CN113286041A - Method and system for identifying abnormal use of oversea mobile phone number - Google Patents
Method and system for identifying abnormal use of oversea mobile phone number Download PDFInfo
- Publication number
- CN113286041A CN113286041A CN202110385205.6A CN202110385205A CN113286041A CN 113286041 A CN113286041 A CN 113286041A CN 202110385205 A CN202110385205 A CN 202110385205A CN 113286041 A CN113286041 A CN 113286041A
- Authority
- CN
- China
- Prior art keywords
- mobile phone
- phone number
- feature
- abnormal use
- characteristic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Technology Law (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides a method and a system for identifying abnormal use of an oversea mobile phone number, which comprises the steps of acquiring the full oversea mobile phone number in a target area; performing calculation analysis by using an abnormal use recognition model of the overseas mobile phone number, wherein the abnormal use recognition model of the overseas mobile phone number comprises a position feature, a virtual identity feature and a remark feature; and responding to the situation that the position characteristic, the virtual identity characteristic and the remark characteristic exceed preset characteristic values, outputting a suspicious number, and listing the suspicious characteristic of the suspicious number. The method and the system have good effects on pre-warning and striking in advance, and can be popularized and applied in various related systems.
Description
Technical Field
The invention relates to the technical field of communication safety, in particular to an identification method and system for abnormal use of an overseas mobile phone number.
Background
The Internet access by using an overseas mobile phone belongs to a special Internet access means at present, and on one hand, the Internet access IP is displayed as oversea, and on the other hand, the Internet access does not pass through a domestic firewall. At present, in China, models for actively discovering and actively recognizing abnormal use conditions of overseas mobile phone internet surfing are rarely available.
At present, basically, no model is specially used for abnormal use of overseas mobile phones, mainly aiming at individual case query application and being combined into all mobile phones for development application. But the person who uses the overseas mobile phone who is not normally used has its particularity. If the method is mixed in the domestic mobile phone, the method is often ignored due to the small amount of the mixed mobile phone, so that the model application needs to be carried out on the mobile phone in a targeted manner to find out the object which is abnormally used.
Disclosure of Invention
The invention provides a method and a system for identifying abnormal use of an oversea mobile phone number, aiming at the technical problem that the prior art does not have a model specially aiming at the oversea mobile phone basically and is difficult to analyze the abnormal use condition of a network using the oversea mobile phone.
The invention provides an identification method and system for abnormal use of an overseas mobile phone number.
An identification method for abnormal use of an overseas mobile phone number, comprising:
acquiring a total number of overseas mobile phone numbers in a target area;
performing calculation analysis by using an abnormal use recognition model of the overseas mobile phone number, wherein the abnormal use recognition model of the overseas mobile phone number comprises a position feature, a virtual identity feature and a remark feature;
and responding to the situation that the position characteristic, the virtual identity characteristic and the remark characteristic exceed the preset characteristic value, outputting the suspicious number and listing the suspicious characteristic of the suspicious number.
In a specific embodiment, after acquiring the total number of the overseas mobile phone numbers in the target area, the method further includes: and filtering the target mobile phone number by using the home location of the calling number and the position of the base station. By the method, the target mobile phone number can be rapidly filtered.
In a specific embodiment, the data source of the abnormal use identification model of the overseas mobile phone number comprises mobile phone position data, article attribute data and mobile phone remark data.
In a particular embodiment, the handset location data includes fields for calling number, home, base station location, IMEI, and IMSI.
In a particular embodiment, the item attribute data includes fields for item type, item ID, virtual identity type, virtual identity account number, start time, and last time.
In a specific embodiment, the mobile phone remark data comprises fields of a mobile phone number, remark information, a remark number and remark times.
In a specific embodiment, the position feature, the virtual identity feature and the remark feature are sequentially judged, and the suspicious number is output when the three features exceed the corresponding preset feature values.
In a specific embodiment, the position feature determination condition is: the number of the call base stations responding to the overseas mobile phone number is less than N1Then, the next feature judgment is carried out, wherein 0 is more than N1≤3。
In a specific embodiment, the virtual identity characteristic determination condition is: responding to the virtual identity of the overseas mobile phone number being 0 or more than N2Then, enter the next feature judgment, where N2Is 10.
In particular embodiments, the types of virtual identity features are domestic APPs, including QQ, WeChat, Payment Bao, and Taobao.
In a specific embodiment, the remark feature determination condition is as follows: and when the number of the remarks responding to the overseas mobile phone number is 0, outputting the suspicious number.
According to a second aspect of the present invention, a computer-readable storage medium is proposed, on which a computer program is stored, which computer program, when being executed by a computer processor, is adapted to carry out the above-mentioned method.
According to a third aspect of the present invention, there is provided an identification system for abnormal use of an overseas cell phone number, the system comprising:
target area number acquisition unit: configuring a system for acquiring the total quantity of overseas mobile phone numbers in a target area, and filtering the target mobile phone numbers by using the home location of a calling number and the position of a base station;
a model analysis unit: the method comprises the steps that a recognition model for abnormal use of the overseas mobile phone number is configured to be used for calculation and analysis, wherein the recognition model for abnormal use of the overseas mobile phone number comprises a position feature, a virtual identity feature and a remark feature;
an output unit: and the configuration is used for responding to the situation that the position characteristic, the virtual identity characteristic and the remark characteristic exceed the preset characteristic value, outputting the suspicious number and listing the suspicious characteristic of the suspicious number.
The invention provides an identification method and system for abnormal use of an oversea mobile phone number, and provides an identification method for abnormal use of the oversea mobile phone number based on big data. Further determination of these abnormal numbers can be made by blocking the phone or conducting a survey of some phone users. The method can be applied to a big data system, can be well applied to actual combat, and has practical application effects. In the future, the method is applied to different products in an expanded mode, and a better social effect is generated.
Drawings
The accompanying drawings are included to provide a further understanding of the embodiments and are incorporated in and constitute a part of this specification. The drawings illustrate embodiments and together with the description serve to explain the principles of the invention. Other embodiments and many of the intended advantages of embodiments will be readily appreciated as they become better understood by reference to the following detailed description. Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of an identification method for abnormal use of an outbound mobile phone number according to an embodiment of the present application;
fig. 2 is a flowchart of an abnormal identification model for an overseas mobile phone number according to a specific embodiment of the present application;
fig. 3 is a simplified flowchart of an identification method for abnormal use of an outbound mobile phone number according to an embodiment of the present application;
FIG. 4 is a block diagram of an identification system for abnormal use of an outbound mobile phone number according to one embodiment of the present application;
FIG. 5 is a schematic block diagram of a computer system suitable for use in implementing an electronic device according to embodiments of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
Fig. 1 shows a flowchart of an identification method for abnormal use of an outbound handset number according to an embodiment of the present application. As shown in fig. 1, the method comprises the steps of:
s101: and acquiring the total number of the overseas mobile phone numbers in the target area. Specifically, the target mobile phone number can be filtered by using the home location of the calling number and the position of the base station.
S102: and performing calculation analysis by using an abnormal use recognition model of the overseas mobile phone number, wherein the abnormal use recognition model of the overseas mobile phone number comprises a position characteristic, a virtual identity characteristic and a remark characteristic.
In a specific embodiment, the data source for the abnormal use of the identification model by the overseas mobile phone number includes:
1) the mobile phone position data comprises the following fields: calling number, calling attribution, base station position, IMEI, IMSI;
2) the article attribute data comprises the following fields: the method comprises the following steps of (1) article type, article ID, virtual identity type, virtual identity account, start time and latest time;
3) the mobile phone remark data comprises the following fields: mobile phone number, remark information, remark number and remark times.
In a specific embodiment, the abnormal use recognition model of the overseas mobile phone number comprises 3 partial feature analyses, namely a position feature, a virtual identity feature and a remark feature. Each feature is a necessary condition, and when the feature is not satisfied, the calculation is quit. And under the condition that the three conditions are met, outputting the suspicious number to assist in judgment.
S103: and responding to the situation that the position characteristic, the virtual identity characteristic and the remark characteristic exceed the preset characteristic value, outputting the suspicious number and listing the suspicious characteristic of the suspicious number.
In a specific embodiment, fig. 2 is a flowchart illustrating an abnormal identification model for an overseas mobile phone number according to a specific embodiment of the present application, where as shown in fig. 2, the model includes:
s201: and inputting the position characteristics.
S202: and judging whether the conditions are met. If the condition is satisfied, the process continues to enter the virtual identity feature input of step S203, and if the condition is not satisfied, the process is ended, and no number is output.
In a specific embodiment, the position is relatively fixed, so that an abnormal user can use an off-shore mobile phone to surf the internet and can be directly distinguished from a normal telephone, and the position of the normal user is changed more in life. The characteristic calculation amount is small, the filtering amount is large, and therefore the characteristic calculation amount is used as a first condition. Can set the conversation base station to be less than N1A, generally N1The value is more than 0 and less than N1Less than or equal to 3. And when a plurality of overseas mobile phone numbers exist under the same base station, the possibility of problems is higher.
S203: virtual identity feature input.
S204: and judging whether the conditions are met. If the condition is satisfied, the process proceeds to the call feature input in step S205, and if not, the process ends and no number is output.
In a specific embodiment, a plurality of virtual identities are generally available because an abnormal user using an off-shore mobile phone to surf the internet generally uses a mobile phone hotspot to network a plurality of computers. Of course, the abnormal user may encrypt the internet using a VPN or other technique, so that the virtual identity becomes 0. This is in contrast to the number of virtual identities of a regular person, which is typically less than 3 of one type. Meanwhile, the abnormal user uses the overseas mobile phone or the domestic general APP, and the abnormal user is different from the overseas APP which is usually used by overseas personnel when using the mobile phone in the domestic environment. The rules are as follows: the number of the same type of virtual identities is 0 or more than N2A, generally N2Value of 10; the virtual identity type is mainly domestic APP, such as: QQ, WeChat, Paibao, Taobao, etc.
S205: and inputting remark characteristics.
S206: and judging whether the conditions are met. If the conditions are met, ending the process to output the suspicious number, and if the conditions are not met, ending the process to not output the number.
Because the abnormal user uses the overseas mobile phone to surf the internet, the communication is seldom carried out, and therefore the abnormal user can not be remarked by other people basically. Thus, the number of remarks and the number of remarks are both equal to 0.
It should be appreciated that the setting of the threshold parameters is not limited to the above values, and the setting can be modified according to the actual application requirements or other empirical values, and the technical effects of the present invention can also be achieved.
Fig. 3 is a simplified flowchart illustrating an identification method for abnormal use of an outbound mobile phone number according to a specific embodiment of the present application. The method specifically comprises the following steps:
s301: and acquiring the overseas mobile phone number. And acquiring the total number of the overseas mobile phone numbers in the specific target area. The target mobile phone number can be filtered out by using the condition that the home location of the calling number is overseas and the position of the base station is a set specific area.
S302: the identification model is abnormally used when the foreign phone number is input. And performing calculation analysis by using an abnormal use identification model of the overseas mobile phone number. And performing relevant calculation analysis on the filtered mobile phone numbers through an identification model.
S303: and outputting the suspicious number. And outputting the suspicious numbers and listing the suspicious characteristics of each suspicious number.
At present, basically, no model specially aiming at overseas mobile phones exists, mainly aiming at individual case query application and being combined into all mobile phones to develop application. If the method is mixed in the domestic mobile phone, the method is often ignored due to the small amount of the mixed mobile phone, so that the model application needs to be carried out on the mobile phone in a targeted manner to find out the object which is abnormally used. The method provides an abnormal use identification method of the oversea mobile phone number based on big data, obtains the total oversea mobile phone number in a specific target area through the resource of the big data, establishes an abnormal use identification model of the oversea mobile phone, and finds out the abnormal use number. Further decisions regarding such suspect numbers can be made to block the phones or to conduct surveys of some phone users.
Fig. 4 shows a block diagram of an identification system for abnormal use of an outbound handset number according to one embodiment of the present application. The system specifically includes a target area number acquisition unit 401, a model analysis unit 402, and an output unit 403.
In a specific embodiment, the target area number obtaining unit 401 is configured to obtain a total number of overseas mobile phone numbers in the target area, and filter the target mobile phone number by using the home location of the calling number and the location of the base station; the model analysis unit 402 is configured to perform calculation analysis by using an overseas mobile phone number abnormal use recognition model, wherein the overseas mobile phone number abnormal use recognition model includes a location feature, a virtual identity feature and a remark feature; the output unit 403 is configured to output the suspicious number and list the suspicious features of the suspicious number in response to the location feature, the virtual identity feature, and the remark feature exceeding the preset feature value.
Embodiments of the present invention also relate to a computer-readable storage medium having stored thereon a computer program which, when executed by a computer processor, implements the method above. The computer program comprises program code for performing the method illustrated in the flow chart. It should be noted that the computer readable medium of the present application can be a computer readable signal medium or a computer readable medium or any combination of the two.
The system obtains the total quantity of overseas mobile phones in a specific area based on big data, and then calculates suspicious numbers by using an identification model. The characteristics of the abnormal mobile phone can be summarized and summarized according to experience, and reference values are given to all parameter values according to experience, so that the method is simple and practical, the calculated amount is relatively small, and the efficiency is high. The system is already applied to a big data system at present, is well applied to actual combat, and has a practical effect. In the future, the method is applied to different products in an expanded mode, and a better social effect is generated.
Referring now to FIG. 5, shown is a block diagram of a computer system 500 suitable for use in implementing the electronic device of an embodiment of the present application. The electronic device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 5, the computer system 500 includes a Central Processing Unit (CPU)501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data necessary for the operation of the system 500 are also stored. The CPU 501, ROM 502, and RAM 503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, and the like; an output portion 507 including a display such as a Liquid Crystal Display (LCD) and a speaker; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The driver 510 is also connected to the I/O interface 505 as necessary. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511. The computer program performs the above-described functions defined in the method of the present application when executed by the Central Processing Unit (CPU) 501.
It should be noted that the computer readable storage medium described herein can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable storage medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes a first determining unit, a second determining unit, a generating unit, a first extracting unit, and a first storing unit. Here, the names of these units do not constitute a limitation to the unit itself in some cases, and for example, the first determination unit may also be described as a "unit that determines whether or not there is newly added event information in a preset event information list".
As another aspect, the present application also provides a computer-readable storage medium, which may be included in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device. The computer readable storage medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring a total number of overseas mobile phone numbers in a target area; performing calculation analysis by using an abnormal use recognition model of the overseas mobile phone number, wherein the abnormal use recognition model of the overseas mobile phone number comprises a position feature, a virtual identity feature and a remark feature; and responding to the situation that the position characteristic, the virtual identity characteristic and the remark characteristic exceed the preset characteristic value, outputting the suspicious number and listing the suspicious characteristic of the suspicious number.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the invention. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.
Claims (13)
1. An identification method for abnormal use of an overseas mobile phone number, comprising:
acquiring a total number of overseas mobile phone numbers in a target area;
performing calculation analysis by using an abnormal use recognition model of the overseas mobile phone number, wherein the abnormal use recognition model of the overseas mobile phone number comprises a position feature, a virtual identity feature and a remark feature;
and responding to the situation that the position characteristic, the virtual identity characteristic and the remark characteristic exceed preset characteristic values, outputting a suspicious number, and listing the suspicious characteristic of the suspicious number.
2. The method for identifying the abnormal use of the outbound mobile phone number as claimed in claim 1, wherein the step of obtaining the full outbound mobile phone number in the target area further comprises: and filtering the target mobile phone number by using the home location of the calling number and the position of the base station.
3. The recognition method for the abnormal use of the foreign phone number according to claim 1, wherein the data sources of the foreign phone number abnormal use recognition model include phone location data, article attribute data and phone remark data.
4. An identification method for abnormal use of an outbound handset number as claimed in claim 3 wherein said handset location data includes fields for calling number, home, base station location, IMEI and IMSI.
5. An identification method for abnormal use of an overseas cell phone number according to claim 3, wherein the item attribute data includes fields for item type, item ID, virtual identity type, virtual identity account number, start time and latest time.
6. An identification method for abnormal use of an overseas cell phone number according to claim 3, wherein the cell phone memo data includes fields of a cell phone number, memo information, a memo number and a number of memo times.
7. The method according to claim 1, wherein the location feature, the virtual identity feature, and the remark feature are sequentially determined, and a suspicious number is output in response to all three features exceeding corresponding preset feature values.
8. The identification method for the abnormal use of the outbound mobile phone number according to claim 1 or 7, wherein the location characteristic judgment condition is: the number of the call base stations responding to the overseas mobile phone number is less than N1Then, the next feature judgment is carried out, wherein 0 is more than N1≤3。
9. The method according to claim 1 or 7, wherein the virtual identity characteristic judgment condition is: responding to the virtual identity of the overseas mobile phone number being 0 or more than N2Then, enter the next feature judgment, where N2Is 10.
10. The method of claim 9, wherein the virtual identity feature is of a type of domestic APP, including QQ, wechat, pay for treasure, and naught for use.
11. The identification method for the abnormal use of the outbound mobile phone number according to claim 1 or 7, wherein the remark feature judgment condition is: and when the number of the remarks and the number of the remarks of the overseas mobile phone number are both 0, outputting the suspicious number.
12. A computer-readable storage medium having one or more computer programs stored thereon, which when executed by a computer processor perform the method of any one of claims 1 to 11.
13. An identification system for abnormal use of an overseas cell phone number, the system comprising:
target area number acquisition unit: configuring a system for acquiring the total quantity of overseas mobile phone numbers in a target area, and filtering the target mobile phone numbers by using the home location of a calling number and the position of a base station;
a model analysis unit: the method comprises the steps that a recognition model for abnormal use of the overseas mobile phone number is configured to be used for calculation and analysis, wherein the recognition model for abnormal use of the overseas mobile phone number comprises a position feature, a virtual identity feature and a remark feature;
an output unit: and the system is configured to respond to the situation that the position characteristic, the virtual identity characteristic and the remark characteristic exceed preset characteristic values, output a suspicious number and list the suspicious characteristic of the suspicious number.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110385205.6A CN113286041B (en) | 2021-04-09 | 2021-04-09 | Method and system for identifying abnormal use of foreign mobile phone number |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110385205.6A CN113286041B (en) | 2021-04-09 | 2021-04-09 | Method and system for identifying abnormal use of foreign mobile phone number |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113286041A true CN113286041A (en) | 2021-08-20 |
CN113286041B CN113286041B (en) | 2023-10-03 |
Family
ID=77276452
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110385205.6A Active CN113286041B (en) | 2021-04-09 | 2021-04-09 | Method and system for identifying abnormal use of foreign mobile phone number |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113286041B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000165512A (en) * | 1998-11-24 | 2000-06-16 | Hitachi Ltd | Device and method for detecting illegal use and storage medium recording illegal use detection program and read by computer |
CN102960004A (en) * | 2009-09-08 | 2013-03-06 | 慕威尔图有限公司 | Method and system to enable multiple virtual numbers across different mobile networks |
CN108416485A (en) * | 2017-07-25 | 2018-08-17 | 平安科技(深圳)有限公司 | Method for identifying ID, electronic device and computer readable storage medium |
CN108566380A (en) * | 2018-03-15 | 2018-09-21 | 国家计算机网络与信息安全管理中心四川分中心 | A kind of proxy surfing Activity recognition and detection method |
-
2021
- 2021-04-09 CN CN202110385205.6A patent/CN113286041B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2000165512A (en) * | 1998-11-24 | 2000-06-16 | Hitachi Ltd | Device and method for detecting illegal use and storage medium recording illegal use detection program and read by computer |
CN102960004A (en) * | 2009-09-08 | 2013-03-06 | 慕威尔图有限公司 | Method and system to enable multiple virtual numbers across different mobile networks |
CN108416485A (en) * | 2017-07-25 | 2018-08-17 | 平安科技(深圳)有限公司 | Method for identifying ID, electronic device and computer readable storage medium |
CN108566380A (en) * | 2018-03-15 | 2018-09-21 | 国家计算机网络与信息安全管理中心四川分中心 | A kind of proxy surfing Activity recognition and detection method |
Also Published As
Publication number | Publication date |
---|---|
CN113286041B (en) | 2023-10-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9973506B2 (en) | Method and apparatus for clearing notification icon, and storage medium | |
CN106156619B (en) | Application security protection method and device | |
KR102210995B1 (en) | Apparatus and method for notifying information of security in electric device and computer-readable recording medium for the same | |
CN103002124B (en) | A kind of processing method of communication data, device | |
US20130055401A1 (en) | Terminal and method for providing risk of application using the same | |
KR101093440B1 (en) | Mobile telecommunication terminal capable of preventing spam calls and method there-of | |
CN111010426A (en) | Message pushing method and device | |
CN110390493B (en) | Task management method and device, storage medium and electronic equipment | |
CN104346560A (en) | Security authentication method and security authentication device | |
CN110557499B (en) | Information processing method and device and mobile terminal | |
CN111314063A (en) | Big data information management method, system and device based on Internet of things | |
CN104333530A (en) | Information credibility verifying method and apparatus | |
CN110674481B (en) | Account registration method, device, equipment and storage medium of application program | |
CN110413367B (en) | Task creation method and device, storage medium and electronic equipment | |
CN113010238A (en) | Permission determination method, device and system for micro application call interface | |
CN112016080A (en) | Application authority management method and device and electronic equipment | |
CN104394258A (en) | Method and device for processing contact change of communication object | |
CN113286041B (en) | Method and system for identifying abnormal use of foreign mobile phone number | |
CN110753909B (en) | Service scheduling method and device, computer equipment and computer readable storage medium | |
CN113595797B (en) | Alarm information processing method and device, electronic equipment and storage medium | |
CN107566596B (en) | Incoming call intercepting method and device | |
CN114423009A (en) | Fraud user identification method, apparatus, electronic device, and computer-readable medium | |
CN106376096B (en) | Wireless network connection method and equipment thereof | |
US10783020B2 (en) | Method for invoking component, and terminal | |
CN109656659B (en) | Behavior event processing method and device, electronic equipment and readable storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |