CN114071454B - Identification method, device, equipment and storage medium for mobile user identification code - Google Patents

Identification method, device, equipment and storage medium for mobile user identification code Download PDF

Info

Publication number
CN114071454B
CN114071454B CN202010762738.7A CN202010762738A CN114071454B CN 114071454 B CN114071454 B CN 114071454B CN 202010762738 A CN202010762738 A CN 202010762738A CN 114071454 B CN114071454 B CN 114071454B
Authority
CN
China
Prior art keywords
user
identification code
information
identified
mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010762738.7A
Other languages
Chinese (zh)
Other versions
CN114071454A (en
Inventor
沈洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Suzhou Software Technology Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Suzhou Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Suzhou Software Technology Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202010762738.7A priority Critical patent/CN114071454B/en
Publication of CN114071454A publication Critical patent/CN114071454A/en
Application granted granted Critical
Publication of CN114071454B publication Critical patent/CN114071454B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the invention provides a method for identifying a mobile user identification code, which comprises the following steps: acquiring identification information of a user to be identified; acquiring a plurality of mobile user identification codes of a user to be identified based on the identification information; acquiring communication expense information and behavior record information of a user to be identified; the user to be identified is a user with a plurality of mobile user identification codes; determining a first type of identification code and a second type of identification code of a plurality of mobile subscriber identification codes based on the communication fee information; the first type identification code is a mobile user identification code used by the user to be identified, and the second type identification code is a mobile user identification code except the first type in the plurality of mobile user identification codes; based on the behavior record information, a mobile user identification code used by suspected others in the second type identification code is determined. The embodiment of the invention also provides a device, equipment and storage medium for identifying the mobile user identification code. The embodiment of the invention reduces data operation and improves the recognition efficiency.

Description

Identification method, device, equipment and storage medium for mobile user identification code
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a method, an apparatus, a device, and a storage medium for identifying a mobile subscriber identity.
Background
With the rapid development of the mobile internet and the rapid popularization of intelligent terminals, mobile phones have become an indispensable part of the daily life of most people. However, there are illegal activities such as fraudulent network activities and telecommunication fraud, in which an illegal person uses the identity information of another person to register an account. To avoid such illegal activities, the national letter of industry has issued a real-name system specification, requiring that all telecommunication cell phone cards be transacted with a real-name registration, and allowing one identity card number to transact five cell phone numbers nationwide. However, in practice, the mobile phone number is still authenticated by a real name system but is not used by the user.
In order to avoid the above situation, many recognition schemes for whether the mobile phone number is suspected to be used by other people are proposed in the related art; however, the recognition schemes in the related art all involve more complex algorithms, resulting in lower recognition efficiency.
Disclosure of Invention
In view of this, the embodiments of the present invention expect to provide a method, apparatus, device and storage medium for identifying a mobile subscriber identity, so as to solve the problem of higher algorithm complexity in the related mobile phone number identification technology, and improve the identification efficiency.
In order to achieve the above purpose, the technical scheme of the invention is realized as follows:
in a first aspect, there is provided a method of identifying a mobile subscriber identity, the method comprising:
acquiring identification information of a user to be identified; wherein the identification information uniquely identifies the user to be identified; the user to be identified is a user with a plurality of mobile user identification codes;
based on the identification information, acquiring a plurality of mobile user identification codes of the user to be identified;
acquiring communication cost information and behavior record information of the user to be identified; the behavior record information is behavior information of the user to be identified using a mobile user identification code;
determining a first type of identification code and a second type of identification code of the plurality of mobile subscriber identification codes based on the communication fee information; the first type identification code is a mobile user identification code used by the user to be identified, and the second type identification code is a mobile user identification code except the first type in the plurality of mobile user identification codes;
and determining the mobile user identification code used by suspected others in the second type identification code based on the behavior record information.
In a second aspect, there is provided an identification device for a mobile subscriber identity, the device comprising: the device comprises a first acquisition unit, a second acquisition unit, a classification unit and a determination unit, wherein:
the first acquisition unit is used for acquiring identification information of a user to be identified; wherein the identification information uniquely identifies the user to be identified; wherein the user to be identified is a user with a plurality of mobile user identification codes;
the first obtaining unit is further configured to obtain a plurality of mobile user identification codes of the user to be identified based on the identification information;
the second acquisition unit is used for acquiring communication cost information and behavior record information of the user to be identified; the behavior record information is behavior information of the user to be identified using a mobile user identification code;
the classifying unit is used for determining a first type identification code and a second type identification code in the plurality of mobile user identification codes based on the communication expense information; the first type identification code is a mobile user identification code used by the user to be identified, and the second type identification code is a mobile user identification code except the first type in the plurality of mobile user identification codes;
The determining unit is used for determining the mobile user identification code used by suspected others in the second type identification code based on the behavior record information.
In a third aspect, there is provided an identification device for a mobile subscriber identity, the device comprising: a processor, a memory, and a communication bus;
the communication bus is used for realizing communication connection between the processor and the memory;
the processor is used for executing the identification program of the mobile user identification code in the memory so as to realize the following steps:
acquiring identification information of a user to be identified; wherein the identification information uniquely identifies the user to be identified; the user to be identified is a user with a plurality of mobile user identification codes;
based on the identification information, acquiring a plurality of mobile user identification codes of the user to be identified;
acquiring communication cost information and behavior record information of the user to be identified; the behavior record information is behavior information of the user to be identified using a mobile user identification code;
determining a first type of identification code and a second type of identification code of the plurality of mobile subscriber identification codes based on the communication fee information; the first type identification code is a mobile user identification code used by the user to be identified, and the second type identification code is a mobile user identification code except the first type in the plurality of mobile user identification codes;
And determining the mobile user identification code used by suspected others in the second type identification code based on the behavior record information.
In a fourth aspect, there is provided a storage medium storing one or more programs executable by one or more processors to implement the steps of the above-described method for identifying a mobile subscriber identity.
The identification method, the device, the equipment and the storage medium for the mobile user identification code provided by the embodiment of the invention acquire the identification information of the user to be identified, acquire a plurality of mobile user identification codes of the user to be identified based on the identification information, acquire the communication expense information and the behavior recording information of the user to be identified, determine the first type identification code and the second type identification code in the plurality of mobile user identification codes based on the communication expense information, and then determine the mobile user identification code used by suspected others in the second type identification code based on the behavior recording information, so that whether the mobile user identification code is suspected to be used by other people can be identified only according to the communication expense information, the behavior recording information and the identification information of the user to be identified; and the communication cost information, the behavior recording information and the identification information of the user to be identified are information related to the mobile user identification code, so that the acquisition difficulty is low and the calculation complexity is low, the problem of high algorithm complexity in the related mobile phone number identification technology is solved, and the identification efficiency is improved.
Drawings
Fig. 1 is a flow chart of a method for identifying a mobile subscriber identity according to an embodiment of the present invention;
fig. 2 is a flow chart of another method for identifying mobile subscriber identity according to an embodiment of the present invention;
fig. 3 is a flowchart of another method for identifying a mobile subscriber identity according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an identification device for mobile subscriber identification codes according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of another device for identifying mobile subscriber identity according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an identification device for mobile subscriber identification codes according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention.
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The embodiment of the invention provides a method for identifying a mobile user identification code, which can be applied to an identification device of the mobile user identification code, and is shown in fig. 1, and the method comprises the following steps:
Step 101, obtaining identification information of a user to be identified.
Wherein the identification information uniquely identifies the user to be identified. The user to be identified is a user having a plurality of mobile user identification codes.
In the practice of the present invention, the identification information may include numbers of certificates such as an identity number, a certificate number of a military license, a certificate number of a port-australian pass, a certificate number of a resident license, a passport number of a fuqiao passport, a passport number of a foreign passport, and a certificate number of a border pass. In one possible implementation, the identification information may be an identification card number; at this time, the user to be identified may be a telecom operator user whose one identification card number registers a plurality of mobile phone numbers.
Step 102, based on the identification information, a plurality of mobile user identification codes of the user to be identified are obtained.
Step 103, acquiring communication cost information and behavior record information of the user to be identified.
The behavior record information is behavior information of the user to be identified using the mobile user identification code.
It should be noted that, the identification device of the mobile subscriber identity may be a terminal or a server; the mobile subscriber identity may be a mobile phone number, i.e. a mobile subscriber directory number (Mobile Directory Number, MDN). The communication fee information may include a total consumption fee, an average consumption fee, or fee information counted based on a certain statistical condition for a preset period of time (for example, month, quarter, year, or the like) for each mobile subscriber identification code of the subscriber to be identified. The behavior record information of the user includes, but is not limited to, call record information, resident location information, and/or internet surfing information of the user, etc.
In one possible implementation, the mobile subscriber identity code may be used to obtain relevant subscriber data from an existing database of the telecommunications carrier, and then the subscriber data is subjected to data processing, so as to obtain communication fee information and behavior record information that meet the requirements and service specifications of the subsequent identification process.
Step 104, based on the communication fee information, determining a first type identification code and a second type identification code in the plurality of mobile user identification codes.
The first type of identification code is a mobile user identification code used by the user to be identified, and the second type of identification code is a mobile user identification code except the first type in the plurality of mobile user identification codes.
In the embodiment of the invention, the plurality of mobile user identification codes of the user to be identified are divided into two types, and the method can be understood as dividing the plurality of mobile user identification codes of one identification information into two types; the second type of identification code may include a mobile user identification code suspected of being used by others and a mobile user identification code that cannot be determined to be used by the person or used by others.
Step 105, determining the mobile user identification code used by the suspected others in the second type identification code based on the behavior record information.
In the embodiment of the invention, based on the behavior record information, whether the second type of identification code is used by suspected others can be further identified, the identification result can comprise the mobile user identification code used by the suspected others and the mobile user identification code used by non-suspected others, and the mobile user identification code used by the non-suspected others can comprise the mobile user identification code which can not determine whether the mobile user identification code is used by the user or the other people.
According to the identification method of the mobile user identification code, whether the mobile user identification code is suspected to be used by other people can be identified only according to the communication cost information, the behavior record information and the identification information of the user to be identified; and the communication cost information, the behavior recording information and the identification information of the user to be identified are information related to the mobile user identification code, so that the acquisition difficulty is low and the calculation complexity is low, the problem of high algorithm complexity in the related mobile phone number identification technology is solved, and the identification efficiency is improved.
Based on the foregoing embodiments, the embodiments of the present invention provide a method for identifying a mobile subscriber identity, where the method may be applied to an apparatus for identifying a mobile subscriber identity, as shown in fig. 2, and the method may include the following steps:
Step 201, obtaining identification information of a user to be identified.
Wherein the identification information uniquely identifies the user to be identified. The user to be identified is a user having a plurality of mobile user identification codes.
It should be noted that, the number of mobile subscriber identification codes corresponding to each identity card number of a telecom operator subscriber may be determined first, and then the telecom operator subscriber whose identity card number corresponds to a plurality of mobile subscriber identification codes is determined as the subscriber to be identified. In the process, the processing result of the user to be identified in the telecom operator user is reserved, and the processing result of the user to be identified is not removed; in a possible implementation, the identification information may comprise an identity card number, in which case the identity card number of the telecom operator user and the processing result may be stored in form of a table according to the association of the identity card number, the mobile subscriber identity code, the number (the number of mobile subscriber identity codes) and the processing result, as shown in table 1.
Identity document number Mobile subscriber identity Number of pieces Processing the result
00001f****c3438e 9e24ed****be39ac 1 Rejection of
000046****82d190 d1bc52****3e3e05 3 Reservation of
000046****82d190 d02979****1c274e 3 Reservation of
000046****82d190 ad1841****18e774 3 Reservation of
00006a****dc7fd6 dc67be****a195ca 2 Reservation of
00006a****dc7fd6 7fd047****c5a6b9 2 Reservation of
000112****e64950 67a41c****3c9e61 5 Reservation of
000112****e64950 b81303****28a6a7 5 Reservation of
000112****e64950 8cfd26****25e43c 5 Reservation of
000112****e64950 17d63b****be0e98 5 Reservation of
000112****e64950 bec2b6****05e72f 5 Reservation of
TABLE 1
In Table 1, the identity number and the mobile subscriber identity are both encrypted using the Message-Digest Algorithm fifth edition (MD5). One identity document number corresponds to a plurality of mobile user identification codes and is stored in a plurality of records, the identity document number of each record in the plurality of records is the same but the corresponding mobile user identification codes are different, and the number of each record in all records is the total number of the mobile user identification codes corresponding to one identity document number.
Step 202, based on the identification information, a plurality of mobile user identification codes of the user to be identified are obtained.
Step 203, obtaining communication cost information and behavior record information of the user to be identified.
The behavior record information is behavior information of the user to be identified using the mobile user identification code.
Step 204, determining communication cost information of each mobile user identification code of the user to be identified from the communication cost information.
In one possible implementation manner, the mobile subscriber identification code is taken as an index, and the communication cost information of each mobile subscriber identification code corresponding to the identification information of each subscriber to be identified is obtained from the communication cost information.
Step 205, based on the communication cost information of each mobile user identification code of the user to be identified, ordering the mobile user identification codes of the user to be identified, and obtaining an ordering result.
In one possible implementation, the plurality of mobile subscriber identities of the identification information of each subscriber to be identified may be ordered in a descending order or ascending order based on the cost value of the communication cost information. And taking a plurality of mobile user identification codes of the identification information of each user to be identified as a group of sorting objects to sort, wherein the sorting result is a result obtained by sorting in each group.
Step 206, determining a first type identification code and a second type identification code in a plurality of mobile user identification codes of the user to be identified based on the sorting result.
In the embodiment of the present invention, the plurality of mobile subscriber identities of the identification information of each subscriber to be identified may be regarded as a group of sorting objects, that is, the plurality of mobile subscriber identities of each group are classified into two types.
In one possible implementation, two types of mobile subscriber identities may be type-tagged, a first type of identity in each group may be tagged as a "master card" and a second type of identity may be tagged as a "non-master card"; of course, other marking information may be used for marking. As shown in table 2, the type of each mobile subscriber identity code division may be stored in the form of a table according to the association relationship of the identification information, the mobile subscriber identity codes, the number (the number of mobile subscriber identity codes), the communication fee information of each mobile subscriber identity code of each subscriber to be identified, the sorting result, and the type flag.
TABLE 2
In table 2, average revenue per user (Average Revenue Per User, arpu), that is, monthly total consumption per mobile subscriber identity, is used as the communication fee information. And sequencing the cost value of the communication cost information in each group of sequencing objects from big to small, and marking sequencing results in sequence. In each group of sorting objects, one mobile user identification code corresponding to the minimum value of the sorting results is a first type identification code, namely, one mobile user identification code with the largest charge value of the communication charge information is marked as a 'main card', and the rest of sorting results in the group are second type identification codes, namely, other mobile user identification codes except one mobile user identification code with the largest charge value are marked as 'non-main cards'. Of course, the sorting objects of each group can be sorted based on other sorting modes of the communication expense information, the sorting result is obtained, and the mobile user identification codes in the sorting objects of each group are classified and identified based on other rules of the sorting result.
Step 207, determining behavior recording information of a first type identification code and behavior recording information of a second type identification code of a user to be identified from the behavior recording information.
In a possible implementation manner, the mobile user identification code is taken as an index, and the behavior record information of the first type identification code and the behavior record information of the second type identification code of the identification information of each user to be identified are obtained from the behavior record information.
Step 208, determining the mobile user identification code used by the suspected others in the second type identification code of the user to be identified based on the behavior record information of the first type identification code and the behavior record information of the second type identification code of the user to be identified.
In the embodiment of the invention, because the complexity of the behavior record information is lower and the behavior record information is easier to acquire, the identification process based on the behavior record information is relatively lower in complexity, and the mobile user identification code used by suspected others can be identified more efficiently.
If the behavior record information includes the user resident location information, step 208 may be implemented through steps 208a1-208a 2; if the behavior record information includes user call record information, step 208 may be implemented by steps 208b1-208b 2:
Step 208a1, detecting whether the first user resident location information of the second type identification code of the user to be identified and the second user resident location information of the first type identification code have a preset association relationship.
In the embodiment of the present invention, the preset association relationship between the first user resident location information and the second user resident location information may include: the first user resident location information is consistent with the second user resident location information, or a correspondence relationship exists between the first user resident location information and the second user resident location information in time, etc. The first user resident location information and the second user resident location information not having the preset association relationship may include: the first user resident location information does not coincide with the second user resident location information, or the first user resident location information does not have a correspondence with the second user resident location information in time, or the like.
Wherein prior to step 208a1, the user resident location information of the first type of identification code and the user resident location information of the second type of identification code for each user to be identified may be determined from the user resident location information based on the identification information and the plurality of mobile user identification codes. In one possible implementation, the user resident location information may include residence and workplace; at this time, as shown in table 3, the residence and the workplace of the first type identification code and the residence and the workplace of the second type identification code may be stored in the form of a table according to the association relationship of the identification information, the mobile subscriber identification code, the type flag, the residence and the workplace.
In table 3, the second user resident location information may be the user resident location information of the first type identification code, that is, the residence and the workplace corresponding to the main card; the first user resident location information may be user resident location information of the second type identification code, that is, a residence and a workplace corresponding to the non-main card.
TABLE 3 Table 3
The residence and the work place corresponding to the non-main card will be hereinafter referred to as a non-main card residence and a non-main card work place, and the residence and the work place corresponding to the main card will be hereinafter referred to as a main card residence and a main card work place. Whether the second type identification code is used by suspected others, namely whether the non-main card mobile user identification code is used by suspected others, can be determined by whether the corresponding main card residence and non-main card residence, main card work and non-main card work, main card residence and non-main card work, main card work and non-main card work and non-main card residence of each user to be identified have preset association relations or not. The preset association relationship between the residence and the workplace may include, but is not limited to: the residence of the main card is consistent with that of the non-main card, and the working place of the main card is consistent with that of the non-main card; or the main card residence place and the non-main card residence place lack information, but the non-main card residence place and the non-main card residence place have corresponding relation in time, and the like. Accordingly, not having the foregoing preset association relationship includes, but is not limited to: the primary card residence is inconsistent with the non-primary card residence and/or the primary card residence is inconsistent with the non-primary card residence, or there is no correspondence between the absent residence and the residence in time, etc.
In one possible implementation manner, in order to quickly detect whether the first user resident location information and the second user resident location information have a preset association relationship, each non-main card of the same identification information may be respectively corresponding to the main card, and the residence place and the working place of the main card may be corresponding to those of the non-main card; at this time, as shown in table 4, the mobile subscriber identification codes are stored in the form of tables corresponding to the respective residence places and the work places, respectively, in accordance with the association relations of the host card mobile subscriber identification codes, the residence places of the host card, the work places of the host card, the non-host card mobile subscriber identification codes, the residence places of the non-host card, and the work places of the non-host card.
TABLE 4 Table 4
The table 3 may be left-correlated (left-correlated) according to the identification information, that is, the main card corresponding information in table 3 is screened to obtain a main card table, the non-main card corresponding information is screened to obtain a non-main card table, then the main card mobile subscriber identification code and the non-main card mobile subscriber identification code of the same identification information are correlated according to the identification information, the corresponding residence and work records are obtained according to the number pairs formed by the main card mobile subscriber identification code and the non-main card mobile subscriber identification code, and then the column of the identification information is deleted, thereby obtaining the table in the form of table 4.
Step 208a2, determining that the first user resident location information and the second user resident location information do not have the second type of identification code with the preset association relationship, and using the second type of identification code as the mobile user identification code for suspected others.
In one possible implementation, as shown in table 5, the identification result of whether the non-main card mobile user identification code is suspected of being used by another person is stored in a table form according to the association relationship of the main card mobile user identification code, the main card residence, the main card work site, the non-main card mobile user identification code, the non-main card residence, the non-main card work site and the identification of whether the non-main card work site is suspected of being used by the other person.
TABLE 5
In table 5, the non-master card mobile user identification code where the master card residence is inconsistent with the non-master card residence or where the master card work is inconsistent with the non-master card work is marked as yes, i.e. the mobile user identification code used by suspected others; and marking the non-master card mobile user identification code with the master card residence consistent with the non-master card residence and the master card work place consistent with the non-master card work place as no, namely the mobile user identification code used by non-suspected others. It should be noted that, the mobile subscriber identification code that cannot be determined to be used by the user or used by another person may include: under the detection condition of a preset association relation, the mobile user identification code used by the user or the other person cannot be determined, or when the residence places of the main card and the non-main card are both lack of data and/or the working places of the main card and the non-main card are both lack of data, the mobile user identification code used by the user or the other person cannot be determined.
In the embodiment of the invention, the mobile user identification code used by suspected others can be identified through simple logic judgment of the preset association relationship, so that the complexity of the identification method is greatly reduced, and the problems of resource waste and low efficiency caused by using complex mathematical formulas and machine learning algorithms to identify the mobile phone number suspected others are avoided.
Step 208b1, obtaining the number of calls and the call duration between the second type identification code and the first type identification code of the user to be identified from the user call record information.
Before step 208b1, each non-master card mobile subscriber identifier of the same identification information may be first associated with a master card mobile subscriber identifier, where the non-master card mobile subscriber identifier and the corresponding master card mobile subscriber identifier are stored in a table format according to association relationships among the identification information, the master card mobile subscriber identifier, the master card communication fee information, the non-master card mobile subscriber identifier and the non-master card communication fee information, as shown in table 6 below.
TABLE 6
In a possible implementation manner, table 2 is left correlated (left joint) according to the identification information, that is, the main card corresponding information in table 2 is screened to obtain a main card table, the non-main card corresponding information is screened to obtain a non-main card table, and then the main card mobile subscriber identification code and the non-main card mobile subscriber identification code are correlated according to the identification information to obtain a call number table of a combined main key, that is, a table in the form of table 6.
In one possible implementation, after the call number pair is generated, user call record information of a first type identification code and user call record information of a second type identification code of each user to be identified are determined from the user call record information based on the identification information and the plurality of mobile user identification codes, and then call times and call durations between the second type identification code and the first type identification code of each user to be identified are acquired and stored in a form of a table. And taking the main card mobile user identification code and the non-main card mobile user identification code in the table 6 as combined main keys, and performing left semi-open connection (left semi-join) on two fields of the mobile user identification codes of the two parties of the call corresponding to the user call record information to obtain the call times and the call duration between the main card mobile user identification code and the non-main card mobile user identification code corresponding to each user to be identified. The left half-open connection process may be that the number of lines in table 6 is not changed, and the number of times of user calls and the call duration after matching are added to table 6 as new added columns by matching the non-main card mobile user identification code and the main card mobile user identification code with the mobile user identification codes of both parties of the call of the user call record information, and then are stored.
Step 208b2, determining the second type identification code with the number of calls greater than or equal to the preset number and the time of the call greater than or equal to the preset duration, as the mobile user identification code used by the suspected other person.
In a possible implementation manner, the preset times may be 2 times, the preset duration may be 10 seconds, and based on the condition, whether the non-main card mobile user identification code is suspected to be used by other people or not may be identified; as shown in table 7, the identification result of whether the non-main card mobile subscriber identity is suspected to be used by other people is stored in the form of a table according to the association relationship among the main card mobile subscriber identity, the non-main card mobile subscriber identity, the number of calls, the call duration and the identification of whether the non-main card mobile subscriber identity is suspected to be used by other people. The preset times and the preset time length can be adjusted as required.
TABLE 7
In table 7, marking the non-master card mobile user identification code corresponding to the month call times greater than or equal to the preset times for 2 times and the month call time length greater than or equal to the preset time length for 10 seconds as yes, namely the mobile user identification code used by suspected others; and marking the non-master card mobile user identification code corresponding to the monthly call times smaller than the preset times for 2 times or the monthly call time smaller than the preset time for 10 seconds as no, namely the mobile user identification code used by non-suspected others.
It should be noted that, in this embodiment, the descriptions of the same steps and the same content as those in other embodiments may refer to the descriptions in other embodiments, and are not repeated here.
According to the identification method of the mobile user identification code, whether the mobile user identification code is suspected to be used by other people can be identified only according to the communication cost information, the behavior record information and the identification information of the user to be identified; and the communication cost information, the behavior recording information and the identification information of the user to be identified are information related to the mobile user identification code, so that the acquisition difficulty is low and the calculation complexity is low, further the problem of high algorithm complexity in the related mobile phone number identification technology is solved, the data operation is reduced, the identification efficiency is improved, and the operation difficulty is reduced.
Based on the foregoing embodiments, the embodiments of the present invention provide a method for identifying a mobile subscriber identity, where the method may be applied to an apparatus for identifying a mobile subscriber identity, as shown in fig. 3, and the method may include the following steps:
step 301, obtaining identification information of a user to be identified.
Wherein the identification information uniquely identifies the user to be identified. The user to be identified is a user having a plurality of mobile user identification codes.
Step 302, obtaining communication fee information and behavior record information of a telecom operator user.
The behavior record information is behavior information of a telecom operator user using a mobile user identification code.
In the embodiment of the invention, the behavior recording information comprises: user resident location information and user call log information.
Step 303, acquiring communication fee information and behavior record information of the user to be identified from the communication fee information and behavior record information of the user of the telecom operator based on the identification information.
Step 304, determining communication cost information of each mobile user identification code of the user to be identified from the communication cost information.
Step 305, based on the communication cost information of each mobile user identification code of the user to be identified, ordering the mobile user identification codes of the user to be identified, and obtaining an ordering result.
Step 306, determining a first type identification code and a second type identification code in a plurality of mobile user identification codes of each user to be identified based on the sorting result.
Step 307, determining the behavior record information of the first type identification code and the behavior record information of the second type identification code of the user to be identified from the behavior record information.
Step 308, obtaining the number of calls and the call duration between the second type identification code and the first type identification code of the user to be identified from the user call record information.
Step 309, determining the second type identifier with the number of calls greater than or equal to the preset number and the call time greater than or equal to the preset duration as the first target mobile subscriber identifier.
Step 310, determining that the first user resident location information and the second user resident location information do not have the second type of identification code with the preset association relationship, and the second type of identification code is the second target mobile user identification code.
Wherein the first user resident location information is user resident location information of the second type identification code; the second user resident location information is user resident location information of the first type of identification code.
The mobile user identification codes used by suspected others comprise a first target mobile user identification code and a second target mobile user identification code.
It should be noted that, the step 310 may be performed before the steps 308-309, or the steps 308-309 and the step 310 may be performed simultaneously.
It should be noted that, in this embodiment, the descriptions of the same steps and the same content as those in other embodiments may refer to the descriptions in other embodiments, and are not repeated here.
In the embodiment of the invention, the mobile user identification code used by the suspected others is the union of the first target mobile user identification code and the second target mobile user identification code, so that the mobile user identification code used by the suspected others can be identified through a simpler logic relationship between the communication expense information and the behavior record information, and the two identification conditions are mutually complemented based on the comprehensive result of the two identification conditions of the user call record information and the user resident location information as a final identification result, thereby further improving the accuracy of the identification result.
According to the identification method of the mobile user identification code, whether the mobile user identification code is suspected to be used by other people can be identified only according to the communication cost information, the behavior record information and the identification information of the user to be identified; and the communication cost information, the behavior recording information and the identification information of the user to be identified are information related to the mobile user identification code, so that the acquisition difficulty is low and the calculation complexity is low, further the problem of high algorithm complexity in the related mobile phone number identification technology is solved, the data operation is reduced, the identification efficiency is improved, and the operation difficulty is reduced.
Based on the foregoing embodiments, steps 401-404 may also be performed after steps 105, 208, and 310 in other embodiments of the present invention:
step 401, adding a first identifier to a mobile user identifier of a user to be identified, wherein the mobile user identifier is used by suspected others.
Step 402, adding a second identifier to the mobile user identification codes except for the mobile user identification codes used by suspected others in the mobile user identification codes of the users to be identified.
In the implementation of the invention, after the identification result of the mobile user identification code used by suspected others is obtained, the identification is added to the mobile user identification code of the user to be identified, so that all the mobile user identification codes of the user to be identified can be identified.
In one possible implementation, the first identifier may be "yes" or "1", etc., and the second identifier may be "no" or "0", etc.; as shown in table 8, the mobile user identification code and the identification of the user to be identified may be stored in the form of a table.
In table 8, the mobile subscriber identifier with the identification "yes" used by the suspected person is the mobile subscriber identifier with the identification "no" used by the suspected person, and the mobile subscriber identifier with the identification "no" used by the suspected person includes the mobile subscriber identifier that cannot be determined as to whether the person is the person or the person and the mobile subscriber identifier that is the person.
Mobile subscriber identity Whether or not to be used by other people
000006****dcb071 Whether or not
00000c****c42de8 Whether or not
000022****bfc2b1 Is that
00002a****50aff9 Whether or not
00002f****08188b Whether or not
000036****c87c52 Is that
000037****cd5ebc Whether or not
000048****8cbf4b Whether or not
000063****5500e8 Whether or not
TABLE 8
Step 403, adding a third identifier to the user to be identified with the mobile user identification code for suspected others.
Step 404, adding a fourth identification to the users to be identified except the users to be identified with the mobile user identification code used by the suspected others.
In the embodiment of the invention, after the identification result of the mobile user identification code used by the suspected others is obtained, the identification can be added to the user to be identified, so that the user to be identified can be identified, and whether the user to be identified is the user with the mobile user identification code used by the suspected others or not is obtained.
In a possible implementation manner, the identification information of the user to be identified may be identified, the third identification may be "yes" or "1", etc., the fourth identification may be "no" or "0", etc., and the identification information and the corresponding identification may be stored in a table form as shown in table 9 below.
Identification information Whether or not to be used by other people
000004****a86bbd Whether or not
00001f****c3438e Whether or not
000046****82d190 Whether or not
000055****4b4405 Whether or not
000058****96e1ed Whether or not
000069****3cab4f Whether or not
00006a****dc7fd6 Is that
000083****e5d9a0 Whether or not
00008b****31a436 Whether or not
TABLE 9
In table 9, the identification information of whether the user is suspected to be used by other people is a user with a mobile user identification code for suspected other people in the users to be identified, and the identification information of whether the user is suspected to be used by other people is not identified by the user with the mobile user identification code for not determining whether the user is used by other people or not in the users to be identified and the user with the mobile user identification code for the user.
It should be noted that, steps 401 to 402 are not performed in sequence, and steps 403 to 404 are not performed in sequence; steps 401-402 and steps 403-404 are performed in no order.
It should be noted that, in this embodiment, the descriptions of the same steps and the same content as those in other embodiments may refer to the descriptions in other embodiments, and are not repeated here.
In the embodiment of the invention, the marked result can be provided for institutions other than telecom operators for use, so that the used institutions can conveniently screen the mobile user identification codes and the users to be identified.
In the embodiment of the present invention, table 1 to table 9 are exemplary descriptions of the corresponding steps, and specific data in table 1 to table 9 are exemplary data, so the content of the corresponding specific data in each table is not necessarily the same.
Based on the foregoing embodiments, in other embodiments of the present invention, step 302 may also be implemented by steps 501-504:
step 501, obtaining user data of a mobile user identification code of a telecom operator user from a preset database.
In the embodiment of the present invention, the user data is obtained from a preset database existing in a telecom operator, where the preset database includes, but is not limited to: a data system of 'one certificate No. five', an operation analysis system and a position data system. The user data may include: the identification information of the user of the mobile user identification code of the telecom operator user, the fee data of the mobile user identification code of the telecom operator user, the call data of the mobile user identification code of the telecom operator user and the position data of the mobile user identification code of the telecom operator user. All mobile user identification codes and real-name authentication related information of a telecom operator user after real-name authentication are stored in a 'one-card-five-number' data system. Wherein, the cost data, the call data and the position data are all obtained by the mobile user identification code.
In one possible implementation, as shown in tables 10-13 below, user data obtained from a preset database may be stored in tabular form based on field names, field types, and field chinese names.
Wherein, table 10 is the identity information of the user of the mobile user identification code of the telecom operator user obtained from the data system of "one card five".
Table 11 is the fee data of the mobile subscriber identification code of the telecom operator subscriber acquired from the operation analysis system.
Table 13 is call data of mobile subscriber identification codes of telecommunication operator subscribers acquired in the business analysis system.
Table 12 is the location data of the mobile subscriber identification codes of the telecom operator subscribers acquired from the location data system.
Field name Field type Field Chinese name
cid_category STRING Certificate type
cid_code STRING Identity document number MD5 value
name_code STRING Customer name MD5 value
pn_province_code STRING Mobile subscriber identity code attribution province code
msisdn STRING Mobile subscriber identity MD5 value
effective_time TIMESTAMP Network time
statis_d STRING Date (partition)
Table 10
Field name Field type Field Chinese name
msisdn STRING Mobile subscriber identity
loc_ph_fr BIGINT Local telephone fee
roam_ph_fr BIGINT Roaming call charge
long_fee BIGINT Toll fee
bas_mon_fr BIGINT Basic monthly fee
inc_val_busn_pack_fee BIGINT Value-added service package fee
voic_pack_fee BIGINT Voice service package fee
inc_val_busn_inc BIGINT Value added service revenue
gprs_pack_fee BIGINT GPRS dinner fee
gprs_com_fee BIGINT GPRS communication fee
mer_tot_fee BIGINT Total cost of
acct_bk_acum_amt DOUBLE User account balance (Yuan)
statis_m STRING Date (partition)
TABLE 11
Field name Field type Field Chinese name
msisdn STRING Mobile subscriber identity
imsi STRING imsi
home_localcity STRING Urban living area
home_longitude STRING Residence longitude
home_latitude STRING Latitude of living place
home_lacid STRING Residence base station acid
home_cellid STRING Residence base station cellid
home_days STRING Number of days per month
work_localcity STRING Urban area of working area
work_longitude STRING Workplace longitude
work_latitude STRING Latitude of working place
work_lacid STRING Work base station acid
work_cellid STRING Work base station cellid
work_days STRING Day of monthly work
…… …… ……
Table 12
Field name Field type Field Chinese name
Row_num BIGINT Line number
Serv_num STRING Mobile subscriber identity
Remote_num STRING Opposite mobile user identification code
Call_cnt INT Number of calls by caller
Called_cnt INT Number of called calls
Total_cnt INT Total number of calls
Call_time_length INT Calling call duration: second of
Called_time_length INT Called call duration: second of
Total_time_length INT Total call duration: second of
statis_m STRING Date (partition)
TABLE 13
In the embodiment of the invention, the statistical summary data in the existing service system is fully utilized, the cost of data acquisition is greatly reduced, and the waste of data resources is reduced. Meanwhile, the calculation and storage of a lot of unnecessary data are reduced, so that the calculation resources and the storage resources are greatly saved, the existing data resources are fully utilized, and the repeated calculation of the data and the repeated construction of a system are reduced.
Step 502, cleaning and converting the user data to obtain intermediate data.
In the embodiment of the present invention, the acquired user data may be cleaned first and then converted, where the cleaning of the user data may include: removing invalid dirty data, removing invalid historical data, processing illegal data and the like, and the conversion of the user data can comprise: unified data formats, conversion enumeration fields, etc.
In one possible implementation, the culling invalid dirty data may include: and eliminating the MD5 identity card number which is not 32 bits in the user data, the mobile user identification code, the data which lacks a core field or a main key field and the like.
Rejecting invalid history data may include: and (3) correspondingly recording a plurality of identity card numbers in one mobile user identification code of the identity information of the user in the user data, sorting according to the network access time of the mobile user identification code, and eliminating the record before the latest network access time.
Processing illegal data may include: and processing the negative values of fields such as cost data, call duration, call times and the like in the user data into non-negative values and the like.
The unified data format may include: the mobile subscriber identities in the subscriber data are all unified into a format without the value of the mobile subscriber identity MD5 at the beginning of +86.
The transition enumeration type field may include: codes such as residence city codes, workplace city codes and the like in the position data in the user data are associated through a code table and replaced by a readable Chinese code format.
In the embodiment of the invention, after the user data is cleaned and converted, the intermediate data with more reliable quality is obtained.
And 503, counting the cost data in the intermediate data to obtain communication cost information.
In one possible implementation, the cost data corresponding to each mobile subscriber identity is statistically processed to obtain communication cost information, and one mobile subscriber identity is guaranteed to correspond to one communication cost information.
And 504, respectively carrying out statistics and screening on call data and position data in the intermediate data to obtain behavior record information.
In step 504, the call data and the position data in the intermediate data are respectively counted and filtered to obtain behavior record information, which can also be achieved through steps 504a-504 b:
step 504a, counting the call data of the intermediate data, and obtaining the call times and the call duration of the two parties in the preset time.
The user call record information comprises: number of calls and duration of call.
In one possible implementation, the call data between two mobile subscriber identities that have generated a call is summed over a preset period of time (e.g., month, quarter, year, etc.), to obtain the number of calls and the call duration, where the number of calls and the call duration are used as the subscriber call record information.
Step 504b, filtering the position data of the intermediate data to obtain the resident position information of the user.
In a possible implementation, the identity information, the communication fee information, the user resident location information, and the user call record information of the user processed in steps 503-504 may be imported into the HIVE data warehouse analysis system or the MySQL database, etc., to prepare for the next identification of the suspected other person using the mobile user id.
In the embodiment of the invention, based on the system data and the system architecture of the 'one-license five-number' system which are operated stably at present, the effective identity card number of the 'one-license multiple-number' user and the data of a plurality of mobile user identification codes under the same are extracted, and the suspected use of other people in the mobile user identification codes is identified by combining the cost data, the call data and the position data in the existing service system, so that the accurate representation of the whole network user client is effectively supported, the power-assisted accurate marketing is realized, the client information safety is protected, and the related departments can be assisted to accurately strike the mobile phone numbers of other people for telecommunication fraud, phishing and other actions.
An embodiment of the present invention provides a device for identifying a mobile subscriber identity, which may be applied to the method for identifying a mobile subscriber identity provided in the embodiment corresponding to fig. 1 to 3, and referring to fig. 4, the device may include: a first acquisition unit 61, a second acquisition unit 62, a classification unit 63, and a determination unit 64.
A first obtaining unit 61, configured to obtain identification information of a user to be identified; the identification information uniquely identifies the user to be identified; the user to be identified is a user with a plurality of mobile user identification codes;
the first obtaining unit 61 is further configured to obtain a plurality of mobile user identification codes of the user to be identified based on the identification information;
a second acquisition unit 62 for acquiring communication fee information and behavior record information of the user to be identified; the behavior record information is behavior information of a user to be identified using a mobile user identification code;
a classification unit 63 for determining a first type identification code and a second type identification code among the plurality of mobile subscriber identification codes based on the communication fee information; the first type identification code is a mobile user identification code used by the user to be identified, and the second type identification code is a mobile user identification code except the first type in the plurality of mobile user identification codes;
A determining unit 64 for determining the mobile subscriber identity used by the suspected others in the second type of identity based on the behavior record information.
In other embodiments of the present invention, the classification unit 63 may include: the device comprises a first determining module, a sorting module and a classifying module.
A first determining module, configured to determine communication cost information of each mobile subscriber identification code of a subscriber to be identified from the communication cost information;
the ordering module is used for ordering the mobile user identification codes of each user to be identified based on the communication cost information of each mobile user identification code of the user to be identified, and obtaining an ordering result;
and the classification module is used for determining a first type identification code and a second type identification code in a plurality of mobile user identification codes of the user to be identified based on the sorting result.
In other embodiments of the present invention, the determining unit 64 may include: a second determination module and a third determination module.
The second determining module is used for determining the behavior recording information of the first type identification code and the behavior recording information of the second type identification code of the user to be identified from the behavior recording information;
and the third determining module is used for determining the mobile user identification code used by suspected others in the second type identification code of the user to be identified based on the behavior record information of the first type identification code and the behavior record information of the second type identification code of the user to be identified.
The third determining module is specifically configured to implement the following steps: when the behavior record information comprises user resident location information, detecting first user resident location information of a second type identification code of a user to be identified and whether the first user resident location information of the first type identification code has a preset association relation or not;
and determining a second type identification code which does not have a preset association relation between the first user resident location information and the second user resident location information as a mobile user identification code for suspected others.
The third determining module is specifically further configured to implement the following steps: when the behavior recording information comprises user call recording information, acquiring the number of calls and the call duration between the second type identification code and the first type identification code of the user to be identified from the user call recording information;
and determining a second type identification code with the number of calls being greater than or equal to the preset number and the length of the call time being greater than or equal to the preset duration as a mobile user identification code used by suspected others.
The third determining module is specifically further configured to implement the following steps: when the behavior recording information comprises user resident position information and user call recording information, acquiring call times and call duration between a second type identification code and a first type identification code of a user to be identified from the user call recording information;
Determining a second type identification code with the number of calls being greater than or equal to the preset number and the length of the call time being greater than or equal to the preset duration as a first target mobile user identification code;
determining a second type identification code which does not have a preset association relationship between the first user resident location information and the second user resident location information as a second target mobile user identification code; wherein the first user resident location information is user resident location information of the second type identification code; the second user resident location information is the user resident location information of the first type identification code; the mobile subscriber identity used by the suspected others includes a first target mobile subscriber identity and a second target mobile subscriber identity.
In other embodiments of the present invention, the second obtaining unit 62 is further configured to perform the following steps:
acquiring communication cost information and behavior record information of a telecom operator user;
and acquiring the communication expense information and the behavior record information of the user to be identified from the communication expense information and the behavior record information of the user of the telecom operator based on the identification information.
In other embodiments of the present invention, the second acquisition unit 62 may include: the device comprises an acquisition module, a first processing module, a statistics module and a second processing module.
The acquisition module is used for acquiring the user data of the mobile user identification code of the telecom operator user from a preset database;
the first processing module is used for cleaning and converting the user data to obtain intermediate data;
the statistics module is used for counting the expense data in the intermediate data to obtain communication expense information;
and the second processing module is used for respectively carrying out statistics and screening on call data and position data in the intermediate data to obtain behavior record information.
Wherein the behavior recording information includes: user resident location information and user call record information; the user call record information includes: number of calls and duration of calls; the second processing module is specifically configured to implement the following steps:
counting the call data of the intermediate data to obtain the call times and the call duration of the two parties in the preset time;
and screening the position data of the intermediate data to obtain the resident position information of the user.
In other embodiments of the present invention, referring to fig. 5, the mobile subscriber identity recognition apparatus further includes: a first identification unit 65, a second identification unit 66, a third identification unit 67 and a fourth identification unit 68.
A first identification unit 65, configured to add a first identification to a mobile user identification code used by a suspected other person in the mobile user identification codes of the users to be identified;
a second identification unit 66, configured to add a second identification to the mobile subscriber identification codes except for the mobile subscriber identification codes used by suspected others in the mobile subscriber identification codes of the users to be identified;
a third identification unit 67, configured to add a third identification to a user to be identified having a mobile user identification code that is suspected of being used by another person;
a fourth identification unit 68 for adding a fourth identification to the users to be identified other than the users to be identified having the mobile user identification code that is suspected of being used by others.
The identification device of the mobile user identification code provided by the embodiment of the invention can identify whether the mobile user identification code is suspected to be used by other people or not only according to the communication cost information, the behavior record information and the identification information of the user to be identified; and the communication cost information, the behavior recording information and the identification information of the user to be identified are information related to the mobile user identification code, so that the acquisition difficulty is low and the calculation complexity is low, further the problem of high algorithm complexity in the related mobile phone number identification technology is solved, the data operation is reduced, the identification efficiency is improved, and the operation difficulty is reduced.
Based on the foregoing embodiments, an embodiment of the present invention provides an apparatus 7 for identifying a mobile subscriber identity, where the apparatus 7 may be applied to a method for identifying a mobile subscriber identity provided in the embodiment corresponding to fig. 1 to 3, and referring to fig. 6, the apparatus may include: a processor 71, a memory 72 and a communication bus 73, wherein:
a communication bus 73 for implementing a communication link between the processor 71 and the memory 72;
the processor 71 is configured to execute an identification program of the mobile subscriber identification code stored in the memory 72 to implement the steps of:
acquiring identification information of a user to be identified; the identification information uniquely identifies the user to be identified; the user to be identified is a user with a plurality of mobile user identification codes;
based on the identification information, acquiring a plurality of mobile user identification codes of the user to be identified;
acquiring communication expense information and behavior record information of a user to be identified; the behavior record information is behavior information of a user to be identified using a mobile user identification code;
determining a first type of identification code and a second type of identification code of a plurality of mobile subscriber identification codes based on the communication fee information; the first type identification code is a mobile user identification code used by the user to be identified, and the second type identification code is a mobile user identification code except the first type in the plurality of mobile user identification codes;
Based on the behavior record information, a mobile user identification code used by suspected others in the second type identification code is determined.
In other embodiments of the present invention, the processor 71 is further configured to determine a first type of identification code and a second type of identification code of the plurality of mobile subscriber identification codes based on communication fee information for executing the identification program of the mobile subscriber identification codes stored in the memory 72, to implement the steps of:
determining communication cost information of each mobile user identification code of the user to be identified from the communication cost information;
based on the communication cost information of each mobile user identification code of the user to be identified, sequencing a plurality of mobile user identification codes of each user to be identified to obtain a sequencing result;
based on the ranking result, a first type of identification code and a second type of identification code of a plurality of mobile user identification codes of each user to be identified are determined.
In other embodiments of the present invention, the processor 71 is further configured to execute the behavior-based record information of the identification program of the mobile subscriber identification codes stored in the memory 72, and determine the mobile subscriber identification code used by the suspected others in the second type of identification codes, so as to implement the following steps:
determining behavior recording information of a first type identification code and behavior recording information of a second type identification code of a user to be identified from the behavior recording information;
And determining the mobile user identification code used by suspected others in the second type identification code of the user to be identified based on the behavior record information of the first type identification code and the behavior record information of the second type identification code of the user to be identified.
In other embodiments of the present invention, the behavior record information for executing the identification program of the mobile subscriber identification code stored in the memory 72 further includes: the user resident location information is used for determining mobile user identification codes used by suspected others in the second type identification codes of the users to be identified based on the behavior record information of the first type identification codes and the behavior record information of the second type identification codes of the users to be identified, so that the following steps are realized:
detecting whether first user resident location information of a second type identification code of a user to be identified and second user resident location information of the first type identification code have a preset association relation or not;
and determining a second type identification code which does not have a preset association relation between the first user resident location information and the second user resident location information as a mobile user identification code for suspected others.
In other embodiments of the present invention, the behavior record information for executing the identification program of the mobile subscriber identification code stored in the memory 72 further includes: user call record information, based on the behavior record information of the first type identification code and the behavior record information of the second type identification code of the user to be identified, determining the mobile user identification code used by suspected others in the second type identification code of the user to be identified, so as to realize the following steps:
Acquiring the number of calls and the call duration between the second type identification code and the first type identification code of the user to be identified from the user call record information;
and determining a second type identification code with the number of calls being greater than or equal to the preset number and the length of the call time being greater than or equal to the preset duration as a mobile user identification code used by suspected others.
In other embodiments of the present invention, the behavior record information for executing the identification program of the mobile subscriber identification code stored in the memory 72 further includes: the method comprises the steps of determining mobile user identification codes used by suspected others in second type identification codes of users to be identified based on user resident location information and user call record information and the behavior record information of the first type identification codes and the behavior record information of the second type identification codes of the users to be identified, so as to realize the following steps:
acquiring the number of calls and the call duration between the second type identification code and the first type identification code of the user to be identified from the user call record information;
determining a second type identification code with the number of calls being greater than or equal to the preset number and the length of the call time being greater than or equal to the preset duration as a first target mobile user identification code;
Determining a second type identification code which does not have a preset association relationship between the first user resident location information and the second user resident location information as a second target mobile user identification code; wherein the first user resident location information is user resident location information of the second type identification code; the second user resident location information is the user resident location information of the first type identification code; the mobile subscriber identity used by the suspected others includes a first target mobile subscriber identity and a second target mobile subscriber identity.
In other embodiments of the present invention, the processor 71 is further configured to execute the identification program of the mobile subscriber identification code stored in the memory 72 to obtain the communication fee information and the behavior record information of the subscriber to be identified, and further implement the following steps:
acquiring communication cost information and behavior record information of a telecom operator user;
and acquiring the communication expense information and the behavior record information of the user to be identified from the communication expense information and the behavior record information of the user of the telecom operator based on the identification information.
In other embodiments of the present invention, the processor 71 is further configured to execute the identification program of the mobile subscriber identification code stored in the memory 72 to obtain the communication fee information and the behavior record information of the telecom operator user, and further implement the following steps:
Acquiring user data of a mobile user identification code of a telecom operator user from a preset database;
cleaning and converting the user data to obtain intermediate data;
counting the expense data in the intermediate data to obtain communication expense information;
and respectively carrying out statistics and screening on call data and position data in the intermediate data to obtain behavior record information.
In other embodiments of the present invention, the user resident location information and the user call record information, the user call record information includes: number of calls and duration of calls; the behavior record information for executing the identification program of the mobile user identification code stored in the memory 72 further includes: respectively carrying out statistics and screening on call data and position data in the intermediate data to obtain behavior record information, and further realizing the following steps:
counting the call data of the intermediate data to obtain the call times and the call duration of the two parties in the preset time;
and screening the position data of the intermediate data to obtain the resident position information of the user.
In other embodiments of the present invention, the processor 71 is configured to execute the identification program of the mobile subscriber identification code stored in the memory 72, and the following steps may be implemented:
Adding a first identifier to a mobile user identification code of a user to be identified, wherein the mobile user identification code is used by suspected others;
adding a second identifier to the mobile user identification codes except the mobile user identification codes used by suspected others in the mobile user identification codes of the users to be identified;
adding a third identifier to a user to be identified with a mobile user identification code for suspected others;
and adding a fourth identification to the users to be identified except for the users to be identified with the mobile user identification codes used by suspected others.
The identification equipment of the mobile user identification code provided by the embodiment of the invention can identify whether the mobile user identification code is suspected to be used by other people or not only according to the communication cost information, the behavior record information and the identification information of the user to be identified; and the communication cost information, the behavior recording information and the identification information of the user to be identified are information related to the mobile user identification code, so that the acquisition difficulty is low and the calculation complexity is low, further the problem of high algorithm complexity in the related mobile phone number identification technology is solved, the data operation is reduced, the identification efficiency is improved, and the operation difficulty is reduced.
Based on the foregoing embodiments, embodiments of the present invention provide a storage medium storing one or more programs executable by one or more processors to perform a method of recognizing a mobile subscriber identity to implement the steps of:
acquiring identification information of a user to be identified; the identification information uniquely identifies the user to be identified; the user to be identified is a user with a plurality of mobile user identification codes;
based on the identification information, acquiring a plurality of mobile user identification codes of the user to be identified;
acquiring communication expense information and behavior record information of a user to be identified; the behavior record information is behavior information of a user to be identified using a mobile user identification code;
determining a first type of identification code and a second type of identification code of a plurality of mobile subscriber identification codes based on the communication fee information; the first type identification code is a mobile user identification code used by the user to be identified, and the second type identification code is a mobile user identification code except the first type in the plurality of mobile user identification codes;
based on the behavior record information, a mobile user identification code used by suspected others in the second type identification code is determined.
In other embodiments of the present invention, the one or more programs are executable by the one or more processors to determine a first type of identity and a second type of identity of the plurality of mobile subscriber identities based on the communication cost information to perform the steps of:
determining communication cost information of each mobile user identification code of the user to be identified from the communication cost information;
based on the communication cost information of each mobile user identification code of the user to be identified, sequencing a plurality of mobile user identification codes of each user to be identified to obtain a sequencing result;
based on the ranking result, a first type of identification code and a second type of identification code of a plurality of mobile user identification codes of each user to be identified are determined.
In other embodiments of the present invention, the one or more programs are executable by the one or more processors to determine a mobile subscriber identity used by a suspected person in the second type of identity based on the behavior record information to perform the steps of:
determining behavior recording information of a first type identification code and behavior recording information of a second type identification code of a user to be identified from the behavior recording information;
and determining the mobile user identification code used by suspected others in the second type identification code of the user to be identified based on the behavior record information of the first type identification code and the behavior record information of the second type identification code of the user to be identified.
In other embodiments of the invention, the one or more programs executable by the one or more processors to perform the behavior recording information include: the user resident location information is used for realizing the following steps when determining the mobile user identification code used by suspected others in the second type identification code based on the behavior record information:
detecting whether first user resident location information of a second type identification code of a user to be identified and second user resident location information of the first type identification code have a preset association relation or not;
and determining a second type identification code which does not have a preset association relation between the first user resident location information and the second user resident location information as a mobile user identification code for suspected others.
In other embodiments of the invention, the one or more programs executable by the one or more processors to perform the behavior recording information include: user call record information, when determining the mobile user identification code used by suspected others in the second type identification code based on the behavior record information, the following steps are realized:
acquiring the number of calls and the call duration between the second type identification code and the first type identification code of the user to be identified from the user call record information;
And determining a second type identification code with the number of calls being greater than or equal to the preset number and the length of the call time being greater than or equal to the preset duration as a mobile user identification code used by suspected others.
In other embodiments of the invention, the one or more programs executable by the one or more processors to perform the behavior recording information include: the method comprises the following steps of determining mobile user identification codes used by suspected others in second type identification codes based on behavior recording information, wherein the mobile user identification codes comprise user resident location information and user call recording information, and the following steps are realized:
acquiring the number of calls and the call duration between the second type identification code and the first type identification code of the user to be identified from the user call record information;
determining a second type identification code with the number of calls being greater than or equal to the preset number and the length of the call time being greater than or equal to the preset duration as a first target mobile user identification code;
determining a second type identification code which does not have a preset association relationship between the first user resident location information and the second user resident location information as a second target mobile user identification code; wherein the first user resident location information is user resident location information of the second type identification code; the second user resident location information is the user resident location information of the first type identification code; the mobile subscriber identity used by the suspected others includes a first target mobile subscriber identity and a second target mobile subscriber identity.
In other embodiments of the present invention, the one or more programs executable by the one or more processors obtain communication fee information and behavior record information of the user to be identified, and may implement the steps of:
acquiring communication cost information and behavior record information of a telecom operator user;
and acquiring the communication expense information and the behavior record information of the user to be identified from the communication expense information and the behavior record information of the user of the telecom operator based on the identification information.
In other embodiments of the present invention, the one or more programs, when executed by the one or more processors, perform the steps of:
acquiring user data of a mobile user identification code of a telecom operator user from a preset database;
cleaning and converting the user data to obtain intermediate data;
counting the expense data in the intermediate data to obtain communication expense information;
and respectively carrying out statistics and screening on call data and position data in the intermediate data to obtain behavior record information.
In other embodiments of the present invention, the user resident location information and the user call record information, the user call record information includes: number of calls and duration of calls; the one or more programs may be executed by one or more processors to perform statistics and filtering on call data and location data in the intermediate data, respectively, to obtain behavior record information, so as to implement the following steps:
Counting the call data of the intermediate data to obtain the call times and the call duration of the two parties in the preset time;
and screening the position data of the intermediate data to obtain the resident position information of the user.
In other embodiments of the present invention, the one or more programs may further implement the following steps when executed by the one or more processors to perform a method for identifying a mobile subscriber identity code:
adding a first identifier to a mobile user identification code of a user to be identified, wherein the mobile user identification code is used by suspected others;
adding a second identifier to the mobile user identification codes except the mobile user identification codes used by suspected others in the mobile user identification codes of the users to be identified;
adding a third identifier to a user to be identified with a mobile user identification code for suspected others;
and adding a fourth identification to the users to be identified except for the users to be identified with the mobile user identification codes used by suspected others.
It should be noted that, in the specific implementation process of the steps executed by the processor in this embodiment, the implementation process of the method for identifying the mobile subscriber identity provided in the embodiment corresponding to fig. 1 to 3 may be referred to, and will not be described herein.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The embodiments of the present invention have been described above with reference to the accompanying drawings, but the present invention is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present invention and the scope of the claims, which are to be protected by the present invention.

Claims (13)

1. A method for identifying a mobile subscriber identity, the method comprising:
acquiring identification information of a user to be identified; wherein the identification information uniquely identifies the user to be identified; the user to be identified is a user with a plurality of mobile user identification codes;
based on the identification information, acquiring a plurality of mobile user identification codes of the user to be identified;
acquiring communication cost information and behavior record information of the user to be identified; the behavior record information is behavior information of the user to be identified using a mobile user identification code;
determining a first type of identification code and a second type of identification code of the plurality of mobile subscriber identification codes based on the communication fee information; the first type identification code is a mobile user identification code used by the user to be identified, and the second type identification code is a mobile user identification code except the first type in the plurality of mobile user identification codes;
and determining the mobile user identification code used by suspected others in the second type identification code based on the behavior record information.
2. The method of claim 1, wherein said determining a first type of identification code and a second type of identification code of said plurality of mobile subscriber identification codes based on said communication cost information comprises:
Determining communication cost information of each mobile user identification code of the user to be identified from the communication cost information;
based on the communication cost information of each mobile user identification code of the user to be identified, sequencing a plurality of mobile user identification codes of the user to be identified to obtain a sequencing result;
based on the ranking result, the first type of identification code and the second type of identification code of the plurality of mobile user identification codes of the user to be identified are determined.
3. The method according to claim 1 or 2, wherein said determining a mobile user identification code for use by a suspected other person in said second type of identification code based on said behavior-recording information comprises:
determining behavior recording information of a first type identification code and behavior recording information of a second type identification code of the user to be identified from the behavior recording information;
and determining the mobile user identification code used by suspected others in the second type identification code of the user to be identified based on the behavior record information of the first type identification code and the behavior record information of the second type identification code of the user to be identified.
4. A method according to claim 3, wherein the behavioural record information comprises: the user resident location information, the determining the mobile user identification code used by suspected others in the second type identification code of the user to be identified based on the behavior record information of the first type identification code and the behavior record information of the second type identification code of the user to be identified, includes:
Detecting whether the first user resident location information of the second type identification code of the user to be identified and the second user resident location information of the first type identification code have a preset association relation or not;
and determining a second type identification code which does not have a preset association relation between the first user resident location information and the second user resident location information, and using the second type identification code as a mobile user identification code for suspected others.
5. A method according to claim 3, wherein the behavioural record information comprises: user call record information, the determining a mobile user identification code used by suspected others in the second type identification code of the user to be identified based on the behavior record information of the first type identification code and the behavior record information of the second type identification code of the user to be identified, including:
acquiring the number of calls and the call duration between the second type identification code and the first type identification code of the user to be identified from the user call record information;
and determining the second type identification code with the number of times of conversation being greater than or equal to the preset number of times and the conversation time being greater than or equal to the preset time length as the mobile user identification code used by suspected others.
6. A method according to claim 3, wherein the behavioural record information comprises: the determining the mobile user identification code used by suspected others in the second type identification code of the user to be identified based on the behavior record information of the first type identification code and the behavior record information of the second type identification code of the user to be identified comprises the following steps:
acquiring the number of calls and the call duration between the second type identification code and the first type identification code of the user to be identified from the user call record information;
determining the second type identification code with the conversation times larger than or equal to the preset times and the conversation time longer than or equal to the preset time length as a first target mobile user identification code;
determining a second type identification code which does not have a preset association relationship between the first user resident location information and the second user resident location information as a second target mobile user identification code; wherein the first user resident location information is the user resident location information of the second type identification code; the second user resident location information is the user resident location information of the first type identification code; the mobile user identification code used by the suspected others comprises the first target mobile user identification code and the second target mobile user identification code.
7. The method according to claim 1, wherein the acquiring communication fee information and behavior record information of the user to be identified includes:
acquiring communication cost information and behavior record information of a telecom operator user;
and acquiring the communication expense information and the behavior record information of the user to be identified from the communication expense information and the behavior record information of the telecom operator user based on the identification information.
8. The method of claim 7, wherein the acquiring communication fee information and behavior record information of the telecom operator user comprises:
acquiring user data of the mobile user identification code of the telecom operator user from a preset database;
cleaning and converting the user data to obtain intermediate data;
counting the cost data in the intermediate data to obtain the communication cost information;
and respectively carrying out statistics and screening on call data and position data in the intermediate data to obtain the behavior record information.
9. The method of claim 8, wherein the behavior record information comprises: user resident location information and user call record information, the user call record information comprising: the step of respectively counting and screening the call data and the position data in the intermediate data to obtain the behavior record information, wherein the step of obtaining the behavior record information comprises the following steps:
Counting the call data of the intermediate data to obtain the call times and the call duration of the two parties in the preset time;
and screening the position data of the intermediate data to obtain the resident position information of the user.
10. The method according to claim 1, wherein the method further comprises:
adding a first identifier to the mobile user identification code of the user to be identified, wherein the mobile user identification code is used by suspected others;
adding a second identifier to the mobile user identification codes except the mobile user identification codes used by suspected others in the mobile user identification codes of the users to be identified;
adding a third identifier to a user to be identified with a mobile user identification code for suspected others;
and adding a fourth identification to the users to be identified except for the users to be identified with the mobile user identification codes used by suspected others.
11. An apparatus for identifying a mobile subscriber identity, said apparatus comprising: the device comprises a first acquisition unit, a second acquisition unit, a classification unit and a determination unit, wherein:
the first acquisition unit is used for acquiring identification information of a user to be identified; wherein the identification information uniquely identifies the user to be identified; wherein the user to be identified is a user with a plurality of mobile user identification codes;
The first obtaining unit is further configured to obtain a plurality of mobile user identification codes of the user to be identified based on the identification information;
the second acquisition unit is used for acquiring communication cost information and behavior record information of the user to be identified; the behavior record information is behavior information of the user to be identified using a mobile user identification code;
the classifying unit is used for determining a first type identification code and a second type identification code in the plurality of mobile user identification codes based on the communication expense information; the first type identification code is a mobile user identification code used by the user to be identified, and the second type identification code is a mobile user identification code except the first type in the plurality of mobile user identification codes;
the determining unit is used for determining the mobile user identification code used by suspected others in the second type identification code based on the behavior record information.
12. An identification device for a mobile subscriber identity, the device comprising: a processor, a memory, and a communication bus;
the communication bus is used for realizing communication connection between the processor and the memory;
The processor is used for executing the identification program of the mobile user identification code in the memory so as to realize the following steps:
acquiring identification information of a user to be identified; wherein the identification information uniquely identifies the user to be identified; the user to be identified is a user with a plurality of mobile user identification codes;
based on the identification information, acquiring a plurality of mobile user identification codes of the user to be identified;
acquiring communication cost information and behavior record information of the user to be identified; the behavior record information is behavior information of the user to be identified using a mobile user identification code;
determining a first type of identification code and a second type of identification code of the plurality of mobile subscriber identification codes based on the communication fee information; the first type identification code is a mobile user identification code used by the user to be identified, and the second type identification code is a mobile user identification code except the first type in the plurality of mobile user identification codes;
and determining the mobile user identification code used by suspected others in the second type identification code based on the behavior record information.
13. A storage medium storing one or more programs executable by one or more processors to implement the method of identifying a mobile subscriber identity according to any of claims 1 to 10.
CN202010762738.7A 2020-07-31 2020-07-31 Identification method, device, equipment and storage medium for mobile user identification code Active CN114071454B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010762738.7A CN114071454B (en) 2020-07-31 2020-07-31 Identification method, device, equipment and storage medium for mobile user identification code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010762738.7A CN114071454B (en) 2020-07-31 2020-07-31 Identification method, device, equipment and storage medium for mobile user identification code

Publications (2)

Publication Number Publication Date
CN114071454A CN114071454A (en) 2022-02-18
CN114071454B true CN114071454B (en) 2023-09-05

Family

ID=80227810

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010762738.7A Active CN114071454B (en) 2020-07-31 2020-07-31 Identification method, device, equipment and storage medium for mobile user identification code

Country Status (1)

Country Link
CN (1) CN114071454B (en)

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1929492A (en) * 2006-09-26 2007-03-14 华为技术有限公司 System and method for realizing mobile terminal number real name system
CN101730017A (en) * 2008-10-27 2010-06-09 中国移动通信集团吉林有限公司 Method and device for determining users sending spam short messages
CN102638775A (en) * 2011-02-11 2012-08-15 上海闻泰电子科技有限公司 Method for realizing mobile phone identification policy
CN103813305A (en) * 2012-11-15 2014-05-21 中国电信股份有限公司 Method and system for controlling mobile phone terminal communication behavioral capability on basis of network side
CN105050074A (en) * 2015-07-29 2015-11-11 努比亚技术有限公司 Device and method for binding communication number to account information
CN106789844A (en) * 2015-11-23 2017-05-31 阿里巴巴集团控股有限公司 A kind of malicious user recognition methods and device
CN106851638A (en) * 2015-12-04 2017-06-13 中移(杭州)信息技术有限公司 The method for authenticating and device of a kind of client identification module card
US9877153B1 (en) * 2016-10-18 2018-01-23 International Business Machines Corporation Mobile device path and user association
US10034153B1 (en) * 2015-11-19 2018-07-24 Securus Technologies, Inc. Creation and use of mobile communications device identities
WO2019019636A1 (en) * 2017-07-25 2019-01-31 平安科技(深圳)有限公司 User identification method, electronic device, and computer readable storage medium
CN109743452A (en) * 2018-12-28 2019-05-10 努比亚技术有限公司 Message registration classification method, device and computer readable storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1929492A (en) * 2006-09-26 2007-03-14 华为技术有限公司 System and method for realizing mobile terminal number real name system
CN101730017A (en) * 2008-10-27 2010-06-09 中国移动通信集团吉林有限公司 Method and device for determining users sending spam short messages
CN102638775A (en) * 2011-02-11 2012-08-15 上海闻泰电子科技有限公司 Method for realizing mobile phone identification policy
CN103813305A (en) * 2012-11-15 2014-05-21 中国电信股份有限公司 Method and system for controlling mobile phone terminal communication behavioral capability on basis of network side
CN105050074A (en) * 2015-07-29 2015-11-11 努比亚技术有限公司 Device and method for binding communication number to account information
US10034153B1 (en) * 2015-11-19 2018-07-24 Securus Technologies, Inc. Creation and use of mobile communications device identities
CN106789844A (en) * 2015-11-23 2017-05-31 阿里巴巴集团控股有限公司 A kind of malicious user recognition methods and device
CN106851638A (en) * 2015-12-04 2017-06-13 中移(杭州)信息技术有限公司 The method for authenticating and device of a kind of client identification module card
US9877153B1 (en) * 2016-10-18 2018-01-23 International Business Machines Corporation Mobile device path and user association
WO2019019636A1 (en) * 2017-07-25 2019-01-31 平安科技(深圳)有限公司 User identification method, electronic device, and computer readable storage medium
CN109743452A (en) * 2018-12-28 2019-05-10 努比亚技术有限公司 Message registration classification method, device and computer readable storage medium

Also Published As

Publication number Publication date
CN114071454A (en) 2022-02-18

Similar Documents

Publication Publication Date Title
CN106384273B (en) Malicious bill-swiping detection system and method
CN111222025B (en) Fraud number identification method and system based on convolutional neural network
US9305110B2 (en) Method and arrangement for supporting analysis of social networks in a communication network
WO2017186090A1 (en) Communication number processing method and apparatus
CN112866192B (en) Method and device for identifying abnormal aggregation behaviors
CN110493476B (en) Detection method, device, server and storage medium
CN113206909A (en) Crank call interception method and device
CN112818316A (en) Voiceprint-based identity recognition and application method, device and equipment
CN110113748B (en) Crank call monitoring method and device
CN109474755B (en) Abnormal telephone active prediction method, system and computer readable storage medium based on sequencing learning and ensemble learning
KR20170006158A (en) System and method for detecting fraud usage of message
CN110167030B (en) Method, device, electronic equipment and storage medium for identifying crank calls
CN110536302A (en) Telecommunication fraud based reminding method and device
CN114169438A (en) Telecommunication network fraud identification method, device, equipment and storage medium
CN114071454B (en) Identification method, device, equipment and storage medium for mobile user identification code
CN110807052B (en) User group classification method, device, equipment and storage medium
CN106982284A (en) The recognition methods of harassing call number and device
CN114708080B (en) Distributed financial data online processing method
CN114449106B (en) Method, device, equipment and storage medium for identifying abnormal telephone number
CN115103063A (en) Internet fraud identification method and device for counterfeit customer service class
CN115134809A (en) Information identification method, device and equipment and readable storage medium
CN112752256B (en) Client portrait label determination method, device, equipment and storage medium
CN114168423A (en) Abnormal number calling monitoring method, device, equipment and storage medium
CN113723788A (en) Internet of things card risk identification method and system based on multi-dimensional correlation detection model
CN112416922A (en) Group partner association data mining method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant