseudo base station.
14. A terminal, comprising:
the acquisition module is used for detecting the occurrence of an event and acquiring the information of the event;
the sending module is used for sending the information of the event to a server;
the receiving module is used for receiving indication information of the pseudo base station sent by the server, wherein the indication information of the pseudo base station is obtained by searching in the information of the real base station and the information of the pseudo base station after the server obtains the information of the real base station and the information of the pseudo base station according to the information of the event;
the prompting module is used for prompting the indication information of the pseudo base station;
the information of the real base station is obtained by the server according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and the preset position calculation precision, determining the information of the initial base station about longitude, latitude and date, deleting the information of the initial base station with the occurrence frequency less than a first threshold value in continuous date from the information of the initial base station about longitude, latitude and date, removing the date and combining the information of other initial base stations to obtain the information of the screening base station about longitude and latitude, and determining the information of the screening base station to be the information of the real base station.
15. The terminal of claim 14,
the receiving module is further configured to receive feedback information, where the feedback information is input information that is input by a user and indicates whether the indication information that the base station accessed when the event occurs in the terminal is a pseudo base station is accurate;
the sending module is further configured to send the feedback information to the server, where the feedback information is used for the server to modify the suspicious probability of the pseudo base station.
16. The terminal according to claim 14 or 15,
the prompting module is specifically used for displaying the indication information of the pseudo base station through characters.
17. The terminal according to claim 14 or 15,
the prompt module is specifically configured to display indication information of the pseudo base station through a danger identifier.
18. The terminal according to claim 14 or 15,
the prompting module is specifically used for prompting the indication information of the pseudo base station through voice.
19. A server, comprising:
a transceiver, a processor, a memory and a bus through which the transceiver, the processor and the memory are connected;
the memory for storing a computer program;
the transceiver is used for receiving information of events sent by a plurality of terminals;
the processor is configured to call the computer program, and obtain information of a real base station and information of a pseudo base station according to the information of the event sent by the plurality of terminals;
the processor is specifically configured to perform the steps of:
determining initial base station information about longitude, latitude and date according to the position information of the terminals sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and preset position calculation precision;
deleting information of the initial base station with the occurrence number less than a first threshold value in continuous dates from the information of the initial base stations with the longitude, the latitude and the dates;
removing the date, and combining the information of other initial base stations to obtain information about screening base stations of longitude and latitude;
and determining the information of the screening base station as the information of the real base station.
20. The server according to claim 19,
the processor is further configured to determine a target terminal accessing a pseudo base station from the plurality of terminals according to the information of the real base station and the information of the pseudo base station;
the transceiver is further configured to send indication information of a pseudo base station to the target terminal.
21. The server according to claim 19 or 20, wherein the processor is specifically configured to perform the steps of:
determining the position information of a terminal accessed by a target base station at a first time and the position information of a terminal accessed at a second time according to the position information of the terminal sent by the plurality of terminals, the information of the accessed base station when the event occurs and the time when the event occurs, wherein the target base station is any one of the base stations accessed by the plurality of terminals when the event occurs;
calculating a first central position of an accessed terminal according to the position information of the terminal accessed by the target base station at the first time, and calculating a second central position of the accessed terminal according to the position information of the terminal accessed by the target base station at the second time;
determining the first central position as a first position of the target base station, and determining the second central position as a second position of the target base station;
and if the absolute value of the difference between the first position and the second position is greater than a second threshold, the processor determines that the information of the target base station is the information of the pseudo base station.
22. The server according to claim 19 or 20, wherein the processor is further configured to perform the steps of:
marking the suspicious probabilities of the real base station and the pseudo base station;
correspondingly modifying the suspicious probability of the pseudo base station according to the feedback information to obtain the modification suspicious probability of the pseudo base station;
the transceiver is further configured to perform the steps of:
and receiving feedback information sent by a first target terminal, wherein the feedback information is input information which is input by a user and indicates whether the base station accessed when the first target terminal has the event is a pseudo base station is accurate or not.
23. A terminal, comprising:
the device comprises a processor, a communication interface, a memory, an output unit and a bus, wherein the processor, the communication interface, the output unit and the memory are connected through the bus;
the memory for storing a computer program;
the processor is used for calling the computer program, detecting the occurrence of an event and collecting the information of the event;
the communication interface is used for sending the information of the event to a server; receiving indication information of a pseudo base station sent by the server, wherein the indication information of the pseudo base station is obtained by searching in the information of the real base station and the information of the pseudo base station after the server obtains the information of the real base station and the information of the pseudo base station according to the information of the event;
the output unit is used for prompting the indication information of the pseudo base station;
the information of the real base station is obtained by the server according to the position information of the terminal sent by the plurality of terminals, the information of the base station accessed when the event occurs, the time when the event occurs and the preset position calculation precision, determining the information of the initial base station about longitude, latitude and date, deleting the information of the initial base station with the occurrence frequency less than a first threshold value in continuous date from the information of the initial base station about longitude, latitude and date, removing the date and combining the information of other initial base stations to obtain the information of the screening base station about longitude and latitude, and determining the information of the screening base station to be the information of the real base station.
24. The terminal according to claim 23, characterized in that the terminal further comprises an input unit,
the input unit is further configured to receive feedback information, where the feedback information is input information indicating whether the indication information, which is input by the user and is used for indicating that the base station accessed when the event occurs in the terminal is a pseudo base station, is accurate;
the communication interface is further configured to send the feedback information to the server, where the feedback information is used for the server to modify the suspicious probability of the pseudo base station.
25. The terminal according to claim 23 or 24, wherein the output unit comprises a display unit,
and the display unit is used for displaying the indication information of the pseudo base station through characters.
26. The terminal according to claim 23 or 24, wherein the output unit comprises a display unit,
and the display unit is used for displaying the indication information of the pseudo base station through the danger identification.
27. The terminal according to claim 23 or 24, wherein the output unit comprises an audio circuit,
and the audio circuit is used for prompting the indication information of the pseudo base station through voice.
28. A computer-readable storage medium storing a computer program for execution by a processor to implement the method of any one of claims 1-9.
CN201780005192.7A 2017-01-22 2017-05-31 Prompting method, terminal and server Active CN108513717B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN2017100522787 2017-01-22
CN201710052278 2017-01-22
PCT/CN2017/086643 WO2018133284A1 (en) 2017-01-22 2017-05-31 Prompting method, terminal, and server

Publications (2)

Publication Number Publication Date
CN108513717A CN108513717A (en) 2018-09-07
CN108513717B true CN108513717B (en) 2020-09-04

Family

ID=62907654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780005192.7A Active CN108513717B (en) 2017-01-22 2017-05-31 Prompting method, terminal and server

Country Status (2)

Country Link
CN (1) CN108513717B (en)
WO (1) WO2018133284A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124698A (en) * 2018-10-30 2020-05-08 北京奇虎科技有限公司 Communication event identification method and device, electronic equipment and readable storage medium
CN110213724B (en) * 2019-05-17 2020-10-20 国家计算机网络与信息安全管理中心 Pseudo base station motion trajectory identification method
CN111582679B (en) * 2020-04-24 2023-04-18 腾讯科技(成都)有限公司 Processing method, device and equipment for application service partition and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430653B (en) * 2014-09-19 2020-11-06 中国电信股份有限公司 Pseudo base station discovery method and system
CN105764059B (en) * 2014-12-15 2018-11-13 北京新讯世纪信息技术有限公司 A method of pseudo-base station is identified based on terminal positional information
US9867039B2 (en) * 2015-06-26 2018-01-09 Futurewei Technologies, Inc. System and method for faked base station detection
CN105744527B (en) * 2016-03-28 2018-11-09 河海大学 A kind of pseudo-base station detection method and system based on big data and cloud computing

Also Published As

Publication number Publication date
CN108513717A (en) 2018-09-07
WO2018133284A1 (en) 2018-07-26

Similar Documents

Publication Publication Date Title
CN107480533B (en) Vulnerability repairing method and device and storage medium
CN108334539B (en) Object recommendation method, mobile terminal and computer-readable storage medium
WO2016134630A1 (en) Method and device for recognizing malicious call
US10785369B1 (en) Multi-factor scam call detection and alerting
CN105873178A (en) Method and device for recognizing pseudo base-station
CN111316673B (en) Electronic fence updating method and communication device
CN111125523B (en) Searching method, searching device, terminal equipment and storage medium
CN107959936A (en) Recognition methods, system, terminal and the computer-readable storage medium of 4G pseudo-base stations
CN106657690A (en) Method and device for preventing phone scam, and mobile terminal
CN108513717B (en) Prompting method, terminal and server
CN108124262A (en) Pseudo-base station recognition methods, terminal and computer readable storage medium
US20170353593A1 (en) Communication event processing method and apparatus
CN109275146A (en) A kind of pseudo-base station detection method, terminal and computer readable storage medium
CN110597793A (en) Data management method and device, electronic equipment and computer readable storage medium
JP2021507600A (en) Pseudo base station positioning method, terminal and computer readable storage medium
CN105282692A (en) Speed measurement information display method and device
CN112711516B (en) Data processing method and related device
CN108959960B (en) Method, device and computer readable storage medium for preventing privacy disclosure
CN113485899A (en) Information processing method, terminal device and storage medium
CN108171000B (en) Method and device for early warning of water damage disasters of oil and gas pipelines
CN109508425B (en) Setting item recommendation method and terminal equipment
CN109740121B (en) Search method of mobile terminal, mobile terminal and storage medium
CN115118636B (en) Method and device for determining network jitter state, electronic equipment and storage medium
CN107580326B (en) Parameter adjusting method and device in pseudo base station identification and mobile terminal
CN109548028B (en) Base station type identification method, device, terminal and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant