CN112911498A - Method and system for identifying wireless base station control user - Google Patents

Method and system for identifying wireless base station control user Download PDF

Info

Publication number
CN112911498A
CN112911498A CN201911229762.8A CN201911229762A CN112911498A CN 112911498 A CN112911498 A CN 112911498A CN 201911229762 A CN201911229762 A CN 201911229762A CN 112911498 A CN112911498 A CN 112911498A
Authority
CN
China
Prior art keywords
base station
wireless base
user
suspected
users
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911229762.8A
Other languages
Chinese (zh)
Other versions
CN112911498B (en
Inventor
黄剑锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Shenzhou Taiyue Software Co Ltd
Original Assignee
Beijing Shenzhou Taiyue Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Shenzhou Taiyue Software Co Ltd filed Critical Beijing Shenzhou Taiyue Software Co Ltd
Priority to CN201911229762.8A priority Critical patent/CN112911498B/en
Publication of CN112911498A publication Critical patent/CN112911498A/en
Application granted granted Critical
Publication of CN112911498B publication Critical patent/CN112911498B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/023Services making use of location information using mutual or relative location information between multiple location based services [LBS] targets or of distance thresholds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • H04W64/003Locating users or terminals or network equipment for network management purposes, e.g. mobility management locating network equipment

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the application provides a method and a system for identifying a wireless base station control user, wherein the method comprises the following steps: obtaining a plurality of wireless base station positioning points in a monitoring area according to network switching information of mobile terminal users in the monitoring area; obtaining a traveling track of the wireless base station according to the distance between the positioning points of the plurality of wireless base stations and the positioning time difference; obtaining a first suspected operation user corresponding to the moving track of the wireless base station according to the position association relation between the mobile terminal user and all the positioning points of the wireless base station in the moving track of the wireless base station; according to the coincidence relation of all the first suspected operation users in the preset period, obtaining second suspected operation users corresponding to the preset period; judging whether the total number of the travel tracks of the second suspected operation user in the related wireless base station in the preset period is larger than a preset threshold value or not; if yes, the second suspected operating user is determined to be the wireless base station operating user. The method and the device greatly improve the accuracy of user identification of the wireless base station.

Description

Method and system for identifying wireless base station control user
Technical Field
The present invention relates to the field of information security of mobile communication networks, and in particular, to a method and system for identifying a user controlled by a wireless base station.
Background
The wireless base station is a simulated mobile base station set at an information acquisition point by using resources such as mobile network numbers, frequencies and the like. The radio base station forces a Mobile communication terminal (e.g., a Mobile phone) to register on the simulation base station by transmitting a radio signal with high power, thereby acquiring information such as an International Mobile Subscriber Identity (IMSI) and an International Mobile Equipment Identity (IMEI) of a user. In recent years, a large number of lawbreakers utilize the wireless base station to adsorb mobile phone users to access the wireless base station near the commercial area, and force to push commercial short messages and even fraud short messages, thereby causing harassment and loss to the mobile phone users, causing the mobile phone users to be unable to communicate normally for a period of time, and causing a large amount of harmful interference to the mobile communication system.
In the related art, tracking of a wireless base station depends on a checking technology of an illegal location area code, LAC (location area code) of a base station in a monitored area is monitored, the monitored LAC is matched with legal LAC in the monitored area, the location of the LAC which fails to be matched is determined as a wireless base station locating point, and a wireless base station advancing track is generated according to the position change of the wireless base station locating point corresponding to the LAC in a certain time, so that tracking of the wireless base station is realized.
However, with the development of the radio base station anti-detection technology, LACs of some radio base stations automatically jump, so that the location of the radio base station cannot continuously track the production track, and the above method for identifying the radio base station based on the unauthorized LAC cannot analyze and judge the specific travel path track and the travel direction of the radio base station, and can only locate some discrete current location points of the radio base station.
Disclosure of Invention
The application provides a method and a system for identifying a wireless base station control user, which are used for solving the problem of low accuracy of identification of the wireless base station control user.
In a first aspect, the present application provides a method for controlling user identification by a wireless base station, the method comprising:
obtaining a plurality of wireless base station positioning points in a monitoring area according to network switching information of mobile terminal users in the monitoring area;
obtaining a traveling track of the wireless base station according to the distance between the positioning points of the wireless base stations and the positioning time difference;
obtaining a first suspected operation user corresponding to the moving track of the wireless base station according to the position association relation between the mobile terminal user and all the positioning points of the wireless base station in the moving track of the wireless base station;
according to the coincidence relation of first suspected operation users in the traveling tracks of all the wireless base stations in a preset period, obtaining second suspected operation users corresponding to the preset period;
judging whether the total number of the travel tracks of the second suspected operation user in the related wireless base station in the preset period is larger than a preset threshold value or not;
and if the total number of the travel tracks of the second suspected operating user in the related wireless base station in the preset period is larger than the preset threshold value, judging that the second suspected operating user is a wireless base station operating user.
Optionally, obtaining a first suspected operating user corresponding to the moving track of the wireless base station according to the position association relationship between the mobile terminal user and all the positioning points of the wireless base station in the moving track of the wireless base station includes:
respectively acquiring associated users in the position association radius of each wireless base station positioning point in the traveling track of the wireless base stations;
and accumulating the association times of each associated user and all the positioning points of the wireless base station in the traveling track of the wireless base station, and determining a first preset number of associated users with the highest association times as first suspected operation users corresponding to the traveling track of the wireless base station.
Optionally, the starting point of the location association radius includes the positioning point of the wireless base station, and the ending point of the location association radius is set outside an end user of any 4G-to-2G network in the monitoring area.
Optionally, obtaining a second suspected operating user corresponding to a preset period according to a coincidence relation of first suspected operating users in the traveling tracks of all the wireless base stations in the preset period includes:
respectively accumulating the total number of the travel tracks of the related wireless base station of each first suspected operation user in a preset period and the total number of times of determining the first suspected operation user;
obtaining the reliability of the first suspected operation user according to the ratio of the total times to the total number;
and comparing the credibility of all the first suspected operation users in the preset period, and determining a second preset number of first suspected operation users with the highest credibility as second suspected operation users corresponding to the preset period.
Optionally, both the first preset number and the second preset number are greater than or equal to 2.
In a second aspect, the present application further provides a system for controlling a subscriber identity by a radio base station, where the system includes modules for performing the method steps in the various implementations of the first aspect, and the method includes:
the wireless base station positioning module is used for obtaining a plurality of wireless base station positioning points in a monitoring area according to network switching information of mobile terminal users in the monitoring area;
the wireless base station advancing track generating module is used for obtaining a wireless base station advancing track according to the distances among a plurality of wireless base station positioning points and the positioning time difference;
a wireless base station advancing track corresponding control user analysis module, which is used for obtaining a first suspected operation user corresponding to the wireless base station advancing track according to the position association relation between the mobile terminal user and all wireless base station positioning points in the wireless base station advancing track;
the user analysis module is used for obtaining a second suspected operation user corresponding to the preset period according to the coincidence relation of the first suspected operation user in the travelling tracks of all the wireless base stations in the preset period;
a suspected operating user judging module, configured to judge whether a total amount of travel tracks of the second suspected operating user associated with the wireless base station in the preset period is greater than a preset threshold;
and the wireless base station control user determining module is used for judging that the second suspected operating user is a wireless base station control user if the total quantity of the travel tracks of the second suspected operating user in the preset period associated with the wireless base station is greater than the preset threshold value.
Optionally, the wireless base station traveling track corresponding to the user analysis module includes:
the associated user acquisition unit is used for respectively acquiring associated users in the associated radius of the position of each wireless base station positioning point in the advancing track of the wireless base stations;
a first suspected operating user determining unit, configured to accumulate association times of each associated user with all radio base station location points in the radio base station travel track, and determine a first preset number of associated users with the highest association times as first suspected operating users corresponding to the radio base station travel track.
Optionally, the starting point of the location association radius includes the positioning point of the wireless base station, and the ending point of the location association radius is set outside an end user of any 4G-to-2G network in the monitoring area.
Optionally, the associated users include all 4G network end users and all 2G network end users within the location association radius.
Optionally, the preset period correspondingly controls the user analysis module, including:
the first suspected operating user accumulation unit is used for accumulating the total quantity of the travel track of each first suspected operating user in the association wireless base station in a preset period and the total times of determining the first suspected operating user;
the credibility calculating unit is used for obtaining the credibility of the first suspected operation user according to the ratio of the total times to the total number;
and the second suspected operation user determining unit is used for comparing the credibility of all the first suspected operation users in the preset period and determining a second preset number of first suspected operation users with the highest credibility as second suspected operation users corresponding to the preset period.
The method and the system for controlling the user identification by the wireless base station have the advantages that:
the method comprises the steps of extracting all wireless base station traveling tracks in a preset period, carrying out single-track first suspected control user analysis on each wireless base station track, and forming a track-associated first suspected control user set by the first suspected control users of all the wireless base station tracks in the analysis period. For each first suspected control user, the credibility of the first suspected control user is calculated based on all the traveling tracks of the wireless base stations associated with the first suspected control user, and the terminal user with the highest credibility and the total number of the traveling tracks of the associated wireless base stations larger than a preset threshold value is taken as the judged wireless base station control user in the analysis period, so that the accuracy of identifying the wireless base station control user is greatly improved, powerful technical support is provided for the source control of unauthorized wireless base stations, the efficiency of the source control work of the wireless base stations is greatly improved, the social hazard of the wireless base stations is effectively reduced, and the engineering application value and the social value are very high.
Drawings
In order to more clearly explain the technical solution of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious to those skilled in the art that other drawings can be obtained according to the drawings without any creative effort.
Fig. 1 is a flowchart illustrating a method for controlling subscriber identification by a wireless base station according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a model of association of wireless base station locations according to an embodiment of the present application;
fig. 3 is a schematic diagram of grid division according to an embodiment of the present application;
fig. 4 is a schematic flowchart of a first suspected operation user identification method according to an embodiment of the present disclosure;
fig. 5 is a schematic flowchart of a second suspected operation user identification method according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a system for handling subscriber identity by a wireless base station according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of a user analysis module controlled by a wireless base station according to an embodiment of the present disclosure;
fig. 8 is a schematic structural diagram of a user analysis module correspondingly controlled by a preset period according to an embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present invention. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the invention, as detailed in the appended claims.
Referring to fig. 1, a flow chart of a method for a wireless base station to handle subscriber identity according to an embodiment of the present invention is shown in fig. 1, where the method includes the following steps:
step S110: and obtaining a plurality of wireless base station positioning points in the monitoring area according to the network switching information of the mobile terminal user in the monitoring area.
Although high-speed Communication networks, such as 4G (the 4Generation Mobile Communication technology, fourth Generation Mobile Communication technology) have been developed at a rapid pace, 2G (the 2Generation Mobile Communication technology, second Generation Mobile Communication technology) networks, namely GSM (Global System for Mobile Communication) Mobile Communication networks, cannot be completely replaced in a short period of time, and thus, current Mobile Communication terminals, such as smart phones, generally support roaming between 2G networks and other networks.
In order to perform 4G network communication, many users of mobile communication terminals exchange SIM (Subscriber Identity Module) cards used in the 2G network with USIM (Universal Subscriber Identity Module) cards using a bidirectional authentication mechanism, but when the USIM roams to the 2G network, the USIM still performs the unidirectional authentication mechanism of the 2G network, which brings a chance of inhaling the Subscriber to the wireless base station.
Most wireless base stations use the system network number, frequency point and other configuration resources of the existing mobile network by imitating a GSM system, and induce the access of mobile communication terminals by a high-power transmission mode and extreme parameter configuration.
The wireless base station firstly transmits a strong power interference signal through the 4G signal interference device and then transmits a high power signal to form a wireless base station network. In the area near the wireless base station, because the high-power signal transmitted by the wireless base station is far stronger than the signal of the telecommunication base station, the mobile communication terminal using the 2G network can be hijacked to the wireless base station network, and the mobile communication terminal using the 4G network falls back to the 2G network from the 4G network under the interference of the high-power interference signal of the wireless base station and is hijacked to the wireless base station network; in a region far from the wireless base station, the mobile communication terminal using the 4G network falls back from the 4G network to the legitimate 2G network under the interference of the wireless base station, so that the data service is affected.
Based on the interference characteristics of the wireless base station to the mobile communication terminal, the embodiment of the present application constructs a wireless base station location correlation model, which is shown in fig. 2The wireless base station planning position is taken as a center, and the peripheral area of the wireless base station planning position is sequentially divided into three concentric circles of a suction area, an interference area and a position association area. The mobile communication terminal in the suction area is hijacked from the 4G network to the wireless base station network, the mobile communication terminal in the interference area falls back from the 4G network to the legal 2G network, and the position-related area covers the suction area and the interference area, namely, the mobile communication terminal in the position-related area is influenced by the wireless base station at the central position. In a normal case, a location association radius R of a location association area can be set in an urban areaLIs 1500 meters or 2000 meters.
And setting a monitoring area, and if the monitoring area comprises the position association area, carrying out 4G-2G network switching on a mobile terminal user in the monitoring area under the interference of the wireless base station.
In the embodiment of the present application, the analyzing of the network switching information in the monitored area may include the following steps:
first, a plurality of grid regions are divided in a monitoring area. Referring to fig. 3, a schematic diagram of grid division is provided for the embodiment of the present application, as shown in fig. 3, a radius of a grid is denoted by Rs, and Rs may be set to 50 meters, so that a granularity of the grid is 100 × 100, and the smaller the Rs is set, the higher accuracy of subsequent calculation is, but the calculation amount may also increase. In the embodiment of the present application, the position-related radius R is setL1500 meters, 15 times the side length of the grid. The center of each grid area is taken as a circle center, and the radius R is related to the positionLFor the radius, a circular position-related region is respectively divided.
Then, referring to steps 1-1 to 1-4, the following process is performed for each grid region:
1-1, counting 2G network resident users and 4G network resident users at the first moment.
And searching the 2G network cell and the 4G network cell in the position association area of each grid from the cell engineering parameter table, and extracting users residing in the 2G network cell and the 4G network cell from the mobile communication network data.
Setting grid center longitude and latitude point pk=(logk,latk) At the correlation radius RLIn the location association area of
Figure BDA0002303219250000051
Formed by 2G cells
Figure BDA0002303219250000052
Set and
Figure BDA0002303219250000053
set of 4G cells
Figure BDA0002303219250000054
Respectively expressed as:
Figure BDA0002303219250000055
Figure BDA0002303219250000056
in the above-mentioned formulas (1) and (2),
Figure BDA0002303219250000057
associating a cell for the ith 2G location,
Figure BDA0002303219250000058
associating a cell for the jth 4G location. The number of 2G cells and 4G cells may be obtained from a cell engineering parameter table provided by a mobile communication operator.
Acquisition at a first time instant, i.e. t0Time, the user cluster residing in the 2G cell:
Figure BDA0002303219250000059
is obtained at t0Time, the user cluster residing in the 4G cell:
Figure BDA00023032192500000510
and 1-2, counting 2G network resident users and 4G network resident users at the second moment.
Acquiring at a second time instant, i.e. t1At this moment, the resident location associated user cluster in the 2G cell is:
Figure BDA00023032192500000511
is obtained at t1At this moment, the resident location associated user cluster in the 4G cell is:
Figure BDA00023032192500000512
1-3, calculating a first quantity difference value of 2G network resident users at the first time and the second time, and calculating a second quantity difference value of 4G network resident users at the first time and the second time.
The first number difference is calculated as:
Figure BDA00023032192500000513
(7) in the formula (I), the compound is shown in the specification,
Figure BDA00023032192500000514
to represent
Figure BDA00023032192500000515
The total number of (c).
The second number difference is calculated as:
Figure BDA00023032192500000516
(8) in the formula (I), the compound is shown in the specification,
Figure BDA00023032192500000517
to represent
Figure BDA00023032192500000518
The total number of (c).
1-4, obtaining the suction rate of the wireless base station according to the ratio of the total difference value (namely the sum of the first quantity difference value and the second quantity difference value) of the users reduced at the second moment to the total number of users at the first moment (namely the sum of the numbers of the 2G network resident users and the 4G network resident users at the first moment).
The total difference of the users decreased at the second moment is:
Figure BDA0002303219250000061
the calculation formula of the inhalation rate is:
Figure BDA0002303219250000062
finally, the suction rate of the grid area is compared with a preset threshold value rholowBy comparison, if ρ (t)0→t1)>ρlowIf yes, the grid area is judged to be a suspected wireless base station positioning point, otherwise, the grid area is judged to be a current grid center longitude and latitude point pk=(logk,latk) The location is not suspected of containing a wireless base station location. Further, selecting the grid area with the maximum suction rate, and if the suction rate of the grid area is greater than a preset threshold value rholowThen, the grid area is determined as the positioning point of the wireless base station.
The positioning method of the wireless base station can improve the identification accuracy of the unauthorized wireless base station, the positioning error is more than 300 meters compared with the traditional positioning method of the wireless base station, the positioning error can be reduced by improving the granularity of the grid, for example, when the granularity of the grid is 50 x 50, the positioning error can be within 50 meters, the accuracy of less than 50 percent of the traditional positioning of the wireless base station is improved to more than 99 percent, the scientific credibility of the identification of the wireless base station can be ensured, and powerful technical support is provided for the timely positioning and capturing of the wireless base station.
At a certain positioning period tiIn time, there may be multiple pk=(logk,latk) Wireless base station locations are determined, which may belong to the travel trajectories of different wireless base stations.
In this embodiment, the cutoff will be to tiThe first wireless base station moving track T in time intervall(ti) Defined as a directed vector consisting of a time series of radio base station anchor points:
Figure BDA0002303219250000063
(11) in the formula (I), the compound is shown in the specification,
Figure BDA0002303219250000064
is the first track point of the first wireless base station,
Figure BDA0002303219250000065
the second track point of the first wireless base station track, and so on,
Figure BDA0002303219250000066
the ith track point of the travel track of the first wireless base station, M is the time from the first track point to tiAnd in time, the total number of track points of the travel track of the first wireless base station.
Two adjacent positioning periods, e.g. ti,tjTwo radio base station positioning points P adjacent to each otheriAnd PjJudging whether to fit the wireless base station into a wireless base station traveling track through a certain time and position correlation algorithm, if P isiAnd PjCan be fitted to a wireless base station travel track TlThe two wireless base station locations are referred to as two adjacent locations of the track.
In this embodiment, the wireless base station has a traveling track TlSee step S120.
Step S120: and obtaining the moving track of the wireless base station according to the distance between the positioning points of the plurality of wireless base stations and the positioning time difference.
As described below, step S120 includes steps 2-1 to 2-4:
2-1, obtaining a first wireless base station positioning point in a previous time period, wherein the position of the wireless base station positioning point in the first time period is different from the position of the wireless base station positioning point in the previous time period.
The length of one time interval can be selected to be 1 minute, the wireless base station positioning point is obtained every other minute, and after the wireless base station positioning point within 1 minute of the first time interval is obtained, because the advancing track needs to be generated by the track points with different positions, whether the wireless base station positioning point with the changed position is a new track point is only needed to be judged. In this step, a wireless base station anchor point whose position is different from the last minute is selected from the wireless base station anchor points obtained in the first time period and is marked as a first wireless base station anchor point.
2-2, judging whether a second wireless base station positioning point exists in the wireless base station positioning point in a preset time period before the first time period, wherein the distance between the second wireless base station positioning point and the first wireless base station positioning point is within a preset time-space association threshold range.
The first wireless base station positioning point may be a new track point of a previous wireless base station positioning point, or may be an initial track point of a new track, and the step judges the first wireless base station positioning point, wherein the judging method comprises the following steps 2-2-1 to 2-2-3:
2-2-1, judging whether a first adjacent positioning point exists in the last time period of the first time period, wherein the distance between the first adjacent positioning point and the positioning point of the first wireless base station is within a first time-space association threshold range;
and judging whether a first adjacent positioning point exists in the last minute of the first time interval. According to the traveling speed characteristics of the wireless base station, the first time-space correlation threshold range D is set according to the embodiment of the applicationth1Setting the wireless base station to move within one minute when the distance is 600 mIf there is a wireless base station location point within the last minute, which is less than 600 meters away from the first wireless base station location point, then the wireless base station location point within the last minute is marked as a first adjacent location point, which is expressed by the following formula:
Tl(tj)=[Tl(ti),Pj],Pi∈Tl,Di,j≤Dth1 (12)
in the above formula, PiIndicating the location of the ith radio base station, PjIndicates the jth radio base station anchor point, TlIndicates the first wireless base station's travel track, Tl(tj) Represents TlBy tjTrack of time period, Di,jRepresents PiAnd PjDistance between, Tl(ti) Represents TlBy tiTrack of time period, Tl(ti) And Tl(tj) All are directed vectors:
Figure BDA0002303219250000071
in the above formula, the first and second carbon atoms are,
Figure BDA0002303219250000072
represents TlThe first point of the trace of (a),
Figure BDA0002303219250000073
represents TlAnd so on for the first trace point.
2-2-2, if the first adjacent positioning point does not exist, judging whether a second adjacent positioning point exists in a second time period before the first time period, wherein the distance between the second adjacent positioning point and the positioning point of the first wireless base station is within a second space-time correlation threshold range;
if the first adjacent positioning point does not exist in the last minute of the first time interval, the first time interval is pushed forward for one minute, and whether a second adjacent positioning point exists or not is judged in the second time interval. Second oneThe time period is selected to be 2 minutes before the first time period. Setting a second spatiotemporal association threshold Dth2When the maximum distance of the two-minute movement of the wireless base station is 1200 m, if there exists a wireless base station positioning point with a distance less than 1200 m to the first wireless base station positioning point within two minutes, the wireless base station positioning point with a distance less than 1200 m to the first wireless base station positioning point is marked as a second adjacent positioning point, which is expressed by the following formula:
Tl(tj)=[Tl(ti),Pj],Pi∈Tl,Di,j≤Dth2 (14)
2-2-3, if the second adjacent positioning point does not exist, judging whether a third adjacent positioning point exists in a third time period before the first time period, wherein the distance between the third adjacent positioning point and the positioning point of the first wireless base station is within a third space-time correlation threshold range;
and if the second adjacent positioning point does not exist in the second time period, judging whether a third adjacent positioning point exists or not in the third time period. The third period of time is selected to be 3 minutes or 60 minutes before the first period of time. Setting a third null-association threshold Dth3When the maximum distance of the wireless base station moving within three minutes or 60 minutes is 1500 meters, if a wireless base station positioning point with a distance less than 1500 meters to the first wireless base station positioning point exists within three minutes or 60 minutes, the wireless base station positioning point with a distance less than 1500 meters to the first wireless base station positioning point is marked as a third adjacent positioning point, and the formula is expressed as follows:
Tl(tj)=[Tl(ti),Pj],Pi∈Tl,Di,j≤Dth3 (15)
and the third time interval, the second time interval and the last time interval of the first time interval all belong to preset time intervals, the third time-space correlation threshold range, the second time-space correlation threshold range and the first time-space correlation threshold range all belong to preset time-space correlation threshold ranges, and the first adjacent positioning point, the second adjacent positioning point and the third adjacent positioning point all belong to a second wireless base station positioning point. Starting from 2-2-1, if a first adjacent positioning point corresponding to a first spatio-temporal correlation threshold range exists in the last period of the first period, jumping to 2-3, if the first adjacent positioning point does not exist, continuing to execute 2-2-2, if a second adjacent positioning point corresponding to a second spatio-temporal correlation threshold range exists in the second period, jumping to 2-3, if the second adjacent positioning point does not exist, continuing to execute 2-2-3, if a third adjacent positioning point corresponding to a third spatio-temporal correlation threshold range exists in the third period, jumping to 2-3, and if the third adjacent positioning point does not exist, jumping to 2-4.
And 2-3, if the second wireless base station positioning point exists, determining the first wireless base station positioning point as the next track point of the second wireless base station positioning point.
If a second wireless base station location point exists in any one of the steps 2-2-1-2-2-3, the first wireless base station location point is determined as the next track point of the second wireless base station location point, i.e. the first wireless base station location point and the second wireless base station location point are adjacent location points.
And 2-4, if the second wireless base station positioning point does not exist, determining the first wireless base station positioning point as the initial track point of the new track.
And if the second wireless base station positioning point does not exist in any step of 2-2-1-2-2-3, determining the first wireless base station positioning point as the initial track point of the new track.
The method comprises the steps of taking 24 hours a day as a period, determining a track point with the earliest time as an initial track point, taking one minute as an analysis time interval, carrying out real-time processing on wireless base station positioning points obtained in one minute, analyzing new positioning points of all wireless base stations in the time interval, namely first wireless base station positioning points, carrying out time and position association of 1 minute, 2 minutes, 3 minutes or 60 minutes on each first wireless base station positioning point in the time interval and the track point in a preset time interval before the time interval, merging the first wireless base station positioning points into a wireless base station advancing track of a second wireless base station positioning point if the first wireless base station positioning points are associated with the second wireless base station positioning points, and taking the first wireless base station positioning points as initial track points of a new track if the second wireless base station positioning points are not associated. And after the new positioning point of the wireless base station in the current time period is analyzed, performing track analysis on the new positioning point of the wireless base station in the next time period until 0 point on the next day, and finishing track analysis of one period to obtain all the traveling tracks of the wireless base station in the current day.
Step S130: and obtaining a first suspected operation user corresponding to the moving track of the wireless base station according to the position association relation between the mobile terminal user and all the positioning points of the wireless base station in the moving track of the wireless base station.
In the embodiment of the present application, a wireless base station operating user corresponding to a wireless base station traveling track is referred to as a first suspected operating user, and each wireless base station traveling track is analyzed to obtain a first suspected operating user corresponding to each wireless base station traveling track, where the analysis method is shown in fig. 4, which is a schematic flow chart of a first suspected operating user identification method provided in the embodiment of the present application, as shown in fig. 4, and includes the following steps:
step S301: and respectively acquiring associated users in the position association radius of each wireless base station positioning point in the traveling track of the wireless base station.
For a wireless base station to travel track TlTraversal analysis TlEach of the wireless base stations in (1) is located at a point, TlIn a radio base station anchor point Pk lFor example, analyzing the content includes: with Pk lAs the center of a circle, obtaining the position correlation radius RLAll location-associated user clusters within
Figure BDA0002303219250000081
Figure BDA0002303219250000082
Wherein the content of the first and second substances,
Figure BDA0002303219250000091
Figure BDA0002303219250000092
in the above formula, the first and second carbon atoms are,
Figure BDA0002303219250000093
indicates a location-related radius RLAll location updated 2G network end users within,
Figure BDA0002303219250000094
indicates a location-related radius RLAll location updated 4G network end users in the network, the location updated 2G network end users and 4G network end users are marked as associated users,
Figure BDA0002303219250000095
indicates a location-related radius RLTotal number of 4G network end users for all location updates within.
Associating locations with user clusters
Figure BDA0002303219250000096
Each associated user in (a) is marked separately: the positions are associated 1 time.
For TlAfter all the wireless base station positioning points are subjected to traversal analysis, a position associated user cluster corresponding to each wireless base station positioning point is obtained, and associated users in the position associated user cluster are marked.
Step S302: and accumulating the association times of each associated user and all the positioning points of the wireless base station in the traveling track of the wireless base station, and determining a first preset number of associated users with the highest association times as first suspected operation users corresponding to the traveling track of the wireless base station.
For TlAll wireless base station location points of the associated subscriberCounting to obtain the association times of each associated user in all position associated user clusters, and obtaining TlThe associated user cluster is:
Figure BDA0002303219250000097
(17) in the formula (I), the compound is shown in the specification,
Figure BDA0002303219250000098
represents a set of associated users whose number of associations is 1,
Figure BDA0002303219250000099
a set of associated users representing an association number of 2, and so on,
Figure BDA00023032192500000910
indicates the number of times of association is MlSecondary set of associated users, MlRepresents TlThe maximum number of associations of the associated user.
The first preset number of associated users may be
Figure BDA00023032192500000911
The associated user of (1) is selected,
Figure BDA00023032192500000912
may be 1 or more when
Figure BDA00023032192500000913
When there are a plurality of associated users, the user can select
Figure BDA00023032192500000914
All the associated users in the system are determined as the first suspected operation users corresponding to the traveling track of the wireless base station when
Figure BDA00023032192500000915
When the number of associated users in (1) is, the user can select
Figure BDA00023032192500000916
All associated users in
Figure BDA00023032192500000917
(if
Figure BDA00023032192500000918
If no associated user exists, then selecting downwards
Figure BDA00023032192500000919
And so on) is determined as the first suspected operating user corresponding to the travel track of the wireless base station. By the method, the first preset number is determined to be more than or equal to 2, the subsequent steps further judge the 2 or more than 2 first suspected operating users determined in the subsequent steps, and finally determine the operating users of the wireless base station.
Step S140: and obtaining a second suspected operating user corresponding to the preset period according to the coincidence relation of the first suspected operating users in the travelling tracks of all the wireless base stations in the preset period.
Considering that the wireless base station is usually characterized by persistence, the method analyzes the coincidence relation of the first suspected operating users in the traveling track of each wireless base station in a certain preset period, such as a week (7 days) or a month, and obtains the second suspected operating users corresponding to the preset period. Referring to fig. 5, a flowchart of a second suspected operation user identification method provided in the embodiment of the present application is schematically shown, and as shown in fig. 5, the method includes the following steps:
step S401: and respectively accumulating the total number of the travel tracks of the associated wireless base station of each first suspected operating user in a preset period and the total number of times of determining the first suspected operating user.
The first suspected operating user is associated with the traveling track of the wireless base station, which means that the first suspected operating user belongs to a user cluster associated with the position of at least one track point in the traveling track of the wireless base station.
Step S402: and obtaining the reliability of the first suspected operation user according to the ratio of the total times to the total number.
For the first operation user in the preset period
Figure BDA0002303219250000101
Associated pmA track of strips, if
Figure BDA0002303219250000102
The number of times of the first suspected operation user is qmThen, this application defines
Figure BDA0002303219250000103
The confidence level for operating the subscriber as a wireless base station is as follows:
Figure BDA0002303219250000104
step S403: and comparing the credibility of all the first suspected operation users in the preset period, and determining a second preset number of first suspected operation users with the highest credibility as second suspected operation users corresponding to the preset period.
The second preset number is equal to or greater than 2, and the selection method of the second suspected operation users with the second preset number is similar to the selection method of the first suspected operation users with the first preset number, and is not repeated here.
Step S150: and judging whether the total number of the travel tracks of the second suspected operation users in the associated wireless base station in the preset period is larger than a preset threshold value.
The predetermined threshold is set to M, which can be determined by the regular progression of the radio base station detected over time, for example, M can be set to 5 according to the fact that the radio base station usually moves for at least 5 days in a week in an area.
Step S160: if the total number of the traveling tracks of the second suspected operating users associated with the wireless base station in the preset period is larger than the preset threshold value, the second suspected operating users are judged to be the wireless base station control users.
If M set in step S150 is 5, when the total number of the traveling tracks of the second suspected operating user associated with the wireless base station in the predetermined period is greater than 5, it is determined that the second suspected operating user is a real wireless base station operating user.
Step S170: if the total number of the traveling tracks of the second suspected operating users associated with the wireless base station in the preset period is less than or equal to the preset threshold value, the second suspected operating users are judged not to be the wireless base station operating users.
If M set in step S150 is 5, when the total number of the traveling tracks of the second suspected operating user associated with the radio base station in the predetermined period is less than or equal to 5, it is determined that the second suspected operating user is not a true radio base station operating user, and may be a mobile terminal user frequently interfered by the radio base station.
Referring to fig. 6, a schematic structural diagram of a system for controlling subscriber identity by a wireless base station according to an embodiment of the present invention is shown in fig. 6, and the system includes: a wireless base station positioning module 701, a wireless base station traveling track generating module 702, a wireless base station traveling track corresponding control user analyzing module 703, a preset period corresponding control user analyzing module 704, a suspected operation user judging module 705 and a wireless base station control user determining module 706.
The radio base station positioning module 701 is configured to obtain a plurality of radio base station positioning points in the monitoring area according to the network switching information of the mobile terminal user in the monitoring area.
The wireless base station moving track generating module 702 is connected to the wireless base station positioning module 701, and configured to obtain a moving track of a wireless base station according to distances between a plurality of wireless base station positioning points and positioning time differences.
The wireless base station moving track corresponding control user analysis module 703 is connected to the wireless base station moving track generation module 702, and is configured to obtain a first suspected operating user corresponding to the wireless base station moving track according to the position association relationship between the mobile terminal user and all the wireless base station positioning points in the wireless base station moving track. Referring to fig. 7, a schematic structural diagram of a wireless base station corresponding to a user analysis module controlled by a traveling track according to an embodiment of the present disclosure is shown in fig. 7, where the wireless base station corresponding to a user analysis module 703 includes a correlated user obtaining unit 7031 and a first suspected operating user determining unit 7032.
An associated user acquiring unit 7031, configured to acquire associated users within an associated radius of each location point of the wireless base station in the moving track of the wireless base station.
A first suspected operating user determining unit 7032, connected to the associated user obtaining unit 7031, configured to accumulate association times of each associated user with all radio base station location points in a radio base station travel track, and determine a first preset number of associated users with the highest association times as first suspected operating users corresponding to the radio base station travel track.
The preset period corresponding control user analysis module 704 is configured to obtain a second suspected operating user corresponding to the preset period according to a coincidence relation between the first suspected operating users in the travel tracks of all the wireless base stations within the preset period. Referring to fig. 8, a schematic structural diagram of a user analysis module correspondingly controlled in a preset period according to an embodiment of the present disclosure is shown in fig. 8, where the user analysis module 704 correspondingly controlled in the preset period includes a first suspected-operating user accumulation unit 7041, a reliability calculation unit 7042, and a second suspected-operating user determination unit 7043.
The first suspected operating user accumulating unit 7041 is configured to accumulate the total number of the traveling tracks of the associated wireless base station and the total number of times determined as the first suspected operating user in a preset period, respectively.
The reliability calculation unit 7042 is connected to the first suspected operating user accumulation unit 7041, and is configured to obtain the reliability of the first suspected operating user according to a ratio of the total number of times to the total number.
The second suspected-operation user determining unit 7043 is connected to the reliability calculating unit 7042, and is configured to compare the reliabilities of all the first suspected-operation users in the preset period, and determine a second preset number of first suspected-operation users with the highest reliability as second suspected-operation users corresponding to the preset period.
In the embodiment of the application, an analysis period of wireless base station operation users is set to be 7 days or one month, all the wireless base station traveling tracks in the analysis period are extracted, a single-track first suspected operation user analysis is performed on each wireless base station track, and then the first suspected operation users of all the wireless base station tracks in the analysis period form a track-associated first suspected operation user set. For each first suspected control user, the reliability of the first suspected control user is calculated based on all the traveling tracks of the wireless base stations associated with the first suspected control user, and the terminal user with the highest reliability and the total number of the traveling tracks of the associated wireless base stations larger than a preset threshold value is taken as the judged wireless base station control user in the analysis period.
According to the embodiment, based on the analysis means of track association, the method and the device carry out association analysis on the terminal users related to the advancing tracks of the plurality of wireless base stations in a certain period, the accuracy of the obtained wireless base station control users is improved from less than 20% to more than 90%, powerful technical support is provided for source management of unauthorized wireless base stations, the efficiency of source management work of the wireless base stations is greatly improved, the social hazard of the wireless base stations is effectively reduced, and the method and the device have high engineering application value and social value.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments.
Other embodiments of the invention will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the invention and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the invention being indicated by the following claims.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (10)

1. A method for a wireless base station to handle subscriber identification, comprising:
obtaining a plurality of wireless base station positioning points in a monitoring area according to network switching information of mobile terminal users in the monitoring area;
obtaining a traveling track of the wireless base station according to the distance between the positioning points of the wireless base stations and the positioning time difference;
obtaining a first suspected operation user corresponding to the moving track of the wireless base station according to the position association relation between the mobile terminal user and all the positioning points of the wireless base station in the moving track of the wireless base station;
according to the coincidence relation of first suspected operation users in the traveling tracks of all the wireless base stations in a preset period, obtaining second suspected operation users corresponding to the preset period;
judging whether the total number of the travel tracks of the second suspected operation user in the related wireless base station in the preset period is larger than a preset threshold value or not;
and if the total number of the travel tracks of the second suspected operating user in the related wireless base station in the preset period is larger than the preset threshold value, judging that the second suspected operating user is a wireless base station operating user.
2. The method as claimed in claim 1, wherein obtaining the first suspected operating users corresponding to the moving track of the wireless base station according to the position association relationship between the mobile terminal user and all the positioning points of the wireless base station in the moving track of the wireless base station comprises:
respectively acquiring associated users in the position association radius of each wireless base station positioning point in the traveling track of the wireless base stations;
and accumulating the association times of each associated user and all the positioning points of the wireless base station in the traveling track of the wireless base station, and determining a first preset number of associated users with the highest association times as first suspected operation users corresponding to the traveling track of the wireless base station.
3. The method as claimed in claim 2, wherein the starting point of the location association radius comprises the positioning point of the wireless base station, and the ending point of the location association radius is located outside an end user of any 4G-to-2G network in the monitoring area.
4. The method as claimed in claim 1, wherein obtaining the second suspected operating users corresponding to the predetermined period according to the coincidence relation of the first suspected operating users in the traveling tracks of all the wireless base stations in the predetermined period comprises:
respectively accumulating the total number of the travel tracks of the related wireless base station of each first suspected operation user in a preset period and the total number of times of determining the first suspected operation user;
obtaining the reliability of the first suspected operation user according to the ratio of the total times to the total number;
and comparing the credibility of all the first suspected operation users in the preset period, and determining a second preset number of first suspected operation users with the highest credibility as second suspected operation users corresponding to the preset period.
5. The method of claim 1, wherein the first predetermined number and the second predetermined number are both greater than or equal to 2.
6. A system for handling subscriber identity by a wireless base station, comprising:
the wireless base station positioning module is used for obtaining a plurality of wireless base station positioning points in a monitoring area according to network switching information of mobile terminal users in the monitoring area;
the wireless base station advancing track generating module is used for obtaining a wireless base station advancing track according to the distances among a plurality of wireless base station positioning points and the positioning time difference;
a wireless base station advancing track corresponding control user analysis module, which is used for obtaining a first suspected operation user corresponding to the wireless base station advancing track according to the position association relation between the mobile terminal user and all wireless base station positioning points in the wireless base station advancing track;
the user analysis module is used for obtaining a second suspected operation user corresponding to the preset period according to the coincidence relation of the first suspected operation user in the travelling tracks of all the wireless base stations in the preset period;
a suspected operating user judging module, configured to judge whether a total amount of travel tracks of the second suspected operating user associated with the wireless base station in the preset period is greater than a preset threshold;
and the wireless base station control user determining module is used for judging that the second suspected operating user is a wireless base station control user if the total quantity of the travel tracks of the second suspected operating user in the preset period associated with the wireless base station is greater than the preset threshold value.
7. The system of claim 6, wherein the wireless base station travel path corresponds to a steered subscriber analysis module, comprising:
the associated user acquisition unit is used for respectively acquiring associated users in the associated radius of the position of each wireless base station positioning point in the advancing track of the wireless base stations;
a first suspected operating user determining unit, configured to accumulate association times of each associated user with all radio base station location points in the radio base station travel track, and determine a first preset number of associated users with the highest association times as first suspected operating users corresponding to the radio base station travel track.
8. The system of claim 7, wherein the start point of the location association radius comprises a positioning point of the wireless base station, and the end point of the location association radius is located outside an end user of any 4G-to-2G network in the monitoring area.
9. The wireless base station operated subscriber identity system of claim 7, wherein said associated subscribers include all 4G network end users and all 2G network end users within said location association radius.
10. The system of claim 6, wherein the predetermined period corresponds to the pilot subscriber analysis module, comprising:
the first suspected operating user accumulation unit is used for accumulating the total quantity of the travel track of each first suspected operating user in the association wireless base station in a preset period and the total times of determining the first suspected operating user;
the credibility calculating unit is used for obtaining the credibility of the first suspected operation user according to the ratio of the total times to the total number;
and the second suspected operation user determining unit is used for comparing the credibility of all the first suspected operation users in the preset period and determining a second preset number of first suspected operation users with the highest credibility as second suspected operation users corresponding to the preset period.
CN201911229762.8A 2019-12-04 2019-12-04 Method and system for identifying wireless base station control user Active CN112911498B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911229762.8A CN112911498B (en) 2019-12-04 2019-12-04 Method and system for identifying wireless base station control user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911229762.8A CN112911498B (en) 2019-12-04 2019-12-04 Method and system for identifying wireless base station control user

Publications (2)

Publication Number Publication Date
CN112911498A true CN112911498A (en) 2021-06-04
CN112911498B CN112911498B (en) 2022-07-26

Family

ID=76111252

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911229762.8A Active CN112911498B (en) 2019-12-04 2019-12-04 Method and system for identifying wireless base station control user

Country Status (1)

Country Link
CN (1) CN112911498B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105792211A (en) * 2014-12-23 2016-07-20 中国移动通信集团上海有限公司 Method and device for identifying pseudo base station
US20160309332A1 (en) * 2014-12-19 2016-10-20 Telefonaktiebolaget Lm Ericsson (Publ) Network node and method for detecting false base stations
CN108243421A (en) * 2016-12-26 2018-07-03 中国移动通信集团山东有限公司 Pseudo-base station recognition methods and system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160309332A1 (en) * 2014-12-19 2016-10-20 Telefonaktiebolaget Lm Ericsson (Publ) Network node and method for detecting false base stations
CN105792211A (en) * 2014-12-23 2016-07-20 中国移动通信集团上海有限公司 Method and device for identifying pseudo base station
CN108243421A (en) * 2016-12-26 2018-07-03 中国移动通信集团山东有限公司 Pseudo-base station recognition methods and system

Also Published As

Publication number Publication date
CN112911498B (en) 2022-07-26

Similar Documents

Publication Publication Date Title
US7853267B2 (en) Wireless system signal propagation collection and analysis
Varshavsky et al. The skyloc floor localization system
EP2755431B1 (en) Mobile geolocation
EP2755432B1 (en) Method and system for mobile reference signature generation
US7778653B2 (en) Method and apparatus for targeted paging in a multi-cell wireless communication system
CN106973165B (en) vehicle excess member monitoring method, vehicle excess member monitoring system, operator system and mobile terminal
CN103648096A (en) Method for rapidly detecting and positioning illegal base station intrusion
CN103997757A (en) Pseudo base station locating method and device and information reporting method and device
CN101180550A (en) Enhanced mobile location method and system
CN107889210B (en) Building user positioning method and system
CN111866847B (en) Mobile communication network data analysis method, equipment and computer storage medium
CN112911498B (en) Method and system for identifying wireless base station control user
CN112911516B (en) Method and system for generating traveling track of wireless base station
CN105228155A (en) A kind of localization method of pseudo-base station and device
CN113015098B (en) Method and system for generating real-time traveling track of wireless base station
Bejarano-Luque et al. A context-aware data-driven algorithm for small cell site selection in cellular networks
CN105163321A (en) Data flow positioning method and device
EP1606967B1 (en) Handover-based method for anonymous observation of a moving subscriber
CN112911702B (en) Wireless base station positioning method and system
JP6223302B2 (en) Apparatus, program, and method capable of determining stay of user having portable terminal
CN103581990A (en) Method and device for determining telephone traffic absorbed by repeater
CN105898778B (en) A kind of communication blind district confirmation method, communication blind district confirm device
Serreli et al. Fingerprint-based positioning method over LTE advanced pro signals with GAN training contribute
CN113015168B (en) Wireless base station positioning method and system
JP5871390B2 (en) System and method for controlling availability of service according to position of wireless communication terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CB03 Change of inventor or designer information

Inventor after: Huang Jianfeng

Inventor after: Dong Yue

Inventor before: Huang Jianfeng

CB03 Change of inventor or designer information