CN113950054B - Number identification method, device, electronic equipment and storage medium - Google Patents

Number identification method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113950054B
CN113950054B CN202110835709.3A CN202110835709A CN113950054B CN 113950054 B CN113950054 B CN 113950054B CN 202110835709 A CN202110835709 A CN 202110835709A CN 113950054 B CN113950054 B CN 113950054B
Authority
CN
China
Prior art keywords
detected
authentication
group
data
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110835709.3A
Other languages
Chinese (zh)
Other versions
CN113950054A (en
Inventor
李华伟
夏致昊
尚程
董玉强
王杰
杨满智
蔡琳
梁彧
田野
金红
陈晓光
傅强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Eversec Beijing Technology Co Ltd
Original Assignee
Eversec Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Eversec Beijing Technology Co Ltd filed Critical Eversec Beijing Technology Co Ltd
Priority to CN202110835709.3A priority Critical patent/CN113950054B/en
Publication of CN113950054A publication Critical patent/CN113950054A/en
Application granted granted Critical
Publication of CN113950054B publication Critical patent/CN113950054B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/126Anti-theft arrangements, e.g. protection against subscriber identity module [SIM] cloning

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The embodiment of the invention discloses a number identification method, a number identification device, electronic equipment and a storage medium. The method comprises the following steps: acquiring original signaling data, and extracting authentication data corresponding to at least one number to be detected in the original signaling data; determining authentication delay data corresponding to each number to be detected according to the authentication data of each number to be detected; according to the authentication delay data of each number to be detected, carrying out grouping processing on each number to be detected to obtain a number group to be detected; the technical scheme of the embodiment of the invention solves the technical problems that the existing number identification method cannot accurately identify the number and can not effectively identify the abnormal telephone, and can effectively identify the target number.

Description

Number identification method, device, electronic equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a number identification method, a number identification device, electronic equipment and a storage medium.
Background
The GOIP equipment is a hardware equipment for network communication, supports the access of a mobile phone card and can convert a traditional telephone signal into a network signal. One device can operate hundreds of mobile phone SIM cards at the same time, and can also remotely control the remote SIM cards and GOIP devices to dial and send and receive short messages, so that the separation of people and the SIM cards is realized, and the purposes of hiding identities and avoiding hit are achieved. Meanwhile, the mobile phone can virtually dial, and can randomly switch the mobile phone number to dial the telephone of the victim, so that the mobile phone gradually becomes a new means of fraud molecules.
In the number identification method in the prior art, a call behavior characteristic of a number to be identified is input into a trained number identification model, so that whether the number to be identified is abnormal or not is identified. The other is based on the flow content of the SIP (Session Initiation Protocol ) of the fixed network side, so as to identify whether the number to be identified is abnormal, specifically, the network flow of the fixed telephone network is analyzed to determine the call scene, and then, whether the number to be identified is abnormal is identified through the call scene.
However, the conventional number recognition method cannot accurately recognize the number when the machine and card of the GOIP equipment are separated, and has a problem that an abnormal telephone cannot be recognized effectively.
Disclosure of Invention
The embodiment of the invention provides a number identification method, a device, electronic equipment and a storage medium, which can effectively identify abnormal telephones under the condition of separating GOIP equipment from a machine card, thereby effectively avoiding users from being deceived.
In a first aspect, an embodiment of the present invention provides a number identification method, where the method includes:
acquiring original signaling data, and extracting authentication data corresponding to at least one number to be detected from the original signaling data;
determining authentication delay data corresponding to each number to be detected according to the authentication data of each number to be detected;
according to the authentication delay data of each number to be detected, grouping the numbers to be detected to obtain a number group to be detected;
and determining a target detection number group in the number group to be detected, and determining a target number according to each number to be detected in the target detection number group.
In a second aspect, an embodiment of the present invention further provides a number identifying device, where the number identifying device includes:
the authentication data extraction module is used for acquiring original signaling data and extracting authentication data corresponding to at least one number to be detected in the original signaling data;
The authentication delay data determining module is used for determining authentication delay data corresponding to each number to be detected according to the authentication data of each number to be detected;
the to-be-detected number group obtaining module is used for carrying out grouping processing on each to-be-detected number according to the authentication delay data of each to-be-detected number to obtain a to-be-detected number group;
and the target number determining module is used for determining a target detection number group in the number group to be detected, and determining a target number according to each number to be detected in the target detection number group.
In a third aspect, an embodiment of the present invention further provides an electronic device, including:
one or more processors;
a storage means for storing one or more programs;
the program, when executed by the processor, causes the processor to implement the number identification method as provided by any embodiment of the present invention.
In a fourth aspect, embodiments of the present invention further provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a number identification method as provided by any of the embodiments of the present invention.
According to the technical scheme, the authentication data corresponding to at least one number to be detected in the original signaling data are extracted by acquiring the original signaling data; according to the authentication data of each number to be detected, determining authentication delay data corresponding to each number to be detected; according to the authentication delay data of each number to be detected, carrying out grouping processing on each number to be detected to obtain a number group to be detected; the technical scheme of the embodiment of the invention determines the target number according to each number to be detected in the target detection number group, determines the authentication delay data of the number to be detected through the authentication data of the number to be detected in the original signaling data, and identifies the target number based on the authentication delay data without depending on the identification of dialing equipment.
Drawings
In order to more clearly illustrate the technical solution of the exemplary embodiments of the present invention, a brief description is given below of the drawings that are needed to describe the embodiments. It is obvious that the drawings presented are only drawings of some of the embodiments of the invention to be described, and not all the drawings, and that other drawings can be made according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flow chart of a number identification method according to a first embodiment of the present invention;
fig. 2 is a flow chart of a number identification method according to a second embodiment of the present invention;
fig. 3 is a schematic diagram of a number recognition device according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device according to a fourth embodiment of the present invention.
Detailed Description
The invention is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting thereof. It should be further noted that, for convenience of description, only some, but not all structures related to the present invention are shown in the drawings.
Example 1
Fig. 1 is a schematic flow chart of a number identification method provided in an embodiment of the present invention, where the embodiment is applicable to a case of identifying a target number in a batch number, especially to a case of dialing a virtual device, and is applicable to a case of identifying a target number of a machine-card separation type, and the method may be performed by a number identification device, which may be implemented in a software and/or hardware manner, and the number identification device may be integrated in an electronic device such as a computer or a server.
As shown in fig. 1, the method of the present embodiment includes:
s110, acquiring original signaling data, and extracting authentication data corresponding to at least one number to be detected in the original signaling data.
The original signaling data may be signaling data to be processed at the current time. The raw signaling data may include, but is not limited to, the following: number to be detected, authentication data, location coding and cell identification. The number to be detected may be a number which needs to be identified at the current time. Authentication data may include, but is not limited to, the following: the number of authentications, an authentication start time point corresponding to each authentication, and an authentication completion time point corresponding to each authentication.
Specifically, the original signaling data within the preset duration may be obtained. Furthermore, the number to be detected and the authentication data corresponding to the number to be detected in the original signaling data can be extracted.
Alternatively, there may be various manners of acquiring the original signaling data, which are not limited herein, for example, acquiring the signaling data from an operation domain, or acquiring the signaling data from a base station, or receiving the signaling data sent by a server, or acquiring the signaling data from an international gateway.
S120, determining authentication delay data corresponding to each number to be detected according to the authentication data of each number to be detected.
The authentication delay data may be authentication delay data obtained according to authentication data of the number to be detected.
Specifically, after the authentication data of each number to be detected is obtained, the authentication delay data corresponding to each number to be detected can be determined according to the authentication data of each number to be detected.
Optionally, the authentication delay data corresponding to each number to be detected is determined according to the authentication data of each number to be detected by the following steps:
step one, for each authentication of each number to be detected, calculating a difference value between an authentication starting time point of the current authentication of the current number to be detected and an authentication finishing time point to obtain a single authentication time delay of each authentication of each number to be detected.
The single authentication delay can be understood as one authentication delay of the number to be detected.
Specifically, for each authentication of each number to be detected, the current number to be detected may be determined. After determining the current number to be detected, an authentication start time point and an authentication completion time point of the current authentication of the current number may be determined. After determining the authentication starting time point and the authentication finishing time point of the current authentication of the current number, the difference value calculation can be carried out on the authentication starting time point and the authentication finishing time point of the current authentication of the number to be detected, and then, the single authentication time delay of each authentication of each number to be detected can be obtained.
For example, the current number to be detected is 10 minutes and 20 seconds at 9 am on 10 month 01 of 2020, and the current number to be detected is 9 minutes and 23 seconds at 9 am on 10 month 01 of 2020, and then the single authentication delay of the current number to be detected on the first authentication is a time difference between 9 minutes and 23 seconds at 9 am on 10 month 01 of 2020 and 10 minutes and 20 seconds at 9 am on 10 month 01 of 2020, that is, the single authentication delay of the current number to be detected on the first authentication is 3 seconds.
And step two, calculating an authentication delay average value of each number to be detected according to the authentication times of each number to be detected and the single authentication delay of each authentication, and taking the authentication delay average value as authentication delay data corresponding to each number to be detected.
Specifically, after obtaining the single authentication time delay of each authentication of each number to be detected, the average value of the authentication time delays of each number to be detected can be calculated according to the authentication times of each number to be detected and the single authentication time delay of each authentication, and then the average value of the authentication time delays of each number to be detected can be obtained, so that the average value of the authentication time delays of each number to be detected can be used as the authentication time delay data corresponding to each number to be detected.
For example, the number of times of authentication of the current number to be detected is 3 times, the authentication time delay of the current number to be detected at the 1 st time is 3 seconds, the authentication time delay of the current number to be detected at the 2 nd time is 1 second, and the authentication time delay of the current number to be detected at the 3 rd time is 2 seconds, so that the average value of the authentication time delays of the current number to be detected can be obtainedSecond, namely, the authentication delay data of the current number to be detected is 2 seconds.
S130, according to the authentication delay data of each number to be detected, grouping processing is carried out on each number to be detected, and a number group to be detected is obtained.
The number group to be detected may be a number group obtained by grouping each number to be detected. The number of sets of numbers to be detected may be one or more. The number of numbers to be detected included in the group of numbers to be detected may be one or more.
Specifically, for the authentication delay data of each number to be detected, packet processing can be performed on each number to be detected, and then, a number group to be detected can be obtained.
S140, determining a target detection number group in the number group to be detected, and determining target numbers according to each number to be detected in the target detection number group.
The target detection number group may be a number group obtained by analyzing authentication delay data corresponding to each number to be detected included in the number group to be detected. The number of sets of object detection numbers may be one or more. The destination number may be understood as an abnormal type number.
Specifically, the authentication delay data corresponding to the number to be detected in each number group to be detected can be analyzed, and then, the target detection number group in the number group to be detected can be determined. After determining the target detection number group in the number group to be detected, the call behavior characteristic data corresponding to each number to be detected in the target detection number group can be analyzed, and then the target number can be determined.
It should be noted that, the number of the target detection number groups is smaller than or equal to the number of the number groups to be detected.
Optionally, the target detection number group in the number group to be detected may be determined by the following steps:
step one, determining the average authentication delay of the number groups to be detected according to the authentication delay data corresponding to the numbers to be detected in the number groups to be detected aiming at each number group to be detected.
Specifically, for each number group to be detected, the average authentication delay of the number group to be detected can be determined according to the authentication delay data corresponding to each number to be detected in the number group to be detected.
Optionally, the average authentication delay of the number group to be detected may be determined according to authentication delay data corresponding to each number to be detected in the number group to be detected by:
and summing the authentication delay data corresponding to each number to be detected in the number group to be detected to obtain authentication delay data and value corresponding to the number group to be detected, and dividing the authentication delay data and value by the number of the numbers to be detected included in the number group to be detected to obtain the average authentication delay of the number group to be detected.
The current number group to be detected includes 3 numbers to be detected, wherein the 3 numbers to be detected are number 1, number 2 and number 3 respectively. The authentication delay data corresponding to the number 1 is 2 seconds, the authentication delay data corresponding to the number 2 is 3 seconds, and the authentication delay data corresponding to the number 3 is 1 second, so that the sum of the authentication delay data corresponding to the number group to be detected is 2+3+1=6 seconds, and further, the average authentication delay of the number group to be detected can be 6/3=2 seconds.
And step two, if the average authentication time delay of the number group to be detected reaches a preset time delay threshold, taking the number group to be detected as a target detection number group.
The delay threshold may be empirically set, and the specific value thereof is not limited herein, for example, the pre-delay threshold is 2 seconds, 3 seconds, or 4 seconds.
Specifically, a time delay threshold is preset, and if the average authentication time delay of the number group to be detected reaches the preset time delay threshold, the number group to be detected can be used as the target detection number group.
Illustratively, the preset delay threshold is 2 seconds. The number groups to be detected are a first group of number groups to be detected and a second group of number groups to be detected, wherein the average authentication time of the first group of number groups to be detected is 1 second, and the average authentication time of the second group of number groups to be detected is 3 seconds. It can be seen that the average authentication of the first group of to-be-detected number groups does not reach 2 seconds for 1 second, and the average authentication of the second group of to-be-detected number groups reaches 2 seconds for 2 seconds, so that the second group of to-be-detected number groups is the target detection number group.
Optionally, determining the target number according to each number to be detected in the target detection number group includes: and extracting call behavior characteristic data of each number to be detected in the target detection number group, and determining the target number according to the call behavior characteristic data of each number to be detected.
The call behavior feature data may include at least one of feature data such as call times, calling duty ratio, opposite terminal number dispersion, and opposite terminal home location duplicate removal amount.
Specifically, call behavior feature data of each number to be detected in the target detection number group can be extracted, further, at least one call behavior feature data of each number to be detected is analyzed, and the target number is determined based on an analysis result.
Optionally, determining the target number according to the call behavior feature data of each number to be detected includes: extracting the number of calls of a target number, the calling duty ratio, the number dispersion of the opposite terminal and the characteristic data of the duplicate removal quantity of the attribution of the opposite terminal in a preset period; and determining the target number according to the call times, the calling duty ratio, the opposite terminal number dispersion and the opposite terminal attribution deduplication quantity characteristic data of the target number.
Optionally, the target number may be determined according to the number of calls, the calling duty ratio, the opposite terminal number dispersion, and the opposite terminal home location deduplication number feature data of the target number by:
the number of calls threshold, the calling duty ratio threshold, the opposite terminal number dispersion threshold and the opposite terminal home location duplication removal number threshold can be preset, if the number of calls of the number to be detected reaches the number of calls threshold, the calling duty ratio of the number to be detected reaches the calling duty ratio threshold, the opposite terminal number dispersion of the number to be detected reaches the opposite terminal number dispersion threshold, and the opposite terminal home location duplication removal number of the number to be detected reaches the opposite terminal home location duplication removal number threshold, the number to be detected can be used as a target number.
In order to further improve the efficiency and accuracy of the number identification, after the target number is determined, the maximum time advance corresponding to the target number can be obtained from the original signaling data, and further, the number processing can be performed on the target number according to the maximum time advance corresponding to the target number. The number processing may be a reserved number or a deleted number.
According to the technical scheme, the authentication data corresponding to at least one number to be detected in the original signaling data are extracted by acquiring the original signaling data; according to the authentication data of each number to be detected, determining authentication delay data corresponding to each number to be detected; according to the authentication delay data of each number to be detected, carrying out grouping processing on each number to be detected to obtain a number group to be detected; the technical scheme of the embodiment of the invention determines the target number according to each number to be detected in the target detection number group, determines the authentication delay data of the number to be detected through the authentication data of the number to be detected in the original signaling data, and identifies the target number based on the authentication delay data without depending on the identification of dialing equipment.
Example two
Fig. 2 is a flow chart of a number identification method according to a second embodiment of the present invention, and based on the foregoing embodiment, optionally, the grouping processing is performed on each number to be detected according to authentication delay data of each number to be detected, so as to obtain a number group to be detected, including: arranging the authentication delay data of each number to be detected according to a preset arrangement sequence, determining the number of the number to be detected corresponding to each authentication delay data after arrangement, and obtaining a number sequence of the number arranged according to the preset arrangement sequence, wherein the preset arrangement sequence is from big to small or from small to big; and carrying out grouping processing on each number to be detected according to the variation trend of the number in the number sequence to obtain a number group to be detected.
Wherein, the technical terms identical to or corresponding to the above embodiments are not repeated herein.
As shown in fig. 2, the method of this embodiment may specifically include:
s210, acquiring original signaling data, and extracting authentication data corresponding to at least one number to be detected in the original signaling data.
S220, determining authentication delay data corresponding to each number to be detected according to the authentication data of each number to be detected.
S230, arranging the authentication delay data of each number to be detected according to a preset arrangement sequence, and determining the number of the numbers to be detected corresponding to each authentication delay data after arrangement to obtain a number sequence of the number arranged according to the preset arrangement sequence.
The preset arrangement sequence can be from big to small or from small to big.
Specifically, after the authentication delay data corresponding to each number to be detected is obtained, the arrangement sequence of the authentication delay data of each number to be detected can be preset. The authentication delay data of each number to be detected is arranged according to a preset arrangement sequence, and then the number of the numbers to be detected corresponding to each authentication delay data after arrangement can be determined. After the number of the numbers to be detected corresponding to each authentication delay data after arrangement is determined, a number sequence of the number of the numbers arranged according to a preset arrangement sequence can be obtained.
For example, the authentication delay data of the number to be detected 1 is 2 seconds, the authentication delay data of the number to be detected 2 is 2 seconds, and the authentication delay data of the number to be detected 3 is 3 seconds. And arranging the authentication delay data of each number to be detected from small to large, wherein the number of numbers with the authentication delay data of 2 seconds is 2, and the number of numbers with the authentication delay data of 3 seconds is 1. Therefore, the number sequence of the number arranged according to the arrangement sequence from small to large can be obtained, wherein the number sequence is 2 seconds of authentication delay data and the authentication delay data is 3 seconds.
S240, according to the variation trend of the number in the number sequence, grouping processing is carried out on each number to be detected, and a number group to be detected is obtained.
The change trend may be a trend of the number and the authentication delay data, alternatively, the change trend may be a trend of the number changing from small to large with the authentication delay data, or the change trend may be a trend of the number changing from large to small with the authentication delay data.
Specifically, after a number sequence of numbers arranged according to a preset arrangement order is obtained, a change trend of the numbers in the number sequence can be determined. Furthermore, each number to be detected can be subjected to grouping processing according to the changing trend of the number in the number sequence, and then the number group to be detected can be obtained.
Optionally, the number to be detected may be grouped according to a variation trend of the number in the number sequence to obtain a number group to be detected:
step one, determining the inflection point position in the variation trend of the number in the number sequence, and taking authentication delay data corresponding to the number at the inflection point position as grouping reference data.
The inflection point position may be a position of an inflection point in a trend of a number of numbers in the number sequence. The number of corner points may be one or more. The packet reference data may be reference data for grouping the numbers to be detected. The number of packet reference data may be one or more.
Specifically, after determining the trend of the number of numbers in the number sequence, the inflection point position in the trend of the number of numbers in the number sequence may be determined according to the trend of the number of numbers in the number sequence. After determining the inflection point location, authentication delay data corresponding to the number located at the inflection point location may be used as the packet reference data.
It should be noted that, considering that the authentication delay data and the number of numbers are often discrete data, the number of numbers located at the inflection point position may be understood as the number of numbers located adjacent to the inflection point position. The packet reference data may select one of the authentication delay data corresponding to one of the two critical number numbers whose trend changes from an increasing trend to a decreasing trend or from a decreasing trend to an increasing trend as the packet reference data.
By way of example only, and not by way of limitation,
TABLE 1
T 10 20 30 40 50 60 70 80 90 100 110 120 130 140 150 160
S 10 15 20 25 20 15 10 15 20 25 20 15 5 4 10 15
Table 1 is a trend of the number and the authentication delay data, where T represents the authentication delay data and S represents the number. Alternatively, (t=40, s=25) in the variation trend is taken as one inflection point position, that is, inflection point position 1; (t=70, s=10) as one inflection point position, namely, inflection point position 2; (t=100, s=25) as one inflection point position, namely, inflection point position 3; (t=140, s=4) as one inflection point position, that is, inflection point position 4. Then t=40 can be taken as one packet reference data, i.e. packet reference data 1; let t=70 be one packet reference data, i.e., packet reference data 2; t=100 as one packet reference data, i.e., packet reference data 3; t=140 as one packet reference data, i.e., packet reference data 3.
Dividing the number to be detected corresponding to each authentication delay data into at least two primary number groups based on the packet reference data, and determining the number groups to be detected based on the at least two primary number groups.
The primary number group may divide the number to be detected corresponding to each authentication delay data according to the packet reference data.
Specifically, after the packet reference data is obtained, the number to be detected corresponding to each authentication delay data may be divided based on the packet reference data, and then at least two primary number groups may be obtained. After obtaining at least two primary number groups, the obtained primary number groups can be processed, and then the number groups to be detected can be obtained. Alternatively, the obtained primary number groups may be subjected to a combination process.
Optionally, the number to be detected corresponding to each authentication delay data may be divided into at least two primary number groups based on the packet reference data by:
dividing a quantity sequence into at least two quantity intervals by taking each group of reference data as a critical point of the quantity interval.
The number interval may be a monotonically increasing interval or a monotonically decreasing interval.
Specifically, each group of reference data is used as a critical point of a number interval, so that the number sequence can be divided, and at least two number intervals can be obtained.
And secondly, taking the arrangement sequence of the authentication time delay data as the dividing sequence of the primary number groups, and determining each number interval or every two adjacent number intervals as a primary number group.
Specifically, by taking the arrangement sequence of the authentication delay data as the division sequence of the primary number groups, each number interval or every two adjacent number intervals can be determined as one primary number group.
Along the lines of the above example, with continued reference to table 1, packet reference data may be obtained as: packet reference data 1 (t=40), packet reference data 2 (t=100), and packet reference data 3 (t=140). Then, the number sequence numbers corresponding to t=10 to t=40 are taken as one number section, i.e., number section 1; taking the number sequence numbers corresponding to t=50 to t=70 as one number interval, namely a number interval 2; taking the number sequence numbers corresponding to t=70 to t=100 as one number interval, namely a number interval 3; taking the number sequence numbers corresponding to t=100 to t=140 as one number interval, namely a number interval 4; the number sequence numbers corresponding to t=150 to t=160 are taken as one number section, i.e. number section 5.
Then, the number interval 1, the number interval 2, the number interval 3, the number interval 4, and the number interval 5 may be individually used as one primary number group, or the number interval 1 and the number interval 2 may be used as one primary number group, the number interval 3 and the number interval 4 may be used as one primary number group, and the number interval 5 may be used as one initial number group. Alternatively, the number set to be detected may be determined based on at least two primary number sets by:
And aiming at each primary number group, if the total number of the numbers to be detected contained in the primary number group reaches a preset number threshold, taking the primary number group as the number group to be detected.
The number threshold may be empirically set, and the specific number is not limited herein, for example, 50, 80 or 100.
Specifically, a number threshold is preset. For each primary number group, if the total number of numbers to be detected contained in the primary number group reaches a preset number threshold, the primary number group may be used as the number group to be detected.
On the basis of the above, if the total number of the numbers to be detected contained in the primary number group does not reach the preset number threshold, combining the primary number group into a primary number group with a smaller number of the numbers to be detected contained in the primary number group adjacent to the primary number group, and judging whether the total number of the numbers to be detected contained in the combined primary number group reaches the preset number threshold.
Specifically, if the total number of numbers to be detected contained in the primary number group does not reach the preset number threshold, it may be determined that the primary number group adjacent to the primary number group contains a smaller number of numbers to be detected. After the determination, the primary number group can be combined into a primary number group with a smaller number to be detected in the primary number group adjacent to the primary number group. After the merging is completed, whether the total number of the numbers to be detected contained in the merged preliminary number group reaches a preset number threshold value or not can be judged.
S250, determining a target detection number group in the number group to be detected, and determining target numbers according to each number to be detected in the target detection number group.
According to the technical scheme, the authentication delay data of each number to be detected are distributed according to the preset distribution sequence, the number of the numbers to be detected, corresponding to each authentication delay data after distribution, is determined, and the number sequence of the numbers distributed according to the preset distribution sequence is obtained. According to the variation trend of the number in the number sequence, each number to be detected is subjected to grouping processing to obtain a number group to be detected, the further grouping processing of each number to be detected according to the authentication delay data of each number to be detected is realized, the optimization of the number group to be detected is obtained, and the technical effect of grouping the numbers to be detected more quickly and reasonably is achieved.
Example III
Fig. 3 is a schematic diagram of a number identification device according to a third embodiment of the present invention, where the present invention provides a number identification device, and the number identification device includes: the device comprises an authentication data extraction module 310, an authentication time delay data determination module 320, a to-be-detected number group obtaining module 330 and a target number determination module 340.
The authentication data extraction module 310 is configured to obtain original signaling data, and extract authentication data corresponding to at least one number to be detected in the original signaling data;
an authentication delay data determining module 320, configured to determine authentication delay data corresponding to each number to be detected according to the authentication data of each number to be detected;
a to-be-detected number group obtaining module 330, configured to perform packet processing on each to-be-detected number according to authentication delay data of each to-be-detected number, to obtain a to-be-detected number group;
the target number determining module 340 is configured to determine a target detection number set in the number set to be detected, and determine a target number according to each number to be detected in the target detection number set.
According to the technical scheme, the original signaling data is obtained through the authentication data extraction module, and authentication data corresponding to at least one number to be detected in the original signaling data is extracted; determining authentication delay data corresponding to each number to be detected according to the authentication data of each number to be detected through an authentication delay data determining module; the method comprises the steps that through a to-be-detected number group obtaining module, each to-be-detected number is subjected to grouping processing according to authentication delay data of each to-be-detected number, and a to-be-detected number group is obtained; the technical scheme of the embodiment of the invention solves the technical problems that the existing number identification method cannot accurately identify the number, and the abnormal telephone cannot be effectively identified and the user cannot be effectively prevented from being deceived, and realizes the effective identification of the abnormal telephone, thereby achieving the effective technical effect of preventing the user from being deceived.
According to the technical scheme, the original signaling data is obtained through the authentication data extraction module, and authentication data corresponding to at least one number to be detected in the original signaling data is extracted; determining authentication delay data corresponding to each number to be detected according to the authentication data of each number to be detected through an authentication delay data determining module; the method comprises the steps that through a to-be-detected number group obtaining module, each to-be-detected number is subjected to grouping processing according to authentication delay data of each to-be-detected number, and a to-be-detected number group is obtained; the technical scheme of the embodiment of the invention determines the authentication delay data of the number to be detected through the authentication data of the number to be detected in the original signaling data, and carries out the identification of the target number based on the authentication delay data without depending on the identification of dialing equipment, thereby solving the technical problems that the virtual dialing equipment is difficult to identify and position and can not effectively identify abnormal telephone because of the separation of machine and card, and realizing the technical effect of effectively identifying the target number.
Optionally, the authentication data includes the authentication times, an authentication starting time point corresponding to each authentication and an authentication finishing time point corresponding to each authentication; the authentication delay data determining module 320 is configured to calculate, for each authentication of each number to be detected, a difference between an authentication start time point and an authentication completion time point of the current authentication of the current number to be detected, to obtain a single authentication delay of each authentication of each number to be detected; according to the authentication times of each number to be detected and the single authentication time delay of each authentication, calculating an authentication time delay average value of each number to be detected, and taking the authentication time delay average value as authentication time delay data corresponding to each number to be detected.
The number group to be detected obtaining module 330 is configured to arrange the authentication delay data of each number to be detected according to a preset arrangement sequence, determine the number of the number to be detected corresponding to each authentication delay data after arrangement, and obtain a number sequence of the number arranged according to the preset arrangement sequence, where the preset arrangement sequence is from big to small or from small to big; and carrying out grouping processing on each number to be detected according to the variation trend of the number of the numbers in the number sequence to obtain a number group to be detected.
A module 330 for obtaining a number group to be detected, configured to determine an inflection point position in a variation trend of the number in the number sequence, and use authentication delay data corresponding to the number located at the inflection point position as packet reference data; dividing the number to be detected corresponding to each authentication delay data into at least two primary number groups based on the grouping reference data, and determining the number groups to be detected based on the at least two primary number groups.
The to-be-detected number group obtaining module 330 is configured to divide the number sequence into at least two number intervals by using each piece of grouping reference data as a critical point of a number interval, where the number interval is a monotonically increasing interval or a monotonically decreasing interval; and taking the arrangement sequence of the authentication time delay data as the division sequence of the primary number groups, and determining each number interval or every two adjacent number intervals as one primary number group.
The to-be-detected number group obtaining module 330 is configured to, for each primary number group, take the primary number group as the to-be-detected number group if the total number of to-be-detected numbers included in the primary number group reaches a preset number threshold.
The to-be-detected number group obtaining module 330 is further configured to combine the primary number group into a preliminary number group with a smaller number of to-be-detected numbers in the initial number group adjacent to the initial number group if the total number of to-be-detected numbers included in the primary number group does not reach the preset number threshold, and determine whether the total number of to-be-detected numbers included in the combined preliminary number group reaches the preset number threshold.
The target number determining module 340 is configured to determine, for each of the to-be-detected number groups, an average authentication delay of the to-be-detected number group according to authentication delay data corresponding to each to-be-detected number in the to-be-detected number group; and if the average authentication time delay of the number group to be detected reaches a preset time delay threshold, taking the number group to be detected as a target detection number group.
The target number determining module 340 is configured to determine a target number according to each number to be detected in the target detection number group, and includes: and extracting call behavior characteristic data of each number to be detected in the target detection number group, and determining the target number according to the call behavior characteristic data of each number to be detected.
The device can execute the number identification method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of executing the number identification method.
It should be noted that each unit and module included in the number recognition device are only divided according to the functional logic, but not limited to the above division, so long as the corresponding functions can be implemented; in addition, the specific names of the functional units are also only for distinguishing from each other, and are not used to limit the protection scope of the embodiments of the present invention.
Example IV
Fig. 4 is a schematic structural diagram of an electronic device according to a fourth embodiment of the present invention. Fig. 4 illustrates a block diagram of an exemplary electronic device 12 suitable for use in implementing any of the embodiments of the present invention. The electronic device 12 shown in fig. 4 is merely an example and should not be construed as limiting the functionality and scope of use of embodiments of the present invention. Device 12 is typically an electronic device that undertakes the processing of configuration information.
As shown in fig. 4, the electronic device 12 is in the form of a general purpose computing device. Components of the electronic device 12 may include, but are not limited to: one or more processors or processing units 16, a memory 28, and a bus 18 connecting the different components, including the memory 28 and the processing unit 16.
Bus 18 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, and a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include industry standard architecture (Industry Standard Architecture, ISA) bus, micro channel architecture (Micro Channel Architecture, MCA) bus, enhanced ISA bus, video electronics standards association (Video Electronics Standards Association, VESA) local bus, and peripheral component interconnect (Peripheral Component Interconnect, PCI) bus.
Electronic device 12 typically includes a variety of computer-readable media. Such media can be any available media that is accessible by electronic device 12 and includes both volatile and nonvolatile media, removable and non-removable media.
Memory 28 may include computer device readable media in the form of volatile memory, such as random access memory (Random Access Memory, RAM) 30 and/or cache memory 32. The electronic device 12 may further include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only, storage system 34 may be used to read from or write to non-removable, nonvolatile magnetic media (not shown in FIG. 4, commonly referred to as a "hard disk drive"). Although not shown in the drawings, a disk drive for reading from and writing to a removable nonvolatile magnetic disk (e.g., a "floppy disk"), and an optical disk drive for reading from and writing to a removable nonvolatile optical disk (e.g., a Compact Disc-Read Only Memory (CD-ROM), digital versatile Disc (Digital Video Disc-Read Only Memory, DVD-ROM), or other optical media) may be provided. In such cases, each drive may be coupled to bus 18 through one or more data medium interfaces. Memory 28 may include at least one program product 40, with program product 40 having a set of program modules 42 configured to perform the functions of embodiments of the present invention. Program product 40 may be stored, for example, in memory 28, such program modules 42 include, but are not limited to, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment. Program modules 42 generally perform the functions and/or methods of the embodiments described herein.
The electronic device 12 may also communicate with one or more external devices 14 (e.g., keyboard, mouse, camera, etc., and display), with one or more devices that enable a user to interact with the electronic device 12, and/or with any device (e.g., network card, modem, etc.) that enables the electronic device 12 to communicate with one or more other computing devices. Such communication may occur through an input/output (I/O) interface 22. Also, the electronic device 12 may communicate with one or more networks (e.g., local area network (Local Area Network, LAN), wide area network Wide Area Network, WAN) and/or a public network, such as the internet) via the network adapter 20. As shown, the network adapter 20 communicates with other modules of the electronic device 12 over the bus 18. It should be appreciated that although not shown, other hardware and/or software modules may be used in connection with electronic device 12, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, disk array (Redundant Arrays of Independent Disks, RAID) devices, tape drives, data backup storage devices, and the like.
The processor 16 executes various functional applications and data processing by running a program stored in the memory 28, for example, to implement the number recognition method provided by the above-described embodiment of the present invention, the method including:
acquiring original signaling data, and extracting authentication data corresponding to at least one number to be detected from the original signaling data; determining authentication delay data corresponding to each number to be detected according to the authentication data of each number to be detected; according to the authentication delay data of each number to be detected, carrying out grouping processing on each number to be detected to obtain a number group to be detected; and determining a target detection number group in the number group to be detected, and determining a target number according to each number to be detected in the target detection number group.
Of course, those skilled in the art will appreciate that the processor may also implement the number identification method provided in any of the embodiments of the present invention.
Example five
A fifth embodiment of the present invention also provides a computer readable storage medium having a computer program stored thereon, where the program, when executed by a processor, is a number identification method provided in the foregoing embodiment of the present invention, for example, the method includes:
Acquiring original signaling data, and extracting authentication data corresponding to at least one number to be detected from the original signaling data; determining authentication delay data corresponding to each number to be detected according to the authentication data of each number to be detected; according to the authentication delay data of each number to be detected, carrying out grouping processing on each number to be detected to obtain a number group to be detected; and determining a target detection number group in the number group to be detected, and determining a target number according to each number to be detected in the target detection number group.
The computer storage media of embodiments of the invention may take the form of any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for embodiments of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
Note that the above is only a preferred embodiment of the present invention and the technical principle applied. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of numerous obvious changes, rearrangements and substitutions without departing from the scope of the present invention. Therefore, while the invention has been described in connection with the above embodiments, the invention is not limited to the embodiments, but may be embodied in many other equivalent forms without departing from the spirit or scope of the invention, which is set forth in the following claims.

Claims (10)

1. A number recognition method, comprising:
acquiring original signaling data, and extracting authentication data corresponding to at least one number to be detected from the original signaling data; the authentication data comprises authentication times, an authentication starting time point corresponding to each authentication and an authentication finishing time point corresponding to each authentication;
for each authentication of each number to be detected, calculating a difference value between an authentication starting time point of the current authentication of the current number to be detected and an authentication finishing time point to obtain a single authentication time delay of each authentication of each number to be detected;
According to the authentication times of each number to be detected and the single authentication time delay of each authentication, calculating an authentication time delay average value of each number to be detected, and taking the authentication time delay average value as authentication time delay data corresponding to each number to be detected;
according to the authentication delay data of each number to be detected, carrying out grouping processing on each number to be detected to obtain a number group to be detected;
determining a target detection number group in the number group to be detected, and determining a target number according to each number to be detected in the target detection number group;
wherein, the determining the target number according to each number to be detected in the target detection number group includes:
and extracting call behavior characteristic data of each number to be detected in the target detection number group, and determining the target number according to the call behavior characteristic data of each number to be detected.
2. The method of claim 1, wherein the grouping the numbers to be detected according to the authentication delay data of each number to be detected to obtain a group of numbers to be detected includes:
arranging the authentication delay data of each number to be detected according to a preset arrangement sequence, determining the number of the number to be detected corresponding to each authentication delay data after arrangement, and obtaining a number sequence of the number arranged according to the preset arrangement sequence, wherein the preset arrangement sequence is from big to small or from small to big;
And carrying out grouping processing on each number to be detected according to the variation trend of the number in the number sequence to obtain a number group to be detected.
3. The method of claim 2, wherein the grouping the numbers to be detected according to the trend of the number in the number sequence to obtain a number group to be detected includes:
determining the inflection point position in the variation trend of the number in the number sequence, and taking authentication delay data corresponding to the number positioned at the inflection point position as grouping reference data;
dividing the number to be detected corresponding to each authentication delay data into at least two primary number groups based on the grouping reference data, and determining the number groups to be detected based on the at least two primary number groups.
4. A method according to claim 3, wherein the dividing the number to be detected corresponding to each authentication delay data into at least two primary number groups based on the packet reference data comprises:
dividing the number sequence into at least two number intervals by taking each group of reference data as a critical point of the number interval, wherein the number interval is a monotonically increasing interval or a monotonically decreasing interval;
And taking the arrangement sequence of the authentication time delay data as the division sequence of the primary number groups, and determining each number interval or every two adjacent number intervals as one primary number group.
5. A method according to claim 3, wherein said determining the set of to-be-detected numbers based on said at least two sets of primary numbers comprises:
and aiming at each primary number group, if the total number of the numbers to be detected contained in the primary number group reaches a preset number threshold, taking the primary number group as the number group to be detected.
6. The method of claim 5, wherein the method further comprises:
if the total number of the numbers to be detected contained in the primary number group does not reach the preset number threshold, combining the primary number group into a primary number group with a smaller number of the numbers to be detected contained in the primary number group adjacent to the primary number group, and judging whether the total number of the numbers to be detected contained in the combined primary number group reaches the preset number threshold.
7. The method of claim 1, wherein the determining the set of target detection numbers in the set of to-be-detected numbers comprises:
Determining the average authentication time delay of each number group to be detected according to the authentication time delay data corresponding to each number to be detected in the number group to be detected;
and if the average authentication time delay of the number group to be detected reaches a preset time delay threshold, taking the number group to be detected as a target detection number group.
8. A number recognition apparatus, comprising:
the authentication data extraction module is used for acquiring original signaling data and extracting authentication data corresponding to at least one number to be detected in the original signaling data; the authentication data comprises authentication times, an authentication starting time point corresponding to each authentication and an authentication finishing time point corresponding to each authentication;
the authentication time delay data determining module is used for carrying out difference value calculation on the authentication starting time point and the authentication finishing time point of the current authentication of the current number to be detected aiming at each authentication of each number to be detected to obtain single authentication time delay of each authentication of each number to be detected;
according to the authentication times of each number to be detected and the single authentication time delay of each authentication, calculating an authentication time delay average value of each number to be detected, and taking the authentication time delay average value as authentication time delay data corresponding to each number to be detected;
The to-be-detected number group obtaining module is used for carrying out grouping processing on each to-be-detected number according to the authentication delay data of each to-be-detected number to obtain a to-be-detected number group;
the target number determining module is used for determining a target detection number group in the number group to be detected, and determining target numbers according to each number to be detected in the target detection number group;
the target number determining module is specifically configured to:
and extracting call behavior characteristic data of each number to be detected in the target detection number group, and determining the target number according to the call behavior characteristic data of each number to be detected.
9. An electronic device, the electronic device comprising:
one or more processors;
a storage means for storing one or more programs;
the program, when executed by the processor, causes the processor to implement the number identification method as claimed in any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements a number recognition method as claimed in any one of claims 1-7.
CN202110835709.3A 2021-07-23 2021-07-23 Number identification method, device, electronic equipment and storage medium Active CN113950054B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110835709.3A CN113950054B (en) 2021-07-23 2021-07-23 Number identification method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110835709.3A CN113950054B (en) 2021-07-23 2021-07-23 Number identification method, device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113950054A CN113950054A (en) 2022-01-18
CN113950054B true CN113950054B (en) 2024-04-12

Family

ID=79327647

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110835709.3A Active CN113950054B (en) 2021-07-23 2021-07-23 Number identification method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113950054B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102438243A (en) * 2010-09-29 2012-05-02 上海粱江通信系统股份有限公司 Method for identifying harassing phone call by analyzing frequency of phone call
CN108320740A (en) * 2017-12-29 2018-07-24 深圳和而泰数据资源与云技术有限公司 A kind of audio recognition method, device, electronic equipment and storage medium
CN110224895A (en) * 2019-06-21 2019-09-10 武汉绿色网络信息服务有限责任公司 A kind of VoLTE user's registration signaling delay analysis method and device
CN111885270A (en) * 2020-07-09 2020-11-03 恒安嘉新(北京)科技股份公司 Abnormal communication detection method, device, equipment and storage medium
CN112087756A (en) * 2020-08-05 2020-12-15 北京邮电大学 Communication method and device for preventing malicious user from accessing

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150106265A1 (en) * 2013-10-11 2015-04-16 Telesign Corporation System and methods for processing a communication number for fraud prevention
US10397398B2 (en) * 2017-01-17 2019-08-27 Pindrop Security, Inc. Authentication using DTMF tones

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102438243A (en) * 2010-09-29 2012-05-02 上海粱江通信系统股份有限公司 Method for identifying harassing phone call by analyzing frequency of phone call
CN108320740A (en) * 2017-12-29 2018-07-24 深圳和而泰数据资源与云技术有限公司 A kind of audio recognition method, device, electronic equipment and storage medium
CN110224895A (en) * 2019-06-21 2019-09-10 武汉绿色网络信息服务有限责任公司 A kind of VoLTE user's registration signaling delay analysis method and device
CN111885270A (en) * 2020-07-09 2020-11-03 恒安嘉新(北京)科技股份公司 Abnormal communication detection method, device, equipment and storage medium
CN112087756A (en) * 2020-08-05 2020-12-15 北京邮电大学 Communication method and device for preventing malicious user from accessing

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Sonar: Detecting SS7 Redirection Attacks with Audio-Based Distance Bounding;Christian Peeters等;《2018 IEEE Symposium on Security and Privacy (SP)》;全文 *
电信网络诈骗犯罪侦防中的关键技术研究;肖军;《 中国人民公安大学学报(自然科学版)》;全文 *

Also Published As

Publication number Publication date
CN113950054A (en) 2022-01-18

Similar Documents

Publication Publication Date Title
CN107391359B (en) Service testing method and device
CN109614433B (en) Method, device, equipment and storage medium for identifying data blooding margin between business systems
CN110312046B (en) Outbound data optimization method and device, computer equipment and storage medium
CN108521612B (en) Video abstract generation method, device, server and storage medium
CN109474923B (en) Object recognition method and device, and storage medium
CN113412607B (en) Content pushing method and device, mobile terminal and storage medium
CN110611929A (en) Abnormal user identification method and device
CN109088788B (en) Data processing method, device, equipment and computer readable storage medium
CN111049786A (en) Network attack detection method, device, equipment and storage medium
CN112087744A (en) Method, system, device and storage medium for identifying terminal model
CN111090729B (en) Identification method, device, server and storage medium for fraudulent group
CN103618786A (en) Playing error processing method and server
WO2019061999A1 (en) Breakpoint call method, electronic device and computer-readable storage medium
CN108696873B (en) False user identification method and device
CN113950054B (en) Number identification method, device, electronic equipment and storage medium
CN112182520B (en) Identification method and device of illegal account number, readable medium and electronic equipment
CN106487653B (en) Message processing method and server
CN108633109B (en) Method and device for identifying main card of double-card terminal
CN113923190B (en) Equipment identification jump identification method and device, server and storage medium
CN113872987A (en) Malicious attack defense method and device, storage medium and gateway
CN109922359B (en) User processing method, device, equipment and storage medium
CN108154177B (en) Service identification method, device, terminal equipment and storage medium
CN109413761B (en) Calling method applied to network calling platform and network calling platform
CN113780407B (en) Data detection method and device, electronic equipment and storage medium
CN112037814A (en) Audio fingerprint extraction method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant