CN109005543B - System and method for limiting mobile phone use based on IMEI - Google Patents

System and method for limiting mobile phone use based on IMEI Download PDF

Info

Publication number
CN109005543B
CN109005543B CN201811021049.XA CN201811021049A CN109005543B CN 109005543 B CN109005543 B CN 109005543B CN 201811021049 A CN201811021049 A CN 201811021049A CN 109005543 B CN109005543 B CN 109005543B
Authority
CN
China
Prior art keywords
imei
mobile phone
complaint
alarm
big data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811021049.XA
Other languages
Chinese (zh)
Other versions
CN109005543A (en
Inventor
丁正
顾晓东
董伟
卜小冲
康胜杰
张自强
张同优
刘晶晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Xinfang Software Co ltd
Shanghai Cintel Intelligent System Co ltd
Original Assignee
Shanghai Xinfang Software Co ltd
Shanghai Cintel Intelligent System Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Xinfang Software Co ltd, Shanghai Cintel Intelligent System Co ltd filed Critical Shanghai Xinfang Software Co ltd
Priority to CN201811021049.XA priority Critical patent/CN109005543B/en
Publication of CN109005543A publication Critical patent/CN109005543A/en
Application granted granted Critical
Publication of CN109005543B publication Critical patent/CN109005543B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Power Engineering (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a system and a method for limiting the use of a mobile phone based on IMEI (International Mobile equipment identity), which comprises a big data analysis device, wherein the big data analysis device is respectively connected with an alarm receiving device, an inquiry device, a complaint receiving device, a manual auditing device, a use limiting device and a data acquisition device; by adopting a big data processing method to monitor and analyze the IMEI (international mobile equipment identity) of the stolen phone, the use value of the stolen phone is reduced, the normal market operation environment of a second-hand mobile phone merchant is improved, the safety of the mobile phone of a mobile phone user is improved, the risk of stealing and robbing the mobile phone is reduced, and the normal use of the user is not influenced.

Description

System and method for limiting mobile phone use based on IMEI
Technical Field
The invention relates to the technical field of Internet public security, in particular to a system and a method for limiting the use of a mobile phone based on IMEI.
Background
With the increasing of the quantity of mobile phones, criminals take high-value mobile phones as crime targets, the mobile phones are stolen, robbed, cheated and frequently sent out of cases, the case detection difficulty is high, and the reporting willingness of people is low, so that the criminals form an industrial chain which is stolen, changed and sold completely, huge economic loss is brought to people, and the normal social order is disturbed.
People hope to have a safe and stable social environment, and reduce and stop the occurrence of fraud cases of mobile phones; the national public security department, second-hand mobile phone dealers, telecom operators and the like hope to attack mobile phone robbery and cheat from the source through a technical approach and provide a safe social environment for the public.
An effective solution to the problems in the related art has not been proposed yet.
Disclosure of Invention
Aiming at the technical problems in the related art, the invention provides a front-end stamping method of a high-precision timestamp.
The technical scheme of the invention is realized as follows:
a system for limiting mobile phone use based on IMEI comprises big data analysis devices, wherein the big data analysis devices are respectively connected with:
the alarm receiving device is used for interacting with an alarm user, carrying out identity verification on the alarm user, receiving alarm information input by the alarm user, verifying the legality of the alarm information, and simultaneously sending an alarm user identity verification result and the alarm information to the big data analysis device;
the query device is used for receiving the IMEI query number provided by the query user, comparing the IMEI query number with an IMEI blacklist in the big data analysis device and feeding back a comparison result to the query user;
the complaint receiving device is used for carrying out identity verification on the complaint user, receiving complaint information filled by the complaint user, verifying the legality of the complaint information and simultaneously sending the complaint user identity verification result and the complaint information to the big data analysis device;
the manual auditing device is used for interacting with auditors, displaying the complaint information to the auditors, receiving a complaint success list input by the auditors, and sending the complaint success list to the big data analysis device;
the use limiting device is respectively connected with the short message gateway/short message center and an internet manufacturer and is used for sending the robbed and stolen reminding short message to the corresponding equipment on the IMEI blacklist and limiting the corresponding equipment on the IMEI blacklist to use internet application;
the data acquisition device is respectively connected with the signaling acquisition and analysis system and the mobile phone production enterprise, and is used for acquiring the on-off state and the signaling data of equipment corresponding to the mobile phone number in the alarm information in real time, acquiring the IMEI number, the position information and the equipment code information corresponding to the mobile phone number in the alarm information in the signaling data and pushing the IMEI number, the position information and the equipment code information to the big data analysis device, and meanwhile, inquiring other equipment identification codes corresponding to the IMEI number from the mobile phone production enterprise and feeding the inquiry result back to the big data analysis device; the other equipment identification codes comprise a second IMEI number, a Bluetooth address code, a wifi address code and a product serial number;
the big data analysis device is used for performing information interaction, analysis and storage with the alarm receiving device, the query device, the complaint receiving device, the manual auditing device, the use limiting device and the data acquisition device; comprises the steps of (a) preparing a mixture of a plurality of raw materials,
controlling a data acquisition device to acquire signaling data and an IMEI number corresponding to a mobile phone number in alarm information according to the alarm information transmitted by an alarm receiving device;
generating an IMEI blacklist according to the IMEI number corresponding to the mobile phone number in the alarm information transmitted by the data acquisition device and the IMEI inquiry number transmitted by the inquiry device;
controlling the use limiting device to send a robbed and stolen reminding short message to the corresponding equipment on the IMEI blacklist according to the IMEI blacklist and signaling data transmitted by the data acquisition device, and limiting the corresponding equipment on the IMEI blacklist to use internet application;
and controlling the manual auditing device to audit the complaint information according to the IMEI complaint number in the complaint information transmitted by the complaint receiving device, and controlling the use limiting device to remove the limitation on the telephone number in the complaint success list according to the complaint success list transmitted by the manual auditing device.
Further, the big data analysis device comprises a big data analysis device interface unit, a calculation unit and a storage unit which are respectively connected with the big data analysis device interface unit, and a business database and a historical information database which are respectively connected with the storage unit;
the big data analysis device interface unit is respectively connected with an alarm receiving device, an inquiry device, a complaint receiving device, a manual auditing device, a use limiting device and a data acquisition device;
the computing unit is in communication connection with the storage unit.
Further, the alarm receiving device includes:
a first identity verification unit: the system is used for performing living body verification, face recognition and identity card comparison on an alarm user, determining the real alarm identity of the alarm person, pushing the identity verification result of the alarm user to a big data analysis device, and entering alarm information after the identity verification of the alarm user is passed;
an alarm information processing unit: the system comprises a big data analysis device, a data storage device and a data processing device, wherein the big data analysis device is used for receiving alarm information input by an alarm user, verifying the legality of each field of the alarm information and pushing the alarm information to the big data analysis device;
wherein, the alarm information includes but not limited to mobile phone number, position of case, time of case.
Further, the query device includes:
IMEI number identification unit: the system is used for scanning and inquiring the picture provided by the user and provided with the IMEI inquiry number and identifying the IMEI inquiry number;
an IMEI number comparison unit: and the IMEI number identification unit is connected with the IMEI number identification unit and used for receiving the IMEI inquiry number input by the inquiry user or provided by the IMEI number identification unit, comparing the IMEI inquiry number with an IMEI blacklist in the big data analysis device and feeding back the comparison result to the inquiry user.
Further, the complaint receiving device includes:
a second authentication unit: the system is used for performing living body verification, face recognition and identity card comparison on the complaint user, determining the real identity of the complaint user, pushing the identification verification result of the complaint user to a big data analysis device, and entering complaint information input after the complaint user passes the identification verification;
a complaint information processing unit: the system is used for receiving the complaint information input by the complaint user, verifying the legality of each field of the complaint information and pushing the complaint information to the big data analysis device.
Further, the manual auditing device comprises:
and (3) manually auditing WEB units: the interface unit is connected with the big data analysis device and used for displaying the complaint information to the auditor through a WEB webpage, receiving a complaint success list input by the auditor and sending the complaint success list to the big data analysis device;
the complaint information includes, but is not limited to, telephone number, IMEI number, name, complaint proof material.
Furthermore, the use limiting device comprises a limiting strategy execution unit connected with the big data analysis device through a big data analysis device interface unit, an early warning short message/flash message interface unit and an internet application limiting interface unit, wherein the early warning short message/flash message interface unit and the internet application limiting interface unit are respectively connected with the limiting strategy execution unit; the early warning short message/flash interface unit is connected with a short message gateway/short message center, and the internet application limiting interface unit is connected with an internet manufacturer.
Furthermore, the data acquisition device comprises an analysis processing unit connected with the big data analysis device through a big data analysis device interface unit, and an analysis strategy configuration unit, a signaling acquisition interface unit and a mobile phone production enterprise interface unit which are respectively connected with the analysis processing unit, wherein the signaling acquisition interface unit is connected with the signaling acquisition and analysis system, and the mobile phone production enterprise interface unit is connected with a mobile phone production enterprise.
A method for limiting the use of a mobile phone based on IMEI comprises the following steps:
s1: after the mobile phone of the alarm user is stolen and robbed, the alarm user alarms on line through the alarm receiving device and inputs alarm information;
s2: the big data analysis device receives and stores the alarm information pushed by the alarm receiving device, inquires an IMEI number corresponding to the mobile phone number in the alarm information through the data acquisition device, and adds the IMEI number corresponding to the mobile phone number in the alarm information into an IMEI blacklist;
s3: pushing the IMEI blacklist to an Internet manufacturer by using a limiting device, and limiting the use of Internet application on a user on the IMEI blacklist by the Internet manufacturer; meanwhile, the data acquisition device detects the on-off state of the corresponding mobile phone equipment on the IMEI blacklist in real time through a signaling acquisition and analysis system;
s4: when the data acquisition device detects that the corresponding mobile phone equipment on the IMEI blacklist is started, the data acquisition device acquires signaling data of the mobile phone equipment in real time and acquires a mobile phone number used when the mobile phone equipment is started in the signaling data;
s5: and sending a prompt short message and a flash message to the mobile phone number used when the mobile phone equipment is started by using the limiting device to prompt that the mobile phone equipment is suspected to be stolen and robbed.
Further, step S4 further includes: when the data acquisition device detects that the corresponding mobile phone equipment on the IMEI blacklist is powered off, the data acquisition device keeps signaling monitoring on the mobile phone equipment.
The invention has the beneficial effects that: by adopting a big data processing method to monitor and analyze the IMEI (international mobile equipment identity) of the stolen phone, the use value of the stolen phone is reduced, the normal market operation environment of a second-hand mobile phone merchant is improved, the safety of the mobile phone of a mobile phone user is improved, the risk of stealing and robbing the mobile phone is reduced, and the normal use of the user is not influenced.
1. The alarm user inputs alarm information, the system translates the alarm telephone number input by the alarm person into the IMEI code of the mobile phone in case, and the limit device is used for limiting the equipment to use the Internet application;
2. through signaling monitoring on the IMEI blacklist, when a mobile phone corresponding to the IMEI number is started, the mobile phone number is obtained through signaling analysis, and a robbed and stolen reminding short message/flash message is sent to the mobile phone number to remind a mobile phone user that the mobile phone is suspected to be stolen and robbed;
3. by inputting or scanning the IMEI code of the inquired mobile phone and comparing the IMEI code with the IMEI blacklist, the inquiring user is reminded whether the inquired mobile phone is suspected to be stolen, robbed and cheated, and the stolen, robbed and cheated mobile phone is prevented from being sold and purchased;
4. when the mobile phone of the user is not a stolen, robbed and deceived mobile phone, but receives a reminding short message of the stolen, robbed and deceived mobile phone, the mobile phone can complain through a complaining function, and the user inputs an IMEI number of the mobile phone and related certification materials (invoices, mobile phone boxes and the like) to complain; and manually judging and confirming the complaint list, and removing the reminding short message and the use limit after confirming that the mobile phone is not stolen, robbed and cheated.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1 is a schematic diagram of a system for restricting handset usage based on IMEI according to the present invention;
fig. 2 is a schematic diagram of an alarm receiving device in a system for restricting mobile phone usage based on IMEI according to the present invention;
FIG. 3 is a schematic diagram of a query device in a system for restricting mobile phone usage based on IMEI according to the present invention;
FIG. 4 is a schematic structural diagram of a complaint receiving device in a system for restricting the use of a mobile phone based on an IMEI according to the invention;
FIG. 5 is a schematic structural diagram of a manual auditing device in a system for restricting mobile phone usage based on IMEI according to the present invention;
FIG. 6 is a schematic structural diagram of a big data analysis device in a system for limiting the use of a mobile phone based on an IMEI according to the present invention;
FIG. 7 is a schematic diagram of a usage restriction apparatus in a system for restricting the usage of a mobile phone based on an IMEI according to the present invention;
FIG. 8 is a schematic diagram of a data acquisition device in a system for restricting mobile phone usage based on IMEI according to the present invention;
fig. 9 is a flow chart of a method for restricting usage of a handset based on an IMEI according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments that can be derived by one of ordinary skill in the art from the embodiments given herein are intended to be within the scope of the present invention.
As shown in fig. 1 to 9, a system for limiting usage of a mobile phone based on an IMEI according to an embodiment of the present invention includes a big data analysis device 1, where the big data analysis device 1 is respectively connected with:
the alarm receiving device 2 is used for interacting with an alarm user, carrying out identity verification on the alarm user, receiving alarm information input by the alarm user, verifying the validity of the alarm information, and simultaneously sending an alarm user identity verification result and the alarm information to the big data analysis device 1;
the inquiry device 3 is used for receiving the IMEI inquiry number provided by the inquiry user, comparing the IMEI inquiry number with the IMEI blacklist in the big data analysis device 1 and feeding back the comparison result to the inquiry user;
the complaint receiving device 4 is used for carrying out identity verification on a complaint user, receiving complaint information filled by the complaint user, verifying the legality of the complaint information and simultaneously sending the complaint user identity verification result and the complaint information to the big data analysis device 1;
the manual auditing device 5 is used for interacting with auditors, displaying the complaint information to the auditors, receiving a complaint success list input by the auditors, and sending the complaint success list to the big data analysis device 1;
the use limiting device 6 is respectively connected with the short message gateway/short message center and an internet manufacturer and is used for sending robbed and stolen reminding short messages to the corresponding equipment on the IMEI blacklist and limiting the corresponding equipment on the IMEI blacklist to use internet application;
the data acquisition device 7 is respectively connected with the signaling acquisition and analysis system and the mobile phone manufacturing enterprise, and is used for acquiring the on-off state and the signaling data of the equipment corresponding to the mobile phone number in the alarm information in real time, acquiring the IMEI number, the position information and the equipment code information corresponding to the mobile phone number in the alarm information in the signaling data and pushing the IMEI number, the position information and the equipment code information to the big data analysis device 1, meanwhile, inquiring other equipment identification codes corresponding to the IMEI number from the mobile phone manufacturing enterprise, and feeding the inquiry result back to the big data analysis device 1; the other equipment identification codes comprise a second IMEI number, a Bluetooth address code, a wifi address code and a product serial number;
the big data analysis device 1 is used for information interaction, analysis and storage with the alarm receiving device 2, the query device 3, the complaint receiving device 4, the manual auditing device 5, the use limiting device 6 and the data acquisition device 7; comprises the steps of (a) preparing a mixture of a plurality of raw materials,
controlling a data acquisition device 7 to acquire signaling data and an IMEI number corresponding to a mobile phone number in alarm information according to the alarm information transmitted by the alarm receiving device 2;
generating an IMEI blacklist according to the IMEI number corresponding to the mobile phone number in the alarm information transmitted by the data acquisition device 7 and the IMEI inquiry number transmitted by the inquiry device 3;
controlling the use limiting device 6 to send a robbed and stolen reminding short message to the corresponding equipment on the IMEI blacklist according to the IMEI blacklist and the signaling data transmitted by the data acquisition device 7, and limiting the corresponding equipment on the IMEI blacklist to use the Internet application;
and controlling the manual auditing device 5 to audit the complaint information according to the IMEI complaint number in the complaint information transmitted by the complaint receiving device 4, and controlling the use limiting device 6 to remove the limitation on the telephone number in the complaint success list according to the complaint success list transmitted by the manual auditing device 5.
In this embodiment, as shown in fig. 6, the big data analysis device 1 includes a big data analysis device interface unit, a calculation unit and a storage unit respectively connected to the big data analysis device interface unit, and a service database and a history information database respectively connected to the storage unit;
the big data analysis device interface unit is respectively connected with the alarm receiving device 2, the query device 3, the complaint receiving device 4, the manual auditing device 5, the use limiting device 6 and the data acquisition device 7;
the computing unit is in communication connection with the storage unit;
big data analysis device interface unit: the charge calculation unit and the storage unit interact with the alarm receiving device, the query device, the complaint receiving device, the manual auditing device, the use limiting device and the data acquisition device, provide a uniform data access interface for each device and provide an analysis calculation interface for the alarm, query and complaint data acquisition device; completing the service function;
a calculation unit: the system is responsible for interacting with the interface unit of the big data analysis device and providing real-time calculation and mining calculation capacity; interacting with the storage unit, acquiring data required by the calculation of the calculation unit and storing the calculation result of the calculation unit;
a storage unit: the system is responsible for interacting with an interface unit of a big data analysis device, providing data storage capacity for each device, interacting with a historical information database and a service database, and performing read-write operation on historical information data and service data; interacting with the computing unit, providing data required by computing to the computing unit, and receiving and storing the computing result fed back by the computing unit;
a service database: the system is responsible for storing static configuration data of the service, an IMEI number blacklist, a complaint passing list, logs of each device, a statistical report and the like, interacting with the storage unit and providing the read-write capability of the stored service data;
historical information database: the device is responsible for storing historical alarm, inquiry and complaint data, interacting with the storage unit and reading and storing the historical alarm, inquiry and complaint data.
In this embodiment, the alarm receiving device 2 includes:
a first identity verification unit: the system is used for performing living body verification, face recognition and identity card comparison on an alarm user, determining the real alarm identity of the alarm person, pushing the identity verification result of the alarm user to the big data analysis device 1, and entering alarm information after the identity verification of the alarm user is passed;
an alarm information processing unit: the system is used for receiving alarm information input by an alarm user, verifying the legality of each field of the alarm information and pushing the alarm information to the big data analysis device 1;
wherein, the alarm information includes but not limited to mobile phone number, position of case, time of case.
In this embodiment, the query device 3 includes:
IMEI number identification unit: the system is used for scanning and inquiring the picture provided by the user and provided with the IMEI inquiry number and identifying the IMEI inquiry number;
an IMEI number comparison unit: and the IMEI number identification unit is connected with the IMEI number identification unit and used for receiving the IMEI inquiry number input by the inquiry user or provided by the IMEI number identification unit, comparing the IMEI inquiry number with the IMEI blacklist in the big data analysis device 1 and feeding back the comparison result to the inquiry user.
In the present embodiment, the complaint receiving device 4 includes:
a second authentication unit: the system is used for performing living body verification, face recognition and identity card comparison on a complaint user, determining the real identity of the complaint user, pushing the identification verification result of the complaint user to the big data analysis device 1, and entering complaint information input after the complaint user passes the identification verification;
a complaint information processing unit: the system is used for receiving the complaint information input by the complaint user, verifying the legality of each field of the complaint information and pushing the complaint information to the big data analysis device 1.
In this embodiment, the manual review device 5 includes:
and (3) manually auditing WEB units: the interface unit is connected with the big data analysis device and used for displaying the complaint information to the auditor through a WEB webpage, receiving a complaint success list input by the auditor and sending the complaint success list to the big data analysis device 1;
the complaint information includes, but is not limited to, telephone number, IMEI number, name, complaint proof material.
In this embodiment, as shown in fig. 7, the usage restriction device 6 includes a restriction policy execution unit connected to the big data analysis device 1 through a big data analysis device interface unit, an early warning short message/flash message interface unit and an internet application restriction interface unit, which are respectively connected to the restriction policy execution unit; the early warning short message/flash interface unit is connected with a short message gateway/short message center, and the internet application limiting interface unit is connected with an internet manufacturer;
big data analysis device interface unit: and the system is responsible for limiting data interaction between the policy execution unit and the big data analysis device and completing the operation of limiting the use of the equipment in the IMEI blacklist.
A restriction policy execution unit: the IMEI server is responsible for interacting with the interface unit of the big data analysis device and receiving an IMEI blacklist and a use restriction strategy which are pushed by the big data analysis device; interacting with the early warning short message/flash interface unit, and sending the stolen and robbed mobile phone reminding short message/flash; and interacting with the Internet application limiting interface unit, and pushing blacklist IMEI numbers used by the limiting application to an Internet manufacturer.
The early warning short message/flash interface unit: and the mobile phone is responsible for limiting the interaction between the strategy execution unit and the short message gateway/short message center and sending the stolen and robbed mobile phone prompt short message/flash message generated by the strategy execution unit to the mobile phone terminal.
Internet application restriction interface unit: and the server is responsible for limiting the interaction between the policy execution unit and the Internet manufacturer, and pushing the blacklist IMEI number received by the policy execution unit to the Internet manufacturer for application use limitation.
In this embodiment, as shown in fig. 8, the data acquisition device 7 includes an analysis processing unit connected to the big data analysis device 1 through a big data analysis device interface unit, and an analysis policy configuration unit, a signaling acquisition interface unit and a mobile phone manufacturing enterprise interface unit respectively connected to the analysis processing unit, where the signaling acquisition interface unit is connected to the signaling acquisition and analysis system, and the mobile phone manufacturing enterprise interface unit is connected to the mobile phone manufacturing enterprise;
an analysis policy configuration unit: and the analysis strategy is responsible for generating and updating the signaling data and is provided for the data analysis processing unit to use through interaction with the analysis processing unit.
An analysis processing unit: the device is responsible for processing the signaling data, the device code data and the analysis strategy and then pushing the signaling data, the device code data and the analysis strategy to a big data analysis device through an interface unit of the big data analysis device for analysis and processing; interactively acquiring real-time call signaling data through a signaling acquisition interface unit; pushing an analysis strategy algorithm and data to a big data analysis device through a big data analysis device interface unit; and interacting with the analysis strategy configuration unit to acquire a signaling data analysis strategy of the blacklist IMEI number.
A signaling acquisition interface unit: the system is responsible for interacting with the signaling acquisition and analysis system, acquiring and translating the related signaling data of the signaling acquisition and analysis system, and providing the translated data to the analysis processing unit.
Interface unit of mobile phone manufacturing enterprise: the mobile phone is responsible for interacting with mobile phone production enterprises, inquiring other equipment numbers on the same equipment according to one IMEI number, and providing the inquired equipment numbers to the analysis processing unit.
Big data analysis device interface unit: the analysis processing unit is responsible for interaction with the big data analysis device and provides real-time data and analysis strategies for the big data analysis device.
A method for restricting usage of a mobile phone based on IMEI, as shown in fig. 9, using the system for restricting usage of a mobile phone based on IMEI, comprising the steps of:
s1: after the mobile phone of the alarm user is stolen and robbed, the alarm user alarms on line through the alarm receiving device 2 and inputs alarm information;
s2: the big data analysis device 1 receives and stores the alarm information pushed by the alarm receiving device 2, inquires the IMEI number corresponding to the mobile phone number in the alarm information through the data acquisition device 7, and adds the IMEI number corresponding to the mobile phone number in the alarm information into an IMEI blacklist;
s3: the IMEI blacklist is pushed to an Internet manufacturer by using the limiting device 6, and the Internet manufacturer limits the use of Internet application for the user on the IMEI blacklist; meanwhile, the data acquisition device 7 detects the on-off state of the corresponding mobile phone equipment on the IMEI blacklist in real time through a signaling acquisition and analysis system;
s4: when the data acquisition device 7 detects that the corresponding mobile phone equipment on the IMEI blacklist is started, the data acquisition device 7 acquires signaling data of the mobile phone equipment in real time and acquires a mobile phone number used when the mobile phone equipment is started in the signaling data;
s5: using a limiting device to send a prompt short message and a flash message to a mobile phone number used when the mobile phone equipment is started, and prompting that the mobile phone equipment is suspected to be stolen, robbed and cheated;
in this embodiment, step S4 further includes: when the data acquisition device 7 detects that the corresponding mobile phone equipment on the IMEI blacklist is powered off, the data acquisition device 7 keeps signaling monitoring on the mobile phone equipment;
wherein, step S3 further includes: the inquiry device is used for reminding the inquiry user whether the inquired mobile phone is suspected to be stolen or robbed by inquiring the IMEI code input or scanned by the user and comparing the IMEI code with the IMEI blacklist, so that the inquiry device prevents the stolen or robbed mobile phone from selling and purchasing.
Therefore, by means of the technical scheme of the invention, the use value of the stolen mobile phone is reduced, the normal market operation environment of a second-hand mobile phone merchant is improved, the safety of the mobile phone of a mobile phone user is improved, the risk of stealing and robbing the mobile phone is reduced, and the normal use of the user is not influenced by monitoring and analyzing the IMEI international mobile equipment identification code of the stolen mobile phone by adopting a big data processing method.
1. The alarm user inputs alarm information, the system translates the alarm telephone number input by the alarm person into the IMEI code of the mobile phone in case, and the limit device is used for limiting the equipment to use the Internet application;
2. through signaling monitoring on the IMEI blacklist, when a mobile phone corresponding to the IMEI number is started, the mobile phone number is obtained through signaling analysis, and a robbed and stolen reminding short message/flash message is sent to the mobile phone number to remind a mobile phone user that the mobile phone is suspected to be stolen and robbed;
3. by inputting or scanning the IMEI code of the inquired mobile phone and comparing the IMEI code with the IMEI blacklist, the inquiring user is reminded whether the inquired mobile phone is suspected to be stolen, robbed and cheated, and the stolen, robbed and cheated mobile phone is prevented from being sold and purchased;
4. when the mobile phone of the user is not a stolen, robbed and deceived mobile phone, but receives a reminding short message of the stolen, robbed and deceived mobile phone, the mobile phone can complain through a complaint function, and the user inputs an IMEI number of the mobile phone, a relevant certification material invoice, a mobile phone box and the like to complain; and manually judging and confirming the complaint list, and removing the reminding short message and the use limit after confirming that the mobile phone is not stolen, robbed and cheated.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (10)

1. A system for limiting mobile phone use based on IMEI is characterized by comprising a big data analysis device (1), wherein the big data analysis device (1) is respectively connected with:
the alarm receiving device (2) is used for interacting with an alarm user, carrying out identity verification on the alarm user, receiving alarm information input by the alarm user, verifying the validity of the alarm information, and simultaneously sending an alarm user identity verification result and the alarm information to the big data analysis device (1);
the query device (3) is used for receiving the IMEI query number provided by the query user, comparing the IMEI query number with the IMEI blacklist in the big data analysis device (1), and feeding back the comparison result to the query user;
the complaint receiving device (4) is used for carrying out identity verification on a complaint user, receiving complaint information filled by the complaint user, verifying the legality of the complaint information and simultaneously sending the complaint user identity verification result and the complaint information to the big data analysis device (1);
the manual auditing device (5) is used for interacting with an auditing staff, displaying the complaint information to the auditing staff, receiving a complaint success list input by the auditing staff and sending the complaint success list to the big data analysis device (1);
the use limiting device (6) is respectively connected with the short message gateway/short message center and an internet manufacturer and is used for sending the robbed and stolen reminding short message to the corresponding equipment on the IMEI blacklist and limiting the corresponding equipment on the IMEI blacklist to use internet application;
the data acquisition device (7) is respectively connected with the signaling acquisition and analysis system and the mobile phone production enterprise and is used for acquiring the on-off state and the signaling data of equipment corresponding to the mobile phone number in the alarm information in real time, acquiring the IMEI number, the position information and the equipment code information corresponding to the mobile phone number in the alarm information in the signaling data and pushing the IMEI number, the position information and the equipment code information to the big data analysis device (1), meanwhile, inquiring other equipment identification codes corresponding to the IMEI number from the mobile phone production enterprise and feeding the inquiry result back to the big data analysis device (1); the other equipment identification codes comprise a second IMEI number, a Bluetooth address code, a wifi address code and a product serial number;
the big data analysis device (1) is used for carrying out information interaction, analysis and storage with the alarm receiving device (2), the query device (3), the complaint receiving device (4), the manual auditing device (5), the use limiting device (6) and the data acquisition device (7); comprises the steps of (a) preparing a mixture of a plurality of raw materials,
controlling a data acquisition device (7) to acquire signaling data and an IMEI number corresponding to a mobile phone number in alarm information according to the alarm information transmitted by the alarm receiving device (2);
generating an IMEI blacklist according to the IMEI number corresponding to the mobile phone number in the alarm information transmitted by the data acquisition device (7) and the IMEI inquiry number transmitted by the inquiry device (3);
controlling the use limiting device (6) to send a robbed and stolen reminding short message to the corresponding equipment on the IMEI blacklist according to the IMEI blacklist and signaling data transmitted by the data acquisition device (7), and limiting the corresponding equipment on the IMEI blacklist to use Internet application;
the manual auditing device (5) is controlled to audit the complaint information according to the IMEI complaint number in the complaint information transmitted by the complaint receiving device (4), and the use limiting device (6) is controlled to remove the limitation on the telephone number in the complaint success list according to the complaint success list transmitted by the manual auditing device (5).
2. The system for restricting the usage of a mobile phone based on IMEI according to claim 1, wherein said big data analysis device (1) comprises a big data analysis device interface unit, a calculation unit and a storage unit respectively connected with the big data analysis device interface unit, and a service database and a history information database respectively connected with the storage unit;
the big data analysis device interface unit is respectively connected with an alarm receiving device (2), an inquiry device (3), a complaint receiving device (4), a manual auditing device (5), a use limiting device (6) and a data acquisition device (7);
the computing unit is in communication connection with the storage unit.
3. The system according to claim 2, wherein said alarm receiving means (2) comprises:
a first identity verification unit: the system is used for performing living body verification, face recognition and identity card comparison on an alarm user, determining the real alarm identity of the alarm person, pushing the identity verification result of the alarm user to a big data analysis device (1), and entering alarm information after the identity verification of the alarm user is passed;
an alarm information processing unit: the system is used for receiving alarm information input by an alarm user, verifying the legality of each field of the alarm information and pushing the alarm information to the big data analysis device (1);
wherein, the alarm information includes but not limited to mobile phone number, position of case, time of case.
4. The system according to claim 3, wherein said querying means (3) comprises:
IMEI number identification unit: the system is used for scanning and inquiring the picture provided by the user and provided with the IMEI inquiry number and identifying the IMEI inquiry number;
an IMEI number comparison unit: and the IMEI number recognition unit is connected with the IMEI number recognition unit and used for receiving the IMEI inquiry number input by an inquiry user or provided by the IMEI number recognition unit, comparing the IMEI inquiry number with an IMEI blacklist in the big data analysis device (1), and feeding back the comparison result to the inquiry user.
5. The system according to claim 4, wherein said complaint receiving means (4) comprises:
a second authentication unit: the system is used for performing living body verification, face recognition and identity card comparison on a complaint user, determining the real identity of the complaint user, pushing the identification verification result of the complaint user to a big data analysis device (1), and entering complaint information input after the complaint user passes the identification verification;
a complaint information processing unit: the system is used for receiving the complaint information input by the complaint user, verifying the legality of each field of the complaint information and pushing the complaint information to the big data analysis device (1).
6. The system according to claim 5, wherein the manual auditing means (5) comprises:
and (3) manually auditing WEB units: the interface unit is connected with the big data analysis device and used for displaying the complaint information to the auditor through a WEB webpage, receiving a complaint success list input by the auditor and sending the complaint success list to the big data analysis device (1);
the complaint information includes, but is not limited to, telephone number, IMEI number, name, complaint proof material.
7. The IMEI-based mobile phone usage restriction system according to claim 6, wherein said usage restriction device (6) comprises a restriction policy enforcement unit connected to the big data analysis device (1) through the big data analysis device interface unit, an early warning short message/flash interface unit and an Internet application restriction interface unit respectively connected to the restriction policy enforcement unit; the early warning short message/flash interface unit is connected with a short message gateway/short message center, and the internet application limiting interface unit is connected with an internet manufacturer.
8. The IMEI-based mobile phone usage restriction system according to claim 7, wherein said data collection device (7) comprises an analysis processing unit connected to the big data analysis device (1) through a big data analysis device interface unit, and an analysis policy configuration unit, a signaling collection interface unit and a mobile phone manufacturing enterprise interface unit respectively connected to the analysis processing unit, said signaling collection interface unit is connected to the signaling collection and analysis system, and said mobile phone manufacturing enterprise interface unit is connected to the mobile phone manufacturing enterprise.
9. A method for restricting usage of a mobile phone based on IMEI, characterized in that, using the system for restricting usage of a mobile phone based on IMEI according to claim 1, comprises the following steps:
s1: after the mobile phone of the alarm user is stolen and robbed, the alarm user alarms on line through the alarm receiving device (2) and inputs alarm information;
s2: the big data analysis device (1) receives and stores the alarm information pushed by the alarm receiving device (2), inquires an IMEI number corresponding to the mobile phone number in the alarm information through the data acquisition device (7), and adds the IMEI number corresponding to the mobile phone number in the alarm information into an IMEI blacklist;
s3: the IMEI blacklist is pushed to an Internet manufacturer by using a limiting device (6), and the Internet manufacturer limits the use of Internet application for users on the IMEI blacklist; meanwhile, the data acquisition device (7) detects the on-off state of the corresponding mobile phone equipment on the IMEI blacklist in real time through a signaling acquisition and analysis system;
s4: when the data acquisition device (7) detects that the mobile phone equipment corresponding to the IMEI blacklist is started, the data acquisition device (7) acquires signaling data of the mobile phone equipment in real time and acquires a mobile phone number used when the mobile phone equipment is started in the signaling data;
s5: and sending a prompt short message and a flash message to the mobile phone number used when the mobile phone equipment is started by using the limiting device to prompt that the mobile phone equipment is suspected to be stolen and robbed.
10. The method according to claim 9, wherein the step S4 further comprises: when the data acquisition device (7) detects that the mobile phone equipment corresponding to the IMEI blacklist is turned off, the data acquisition device (7) keeps signaling monitoring on the mobile phone equipment.
CN201811021049.XA 2018-09-03 2018-09-03 System and method for limiting mobile phone use based on IMEI Active CN109005543B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811021049.XA CN109005543B (en) 2018-09-03 2018-09-03 System and method for limiting mobile phone use based on IMEI

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811021049.XA CN109005543B (en) 2018-09-03 2018-09-03 System and method for limiting mobile phone use based on IMEI

Publications (2)

Publication Number Publication Date
CN109005543A CN109005543A (en) 2018-12-14
CN109005543B true CN109005543B (en) 2021-06-01

Family

ID=64590934

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811021049.XA Active CN109005543B (en) 2018-09-03 2018-09-03 System and method for limiting mobile phone use based on IMEI

Country Status (1)

Country Link
CN (1) CN109005543B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851891B (en) * 2019-11-08 2020-10-09 北京金茂绿建科技有限公司 Method, device, system, equipment and medium for guaranteeing safety after terminal loss

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1620165A (en) * 2003-11-21 2005-05-25 华为技术有限公司 Identification method of mobile terminal user legalness
CN101047920A (en) * 2007-04-12 2007-10-03 华为技术有限公司 Method, system for prevent mobile phone stolen and anti-theft mobile and network side entity
CN101184303A (en) * 2007-12-18 2008-05-21 深圳华为通信技术有限公司 Anti-theft method and apparatus for mobile terminal
CN101552988A (en) * 2009-04-28 2009-10-07 中兴通讯股份有限公司 Terminal protecting methdo and system
CN101904188A (en) * 2007-12-18 2010-12-01 株式会社Kt Method and system for preventing use of stolen terminal through forced location re-registration
CN102780989A (en) * 2012-07-06 2012-11-14 北京小米科技有限责任公司 Method and system for preventing loss of mobile terminal
CN103765938A (en) * 2011-09-06 2014-04-30 阿尔卡特朗讯公司 Mobile terminal theft detection system
CN104243727A (en) * 2014-10-15 2014-12-24 上海欣方智能系统有限公司 System and method for performing big data analysis confirmation and interception on phone scams
CN105611046A (en) * 2015-12-17 2016-05-25 福建六壬网安股份有限公司 Strategy customization-based Android mobile phone security protection system and protection method thereof
CN107680230A (en) * 2017-10-31 2018-02-09 华慧视科技(天津)有限公司 The testimony of a witness based on recognition of face veritifies and the clearance system of blacklist review
CN107734176A (en) * 2017-10-25 2018-02-23 深圳市金立通信设备有限公司 Loss guard method, terminal and the computer-readable recording medium of mobile terminal

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9113336B2 (en) * 2013-02-19 2015-08-18 Luis NIEVES Software application for intercepting phone call and text messages from specific contacts
US9572036B2 (en) * 2014-11-20 2017-02-14 At&T Intellectual Property I, L.P. Detection and blocking of cloned mobile devices

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1620165A (en) * 2003-11-21 2005-05-25 华为技术有限公司 Identification method of mobile terminal user legalness
CN101047920A (en) * 2007-04-12 2007-10-03 华为技术有限公司 Method, system for prevent mobile phone stolen and anti-theft mobile and network side entity
CN101184303A (en) * 2007-12-18 2008-05-21 深圳华为通信技术有限公司 Anti-theft method and apparatus for mobile terminal
CN101904188A (en) * 2007-12-18 2010-12-01 株式会社Kt Method and system for preventing use of stolen terminal through forced location re-registration
CN101552988A (en) * 2009-04-28 2009-10-07 中兴通讯股份有限公司 Terminal protecting methdo and system
CN103765938A (en) * 2011-09-06 2014-04-30 阿尔卡特朗讯公司 Mobile terminal theft detection system
CN102780989A (en) * 2012-07-06 2012-11-14 北京小米科技有限责任公司 Method and system for preventing loss of mobile terminal
CN104243727A (en) * 2014-10-15 2014-12-24 上海欣方智能系统有限公司 System and method for performing big data analysis confirmation and interception on phone scams
CN104243727B (en) * 2014-10-15 2017-01-25 上海欣方智能系统有限公司 System and method for performing big data analysis confirmation and interception on phone scams
CN105611046A (en) * 2015-12-17 2016-05-25 福建六壬网安股份有限公司 Strategy customization-based Android mobile phone security protection system and protection method thereof
CN107734176A (en) * 2017-10-25 2018-02-23 深圳市金立通信设备有限公司 Loss guard method, terminal and the computer-readable recording medium of mobile terminal
CN107680230A (en) * 2017-10-31 2018-02-09 华慧视科技(天津)有限公司 The testimony of a witness based on recognition of face veritifies and the clearance system of blacklist review

Also Published As

Publication number Publication date
CN109005543A (en) 2018-12-14

Similar Documents

Publication Publication Date Title
US9544431B2 (en) System and method for intelligent call blocking with block mode
US20240121256A1 (en) Method and system for preventing illicit use of a telephony platform
CN107566358B (en) Risk early warning prompting method, device, medium and equipment
CN110517097B (en) Method, device, equipment and storage medium for identifying abnormal users
CN102802133B (en) Junk information identification method, device and system
CN107819747B (en) Telecommunication fraud association analysis system and method based on communication event sequence
CN105246058B (en) The verification method and short message server of short message
CN107798541B (en) Monitoring method and system for online service
CN110636505A (en) Method and system for protecting account security
CN113923669B (en) Multi-source cross-platform fusion anti-fraud early warning method, device, equipment and medium
CN110598383B (en) Method and device for removing account authority limit
CN103581441A (en) Mobile terminal tracking anti-theft system and method
CN110611929A (en) Abnormal user identification method and device
CN111062654B (en) Delivery piece taking method
CN110337107A (en) A kind of fraud text message intelligent monitoring alarm device
CN111882013A (en) Equipment asset monitoring method and device, computer equipment and storage medium
CN107705126B (en) Transaction instruction processing method and device
KR102200253B1 (en) System and method for detecting fraud usage of message
CN109005543B (en) System and method for limiting mobile phone use based on IMEI
CN101526979B (en) Intelligent alarm, inquiry and monitor terminal
CN106936807A (en) A kind of recognition methods of malicious operation and device
TWI507009B (en) System and method of smartphone for preventing fraud
CN109104429B (en) Detection method for phishing information
CN110868709A (en) Method and system for preventing harassment and enabling normal communication
CN108235310A (en) Method, server and the system of identification camouflage telephone number

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant