CN112153222A - Harassment number identification method and server - Google Patents

Harassment number identification method and server Download PDF

Info

Publication number
CN112153222A
CN112153222A CN202011124172.1A CN202011124172A CN112153222A CN 112153222 A CN112153222 A CN 112153222A CN 202011124172 A CN202011124172 A CN 202011124172A CN 112153222 A CN112153222 A CN 112153222A
Authority
CN
China
Prior art keywords
suspected
information
user
call
fused
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011124172.1A
Other languages
Chinese (zh)
Other versions
CN112153222B (en
Inventor
肖征荣
邢建兵
田新雪
马书惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202011124172.1A priority Critical patent/CN112153222B/en
Publication of CN112153222A publication Critical patent/CN112153222A/en
Application granted granted Critical
Publication of CN112153222B publication Critical patent/CN112153222B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a harassment number identification method and a server, wherein the method comprises the following steps: the method comprises the steps of obtaining and sending customer complaint information to a block chain network so that each operator node can obtain the customer complaint information, wherein the customer complaint information comprises suspected numbers and call record information corresponding to the suspected numbers; acquiring fused suspected user information from a blockchain network, wherein the fused suspected user information is a set of information of suspected users fed back by each operator node according to customer complaint information, and the suspected users are users using suspected numbers to carry out communication; and determining whether the suspected number is a harassment number or not according to the fused suspected user information. And determining whether the suspected number is a harassing number according to the fused suspected user information without manual examination, so that the operation cost is reduced while the safe use of normal users is ensured, and the development of mobile communication services is facilitated.

Description

Harassment number identification method and server
Technical Field
The application relates to the technical field of communication, in particular to a harassment number identification method and a server.
Background
Harassing calls refer to the act of promoting a product or acting as fraud and intentional telephone harassment to the staff of an authority department. The main method for preventing harassing calls, spam messages and fraud calls of common mobile phone users is to protect personal information and simultaneously learn to use mobile phone security software. In addition, the effective radical treatment of harassing calls and spam messages requires the effort of carrying hands by an industrial chain, and operators, related functional departments of network security management, mobile phone manufacturers and the like carry hands together to perform security management, so that various fraud behaviors or harassment behaviors and the like can be effectively attacked.
The existing screening of crank calls is based on screening in the same operator system, the possibility of falsification of uploaded information exists, the total number of suspected numbers reported by a client is higher than the confirmation number of crank numbers, the crank numbers still need manual verification, the confirmation proportion of the crank numbers is very low, the operation cost is increased, and the user experience is poor.
Disclosure of Invention
Therefore, the application provides a harassment number identification method and a server to solve the problem of how to efficiently and safely identify harassment numbers.
In order to achieve the above object, a first aspect of the present application provides a method for identifying a harassment number, where the method includes: the method comprises the steps of obtaining and sending customer complaint information to a block chain network so that each operator node can obtain the customer complaint information, wherein the customer complaint information comprises suspected numbers and call record information corresponding to the suspected numbers; acquiring fused suspected user information from a blockchain network, wherein the fused suspected user information is a set of information of suspected users fed back by each operator node according to customer complaint information, and the suspected users are users using suspected numbers to carry out communication; and determining whether the suspected number is a harassment number or not according to the fused suspected user information.
In some specific implementations, determining whether the suspected number is a nuisance number according to fusing the suspected user information includes: extracting an authentication identifier of a suspected user, call record information corresponding to the suspected number and position information of the suspected user during call in the fused suspected user information, wherein the authentication identifier is an identity identifier determined by an operator node according to authentication information of a legal organization received by the suspected user; determining whether the suspected user is a legal user according to the identity authentication identifier; when the suspected user is determined not to be a legal user, determining that the suspected number is a harassing number; and when the suspected user is a legal user, determining whether the suspected number is a harassment number according to the call record information corresponding to the suspected number and the position information of the suspected user during the call.
In some specific implementations, determining whether the suspected number is a harassment number according to the call record information corresponding to the suspected number and the position information of the suspected user during the call includes: determining a called number group and call duration corresponding to a call initiated by a suspected user according to call record information corresponding to the suspected number; determining calling frequency information of a suspected user in the same time period at the same position according to the calling time length and the position information of the suspected user during the calling; when the called number in the called number group is determined to be a preset number, the frequency of the suspected user initiating the call exceeds a preset frequency threshold, and the call duration is a preset duration, determining that the suspected number is not a harassing number; and when the called number in the called number group is not a preset number, determining whether the suspected number is a harassing number according to the calling frequency information and the frequency preset threshold.
In some implementations, after the step of determining that the suspected number is a nuisance number, the method further includes: and generating and sending a shielding broadcast message to the block chain network according to the harassment number so as to enable each operator node to obtain the harassment number, adding the harassment number into a blacklist, and forbidding a call service of the harassment number.
In order to achieve the above object, a second aspect of the present application provides a method for identifying a harassment number, where the method includes: obtaining customer complaint information sent by a harassment number identification server from a blockchain network, wherein the customer complaint information comprises suspected numbers and call record information corresponding to the suspected numbers; judging whether the suspected number is a service user of the current operator node, if so, determining information of a first suspected user according to the suspected number; obtaining information of a second suspected user fed back by a second operator node from the blockchain network; and generating and sending fused suspected user information to the blockchain network according to the information of the first suspected user and the information of the second suspected user, so that the harassing number identification server determines whether the suspected number is a harassing number according to the fused suspected user information.
In some implementations, determining information of the first suspected user according to the suspected number includes: inquiring a database of a current operator node according to the suspected number to obtain call record information corresponding to the suspected number and position information of a first suspected user during call; acquiring verification information of a legal organization on a first suspected user; determining an identity authentication identifier of the first suspected user according to the authentication information; and determining the information of the first suspected user according to the call record information corresponding to the suspected number, the identity verification identifier of the first suspected user and the position information of the first suspected user during the call.
In some implementations, generating and sending fused suspected user information to a blockchain network according to information of a first suspected user and information of a second suspected user includes: extracting first position information and first call record information of a suspected user during call in the information of the first suspected user; extracting second position information and second communication record information of the suspected user when the suspected user is in communication in the information of the second suspected user; determining calling frequency information of suspected numbers in a suspected number set according to the first position information, the first call record information, the second position information and the second call record information, wherein the suspected numbers are numbers which initiate calling in the same time period at the same position; determining fused suspected user information according to the calling frequency information and a frequency preset threshold; and sending the fused suspected user information to the block chain network.
In some implementations, fusing the suspected user information includes: the method comprises the steps of identifying an operator node, a suspected number set, call record information corresponding to suspected numbers in the suspected number set, identity verification identification of suspected users corresponding to the suspected numbers and position information of the suspected users during call.
In order to achieve the above object, a third aspect of the present application provides a harassing number recognition server, including: the client complaint information processing module is used for acquiring and sending client complaint information to the block chain network so that each operator node can acquire the client complaint information, wherein the client complaint information comprises a suspected number and call record information corresponding to the suspected number; the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for acquiring fused suspected user information from a blockchain network, the fused suspected user information is a set of suspected user information fed back by each operator node according to customer complaint information, and the suspected user is a user using a suspected number for communication; and the identification module is used for determining whether the suspected number is a harassing number according to the fused suspected user information.
In order to achieve the above object, a fourth aspect of the present application provides an operator node server, including: the second obtaining module is used for obtaining customer complaint information sent by the harassment number identification server from the blockchain network, wherein the customer complaint information comprises suspected numbers and call record information corresponding to the suspected numbers; the judging module is used for judging whether the suspected number is a service user of the current operator node, and if so, determining information of a first suspected user according to the suspected number; a third obtaining module, configured to obtain, from the blockchain network, information of a second suspected user fed back by a second operator node; and the fusion module is used for generating and sending fused suspected user information to the block chain network according to the information of the first suspected user and the information of the second suspected user, so that the harassing number identification server determines whether the suspected number is a harassing number according to the fused suspected user information.
According to the identification method and the server of the harassment number, each operator node obtains customer complaint information by obtaining and sending the customer complaint information to the block chain network, wherein the customer complaint information comprises suspected numbers and call record information corresponding to the suspected numbers; and each operator node can screen suspected numbers according to the customer complaint information, so that the troubleshooting of harassing numbers is accelerated. Acquiring fused suspected user information from a blockchain network, wherein the fused suspected user information is a set of information of suspected users fed back by each operator node according to customer complaint information, and the suspected users are users using suspected numbers to carry out communication; through a communication mode of a block chain, fused suspected user information which is reported by a plurality of operator nodes and screened by each operator is obtained in the service range of the operator nodes, the investigation range of suspected numbers is expanded, and the investigation efficiency of the suspected numbers is improved. And determining whether the suspected number is a harassing number according to the fused suspected user information without manual examination, so that the operation cost is reduced while the safe use of normal users is ensured, and the development of mobile communication services is facilitated.
Drawings
The accompanying drawings are included to provide a further understanding of the embodiments of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the principles of the application. The above and other features and advantages will become more apparent to those skilled in the art by describing in detail exemplary embodiments thereof with reference to the attached drawings, in which:
fig. 1 shows a schematic flow chart of a method for identifying a harassment number in an embodiment of the present application.
Fig. 2 is a schematic flow chart illustrating a method for identifying a harassment number in another embodiment of the present application.
Fig. 3 is a flowchart illustrating a method for identifying a harassment number in yet another embodiment of the present application.
Fig. 4 shows a block diagram of a harassment number identification server in an embodiment of the present application.
Fig. 5 shows a block diagram of components of an operator node server in an embodiment of the present application.
Fig. 6 is a block diagram showing a component of a disturbance number identification system in an embodiment of the present application.
Fig. 7 is a flowchart illustrating a working method of a harassment number identification system in an embodiment of the present application.
In the drawings:
401: customer complaint information processing module 402: first acquisition module
403: the identification module 501: second acquisition module
502: a judging module 503: third acquisition module
504: fusion module 601 first operator node server
602: second operator node server 603: third operator node server
604: harassment number identification server
Detailed Description
The following detailed description of embodiments of the present application will be made with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present application, are given by way of illustration and explanation only, and are not intended to limit the present application. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
The harassing call refers to a call which is made by some merchants to promote products or is fraudulently made by some persons serving as staff of an authority department to ordinary users, the ordinary users may continuously receive spam messages sent by networks or mobile numbers and other various types of communication harassments, and the various types of harassment numbers carried out by using operator networks as carriers are more and more, so that the customer experience is poor.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Fig. 1 shows a schematic flow chart of a method for identifying a harassment number in an embodiment of the present application. The harassment number identification method can be applied to a harassment number identification server. As shown in fig. 1, the following steps are included.
And step 110, obtaining and sending customer complaint information to the block chain network.
When each operator node obtains customer complaint information from the blockchain network, the customer complaint information is subjected to message analysis, and suspected numbers in the customer complaint information and call record information corresponding to the suspected numbers are obtained. Each operator node can search the database in the operator node in parallel according to the suspected number, screen the suspected number and accelerate the troubleshooting of harassing numbers.
Step 120, obtaining fused suspected user information from the blockchain network.
The fused suspected user information is a set of information of suspected users fed back by each operator node according to the customer complaint information, and the suspected users are users who use suspected numbers for communication.
And step 130, determining whether the suspected number is a harassment number according to the fused suspected user information.
In some specific implementations, determining whether the suspected number is a nuisance number according to fusing the suspected user information includes: extracting an authentication identifier of a suspected user, call record information corresponding to the suspected number and position information of the suspected user during call in the fused suspected user information, wherein the authentication identifier is an identity identifier determined by an operator node according to authentication information of a legal organization received by the suspected user; determining whether the suspected user is a legal user according to the identity authentication identifier; when the suspected user is determined not to be a legal user, determining that the suspected number is a harassing number; and when the suspected user is a legal user, further determining whether the suspected number is a harassing number according to the call record information corresponding to the suspected number and the position information of the suspected user during the call.
For example, the suspected number included in the fused suspected user information is 13411223344, the suspected user corresponding to the suspected number is wang someone, the position of the wang someone when calling service is performed by using the number 13411223344 is the first street, when the fused suspected user information is analyzed, the obtained authentication identifier of the wang someone represents that the wang someone is not a legal user (for example, when an operator node can inquire that the wang someone receives a verification short message sent by a bank/government agency from a database, the authentication identifier of the wang someone is set as a legal user, otherwise, the authentication identifier of the wang someone is set as an illegal user), and the suspected number 13411223344 is determined to be a nuisance number. When it is determined that the authentication identifier of a certain king user is a valid user, it is further required to determine whether the suspected number is a harassment number according to the call record information corresponding to the suspected number 13411223344 and the location information (for example, the first street, etc.) of the suspected user during the call.
Preliminarily judging whether the suspected number used by the suspected user is a harassing number according to the identity authentication identifier of the suspected user, and accelerating the speed of checking the harassing number; and then further judging whether the suspected number is a harassment number or not according to the call record information corresponding to the suspected number and the position information of the suspected user during the call. The troubleshooting accuracy of the harassment numbers is improved.
In some specific implementations, determining whether the suspected number is a harassment number according to the call record information corresponding to the suspected number and the position information of the suspected user during the call includes: determining a called number group and call duration corresponding to a call initiated by a suspected user according to call record information corresponding to the suspected number; determining calling frequency information of a suspected user in the same time period at the same position according to the calling time length and the position information of the suspected user during the calling; when the called number in the called number group is determined to be a preset number, the frequency of the suspected user initiating the call exceeds a preset frequency threshold, and the call duration is a preset duration, determining that the suspected number is not a harassing number; and when the called number in the called number group is not a preset number, determining whether the suspected number is a harassing number according to the calling frequency information and the frequency preset threshold.
For example, if the preset frequency threshold is set to 4 calls within 1 minute, the suspected number 13411223344 may call multiple called numbers, and when the called number called by the suspected number 13411223344 is a preset number such as a customer service number (e.g., 10011, etc.) or an emergency number (e.g., 110, 119, etc.) of an operator, even if the frequency of calling initiated by the suspected number 13411223344 is 6 calls within 1 minute and is greater than the preset frequency threshold, the suspected number 13411223344 is not a nuisance number, because the suspected number 13411223344 does not have a bad influence on other users and does not disturb normal calls of other users.
For example, when the called number in the called number group is not a preset number, if the calling frequency information is greater than a frequency preset threshold, it is determined that the suspected number is a nuisance number; otherwise, if the calling frequency information is less than or equal to the frequency preset threshold, determining that the suspected number is not a harassing number.
It should be noted that the suspected number may be one number or multiple numbers, if the suspected user uses multiple mobile terminals to call multiple common numbers at the same time (for example, within a half of a time period from 2 pm to 2 pm) at the same position (for example, all in a 606 room of the first building), and the multiple operator nodes query their internal databases, so that the related communication information of the suspected numbers can be quickly located, the investigation and confirmation of the suspected numbers are accelerated, the interception of harassing numbers is promoted, and the normal communication of the common user is ensured.
In the embodiment, each operator node obtains customer complaint information by obtaining and sending the customer complaint information to the blockchain network; and each operator node can screen suspected numbers according to the customer complaint information, so that the troubleshooting of harassing numbers is accelerated. Acquiring fused suspected user information from a block chain network; through a communication mode of a block chain, fused suspected user information which is reported by a plurality of operator nodes and screened by each operator is obtained in the service range of the operator nodes, the investigation range of suspected numbers is expanded, and the investigation efficiency of the suspected numbers is improved. And determining whether the suspected number is a harassing number according to the fused suspected user information without manual examination, so that the operation cost is reduced while the safe use of normal users is ensured, and the development of mobile communication services is facilitated.
Fig. 2 is a schematic flow chart illustrating a method for identifying a harassment number in another embodiment of the present application. The harassment number identification method can be applied to a harassment number identification server. As shown in fig. 2, the following steps are included.
And step 210, obtaining and sending customer complaint information to the block chain network.
Step 220, obtaining fused suspected user information from the blockchain network.
And step 230, determining whether the suspected number is a harassment number according to the fused suspected user information.
It should be noted that steps 210 to 230 in this embodiment are the same as steps 110 to 130 in the previous embodiment, and are not described again here.
And 240, when the suspected number is determined to be a harassment number, generating and sending a shielding broadcast message to the block chain network according to the harassment number.
When each operator node obtains the harassing numbers in the shielding broadcast message from the block chain network, the harassing numbers are added into a blacklist to prohibit the call service of the harassing numbers.
In this embodiment, through a communication manner of a block chain, fused suspected user information that is reported by a plurality of operator nodes and screened by each operator is obtained within a service range of the plurality of operator nodes, so that a suspected number investigation range is expanded, and suspected number investigation efficiency is improved. According to the fused suspected user information, whether the suspected number is a harassing number is determined, manual examination is not needed, and the operation cost is reduced while the safe use of normal users is guaranteed; and then generating and sending a shielding broadcast message to the block chain network according to the harassment number, so that each operator node can add the harassment number to a blacklist in time, namely, the harassment number is listed as an unavailable number, the harassment number can not call a service any more, other users can be ensured not to be harassed by the harassment number, and the user experience is improved.
Fig. 3 is a flowchart illustrating a method for identifying a harassment number in yet another embodiment of the present application. The harassment number identification method can be applied to an operator node server. As shown in fig. 3, the following steps are included.
And step 310, obtaining customer complaint information sent by the harassment number identification server from the blockchain network.
The customer complaint information comprises a suspected number and call record information corresponding to the suspected number. For example, the pseudo number is 13411223344, and the call log information corresponding to the pseudo number 13411223344 may include the call duration, the called number, the start time of the call, and the geographic location information (e.g., the specific latitude and longitude information) of the user of the pseudo number 13411223344 when the call is made. The above-mentioned call record information is only an example, and may be specifically set according to the actual situation, and other call record information not described is also within the protection scope of the present application, and is not described herein again.
Step 320, determine whether the suspected number is a service user of the current operator node.
For example, from the service range of the current operator node, it is found whether a suspected number 13411223344 exists, and if so, it is determined that the suspected number 13411223344 is a service user of the current operator node; otherwise, it is determined that the suspected number 13411223344 is not a service user of the current operator node, and the current operator node cannot perform query processing on the suspected number.
It should be noted that, if it is determined that the suspected number is a service user of the current operator node, step 330 is executed; otherwise, the flow ends.
Step 330, determining information of the first suspected user according to the suspected number.
For example, the information of the first suspected user may include: the suspected number 13411223344, an identification (e.g., an identification number or the like) of the first suspected user corresponding to the suspected number 13411223344, location information of the first suspected user during a call, call log information corresponding to the suspected number, and the like.
In some implementations, determining information of the first suspected user according to the suspected number includes: inquiring a database of a current operator node according to the suspected number to obtain call record information corresponding to the suspected number and position information of a first suspected user during call; acquiring verification information of a legal organization on a first suspected user; determining an identity authentication identifier of the first suspected user according to the authentication information; and determining the information of the first suspected user according to the call record information corresponding to the suspected number, the identity verification identifier of the first suspected user and the position information of the first suspected user during the call.
The verification information of the legal organization for the first suspected user can be determined in the following way: searching a database of a current operator node, and if a first suspected user receives a verification short message record sent by a bank/government agency from the database, the first suspected user is verified to pass by a legal agency, namely the first suspected user is considered to be a legal user by the legal agency; otherwise, the legal organization does not verify the first suspected user, that is, the legal organization considers the first suspected user to be an illegal user.
Step 340, obtaining the information of the second suspected user fed back by the second operator node from the blockchain network.
It should be noted that the information of the second suspected user fed back by the second operator node may be information obtained by the second operator node searching its own database according to the customer complaint information sent by the harassment number identification server; or the comprehensive judgment may be performed through the acquired information of the third suspected user fed back by the third operator node and the customer complaint information sent by the harassment number identification server, and the acquired information of the first suspected user is fused with the information of the third suspected user, for example, the geographical location information of the first suspected user is the same as the geographical location information of the third suspected user, and both the two users initiate a call service within a certain time period. The method expands the search range of suspected numbers and improves the accuracy of troubleshooting of harassing numbers.
Step 350, generating and sending the fused suspected user information to the blockchain network according to the information of the first suspected user and the information of the second suspected user.
When the harassment number identification server obtains the fused suspected user information, whether the suspected number is a harassment number or not is determined according to the fused suspected user information. The fusing the suspected user information comprises: the method comprises the steps of identifying an operator node, a suspected number set, call record information corresponding to suspected numbers in the suspected number set, identity verification identification of suspected users corresponding to the suspected numbers and position information of the suspected users during call.
In some implementations, generating and sending fused suspected user information to a blockchain network according to information of a first suspected user and information of a second suspected user includes: extracting first position information and first call record information of a suspected user during call in the information of the first suspected user; extracting second position information and second communication record information of the suspected user when the suspected user is in communication in the information of the second suspected user; determining calling frequency information of suspected numbers in a suspected number set according to the first position information, the first call record information, the second position information and the second call record information, wherein the suspected numbers are numbers which initiate calling in the same time period at the same position; determining fused suspected user information according to the calling frequency information and a frequency preset threshold; and sending the fused suspected user information to the block chain network.
In the embodiment, customer complaint information sent by a harassing number identification server is obtained from a block chain network, a database of an operator node is queried according to the customer complaint information to determine whether a suspected number exists, and the suspected number is sent to the harassing number identification server when the suspected number is determined to exist; and/or acquiring the relevant information of the suspected numbers sent by other operator node servers, fusing the relevant information with the relevant information of the suspected numbers inquired by the database of the operator node servers, acquiring and sending the relevant information fused with the suspected numbers to the harassing number identification server, so that the harassing number identification server can comprehensively judge whether the suspected numbers have harassing numbers, further process the harassing numbers, reduce the harassment of the harassing numbers to users and improve the user experience.
Fig. 4 shows a block diagram of a harassment number identification server in an embodiment of the present application. As shown in fig. 4, the harassing number identification server specifically includes: the customer complaint information processing module 401 is configured to acquire and send customer complaint information to a blockchain network, so that each operator node acquires the customer complaint information, where the customer complaint information includes a suspected number and call record information corresponding to the suspected number; a first obtaining module 402, configured to obtain fused suspected user information from a blockchain network, where the fused suspected user information is a set of information of suspected users fed back by each operator node according to customer complaint information, and a suspected user is a user using a suspected number for a call; the identifying module 403 is configured to determine whether the suspected number is a harassment number according to the fused suspected user information.
In some implementations, the identification module 403 is specifically configured to: extracting an authentication identifier of a suspected user, call record information corresponding to the suspected number and position information of the suspected user during call in the fused suspected user information, wherein the authentication identifier is an identity identifier determined by an operator node according to authentication information of a legal organization received by the suspected user; determining whether the suspected user is a legal user according to the identity authentication identifier; when the suspected user is determined not to be a legal user, determining that the suspected number is a harassing number; and when the suspected user is a legal user, determining whether the suspected number is a harassment number according to the call record information corresponding to the suspected number and the position information of the suspected user during the call.
In some specific implementations, determining, by the identification module 403, whether the suspected number is a nuisance number according to the call record information corresponding to the suspected number and the location information of the suspected user during the call includes: determining a called number group and call duration corresponding to a call initiated by a suspected user according to call record information corresponding to the suspected number; determining calling frequency information of a suspected user in the same time period at the same position according to the calling time length and the position information of the suspected user during the calling; when the called number in the called number group is determined to be a preset number, the frequency of the suspected user initiating the call exceeds a preset frequency threshold, and the call duration is a preset duration, determining that the suspected number is not a harassing number; and when the called number in the called number group is not a preset number, determining whether the suspected number is a harassing number according to the calling frequency information and the frequency preset threshold.
In some implementations, the harassing number identification server is further configured to: and generating and sending a shielding broadcast message to the block chain network according to the harassment number so as to enable each operator node to obtain the harassment number, adding the harassment number into a blacklist, and forbidding a call service of the harassment number.
In the embodiment, customer complaint information is acquired and sent to a block chain network through a customer complaint information processing module, so that each operator node acquires the customer complaint information, wherein the customer complaint information comprises a suspected number and call record information corresponding to the suspected number; and each operator node can screen suspected numbers according to the customer complaint information, so that the troubleshooting of harassing numbers is accelerated. Acquiring fused suspected user information from a blockchain network by using a first acquisition module, wherein the fused suspected user information is a set of information of suspected users fed back by each operator node according to customer complaint information, and the suspected users are users who use suspected numbers to carry out communication; through a communication mode of a block chain, fused suspected user information which is reported by a plurality of operator nodes and screened by each operator is obtained in the service range of the operator nodes, the investigation range of suspected numbers is expanded, and the investigation efficiency of the suspected numbers is improved. The identification module is used for determining whether the suspected number is a harassing number according to the fused suspected user information without manual examination, so that the operation cost is reduced while the safe use of normal users is ensured, and the development of mobile communication services is facilitated.
Fig. 5 shows a block diagram of components of an operator node server in an embodiment of the present application. As shown in fig. 5, the operator node server specifically includes: a second obtaining module 501, configured to obtain, from a blockchain network, customer complaint information sent by a harassment number identification server, where the customer complaint information includes a suspected number and call record information corresponding to the suspected number; a judging module 502, configured to judge whether the suspected number is a service user of the current operator node, and if so, determine information of a first suspected user according to the suspected number; a third obtaining module 503, configured to obtain, from the blockchain network, information of a second suspected user fed back by a second operator node; the merging module 504 is configured to generate and send merged suspected user information to the blockchain network according to the information of the first suspected user and the information of the second suspected user, so that the harassing number identification server determines whether the suspected number is a harassing number according to the merged suspected user information.
In some specific implementations, the determining, by the determining module 502, the information of the first suspected user according to the suspected number includes: inquiring a database of a current operator node according to the suspected number to obtain call record information corresponding to the suspected number and position information of a first suspected user during call; acquiring verification information of a legal organization on a first suspected user; determining an identity authentication identifier of the first suspected user according to the authentication information; and determining the information of the first suspected user according to the call record information corresponding to the suspected number, the identity verification identifier of the first suspected user and the position information of the first suspected user during the call.
In some implementations, the fusion module 504 is specifically configured to: extracting first position information and first call record information of a suspected user during call in the information of the first suspected user; extracting second position information and second communication record information of the suspected user when the suspected user is in communication in the information of the second suspected user; determining calling frequency information of suspected numbers in a suspected number set according to the first position information, the first call record information, the second position information and the second call record information, wherein the suspected numbers are numbers which initiate calling in the same time period at the same position; determining fused suspected user information according to the calling frequency information and a frequency preset threshold; and sending the fused suspected user information to the block chain network.
In some implementations, fusing the suspected user information includes: the method comprises the steps of identifying an operator node, a suspected number set, call record information corresponding to suspected numbers in the suspected number set, identity verification identification of suspected users corresponding to the suspected numbers and position information of the suspected users during call.
In this embodiment, the second obtaining module obtains customer complaint information sent by the harassing number identification server from the blockchain network, and queries a database of an operator node according to the customer complaint information to determine whether a suspected number exists, and sends the suspected number to the harassing number identification server when the suspected number is determined to exist; and/or the acquired relevant information of the suspected numbers sent by the other operator node servers is fused with the relevant information of the suspected numbers inquired by the database of the user by using a fusion module, and the relevant information fused with the suspected numbers is acquired and sent to the harassing number identification server, so that the harassing number identification server can comprehensively judge whether harassing numbers exist in the suspected numbers, further the harassing numbers are processed, the harassment of the harassing numbers to users is reduced, and the user experience is improved.
It should be noted that each module referred to in this embodiment is a logical module, and in practical applications, one logical unit may be one physical unit, may be a part of one physical unit, and may be implemented by a combination of multiple physical units. In addition, in order to highlight the innovative part of the present application, a unit that is not so closely related to solving the technical problem proposed by the present application is not introduced in the present embodiment, but it does not indicate that no other unit exists in the present embodiment.
Fig. 6 is a block diagram showing a component of a disturbance number identification system in an embodiment of the present application. As shown in fig. 6, includes: the system comprises a first operator node server 601, a second operator node server 602, a third operator node server 603 and a harassing number identification server 604 which are connected through a blockchain network.
Fig. 7 is a flowchart illustrating a working method of a harassment number identification system in an embodiment of the present application. As shown in fig. 7, the method specifically includes the following steps.
In step 701, the harassment number identification server 604 acquires customer complaint information from the blockchain network, signs the customer complaint information with a private key of the harassment number identification server, and generates and sends the signed customer complaint information to the blockchain network, so that each operator node (for example, the first operator node server 601, the second operator node server 602, and the third operator node server 603) acquires the customer complaint information.
The customer complaint information is complaint information of the customer for some telephone numbers or a certain telephone number, and the customer complaint information may include a suspected number and call record information (for example, call time of the suspected number, etc.) corresponding to the suspected number.
Step 702, after receiving the customer complaint information signed by the first operator node server 601, verifying the private key signature, when the verification is passed, obtaining a first suspected number and the calling time of the first suspected number, if it is determined that the first suspected number is the number of the communication service provided by the first operator node server 601, the first operator node server 601 queries its own database according to the first suspected number, extracts the call record information corresponding to the first suspected number and the location information of the first suspected user corresponding to the first suspected number, and obtains the verification information of the first suspected user by the legal organization (for example, if the first suspected user receives the verification short message record sent by the bank/government organization from the database, it indicates that the verification of the first suspected user by the legal organization is passed, i.e. the legal organization considers that the first suspected user is the legal user, otherwise, the first suspected user is not verified by the legal organization, namely the first suspected user is considered as an illegal user by the legal organization); then, a set of initial suspected numbers initiating a call in the same geographic location in the same time period is determined according to the information (i.e., the call record information corresponding to the first suspected number, the location information of the first suspected user during the call, and the verification information of the first suspected user by the legal organization), where it should be noted that the initial suspected numbers may be abnormal numbers in which the call initiating frequency in the same cell or a neighboring cell exceeds a preset threshold.
Step 703, generating a first broadcast message according to the call record information corresponding to the first suspected number queried in step 702, the location information of the first suspected user during the call, and the set of the verification information of the legal organization on the first suspected user and the initial suspected number; then, the private key of the first operator node server 601 is used to sign the first broadcast message, and the signed first broadcast message is generated and sent to the blockchain network, so that the second operator node server 602 obtains the first broadcast message.
Wherein the first broadcast message includes the following information: the identifier of the first operator node server 601, the first suspected number queried in step 702, the call record information corresponding to the first suspected number, the location information of the first suspected user when the first suspected user makes a call, and the set of the authentication information of the legal organization for the first suspected user and the initial suspected number.
Step 704, after acquiring the first broadcast message from the blockchain network, the second operator node server 602 verifies the private key signature of the first broadcast message, and when the first broadcast message passes the verification, analyzes the first broadcast message to obtain the position information of the first suspected user during the call, the call record information corresponding to the first suspected number, and a set of initial suspected numbers; then, querying a database of a second operator node 602 according to the location information of the first suspected user during the call and the call record information corresponding to the first suspected number, and obtaining the call record information corresponding to the second suspected number in the set of second suspected numbers, the location information of the second suspected user during the call, and the call frequency information of the second suspected number in the set of second suspected numbers, where the second suspected numbers are all numbers initiating calls in the same time period at the same location; and determining a fused suspected number set according to the calling frequency information and a frequency preset threshold (for example, the number of times of calling initiated in each minute is 5 times, and the like).
It should be noted that the fused suspected number set may be a subset of the initial suspected number set, or may be the initial suspected number set, and the fused suspected number in the specific fused suspected number set is determined according to a query result obtained by querying the database by the second operator node 602.
Step 705, generating a second broadcast message according to the fused suspected number set, the identifier of the second operator node 602, the call record information corresponding to the fused suspected number in the fused suspected number set, the acquired identity verification identifier of the fused suspected user corresponding to the fused suspected number, and the position information of the fused suspected user during the call; then, the private key of the second operator node server 602 is used to sign the second broadcast message, and the signed second broadcast message is generated and sent to the block chain network, so that the harassment number identification server 604 obtains the second broadcast message.
It should be noted that, while the first operator node server 601 executes step 702 and step 703, the third operator node server 603 also queries its own database to determine the specific information of the suspected number, and steps 706 to 707 executed by the third operator node server 603 are the same as steps 702 to 703, and are not repeated here, so that the harassing number identification server 604 can obtain the third broadcast message sent by the third operator node server 603. The third broadcast message includes: the third suspected number, the call record information corresponding to the third suspected number, the position information of the third suspected user during the call, and the verification information of the legal organization on the third suspected user and the set of the initial suspected numbers.
In some specific implementations, the third operator node server 603 may also obtain, through the blockchain network, the first broadcast message sent by the first operator node server 601, or the second broadcast message sent by the second operator node server 602; then, step 706 to step 707 are executed, it should be noted that, step 706 to step 707 are the same as the operation methods of step 704 to step 705, and the difference is that the database queried in step 706 to step 707 is the database of the third operator node server 603, so as to more accurately narrow the range of the suspected number, and facilitate the subsequent processing of the harassment number identification server 604.
In step 708, the harassment number identification server 604 obtains the second broadcast message sent by the second operator node server 602 and the third broadcast message sent by the third operator node server 603 from the blockchain network, respectively. When the private key signatures of the two broadcast messages pass verification, the following information is obtained: fusing a suspected number set, the identifier of the second operator node 602, the call record information corresponding to the fused suspected number in the suspected number set, the obtained identity verification identifier of the fused suspected user corresponding to the fused suspected number, and the position information of the fused suspected user during the call; the third suspected number, the call record information corresponding to the third suspected number, the position information of the third suspected user during the call, and the verification information of the legal organization on the third suspected user and the set of the initial suspected numbers.
Then, when the suspected user is not a legal user, the suspected number is determined to be a nuisance number. When the suspected user is a legal user, determining a called number group and call duration corresponding to a call initiated by the suspected user according to the call record information corresponding to the suspected number; determining calling frequency information of a suspected user in the same time period at the same position according to the calling time length and the position information of the suspected user during the calling;
when it is determined that the called number in the called number group is a preset number (e.g., an emergency call number such as 110, 119, or the like, or a customer number of an operator, or the like), the frequency of initiating a call by a suspected user exceeds a preset frequency threshold (e.g., the preset frequency threshold is 5 times, or 10 times, or the like, of initiating a call per minute), and the duration of a call is a preset duration (e.g., 15 seconds, 60 seconds, or 30 minutes, or the like), it is determined that the suspected number is a test number, not a nuisance number.
When the called number in the called number group is not a preset number, if the calling frequency information is greater than a frequency preset threshold value, determining that the suspected number is a harassing number; otherwise, determining that the suspected number is not a harassing number.
In step 709, the harassment number identification server 604 generates and sends a screening broadcast message to the block chain network according to the harassment number determined in step 708, so that the first operator node server 601, the second operator node server 602, and the third operator node server 603 obtain the harassment number, add the harassment number to the blacklist, and prohibit the call service of the harassment number.
In the embodiment, customer complaint information is sent to the blockchain network through the harassing number identification server, so that each operator node server in the blockchain network can inquire a database of the operator node server through the customer complaint information to determine whether a suspected number exists or not, and when the suspected number exists, the suspected number is sent to the harassing number identification server; and/or acquiring the relevant information of the suspected numbers sent by other operator node servers, fusing the relevant information with the relevant information of the suspected numbers inquired by a database in the operator node server, acquiring and sending the relevant information fused with the suspected numbers to the harassing number identification server, so that the harassing number identification server can comprehensively judge whether the suspected numbers have harassing numbers, further process the harassing numbers, reduce the harassment of the harassing numbers to users and improve the user experience.
It is to be understood that the above embodiments are merely exemplary embodiments that are employed to illustrate the principles of the present application, and that the present application is not limited thereto. It will be apparent to those skilled in the art that various changes and modifications can be made therein without departing from the spirit and scope of the application, and these changes and modifications are to be considered as the scope of the application.

Claims (10)

1. A method for identifying a harassment number, the method comprising:
the method comprises the steps of obtaining and sending customer complaint information to a block chain network so that each operator node can obtain the customer complaint information, wherein the customer complaint information comprises suspected numbers and call record information corresponding to the suspected numbers;
acquiring fused suspected user information from the blockchain network, wherein the fused suspected user information is a set of information of suspected users fed back by each operator node according to the customer complaint information, and the suspected users are users who use the suspected numbers to carry out communication;
and determining whether the suspected number is a harassment number or not according to the fused suspected user information.
2. The method of claim 1, wherein said determining whether said suspected number is a nuisance number based on said fused suspected user information comprises:
extracting an authentication identifier of the suspected user, call record information corresponding to the suspected number and position information of the suspected user during call in the fused suspected user information, wherein the authentication identifier is an identity identifier determined by the operator node according to authentication information of a legal organization received by the suspected user;
determining whether the suspected user is a legal user according to the identity authentication identifier;
when the suspected user is determined not to be the legal user, determining that the suspected number is the harassment number;
and when the suspected user is the legal user, determining whether the suspected number is the harassment number according to the call record information corresponding to the suspected number and the position information of the suspected user during the call.
3. The method according to claim 2, wherein the determining whether the suspected number is the harassment number according to the call record information corresponding to the suspected number and the location information of the suspected user during the call comprises:
determining a called number group and a call duration corresponding to a call initiated by the suspected user according to the call record information corresponding to the suspected number;
determining calling frequency information of the suspected user in the same time period at the same position according to the calling time length and the position information of the suspected user during the calling;
when the called number in the called number group is determined to be a preset number, the frequency of the call initiated by the suspected user exceeds a preset frequency threshold, and the call duration is a preset duration, determining that the suspected number is not the harassing number;
and when the called number in the called number group is not the preset number, determining whether the suspected number is the harassment number or not according to the calling frequency information and the frequency preset threshold.
4. The method of claim 2, wherein the step of determining that the suspected number is the nuisance number is followed by the step of:
and generating and sending a shielding broadcast message to the block chain network according to the harassment number so that each operator node obtains the harassment number, adding the harassment number into a blacklist, and forbidding a call service of the harassment number.
5. A method for identifying a harassment number, the method comprising:
obtaining customer complaint information sent by a harassment number identification server from a blockchain network, wherein the customer complaint information comprises suspected numbers and call record information corresponding to the suspected numbers;
judging whether the suspected number is a service user of the current operator node, if so, determining information of a first suspected user according to the suspected number;
obtaining information of a second suspected user fed back by a second operator node from the block chain network;
and generating and sending fused suspected user information to the block chain network according to the information of the first suspected user and the information of the second suspected user, so that the harassing number identification server determines whether the suspected number is a harassing number according to the fused suspected user information.
6. The method of claim 5, wherein the determining information of the first suspected user according to the suspected number comprises:
inquiring a database of the current operator node according to the suspected number to obtain call record information corresponding to the suspected number and position information of the first suspected user during call;
acquiring the verification information of a legal organization on the first suspected user;
determining an identity authentication identifier of the first suspected user according to the authentication information;
and determining the information of the first suspected user according to the call record information corresponding to the suspected number, the identity verification identifier of the first suspected user and the position information of the first suspected user during the call.
7. The method according to claim 6, wherein the generating and sending fused suspected user information to the blockchain network according to the information of the first suspected user and the information of the second suspected user comprises:
extracting first position information and first call record information of the suspected user during call in the information of the first suspected user;
extracting second position information and second communication record information of the suspected user during communication in the information of the second suspected user;
determining calling frequency information of suspected numbers in a suspected number set according to the first position information, the first call record information, the second position information and the second call record information, wherein the suspected numbers are numbers which initiate calls in the same time period at the same position;
determining the fused suspected user information according to the calling frequency information and a preset frequency threshold;
and sending the fused suspected user information to the block chain network.
8. The method of claim 7, wherein the fusing the suspected user information comprises: the method comprises the steps of identifying an operator node, the suspected number set, call record information corresponding to suspected numbers in the suspected number set, identity verification identification of suspected users corresponding to the suspected numbers and position information of the suspected users during call.
9. A harassment number identification server, comprising:
the client complaint information processing module is used for acquiring and sending client complaint information to a block chain network so that each operator node can acquire the client complaint information, wherein the client complaint information comprises a suspected number and call record information corresponding to the suspected number;
a first obtaining module, configured to obtain fused suspected user information from the blockchain network, where the fused suspected user information is a set of information of suspected users fed back by each operator node according to the customer complaint information, and the suspected users are users who use the suspected numbers to perform a call;
and the identification module is used for determining whether the suspected number is a harassing number according to the fused suspected user information.
10. An operator node server, comprising:
the second obtaining module is used for obtaining customer complaint information sent by a harassment number identification server from a blockchain network, wherein the customer complaint information comprises a suspected number and call record information corresponding to the suspected number;
the judging module is used for judging whether the suspected number is a service user of the current operator node, and if so, determining information of a first suspected user according to the suspected number;
a third obtaining module, configured to obtain, from the blockchain network, information of a second suspected user fed back by a second operator node;
and the fusion module is used for generating and sending fused suspected user information to the block chain network according to the information of the first suspected user and the information of the second suspected user, so that the harassing number identification server determines whether the suspected number is a harassing number according to the fused suspected user information.
CN202011124172.1A 2020-10-20 2020-10-20 Harassment number identification method and server Active CN112153222B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011124172.1A CN112153222B (en) 2020-10-20 2020-10-20 Harassment number identification method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011124172.1A CN112153222B (en) 2020-10-20 2020-10-20 Harassment number identification method and server

Publications (2)

Publication Number Publication Date
CN112153222A true CN112153222A (en) 2020-12-29
CN112153222B CN112153222B (en) 2021-10-22

Family

ID=73954068

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011124172.1A Active CN112153222B (en) 2020-10-20 2020-10-20 Harassment number identification method and server

Country Status (1)

Country Link
CN (1) CN112153222B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114819911A (en) * 2022-05-16 2022-07-29 中国联合网络通信集团有限公司 Complaint work order information query method and device, electronic equipment and storage medium
WO2024001816A1 (en) * 2022-06-30 2024-01-04 华为技术有限公司 Message processing method and electronic device

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2028911A2 (en) * 2007-07-05 2009-02-25 Samsung Electronics Co., Ltd. Apparatus and method for providing Subscriber Identity Module (SIM) application toolkit service in mobile communication system
CN101472007A (en) * 2007-12-28 2009-07-01 中国移动通信集团公司 Method and system for determining disturbance telephone
US20110211685A1 (en) * 2008-10-27 2011-09-01 Chengdu Huawei Symantec Technologies Co., Ltd. Method, apparatus, proxy server and terminal for filtering out spam call
CN104038648A (en) * 2014-06-06 2014-09-10 陈伟 Method and device for recognizing crank calls
CN104066065A (en) * 2014-07-02 2014-09-24 深圳市中兴移动通信有限公司 Anti harassment incoming call/ information mobile terminal and anti harassment incoming call/ information method
CN105100514A (en) * 2015-09-01 2015-11-25 北京乐动卓越科技有限公司 Caller ID analyzing-reminding method and system based on cloud server database
US20170006155A1 (en) * 2002-08-08 2017-01-05 Globel Tel*Link Corp. Telecommunication Call Management and Monitoring System With Voiceprint Verification
CN106791231A (en) * 2016-11-30 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of harassing call treating method and apparatus
CN108810233A (en) * 2018-07-10 2018-11-13 郑友缘 A kind of recognition methods of malice incoming call and device
CN108924333A (en) * 2018-06-12 2018-11-30 阿里巴巴集团控股有限公司 Fraudulent call recognition methods, device and system
CN109600520A (en) * 2017-09-30 2019-04-09 上海触乐信息科技有限公司 Harassing call number identification method, device and equipment
CN109769244A (en) * 2019-01-08 2019-05-17 中国联合网络通信集团有限公司 Recognition methods, device, equipment and the readable storage medium storing program for executing of abnormal phonecard

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170006155A1 (en) * 2002-08-08 2017-01-05 Globel Tel*Link Corp. Telecommunication Call Management and Monitoring System With Voiceprint Verification
EP2028911A2 (en) * 2007-07-05 2009-02-25 Samsung Electronics Co., Ltd. Apparatus and method for providing Subscriber Identity Module (SIM) application toolkit service in mobile communication system
CN101472007A (en) * 2007-12-28 2009-07-01 中国移动通信集团公司 Method and system for determining disturbance telephone
US20110211685A1 (en) * 2008-10-27 2011-09-01 Chengdu Huawei Symantec Technologies Co., Ltd. Method, apparatus, proxy server and terminal for filtering out spam call
CN104038648A (en) * 2014-06-06 2014-09-10 陈伟 Method and device for recognizing crank calls
CN104066065A (en) * 2014-07-02 2014-09-24 深圳市中兴移动通信有限公司 Anti harassment incoming call/ information mobile terminal and anti harassment incoming call/ information method
CN105100514A (en) * 2015-09-01 2015-11-25 北京乐动卓越科技有限公司 Caller ID analyzing-reminding method and system based on cloud server database
CN106791231A (en) * 2016-11-30 2017-05-31 宇龙计算机通信科技(深圳)有限公司 A kind of harassing call treating method and apparatus
CN109600520A (en) * 2017-09-30 2019-04-09 上海触乐信息科技有限公司 Harassing call number identification method, device and equipment
CN108924333A (en) * 2018-06-12 2018-11-30 阿里巴巴集团控股有限公司 Fraudulent call recognition methods, device and system
CN108810233A (en) * 2018-07-10 2018-11-13 郑友缘 A kind of recognition methods of malice incoming call and device
CN109769244A (en) * 2019-01-08 2019-05-17 中国联合网络通信集团有限公司 Recognition methods, device, equipment and the readable storage medium storing program for executing of abnormal phonecard

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114819911A (en) * 2022-05-16 2022-07-29 中国联合网络通信集团有限公司 Complaint work order information query method and device, electronic equipment and storage medium
WO2024001816A1 (en) * 2022-06-30 2024-01-04 华为技术有限公司 Message processing method and electronic device

Also Published As

Publication number Publication date
CN112153222B (en) 2021-10-22

Similar Documents

Publication Publication Date Title
CN101730904B (en) Correlation and analysis of entity attributes
CN112153222B (en) Harassment number identification method and server
US20080292077A1 (en) Detection of spam/telemarketing phone campaigns with impersonated caller identities in converged networks
CN106789855A (en) The method and device of user login validation
CN106162649A (en) A kind of identify the method for WAP legitimacy, terminal and system
CA3131418C (en) Validating telephone calls by verifying entity identities using blockchains
CN109245897B (en) Node authentication method and device based on non-interactive zero-knowledge proof
CN108259680B (en) Fraud call identification method and device and server for identifying fraud calls
CN112437428B (en) Verification method and server
US8483672B2 (en) System and method for selective monitoring of mobile communication terminals based on speech key-phrases
CN110943840B (en) Signature verification method
CN109961541A (en) A kind of method of access control, computer equipment and readable storage medium storing program for executing
CN111726359B (en) Account information detection method and device
CN108234525A (en) A kind of information leakage preventing theft protection management system in computer network security
CN111918287A (en) Information processing method and device
CN106921633A (en) Calling number Verification System and method
CN113342892A (en) Cloud security data processing method based on block chain node cluster and block chain system
CN115694932A (en) Method and equipment for realizing community sensitive data protection based on block chain technology
CN107105430A (en) A kind of number authentication method and device
CN114168423A (en) Abnormal number calling monitoring method, device, equipment and storage medium
CN108235310A (en) Method, server and the system of identification camouflage telephone number
CN107888576B (en) Anti-collision library safety risk control method using big data and equipment fingerprints
CN109587683A (en) Method and system, application program and the terminal information database of the anti-monitoring of short message
CN105429978A (en) Data access methods and system, and equipment
CN107995616B (en) User behavior data processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant