CN110290521A - Geographical location tamper Detection method, apparatus, medium and electronic equipment - Google Patents

Geographical location tamper Detection method, apparatus, medium and electronic equipment Download PDF

Info

Publication number
CN110290521A
CN110290521A CN201910629668.5A CN201910629668A CN110290521A CN 110290521 A CN110290521 A CN 110290521A CN 201910629668 A CN201910629668 A CN 201910629668A CN 110290521 A CN110290521 A CN 110290521A
Authority
CN
China
Prior art keywords
information
communication network
terminal
location
base station
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910629668.5A
Other languages
Chinese (zh)
Inventor
李国琛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tong Shield Holdings Ltd
Tongdun Holdings Co Ltd
Original Assignee
Tong Shield Holdings Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tong Shield Holdings Ltd filed Critical Tong Shield Holdings Ltd
Priority to CN201910629668.5A priority Critical patent/CN110290521A/en
Publication of CN110290521A publication Critical patent/CN110290521A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/104Location integrity, e.g. secure geotagging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/63Location-dependent; Proximity-dependent
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the present disclosure provides a kind of geographical location tamper Detection method, apparatus, computer readable storage medium and electronic equipment, is related to field of computer technology, which comprises obtain the communication network information and location information of terminal;According to the communication network information obtain the terminal locating for communication network location information;Determine whether the geographical location of the terminal is tampered with the location information according to the positional information.In technical solution provided by the present disclosure, communications network location information is obtained by the communication network information of acquisition, judge whether the geographical location of terminal is tampered in conjunction with the location information of acquisition, simply can accurately judge whether the geographical location of terminal is tampered, improve the security performance of internet.

Description

Geographical location tamper Detection method, apparatus, medium and electronic equipment
Technical field
This disclosure relates to field of computer technology, in particular to a kind of geographical location tamper Detection method, apparatus, Computer readable storage medium and electronic equipment.
Background technique
With the fast development of the communication technology and popularizing for internet, the terminal applies such as mobile phone are in more and more occasions. Some bad users distort the geographical location information of mobile phone often through some mobile phone cheating tools, certain specific to realize Economic interests have severely compromised the Credit Information System of mobile Internet.
In the related technology, existing geographical location cheating recognition methods is mainly based upon detection GPS (Global Positioning System, global positioning system) mapping function whether be modified to detection geographical location whether be tampered.But It is that some black productions are very handy in terms of attacking the mapping function, cover, existing geographical location cheating recognition methods It is more and more passive.
Specifically, when by detection mapping function come identification of geographic location cheating, need to constantly search for corresponding cheating The more new content of tool and the content for cracking cheating tool correspond to realize, spend a large amount of man power and material.Occurring After new location technology, technical staff needs to spend 1 to 2 month to crack its realization principle, then spends 2 to 3 months Time studies countermeasure, lacks timeliness and flexibility, time cost are higher.
In addition, cheating tool wide variety, is not necessarily all to distort geographical location by mapping function realization to practise fraud.This Sample just can not be by detecting whether mapping function is modified to carry out geographical location cheating identification.
How simply and easily identification of geographic location is distorted the technical issues of being current urgent need to resolve.
It should be noted that information is only used for reinforcing the reason to the background of the disclosure disclosed in above-mentioned background technology part Solution, therefore may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
The embodiment of the present disclosure is designed to provide a kind of geographical location tamper Detection method, apparatus, computer-readable deposits Storage media and electronic equipment, and then overcoming at least to a certain extent can not simply and easily asking of distorting of identification of geographic location Topic.
Other characteristics and advantages of the disclosure will be apparent from by the following detailed description, or partially by the disclosure Practice and acquistion.
According to the first aspect of the embodiments of the present disclosure, a kind of geographical location tamper Detection method is provided, comprising: obtain eventually The communication network information and location information at end;According to the communication network information obtain the terminal locating for communication network position Information;Determine whether the geographical location of the terminal is tampered with the location information according to the positional information.
In some embodiments, according to the communication network information obtain the terminal locating for communication network position letter Breath, comprising: according to the communication network information determine the terminal locating for communication network be mobile data communication network;Obtain institute State the corresponding base station information of mobile data communication network locating for terminal;The location information is determined according to the base station information.
In some embodiments, base station includes first base station and the second base station, described to determine institute's rheme according to base station information Confidence breath includes: to determine the location information according to the overlapping region of the first base station and second base station.
In some embodiments, according to the communication network information obtain the terminal locating for communication network position letter Breath, comprising: according to the communication network information determine the terminal locating for communication network be wireless near field communication network;It obtains The list information of the wireless near field communication of the terminal;The location information is determined according to the list information.
In some embodiments, the location information is determined according to the list information, comprising: according to the list information Obtain the latitude and longitude coordinates where the wireless near field communication network in list;It is determined according to the latitude and longitude coordinates described in covering The smallest circle of latitude and longitude coordinates;The location information is determined according to the smallest circle.
In some embodiments, according to the communication network information obtain the terminal locating for communication network position letter Breath, further includes: obtain the corresponding base station information of mobile data communication network locating for the terminal;According to the list information and institute It states base station information and determines the location information.
In some embodiments, described that the location information is determined according to the list information and the base station information, packet It includes: obtaining the latitude and longitude coordinates where the wireless near field communication network in list according to the list information;According to the warp Latitude coordinate determines the smallest circle for covering the latitude and longitude coordinates;Institute's rheme is determined according to the base station information and the smallest circle Confidence breath.
According to the second aspect of an embodiment of the present disclosure, a kind of geographical location tamper Detection device is provided, comprising: terminal letter Acquiring unit is ceased, for obtaining the communication network information and location information of terminal;Location information acquiring unit, for according to Communication network information obtains the location information of communication network locating for the terminal;Determination unit, for according to the positional information Determine whether the geographical location of the terminal is tampered with the location information.
According to the third aspect of an embodiment of the present disclosure, a kind of computer readable storage medium is provided, meter is stored thereon with Calculation machine program realizes that knowledge is distorted in the geographical location as described in first aspect in above-described embodiment when described program is executed by processor Other method.
According to a fourth aspect of embodiments of the present disclosure, a kind of electronic equipment is provided, comprising: one or more processors; Storage device, for storing one or more programs, when one or more of programs are held by one or more of processors When row, so that one or more of processors realize the geographical location tamper Detection as described in first aspect in above-described embodiment Method.
The technical solution that the embodiment of the present disclosure provides can include the following benefits:
In the technical solution provided by some embodiments of the present disclosure, communicated by the communication network information of acquisition Network location information judges whether the geographical location of terminal is tampered in conjunction with the location information of acquisition, can simply accurately Judge whether the geographical location of terminal is tampered, improves the security performance of internet.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.It should be evident that the accompanying drawings in the following description is only the disclosure Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.In the accompanying drawings:
Fig. 1 diagrammatically illustrates the flow chart of the geographical location tamper Detection method according to a kind of embodiment of the disclosure;
Fig. 2 diagrammatically illustrates the flow chart of the geographical location tamper Detection method according to disclosure another kind embodiment;
Fig. 3 diagrammatically illustrates the block diagram of the geographical location tamper Detection device according to a kind of embodiment of the disclosure;
Fig. 4 is diagrammatically illustrated according to a kind of block diagram of the location information acquiring unit of embodiment of the disclosure;
Fig. 5 diagrammatically illustrates the structure for being suitable for the computer system for the electronic equipment for being used to realize the embodiment of the present disclosure Figure.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes Formula is implemented, and is not understood as limited to example set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will more Fully and completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.
In addition, described feature, structure or characteristic can be incorporated in one or more implementations in any suitable manner In example.In the following description, many details are provided to provide and fully understand to embodiment of the disclosure.However, It will be appreciated by persons skilled in the art that can with technical solution of the disclosure without one or more in specific detail, Or it can be using other methods, constituent element, device, step etc..In other cases, it is not shown in detail or describes known side Method, device, realization or operation are to avoid fuzzy all aspects of this disclosure.
Block diagram shown in the drawings is only functional entity, not necessarily must be corresponding with physically separate entity. I.e., it is possible to realize these functional entitys using software form, or realized in one or more hardware modules or integrated circuit These functional entitys, or these functional entitys are realized in heterogeneous networks and/or processor device and/or microcontroller device.
Flow chart shown in the drawings is merely illustrative, it is not necessary to including all content and operation/step, It is not required to execute by described sequence.For example, some operation/steps can also decompose, and some operation/steps can close And or part merge, therefore the sequence actually executed is possible to change according to the actual situation.
In the related art, general to be determined using what tracking was attacked when whether the geographical location of identification terminal is tampered Bit function, and the technological means such as fight in mapping function attacking and defending.
These technological means need to spend a large amount of manpower and physics, and time cost is higher.Occurring not by fixed , can not whether geographical location be tampered when bit function carries out geographical location the case where distorting.
To solve the above problems, the embodiment of the present disclosure provides a kind of geographical location tamper Detection method, by terminal Communication network information is handled, and is carried out geographical location tamper Detection in conjunction with location information, simply can accurately be judged terminal Geographical location whether be tampered.
Fig. 1 diagrammatically illustrates a kind of geographical location tamper Detection method of the illustrative embodiments of the disclosure.This public affairs Open embodiment offer method can by arbitrarily have the electronic equipment of computer process ability execution, such as terminal device and/ Or server.With reference to Fig. 1, the geographical location tamper Detection method that the embodiment of the present disclosure provides be may comprise steps of:
Step S102 obtains the communication network information and location information of terminal.
Here, terminal can for mobile phone, palm PC or it is other may be implemented wireless communication intelligent terminal, below Citing in, terminal takes the mobile phone as an example, and however, it is not limited to this.
Step S104, according to the communication network information obtain the terminal locating for communication network location information.
Step S106 determines whether the geographical location of the terminal is usurped with the location information according to the positional information Change.
In the technical solution of the embodiment of the present disclosure, the behaviour area of the terminal is judged by the data of the network environment of terminal Between, and judge whether the position location of the terminal is located in the activity interval, judge whether the geographical location of terminal is usurped with this Change.Specifically, if the position location of the terminal is located in the activity interval, determine that the geographical location of terminal is not usurped Change, if the position location of the terminal is not located in the activity interval, determines that the geographical location of terminal is tampered.
Judge what whether the geographical location of terminal was tampered by obtaining communication network information and the location information of terminal Technical solution without the mapping function attacked of tracking, and the technological means such as fights in mapping function attacking and defending, can Easily determine whether the geographical location of terminal is tampered with relatively simple.
In addition, judging whether the geographical location of terminal is usurped by the communication network information and location information of acquisition terminal The technical solution changed can be identified successfully and carry out the case where geographical location is distorted without using mapping function, and application range is wider.
In embodiments of the present invention, terminal can use Android (Android) operating system, but in practical applications not It is confined to this.Wireless near field communication can use WiFi (Wireless Fidelity, Wireless Fidelity).
Before step S102, the API of corresponding network communication can be obtained according to Android development technique (Application Programming Interface, application programming interface).If Android phone is currently at WiFi communication state, the information source of available WiFi information.If Android phone is currently at mobile data communication shape State, the then information source of available base station.The network communicated information of description terminal network environment may include the letter of WiFi information The information source in breath source and/or base station.
Location information in step S102 can be GPS positioning information, but be not limited thereto in practical applications, such as The location information of Beidou satellite navigation system offer is also provided.
In step S104, according to when the location information of communication network locating for communication network information acquisition terminal, head is needed First judge communication network locating for terminal for mobile data communication network or wireless near field communication network.
When terminal is in mobile data communication network and obtains the location information of mobile data communication network, need according to logical Communication network information determines that communication network locating for terminal is mobile data communication network, then obtains mobile data communication network locating for terminal The corresponding base station information of network, and then location information is determined according to base station information.
Here, base station information includes MNC (Mobile Network Code, mobile network code), the LAC of base station (location area code, Location Area Code), CID (Channel Identifier, Channel Identifier) and DBM Information such as (decibel milliwatt, decibel milliwatts).When base station includes first base station, base station information includes first base station letter Breath, according to the covering model of the latitude and longitude information of the available first base station of operation quotient data of the first base station and first base station It encloses, location information here may include the latitude and longitude information and coverage area of the first base station.
In step s 106, by judging whether position location is located in the coverage area of first base station it may determine that eventually Whether the geographical location at end is tampered.If position location is in the coverage area of base station, geographical location is not tampered with, if Position location is not in the coverage area of base station, then geographical location is tampered.
Currently, the mobile phone using double-card dual-standby standard is more.The corresponding operator of double card may be different.For example, base station can To include first base station and the second base station, the first operator and the second operator are respectively corresponded, it at this moment, can be according to first base station Location information is determined with the overlapping region of the second base station.
Specifically, different operators base station may have different characteristics, for example, the coverage area of the first operator base station is 1 kilometer, the coverage area of the second operator base station is 5 kilometers.At this moment, the physical location according to first base station and the second base station, It can draw and justify according to respective coverage area.Due to the operator of each base station and the difference of base station type, obtained circle can To be two circles not of uniform size.If the two circles do not cross, illustrate that position location is tampered;If two circles It crosses, and the position location not region in this crosses, then illustrate that position location is tampered;If two circles are to cross , and position location then illustrates that this position location is not tampered with also in this intersectional region.
When terminal is in mobile data communication network and obtains the location information of mobile data communication network, need according to logical Communication network information determines that communication network locating for terminal is wireless near field communication network, then obtains the wireless near field communication of terminal List information, and then location information is determined according to list information.
Here, communication network information includes the BSSID (Service Set Identifier, service set) of WiFi, The scannable WiFi list (WiFi List) of surrounding.
When that will determine location information according to list information, corresponding longitude and latitude is converted by the WiFi information in WIFI list Spend information.Specifically, it when converting corresponding latitude and longitude information for WiFi information, is obtained in list according to list information first Latitude and longitude coordinates where wireless near field communication network determine the minimum of covering latitude and longitude coordinates further according to latitude and longitude coordinates Circle, can determine location information according to smallest circle.
Here, the radius of this smallest circle can be set to no more than 500m.It, can be using random when determining the smallest circle Quantizer input quantization increment algorithm, however, it is not limited to this.This circle need to greatest extent by the corresponding latitude and longitude coordinates of WiFi information include into It goes, if there is 1 to 2 does not include, then kicks and remove, only reservation includes all WiFi latitude and longitude coordinates in circle.
If the location of terminal only have wireless near field communication network, if position location in this circle, Geographical location is not tampered with, if position location is not in this circle, geographical location is tampered.
If the location of terminal has mobile data network and wireless near field communication network simultaneously, also need to obtain The corresponding base station information of mobile data communication network locating for terminal, and location information is determined according to list information and base station information. When determining location information according to list information and base station information, it is logical that the near radio in list is obtained according to list information first Latitude and longitude coordinates where communication network determine the smallest circle of covering latitude and longitude coordinates further according to latitude and longitude coordinates, and according to base station Information and smallest circle determine location information.
It specifically, can be to determine location information according to the overlapping region of base station range He the circle.If sprocket bit It sets in the overlapping region of base station range and the circle, it is determined that geographical location is not tampered with, if position location is not in base In the overlapping region of coverage area of standing and the circle, it is determined that geographical location is tampered.
When the mobile phone that terminal is using double-card dual-standby standard, two blocks corresponding operator's difference, available two bases The coverage area stood.At this moment, three circles: first sim (Subscriber Identity Module, Ke Hushi can be obtained Other module) for card using the actual coordinate of its base station as the center of circle, base station range is the circle of radius;Second sim card is with its base Its base station range of the actual coordinate stood is the circle of radius;Third is with the latitude and longitude coordinates comprising most of WiFi list Circle.At this time, if three circles do not cross mutually, illustrate that geographical location is tampered.If three circles cross, and The position location not region in this crosses, then illustrate that position location is tampered;If three circles cross, and position Position also in this intersectional region, then illustrates that this position location is not tampered with.
As shown in Fig. 2, disclosure another kind embodiment provide geographical location tamper Detection method the following steps are included:
Step S201 obtains the communication network information and location information of terminal.
Step S202, according to communication network information judge terminal locating for communication network for mobile data communication network or close Distance wireless communication network.
Step S203 obtains the corresponding base of mobile data communication network when communication network is mobile data communication network It stands information.
Step S204 determines location information according to base station information.
Step S205 is wireless near field communication network in communication network, obtains the column of the wireless near field communication of terminal Table information.
Step S206 determines location information according to list information.
Location information is carried out in the embodiment of the present disclosure when determining, stores a large amount of WiFi and base station in the database used Corresponding geographical location information, the database can be constantly updated in use.
The geographical location tamper Detection method that the embodiment of the present disclosure provides, is communicated by the communication network information of acquisition Network location information judges whether the geographical location of terminal is tampered in conjunction with the location information of acquisition, can simply accurately Judge whether the geographical location of terminal is tampered, improves the security performance of internet.
The Installation practice of the disclosure introduced below can be used for executing the above-mentioned geographical location tamper Detection side of the disclosure Method.As shown in figure 3, may include: terminal letter according to a kind of geographical location tamper Detection device 300 that the embodiment of the present disclosure provides Cease acquiring unit 320, location information acquiring unit 340 and determination unit 360.
Wherein, end message acquiring unit 320 can be used for obtaining the communication network information and location information of terminal.Position Information acquisition unit 340 can be used for the location information of the communication network according to locating for communication network information acquisition terminal.It determines single Member 360 can be used for determining whether the geographical location of terminal is tampered according to location information and location information.
The geographical location tamper Detection device of the embodiment of the present disclosure, the end is judged by the data of the network environment of terminal The activity interval at end, and judge whether the position location of the terminal is located in the activity interval, the geographical position of terminal is judged with this It sets and whether is tampered.Judge whether the geographical location of terminal is usurped by obtaining communication network information and the location information of terminal The technical solution changed without the mapping function attacked of tracking, and the technologies hand such as fights in mapping function attacking and defending Section relatively simple easily can determine whether the geographical location of terminal is tampered.
In addition, judging whether the geographical location of terminal is usurped by the communication network information and location information of acquisition terminal The technical solution changed can be identified successfully and carry out the case where geographical location is distorted without using mapping function, and application range is wider.
In the embodiments of the present disclosure, location information acquiring unit 340 may include judgment sub-unit 342, obtain subelement 344 and determine subelement 346.
Wherein, judgment sub-unit 342 can be used for according to communication network information judge terminal locating for communication network for movement Data communication network or wireless near field communication network.
When communication network is mobile data communication network, obtaining subelement 344 can be used for obtaining mobile data communication The corresponding base station information of network.Determine that subelement 346 can be used for determining location information according to base station information.
It is wireless near field communication network in communication network, obtains the near radio that subelement 344 is used to obtain terminal The list information of communication.Determine that subelement 346 determines location information according to list information.
Due to each functional module and/or unit of the geographical location tamper Detection device of the example embodiment of the disclosure And/or subelement with the example embodiment of above-mentioned geographical location tamper Detection method the step of it is corresponding, therefore for the disclosure fill Undisclosed details in embodiment is set, the embodiment of the above-mentioned geographical location tamper Detection method of the disclosure is please referred to.
The geographical location tamper Detection device of the embodiment of the present disclosure, obtains communication network by the communication network information of acquisition Location information judges whether the geographical location of terminal is tampered in conjunction with the location information of acquisition, simply can accurately judge Whether the geographical location of terminal is tampered, and improves the security performance of internet.
Below with reference to Fig. 5, it illustrates the computer systems 500 for the electronic equipment for being suitable for being used to realize the embodiment of the present disclosure Structural schematic diagram.The computer system 500 of electronic equipment shown in Fig. 5 is only an example, should not be to the embodiment of the present disclosure Function and use scope bring any restrictions.
As shown in figure 5, computer system 500 includes central processing unit (CPU) 501, it can be read-only according to being stored in Program in memory (ROM) 502 or be loaded into the program in random access storage device (RAM) 503 from storage section 508 and Execute various movements appropriate and processing.In RAM 503, it is also stored with various programs and data needed for system operatio.CPU 501, ROM 502 and RAM 503 is connected with each other by bus 504.Input/output (I/O) interface 505 is also connected to bus 504。
I/O interface 505 is connected to lower component: the importation 506 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 507 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 508 including hard disk etc.; And the communications portion 509 of the network interface card including LAN card, modem etc..Communications portion 509 via such as because The network of spy's net executes communication process.Driver 510 is also connected to I/O interface 505 as needed.Detachable media 511, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 510, in order to read from thereon Computer program be mounted into storage section 508 as needed.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable storage Computer program on medium, the computer program include the program code for method shown in execution flow chart.In this way Embodiment in, which can be downloaded and installed from network by communications portion 509, and/or from detachable Medium 511 is mounted.When the computer program is executed by central processing unit (CPU) 501, executes in the system of the application and limit Fixed above-mentioned function.
It should be noted that computer readable storage medium shown in the disclosure can be computer-readable signal media or Person's computer readable storage medium either the two any combination.Computer readable storage medium for example can be --- But be not limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above group It closes.The more specific example of computer readable storage medium can include but is not limited to: have being electrically connected for one or more conducting wires Connect, portable computer diskette, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed it is read-only Memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory Part or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium, which can be, any include or stores The tangible medium of program, the program can be commanded execution system, device or device use or in connection.And In the disclosure, computer-readable signal media may include in a base band or the data as the propagation of carrier wave a part are believed Number, wherein carrying computer-readable program code.The data-signal of this propagation can take various forms, including but not It is limited to electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer Any computer readable storage medium other than readable storage medium storing program for executing, which can send, propagate or Person's transmission is for by the use of instruction execution system, device or device or program in connection.It is computer-readable to deposit The program code for including on storage media can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF Etc. or above-mentioned any appropriate combination.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
Being described in unit and/or subelement involved in the embodiment of the present disclosure can be realized by way of software, It can also be realized by way of hardware, described unit and/or subelement also can be set in the processor.Wherein, The title of these units and/or subelement is not constituted to the module and/or unit and/or subelement itself under certain conditions Restriction.
As on the other hand, present invention also provides a kind of computer readable storage medium, the computer-readable storage mediums Matter can be included in electronic equipment described in above-described embodiment;It is also possible to individualism, and without the supplying electricity In sub- equipment.Above-mentioned computer readable storage medium carries one or more program, when said one or multiple programs When being executed by the electronic equipment, so that the electronic equipment realizes such as above-mentioned geographical location tamper Detection as described in the examples Method.
For example, the electronic equipment may be implemented as shown in Figure 1: step S102 obtains the communication network of terminal Information and location information;Step S104, according to the communication network information obtain the terminal locating for communication network position letter Breath;Step S106 determines whether the geographical location of the terminal is tampered with the location information according to the positional information.
For another example, each step as shown in Figure 2 may be implemented in the electronic equipment.
It should be noted that although being referred to several modules or list for acting the equipment executed in the above detailed description Member or subelement, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described Two or more modules or the feature and function of unit or subelement can be in a module or units or subelement Middle materialization.Conversely, an above-described module or the feature and function of unit or subelement can be with further divisions To be embodied by multiple modules or unit or subelement.
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server, touch control terminal or network equipment etc.) is executed according to disclosure embodiment Method.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following Claim is pointed out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (10)

1. a kind of geographical location tamper Detection method, which is characterized in that the described method includes:
Obtain the communication network information and location information of terminal;
According to the communication network information obtain the terminal locating for communication network location information;
Determine whether the geographical location of the terminal is tampered with the location information according to the positional information.
2. the method according to claim 1, wherein according to locating for the communication network information acquisition terminal The location information of communication network, comprising:
According to the communication network information determine the terminal locating for communication network be mobile data communication network;
Obtain the corresponding base station information of mobile data communication network locating for the terminal;
The location information is determined according to the base station information.
3. according to the method described in claim 2, it is characterized in that, base station includes first base station and the second base station, the basis Base station information determines that the location information includes:
The location information is determined according to the overlapping region of the first base station and second base station.
4. the method according to claim 1, wherein according to locating for the communication network information acquisition terminal The location information of communication network, comprising:
According to the communication network information determine the terminal locating for communication network be wireless near field communication network;
Obtain the list information of the wireless near field communication of the terminal;
The location information is determined according to the list information.
5. according to the method described in claim 4, wrapping it is characterized in that, determine the location information according to the list information It includes:
The latitude and longitude coordinates where the wireless near field communication network in list are obtained according to the list information;
The smallest circle for covering the latitude and longitude coordinates is determined according to the latitude and longitude coordinates;
The location information is determined according to the smallest circle.
6. according to the method described in claim 4, it is characterized in that, according to locating for the communication network information acquisition terminal The location information of communication network, further includes:
Obtain the corresponding base station information of mobile data communication network locating for the terminal;
The location information is determined according to the list information and the base station information.
7. according to the method described in claim 6, it is characterized in that, described true according to the list information and the base station information The fixed location information, comprising:
The latitude and longitude coordinates where the wireless near field communication network in list are obtained according to the list information;
The smallest circle for covering the latitude and longitude coordinates is determined according to the latitude and longitude coordinates;
The location information is determined according to the base station information and the smallest circle.
8. a kind of geographical location tamper Detection device, which is characterized in that described device includes:
End message acquiring unit, for obtaining the communication network information and location information of terminal;
Location information acquiring unit, for according to the communication network information obtain the terminal locating for communication network position letter Breath;
Determination unit, for determining whether the geographical location of the terminal is usurped with the location information according to the positional information Change.
9. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is by processor The geographical location tamper Detection method as described in any one of claims 1 to 7 is realized when execution.
10. a kind of electronic equipment characterized by comprising
One or more processors;
Storage device, for storing one or more programs, when one or more of programs are by one or more of processing When device executes, so that one or more of processors realize that the geographical location as described in any one of claims 1 to 7 is distorted Recognition methods.
CN201910629668.5A 2019-07-12 2019-07-12 Geographical location tamper Detection method, apparatus, medium and electronic equipment Pending CN110290521A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910629668.5A CN110290521A (en) 2019-07-12 2019-07-12 Geographical location tamper Detection method, apparatus, medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910629668.5A CN110290521A (en) 2019-07-12 2019-07-12 Geographical location tamper Detection method, apparatus, medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN110290521A true CN110290521A (en) 2019-09-27

Family

ID=68022194

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910629668.5A Pending CN110290521A (en) 2019-07-12 2019-07-12 Geographical location tamper Detection method, apparatus, medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN110290521A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112995916A (en) * 2021-04-12 2021-06-18 江苏通付盾科技有限公司 Detection method and device for virtual positioning of mobile terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100205316A1 (en) * 2009-02-11 2010-08-12 Sprint Communications Company L.P. Authentication of the geographic location of wireless communication devices
US20150089595A1 (en) * 2013-09-24 2015-03-26 Shun Yao Method and system for facilitating online gaming
CN107148003A (en) * 2017-07-03 2017-09-08 奇酷互联网络科技(深圳)有限公司 Mobile terminal and its method and apparatus for disturbing location information
CN107390244A (en) * 2017-06-07 2017-11-24 深圳市金立通信设备有限公司 A kind of position information processing method and terminal
CN109818966A (en) * 2019-02-20 2019-05-28 携程旅游信息技术(上海)有限公司 Data tamper resistant method, system, equipment and storage medium based on base station information

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100205316A1 (en) * 2009-02-11 2010-08-12 Sprint Communications Company L.P. Authentication of the geographic location of wireless communication devices
US20150089595A1 (en) * 2013-09-24 2015-03-26 Shun Yao Method and system for facilitating online gaming
CN107390244A (en) * 2017-06-07 2017-11-24 深圳市金立通信设备有限公司 A kind of position information processing method and terminal
CN107148003A (en) * 2017-07-03 2017-09-08 奇酷互联网络科技(深圳)有限公司 Mobile terminal and its method and apparatus for disturbing location information
CN109818966A (en) * 2019-02-20 2019-05-28 携程旅游信息技术(上海)有限公司 Data tamper resistant method, system, equipment and storage medium based on base station information

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112995916A (en) * 2021-04-12 2021-06-18 江苏通付盾科技有限公司 Detection method and device for virtual positioning of mobile terminal
CN112995916B (en) * 2021-04-12 2021-11-05 江苏通付盾科技有限公司 Detection method and device for virtual positioning of mobile terminal

Similar Documents

Publication Publication Date Title
US8929931B1 (en) Resource installation management in a wireless network
CN110166943B (en) Method for processing terminal position information
US9572086B2 (en) Personal wireless coverage maps
US8572117B2 (en) Clearinghouse system and method for gaining access to use properties for carrier-based services
CN103822638B (en) The treating method and apparatus of customer position information
CN104596529A (en) Navigation method and navigation apparatus
CN109084795A (en) The method and device of search service facility based on Map Services
CN107567071B (en) Method and equipment for inquiring wireless hotspot
CN110689804A (en) Method and apparatus for outputting information
CN117098227B (en) Method, device, equipment and storage medium for determining position information
CN110677810B (en) Method and apparatus for generating geo-fences
CN111311193B (en) Method and device for configuring public service resources
CN102932734A (en) Method, device and system for determining distance between terminals
CN110290521A (en) Geographical location tamper Detection method, apparatus, medium and electronic equipment
CN110376622A (en) Localization method and device
US20230292139A1 (en) Configuration management and implementation of wireless networks
KR102646378B1 (en) System and method for providing virtual beacon service, and apparatus for executing virtual beacon service
CN110376625A (en) For warehousing system method for rapidly positioning
CN117676798A (en) Cell base station position prediction method and device, electronic equipment and storage medium
CN110708657A (en) Wireless access point connection method and device for mobile terminal
CN104936285A (en) Wifi positioning method and apparatus
KR101591566B1 (en) Position tracking method and apparatus
CN105163270B (en) The recognition methods of intelligent terminal location status and device
KR20150113521A (en) System and method for user authentication using location information at mobile PaaS cloud system
CN109086411A (en) For showing the method and device of information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination