CN113286041B - Method and system for identifying abnormal use of foreign mobile phone number - Google Patents

Method and system for identifying abnormal use of foreign mobile phone number Download PDF

Info

Publication number
CN113286041B
CN113286041B CN202110385205.6A CN202110385205A CN113286041B CN 113286041 B CN113286041 B CN 113286041B CN 202110385205 A CN202110385205 A CN 202110385205A CN 113286041 B CN113286041 B CN 113286041B
Authority
CN
China
Prior art keywords
mobile phone
remark
overseas
feature
phone number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110385205.6A
Other languages
Chinese (zh)
Other versions
CN113286041A (en
Inventor
江汉祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meiya Pico Information Co Ltd
Original Assignee
Xiamen Meiya Pico Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meiya Pico Information Co Ltd filed Critical Xiamen Meiya Pico Information Co Ltd
Priority to CN202110385205.6A priority Critical patent/CN113286041B/en
Publication of CN113286041A publication Critical patent/CN113286041A/en
Application granted granted Critical
Publication of CN113286041B publication Critical patent/CN113286041B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application provides a method and a system for identifying abnormal use of an overseas mobile phone number, comprising the steps of obtaining a total number of overseas mobile phone numbers in a target area; calculating and analyzing by using an abnormal use identification model of the overseas mobile phone number, wherein the abnormal use identification model of the overseas mobile phone number comprises a position feature, a virtual identity feature and a remark feature; and outputting a suspicious number and listing suspicious characteristics of the suspicious number in response to the position characteristics, the virtual identity characteristics and the remark characteristics exceeding preset characteristic values. The method and the system have good effects on pre-early warning and in-process striking, and can be popularized and applied in various related systems.

Description

Method and system for identifying abnormal use of foreign mobile phone number
Technical Field
The application relates to the technical field of communication safety, in particular to a method and a system for identifying abnormal use of an overseas mobile phone number.
Background
The internet surfing purpose of the off-line mobile phone belongs to one of special internet surfing means, on one hand, the internet surfing IP is displayed as off-line, and on the other hand, the internet surfing does not pass through a domestic firewall. At present, the method has few active discovery and active identification models aiming at the abnormal use condition of the foreign mobile phone surfing in China.
At present, a model which is specially used for abnormal use of an overseas mobile phone is basically unavailable, and is mainly used for individual case inquiry application and is combined into all mobile phones to develop application. But the person who uses the off-the-road mobile phone for abnormal use has its specificity. If the model is mixed into the mobile phone, the model is often ignored because the quantity is small, and thus the model application needs to be developed in a targeted manner to find out the object with abnormal use.
Disclosure of Invention
Aiming at the technical problem that the prior art basically does not have a model for an overseas mobile phone and is difficult to analyze the abnormal use condition of a network using the overseas mobile phone, the application provides a method and a system for identifying the abnormal use of the overseas mobile phone number, which are used for solving the technical problems.
The application provides a method and a system for identifying abnormal use of an overseas mobile phone number.
A method for identifying abnormal use of an overseas cell phone number, comprising:
acquiring the total number of the overseas mobile phone numbers in the target area;
calculating and analyzing by using an abnormal use identification model of the external mobile phone number, wherein the abnormal use identification model of the external mobile phone number comprises a position feature, a virtual identity feature and a remark feature;
and outputting the suspicious number and listing the suspicious characteristics of the suspicious number in response to the position characteristics, the virtual identity characteristics and the remark characteristics exceeding the preset characteristic values.
In a specific embodiment, after obtaining the full quantity of the overseas mobile phone numbers in the target area, the method further includes: and filtering the target mobile phone number by using the attribution of the calling number and the position of the base station. By the method, the target mobile phone number can be filtered quickly.
In a specific embodiment, the data sources of the abnormal use identification model of the foreign mobile phone number include mobile phone location data, article attribute data and mobile phone remark data.
In a specific embodiment, the handset location data includes fields for a calling number, home location, base station location, IMEI, and IMSI.
In a particular embodiment, the item attribute data includes fields for an item type, an item ID, a virtual identity type, a virtual identity account number, a start time, and a latest time.
In a specific embodiment, the mobile phone remark data includes fields of a mobile phone number, remark information, a remark number, and a remark number.
In a specific embodiment, the location feature, the virtual identity feature, and the remark feature are sequentially determined, and the suspicious number is output in response to the three features exceeding the corresponding preset feature values.
In a specific embodiment, the location feature determination condition is: the number of call base stations responding to the foreign mobile phone number is less than N 1 When the next feature judgment is performed, wherein 0 is less than N 1 ≤3。
In a specific embodiment, the virtual identity feature determination condition is: virtual identity of 0 or greater than N in response to overseas handset number 2 When the next feature judgment is entered, N 2 10.
In particular embodiments, the type of virtual identity feature is an in-house APP, including QQ, weChat, payment and panning.
In a specific embodiment, the remark feature judgment conditions are: and outputting the suspicious number when the number and the number of remarks of the overseas mobile phone number are 0.
According to a second aspect of the present application, a computer-readable storage medium is presented, on which a computer program is stored which, when being executed by a computer processor, causes the above-mentioned method to be performed.
According to a third aspect of the present application, there is provided an identification system for abnormal use of an overseas mobile phone number, the system comprising:
target area number acquisition unit: the method comprises the steps of configuring and acquiring a total quantity of overseas mobile phone numbers in a target area, and filtering the target mobile phone numbers by utilizing a calling number attribution place and a base station position;
model analysis unit: the method comprises the steps of configuring an abnormal use identification model of the foreign mobile phone number for calculation and analysis, wherein the abnormal use identification model of the foreign mobile phone number comprises a position feature, a virtual identity feature and a remark feature;
an output unit: and the device is configured for outputting the suspicious number and listing the suspicious characteristics of the suspicious number in response to the position characteristics, the virtual identity characteristics and the remark characteristics exceeding preset characteristic values.
The application provides an abnormal use identification method and system for an external mobile phone number, which are based on big data. The abnormal use numbers are further judged, the telephones can be stopped, and investigation can be carried out on users of the telephones. The method can be applied to a big data system, can be well applied to actual combat, and has practical application effects. In the future, the method is expanded to be applied to different products, so that better social effects are generated.
Drawings
The accompanying drawings are included to provide a further understanding of the embodiments and are incorporated in and constitute a part of this specification. The drawings illustrate embodiments and together with the description serve to explain the principles of the application. Many of the intended advantages of other embodiments and embodiments will be readily appreciated as they become better understood by reference to the following detailed description. Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the accompanying drawings in which:
FIG. 1 is a flow chart of an identification method for abnormal use of an overseas handset number in accordance with one embodiment of the application;
FIG. 2 is a flow chart of an abnormal usage identification model for an off-the-shelf handset number in accordance with a specific embodiment of the application;
FIG. 3 is a simplified flow diagram of an identification method for abnormal use of an overseas handset number in accordance with one embodiment of the application;
FIG. 4 is a block diagram of an identification system for abnormal use of foreign mobile phone numbers in accordance with one embodiment of the present application;
fig. 5 is a schematic diagram of a computer system suitable for use in implementing an embodiment of the application.
Detailed Description
The application is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be noted that, for convenience of description, only the portions related to the present application are shown in the drawings.
Fig. 1 shows a flowchart of an identification method for abnormal use of an overseas mobile phone number according to an embodiment of the present application. As shown in fig. 1, the method comprises the steps of:
s101: and acquiring the total number of the overseas mobile phone numbers in the target area. Specifically, the calling number attribution and the base station position can be used for filtering the target mobile phone number.
S102: and calculating and analyzing by using an abnormal use identification model of the overseas mobile phone number, wherein the abnormal use identification model of the overseas mobile phone number comprises a position feature, a virtual identity feature and a remark feature.
In a specific embodiment, the data sources implemented by using the recognition model abnormally for the foreign mobile phone number include:
1) The mobile phone position data comprises the following field contents: calling number, calling home location, base station location, IMEI, IMSI;
2) The article attribute data includes the following field contents: the article type, the article ID, the virtual identity type, the virtual identity account number, the starting time and the latest time;
3) The mobile phone remark data comprises the following field contents: mobile phone number, remark information, remark number, remark times.
In a specific embodiment, the off-the-road mobile phone number abnormal use identification model includes 3 partial feature analyses, namely a location feature, a virtual identity feature and a remark feature. Each feature is a necessary condition, and the calculation is stopped when the feature is not satisfied. And under the condition that all three conditions are met, outputting the suspicious number for assisting in judgment.
S103: and outputting the suspicious number and listing the suspicious characteristics of the suspicious number in response to the position characteristics, the virtual identity characteristics and the remark characteristics exceeding the preset characteristic values.
In a specific embodiment, fig. 2 shows a flowchart of an abnormal usage identification model of an external mobile phone number according to a specific embodiment of the present application, and as shown in fig. 2, the model includes:
s201: and (5) inputting position characteristics.
S202: and judging whether the condition is satisfied. If the condition is satisfied, the virtual identity feature input in step S203 is continued, and if not, the process is ended and no number is output.
In a specific embodiment, the positions are relatively fixed, and the abnormal user can be most directly distinguished from the normal user's phone by using an overseas mobile phone to surf the internet, so that the positions in the normal user's life are more varied. The characteristic has small calculated amount and large filtering amount,and thus developed as a primary condition. Can set the talking base station smaller than N 1 And generally N 1 The value is more than 0 and less than N 1 And is less than or equal to 3. And when a plurality of overseas mobile phone numbers exist under the same base station, the possibility of problems is higher.
S203: virtual identity feature input.
S204: and judging whether the condition is satisfied. If the condition is satisfied, the process proceeds to step S205, and if the condition is not satisfied, the process is ended and no number is output.
In a specific embodiment, because the abnormal user uses the off-line mobile phone to access the internet, the mobile phone hot spot is generally used to network a plurality of computers, so that a plurality of virtual identities are generally generated. Of course, sometimes, an abnormal user uses VPN technology to encrypt internet, so that the virtual identity becomes 0. This is different from the number of dummy identities of a lay person, which is typically one type less than 3. Meanwhile, the universal APP used by the abnormal user by using the overseas mobile phone or domestic is different from the common use of the overseas APP when the overseas personnel use the mobile phone in the environment. The rules are as follows: the number of virtual identities of the same type is 0 or greater than N 2 And generally N 2 The value is 10; the virtual identity type is mainly an in-house APP, such as: QQ, weChat, payment treasured, panning treasured, etc.
S205: and remarking characteristic input.
S206: and judging whether the condition is satisfied. If the condition is met, the flow is ended, the suspicious number is output, and if the suspicious number is not met, the flow is ended, and the number is not output.
Because the abnormal user uses the off-line mobile phone to surf the internet, the communication is rarely performed, and the abnormal user is not noticed by other people basically. Thus the remark number and number are both equal to 0.
It should be appreciated that the setting of the threshold parameters is not limited to the above values, and may be modified according to practical application needs or other experience values, and the technical effects of the present application can be achieved.
Fig. 3 is a simplified flow diagram of an identification method for abnormal use of an overseas handset number according to a specific embodiment of the application. The method specifically comprises the following steps:
s301: and acquiring the foreign mobile phone number. And acquiring the total quantity of the overseas mobile phone numbers in the specific target area. The target mobile phone number can be filtered out by using the condition that the attribution of the calling number is overseas and the position of the base station is a set specific area.
S302: the identification model is used abnormally by inputting the foreign mobile phone number. And carrying out calculation analysis by using an abnormal use identification model of the foreign mobile phone number. And carrying out correlation calculation analysis on the filtered mobile phone numbers through the identification model.
S303: and outputting the suspicious number. Outputting suspicious numbers and setting out suspicious characteristics of each suspicious number.
At present, no model is specially used for the foreign mobile phones, mainly for individual case inquiry application and combined into all mobile phones to develop application. If the model is mixed into the mobile phone, the model is often ignored because the quantity is small, and thus the model application needs to be developed in a targeted manner, and the object with abnormal use is found. The method provides an abnormal use identification method of the foreign mobile phone number based on big data, obtains the total foreign mobile phone number in the specific target area through the resources of the big data, establishes an abnormal use identification model of the foreign mobile phone, and finds out the abnormal use number. The suspicious numbers are further judged, the phones can be stopped, and investigation can be carried out on users of the phones.
Fig. 4 shows a frame diagram of an identification system for abnormal use of an overseas handset number in accordance with one embodiment of the application. The system specifically includes a target area number acquisition unit 401, a model analysis unit 402, and an output unit 403.
In a specific embodiment, the target area number obtaining unit 401 is configured to obtain a total number of external mobile phone numbers in the target area, and filter the target mobile phone numbers by using the attribution of the calling number and the location of the base station; the model analysis unit 402 is configured to perform computational analysis using an off-shore mobile phone number abnormal use identification model, wherein the off-shore mobile phone number abnormal use identification model includes a location feature, a virtual identity feature, and a remark feature; the output unit 403 is configured to output a suspicious number in response to the location feature, the virtual identity feature, and the remark feature exceeding a preset feature value, and list suspicious features of the suspicious number.
Embodiments of the present application also relate to a computer readable storage medium having stored thereon a computer program which, when executed by a computer processor, implements the method as described above. The computer program contains program code for performing the method shown in the flow chart. The computer readable medium of the present application may be a computer readable signal medium or a computer readable medium, or any combination of the two.
The system acquires the total quantity of overseas mobile phones in a specific area based on big data, and calculates suspicious numbers by using an identification model. The method can summarize the characteristics of the abnormally used overseas mobile phone according to experience, give reference values to the parameter values according to experience, is simple and practical, has relatively small calculated amount and high efficiency. The system is applied to a big data system at present, is well applied to actual combat, and has practical effects. In the future, the method is expanded to be applied to different products, so that better social effects are generated.
Referring now to FIG. 5, there is illustrated a schematic diagram of a computer system 500 suitable for use in implementing an electronic device of an embodiment of the present application. The electronic device shown in fig. 5 is only an example and should not be construed as limiting the functionality and scope of use of the embodiments of the present application.
As shown in fig. 5, the computer system 500 includes a Central Processing Unit (CPU) 501, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data required for the operation of the system 500 are also stored. The CPU 501, ROM 502, and RAM 503 are connected to each other through a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input section 506 including a keyboard, a mouse, and the like; an output portion 507 including a Liquid Crystal Display (LCD) or the like, a speaker or the like; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The drive 510 is also connected to the I/O interface 505 as needed. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as needed so that a computer program read therefrom is mounted into the storage section 508 as needed.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 509, and/or installed from the removable media 511. The above-described functions defined in the method of the present application are performed when the computer program is executed by a Central Processing Unit (CPU) 501.
The computer readable storage medium according to the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable storage medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable storage medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present application may be implemented in software or in hardware. The described units may also be provided in a processor, for example, described as: a processor includes a first determination unit, a second determination unit, a generation unit, a first extraction unit, and a first storage unit. The names of these units do not constitute a limitation on the unit itself in some cases, and for example, the first determination unit may also be described as "a unit that determines whether or not newly added event information exists in a preset event information list".
As another aspect, the present application also provides a computer-readable storage medium that may be contained in the electronic device described in the above embodiment; or may exist alone without being incorporated into the electronic device. The computer-readable storage medium carries one or more programs that, when executed by the electronic device, cause the electronic device to: acquiring the total number of the overseas mobile phone numbers in the target area; calculating and analyzing by using an abnormal use identification model of the external mobile phone number, wherein the abnormal use identification model of the external mobile phone number comprises a position feature, a virtual identity feature and a remark feature; and outputting the suspicious number and listing the suspicious characteristics of the suspicious number in response to the position characteristics, the virtual identity characteristics and the remark characteristics exceeding the preset characteristic values.
The above description is only illustrative of the preferred embodiments of the present application and of the principles of the technology employed. It will be appreciated by persons skilled in the art that the scope of the application referred to in the present application is not limited to the specific combinations of the technical features described above, but also covers other technical features formed by any combination of the technical features described above or their equivalents without departing from the inventive concept described above. Such as the above-mentioned features and the technical features disclosed in the present application (but not limited to) having similar functions are replaced with each other.

Claims (5)

1. A method for identifying abnormal use of an overseas cell phone number, comprising:
acquiring the total number of the overseas mobile phone numbers in the target area;
calculating and analyzing by using an abnormal use identification model of the overseas mobile phone number, wherein the abnormal use identification model of the overseas mobile phone number comprises a position feature, a virtual identity feature and a remark feature;
outputting a suspicious number in response to the position feature, the virtual identity feature and the remark feature exceeding a preset feature value, and listing suspicious features of the suspicious number;
the data sources of the abnormal use identification model of the overseas mobile phone number comprise mobile phone position data, article attribute data and mobile phone remark data, wherein the mobile phone position data comprises fields of a calling number, a attribution place, a base station position, an IMEI and an IMSI, the article attribute data comprises fields of an article type, an article ID, a virtual identity type, a virtual identity account number, a starting time and a latest time, the mobile phone remark data comprises fields of a mobile phone number, remark information, a remark number and remark times, and the mobile phone remark data comprises fields of a mobile phone number, remark information, a remark number and a remark times;
the position characteristic judging conditions are as follows: the number of call base stations responding to the overseas mobile phone number is smaller than N 1 When the next feature judgment is performed, wherein 0 is less than N 1 ≤3;
The virtual machineThe identity characteristic judging conditions are as follows: responding to the virtual identity of the overseas mobile phone number being 0 or greater than N 2 When the next feature judgment is entered, N 2 10;
the remark characteristic judging conditions are as follows: and outputting the suspicious number when the number and the number of remarks of the overseas mobile phone number are 0.
2. The method for identifying abnormal use of an overseas mobile phone number according to claim 1, further comprising, after obtaining the full amount of overseas mobile phone numbers within the target area: and filtering the target mobile phone number by using the attribution of the calling number and the position of the base station.
3. The method for identifying abnormal use of an off-shore mobile phone number according to claim 1, wherein the type of virtual identity feature is an in-house APP, including QQ, weChat, payment treasures and panning treasures.
4. A computer readable storage medium having stored thereon one or more computer programs, which when executed by a computer processor implement the method of any of claims 1 to 3.
5. An identification system for abnormal use of an overseas cell phone number, the system comprising:
target area number acquisition unit: the method comprises the steps of configuring and acquiring a total quantity of overseas mobile phone numbers in a target area, and filtering the target mobile phone numbers by utilizing a calling number attribution place and a base station position;
model analysis unit: the method comprises the steps of configuring an abnormal use identification model of an overseas mobile phone number for calculation and analysis, wherein the abnormal use identification model of the overseas mobile phone number comprises a position feature, a virtual identity feature and a remark feature;
an output unit: the method comprises the steps of configuring to output a suspicious number and listing suspicious characteristics of the suspicious number in response to the position characteristics, the virtual identity characteristics and the remark characteristics exceeding preset characteristic values;
the data sources of the abnormal use identification model of the overseas mobile phone number comprise mobile phone position data, article attribute data and mobile phone remark data, wherein the mobile phone position data comprises fields of a calling number, a attribution place, a base station position, an IMEI and an IMSI, the article attribute data comprises fields of an article type, an article ID, a virtual identity type, a virtual identity account number, a starting time and a latest time, the mobile phone remark data comprises fields of a mobile phone number, remark information, a remark number and remark times, and the mobile phone remark data comprises fields of a mobile phone number, remark information, a remark number and a remark times;
the position characteristic judging conditions are as follows: the number of call base stations responding to the overseas mobile phone number is smaller than N 1 When the next feature judgment is performed, wherein 0 is less than N 1 ≤3;
The virtual identity characteristic judging conditions are as follows: responding to the virtual identity of the overseas mobile phone number being 0 or greater than N 2 When the next feature judgment is entered, N 2 10;
the remark characteristic judging conditions are as follows: and outputting the suspicious number when the number and the number of remarks of the overseas mobile phone number are 0.
CN202110385205.6A 2021-04-09 2021-04-09 Method and system for identifying abnormal use of foreign mobile phone number Active CN113286041B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110385205.6A CN113286041B (en) 2021-04-09 2021-04-09 Method and system for identifying abnormal use of foreign mobile phone number

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110385205.6A CN113286041B (en) 2021-04-09 2021-04-09 Method and system for identifying abnormal use of foreign mobile phone number

Publications (2)

Publication Number Publication Date
CN113286041A CN113286041A (en) 2021-08-20
CN113286041B true CN113286041B (en) 2023-10-03

Family

ID=77276452

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110385205.6A Active CN113286041B (en) 2021-04-09 2021-04-09 Method and system for identifying abnormal use of foreign mobile phone number

Country Status (1)

Country Link
CN (1) CN113286041B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000165512A (en) * 1998-11-24 2000-06-16 Hitachi Ltd Device and method for detecting illegal use and storage medium recording illegal use detection program and read by computer
CN102960004A (en) * 2009-09-08 2013-03-06 慕威尔图有限公司 Method and system to enable multiple virtual numbers across different mobile networks
CN108416485A (en) * 2017-07-25 2018-08-17 平安科技(深圳)有限公司 Method for identifying ID, electronic device and computer readable storage medium
CN108566380A (en) * 2018-03-15 2018-09-21 国家计算机网络与信息安全管理中心四川分中心 A kind of proxy surfing Activity recognition and detection method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2000165512A (en) * 1998-11-24 2000-06-16 Hitachi Ltd Device and method for detecting illegal use and storage medium recording illegal use detection program and read by computer
CN102960004A (en) * 2009-09-08 2013-03-06 慕威尔图有限公司 Method and system to enable multiple virtual numbers across different mobile networks
CN108416485A (en) * 2017-07-25 2018-08-17 平安科技(深圳)有限公司 Method for identifying ID, electronic device and computer readable storage medium
CN108566380A (en) * 2018-03-15 2018-09-21 国家计算机网络与信息安全管理中心四川分中心 A kind of proxy surfing Activity recognition and detection method

Also Published As

Publication number Publication date
CN113286041A (en) 2021-08-20

Similar Documents

Publication Publication Date Title
CN106156619B (en) Application security protection method and device
US9973506B2 (en) Method and apparatus for clearing notification icon, and storage medium
KR102210995B1 (en) Apparatus and method for notifying information of security in electric device and computer-readable recording medium for the same
CN106332307B (en) Method for accessing application program to network and mobile terminal
US20140007249A1 (en) Privacy Control in a Social Network
EP2562667A1 (en) Apparatus and method for providing security information on background process
CN110084034B (en) Password setting method based on weak password detection, storage medium and electronic equipment
CN106851779A (en) A kind of method and mobile terminal for recognizing access point and focus
CN104281950A (en) Method and device for improving electronic payment safety
CN105005740A (en) Method and system for controlling terminal application
CN110557499B (en) Information processing method and device and mobile terminal
CN104333530A (en) Information credibility verifying method and apparatus
CN110674481A (en) Account registration method, device, equipment and storage medium of application program
CN104427118A (en) Method for recommending contents and mobile terminal
CN113286041B (en) Method and system for identifying abnormal use of foreign mobile phone number
CN112016080A (en) Application authority management method and device and electronic equipment
CN112463266A (en) Execution policy generation method and device, electronic equipment and storage medium
KR101516997B1 (en) Method and apparatus for protecting smishing
CN107819761B (en) Data processing method and device and readable storage medium
CN113822036B (en) Privacy policy content generation method and device and electronic equipment
CN106376096B (en) Wireless network connection method and equipment thereof
CN108419238A (en) A kind of method and device of detection rogue AP
CN109656659B (en) Behavior event processing method and device, electronic equipment and readable storage medium
US10783020B2 (en) Method for invoking component, and terminal
CN115022266A (en) Group member adding method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant