CN114980116B - Target number identification method and electronic equipment based on 5G message - Google Patents
Target number identification method and electronic equipment based on 5G message Download PDFInfo
- Publication number
- CN114980116B CN114980116B CN202210534517.3A CN202210534517A CN114980116B CN 114980116 B CN114980116 B CN 114980116B CN 202210534517 A CN202210534517 A CN 202210534517A CN 114980116 B CN114980116 B CN 114980116B
- Authority
- CN
- China
- Prior art keywords
- target
- identity information
- communication number
- internet
- target number
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000004891 communication Methods 0.000 claims abstract description 148
- 238000001514 detection method Methods 0.000 claims description 31
- 238000012015 optical character recognition Methods 0.000 claims description 7
- 238000006243 chemical reaction Methods 0.000 claims description 3
- 238000012544 monitoring process Methods 0.000 description 16
- 238000010586 diagram Methods 0.000 description 15
- 230000006399 behavior Effects 0.000 description 11
- 230000006870 function Effects 0.000 description 11
- 238000005516 engineering process Methods 0.000 description 6
- 238000004458 analytical method Methods 0.000 description 5
- 230000001360 synchronised effect Effects 0.000 description 5
- 238000012545 processing Methods 0.000 description 4
- 238000012790 confirmation Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000007796 conventional method Methods 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 241000699670 Mus sp. Species 0.000 description 1
- 230000003190 augmentative effect Effects 0.000 description 1
- 238000007599 discharging Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y10/00—Economic sectors
- G16Y10/75—Information technology; Communication
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/10—Detection; Monitoring
-
- G—PHYSICS
- G16—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
- G16Y—INFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
- G16Y40/00—IoT characterised by the purpose of the information processing
- G16Y40/50—Safety; Security of things, users, data or systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/12—Messaging; Mailboxes; Announcements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
技术领域Technical field
本申请属于通讯信息安全领域,具体涉及一种基于5G消息的目标号码识别方法和电子设备。This application belongs to the field of communication information security, and specifically relates to a target number identification method and electronic equipment based on 5G messages.
背景技术Background technique
随着信息技术的飞速发展,运营商将短信基础通信能力升级到了5G消息。与短消息相比,个人之间、个人与企业(行业客户)服务端之间、个人(或行业客户)与物联网设备之间发送5G消息具有多媒体能力,不仅有文字、还能发图片、音频、视频等信息。With the rapid development of information technology, operators have upgraded basic SMS communication capabilities to 5G messaging. Compared with short messages, 5G messages sent between individuals, between individuals and enterprise (industry customer) servers, and between individuals (or industry customers) and IoT devices have multimedia capabilities. They not only include text, but also pictures, Audio, video and other information.
然而,在技术发展的同时,电信网络诈骗的方式也在不断变化,相关技术中,通过对发送5G消息的内容信息进行检测等方式,对诈骗号码等非法号码进行识别,由于通信号码的数量以及发送5G消息的数量较大,因此,可能导致检测的效率比较低。However, with the development of technology, the methods of telecommunications network fraud are also constantly changing. In related technologies, illegal numbers such as fraudulent numbers are identified by detecting the content information of sent 5G messages. Due to the number of communication numbers and The number of 5G messages sent is larger, so the detection efficiency may be lower.
发明内容Contents of the invention
本申请实施例的目的是提供一种基于5G消息的目标号码识别方法和电子设备,能够解决基于5G消息的目标号码的检测效率较低的问题。The purpose of the embodiments of this application is to provide a target number identification method and electronic device based on 5G messages, which can solve the problem of low detection efficiency of target numbers based on 5G messages.
第一方面,本申请实施例提供了一种基于5G消息的目标号码识别方法,该方法包括:获取已标记的目标号码对应的第一身份信息;查询所述第一身份信息关联的第一物联网设备;获取所述第一物联网设备对应的第二身份信息;In the first aspect, embodiments of the present application provide a target number identification method based on 5G messages. The method includes: obtaining the first identity information corresponding to the marked target number; querying the first object associated with the first identity information. Internet-connected device; obtain the second identity information corresponding to the first Internet of Things device;
查询所述第二身份信息对应的至少一个通信号码;将所述至少一个通信号码中符合预设条件的通信号码识别为目标号码。Query at least one communication number corresponding to the second identity information; identify the communication number that meets the preset condition among the at least one communication number as the target number.
第二方面,本申请实施例提供了一种基于5G消息的目标号码识别装置,包括:第一获取模块:用于获取已标记的目标号码对应的第一身份信息;第一查询模块,用于查询所述第一身份信息关联的第一物联网设备;第二获取模块,用于获取所述第一物联网设备对应的第二身份信息;第二查询模块,用于查询所述第二身份信息对应的至少一个通信号码;识别模块,用于将所述至少一个通信号码中符合预设条件的通信号码识别为目标号码。In the second aspect, embodiments of the present application provide a target number identification device based on 5G messages, including: a first acquisition module: used to obtain the first identity information corresponding to the marked target number; a first query module, used to Query the first Internet of Things device associated with the first identity information; a second acquisition module, used to obtain the second identity information corresponding to the first Internet of Things device; a second query module, used to query the second identity At least one communication number corresponding to the information; an identification module, used to identify the communication number that meets the preset conditions among the at least one communication number as the target number.
第三方面,本申请实施例提供了一种电子设备,该电子设备包括处理器和存储器,所述存储器存储可在所述处理器上运行的程序或指令,所述程序或指令被所述处理器执行时实现如第一方面所述的方法的步骤。In a third aspect, embodiments of the present application provide an electronic device. The electronic device includes a processor and a memory. The memory stores programs or instructions that can be run on the processor. The programs or instructions are processed by the processor. When the processor is executed, the steps of the method described in the first aspect are implemented.
第四方面,本申请实施例提供了一种可读存储介质,所述可读存储介质上存储程序或指令,所述程序或指令被处理器执行时实现如第一方面所述的方法的步骤。In a fourth aspect, embodiments of the present application provide a readable storage medium. Programs or instructions are stored on the readable storage medium. When the programs or instructions are executed by a processor, the steps of the method described in the first aspect are implemented. .
在本申请实施例中,通过获取已标记的目标号码对应的第一身份信息,查询所述第一身份信息关联的第一物联网设备,然后获取所述第一物联网设备对应的第二身份信息,将所述第二身份信息对应的至少一个通信号码作为监控号码,在所述至少一个通信号码的通信号码符合预设条件的情况下,将该通信号码识别为目标号码,从而提高了基于5G消息的目标号码的检测效率。In this embodiment of the present application, by obtaining the first identity information corresponding to the marked target number, querying the first Internet of Things device associated with the first identity information, and then obtaining the second identity corresponding to the first Internet of Things device Information, use at least one communication number corresponding to the second identity information as a monitoring number, and when the communication number of the at least one communication number meets the preset conditions, identify the communication number as the target number, thereby improving the efficiency based on Detection efficiency of target number of 5G messages.
附图说明Description of drawings
图1是本申请中一个实施例基于5G消息的目标号码识别方法示意图;Figure 1 is a schematic diagram of a target number identification method based on 5G messages according to one embodiment of this application;
图2是本申请中另一个实施例基于5G消息的目标号码识别方法示意图;Figure 2 is a schematic diagram of a target number identification method based on 5G messages according to another embodiment of the present application;
图3是本申请中另一个实施例关于发送5G消息频次超出预设频次示意图;Figure 3 is a schematic diagram of another embodiment of the present application regarding the frequency of sending 5G messages exceeding the preset frequency;
图4是本申请中另一个实施例关于发送内容包含预设内容示意图;Figure 4 is a schematic diagram of sending content including preset content according to another embodiment of the present application;
图5是本申请中另一个实施例关于是否符合预设条件的判断示意图;Figure 5 is a schematic diagram of the determination of whether preset conditions are met in another embodiment of the present application;
图6是本申请中一个实施例基于5G消息的目标号码识别装置示意图;Figure 6 is a schematic diagram of a target number identification device based on 5G messages according to one embodiment of the present application;
图7是本申请中另一个实施例基于5G消息的目标号码识别装置示意图;Figure 7 is a schematic diagram of a target number identification device based on 5G messages according to another embodiment of the present application;
图8是本申请中另一个实施例电子设备示意图;Figure 8 is a schematic diagram of an electronic device according to another embodiment of the present application;
图9是实现本申请实施例的一种电子设备的硬件结构示意图。Figure 9 is a schematic diagram of the hardware structure of an electronic device that implements an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚地描述,显然,所描述的实施例是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域普通技术人员获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application will be clearly described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in this application, all other embodiments obtained by those of ordinary skill in the art fall within the scope of protection of this application.
本申请的说明书和权利要求书中的术语“第一”、“第二”等是用于区别类似的对象,而不用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便本申请的实施例能够以除了在这里图示或描述的那些以外的顺序实施,且“第一”、“第二”等所区分的对象通常为一类,并不限定对象的个数,例如第一对象可以是一个,也可以是多个。此外,说明书以及权利要求中“和/或”表示所连接对象的至少其中之一,字符“/”,一般表示前后关联对象是一种“或”的关系。The terms "first", "second", etc. in the description and claims of this application are used to distinguish similar objects and are not used to describe a specific order or sequence. It is to be understood that the figures so used are interchangeable under appropriate circumstances so that the embodiments of the present application can be practiced in orders other than those illustrated or described herein, and that "first," "second," etc. are distinguished Objects are usually of one type, and the number of objects is not limited. For example, the first object can be one or multiple. In addition, "and/or" in the description and claims indicates at least one of the connected objects, and the character "/" generally indicates that the related objects are in an "or" relationship.
下面结合附图,通过具体的实施例及其应用场景对本申请实施例提供的基于5G消息的目标号码识别方法,进行详细地说明。The target number identification method based on 5G messages provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios.
对具有诈骗嫌疑等的5G消息进行识别一般有通过话单行为分析、内容关键字识别等相关手段。话单行为分析技术主要通过对用户发消息时产生的信令话单进行分析,统计特定场景下消息发送行为的规律,实现对诈骗事件的检测识别。例如,规定设置的限制为Q条内容每小时,当通信号码发送的短信内容达到Q条之后,则判定为疑似诈骗短信或诈骗短信。内容关键字识别技术主要通过对短信内容进行识别,当检测到发送的短信包含系统设置的关键词或关键词组合,则判定为疑似诈骗短信或诈骗短信。To identify 5G messages suspected of fraud, call bill behavior analysis, content keyword identification and other related methods are generally used. The bill behavior analysis technology mainly analyzes the signaling bills generated when users send messages, collects statistics on the rules of message sending behavior in specific scenarios, and realizes the detection and identification of fraud events. For example, it is stipulated that the limit set is Q pieces of content per hour. When the number of text messages sent by the communication number reaches Q pieces, it is determined to be a suspected fraudulent text message or a fraudulent text message. Content keyword identification technology mainly identifies the content of text messages. When it is detected that the text message sent contains the keywords or keyword combinations set by the system, it is determined to be a suspected fraudulent text message or fraudulent text message.
这些诈骗短信判断方法都有一定效果,但仍有局限性,主要有:一是判断结果可能存在判断错误,比如混淆了营销推广和诈骗,二是仅通过分析(诈骗)业务链中的某环节(如发送行为或内容识别),可检测的诈骗事件数量有限。These fraud SMS judgment methods have certain effects, but they still have limitations. The main ones are: first, the judgment results may contain errors in judgment, such as confusing marketing promotion and fraud; second, only by analyzing a certain link in the (fraud) business chain (such as sending behavior or content identification), the number of detectable fraud events is limited.
本申请实施例提供了一种基于5G消息的目标号码识别方法,如图1所示,显然,本实施例能够用于基于5G消息的诈骗号码的识别。图1是本申请一个实施例中基于5G消息的目标号码识别方法示意图,包括以下步骤:The embodiment of this application provides a target number identification method based on 5G messages, as shown in Figure 1. Obviously, this embodiment can be used to identify fraudulent numbers based on 5G messages. Figure 1 is a schematic diagram of a target number identification method based on 5G messages in one embodiment of the present application, which includes the following steps:
S110:获取已标记的目标号码对应的第一身份信息。S110: Obtain the first identity information corresponding to the marked target number.
在一些实施方式中,首先需要获取已标记的目标号码,可以采用已知的各种常规方式获取已标记的目标号码,例如,从5G消息池中获取已标记的目标号码。已标记的目标号码可以是用户标记的目标号码,也可以是通过检测装置检出的目标号码。由于每个号码(例如,目标号码)都有对应的身份信息(例如,身份证信息),因此,可以获取已标记的目标号码对应的身份信息(第一身份信息)。In some implementations, it is first necessary to obtain a marked target number. Various known conventional methods may be used to obtain the marked target number, for example, obtaining the marked target number from a 5G message pool. The marked target number may be a target number marked by a user or a target number detected by a detection device. Since each number (for example, target number) has corresponding identity information (for example, ID card information), the identity information (first identity information) corresponding to the marked target number can be obtained.
在本申请实施例中,目标号码可以包括但不限于诈骗号码或骚扰号码等。In the embodiment of this application, the target number may include but is not limited to a scam number or a harassing number.
在本申请实施例中,目标号码包括但不限于手机号码。In the embodiment of this application, the target number includes but is not limited to a mobile phone number.
S120:查询所述第一身份信息关联的第一物联网设备。S120: Query the first Internet of Things device associated with the first identity information.
在一些实施方式中,由于身份信息(例如,号码使用人身份信息,包括号码使用人身份证信息)关联有物联网设备,因此根据身份信息与物联网设备的关联关系,可以查询所述第一身份信息关联的物联网设备(第一物联网设备);根据本实施方式查询到的物联网设备可以是一个或者是由多个物联网设备形成的集合。In some implementations, since the identity information (for example, the identity information of the number user, including the identity card information of the number user) is associated with the Internet of Things device, the first query can be queried based on the association between the identity information and the Internet of Things device. The Internet of Things device associated with the identity information (the first Internet of Things device); the Internet of Things device queried according to this embodiment may be one or a collection of multiple Internet of Things devices.
S130:获取所述第一物联网设备对应的第二身份信息。S130: Obtain the second identity information corresponding to the first Internet of Things device.
在一些实施方式中,根据在步骤S120中查询到的物联网设备,再由身份信息与物联网设备的关联关系,可获取所述第一物联网设备对应的身份信息(第二身份信息)。In some implementations, based on the IoT device queried in step S120 and the association between the identity information and the IoT device, the identity information (second identity information) corresponding to the first IoT device can be obtained.
在一些实施方式中,由于在步骤S120中查询到的第一物联网设备可以是一个或者多个物联网设备形成的集合,因此,在获取所述第一物联网设备对应的第二身份信息时,不一定需要查询出全部的物联网设备所对应的第二身份信息;根据实际需求(例如,需要查询的结果更全面,或者需要查询的结果更准确等),可以选择性的或根据一定的判断规则,查询其中的一部分物联网设备所对应的第二身份信息。示意性的,在步骤S120中获取到了10个物联网设备,可以选择其中重点监控的6个物联网设备用于查询对应的第二身份信息。显然此处对物联网设备数量的列举仅是说明本实施方式的具体情况之一,并非对本实施方式内容进行任何的限制。In some embodiments, since the first IoT device queried in step S120 may be a set of one or more IoT devices, when obtaining the second identity information corresponding to the first IoT device , it is not necessarily necessary to query the second identity information corresponding to all IoT devices; according to actual needs (for example, the query results need to be more comprehensive, or the query results need to be more accurate, etc.), it can be selective or based on certain Determine the rules and query the second identity information corresponding to some of the IoT devices. Illustratively, 10 IoT devices are obtained in step S120, and 6 IoT devices that are mainly monitored can be selected for querying the corresponding second identity information. Obviously, the enumeration of the number of IoT devices here is only to illustrate one of the specific situations of this implementation mode, and does not impose any restrictions on the content of this implementation mode.
在一些实施方式中,可以通过一定规则或条件选择全部物联网设备中的一部分物联网设备。例如,获取一段检测时间内号码使用人使用物联网设备的5G消息物联网通讯话单,分析此检测时间内通讯话单中对应的所有发送方物联网设备和接收方物联网设备,这些物联网设备即为选取的物联网设备(第二物联网设备),第二物联网设备可以作为重点监控的物联网设备,进而再获取所述第二物联网设备对应的第二身份信息。In some implementations, a part of all IoT devices can be selected through certain rules or conditions. For example, obtain the 5G message IoT communication bill of the IoT device used by the number user during a detection period, and analyze all the sender IoT devices and receiver IoT devices corresponding to the communication bill within this detection period. These IoT devices The device is the selected IoT device (the second IoT device). The second IoT device can be used as the key monitored IoT device, and then the second identity information corresponding to the second IoT device is obtained.
S140:查询所述第二身份信息对应的至少一个通信号码。S140: Query at least one communication number corresponding to the second identity information.
在一些实施方式中,根据步骤S130获取的第二身份信息(例如,全部物联网设备获取的身份信息,或者一部分物联网设备获取的身份信息)查询对应的通信号码,查询的通信号码至少一个。In some implementations, the corresponding communication number is queried based on the second identity information obtained in step S130 (for example, the identity information obtained by all IoT devices, or the identity information obtained by some IoT devices), and at least one communication number is queried.
其中,通信号码包括但不限于手机号码。Among them, communication numbers include but are not limited to mobile phone numbers.
S150:将所述至少一个通信号码中符合预设条件的通信号码识别为目标号码。S150: Identify the communication number that meets the preset conditions among the at least one communication number as the target number.
在一些实施方式中,查询到的至少一个通信号码,其中,可能存在目标号码,也可能存在非目标号码,因此需要根据预设条件进行筛选,只有符合预设条件的通信号码才识别为目标号码。In some embodiments, among the at least one queried communication number, there may be a target number or a non-target number, so it needs to be filtered according to the preset conditions, and only the communication numbers that meet the preset conditions are identified as the target number. .
本申请实施例公开的一种基于5G消息的目标号码识别方法,通过获取已标记的目标号码对应的第一身份信息,查询所述第一身份信息关联的第一物联网设备,获取所述第一物联网设备对应的第二身份信息,查询所述第二身份信息对应的至少一个通信号码,进而将所述至少一个通信号码中符合预设条件的通信号码识别为目标号码,一方面可有效提升目标号码的识别率,另一方面也降低只通过分析业务链(如诈骗业务链)中的某环节的误拦。通过本实施例,可以有效地检索出同一团伙(如诈骗团伙)使用的目标号码,大大缩小了号码监控的范围,提高了基于5G消息的目标号码的检测效率和准确性。The embodiment of the present application discloses a target number identification method based on 5G messages. By obtaining the first identity information corresponding to the marked target number, querying the first Internet of Things device associated with the first identity information, and obtaining the first identity information. The second identity information corresponding to an Internet of Things device queries at least one communication number corresponding to the second identity information, and then identifies the communication number that meets the preset conditions among the at least one communication number as the target number. On the one hand, it can effectively This improves the recognition rate of target numbers, and on the other hand, reduces false interceptions by only analyzing a certain link in the business chain (such as the fraud business chain). Through this embodiment, the target numbers used by the same gang (such as a fraud gang) can be effectively retrieved, which greatly reduces the scope of number monitoring and improves the detection efficiency and accuracy of target numbers based on 5G messages.
作为另一个实施例,本申请提供了一种基于5G消息的目标号码识别方法,如图2所示,此实施例以识别诈骗号码为例,当然也适用于识别其他类型的目标号码。图2是本申请中另一个实施例基于5G消息的目标号码识别方法示意图,包括以下步骤:As another embodiment, this application provides a target number identification method based on 5G messages, as shown in Figure 2. This embodiment takes identifying fraudulent numbers as an example, and of course is also applicable to identifying other types of target numbers. Figure 2 is a schematic diagram of a target number identification method based on 5G messages according to another embodiment of the present application, which includes the following steps:
S210:从5G消息诈骗池中获取已标记的诈骗号码。其中,已标记的诈骗号码可以是用户标记的诈骗号码,也可以是通过检测装置检出的诈骗号码。S210: Obtain the marked fraud number from the 5G message fraud pool. The marked fraud number may be a fraud number marked by the user, or may be a fraud number detected by a detection device.
S220:根据诈骗号码在运营商的注册信息,查询到已标记的诈骗号码的身份证信息,作为诈骗人身份信息(即上述的第一身份信息)。S220: According to the registration information of the fraudulent number with the operator, the ID card information of the marked fraudulent number is retrieved as the identity information of the fraudster (i.e., the first identity information mentioned above).
S230:查询诈骗人身份证下关联的物联网设备,该物联网设备(一个或多个)作为诈骗人使用的物联网设备(即上述的第一物联网设备)。S230: Query the IoT device associated with the fraudster's ID card, and the IoT device (one or more) is used as the IoT device used by the fraudster (i.e., the above-mentioned first IoT device).
S240:获取检测时间段内诈骗人使用物联网设备的5G消息物联网通讯话单,分析检测时间内其对应的所有发送方物联网设备和接收方物联网设备集合,该物联网设备集合作为重点监控物联网设备(即上述的第二物联网设备)。S240: Obtain the 5G message IoT communication bill of the fraudster using the IoT device during the detection time period, and analyze all the sender IoT devices and the receiver IoT device set corresponding to the IoT device set during the detection time period, with the IoT device set as the focus Monitor the IoT device (i.e. the second IoT device mentioned above).
S250:获取重点监控物联网设备(即第二物联网设备)在运营商注册的身份证信息,作为重点监控身份信息(即第二身份信息)。S250: Obtain the ID card information of the key monitored IoT device (i.e. the second IoT device) registered with the operator as the key monitored identity information (i.e. the second identity information).
S260:查询重点监控身份信息下所有通信号码,作为需监控的通信号码。S260: Query all communication numbers under key monitoring identity information as communication numbers to be monitored.
S270:将需监控的通信号码中存在发送5G消息频次超出预设频次或发送内容包含预设内容的通信号码标记为诈骗号码。S270: Among the communication numbers to be monitored, communication numbers that send 5G messages more frequently than the preset frequency or send content that contains preset content are marked as fraudulent numbers.
本实施例中,以身份证作为身份信息为例描述了本申请的一种实现方式,通过已标记的目标号码(诈骗号码)在运营商注册的身份证信息,查询到关联的物联网设备,并确定其中重点监控物联网设备,再获取重点监控物联网设备对应的身份信息,并查询到相关通信号码,最终根据预设条件识别出诈骗号码。本实施例有效提升诈骗号码的识别率,有效地检索出同一诈骗团伙使用的诈骗号码,大大缩小了诈骗号码监控的范围,提高了基于5G消息的诈骗号码的检测效率和准确性。In this embodiment, an implementation method of this application is described by taking the ID card as identity information as an example. The associated IoT device is queried through the ID card information registered with the operator through the marked target number (fraud number). And determine the key monitored IoT devices, then obtain the identity information corresponding to the key monitored IoT devices, and query the relevant communication numbers, and finally identify the fraud number based on preset conditions. This embodiment effectively improves the identification rate of fraudulent numbers, effectively retrieves fraudulent numbers used by the same fraud gang, greatly reduces the scope of fraud number monitoring, and improves the detection efficiency and accuracy of fraudulent numbers based on 5G messages.
在一些实施方式中,图3示出了本申请中另一个实施例以发送5G消息频次超出预设频次作为预设条件判断所述至少一个通信号码中的通信号码是否为目标号码的流程示意图。In some embodiments, FIG. 3 shows a schematic flowchart of another embodiment of the present application in which the frequency of sending 5G messages exceeds the preset frequency as a preset condition to determine whether the communication number in the at least one communication number is a target number.
对通信号码发送5G信息频次的分析实质是对话单行为的分析,如图3所示,可以包括以下步骤:The analysis of the frequency of 5G information sent by communication numbers is essentially the analysis of conversation single behavior, as shown in Figure 3, which can include the following steps:
S310:获取目标通信号码对应的检测时间内的5G消息话单。S310: Obtain the 5G message bill within the detection time corresponding to the target communication number.
获取目标通信号码对应的检测时间内的5G消息话单,其中,所述目标通信号码为所述至少一个通信号码中的任一个通信号码。Obtain the 5G message bill within the detection time corresponding to the target communication number, where the target communication number is any communication number among the at least one communication number.
通过查询到了第二身份信息对应的至少一个通信号码,其中,包括目标号码与非目标号码;针对查询到的通信号码中的某一个通信号码,提取此通信号码的5G个人消息话单。其他的通信号码按同样的方式提取5G个人消息话单。At least one communication number corresponding to the second identity information is queried, including a target number and a non-target number; for a certain communication number among the queried communication numbers, the 5G personal message bill of this communication number is extracted. Other communication numbers extract 5G personal message bills in the same way.
在一些实施方式中,根据实际需要,可以选择某一段检测时间内的5G个人消息话单;例如,可以根据实践经验确定某一段检测时间,也可以根据一定规则确定某一段检测时间。In some implementations, according to actual needs, the 5G personal message bill can be selected within a certain period of detection; for example, a certain period of detection time can be determined based on practical experience, or a certain period of detection time can be determined based on certain rules.
S320:根据所述5G消息话单获取目标数量,其中,所述目标数量包括以下至少之一:发送的个人消息条数、接收的不同号码数和发送相同消息内容条数。S320: Obtain a target number according to the 5G message bill, where the target number includes at least one of the following: the number of personal messages sent, the number of different numbers received, and the number of messages with the same content sent.
在一些实施方式中,获取目标通信号码对应的检测时间内的5G消息话单,其中,所述目标通信号码为所述至少一个通信号码中的任一个通信号码;根据所述5G消息话单获取目标数量,其中,所述目标数量包括以下至少之一:发送的个人消息条数、接收的不同号码数和发送相同消息内容条数。In some embodiments, the 5G message bill within the detection time corresponding to the target communication number is obtained, wherein the target communication number is any communication number among the at least one communication number; and the 5G message bill is obtained according to the 5G message bill A target number, wherein the target number includes at least one of the following: the number of personal messages sent, the number of different numbers received, and the number of messages with the same content sent.
当然,本实施方式中的目标数量(个人消息条数、接收的不同号码数和发送相同消息内容条数)是判断5G消息频次是否超出预设频次的众多目标(不局限于本实施方式中列举的目标)中的一种,本领域技术人员应当能够知晓,根据实际情况,还有其他单一或组合式的选择目标。Of course, the target numbers in this implementation (the number of personal messages, the number of different numbers received, and the number of messages with the same content sent) are many targets for judging whether the frequency of 5G messages exceeds the preset frequency (not limited to those listed in this implementation). one of the goals), those skilled in the art should be able to know that there are other single or combined selection goals according to the actual situation.
S330:在确定所述目标数量是否超出所述预设频次的情况下,确定所述目标通信号码为目标号码。S330: When it is determined whether the target number exceeds the preset frequency, determine the target communication number to be the target number.
确定所述目标数量是否超出所述预设频次,即判断所述个人消息条数、接收的不同号码数和发送相同消息内容条数中的至少一个是否满足预设阈值条件;在确定所述目标数量是否超出所述预设频次的情况下,确定所述目标通信号码为目标号码。Determine whether the number of targets exceeds the preset frequency, that is, determine whether at least one of the number of personal messages, the number of different numbers received, and the number of messages with the same content sent satisfies a preset threshold condition; after determining the target If the number exceeds the preset frequency, the target communication number is determined to be the target number.
在一些实施方式中,为了避免误判断,可以根据个人消息条数、接收的不同号码数和发送相同消息内容条数是否都满足预设阈值条件,如果都满足预设阈值条件,则确定该目标通信号码为目标号码,如果至少存在一项不满足预设阈值条件,则确定该目标通信号码不是目标号码。例如,设置预设阈值条件为:发送个人消息条数≥10且接收的不同号码数≥10且发送相同消息内容条数≥10,当统计的5G消息话单中发送的个人消息条数为12、接收的不同号码数为12和发送相同消息内容条数为12时,则满足预设阈值条件,因此可以识别此目标通信号码为目标号码;当统计的5G消息话单中发送的个人消息条数为8、接收的不同号码数为12和发送相同消息内容条数为12时,则存在一项不满足预设阈值条件,因此此目标通信号码识别为非目标号码。显然,此处对个人消息条数、接收的不同号码数和发送相同消息内容条数的列举仅是说明本实施方式的具体情况之一,并非对本实施方式内容进行任何的限制。In some implementations, in order to avoid misjudgments, the target can be determined based on whether the number of personal messages, the number of different numbers received, and the number of messages with the same content sent all meet the preset threshold conditions. If they all meet the preset threshold conditions, the target can be determined. The communication number is a target number. If at least one condition does not meet the preset threshold condition, it is determined that the target communication number is not a target number. For example, set the preset threshold conditions as follows: the number of personal messages sent is ≥ 10 and the number of different numbers received is ≥ 10 and the number of messages with the same content sent is ≥ 10. When the number of personal messages sent in the statistical 5G message bill is 12 When the number of different numbers received is 12 and the number of messages with the same content sent is 12, the preset threshold conditions are met, so the target communication number can be identified as the target number; when the personal message items sent in the statistical 5G message bill When the number is 8, the number of different numbers received is 12, and the number of messages with the same content sent is 12, then there is one item that does not meet the preset threshold condition, so the target communication number is identified as a non-target number. Obviously, the enumeration of the number of personal messages, the number of different numbers received, and the number of messages with the same content sent here is only to illustrate one of the specific situations of this embodiment, and does not limit the content of this embodiment in any way.
本申请实施例中,在将所述至少一个通信号码中符合发送5G消息频次超出预设频次的通信号码识别为目标号码时,通过分析一定时间段内所监控的通信号码发送的个人5G消息条数、接收的不同号码数和发送相同消息内容条数来综合判断所监控的通信号码是否为目标号码,进一步提高了基于5G消息的目标号码的检测效率和准确性,也减少对非目标号码的误判。In the embodiment of the present application, when the communication number among the at least one communication number that matches the frequency of sending 5G messages exceeding the preset frequency is identified as the target number, the personal 5G message strips sent by the monitored communication numbers within a certain period of time are analyzed. The number, the number of different numbers received and the number of the same message content sent are used to comprehensively determine whether the monitored communication number is the target number, which further improves the detection efficiency and accuracy of target numbers based on 5G messages, and also reduces the detection of non-target numbers. Misjudgment.
图4示出了本申请中另一个实施例以发送内容包含预设内容作为预设条件判断所述至少一个通信号码中的通信号码是否为目标号码的流程示意图。Figure 4 shows a schematic flowchart of another embodiment of the present application for determining whether the communication number in the at least one communication number is a target number using the sent content containing preset content as a preset condition.
判断通信号码的发送内容是否包含预设内容如图4所示。一般的,发送内容可以为文本消息、音频消息、图片消息或者视频消息等等,预设内容是预先设定的关键词或关键词组合;根据不同的消息类型执行不同的处置,将所述至少一个通信号码中符合预设条件的通信号码识别为目标号码,包括以下之一:Determining whether the sent content of the communication number contains preset content is shown in Figure 4. Generally, the content to be sent can be a text message, an audio message, a picture message, a video message, etc., and the preset content is a preset keyword or combination of keywords; different processing is performed according to different message types, and the at least The communication number in a communication number that meets the preset conditions is identified as the target number, including one of the following:
S420:对以目标通信号码作为发送方的文本消息进行关键字识别,在确定所述文本消息中包括预设内容的情况下,识别所述目标通信号码为目标号码,其中,所述目标通信号码为所述至少一个通信号码中的任一个通信号码;S420: Perform keyword identification on the text message with the target communication number as the sender, and if it is determined that the text message includes preset content, identify the target communication number as the target number, where the target communication number is any communication number among the at least one communication number;
S430:对以所述目标通信号码作为发送方的音频消息进行文本转换,对转换成文本后的内容进行关键字识别,确定所述音频消息中包括预设内容的情况下,识别所述目标通信号码为目标号码;S430: Perform text conversion on the audio message with the target communication number as the sender, perform keyword recognition on the content converted into text, and identify the target communication if it is determined that the audio message includes preset content. The number is the target number;
S440:对以所述目标通信号码作为发送方的图片消息进行光学字符识别和图片样例库比对,确定所述图片消息中包括预设内容的情况下,识别所述目标通信号码为目标号码;S440: Perform optical character recognition and picture sample library comparison on the picture message with the target communication number as the sender. If it is determined that the picture message includes preset content, identify the target communication number as the target number. ;
S450:按一定时间间隔,对以所述目标通信号码作为发送方的视频消息进行抽帧,对抽帧的图片进行光学字符识别和图片样例库比对,在确定所述抽帧的图片中包括预设内容的情况下,识别所述目标通信号码为目标号码。S450: At certain time intervals, perform frame extraction on the video message with the target communication number as the sender, perform optical character recognition and picture sample library comparison on the extracted frame pictures, and determine the extracted frame pictures. If preset content is included, the target communication number is identified as the target number.
在一些实施方式中,针对上述四种类型的消息识别,除了发送方发送的消息类型满足其中一种的情况外,还可以是发送方发送的信息需同时满足两种或两种以上的多种类型的消息。例如,可以将预设内容设置为同时具有文本信息和视频信息,也可以是同时具有音频信息和图片信息,或者是同时具有以上四种类型的信息。In some embodiments, for the above four types of message identification, in addition to the situation that the message type sent by the sender satisfies one of the conditions, the information sent by the sender may also need to satisfy two or more types at the same time. type of message. For example, the preset content can be set to have both text information and video information, audio information and picture information, or the above four types of information at the same time.
在一些实施方式中,图5示出了本申请中另一个实施例关于是否符合预设条件的判断示意图。In some embodiments, FIG. 5 shows a schematic diagram of determination of whether preset conditions are met in another embodiment of the present application.
为了更加严谨准确地对查询到的至少一个通信号码判断其是否为目标号码,也可以是当目标通信号码发送的5G信息同时符合发送5G消息频次超出预设频次和发送内容包含预设内容时才识别此目标通信号码为目标号码。如图5所示,其包括以下步骤:In order to more rigorously and accurately determine whether at least one of the queried communication numbers is the target number, it can also be done when the 5G information sent by the target communication number is consistent with the fact that the frequency of sending 5G messages exceeds the preset frequency and the sent content contains preset content. Identifies this target communication number as a target number. As shown in Figure 5, it includes the following steps:
S510:获取重点监控通信号码在检测时间内的5G个人消息话单。S510: Obtain the 5G personal message bill of the key monitored communication number within the detection time.
S520:统计检测时间内重点监控通信号码发送的个人消息条数、接收的不同号码数和发送相同消息内容条数。S520: During the statistical detection period, focus on monitoring the number of personal messages sent by the communication number, the number of different numbers received, and the number of messages with the same content sent.
S530:根据重点监控通信号码的行为(即发送5G消息频次)来判断是否命中阈值,如果命中执行步骤S540,如果没有命中执行步骤S560。S530: Determine whether the threshold is hit based on the behavior of the key monitoring communication number (ie, the frequency of sending 5G messages). If the threshold is hit, perform step S540; if not, perform step S560.
其中,通信行为的判断规则为,发送个人消息条数≥L且接收的不同号码数≥M且发送相同消息内容条数≥N,L、M、N数值大小根据实际情况确定。Among them, the judgment rules for communication behavior are: the number of personal messages sent is ≥ L, the number of different numbers received is ≥ M, and the number of messages with the same content sent is ≥ N. The values of L, M, and N are determined according to the actual situation.
S540:在发送5G消息频次超出预设频次情况下,对重点监控通信号码的发送内容进行识别,看是否命中系统预设内容,如果命中执行步骤S550,如果没有命中执行步骤S560。S540: When the frequency of sending 5G messages exceeds the preset frequency, identify the sending content of the key monitoring communication number to see if it hits the system's preset content. If it hits, execute step S550; if not, execute step S560.
S550:判定(识别)该目标通信号码为目标号码。S550: Determine (recognize) the target communication number as the target number.
S560:流程结束。S560: The process ends.
本申请实施例中,在将所述至少一个通信号码中符合预设条件的通信号码识别为目标号码时,不仅判断了通信号码发送5G消息频次是否超过预设频次,还从发送内容上进行了判断,即根据预先设定的关键词或关键词组合,结合不同的消息类型执行不同的处置来综合判断所监控的通信号码是否为目标号码,进一步提高了基于5G消息的目标号码的检测效率和准确性,也减少对非目标号码的误判。In the embodiment of the present application, when the communication number that meets the preset conditions among the at least one communication number is identified as the target number, it is not only judged whether the frequency of sending 5G messages by the communication number exceeds the preset frequency, but also based on the sending content. Judgment, that is, based on preset keywords or combinations of keywords, and combining different message types to perform different processing to comprehensively determine whether the monitored communication number is the target number, further improving the detection efficiency and detection of target numbers based on 5G messages. accuracy, and also reduces misjudgments of non-target numbers.
本申请另一种实施例提供了一种基于5G消息的目标号码的识别装置,图6是本申请另一个实施例中基于5G消息的目标号码识别装置示意图,如图6所示,该装置可以包括第一获取模块610、第一查询模块620、第二获取模块630、第二查询模块640和识别模块650。Another embodiment of the present application provides a device for identifying a target number based on a 5G message. Figure 6 is a schematic diagram of a device for identifying a target number based on a 5G message in another embodiment of the present application. As shown in Figure 6, the device can It includes a first acquisition module 610, a first query module 620, a second acquisition module 630, a second query module 640 and an identification module 650.
第一获取模块610,用于获取已标记的目标号码对应的第一身份信息。The first acquisition module 610 is used to acquire the first identity information corresponding to the marked target number.
本实施例中,第一获取模块610首先需要获取已标记的目标号码,可以采用已知的各种常规的方式获取已标记的目标号码,例如,从5G消息池中获取已标记的目标号码;已标记的目标号码可以是用户标记的目标号码,也可以是通过检测装置检出的目标号码。由于每个号码(例如目标号码)都有对应的身份信息(例如身份证信息),因此,可以获取已标记的目标号码对应的身份信息(第一身份信息)。第一获取模块610更多的实施方式可以参考本申请提供的实施例一种5G消息的目标号码识别方法中的详细描述,本领域技术人员应当能够理解相应的实施方式,为避免重复,在此不再赘述。In this embodiment, the first acquisition module 610 first needs to obtain the marked target number, and can obtain the marked target number by using various known conventional methods, for example, obtaining the marked target number from the 5G message pool; The marked target number may be a target number marked by a user or a target number detected by a detection device. Since each number (such as the target number) has corresponding identity information (such as ID card information), the identity information (first identity information) corresponding to the marked target number can be obtained. For more implementation methods of the first acquisition module 610, please refer to the detailed description in Embodiment A Target Number Identification Method for 5G Messages provided in this application. Those skilled in the art should be able to understand the corresponding implementation methods. To avoid duplication, here No longer.
第一查询模块620,用于查询所述第一身份信息关联的第一物联网设备。The first query module 620 is used to query the first Internet of Things device associated with the first identity information.
本实施例中,由于身份信息关联有物联网设备,因此根据身份信息与物联网设备的关联关系,第一查询模块620可以查询所述第一身份信息关联的物联网设备(第一物联网设备);查询到的物联网设备可以是一个或者多个物联网设备形成的集合。第一查询模块620更多的实施方式可以参考本申请提供的实施例一种5G消息的目标号码识别方法中的详细描述,本领域技术人员应当能够理解相应的实施方式,为避免重复,在此不再赘述。In this embodiment, since the identity information is associated with the Internet of Things device, therefore according to the association between the identity information and the Internet of Things device, the first query module 620 can query the Internet of Things device associated with the first identity information (the first Internet of Things device ); the queried IoT device can be a collection of one or more IoT devices. For more implementation methods of the first query module 620, please refer to the detailed description in the embodiment of a 5G message target number identification method provided in this application. Those skilled in the art should be able to understand the corresponding implementation methods. To avoid repetition, here No longer.
第二获取模块630,用于获取所述第一物联网设备对应的第二身份信息。The second acquisition module 630 is used to acquire the second identity information corresponding to the first Internet of Things device.
本实施例中,第二获取模块630根据身份信息与物联网设备的关联关系,获取所述第一物联网设备对应的第二身份信息。在查询到的第一物联网设备可以是一个或者多个物联网设备形成的集合,在获取所述第一物联网设备对应的第二身份信息时,不一定需要查询出全部的物联网设备所对应的第二身份信息,根据实际需求,可以选择性的查询其中一部分的物联网设备所对应的第二身份信息,因此,在一些实施方式中,第二获取模块630包括确认模块(附图中未示出),所述确认模块用于确定第一物联网设备中需监控的第二物联网设备;再获取第二物联网设备的第二身份信息。例如,获取到了20个物联网设备,则确认模块可以选择(或根据一定规则确定)其中的10个物联网设备用于查询对应的第二身份信息,显然此处对物联网设备数量的列举仅是说明本实施方式的具体情况之一,并非对本实施方式内容进行任何的限制。In this embodiment, the second acquisition module 630 acquires the second identity information corresponding to the first Internet of Things device according to the association between the identity information and the Internet of Things device. The queried first IoT device may be a collection of one or more IoT devices. When obtaining the second identity information corresponding to the first IoT device, it is not necessarily necessary to query all the IoT devices. The corresponding second identity information, according to actual needs, can be selectively queried for the second identity information corresponding to some of the Internet of Things devices. Therefore, in some implementations, the second acquisition module 630 includes a confirmation module (in the figure (not shown), the confirmation module is used to determine the second Internet of Things device that needs to be monitored among the first Internet of Things devices; and then obtain the second identity information of the second Internet of Things device. For example, if 20 IoT devices are obtained, the confirmation module can select (or determine according to certain rules) 10 of the IoT devices to query the corresponding second identity information. Obviously, the number of IoT devices is only listed here. This is one of the specific cases for illustrating this embodiment, and does not limit the content of this embodiment in any way.
第二获取模块630更多的实施方式可以参考本申请提供的实施例一种5G消息的目标号码识别方法中的详细描述,本领域技术人员应当能够理解相应的实施方式,为避免重复,在此不再赘述。For more implementation methods of the second acquisition module 630, please refer to the detailed description in the embodiment of a 5G message target number identification method provided in this application. Those skilled in the art should be able to understand the corresponding implementation methods. To avoid repetition, here No longer.
第二查询模块640,用于查询所述第二身份信息对应的至少一个通信号码。The second query module 640 is used to query at least one communication number corresponding to the second identity information.
本实施例中,第二查询模块640根据第二获取模块630获取的第二身份信息(例如,可以是全部物联网设备获取的身份信息,也可以是一部分物联网设备获取的身份信息)查询对应的通信号码,查询的通信号码至少一个。In this embodiment, the second query module 640 queries the corresponding identity information based on the second identity information obtained by the second acquisition module 630 (for example, it can be the identity information obtained by all IoT devices, or it can be the identity information obtained by some IoT devices). communication number, at least one communication number is queried.
识别模块650,用于将所述至少一个通信号码中符合预设条件的通信号码识别为目标号码。The identification module 650 is configured to identify a communication number that meets a preset condition among the at least one communication number as a target number.
在一些实施方式中,识别模块650包括频次判断模块(附图中未示出),所述频次判定模块用于执行:获取目标通信号码对应的检测时间内的5G消息话单,其中,所述目标通信号码为所述至少一个通信号码中的任一个通信号码;根据所述5G消息话单获取目标数量,其中,所述目标数量包括以下至少之一:发送的个人消息条数、接收的不同号码数和发送相同消息内容条数;在确定所述目标数量是否超出所述预设频次的情况下,确定所述目标通信号码为目标号码。In some embodiments, the identification module 650 includes a frequency judgment module (not shown in the drawings). The frequency judgment module is used to perform: obtain the 5G message bill within the detection time corresponding to the target communication number, wherein, the The target communication number is any one of the at least one communication number; the target number is obtained according to the 5G message bill, wherein the target number includes at least one of the following: the number of personal messages sent, the number of different messages received The number of numbers and the number of messages with the same content sent; when it is determined whether the target number exceeds the preset frequency, the target communication number is determined to be the target number.
在一些实施方式中,识别模块650包括内容判断模块(附图中未示出),所述内容判断模块用于执行将所述至少一个通信号码中符合预设条件的通信号码识别为目标号码,包括以下之一:In some embodiments, the identification module 650 includes a content determination module (not shown in the drawings), which is configured to identify a communication number that meets a preset condition among the at least one communication number as a target number, Include one of the following:
对以目标通信号码作为发送方的文本消息进行关键字识别,在确定所述文本消息中包括预设内容的情况下,识别所述目标通信号码为目标号码,其中,所述目标通信号码为所述至少一个通信号码中的任一个通信号码;Perform keyword recognition on a text message with a target communication number as the sender, and when it is determined that the text message includes preset content, identify the target communication number as the target number, where the target communication number is the target number. any communication number among the at least one communication number;
对以所述目标通信号码作为发送方的音频消息进行文本转换,对转换成文本后的内容进行关键字识别,确定所述音频消息中包括预设内容的情况下,识别所述目标通信号码为目标号码;Perform text conversion on the audio message with the target communication number as the sender, perform keyword recognition on the content converted into text, and identify the target communication number as if it is determined that the audio message includes preset content. target number;
对以所述目标通信号码作为发送方的图片消息进行光学字符识别和图片样例库比对,确定所述图片消息中包括预设内容的情况下,识别所述目标通信号码为目标号码;Perform optical character recognition and picture sample library comparison on the picture message with the target communication number as the sender, and if it is determined that the picture message includes preset content, identify the target communication number as the target number;
按一定时间间隔,对以所述目标通信号码作为发送方的视频消息进行抽帧,对抽帧的图片进行光学字符识别和图片样例库比对,在确定所述抽帧的图片中包括预设内容的情况下,识别所述目标通信号码为目标号码。At certain time intervals, frames are extracted for video messages with the target communication number as the sender, optical character recognition and image sample library comparison are performed on the extracted frame pictures, and predetermined information is included in the extracted frame pictures. In the case of content, the target communication number is identified as the target number.
识别模块650更多的实施方式可以参考本申请提供的实施例一种5G消息的目标号码识别方法中的详细描述,本领域技术人员应当能够理解相应的实施方式,为避免重复,在此不再赘述。For more implementations of the identification module 650, please refer to the detailed description in Embodiment A Target Number Identification Method for 5G Messages provided in this application. Those skilled in the art should be able to understand the corresponding implementations. To avoid repetition, they will not be mentioned here again. Repeat.
本申请实施例公开的一种基于5G消息的目标号码识别装置,该装置通过获取已标记的目标号码对应的第一身份信息,查询所述第一身份信息关联的第一物联网设备,获取所述第一物联网设备对应的第二身份信息,查询所述第二身份信息对应的至少一个通信号码,进而将所述至少一个通信号码中符合预设条件的通信号码识别为目标号码,一方面可有效提升目标号码的识别率,另一方面也降低只通过分析业务链(如诈骗业务链)中的某环节的误拦。通过本实施例,可以有效地检索出同一团伙(如诈骗团伙)使用的目标号码,大大缩小了号码监控的范围,提高了基于5G消息的目标号码的检测效率和准确性。The embodiment of the present application discloses a target number identification device based on 5G messages. The device obtains the first identity information corresponding to the marked target number, queries the first Internet of Things device associated with the first identity information, and obtains the first identity information. Query the second identity information corresponding to the first Internet of Things device, query at least one communication number corresponding to the second identity information, and then identify the communication number that meets the preset conditions among the at least one communication number as the target number. On the one hand, It can effectively improve the recognition rate of target numbers, and on the other hand, it can also reduce false interceptions by only analyzing a certain link in the business chain (such as the fraud business chain). Through this embodiment, the target numbers used by the same gang (such as a fraud gang) can be effectively retrieved, which greatly reduces the scope of number monitoring and improves the detection efficiency and accuracy of target numbers based on 5G messages.
在另一些实施方式中,图7示出了一个实施例基于5G消息的目标号码识别装置示意图,本实施例以目标号码是诈骗号码的情况为例,当然也可以是其他类型的目标号码。其包括重点监控号码识别模块、诈骗号码识别模块及数据存储模块。In other embodiments, Figure 7 shows a schematic diagram of a target number identification device based on 5G messages in one embodiment. This embodiment takes the case where the target number is a fraudulent number as an example. Of course, it can also be other types of target numbers. It includes a key monitoring number identification module, a fraud number identification module and a data storage module.
第一部分:重点监控号码识别模块,用于根据已标记的诈骗号码,通过诈骗号码关联的物联网设备识别出重点监控号码,其中:The first part: the key monitoring number identification module is used to identify key monitoring numbers based on the marked fraud numbers and through the Internet of Things devices associated with the fraud numbers, including:
诈骗号码身份查询子模块(即其他实施中第一获取模块410)用于查询诈骗号码在运营商注册时身份证信息。The fraud number identity query sub-module (ie, the first acquisition module 410 in other implementations) is used to query the identity card information of the fraud number when it is registered with the operator.
诈骗号码物联网设备查询子模块(即其他实施中第一查询模块420)是根据诈骗号码身份查询子模块查询出的诈骗号码身份证查询该身份证下关联的物联网设备。The fraud number IoT device query sub-module (ie, the first query module 420 in other implementations) queries the fraud number ID card queried by the fraud number identity query sub-module for the IoT devices associated with the ID card.
诈骗物联网设备通讯设备查询子模块是根据诈骗号码物联网设备查询子模块查询出的诈骗物联网设备进行通讯的物联网设备信息。The fraudulent IoT device communication device query sub-module is the IoT device information that the fraudulent IoT device communicates with based on the fraud number IoT device query sub-module.
重点监控号码查询子模块(即其他实施例中第二获取模块430和第二查询模块440)是根据诈骗物联网设备通讯设备查询子模块查询出的物联网设备信息查询这些设备所关联的身份证,并通过身份证信息查询这些身份证名下的所有通信号码作为重点监控号码。The key monitoring number query sub-module (ie, the second acquisition module 430 and the second query module 440 in other embodiments) queries the ID cards associated with these devices based on the IoT device information queried by the fraudulent IoT device communication device query sub-module. , and use the ID card information to query all communication numbers under the names of these ID cards as key monitoring numbers.
第二部分:诈骗号码识别模块(即其他实施例中识别模块450),根据对重点监控号码的话单行为分析和发送内容的诈骗内容匹配来综合判定是否为诈骗号码,其中,The second part: the fraud number identification module (i.e., the identification module 450 in other embodiments), comprehensively determines whether it is a fraud number based on the analysis of the bill behavior of the key monitored number and the matching of the fraud content of the sent content, where,
诈骗行为判断子模块(即其他实施例中频次判断模块)用于根据对重点监控号码的话单行为,包括发送个人消息条数、接收的不同号码数、发送相同消息内容条数来综合判定是否命中疑似诈骗行为。诈骗内容匹配子模块(即其他实施中内容判断模块)用于识别重点监控号码发送的消息内容是否匹配上系统预设的诈骗内容。其中:The fraud behavior judgment sub-module (that is, the frequency judgment module in other embodiments) is used to comprehensively determine whether there is a hit based on the call bill behavior of key monitored numbers, including the number of personal messages sent, the number of different numbers received, and the number of messages with the same content sent. Suspected fraud. The fraud content matching sub-module (i.e. other content judgment modules in implementation) is used to identify whether the content of messages sent by key monitoring numbers matches the fraud content preset by the system. in:
消息类型识别子模型用于识别重点监控号码发送的消息类型为文本、图片、视频、音频中任意一种。The message type identification sub-model is used to identify the message type sent by key monitoring numbers as any one of text, picture, video, and audio.
文本消息判断子模块用于对文本内容进行关键字识别。The text message judgment sub-module is used to identify keywords in text content.
图片消息判断子模块用于对图片内容进行光学字符识别和图片样例库比对。The picture message judgment sub-module is used to perform optical character recognition and picture sample library comparison on the picture content.
音频消息判断子模块用于对音频内容首先进行文本转换。The audio message judgment sub-module is used to first convert the audio content into text.
视频消息判断子模块用于对视频内容进行按一定时间间隔抽帧,对抽帧的图片按照图片消息进行识别。The video message judgment sub-module is used to extract frames from the video content at certain time intervals, and identify the extracted frames according to the picture message.
内容综合判定子模块用于根据规则对不同的消息类型进行是否匹配上系统预设的诈骗内容的匹配结果。The content comprehensive determination sub-module is used to determine whether different message types match the system's preset fraudulent content based on rules.
诈骗号码判断子模块用于根据诈骗号码的判定规则给出号码是否为诈骗号码的判定结果,其中:The fraud number determination sub-module is used to determine whether a number is a fraud number based on the fraud number determination rules, where:
判断规则设置子模块用于对发送个人消息条数、接收的不同号码数、发送相同消息内容条数的阈值进行设置。The judgment rule setting sub-module is used to set the thresholds for the number of personal messages sent, the number of different numbers received, and the number of messages with the same content sent.
诈骗号码结果判断子模块用于根据诈骗行为判断子模块和诈骗内容匹配子模块输出的结果综合判定出是否为诈骗号码。The fraud number result determination sub-module is used to comprehensively determine whether the number is a fraud number based on the results output by the fraud behavior determination sub-module and the fraud content matching sub-module.
第三部分:数据存储模块,用于存储诈骗号码判断所需要的诈骗号码库、身份信息库、设备信息库、话单库和规则库。The third part: the data storage module, which is used to store the fraud number database, identity information database, equipment information database, bill database and rule database required for fraud number judgment.
本申请实施例公开的一种基于5G消息的目标号码识别装置,采用本目标号码识别装置进行目标号码识别(例如诈骗号码),一方面可有效提升目标号码的识别率,另一方面也降低只通过分析业务链(例如诈骗业务链)中的某环节的误拦。通过本实施例,可以有效地检索出同一团伙使用的目标号码,大大缩小了号码监控的范围,提高了基于5G消息的目标号码的检测效率和准确性。The embodiment of this application discloses a target number identification device based on 5G messages. The target number identification device is used to identify target numbers (such as fraud numbers). On the one hand, it can effectively improve the recognition rate of the target number, and on the other hand, it can also reduce the number of targets. By analyzing the misinterpretation of a certain link in the business chain (such as the fraud business chain). Through this embodiment, target numbers used by the same gang can be effectively retrieved, which greatly reduces the scope of number monitoring and improves the detection efficiency and accuracy of target numbers based on 5G messages.
本实施例提供的识别装置,也可以是电子设备中的部件,例如集成电路或芯片。该电子设备可以是终端,也可以为除终端之外的其他设备。示例性的,电子设备可以为手机、平板电脑、笔记本电脑、掌上电脑、车载电子设备、移动上网装置(Mobile InternetDevice,MID)、增强现实(augmented reality,AR)/虚拟现实(virtual reality,VR)设备、机器人、可穿戴设备、超级移动个人计算机(ultra-mobile personal computer,UMPC)、上网本或者个人数字助理(personal digital assistant,PDA)等,还可以为服务器、网络附属存储器(Network Attached Storage,NAS)、个人计算机(personal computer,PC)、电视机(television,TV)、柜员机或者自助机等,本申请实施例不作具体限定。The identification device provided in this embodiment may also be a component in an electronic device, such as an integrated circuit or chip. The electronic device may be a terminal or other devices other than the terminal. For example, the electronic device can be a mobile phone, a tablet computer, a notebook computer, a handheld computer, a vehicle-mounted electronic device, a mobile internet device (Mobile Internet Device, MID), or augmented reality (AR)/virtual reality (VR). Devices, robots, wearable devices, ultra-mobile personal computers (UMPC), netbooks or personal digital assistants (PDA), etc., can also be servers, Network Attached Storage (NAS), etc. ), personal computer (PC), television (TV), teller machine or self-service machine, etc., the embodiments of this application are not specifically limited.
本申请实施例中的基于5G消息的目标号码识别装置可以为具有操作系统的装置。该操作系统可以为安卓(Android)操作系统,可以为ios操作系统,还可以为其他可能的操作系统,本申请实施例不作具体限定。The target number identification device based on 5G messages in the embodiment of the present application may be a device with an operating system. The operating system can be an Android operating system, an ios operating system, or other possible operating systems, which are not specifically limited in the embodiments of this application.
本申请实施例提供的装置能够实现图1至图5的方法实施例实现的各个过程,为避免重复,这里不再赘述。The device provided by the embodiments of the present application can implement each process implemented by the method embodiments in Figures 1 to 5. To avoid repetition, details will not be described here.
可选地,如图8所示,本申请实施例还提供了一种电子设备800,包括处理器801和存储器802,存储器802上存储有可在所述处理器801上运行的程序或指令,该程序或指令被处理器801执行时实现上述图1至图5所述方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。Optionally, as shown in Figure 8, this embodiment of the present application also provides an electronic device 800, including a processor 801 and a memory 802. The memory 802 stores programs or instructions that can be run on the processor 801. When the program or instruction is executed by the processor 801, each step of the method embodiment described in FIG. 1 to FIG. 5 is implemented, and the same technical effect can be achieved. To avoid repetition, the details will not be described here.
可选地,本申请实施例还提供一种存储介质,包括处理器801和存储器802,存储器802上存储有可在所述处理器801上运行的程序或指令,该程序或指令被处理器801执行时实现上述图1至图5所述方法实施例的各个步骤,且能达到相同的技术效果,为避免重复,这里不再赘述。Optionally, this embodiment of the present application also provides a storage medium, including a processor 801 and a memory 802. The memory 802 stores programs or instructions that can be run on the processor 801. The program or instructions are executed by the processor 801. During execution, each step of the method embodiment described in Figures 1 to 5 is implemented and the same technical effect can be achieved. To avoid repetition, details will not be described here.
需要说明的是,本申请实施例中的电子设备包括上述所述的移动电子设备和非移动电子设备。It should be noted that the electronic devices in the embodiments of the present application include the above-mentioned mobile electronic devices and non-mobile electronic devices.
图9为实现本申请实施例的一种电子设备的硬件结构示意图。FIG. 9 is a schematic diagram of the hardware structure of an electronic device implementing an embodiment of the present application.
该电子设备900包括但不限于:射频单元901、网络模块902、音频输出单元903 、输入单元904、传感器905、显示单元906、用户输入单元907 、接口单元908、存储器909、以及处理器910等部件。The electronic device 900 includes but is not limited to: radio frequency unit 901, network module 902, audio output unit 903, input unit 904, sensor 905, display unit 906, user input unit 907, interface unit 908, memory 909, processor 910, etc. part.
本领域技术人员可以理解,电子设备900还可以包括给各个部件供电的电源(比如电池),电源可以通过电源管理系统与处理器910逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。图9中示出的电子设备结构并不构成对电子设备的限定,电子设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置,在此不再赘述。Those skilled in the art can understand that the electronic device 900 may also include a power supply (such as a battery) that supplies power to various components. The power supply may be logically connected to the processor 910 through a power management system, thereby managing charging, discharging, and function through the power management system. Consumption management and other functions. The structure of the electronic device shown in Figure 9 does not constitute a limitation on the electronic device. The electronic device may include more or less components than shown in the figure, or combine certain components, or arrange different components, which will not be described again here. .
处理器910,用于执行本申请基于5G消息的目标号码识别方法中对应的功能。The processor 910 is configured to perform corresponding functions in the target number identification method based on 5G messages of this application.
应理解的是,本申请实施例中,输入单元904可以包括图形处理器(GraphicsProcessing Unit,GPU)9041和麦克风9042,图形处理器9041对在视频捕获模式或图像捕获模式中由图像捕获装置(如摄像头)获得的静态图片或视频的图像数据进行处理。显示单元906可包括显示面板9061,可以采用液晶显示器、有机发光二极管等形式来配置显示面板9061。用户输入单元907包括触控面板9071以及其他输入设备9072中的至少一种。触控面板9071,也称为触摸屏。触控面板9071可包括触摸检测装置和触摸控制器两个部分。其他输入设备9072可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆,在此不再赘述。It should be understood that in this embodiment of the present application, the input unit 904 may include a graphics processor (Graphics Processing Unit, GPU) 9041 and a microphone 9042. The graphics processor 9041 is responsible for the image capture device (such as Process the image data of still pictures or videos obtained from the camera). The display unit 906 may include a display panel 9061, which may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 907 includes a touch panel 9071 and at least one of other input devices 9072 . Touch panel 9071, also known as touch screen. The touch panel 9071 may include two parts: a touch detection device and a touch controller. Other input devices 9072 may include but are not limited to physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, and joysticks, which will not be described again here.
存储器909可用于存储软件程序以及各种数据。存储器909可主要包括存储程序或指令的第一存储区和存储数据的第二存储区,其中,第一存储区可存储操作系统、至少一个功能所需的应用程序或指令(比如声音播放功能、图像播放功能等)等,存储数据的第二存储区可以存储用于存储目标号码(例如诈骗号码)判断所需要的目标号码库、身份信息库、设备信息库、话单库和规则库等等。此外,存储器909可以包括易失性存储器或非易失性存储器,或者,存储器909可以包括易失性和非易失性存储器两者。其中,非易失性存储器可以是只读存储器(Read-Only Memory,ROM)、可编程只读存储器(Programmable ROM,PROM)、可擦除可编程只读存储器(Erasable PROM,EPROM)、电可擦除可编程只读存储器(Electrically EPROM,EEPROM)或闪存。易失性存储器可以是随机存取存储器(RandomAccess Memory,RAM),静态随机存取存储器(Static RAM,SRAM)、动态随机存取存储器(Dynamic RAM,DRAM)、同步动态随机存取存储器(Synchronous DRAM,SDRAM)、双倍数据速率同步动态随机存取存储器(Double Data Rate SDRAM,DDRSDRAM)、增强型同步动态随机存取存储器(Enhanced SDRAM,ESDRAM)、同步连接动态随机存取存储器(Synch link DRAM,SLDRAM)和直接内存总线随机存取存储器(Direct Rambus RAM,DRRAM)。本申请实施例中的存储器909包括但不限于这些和任意其它适合类型的存储器。Memory 909 can be used to store software programs as well as various data. The memory 909 may mainly include a first storage area for storing programs or instructions and a second storage area for storing data, wherein the first storage area may store an operating system, an application program or instructions required for at least one function (such as a sound playback function, Image playback function, etc.), etc. The second storage area for storing data can store the target number library, identity information library, equipment information library, call record library, rule library, etc. required for storing target numbers (such as fraud numbers). . Additionally, memory 909 may include volatile memory or nonvolatile memory, or memory 909 may include both volatile and nonvolatile memory. Among them, the non-volatile memory can be read-only memory (Read-Only Memory, ROM), programmable read-only memory (Programmable ROM, PROM), erasable programmable read-only memory (Erasable PROM, EPROM), electrically removable memory. Erase programmable read-only memory (Electrically EPROM, EEPROM) or flash memory. Volatile memory can be random access memory (RandomAccess Memory, RAM), static random access memory (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), synchronous dynamic random access memory (Synchronous DRAM) , SDRAM), double data rate synchronous dynamic random access memory (Double Data Rate SDRAM, DDRSDRAM), enhanced synchronous dynamic random access memory (Enhanced SDRAM, ESDRAM), synchronous link dynamic random access memory (Synch link DRAM, SLDRAM) and Direct Rambus RAM (DRRAM). Memory 909 in embodiments of the present application includes, but is not limited to, these and any other suitable types of memory.
处理器910可包括一个或多个处理单元;可选的,处理器910集成应用处理器和调制解调处理器,其中,应用处理器主要处理涉及操作系统、用户界面和应用程序等的操作,调制解调处理器主要处理无线通信信号,如基带处理器。可以理解的是,上述调制解调处理器也可以不集成到处理器910中。The processor 910 may include one or more processing units; optionally, the processor 910 integrates an application processor and a modem processor, where the application processor mainly handles operations related to the operating system, user interface, application programs, etc., Modem processors mainly process wireless communication signals, such as baseband processors. It can be understood that the above modem processor may not be integrated into the processor 910.
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者装置不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者装置所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者装置中还存在另外的相同要素。此外,需要指出的是,本申请实施方式中的方法和装置的范围不限按示出或讨论的顺序来执行功能,还可包括根据所涉及的功能按基本同时的方式或按相反的顺序来执行功能,例如,可以按不同于所描述的次序来执行所描述的方法,并且还可以添加、省去、或组合各种步骤。另外,参照某些示例所描述的特征可在其他示例中被组合。It should be noted that, in this document, the terms "comprising", "comprises" or any other variations thereof are intended to cover a non-exclusive inclusion, such that a process, method, article or device that includes a series of elements not only includes those elements, It also includes other elements not expressly listed or inherent in the process, method, article or apparatus. Without further limitation, an element defined by the statement "comprises a..." does not exclude the presence of additional identical elements in a process, method, article or apparatus that includes that element. In addition, it should be pointed out that the scope of the methods and devices in the embodiments of the present application is not limited to performing functions in the order shown or discussed, but may also include performing functions in a substantially simultaneous manner or in reverse order according to the functions involved. Functions may be performed, for example, the methods described may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以计算机软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端(可以是手机,计算机,服务器,或者网络设备等)执行本申请各个实施例所述的方法。Through the above description of the embodiments, those skilled in the art can clearly understand that the methods of the above embodiments can be implemented by means of software plus the necessary general hardware platform. Of course, it can also be implemented by hardware, but in many cases the former is better. implementation. Based on this understanding, the technical solution of the present application can be embodied in the form of a computer software product that is essentially or contributes to the existing technology. The computer software product is stored in a storage medium (such as ROM/RAM, disk , CD), including several instructions to cause a terminal (which can be a mobile phone, computer, server, or network device, etc.) to execute the methods described in various embodiments of this application.
上面结合附图对本申请的实施例进行了描述,但是本申请并不局限于上述的具体实施方式,上述的具体实施方式仅仅是示意性的,而不是限制性的,本领域的普通技术人员在本申请的启示下,在不脱离本申请宗旨和权利要求所保护的范围情况下,还可做出很多形式,均属于本申请的保护之内。The embodiments of the present application have been described above in conjunction with the accompanying drawings. However, the present application is not limited to the above-mentioned specific implementations. The above-mentioned specific implementations are only illustrative and not restrictive. Those of ordinary skill in the art will Inspired by this application, many forms can be made without departing from the purpose of this application and the scope protected by the claims, all of which fall within the protection of this application.
Claims (9)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210534517.3A CN114980116B (en) | 2022-05-17 | 2022-05-17 | Target number identification method and electronic equipment based on 5G message |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210534517.3A CN114980116B (en) | 2022-05-17 | 2022-05-17 | Target number identification method and electronic equipment based on 5G message |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114980116A CN114980116A (en) | 2022-08-30 |
CN114980116B true CN114980116B (en) | 2023-09-19 |
Family
ID=82982779
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210534517.3A Active CN114980116B (en) | 2022-05-17 | 2022-05-17 | Target number identification method and electronic equipment based on 5G message |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114980116B (en) |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102469460A (en) * | 2010-11-08 | 2012-05-23 | 中国移动通信集团广东有限公司 | A method and device for identifying illegal international mobile equipment identification codes |
CN103067896A (en) * | 2013-01-17 | 2013-04-24 | 中国联合网络通信集团有限公司 | Junk short message filtering method and device |
CN106170046A (en) * | 2016-09-23 | 2016-11-30 | 陕西尚品信息科技有限公司 | A kind of event based on mobile device triggers implicit expression auth method |
CN106657689A (en) * | 2015-11-04 | 2017-05-10 | 中国移动通信集团公司 | Method for preventing and controlling international fraud call and apparatus thereof |
CN106791230A (en) * | 2015-11-25 | 2017-05-31 | 小米科技有限责任公司 | Telephone number recognition methods and device |
CN107872772A (en) * | 2017-12-19 | 2018-04-03 | 北京奇虎科技有限公司 | Method and device for detecting fraudulent short messages |
US10178223B1 (en) * | 2017-04-30 | 2019-01-08 | Symantec Corporation | Fraudulent subscriber identity module (SIM) swap detection |
CN110139280A (en) * | 2019-07-02 | 2019-08-16 | 中国联合网络通信集团有限公司 | Swindle detection method, device and the storage medium of number |
CN110493477A (en) * | 2019-09-12 | 2019-11-22 | 中国联合网络通信集团有限公司 | Swindle number identification method, device, equipment and storage medium |
CN110536302A (en) * | 2018-05-25 | 2019-12-03 | 中国移动通信集团广东有限公司 | Telecommunication fraud based reminding method and device |
CN110944329A (en) * | 2019-11-28 | 2020-03-31 | 楚天龙股份有限公司 | Information processing method, terminal and server |
CN111147668A (en) * | 2019-12-27 | 2020-05-12 | 杭州安恒信息技术股份有限公司 | Anti-telecommunication fraud identification method based on IMEI and communication behaviors |
CN113099443A (en) * | 2019-12-23 | 2021-07-09 | 阿里巴巴集团控股有限公司 | Equipment authentication method, device, equipment and system |
CN113543134A (en) * | 2021-09-14 | 2021-10-22 | 广州讯鸿网络技术有限公司 | Video verification code authentication system, method and device based on 5G message |
CN113596844A (en) * | 2021-07-29 | 2021-11-02 | 恒安嘉新(北京)科技股份公司 | Early warning method, device, medium and electronic equipment based on data information |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9832646B2 (en) * | 2013-09-13 | 2017-11-28 | Network Kinetix, LLC | System and method for an automated system for continuous observation, audit and control of user activities as they occur within a mobile network |
-
2022
- 2022-05-17 CN CN202210534517.3A patent/CN114980116B/en active Active
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102469460A (en) * | 2010-11-08 | 2012-05-23 | 中国移动通信集团广东有限公司 | A method and device for identifying illegal international mobile equipment identification codes |
CN103067896A (en) * | 2013-01-17 | 2013-04-24 | 中国联合网络通信集团有限公司 | Junk short message filtering method and device |
CN106657689A (en) * | 2015-11-04 | 2017-05-10 | 中国移动通信集团公司 | Method for preventing and controlling international fraud call and apparatus thereof |
CN106791230A (en) * | 2015-11-25 | 2017-05-31 | 小米科技有限责任公司 | Telephone number recognition methods and device |
CN106170046A (en) * | 2016-09-23 | 2016-11-30 | 陕西尚品信息科技有限公司 | A kind of event based on mobile device triggers implicit expression auth method |
US10178223B1 (en) * | 2017-04-30 | 2019-01-08 | Symantec Corporation | Fraudulent subscriber identity module (SIM) swap detection |
CN107872772A (en) * | 2017-12-19 | 2018-04-03 | 北京奇虎科技有限公司 | Method and device for detecting fraudulent short messages |
CN110536302A (en) * | 2018-05-25 | 2019-12-03 | 中国移动通信集团广东有限公司 | Telecommunication fraud based reminding method and device |
CN110139280A (en) * | 2019-07-02 | 2019-08-16 | 中国联合网络通信集团有限公司 | Swindle detection method, device and the storage medium of number |
CN110493477A (en) * | 2019-09-12 | 2019-11-22 | 中国联合网络通信集团有限公司 | Swindle number identification method, device, equipment and storage medium |
CN110944329A (en) * | 2019-11-28 | 2020-03-31 | 楚天龙股份有限公司 | Information processing method, terminal and server |
CN113099443A (en) * | 2019-12-23 | 2021-07-09 | 阿里巴巴集团控股有限公司 | Equipment authentication method, device, equipment and system |
CN111147668A (en) * | 2019-12-27 | 2020-05-12 | 杭州安恒信息技术股份有限公司 | Anti-telecommunication fraud identification method based on IMEI and communication behaviors |
CN113596844A (en) * | 2021-07-29 | 2021-11-02 | 恒安嘉新(北京)科技股份公司 | Early warning method, device, medium and electronic equipment based on data information |
CN113543134A (en) * | 2021-09-14 | 2021-10-22 | 广州讯鸿网络技术有限公司 | Video verification code authentication system, method and device based on 5G message |
Non-Patent Citations (3)
Title |
---|
Fraud detection in telecommunication: A rough fuzzy set based approach;Wei Xu;《2008 International Conference on Machine Learning and Cybernetics》;全文 * |
一口通办:5G消息媒体场景探究;于智源;宋笑笑;;中国传媒科技(第09期);全文 * |
手机账户安全巧应对;王奇;;家庭科技(第07期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114980116A (en) | 2022-08-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110399925B (en) | Account risk identification method, device and storage medium | |
CN105704005B (en) | Malicious user reporting method and device, and reported information processing method and device | |
US9763100B2 (en) | Instant messaging message processing method and device and storage medium | |
CN110333981B (en) | APP abnormal information feedback method and device and electronic equipment | |
CN107229638A (en) | A kind of text message processing method and device | |
CN106713579B (en) | Telephone number identification method and device | |
US11080427B2 (en) | Method and apparatus for detecting label data leakage channel | |
CN112039874B (en) | Malicious mail identification method and device | |
CN115150261B (en) | Alarm analysis method, device, electronic equipment and storage medium | |
CN103488947A (en) | Method and device for identifying instant messaging client-side account number stealing Trojan horse program | |
CN112784269B (en) | Malware detection method, device and computer storage medium | |
CN107609402B (en) | Security vulnerability processing method and device and storage medium | |
CN116707965A (en) | Threat detection method and device, storage medium and electronic equipment | |
CN112307464A (en) | Fraud identification method and device and electronic equipment | |
CN114760119B (en) | Phishing mail attack detection method, device and system | |
CN111259216B (en) | Information identification method, device and equipment | |
CN105740709B (en) | A kind of Android malware detection method based on permission combination | |
CN115544558A (en) | Sensitive information detection method and device, computer equipment and storage medium | |
US11275833B2 (en) | System and method for detecting a malicious file using image analysis prior to execution of the file | |
CN114980116B (en) | Target number identification method and electronic equipment based on 5G message | |
CN111027065B (en) | Leucavirus identification method and device, electronic equipment and storage medium | |
KR102408489B1 (en) | The method for controling security based on internet protocol and system thereof | |
CN114663100A (en) | Transaction data processing method and device and terminal equipment | |
CN115473705A (en) | Method and device for generating device fingerprint and processing request, electronic device and medium | |
CN109379361B (en) | Address label determination method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |