Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
The terminal retrieving method, the device and the network equipment provided by the embodiment of the invention can retrieve the terminal of the user, wherein the terminal can be a mobile phone, a personal computer, a palm computer and the like.
Fig. 1 shows a flowchart of a terminal retrieving method according to an embodiment of the present invention. The method is applied to network equipment, wherein the network equipment can be network equipment of an operator. As shown in fig. 1, the method comprises the steps of:
step 110, obtaining loss report information, wherein the loss report information comprises a first number.
When the mobile phone is lost, the user goes to the service provider business hall to report the lost mobile phone number and subsidizes the SIM card, and then the user obtains the lost number again. And acquiring loss reporting information, wherein the loss reporting information comprises a first number, and the first number is a lost number.
And step 120, acquiring identification information of the first terminal corresponding to the first number according to the loss report information.
The first terminal corresponding to the first number is a terminal using the first number before loss report, and the identification information of the first terminal may be an identification code of the terminal. Each terminal such as a mobile phone and a computer has a specific code, namely an identification code.
In this embodiment, the identification information of the first terminal is an International Mobile Equipment Identity (IMEI) of the first terminal. The IMEI is a mobile phone serial number, and is used for identifying mobile communication devices such as individual mobile phones in a mobile phone network, and corresponds to an "identity card" of a mobile phone. The IMEI is generally attached to the back of the body and the outer package, and is also stored in the mobile phone memory, and can be queried by inputting #06 #. When a mobile phone or other terminals are inserted into the SIM card for use, network authentication operation is required to be carried out firstly, and then a mapping relation between the mobile phone number and the IMEI is generated, so that the mobile phone using number can be determined according to the IMEI by utilizing the mapping relation. Then in step 120, it may be: and according to the loss report information, obtaining the IMEI which has a mapping relation with the mobile phone number in the historical information record, thereby obtaining the IMEI of the first terminal corresponding to the first number.
Optionally, the user may also prestore the IMEI of the mobile phone in advance, or report the IMEI of the terminal in an online or online manner after a loss is reported. Then in step 120, it may also be: according to the loss reporting information, obtaining a prestored IMEI (international mobile equipment identity) of the first terminal corresponding to the first number in a database; or receiving the IMEI of the first terminal corresponding to the first number input by the user according to the loss report information, thereby acquiring the IMEI of the first terminal.
Step 130, obtaining the searching information of the first terminal from the operator database according to the identification information of the first terminal, and sending the searching information of the first terminal.
The search information of the first terminal may be a currently used number of the first terminal or other related information (e.g., an activity location range, a circle of contact, etc.). Sending the search information of the first terminal may specifically be: and sending the searching information of the first terminal to the first number, or sending the searching information of the first terminal to a number reserved by a user, so that the user can find the first terminal according to the searching information of the first terminal.
According to the embodiment of the invention, the loss reporting information is acquired through the network equipment, the loss reporting information comprises the first number, the identification information of the first terminal corresponding to the first number is acquired according to the loss reporting information, the searching information of the first terminal is acquired from the operator database according to the identification information of the first terminal, and the searching information of the first terminal is sent to be sent, no additional setting is required to be carried out on the terminal, and the operability is strong.
Fig. 2 shows a flowchart of a terminal retrieving method according to another embodiment of the present invention. The method is applied to network equipment, wherein the network equipment can be network equipment of an operator. As shown in fig. 2, the method comprises the steps of:
step 210, obtaining loss report information, wherein the loss report information comprises a first number.
And step 220, acquiring identification information of the first terminal corresponding to the first number according to the loss report information.
And 231, acquiring the use information of the first terminal according to the identification information of the first terminal.
The usage information may be information obtained through the identification information of the first terminal, and may be track information, internet access information, and the like. The usage information of the first terminal includes usage information before the first terminal is reported to be lost and usage information after the first terminal is reported to be lost. Then, the obtaining of the usage information of the first terminal may specifically be: and obtaining the use information before the loss report from the historical record information according to the identification information of the first terminal, and obtaining the use information of the first terminal within the preset time after determining that the first terminal is in the use state according to the identification information of the first terminal to obtain the use information after the loss report. Wherein the preset time may be one week.
Further, the identification information of the first terminal may be added to a monitoring library, the identification information of the on-network terminal and the identification information in the monitoring library are matched every day, and if the matching is successful, the terminal is determined to be in a use state.
Step 232, generating a user portrait before the loss report and a user portrait after the loss report according to the use information of the first terminal.
And carrying out user identity portrait on the first terminal according to the use information of the first terminal before loss report to generate a user portrait before loss report, carrying out user identity portrait on the first terminal according to the use information of the first terminal after loss report to generate a user portrait after loss report.
And 233, judging whether the first terminal is a lost terminal or not according to the user portrait before the loss report and the user portrait after the loss report.
To avoid a false loss due to a false operation or mischief, a false alarm detection needs to be performed on the loss reporting terminal to determine that the loss reporting terminal is actually lost. As shown in fig. 3, step 233 may specifically include:
step 2331, obtaining feature information from the user portrait before the loss report and the user portrait after the loss report, respectively;
step 2332, inputting the characteristic information into a preset identification model;
step 2333, if the output result of the preset recognition model is different users, determining that the first terminal is a lost terminal;
step 2334, if the output result of the preset recognition model is the same user, determining that the first terminal is not a lost terminal.
Specifically, the feature information of the user portrait before the loss report and the feature information of the user portrait after the loss report are respectively acquired, and the feature information of the user portrait before the loss report and the feature information of the user portrait after the loss report are input into a preset recognition model, so that the preset recognition model outputs a coincidence value (or a difference value), and an output result is obtained according to the coincidence value (or the difference value). The coincidence value (or the difference value) can be represented by a numerical value between 0 and 1, if the coincidence value is closer to 1 (or the difference value is closer to 0), the similarity degree of the characteristic information is higher, and if the coincidence value is greater than a preset similarity threshold (or the difference value is smaller than the preset similarity threshold), the output result is the same user; on the contrary, if the coincidence value is closer to 0 (or the difference value is closer to 1), the lower the similarity degree of the feature information is indicated, and if the coincidence value is smaller than the preset similarity threshold (or the difference value is larger than the preset similarity threshold), the result is output as a different user. Through the mode, when the mobile phone is lost and then retrieved and used by a user, or the mobile phone is lost by mistake, the false alarm monitoring can be carried out to determine whether the terminal is lost indeed.
The characteristic information comprises one or more of numbers, names, identification numbers, face recognition data, contact circles, residence places, work places, application programs, use duration and trust degrees. Wherein, the circle of contact can be a number with high communication frequency. The preset recognition model may compare the similarity of each feature information, such as the number, the name, the identification number, the face recognition data, the circle of contact, the place of residence, the place of employment, the application program, the duration of use, the trust level, and the like, to obtain an output result. The preset identification model can be obtained by training by acquiring identification information of the terminal determined to be lost as sample data.
Further, as shown in fig. 3, the method further includes:
step 2335, if it is determined that the first terminal is a lost terminal, training a preset recognition model based on the user portrait before the loss report and the user portrait after the loss report;
and 2336, updating the preset recognition model according to the training result.
After the first terminal is determined to be a lost terminal in step 2333, the user portrait before the loss report and the user portrait after the loss report are used as sample data, the preset recognition model is trained, and the original preset recognition model is updated by the trained preset recognition model, so that the accuracy of the preset recognition model can be improved.
Step 234, if the first terminal is determined to be the lost terminal, obtaining the search information of the first terminal from the operator database, and sending the search information of the first terminal.
And 235, if the first terminal is determined not to be the lost terminal, stopping acquiring the use information of the first terminal.
And for the terminal which fails in false alarm detection, if the terminal is not qualified to the loss condition, removing the identification information of the terminal from the monitoring library, thereby stopping obtaining the use information of the terminal. Optionally, the first number may be notified that monitoring has stopped, and the user may apply for joining the monitoring library again after updating the information after confirming the notification result.
The embodiment of the invention obtains the loss reporting information which comprises a first number, obtains the identification information of a first terminal corresponding to the first number according to the loss reporting information, obtains the use information of the first terminal according to the identification information of the first terminal, generates a user portrait before loss reporting and a user portrait after loss reporting according to the use information of the first terminal, judges whether the first terminal is a lost terminal according to the user portrait before loss reporting and the user portrait after loss reporting, obtains the search information of the first terminal from an operator database if the first terminal is determined to be the lost terminal, and sends the search information of the first terminal.
In some embodiments, the user needs to be authenticated before the first terminal is monitored. Then, before step 220, as shown in fig. 4, the method further comprises:
step 241, obtaining identity authentication information;
step 242, judging whether the identity authentication information passes;
and 243, if the identity authentication information passes, acquiring the identification information of the first terminal corresponding to the first number.
The identity authentication information is input by a user, and the identity authentication information can comprise one or more of numbers, names, identity card numbers, face recognition data, circle of contact, residence and loss time. Then, judging whether the identity authentication information passes, specifically may be: and matching the identity authentication information based on the big data information, wherein if the identity authentication information is successfully matched, the identity authentication information passes, and the user is indicated as the owner user. Through carrying out authentication, can prevent that non-owner user from carrying out maliciously and reporting the loss.
Fig. 5 is a flowchart illustrating an application of the terminal retrieving method according to the embodiment of the present invention. The mobile phone (first terminal) of a certain user is stolen to cause loss, the user reports the lost mobile phone number to a business hall, and the SIM card is repaired to obtain the original lost number (first number), at the moment, the user buys a new mobile phone (second terminal) and uses the original lost number on the new mobile phone; and the lost handset (first terminal) is used because of the original lost number, and the new number (second number) is replaced to continue using. The method is applied to network equipment, wherein the network equipment can be network equipment of an operator. As shown in fig. 5, the method comprises the steps of:
step 301, obtaining loss report information of a user, wherein the loss report information comprises a first number;
step 302, obtaining the identity authentication information of the user;
wherein the authentication information includes: the mobile phone number, the name of a householder, the identity card number, the face recognition of the user, the number of 5 contact circles, the residence place, the approximate lost time and the like.
Step 303, if the identity authentication information passes, acquiring the IMEI of the first terminal, and adding the IMEI of the first terminal to a monitoring library;
step 304, matching the IMEI of the online mobile phone with the IMEI of the first terminal, if the matching is successful, marking the IMEI which is successfully matched and continuously monitoring for one week;
305, analyzing all-dimensional user portrait information such as the identity information of a householder, a circle of contact, a residence, daily use duration, internet surfing preference and the like of the IMEI based on a big data technology according to the communication, track and internet surfing behavior of the number corresponding to the IMEI of the first terminal, and generating a lost user portrait;
for example, a communication circle dimension is formed by using the number of the opposite end of the call in the monitoring period; forming dimensions of a workplace and a residence by utilizing the track residence condition; by utilizing the internet surfing behavior, the application use preference and the daily average use duration dimension are formed, so that the identity of the user is truly reflected.
Step 306, acquiring the use information of the first terminal before the loss report from the historical record information according to the IMEI of the first terminal, and generating a user portrait before the loss report;
step 307, extracting feature information from the user portrait before loss report and the user portrait after loss report, and performing feature integration;
wherein the feature integration comprises: whether the number is the same, whether the name is the same, whether the identity card number is the same, whether the face is the same, contact circle contact degree, whether the place of residence is the same, whether the place of work is the same, APP use contact degree, long time contact degree of use, credit degree difference, income difference, telephone charge difference and the like.
Step 308, inputting the data after feature integration into a preset identification model;
step 309, if the output results of the preset recognition models are different users, determining that the first terminal is a lost terminal;
and 310, acquiring the activity place range and the second number of the first terminal, and sending the activity place range and the second number to the first number to be used as a retrieval basis of the user.
The embodiment of the invention obtains the loss reporting information which comprises a first number, obtains the identification information of a first terminal corresponding to the first number according to the loss reporting information, obtains the use information of the first terminal according to the identification information of the first terminal, generates a user portrait before loss reporting and a user portrait after loss reporting according to the use information of the first terminal, judges whether the first terminal is a lost terminal according to the user portrait before loss reporting and the user portrait after loss reporting, obtains the search information of the first terminal if the first terminal is determined to be the lost terminal, and sends the search information of the first terminal to the first number.
Fig. 6 is a schematic structural diagram of a terminal retrieving device according to an embodiment of the present invention. As shown in fig. 5, the apparatus 400 includes: a loss reporting module 410, an identification information obtaining module 420 and a finding information sending module 430.
The loss reporting module 410 is configured to obtain loss reporting information, where the loss reporting information includes a first number; the identification information obtaining module 420 is configured to obtain identification information of the first terminal corresponding to the first number according to the loss report information; the search information sending module 430 is configured to obtain search information of the first terminal from an operator database according to the identification information of the first terminal, and send the search information of the first terminal.
In an alternative manner, the finding information sending module 430 includes: a usage information acquiring unit, a portrait unit, and a judging unit. The using information acquiring unit is used for acquiring the using information of the first terminal according to the identification information of the first terminal; the portrait unit is used for generating a user portrait before the loss report and a user portrait after the loss report according to the use information of the first terminal; the judging unit is used for judging whether the first terminal is a lost terminal or not according to the user portrait before loss report and the user portrait after loss report; and the searching information sending unit is used for acquiring the searching information of the first terminal from an operator database and sending the searching information of the first terminal if the searching information sending unit is used for acquiring the searching information of the first terminal from the operator database.
In an optional manner, the determining unit is specifically configured to: respectively acquiring characteristic information from the user portrait before loss report and the user portrait after loss report; inputting the characteristic information into a preset identification model; if the output result of the preset identification model is different users, determining that the first terminal is a lost terminal; and if the output result of the preset recognition model is the same user, determining that the first terminal is not a lost terminal.
In an optional manner, the apparatus 400 further comprises: the device comprises a training module and an updating module. The training module is used for training the preset recognition model based on the user portrait before the loss report and the user portrait after the loss report if the first terminal is determined to be the lost terminal; and the updating module is used for updating the preset recognition model according to the training result.
In an alternative mode, the characteristic information comprises one or more of numbers, names, identification numbers, face recognition data, circle of contact, residence, place of work, application programs, use duration and trust level.
In an optional manner, the finding information sending module 430 further includes: the monitoring unit is stopped. And the monitoring stopping module is used for stopping acquiring the use information of the first terminal if the first terminal is determined not to be the lost terminal.
In an optional manner, the apparatus 400 further comprises: the device comprises a verification information acquisition module, a verification module and a passing module. The authentication information acquisition module is used for acquiring authentication information, wherein the authentication information comprises one or more of a number, a name, an identity card number, face recognition data, a circle of contact, a place of residence and loss time; the verification module is used for judging whether the identity verification information passes or not; the passing module is used for acquiring the identification information of the first terminal corresponding to the first number if the identity authentication information passes.
In an alternative, the identification information of the first terminal includes an international mobile equipment identity of the first terminal.
It should be noted that the terminal retrieving device provided in the embodiments of the present invention is a device capable of executing the terminal retrieving method, and all embodiments of the terminal retrieving method are applicable to the device and can achieve the same or similar beneficial effects.
According to the embodiment of the invention, the loss reporting information is acquired through the network equipment, the loss reporting information comprises the first number, the identification information of the first terminal corresponding to the first number is acquired according to the loss reporting information, the searching information of the first terminal is acquired from the operator database according to the identification information of the first terminal, and the searching information of the first terminal is sent to be sent, no additional setting is required to be carried out on the terminal, and the operability is strong.
An embodiment of the present invention provides a computer storage medium, where at least one executable instruction is stored in the storage medium, and the executable instruction enables a processor to execute the terminal retrieving method in any of the above method embodiments.
According to the embodiment of the invention, the loss reporting information is acquired through the network equipment, the loss reporting information comprises the first number, the identification information of the first terminal corresponding to the first number is acquired according to the loss reporting information, the searching information of the first terminal is acquired from the operator database according to the identification information of the first terminal, and the searching information of the first terminal is sent to be sent, no additional setting is required to be carried out on the terminal, and the operability is strong.
An embodiment of the present invention provides a computer program product, which includes a computer program stored on a computer storage medium, where the computer program includes program instructions, and when the program instructions are executed by a computer, the computer executes the terminal retrieving method in any of the above-mentioned method embodiments.
According to the embodiment of the invention, the loss reporting information is acquired through the network equipment, the loss reporting information comprises the first number, the identification information of the first terminal corresponding to the first number is acquired according to the loss reporting information, the searching information of the first terminal is acquired from the operator database according to the identification information of the first terminal, and the searching information of the first terminal is sent to be sent, no additional setting is required to be carried out on the terminal, and the operability is strong.
Fig. 7 is a schematic structural diagram of a network device according to an embodiment of the present invention, and the specific embodiment of the present invention does not limit the specific implementation of the network device.
As shown in fig. 7, the network device may include: a processor (processor)502, a Communications Interface 504, a memory 506, and a communication bus 508.
Wherein: the processor 502, communication interface 504, and memory 506 communicate with one another via a communication bus 508. A communication interface 504 for communicating with network elements of other devices, such as clients or other servers. The processor 502 is configured to execute the program 510, and may specifically execute the terminal retrieving method in any of the above-described method embodiments.
In particular, program 510 may include program code that includes computer operating instructions.
The processor 502 may be a central processing unit CPU, or an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits configured to implement an embodiment of the present invention. The network device includes one or more processors, which may be the same type of processor, such as one or more CPUs; or may be different types of processors such as one or more CPUs and one or more ASICs.
And a memory 506 for storing a program 510. The memory 506 may comprise high-speed RAM memory, and may also include non-volatile memory (non-volatile memory), such as at least one disk memory.
According to the embodiment of the invention, the loss reporting information is acquired through the network equipment, the loss reporting information comprises the first number, the identification information of the first terminal corresponding to the first number is acquired according to the loss reporting information, the searching information of the first terminal is acquired from the operator database according to the identification information of the first terminal, and the searching information of the first terminal is sent to be sent, no additional setting is required to be carried out on the terminal, and the operability is strong.
The algorithms or displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. In addition, embodiments of the present invention are not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the embodiments of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the invention and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names. The steps in the above embodiments should not be construed as limiting the order of execution unless specified otherwise.