CN111510415B - Method, device, equipment and storage medium for sharing and identifying blacklist number - Google Patents

Method, device, equipment and storage medium for sharing and identifying blacklist number Download PDF

Info

Publication number
CN111510415B
CN111510415B CN201910095393.1A CN201910095393A CN111510415B CN 111510415 B CN111510415 B CN 111510415B CN 201910095393 A CN201910095393 A CN 201910095393A CN 111510415 B CN111510415 B CN 111510415B
Authority
CN
China
Prior art keywords
blacklist
verification
information
identified
blacklist number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910095393.1A
Other languages
Chinese (zh)
Other versions
CN111510415A (en
Inventor
曹斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201910095393.1A priority Critical patent/CN111510415B/en
Publication of CN111510415A publication Critical patent/CN111510415A/en
Application granted granted Critical
Publication of CN111510415B publication Critical patent/CN111510415B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security

Abstract

The invention discloses a method, a device, equipment and a storage medium for sharing and identifying blacklist numbers. The blacklist number sharing method comprises the following steps: acquiring a report verification request; if the information of the newspaper lifter passes the verification, writing the information of the newspaper lifter and the blacklist number into the block by using a common identification mechanism, and storing the number characteristics of the blacklist number into the characteristic cluster; generating a report preparation request; and if the reported backup request passes the verification of other verification nodes, writing the blacklist number and the platform identifier into the block by using a common identification mechanism. Meanwhile, the blacklist number identification method comprises the following steps: acquiring a number to be identified; inquiring whether the number to be identified is stored in the feature cluster as a blacklist number; and if the number to be identified is inquired and stored in the feature cluster as the blacklist number, inquiring the block corresponding to the blacklist number to determine the verification node corresponding to the blacklist number. According to the embodiment of the invention, the blacklist number can be rapidly shared to the blacklist number library, and the malicious report of the reporter is prevented.

Description

Method, device, equipment and storage medium for sharing and identifying blacklist number
Technical Field
The invention belongs to the technical field of mobile communication, and particularly relates to a blacklist number sharing and identification method, device, equipment and storage medium.
Background
With the rapid development of the mobile internet, the harassment problems of the telephone, the short message and the like of the mobile terminal become more serious, on one hand, the harassment problems not only influence the work and the life of the user, but also possibly damage the economic benefit of the user; on the other hand, the harassment problems seriously affect the use experience of users, and also affect the image and reputation of the system parties such as terminal manufacturers and operators.
Aiming at various existing harassment problems, most users can solve the harassment problems of calls, short messages and the like by using blacklist number identification software preinstalled on a mobile terminal or blacklist number identification software of a third party.
Although this approach can solve the disturbance problem to some extent, there are some problems as follows:
firstly, databases of the identification software are not communicated with each other (cannot be shared with each other), so that the requirement of user for preventing harassment cannot be met to the maximum extent unless the user installs a plurality of identification software on the mobile terminal at the same time. However, the way of installing multiple pieces of identification software on the mobile terminal at the same time is inconvenient, and because the identification capabilities of the multiple pieces of identification software are different, different identification results may occur for the same number, so that the user cannot make a judgment according to the different identification results.
Secondly, currently, each blacklist number reporting function of the identification software is generally provided with a reporting time threshold, and when the reporting time of a number exceeds the reporting time threshold, the number is brought into a blacklist number library so as to prompt and intercept the number. Because different identification software used by different users is different, the numbers reported by the users cannot be synchronized to the databases of all the identification software in time, and further, the reported numbers are not included or are included in a delayed manner (the time reaching the reporting time threshold is delayed), so that inconvenience is brought to the users.
Thirdly, when the user uses the recognition software to report the blacklist number, the possibility of malicious reporting exists, and therefore unnecessary troubles and damage to the reputation are caused to the user.
Disclosure of Invention
Embodiments of the present invention provide a method, an apparatus, a device, and a storage medium for sharing and identifying blacklist numbers, which can quickly share reported blacklist numbers to a blacklist number library, so as to identify whether a number to be identified is a blacklist number in time, ensure data security of the blacklist number library, and prevent malicious reporting by a reporter.
In one aspect, an embodiment of the present invention provides a method for sharing blacklist numbers, including:
acquiring a report verification request; the report verification request comprises report person information, reported blacklist numbers and number characteristics of the blacklist numbers;
verifying the information of the newspaper raiser, if the information of the newspaper raiser passes the verification, writing the information of the newspaper raiser and the blacklist number into a block by using a common identification mechanism, and storing the number characteristics of the blacklist number into a characteristic cluster;
generating a report preparation request according to the blacklist number and the platform identification of the verification node;
and broadcasting the report preparation request to other verification nodes, and if the report preparation request passes the verification of other verification nodes, writing the blacklist number and the platform identification into the block by using a common identification mechanism so as to share the blacklist number to a blacklist number library.
Furthermore, the block body of the block comprises a report information part and a verification information part, wherein the report information part is used for storing the reporter information and the blacklist number, and the verification information part is used for storing the blacklist number and the platform identifier.
Further, writing the information of the reporter and the blacklist number into a block, including:
respectively converting the information of the newspaper raiser and the blacklist number into corresponding hash values;
and writing the hash value corresponding to the reporter information and the hash value corresponding to the blacklist number into the block.
Further, the storing the number characteristics of the blacklist number to a characteristic cluster includes:
and storing the blacklist number and the block address corresponding to the written block into at least one corresponding feature unit in the feature cluster according to the number feature of the blacklist number.
On the other hand, an embodiment of the present invention provides a blacklist number identification method, including:
acquiring a number to be identified;
inquiring whether the number to be identified is stored in a feature cluster as a blacklist number;
and if the number to be identified is inquired to be stored in the feature cluster as the blacklist number, inquiring the block corresponding to the blacklist number to determine the verification node corresponding to the blacklist number.
Further, querying whether the number to be identified is stored in the feature cluster as a blacklist number includes:
calculating a hash value corresponding to the number to be identified;
and inquiring whether the number to be identified is stored as a blacklist number or not in the feature cluster according to the hash value corresponding to the number to be identified.
Further, still include:
if the number to be identified is not inquired and is stored in the feature cluster as a blacklist number, acquiring a plurality of number features corresponding to the number to be identified;
and determining the probability that the number to be identified is the blacklist number according to the number characteristics.
Further, the determining, according to the number features, the probability that the number to be identified is a blacklist number includes:
determining the total number of numbers in the feature cluster and the number corresponding to each feature unit in the feature cluster;
calculating the weight corresponding to each feature unit according to the total number of the numbers and the number of the numbers;
and summing the weights corresponding to the feature units corresponding to the number features, and determining the probability that the number to be identified is a blacklist number.
In another aspect, an embodiment of the present invention provides a device for sharing blacklist numbers, where the device includes:
an information acquisition unit configured to acquire a report verification request; the report verification request comprises report person information, reported blacklist numbers and number characteristics of the blacklist numbers;
an information verification unit configured to verify the reporter information;
the request generating unit is configured to generate a report preparation request according to the blacklist number and the platform identifier of the verification node;
an information broadcasting unit configured to broadcast the report preparation request to other verification nodes;
the information writing unit is configured to write the information of the reporter and the blacklist number into a block by using a common identification mechanism if the information of the reporter passes verification, and store the number characteristics of the blacklist number into a characteristic cluster; and if the report preparation request passes the verification of other verification nodes, writing the blacklist number and the platform identification into the block by using a common identification mechanism.
In another aspect, an embodiment of the present invention provides a device for identifying a blacklist number, where the device includes:
a number acquisition unit configured to acquire a number to be identified;
a number query unit configured to query whether the number to be identified is stored in a feature cluster as a blacklist number;
and the information generation unit is configured to query a block corresponding to the blacklist number to determine a verification node corresponding to the blacklist number if the number to be identified is queried to be stored in the feature cluster as the blacklist number.
In another aspect, an embodiment of the present invention provides a device for sharing a blacklist number, where the device includes: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the blacklist number sharing method as described above.
In another aspect, an embodiment of the present invention provides a device for identifying a blacklist number, where the device includes: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the blacklist number identification method as described above.
In still another aspect, an embodiment of the present invention provides a storage medium having computer program instructions stored thereon, where the computer program instructions, when executed by a processor, implement the blacklist number sharing method or the blacklist number identification method as described above.
The blacklist number sharing method, the apparatus, the device and the storage medium of the embodiment of the invention can utilize the block chain technology, after acquiring the report verification request, verifying the information of the report, if the information of the report passes the verification, writing the information of the report and the blacklist number into a block, and storing the number characteristics of the blacklist number into a characteristic cluster, then generating a report backup request and broadcasting, if the report backup request passes the verification of other verification nodes, writing the blacklist number and the platform identification into the block, so as to share the blacklist number to the blacklist number library, therefore, the reported blacklist number can be quickly shared to the blacklist number library, meanwhile, the block chain has the advantage of being incapable of being tampered, so that the data security of the blacklist number library can be ensured, and in addition, since the reporter information for reporting the blacklist number is registered, it is possible to prevent malicious reporting of the reporter.
According to the blacklist number identification method, device, equipment and storage medium provided by the embodiment of the invention, after the number to be identified is obtained, whether the blacklist number identical to the number to be identified exists is inquired in the feature cluster for the first time by using a block chain technology, and if the blacklist number can be inquired, a block corresponding to the blacklist number is inquired to determine a verification node corresponding to the blacklist number, so that whether the number to be identified is the blacklist number can be quickly identified, and a user is prompted in advance by using the inquired information after identification, and the user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required to be used in the embodiments of the present invention will be briefly described below, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating a blacklist number sharing method according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a method for writing information into a block according to an embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a zone block according to one embodiment of the present invention;
FIG. 4 is a schematic diagram of the structure of a feature cluster of one embodiment of the present invention;
FIG. 5 is a schematic diagram of the structure of a feature cell of one embodiment of the present invention;
FIG. 6 is a diagram illustrating the relationship between feature cells and blocks according to one embodiment of the present invention;
fig. 7 is a flowchart illustrating a blacklist number identification method according to an embodiment of the present invention;
fig. 8 is a flowchart illustrating a method for querying a number to be identified in a feature cluster according to an embodiment of the present invention;
fig. 9 is a flowchart illustrating a blacklist number identification method according to another embodiment of the present invention;
FIG. 10 is a flowchart illustrating a method for determining a probability that a number to be identified is a blacklist number according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of a blacklist number sharing apparatus according to an embodiment of the present invention;
fig. 12 is a schematic structural diagram of a blacklist number identification apparatus according to an embodiment of the present invention;
fig. 13 is a schematic diagram of a hardware structure of a blacklist number sharing device and a blacklist number identification device according to an embodiment of the present invention.
Detailed Description
Features and exemplary embodiments of various aspects of the present invention will be described in detail below, and in order to make objects, technical solutions and advantages of the present invention more apparent, the present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not to be construed as limiting the invention. It will be apparent to one skilled in the art that the present invention may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present invention by illustrating examples of the present invention.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
In order to solve the problem of the prior art, embodiments of the present invention provide a method, an apparatus, a device, and a storage medium for sharing and identifying a blacklist number.
First, a blacklist number verification system applied in the embodiment of the present invention is described below.
The blacklist number verification system applied by the embodiment of the invention comprises a plurality of mobile terminals, a reporting node, a verification node and a query node.
The mobile terminal is provided with blacklist number identification software, and the blacklist number identification software can be blacklist number identification software pre-installed on the mobile terminal, and also can be blacklist number identification software of a third party installed on the mobile terminal, such as safety guard software of 360 mobile phone guards, Tencent mobile phone stewards and the like. The user can report and inquire the blacklist number through the blacklist number identification software on the mobile terminal. The reporting node of the mobile terminal may communicate with the query node and the reporting node, respectively.
The reporting node can be any data server of the blacklist number identification software background, and the reporting node can receive a reporting verification request sent by a user through the blacklist number identification software on the mobile terminal and forwards the reporting verification request to the verification node for verification.
The verification node can be a cloud server and is used for being in butt joint with the reporting node, receiving a reporting verification request sent by the reporting node, and verifying the information of a reporter and the reported blacklist number so as to generate a new block of the block chain.
The cloud server can also be provided with a feature cluster for storing blacklist numbers and number features thereof.
The query node can be the same node as the reporting node or different nodes, and the query node can also be any data server of the background of the blacklist number identification software. The inquiry node is used for acquiring the unknown number as a number to be identified when the mobile terminal receives a call of the unknown number, and inquiring whether the number to be identified is a blacklist number or not in the feature cluster so as to prompt a user through the mobile terminal.
The blacklist number sharing and identifying method, device, equipment and storage medium provided by the embodiment of the invention are applied to the blacklist number verification system.
Fig. 1 is a flowchart illustrating a blacklist number sharing method according to an embodiment of the present invention. As shown in fig. 1, the blacklist number sharing method is applied to a verification node of a blacklist number verification system, and the method includes:
s110, acquiring a report verification request; the reporting verification request comprises reporting person information, reported blacklist numbers and number characteristics of the blacklist numbers;
s120, verifying the information of the reporter, writing the information of the reporter and the blacklist number into a block by using a common identification mechanism if the information of the reporter passes the verification, and storing the number characteristics of the blacklist number into a characteristic cluster;
s130, generating a report preparation request according to the blacklist number and the platform identification of the verification node;
s140, broadcasting the report preparation request to other verification nodes, and if the report preparation request passes the verification of other verification nodes, writing the blacklist number and the platform identifier into a block by using a common identification mechanism so as to share the blacklist number to a blacklist number library.
Therefore, the embodiment of the invention can utilize the block chain technology to verify the information of the reporter after acquiring the report verification request, write the information of the reporter and the blacklist number into the block if the information of the reporter passes the verification, and store the number characteristics of the blacklist number into the characteristic cluster, and if the information of the reporter passes the verification, a report preparation request can be generated and broadcasted, if the report preparation request passes the verification of other verification nodes, the blacklist number and the platform identification are written into the block, so as to share the blacklist number to the blacklist number library, therefore, the reported blacklist number can be quickly shared to the blacklist number library, meanwhile, the block chain has the advantage of being incapable of being tampered, so that the data security of the blacklist number library can be ensured, and in addition, since the reporter information for reporting the blacklist number is registered, malicious reporting of the reporter can be prevented.
In embodiments of the present invention, the block header of the block uses current general techniques, and the block address may be included in the block header. The block body of the block comprises a report information part and a verification information part, wherein the report information part and the verification information part are respectively composed of a plurality of records, the report information part is used for storing the information of a report person and the number of a blacklist, and the verification information part is used for storing the number of the blacklist and the identification of a platform.
Fig. 2 is a flowchart illustrating a method for writing information into a block according to an embodiment of the present invention. As shown in fig. 2, in step S120 and step S130, a specific method for writing the information about the reporter and the blacklist number into the block may include:
s210, converting the information of the newspaper raiser and the blacklist number into corresponding hash values respectively;
s220, writing the hash value corresponding to the reporter information and the hash value corresponding to the blacklist number into a block.
Specifically, in the embodiment of the present invention, each record of the report information part includes a hash value of the report information (such as a mobile phone number, a mailbox address, an identification number, and the like of the report) and a hash value of the blacklist number. If the person reporting information is identified by PersonHash, the blacklist number is identified by NumberHash, and the hash function is represented by H, each record of the information reporting part is stored as follows:
personHash H (Phonenumber [ mobile phone number ], E-mail address [ email address ], …)
Number hash H (ReportNumber ])
In the embodiment of the present invention, each record of the verification information portion contains information that the blacklist number is verified by the verification node, for example, a certain number is verified as a blacklist number by the verification node corresponding to a certain verification platform, and then the number and a platform identifier (for example, a platform name) of the corresponding verification platform can be recorded in the blockchain, and the form is as follows:
number hash: platform identification
According to the above manner, after the blacklist number, the reporter information, and the platform identifier are written into the block, the block body shown in fig. 3 can be formed.
Fig. 4 shows a schematic diagram of the structure of a feature cluster according to an embodiment of the present invention. Fig. 5 shows a schematic structural diagram of a feature cell of one embodiment of the present invention.
As shown in fig. 4, a feature cluster, that is, a feature set of a blacklist number according to an embodiment of the present invention, includes a plurality of feature units, and each feature unit corresponds to a feature of the blacklist number. The feature units in the feature cluster dynamically change with the increase and development of the blacklist number. As shown in fig. 5, each feature unit stores a blacklist number having the feature and a block address of a block stored in the blacklist number.
Generally, the blacklist numbers described in the embodiments of the present invention refer to crank call numbers, and the following lists several main characteristics of the blacklist numbers:
1. number segment characteristics: the number with these number segments has a high probability of being a blacklisted phone, such as a number with a beginning of 400, 800, 95, "+" or "000".
2. The incoming call characteristic: hang up "make a sound".
3. Caller identification feature: displaying the unknown number and the number attribution.
4. The incoming call content characteristics are as follows: advertising promotion, fraud calls, real estate agents, financial products, and the like.
In step S120 of the embodiment of the present invention, a specific method for storing number features of a blacklist number to a feature cluster may include:
and storing the blacklist number and the block address corresponding to the written block into at least one corresponding feature unit in the feature cluster according to the number feature of the blacklist number. The blacklist number may also be converted into a hash value of the blacklist number and then stored.
Therefore, as shown in fig. 6, each feature unit may be associated with at least one block according to the blacklist number stored therein and the block address of the block in which the blacklist number is stored, and each block may also be associated with at least one feature unit because a plurality of blacklist numbers are stored in each block.
According to the blacklist number sharing method provided by the embodiment of the invention, when a mobile terminal of a user receives a crank call, the specific process of reporting the blacklist number by the user through the mobile terminal is as follows:
after receiving a crank call, a user can initiate a report verification request to a corresponding report node by using blacklist number identification software installed on a mobile terminal. The report verification request comprises report person information, reported blacklist numbers and number characteristics of the blacklist numbers.
And the reporting verification request received by the reporting node is sent to the verification node, and the reporting node broadcasts and initiates the reporting verification request to the block chain system. After any verification node in the block chain system receives the report verification request, the reporter is verified according to the reporter information submitted by the reporter contained in the request (for example, the mobile phone number can be verified in a short message verification code mode and the like), and the verification node only reserves the successfully verified reporter information and the reported blacklist number, including the hashed value of the reporter information and the hashed value of the blacklist number. The verification node writes the hash value of the reporter information and the hash value of the blacklist number into the report information part in the corresponding block by using a common identification mechanism, and simultaneously stores the hash value of the blacklist number and the block address corresponding to the written block into different feature units of the feature cluster according to the number features of the blacklist number. And when the reported blacklist number passes the verification of a certain verification node, reporting can be carried out. And after the verification node initiates a report preparation request, broadcasting the report preparation request in the block chain system. The reported blacklist number and the hash value thereof, the platform identification of the verification node and the number characteristic that the reported blacklist number passes the verification of the verification node are contained in the reported report preparation request. After other verification nodes in the block chain receive the report preparation request, verifying the correctness of the information in the report preparation request, including calculating the hash value of the reported blacklist number in the report preparation request, and verifying whether the calculated hash value is consistent with the hash value in the report preparation request. If not, discarding the report preparation request, and ending the verification process; and if the two blocks are consistent, writing the hash value of the blacklist number and the platform identification of the verification node into the verification information part in the corresponding block by using a common identification mechanism.
In summary, the verification node according to the embodiment of the present invention can determine whether the reported blacklist number is a harassing call by using a common identification mechanism, so that the problem of malicious reporting can be avoided. Meanwhile, the block chain stores the information of the reporter and can trace the reporter, so that the problem of malicious reporting is further avoided. In addition, the embodiment of the invention utilizes each verification node to ensure the correctness and the safety of the information in the block chain together, namely the blacklist number and the corresponding information which are already recorded in the block chain cannot be tampered, and the non-blacklist number and the corresponding information cannot be recorded in the block chain, thereby ensuring the correctness of the information and the safety of the information in the block chain.
It should be noted that, although the embodiment of the present invention describes a method for sharing blacklist numbers by taking an incoming blacklist number as an example, the embodiment of the present invention is also applicable to reporting and sharing blacklist numbers when a blacklist number sends a short message to a mobile terminal.
Fig. 7 is a flowchart illustrating a blacklist number identification method according to an embodiment of the present invention. As shown in fig. 7, the blacklist number identification method is applied to a query node of a blacklist number verification system, and the method includes:
s310, acquiring a number to be identified;
s320, inquiring whether the number to be identified is stored in the feature cluster as a blacklist number;
s330, if the number to be identified is stored in the feature cluster as the blacklist number, inquiring a block corresponding to the blacklist number to determine a verification node corresponding to the blacklist number.
The embodiment of the invention can directly send the incoming call number as the number to be identified to the query node through the blacklist number identification software of the mobile terminal when the mobile terminal receives the incoming call of the unknown number, and query in the feature cluster, and query the corresponding verification node when the number to be identified is the blacklist number, so that the prompt or interception that the unknown number is the blacklist number can be received before the user answers the call, and the user is prompted to verify the verification platform corresponding to the verification node of the blacklist number. Because the embodiment of the invention can store the blacklist number and the corresponding number characteristic by using the characteristic cluster, the inquiry of the blacklist number and the update of the number characteristic can be quickly carried out by using the characteristic cluster, thereby solving the problems that the speed of inquiring the blacklist number and the number characteristic thereof by using a block chain is slow and the number characteristic thereof can not be changed.
Fig. 8 is a flowchart illustrating a method for querying a number to be identified in a feature cluster according to an embodiment of the present invention. As shown in fig. 8, the specific method for querying whether the number to be identified is stored in the feature cluster as a blacklist number in step S320 may include:
s321, calculating a hash value corresponding to the number to be identified;
s322, inquiring whether the number to be identified is stored as a blacklist number in the feature cluster according to the hash value corresponding to the number to be identified.
Specifically, the hash value corresponding to the number to be identified may be used as a key value, and the feature cluster is searched for whether a corresponding hash value exists in each feature unit of the feature cluster, and if so, it is determined that the number to be identified is stored in the feature cluster as a blacklist number, where the number to be identified is the blacklist number; and if not, determining that the number to be identified is not stored in the feature cluster as a blacklist number, wherein the number to be identified is not determined to be the blacklist number.
Fig. 9 is a flowchart illustrating a blacklist number identification method according to another embodiment of the present invention. As shown in fig. 9, the method for identifying a blacklist number further includes:
s340, if the number to be identified is not inquired and is stored in the feature cluster as the blacklist number, acquiring a plurality of number features corresponding to the number to be identified;
and S350, determining the probability that the number to be identified is the blacklist number according to the number characteristics.
In the embodiment of the invention, when only a few users report the blacklist number, the blacklist number verification system does not reach consensus, namely a new block is not established, and at the moment, whether the number to be identified is the blacklist number cannot be directly inquired.
In the embodiment of the invention, if the number to be identified is not inquired and stored in the feature cluster as the blacklist number, the user is not prompted in advance. After the user answers the call of the blacklist number, if the call is suspected to be a harassing call, the probability that the number to be identified is the blacklist number can be further determined according to the number characteristics of the number to be identified.
Fig. 10 is a flowchart illustrating a method for determining a probability that a number to be identified is a blacklist number according to an embodiment of the present invention. As shown in fig. 10, in step S350, a specific method for determining a probability that a number to be identified is a blacklist number according to a plurality of number features may include:
s351, determining the total number of numbers in the feature cluster and the number corresponding to each feature unit in the feature cluster;
s352, calculating the weight corresponding to each feature unit according to the total number and the number of the numbers;
and S353, summing the weights corresponding to the feature units corresponding to the number features, and determining the probability that the number to be identified is the blacklist number.
In the embodiment of the invention, a user can send the number to be identified and the corresponding number characteristics to the query node through the blacklist number identification software of the mobile terminal, and the probability that the number to be identified is suspected to be the blacklist number can be estimated according to the number characteristics and the corresponding characteristics in the characteristic cluster.
Assuming that the probability that a certain number to be identified is suspected to be a blacklist number is represented as P, corresponding features in a feature cluster are represented as (T1, T2, T3, T4, …, T (n)), the numbers of blacklists having features of T1 and T2 … T (n) are respectively summed up to represent the number corresponding to each feature unit as (Q1, Q2, Q3, Q4, …, Qn), and the total number S of blacklist numbers in the feature cluster is calculated, wherein the weight of each feature in calculating the probability P is represented as (W1, W2, W3, W4, …, Wn), the following formula can be obtained:
Figure BDA0001964395660000121
wi ═ Qi/S (values of i are 1,2,3, …, n)
Figure BDA0001964395660000131
Through the formula, the probability that a certain number to be identified is a blacklist number can be predicted, and therefore better anti-harassment experience is provided for users.
Therefore, according to the method for identifying the blacklist number of the embodiment of the invention, when the mobile terminal of the user receives an incoming call of an unknown number, the incoming call number is taken as the number to be identified, and the specific process of identifying whether the incoming call number is the blacklist number is as follows:
when the mobile terminal receives an incoming call of an unknown number, the blacklist number identification software automatically sends the incoming call number as a number to be identified to the query node, the query node calculates the hash value of the number to be identified, and queries in the feature cluster by taking the hash value of the number to be identified as a key value.
If the hash value identical to the hash value of the number to be identified exists in the feature cluster, the block address of the block where the blacklist number corresponding to the hash value is located is directly inquired, information such as verification nodes which pass the blacklist number can be quickly inquired in the corresponding block according to the inquired block address, and therefore prompting or intercepting is conducted on a user according to the inquired information. When the inquired information is used for prompting the user, the user can directly add the incoming call number into the blacklist of the mobile terminal, namely refusing to receive the incoming call of the blacklist number. In addition, if the number characteristics of the blacklist number provided by the inquired reporter are not consistent with the number characteristics of the incoming call number, the number characteristics of the blacklist number can be updated in the number cluster by using blacklist number identification software.
If the hash value identical to the hash value of the number to be identified does not exist in the feature cluster, the incoming call number cannot be directly determined to be the blacklist number, the probability that the incoming call number is the blacklist number can be calculated through the number feature of the incoming call number provided by the user, and an early warning prompt is given, for example, the suspected rate that the xxxx number is the blacklist phone is 65%, so that better anti-harassment experience is provided for the user, and the capability of predicting and prompting a certain number before the number is not determined to be the blacklist number is solved.
Fig. 11 is a schematic structural diagram illustrating a blacklist number sharing apparatus according to an embodiment of the present invention. As shown in fig. 11, the apparatus for sharing blacklist numbers is applied to a verification node of a blacklist number verification system, and includes:
an information obtaining unit 410 configured to obtain a report verification request; the reporting verification request comprises reporting person information, reported blacklist numbers and number characteristics of the blacklist numbers;
an information verification unit 420 configured to verify the reporter information;
a request generating unit 430 configured to generate a report preparation request according to the blacklist number and the platform identifier of the verification node if the reporter information passes the verification;
an information broadcasting unit 440 configured to broadcast a report preparation request to other authentication nodes;
an information writing unit 450 configured to write the information of the reporter and the blacklist number into the block by using a common recognition mechanism and store the number characteristics of the blacklist number into the characteristic cluster if the information of the reporter passes the verification; and if the reported and prepared request passes the verification of other verification nodes, writing the blacklist number and the platform identifier into the block by using a common identification mechanism.
Therefore, the embodiment of the invention can utilize the block chain technology to verify the information of the reporter after acquiring the report verification request, if the information of the reporter passes the verification, the information of the reporter and the blacklist are written into the block, the number characteristics of the blacklist are stored into the characteristic cluster, then the report preparation request is generated and broadcasted, if the report preparation request passes the verification of other verification nodes, the blacklist number and the platform identification are written into the block to share the blacklist number to the blacklist number library, therefore, the reported blacklist number can be quickly shared to the blacklist number library, meanwhile, the block chain has the advantage of being incapable of being tampered, the data safety of the blacklist number library can be ensured, and in addition, the information of the reporter which reports the blacklist number is registered, so the malicious report of the reporter can be prevented.
In an embodiment of the present invention, the information writing unit 450 is further configured to convert the information about the alarm and the blacklist number into corresponding hash values, respectively, and write the hash value corresponding to the information about the alarm and the hash value corresponding to the blacklist number into the block.
In this embodiment of the present invention, the information writing unit 450 is further configured to store the blacklist number and the block address corresponding to the block to which the blacklist number is written into the corresponding at least one feature unit in the feature cluster according to the number feature of the blacklist number.
Fig. 12 is a schematic structural diagram illustrating a blacklist number identification apparatus according to an embodiment of the present invention. As shown in fig. 12, the apparatus for identifying a blacklist number is applied to an inquiry node of a blacklist number verification system, and includes:
a number acquisition unit 510 configured to acquire a number to be identified;
a number query unit 520 configured to query whether a number to be identified is stored in the feature cluster as a blacklist number;
and an information generating unit 530 configured to, if it is found that the number to be identified is stored as the blacklist number in the feature cluster, query a block corresponding to the blacklist number to determine a verification node corresponding to the blacklist number.
The embodiment of the invention can directly send the incoming call number as the number to be identified to the query node through the blacklist number identification software of the mobile terminal when the mobile terminal receives the incoming call of the unknown number, and query in the feature cluster, and query the corresponding verification node when the number to be identified is the blacklist number, so that the prompt or interception that the unknown number is the blacklist number can be received before the user answers the call, and the user is prompted to verify the verification platform corresponding to the verification node of the blacklist number. Because the embodiment of the invention can store the blacklist number and the corresponding number characteristic by using the characteristic cluster, the inquiry of the blacklist number and the update of the number characteristic can be quickly carried out by using the characteristic cluster, thereby solving the problems that the speed of inquiring the blacklist number and the number characteristic thereof by using a block chain is slow and the number characteristic thereof can not be changed.
In this embodiment of the present invention, the number query unit 520 is further configured to calculate a hash value corresponding to the number to be identified; and inquiring whether the number to be identified is stored as a blacklist number in the feature cluster according to the hash value corresponding to the number to be identified.
In the embodiment of the present invention, the apparatus further includes a probability calculation unit configured to, if the number to be identified is not queried to be stored in the feature cluster as the blacklist number, obtain a plurality of number features corresponding to the number to be identified, and determine a probability that the number to be identified is the blacklist number according to the plurality of number features.
In an embodiment of the present invention, the probability calculating unit is further configured to determine a total number of numbers in the feature cluster and a number corresponding to each feature unit in the feature cluster, calculate weights corresponding to each feature unit according to the total number of numbers and the number, sum the weights corresponding to the feature units corresponding to the plurality of number features, and determine the probability that the number to be identified is the blacklist number.
Fig. 13 is a schematic diagram illustrating a hardware structure of a blacklist number sharing device and a blacklist number identification device according to an embodiment of the present invention.
The blacklist number sharing device and the blacklist number identification device may each comprise a processor 601 and a memory 602 in which computer program instructions are stored.
Specifically, the processor 601 may include a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured as one or more Integrated circuits implementing embodiments of the present invention.
Memory 602 may include mass storage for data or instructions. By way of example, and not limitation, memory 602 may include a Hard Disk Drive (HDD), floppy Disk Drive, flash memory, optical Disk, magneto-optical Disk, tape, or Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 602 may include removable or non-removable (or fixed) media, where appropriate. The memory 602 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In a particular embodiment, the memory 602 is a non-volatile solid-state memory. In a particular embodiment, the memory 602 includes Read Only Memory (ROM). Where appropriate, the ROM may be mask-programmed ROM, Programmable ROM (PROM), Erasable PROM (EPROM), Electrically Erasable PROM (EEPROM), electrically rewritable ROM (EAROM), or flash memory or a combination of two or more of these.
The processor 601 may implement any one of the above-described embodiments of the blacklist number sharing method and the blacklist number identification method by reading and executing computer program instructions stored in the memory 602.
In one example, the blacklist number sharing device and the blacklist number identification device may further include a communication interface 603 and a bus 610, respectively. As shown in fig. 13, the processor 601, the memory 602, and the communication interface 603 are connected via a bus 610 to complete communication therebetween.
The communication interface 603 is mainly used for implementing communication between modules, apparatuses, units and/or devices in the embodiments of the present invention.
Bus 610 includes hardware, software, or both to couple the components of the blacklist number sharing device and the blacklist number identification device, respectively, to each other. By way of example, and not limitation, a bus may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industrial Standard Architecture (EISA) bus, a Front Side Bus (FSB), a Hyper Transport (HT) interconnect, an Industrial Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a Micro Channel Architecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus or a combination of two or more of these. Bus 610 may include one or more buses, where appropriate. Although specific buses have been described and illustrated with respect to embodiments of the invention, any suitable buses or interconnects are contemplated by the invention.
The blacklist number sharing device and the blacklist number identification device may respectively execute the blacklist number sharing method and the blacklist number identification method in the embodiment of the present invention, thereby implementing the blacklist number sharing method and apparatus, and the blacklist number identification method and apparatus described in conjunction with fig. 1 and fig. 2.
In addition, in combination with the blacklist number sharing method and the blacklist number identification method in the above embodiments, embodiments of the present invention may provide a storage medium to implement. The storage medium having stored thereon computer program instructions; the computer program instructions, when executed by a processor, implement any one of the blacklist number sharing methods or the blacklist number identification methods in the above embodiments.
It is to be understood that the invention is not limited to the specific arrangements and instrumentality described above and shown in the drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present invention are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications and additions or change the order between the steps after comprehending the spirit of the present invention.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the invention are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include electronic circuits, semiconductor memory devices, ROM, flash memory, Erasable ROM (EROM), floppy disks, CD-ROMs, optical disks, hard disks, fiber optic media, Radio Frequency (RF) links, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
It should also be noted that the exemplary embodiments mentioned in this patent describe some methods or systems based on a series of steps or devices. However, the present invention is not limited to the order of the above steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed at the same time.
As described above, only the specific embodiments of the present invention are provided, and it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present invention, and these modifications or substitutions should be covered within the scope of the present invention.

Claims (13)

1. A blacklist number sharing method is characterized by comprising the following steps:
acquiring a report verification request; the report verification request comprises report person information, reported blacklist numbers and number characteristics of the blacklist numbers;
verifying the information of the newspaper raiser, if the information of the newspaper raiser passes the verification, writing the information of the newspaper raiser and the blacklist number into a block by using a common identification mechanism, and storing the number characteristics of the blacklist number into a characteristic cluster;
generating a report preparation request according to the blacklist number and the platform identification of the verification node;
and broadcasting the report preparation request to other verification nodes, and if the report preparation request passes the verification of other verification nodes, writing the blacklist number and the platform identification into the block by using a common identification mechanism so as to share the blacklist number to a blacklist number library.
2. The method of claim 1, wherein the block of the block comprises a report information portion and a verification information portion, the report information portion is used for storing the reporter information and the blacklist number, and the verification information portion is used for storing the blacklist number and the platform identifier.
3. The method of claim 1, wherein writing the reporter information and the blacklist number to a block comprises:
respectively converting the information of the newspaper raiser and the blacklist number into corresponding hash values;
and writing the hash value corresponding to the information of the newspaper raiser and the hash value corresponding to the blacklist number into the block.
4. The method of claim 1, wherein storing the number characteristic of the blacklist number to a characteristic cluster comprises:
and storing the blacklist number and the block address corresponding to the written block into at least one corresponding feature unit in the feature cluster according to the number feature of the blacklist number.
5. A blacklist number identification method is characterized by comprising the following steps:
acquiring a number to be identified;
inquiring whether the number to be identified is stored in a feature cluster as a blacklist number;
if the number to be identified is inquired to be stored in the feature cluster as a blacklist number, inquiring a block corresponding to the blacklist number to determine a verification node corresponding to the blacklist number;
the characteristic cluster stores number characteristics of blacklist numbers; the block comprises blacklist numbers written by using a common identification mechanism and platform identifications of verification nodes corresponding to the blacklist numbers.
6. The blacklist number identification method according to claim 5, wherein querying whether the number to be identified is stored as a blacklist number in a feature cluster comprises:
calculating a hash value corresponding to the number to be identified;
and inquiring whether the number to be identified is stored as a blacklist number or not in the feature cluster according to the hash value corresponding to the number to be identified.
7. The method of claim 5, further comprising:
if the number to be identified is not inquired and is stored in the feature cluster as a blacklist number, acquiring a plurality of number features corresponding to the number to be identified;
and determining the probability that the number to be identified is the blacklist number according to the number characteristics.
8. The method of claim 7, wherein the determining the probability that the number to be identified is a blacklist number according to the plurality of number features comprises:
determining the total number of numbers in the feature cluster and the number corresponding to each feature unit in the feature cluster;
calculating the weight corresponding to each feature unit according to the total number of the numbers and the number of the numbers;
and summing the weights corresponding to the feature units corresponding to the number features, and determining the probability that the number to be identified is a blacklist number.
9. An apparatus for sharing blacklist numbers, the apparatus comprising:
an information acquisition unit configured to acquire a report verification request; the report verification request comprises report person information, reported blacklist numbers and number characteristics of the blacklist numbers;
an information verification unit configured to verify the reporter information;
the request generating unit is configured to generate a report preparation request according to the blacklist number and the platform identifier of the verification node;
an information broadcasting unit configured to broadcast the report preparation request to other verification nodes;
the information writing unit is configured to write the information of the reporter and the blacklist number into a block by using a common identification mechanism if the information of the reporter passes verification, and store the number characteristics of the blacklist number into a characteristic cluster; and if the report preparation request passes the verification of other verification nodes, writing the blacklist number and the platform identifier into the block by using a common identification mechanism.
10. An apparatus for identifying blacklist numbers, the apparatus comprising:
a number acquisition unit configured to acquire a number to be identified;
a number query unit configured to query whether the number to be identified is stored in a feature cluster as a blacklist number;
the information generating unit is configured to query a block corresponding to the blacklist number to determine a verification node corresponding to the blacklist number if the number to be identified is stored in the feature cluster as the blacklist number;
the characteristic cluster stores number characteristics of blacklist numbers; the block comprises blacklist numbers written by using a consensus mechanism and platform identifications of verification nodes corresponding to the blacklist numbers.
11. A blacklist number sharing apparatus, characterized in that the apparatus comprises: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the blacklist number sharing method as claimed in any one of claims 1-4.
12. A blacklist number identification device, characterized in that the device comprises: a processor and a memory storing computer program instructions;
the processor, when executing the computer program instructions, implements the blacklist number identification method as claimed in any one of claims 5 to 8.
13. A storage medium having stored thereon computer program instructions which, when executed by a processor, implement the method of sharing blacklist numbers according to any one of claims 1 to 4 or the method of identifying blacklist numbers according to any one of claims 5 to 8.
CN201910095393.1A 2019-01-31 2019-01-31 Method, device, equipment and storage medium for sharing and identifying blacklist number Active CN111510415B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910095393.1A CN111510415B (en) 2019-01-31 2019-01-31 Method, device, equipment and storage medium for sharing and identifying blacklist number

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910095393.1A CN111510415B (en) 2019-01-31 2019-01-31 Method, device, equipment and storage medium for sharing and identifying blacklist number

Publications (2)

Publication Number Publication Date
CN111510415A CN111510415A (en) 2020-08-07
CN111510415B true CN111510415B (en) 2022-09-16

Family

ID=71870789

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910095393.1A Active CN111510415B (en) 2019-01-31 2019-01-31 Method, device, equipment and storage medium for sharing and identifying blacklist number

Country Status (1)

Country Link
CN (1) CN111510415B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017067250A1 (en) * 2015-10-21 2017-04-27 中兴通讯股份有限公司 Call processing method and device
CN108810901A (en) * 2018-04-17 2018-11-13 中国地质大学(武汉) A kind of malice number mark recognition methods based on block chain
CN109120609A (en) * 2018-08-02 2019-01-01 佛山鑫达智汇科技有限公司 Social information based on block chain reports method and apparatus
CN109274837A (en) * 2018-08-22 2019-01-25 北京航空航天大学 Method and device can be traced in telephone source based on block chain technology

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150106265A1 (en) * 2013-10-11 2015-04-16 Telesign Corporation System and methods for processing a communication number for fraud prevention

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017067250A1 (en) * 2015-10-21 2017-04-27 中兴通讯股份有限公司 Call processing method and device
CN108810901A (en) * 2018-04-17 2018-11-13 中国地质大学(武汉) A kind of malice number mark recognition methods based on block chain
CN109120609A (en) * 2018-08-02 2019-01-01 佛山鑫达智汇科技有限公司 Social information based on block chain reports method and apparatus
CN109274837A (en) * 2018-08-22 2019-01-25 北京航空航天大学 Method and device can be traced in telephone source based on block chain technology

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
一种基于区块链技术实现电信诈骗号码标记库共享的方法;郭燕飞;《信息通信技术与政策》;20170630(第6期);正文第44-45页、图2 *
郭燕飞.一种基于区块链技术实现电信诈骗号码标记库共享的方法.《信息通信技术与政策》.2017,(第6期), *

Also Published As

Publication number Publication date
CN111510415A (en) 2020-08-07

Similar Documents

Publication Publication Date Title
CN108810116B (en) Message processing method and related product
CN110913025B (en) Service calling method, device, equipment and medium
CN109671205B (en) Voting method, device and equipment based on block chain and computer storage medium
CN109302434B (en) Prompt message pushing method and device, service platform and storage medium
CN103763690A (en) Method and device for sending short messages to mobile terminal from detection fake base station
CN111310196B (en) Risk identification method and device and electronic equipment
JP5363342B2 (en) System and method for filtering cellular telephone messages
US8806002B2 (en) P2P activity detection and management
WO2023129440A1 (en) Assessing risk of fraud associated with user unique identifier using telecommunications data
CN107172622B (en) Method, device and system for identifying and analyzing pseudo base station short message
CN109547427B (en) Blacklist user identification method and device, computer equipment and storage medium
US11599673B2 (en) Ascertaining network devices used with anonymous identifiers
CN111510415B (en) Method, device, equipment and storage medium for sharing and identifying blacklist number
KR101473652B1 (en) Method and appratus for detecting malicious message
EP4052499B1 (en) Sim swap fraud detection
CN111356091B (en) Message sending and receiving method and terminal
US8380165B1 (en) Identifying a cloned mobile device in a communications network
CN108574623B (en) Method and device for determining and preventing junk information by malicious user
CN108271156B (en) Method and device for identifying pseudo base station
JP2019036032A (en) Information processing device, information processing method and program
CN109347890B (en) Method, apparatus, device and medium for pseudo terminal detection
CN114239963A (en) Method and device for detecting directed graph circulation path
CN110493735B (en) Short message processing method and device
KR20170006287A (en) System and method for managing voice phishing information
CN111417142A (en) User identification method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant