CN114980116B - Target number identification method based on 5G message and electronic equipment - Google Patents

Target number identification method based on 5G message and electronic equipment Download PDF

Info

Publication number
CN114980116B
CN114980116B CN202210534517.3A CN202210534517A CN114980116B CN 114980116 B CN114980116 B CN 114980116B CN 202210534517 A CN202210534517 A CN 202210534517A CN 114980116 B CN114980116 B CN 114980116B
Authority
CN
China
Prior art keywords
internet
message
target
identity information
communication number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210534517.3A
Other languages
Chinese (zh)
Other versions
CN114980116A (en
Inventor
戴晶晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Internet Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202210534517.3A priority Critical patent/CN114980116B/en
Publication of CN114980116A publication Critical patent/CN114980116A/en
Application granted granted Critical
Publication of CN114980116B publication Critical patent/CN114980116B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/128Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y10/00Economic sectors
    • G16Y10/75Information technology; Communication
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/10Detection; Monitoring
    • GPHYSICS
    • G16INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR SPECIFIC APPLICATION FIELDS
    • G16YINFORMATION AND COMMUNICATION TECHNOLOGY SPECIALLY ADAPTED FOR THE INTERNET OF THINGS [IoT]
    • G16Y40/00IoT characterised by the purpose of the information processing
    • G16Y40/50Safety; Security of things, users, data or systems
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses a target number identification method based on a 5G message and electronic equipment, and belongs to the field of communication information safety. The identification method comprises the following steps: acquiring first identity information corresponding to the marked target number; inquiring first Internet of things equipment associated with the first identity information; acquiring second identity information corresponding to the first Internet of things equipment; inquiring at least one communication number corresponding to the second identity information; and identifying the communication number meeting the preset condition in the at least one communication number as a target number.

Description

Target number identification method based on 5G message and electronic equipment
Technical Field
The application belongs to the field of communication information security, and particularly relates to a target number identification method based on a 5G message and electronic equipment.
Background
With the rapid development of information technology, operators upgrade the basic communication capability of short messages to 5G messages. Compared with short messages, sending 5G messages between individuals, between individuals and enterprise (industry clients) service ends, and between individuals (or industry clients) and Internet of things equipment has multimedia capability, and not only has text, but also can send information such as pictures, audio, video and the like.
However, while the technology is being developed, the manner of telecommunication phishing is also changing, and in the related art, by detecting the content information of the transmitted 5G message, etc., illegal numbers such as fraud numbers are identified, and the detection efficiency may be low due to the large number of communication numbers and the large number of transmitted 5G messages.
Disclosure of Invention
The embodiment of the application aims to provide a target number identification method based on a 5G message and electronic equipment, which can solve the problem of low detection efficiency of the target number based on the 5G message.
In a first aspect, an embodiment of the present application provides a method for identifying a target number based on a 5G message, where the method includes: acquiring first identity information corresponding to the marked target number; inquiring first Internet of things equipment associated with the first identity information; acquiring second identity information corresponding to the first Internet of things equipment;
inquiring at least one communication number corresponding to the second identity information; and identifying the communication number meeting the preset condition in the at least one communication number as a target number.
In a second aspect, an embodiment of the present application provides a target number identifying device based on a 5G message, including: a first acquisition module: the method comprises the steps of obtaining first identity information corresponding to a marked target number; the first query module is used for querying the first Internet of things equipment associated with the first identity information; the second acquisition module is used for acquiring second identity information corresponding to the first Internet of things equipment; the second inquiry module is used for inquiring at least one communication number corresponding to the second identity information; and the identification module is used for identifying the communication number meeting the preset condition in the at least one communication number as a target number.
In a third aspect, an embodiment of the present application provides an electronic device comprising a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor, implement the steps of the method as described in the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium having stored thereon a program or instructions which when executed by a processor perform the steps of the method according to the first aspect.
In the embodiment of the application, the first internet of things equipment associated with the first identity information is queried by acquiring the first identity information corresponding to the marked target number, then the second identity information corresponding to the first internet of things equipment is acquired, at least one communication number corresponding to the second identity information is used as a monitoring number, and the communication number is identified as the target number under the condition that the communication number of the at least one communication number meets the preset condition, so that the detection efficiency of the target number based on the 5G message is improved.
Drawings
Fig. 1 is a schematic diagram of a target number identification method based on a 5G message according to an embodiment of the present application;
Fig. 2 is a schematic diagram of a target number identification method based on a 5G message according to another embodiment of the present application;
FIG. 3 is a diagram illustrating how often the 5G message is sent beyond a predetermined frequency in accordance with another embodiment of the present application;
FIG. 4 is a diagram of another embodiment of the present application for transmitting content including preset content;
FIG. 5 is a diagram showing a judgment of whether a preset condition is met according to another embodiment of the present application;
FIG. 6 is a schematic diagram of a target number identification apparatus based on a 5G message according to one embodiment of the present application;
fig. 7 is a schematic diagram of a destination number identification apparatus based on a 5G message according to another embodiment of the present application;
FIG. 8 is a schematic diagram of an electronic device according to another embodiment of the application;
fig. 9 is a schematic diagram of a hardware structure of an electronic device implementing an embodiment of the present application.
Detailed Description
The technical solutions of the embodiments of the present application will be clearly described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which are obtained by a person skilled in the art based on the embodiments of the present application, fall within the scope of protection of the present application.
The terms first, second and the like in the description and in the claims, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged, as appropriate, such that embodiments of the present application may be implemented in sequences other than those illustrated or described herein, and that the objects identified by "first," "second," etc. are generally of a type, and are not limited to the number of objects, such as the first object may be one or more. Furthermore, in the description and claims, "and/or" means at least one of the connected objects, and the character "/", generally means that the associated object is an "or" relationship.
The method for identifying the target number based on the 5G message provided by the embodiment of the application is described in detail below through specific embodiments and application scenes thereof with reference to the accompanying drawings.
The identification of 5G messages with fraud suspicions and the like is generally carried out by related means such as ticket behavior analysis and content keyword identification. The ticket is an analysis technology, and the detection and identification of fraud events are realized by analyzing signaling tickets generated when users send messages and counting the rules of the message sending behaviors in specific scenes. For example, the limit set is defined as Q pieces of content per hour, and when the content of the short message transmitted by the communication number reaches Q pieces, the suspected fraud short message or the fraud short message is determined. The content keyword recognition technology mainly recognizes the content of the short message, and when the transmitted short message is detected to contain keywords or keyword combinations set by the system, the suspected fraud short message or the fraud short message is judged.
The fraud message judgment methods have certain effects, but have limitations, and mainly comprise the following steps: firstly, the judgment result may have judgment errors, such as confusing marketing popularization and fraud, and secondly, the number of detectable fraud events is limited by only analyzing a certain link (such as sending behavior or content identification) in a (fraud) business chain.
The embodiment of the application provides a target number identification method based on a 5G message, as shown in fig. 1, obviously, the embodiment can be used for identifying fraud numbers based on the 5G message. Fig. 1 is a schematic diagram of a 5G message-based target number identification method according to an embodiment of the present application, including the following steps:
s110: first identity information corresponding to the marked target number is obtained.
In some embodiments, it may be desirable to first obtain the tagged target number, which may be obtained in a variety of conventional ways known, such as from a 5G message pool. The marked destination number may be a destination number marked by the user or a destination number detected by the detection means. Since each number (e.g., target number) has corresponding identity information (e.g., identification card information), the identity information (first identity information) corresponding to the marked target number can be acquired.
In the embodiment of the application, the target number can include, but is not limited to, a fraud number or a harassment number, etc.
In an embodiment of the present application, the destination number includes, but is not limited to, a mobile phone number.
S120: and inquiring the first Internet of things equipment associated with the first identity information.
In some embodiments, because the identity information (for example, the number uses personal identity information, including the number uses personal identity card information) is associated with the internet of things device, according to the association relationship between the identity information and the internet of things device, the internet of things device (first internet of things device) associated with the first identity information can be queried; the internet of things device queried according to the embodiment may be one or a set formed by a plurality of internet of things devices.
S130: and acquiring second identity information corresponding to the first Internet of things equipment.
In some embodiments, according to the internet of things device queried in step S120, the identity information (the second identity information) corresponding to the first internet of things device may be obtained according to the association relationship between the identity information and the internet of things device.
In some embodiments, since the first internet of things device queried in step S120 may be a set formed by one or more internet of things devices, when obtaining the second identity information corresponding to the first internet of things device, it is not necessary to query all the second identity information corresponding to the internet of things device; according to actual requirements (for example, the result of the query is more comprehensive or the result of the query is more accurate, etc.), the second identity information corresponding to a part of the internet of things equipment can be queried selectively or according to a certain judgment rule. Schematically, 10 pieces of internet of things equipment are obtained in step S120, and 6 pieces of internet of things equipment with key monitoring can be selected for querying corresponding second identity information. It is obvious that the listing of the number of the devices of the internet of things is only one of specific cases for explaining the present embodiment, and does not limit the content of the present embodiment in any way.
In some embodiments, a portion of all internet of things devices may be selected by a certain rule or condition. For example, a 5G message internet of things communication ticket of a number user using internet of things equipment in a detection time is obtained, all sender internet of things equipment and receiver internet of things equipment corresponding to the communication ticket in the detection time are analyzed, the internet of things equipment is selected internet of things equipment (second internet of things equipment), the second internet of things equipment can be used as the key monitoring internet of things equipment, and further second identity information corresponding to the second internet of things equipment is obtained.
S140: and inquiring at least one communication number corresponding to the second identity information.
In some embodiments, the corresponding communication number is queried according to the second identity information (for example, the identity information acquired by all the internet of things devices or a part of the identity information acquired by the internet of things devices) acquired in step S130, and at least one of the queried communication numbers is queried.
Wherein the communication number includes, but is not limited to, a cell phone number.
S150: and identifying the communication number meeting the preset condition in the at least one communication number as a target number.
In some embodiments, at least one communication number is queried, where there may be a target number or there may be a non-target number, so that screening according to a preset condition is required, and only a communication number meeting the preset condition is identified as the target number.
According to the target number identification method based on the 5G message, through obtaining the first identity information corresponding to the marked target number, inquiring the first Internet of things equipment related to the first identity information, obtaining the second identity information corresponding to the first Internet of things equipment, inquiring at least one communication number corresponding to the second identity information, and further identifying the communication number meeting the preset condition in the at least one communication number as the target number, on one hand, the identification rate of the target number can be effectively improved, and on the other hand, the false blocking of a certain link in a service chain (such as a fraud service chain) through analysis is reduced. By the embodiment, the target number used by the same party (such as fraud party) can be effectively searched, the range of number monitoring is greatly reduced, and the detection efficiency and accuracy of the target number based on the 5G message are improved.
As another embodiment, the present application provides a target number identification method based on a 5G message, as shown in fig. 2, where the embodiment is exemplified by identifying fraud numbers, and is certainly applicable to identifying other types of target numbers. Fig. 2 is a schematic diagram of a target number identification method based on a 5G message according to another embodiment of the present application, including the following steps:
s210: the marked fraud numbers are obtained from the 5G message fraud pool. The marked fraud number may be a fraud number marked by the user or a fraud number detected by the detection device.
S220: according to the registration information of the fraud numbers in the operators, the identification card information of the marked fraud numbers is inquired and used as the identification information (namely the first identification information) of the fraud persons.
S230: the internet of things device(s) associated under the fraud identity card are queried as the internet of things device (i.e. the first internet of things device described above) used by the fraud.
S240: and acquiring a 5G message Internet of things communication ticket of using Internet of things equipment by a fraud person in a detection time period, and analyzing all corresponding sender Internet of things equipment and receiver Internet of things equipment sets in the detection time period, wherein the Internet of things equipment sets are used as important monitoring Internet of things equipment (namely, the second Internet of things equipment).
S250: and acquiring identity card information registered by the key monitoring Internet of things equipment (namely second Internet of things equipment) in an operator as key monitoring identity information (namely second identity information).
S260: and inquiring all communication numbers under the key monitoring identity information to serve as the communication numbers to be monitored.
S270: and marking the communication numbers with the frequency of sending the 5G message exceeding the preset frequency or the content including the preset content in the communication numbers to be monitored as fraud numbers.
In this embodiment, an implementation manner of the present application is described taking an identity card as an example of identity information, through the identity card information registered by a marked target number (fraud number) in an operator, an associated internet of things device is queried, the key monitoring internet of things device is determined, the identity information corresponding to the key monitoring internet of things device is obtained, the relevant communication number is queried, and finally the fraud number is identified according to a preset condition. According to the method and the device for detecting the fraud numbers, the identification rate of the fraud numbers is effectively improved, the fraud numbers used by the same fraud party are effectively searched, the monitoring range of the fraud numbers is greatly reduced, and the detection efficiency and accuracy of the fraud numbers based on the 5G message are improved.
In some embodiments, fig. 3 is a schematic flow chart of another embodiment of the present application, which uses a frequency of sending 5G messages exceeding a preset frequency as a preset condition to determine whether a communication number in the at least one communication number is a target number.
The analysis of the frequency of sending 5G information by the communication number is essentially an analysis of the behavior of a dialog sheet, as shown in fig. 3, and may include the steps of:
s310: and acquiring a 5G message ticket in the detection time corresponding to the target communication number.
And acquiring a 5G message ticket in a detection time corresponding to a target communication number, wherein the target communication number is any one of the at least one communication number.
At least one communication number corresponding to the second identity information is queried, wherein the communication number comprises a target number and a non-target number; and extracting the 5G personal message ticket of the communication number aiming at one communication number in the inquired communication numbers. Other communication numbers extract 5G personal message tickets in the same way.
In some embodiments, a 5G personal message ticket within a certain detection time may be selected according to actual needs; for example, the certain detection time may be determined empirically, or may be determined according to a certain rule.
S320: obtaining a target number according to the 5G message ticket, wherein the target number comprises at least one of the following: the number of personal messages sent, the number of different numbers received and the number of content pieces of the same message sent.
In some embodiments, a 5G message ticket in a detection time corresponding to a target communication number is obtained, where the target communication number is any one of the at least one communication number; obtaining a target number according to the 5G message ticket, wherein the target number comprises at least one of the following: the number of personal messages sent, the number of different numbers received and the number of content pieces of the same message sent.
Of course, the number of targets in the present embodiment (the number of personal message pieces, the number of different numbers received, and the number of pieces of content of the same message transmitted) is one of a plurality of targets (not limited to the targets listed in the present embodiment) for determining whether the 5G message frequency exceeds the preset frequency, and those skilled in the art will recognize that there are other single or combined targets according to the actual situation.
S330: and under the condition that whether the target number exceeds the preset frequency is determined, determining the target communication number as a target number.
Determining whether the target number exceeds the preset frequency, namely judging whether at least one of the number of personal messages, the number of received different numbers and the number of content pieces of the same message to be sent meets a preset threshold condition; and under the condition that whether the target number exceeds the preset frequency is determined, determining the target communication number as a target number.
In some embodiments, to avoid misjudgment, the target communication number may be determined to be the target number according to whether the number of personal messages, the number of different numbers received and the number of content pieces of the same message sent all meet the preset threshold condition, if the number of personal messages, the number of different numbers and the number of content pieces of the same message sent all meet the preset threshold condition, and if at least one item does not meet the preset threshold condition, the target communication number is determined not to be the target number. For example, the preset threshold condition is set as follows: when the number of the personal information sent in the counted 5G message bill is 12, the number of the received different numbers is 12 and the number of the content of the sent same message is 12, the preset threshold condition is met, so that the target communication number can be identified as the target number; when the number of personal message pieces sent in the counted 5G message ticket is 8, the number of different numbers received is 12, and the number of content pieces of the same message sent is 12, a condition that the preset threshold value is not met exists, so that the target communication number is identified as a non-target number. It should be apparent that the listing of the number of personal messages, the number of different numbers received, and the number of messages sent to the same message content is merely illustrative of one specific case of the present embodiment, and is not intended to limit the content of the present embodiment in any way.
In the embodiment of the application, when the communication number which accords with the frequency of sending the 5G message and exceeds the preset frequency in the at least one communication number is identified as the target number, whether the monitored communication number is the target number is comprehensively judged by analyzing the number of personal 5G message sent by the monitored communication number, the number of different received numbers and the number of content of the sent same message in a certain time period, thereby further improving the detection efficiency and accuracy of the target number based on the 5G message and reducing the misjudgment of the non-target number.
Fig. 4 is a flow chart of determining whether a communication number in the at least one communication number is a destination number according to another embodiment of the present application, where the transmission content includes a preset content as a preset condition.
Whether the transmission content of the communication number contains preset content or not is judged as shown in fig. 4. Generally, the sending content can be text message, audio message, picture message or video message, etc., and the preset content is preset keywords or keyword combinations; executing different treatments according to different message types, and identifying the communication number meeting the preset condition in the at least one communication number as a target number, wherein the treatment comprises one of the following steps:
S420: performing keyword recognition on a text message taking a target communication number as a sender, and recognizing the target communication number as a target number under the condition that the text message comprises preset content, wherein the target communication number is any one of the at least one communication number;
s430: performing text conversion on the audio message taking the target communication number as a sender, performing keyword recognition on the content after the text conversion, and recognizing the target communication number as a target number when the audio message is determined to comprise preset content;
s440: performing optical character recognition and picture sample library comparison on a picture message taking the target communication number as a sender, and recognizing the target communication number as a target number under the condition that the picture message comprises preset content;
s450: and according to a certain time interval, extracting frames of the video message taking the target communication number as a sender, performing optical character recognition and picture sample library comparison on the extracted frames, and identifying the target communication number as the target number under the condition that the extracted frames are determined to contain preset contents.
In some embodiments, for the above four types of message identification, in addition to the case that the type of message transmitted by the sender satisfies one of them, it may be that the information transmitted by the sender needs to satisfy two or more types of messages simultaneously. For example, the preset contents may be set to have both text information and video information, audio information and picture information, or both the above four types of information.
In some embodiments, fig. 5 shows a schematic diagram of determining whether a preset condition is met according to another embodiment of the present application.
In order to more strictly and accurately judge whether the searched at least one communication number is the target number, the target communication number can be identified as the target number when the 5G information sent by the target communication number simultaneously accords with the frequency of sending the 5G information to exceed the preset frequency and the sending content contains the preset content. As shown in fig. 5, it includes the steps of:
s510: and acquiring the 5G personal message ticket of the key monitoring communication number in the detection time.
S520: and counting the number of personal information transmitted by the key monitoring communication number, the number of different received numbers and the number of content of the same transmitted information in the detection time.
S530: whether the threshold is hit is determined according to the behavior of the important monitoring communication number (i.e., the frequency of sending 5G messages), if hit is performed in step S540, if not hit is performed in step S560.
The judgment rule of the communication behavior is that the number of the sent personal messages is more than or equal to L, the number of the received different numbers is more than or equal to M, the number of the sent same message content is more than or equal to N, and the numerical value of L, M, N is determined according to actual conditions.
S540: and under the condition that the frequency of sending the 5G message exceeds the preset frequency, identifying the sending content of the heavy point monitoring communication number, and judging whether the sending content hits the preset content of the system or not, if yes, executing the step S550, and if not, executing the step S560.
S550: the destination communication number is determined (identified) as a destination number.
S560: the flow ends.
In the embodiment of the application, when the communication number meeting the preset condition in the at least one communication number is identified as the target number, not only is whether the frequency of sending the 5G message by the communication number exceeds the preset frequency, but also judgment is carried out from the sending content, namely, according to preset keywords or keyword combinations, different treatments are carried out in combination with different message types to comprehensively judge whether the monitored communication number is the target number, thereby further improving the detection efficiency and accuracy of the target number based on the 5G message and reducing the misjudgment of the non-target number.
Another embodiment of the present application provides a 5G message-based target number identification apparatus, and fig. 6 is a schematic diagram of a 5G message-based target number identification apparatus according to another embodiment of the present application, as shown in fig. 6, where the apparatus may include a first acquisition module 610, a first query module 620, a second acquisition module 630, a second query module 640, and an identification module 650.
The first obtaining module 610 is configured to obtain first identity information corresponding to the marked target number.
In this embodiment, the first obtaining module 610 needs to obtain the marked target number first, and may obtain the marked target number in a known and various conventional manners, for example, obtain the marked target number from the 5G message pool; the marked destination number may be a destination number marked by the user or a destination number detected by the detection means. Since each number (for example, the target number) has corresponding identity information (for example, identification card information), the identity information (first identity information) corresponding to the marked target number can be obtained. For more embodiments of the first obtaining module 610, reference may be made to a detailed description of a method for identifying a target number of a 5G message according to an embodiment of the present application, and those skilled in the art should understand that corresponding embodiments are not described herein for avoiding repetition.
The first query module 620 is configured to query a first internet of things device associated with the first identity information.
In this embodiment, since the identity information is associated with the internet of things device, according to the association relationship between the identity information and the internet of things device, the first query module 620 may query the internet of things device (first internet of things device) associated with the first identity information; the queried internet of things device may be a set formed by one or more internet of things devices. For more embodiments of the first query module 620, reference may be made to a detailed description of a method for identifying a target number of a 5G message according to an embodiment of the present application, and those skilled in the art should understand that corresponding embodiments are not described herein for avoiding repetition.
A second obtaining module 630, configured to obtain second identity information corresponding to the first internet of things device.
In this embodiment, the second obtaining module 630 obtains the second identity information corresponding to the first internet of things device according to the association relationship between the identity information and the internet of things device. When the queried first internet of things device may be a set formed by one or more internet of things devices, it is not necessary to query all second identity information corresponding to the internet of things devices when acquiring the second identity information corresponding to the first internet of things device, and according to actual requirements, the second obtaining module 630 may selectively query a part of the second identity information corresponding to the internet of things devices, so in some embodiments, the second obtaining module 630 includes a confirmation module (not shown in the drawing), where the confirmation module is configured to determine a second internet of things device to be monitored in the first internet of things device; and obtaining second identity information of the second internet-of-things device. For example, if 20 pieces of internet of things equipment are obtained, the confirmation module may select (or determine according to a certain rule) 10 pieces of internet of things equipment therein for querying corresponding second identity information, and it is obvious that the listing of the number of the pieces of internet of things equipment herein is only one of specific cases for illustrating the embodiment, and does not limit the content of the embodiment in any way.
Further embodiments of the second obtaining module 630 may refer to a detailed description of a method for identifying a target number of a 5G message according to an embodiment of the present application, and those skilled in the art should understand the corresponding embodiments, so that the description is omitted herein for avoiding repetition.
And a second query module 640, configured to query at least one communication number corresponding to the second identity information.
In this embodiment, the second query module 640 queries a corresponding communication number according to the second identity information (for example, the second identity information may be identity information acquired by all or a part of the internet of things devices) acquired by the second acquisition module 630, and at least one of the queried communication numbers is the queried communication number.
And an identification module 650, configured to identify a communication number meeting a preset condition from the at least one communication number as a target number.
In some embodiments, the identification module 650 includes a frequency determination module (not shown in the figures) for performing: acquiring a 5G message ticket in a detection time corresponding to a target communication number, wherein the target communication number is any one of the at least one communication number; obtaining a target number according to the 5G message ticket, wherein the target number comprises at least one of the following: the number of the sent personal messages, the number of the received different numbers and the number of the sent content of the same messages; and under the condition that whether the target number exceeds the preset frequency is determined, determining the target communication number as a target number.
In some embodiments, the identifying module 650 includes a content judging module (not shown in the drawings) for performing the identifying of the communication number meeting the preset condition among the at least one communication number as the target number, including one of the following:
performing keyword recognition on a text message taking a target communication number as a sender, and recognizing the target communication number as a target number under the condition that the text message comprises preset content, wherein the target communication number is any one of the at least one communication number;
performing text conversion on the audio message taking the target communication number as a sender, performing keyword recognition on the content after the text conversion, and recognizing the target communication number as a target number when the audio message is determined to comprise preset content;
performing optical character recognition and picture sample library comparison on a picture message taking the target communication number as a sender, and recognizing the target communication number as a target number under the condition that the picture message comprises preset content;
and according to a certain time interval, extracting frames of the video message taking the target communication number as a sender, performing optical character recognition and picture sample library comparison on the extracted frames, and identifying the target communication number as the target number under the condition that the extracted frames are determined to contain preset contents.
For more embodiments of the identification module 650, reference may be made to a detailed description of a method for identifying a target number of a 5G message according to an embodiment of the present application, and those skilled in the art should understand the corresponding embodiments, so that repetition is avoided and detailed descriptions are omitted herein.
According to the target number identification device based on the 5G message, through obtaining the first identity information corresponding to the marked target number, inquiring the first Internet of things equipment related to the first identity information, obtaining the second identity information corresponding to the first Internet of things equipment, inquiring at least one communication number corresponding to the second identity information, and further identifying the communication number meeting the preset condition in the at least one communication number as the target number, on one hand, the identification rate of the target number can be effectively improved, and on the other hand, the false blocking of a certain link in a service chain (such as a fraud service chain) through analysis is reduced. By the embodiment, the target number used by the same party (such as fraud party) can be effectively searched, the range of number monitoring is greatly reduced, and the detection efficiency and accuracy of the target number based on the 5G message are improved.
In other embodiments, fig. 7 shows a schematic diagram of a target number identifying device based on a 5G message, where the target number is a fraud number, and of course, other types of target numbers are also possible. The system comprises a key monitoring number identification module, a fraud number identification module and a data storage module.
A first part: the key monitoring number identification module is used for identifying the key monitoring number through the internet of things equipment associated with the fraud number according to the marked fraud number, wherein:
the fraud number identity querying sub-module (i.e. the first acquisition module 410 in other implementations) is used to query the fraud number for identity card information at the time of registration of the operator.
The fraud number internet of things device query sub-module (i.e., the first query module 420 in other implementations) queries the internet of things device associated with the identity card according to the fraud number identity card queried by the fraud number identity query sub-module.
The fraud Internet of things equipment communication equipment inquiry submodule is used for inquiring the information of the Internet of things equipment which communicates with the fraud Internet of things equipment according to the fraud number Internet of things equipment inquiry submodule.
The key monitoring number inquiring sub-module (i.e. the second acquiring module 430 and the second inquiring module 440 in other embodiments) is configured to inquire the identity cards associated with the devices according to the information of the devices of the internet of things, which is inquired by the communication device inquiring sub-module of the internet of things device, and inquire all the communication numbers under the names of the identity cards as key monitoring numbers through the information of the identity cards.
A second part: the fraud number identification module (i.e., identification module 450 in other embodiments) comprehensively determines whether a fraud number is based on a fraud content match for analyzing and transmitting content for a ticket of an important monitoring number, wherein,
the fraud judging sub-module (i.e. the frequency judging module in other embodiments) is configured to comprehensively judge whether to hit the suspected fraud according to the behavior of the words of the key monitoring number, including sending the number of personal message, receiving the number of different numbers, and sending the same number of message content. The fraud content matching sub-module (i.e. the content judgment module in other implementations) is used for identifying whether the message content sent by the key monitoring number matches the fraud content preset by the system. Wherein:
the message type recognition sub-model is used for recognizing that the message type sent by the key monitoring number is any one of text, picture, video and audio.
The text message judging sub-module is used for carrying out keyword recognition on the text content.
The picture message judging sub-module is used for carrying out optical character recognition and picture sample library comparison on the picture content.
The audio message judging submodule is used for firstly performing text conversion on the audio content.
The video message judging sub-module is used for extracting frames of the video content according to a certain time interval and identifying the extracted frames of the pictures according to the picture message.
The content comprehensive judging sub-module is used for judging whether different message types are matched with the matching result of fraud content preset on the system according to the rules.
The fraud number judging sub-module is used for giving out a judging result of whether the number is a fraud number according to a judging rule of the fraud number, wherein:
the judging rule setting sub-module is used for setting the thresholds of the number of sending personal messages, the number of different numbers received and the number of sending the same message content.
The fraud number result judging sub-module is used for comprehensively judging whether the fraud number is the fraud number according to the results output by the fraud behavior judging sub-module and the fraud content matching sub-module.
Third section: and the data storage module is used for storing a fraud number library, an identity information library, a device information library, a ticket library and a rule library which are required for fraud number judgment.
According to the target number identification device based on the 5G message, the target number identification device is adopted to carry out target number identification (such as fraud numbers), so that the identification rate of the target numbers can be effectively improved, and the false blocking of a certain link in a service chain (such as fraud service chain) through analysis is reduced. By the embodiment, the target number used by the same partner can be effectively searched, the number monitoring range is greatly reduced, and the detection efficiency and accuracy of the target number based on the 5G message are improved.
The identification device provided in this embodiment may also be a component in an electronic device, such as an integrated circuit or a chip. The electronic device may be a terminal, or may be other devices than a terminal. By way of example, the electronic device may be a mobile phone, tablet computer, notebook computer, palm computer, vehicle-mounted electronic device, mobile internet appliance (Mobile Internet Device, MID), augmented reality (augmented reality, AR)/Virtual Reality (VR) device, robot, wearable device, ultra-mobile personal computer, UMPC, netbook or personal digital assistant (personal digital assistant, PDA), etc., but may also be a server, network attached storage (Network Attached Storage, NAS), personal computer (personal computer, PC), television (TV), teller machine or self-service machine, etc., and the embodiments of the present application are not limited in particular.
The target number identification device based on the 5G message in the embodiment of the present application may be a device with an operating system. The operating system may be an Android operating system, an ios operating system, or other possible operating systems, and the embodiment of the present application is not limited specifically.
The device provided by the embodiment of the present application can implement each process implemented by the embodiments of the methods of fig. 1 to 5, and in order to avoid repetition, a description is omitted here.
Optionally, as shown in fig. 8, the embodiment of the present application further provides an electronic device 800, including a processor 801 and a memory 802, where the memory 802 stores a program or an instruction that can be executed on the processor 801, and the program or the instruction implements each step of the embodiment of the method described in fig. 1 to 5 and achieves the same technical effect when executed by the processor 801, so that repetition is avoided and no further description is provided herein.
Optionally, an embodiment of the present application further provides a storage medium, including a processor 801 and a memory 802, where the memory 802 stores a program or an instruction that can be executed on the processor 801, where the program or the instruction implements each step of the embodiment of the method described in the foregoing fig. 1 to 5 when executed by the processor 801, and the steps achieve the same technical effects, and are not repeated herein.
The electronic device in the embodiment of the application includes the mobile electronic device and the non-mobile electronic device.
Fig. 9 is a schematic hardware structure of an electronic device implementing an embodiment of the present application.
The electronic device 900 includes, but is not limited to: radio frequency unit 901, network module 902, audio output unit 903, input unit 904, sensor 905, display unit 906, user input unit 907, interface unit 908, memory 909, and processor 910.
Those skilled in the art will appreciate that the electronic device 900 may also include a power source (e.g., a battery) for powering the various components, which may be logically connected to the processor 910 by a power management system to perform functions such as managing charge, discharge, and power consumption by the power management system. The electronic device structure shown in fig. 9 does not constitute a limitation of the electronic device, and the electronic device may include more or less components than shown, or may combine certain components, or may be arranged in different components, which are not described in detail herein.
A processor 910, configured to perform a corresponding function in the 5G message-based target number identification method of the present application.
It should be appreciated that in an embodiment of the present application, the input unit 904 may include a graphics processor (Graphics Processing Unit, GPU) 9041 and a microphone 9042, and the graphics processor 9041 processes image data of still pictures or video obtained by an image capturing device (such as a camera) in a video capturing mode or an image capturing mode. The display unit 906 may include a display panel 9061, and the display panel 9061 may be configured in the form of a liquid crystal display, an organic light emitting diode, or the like. The user input unit 907 includes at least one of a touch panel 9071 and other input devices 9072. Touch panel 9071, also referred to as a touch screen. The touch panel 9071 may include two parts, a touch detection device and a touch controller. Other input devices 9072 may include, but are not limited to, a physical keyboard, function keys (e.g., volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and so forth, which are not described in detail herein.
The memory 909 may be used to store software programs as well as various data. The memory 909 may mainly include a first storage area storing programs or instructions, which may store an operating system, application programs or instructions (such as a sound playing function, an image playing function, etc.) required for at least one function, etc., and a second storage area storing data, which may store a target number library, an identity information library, a device information library, a ticket library, a rule library, etc., required for storing target number (e.g., fraud number) judgment. Further, the memory 909 may include a volatile memory or a nonvolatile memory, or the memory 909 may include both volatile and nonvolatile memories. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM), static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (ddr SDRAM), enhanced SDRAM (Enhanced SDRAM), synchronous DRAM (SLDRAM), and Direct RAM (DRRAM). Memory 909 in embodiments of the application includes, but is not limited to, these and any other suitable types of memory.
Processor 910 may include one or more processing units; optionally, the processor 910 integrates an application processor that primarily processes operations involving an operating system, user interface, application programs, etc., and a modem processor that primarily processes wireless communication signals, such as a baseband processor. It will be appreciated that the modem processor described above may not be integrated into the processor 910.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element. Furthermore, it should be noted that the scope of the methods and apparatus in the embodiments of the present application is not limited to performing the functions in the order shown or discussed, but may also include performing the functions in a substantially simultaneous manner or in an opposite order depending on the functions involved, e.g., the described methods may be performed in an order different from that described, and various steps may be added, omitted, or combined. Additionally, features described with reference to certain examples may be combined in other examples.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a computer software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present application.
The embodiments of the present application have been described above with reference to the accompanying drawings, but the present application is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present application and the scope of the claims, which are to be protected by the present application.

Claims (9)

1. A 5G message-based target number identification method, comprising:
acquiring first identity information corresponding to the marked target number;
inquiring first Internet of things equipment associated with the first identity information;
acquiring second identity information corresponding to the first Internet of things equipment;
inquiring at least one communication number corresponding to the second identity information;
identifying a communication number meeting a preset condition in the at least one communication number as a target number;
the obtaining the second identity information corresponding to the first internet of things device includes:
determining a second internet of things device to be monitored according to the 5G message ticket of the first internet of things device; the second internet of things device comprises a sender internet of things device and a receiver internet of things device corresponding to the first internet of things device;
and acquiring the second identity information of a second internet-of-things device.
2. The method for identifying a target number based on a 5G message according to claim 1, wherein the obtaining first identity information corresponding to the marked target number includes: and inquiring the first identity information of the marked target number through the registration information of the marked target number in the operator.
3. The method for identifying a target number based on a 5G message according to claim 1, wherein the determining, according to the 5G message ticket of the first internet of things device, the second internet of things device to be monitored includes:
acquiring a 5G message ticket of the first Internet of things device in the detection time;
and determining the sender Internet of things equipment and the receiver Internet of things equipment in the 5G message ticket as second Internet of things equipment to be monitored.
4. The 5G message-based destination number identification method as recited in claim 1, wherein the preset condition includes at least one of: the frequency of sending the 5G message exceeds the preset frequency, and the sending content comprises the preset content.
5. The 5G message-based destination number identification method as claimed in claim 4, wherein identifying a communication number meeting a preset condition among the at least one communication number as a destination number comprises:
acquiring a 5G message ticket in a detection time corresponding to a target communication number, wherein the target communication number is any one of the at least one communication number;
obtaining a target number according to the 5G message ticket, wherein the target number comprises at least one of the following: the number of the sent personal messages, the number of the received different numbers and the number of the sent content of the same messages;
And under the condition that whether the target number exceeds the preset frequency is determined, determining the target communication number as a target number.
6. The 5G message-based destination number identification method as recited in claim 4, wherein identifying a communication number that meets a preset condition among the at least one communication number as a destination number includes one of:
performing keyword recognition on a text message taking a target communication number as a sender, and recognizing the target communication number as a target number under the condition that the text message comprises preset content, wherein the target communication number is any one of the at least one communication number;
performing text conversion on the audio message taking the target communication number as a sender, performing keyword recognition on the content after the text conversion, and recognizing the target communication number as a target number when the audio message is determined to comprise preset content;
performing optical character recognition and picture sample library comparison on a picture message taking the target communication number as a sender, and recognizing the target communication number as a target number under the condition that the picture message comprises preset content;
And according to a certain time interval, extracting frames of the video message taking the target communication number as a sender, performing optical character recognition and picture sample library comparison on the extracted frames, and identifying the target communication number as the target number under the condition that the extracted frames are determined to contain preset contents.
7. A 5G message-based destination number identification apparatus, comprising:
the first acquisition module is used for acquiring first identity information corresponding to the marked target number;
the first query module is used for querying the first Internet of things equipment associated with the first identity information;
the second acquisition module is used for acquiring second identity information corresponding to the first Internet of things equipment;
the second inquiry module is used for inquiring at least one communication number corresponding to the second identity information;
the identification module is used for identifying the communication number meeting the preset condition in the at least one communication number as a target number;
the second acquisition module is used for determining a second internet of things device to be monitored according to the 5G message ticket of the first internet of things device; the second internet of things device comprises a sender internet of things device and a receiver internet of things device corresponding to the first internet of things device; and acquiring the second identity information of a second internet-of-things device.
8. An electronic device, comprising: a processor and a memory storing a program or instructions executable on the processor, which when executed by the processor, implement the steps of the method of identifying a target number as claimed in any one of claims 1 to 6.
9. A readable storage medium, characterized in that the readable storage medium has stored thereon a program or instructions which, when executed by a processor, implement the steps of the target number identification method according to any of claims 1-6.
CN202210534517.3A 2022-05-17 2022-05-17 Target number identification method based on 5G message and electronic equipment Active CN114980116B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210534517.3A CN114980116B (en) 2022-05-17 2022-05-17 Target number identification method based on 5G message and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210534517.3A CN114980116B (en) 2022-05-17 2022-05-17 Target number identification method based on 5G message and electronic equipment

Publications (2)

Publication Number Publication Date
CN114980116A CN114980116A (en) 2022-08-30
CN114980116B true CN114980116B (en) 2023-09-19

Family

ID=82982779

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210534517.3A Active CN114980116B (en) 2022-05-17 2022-05-17 Target number identification method based on 5G message and electronic equipment

Country Status (1)

Country Link
CN (1) CN114980116B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469460A (en) * 2010-11-08 2012-05-23 中国移动通信集团广东有限公司 Method for identifying invalid international mobile equipment identity number and apparatus thereof
CN103067896A (en) * 2013-01-17 2013-04-24 中国联合网络通信集团有限公司 Junk short message filtering method and device
CN106170046A (en) * 2016-09-23 2016-11-30 陕西尚品信息科技有限公司 A kind of event based on mobile device triggers implicit expression auth method
CN106657689A (en) * 2015-11-04 2017-05-10 中国移动通信集团公司 Method for preventing and controlling international fraud call and apparatus thereof
CN106791230A (en) * 2015-11-25 2017-05-31 小米科技有限责任公司 Telephone number recognition methods and device
CN107872772A (en) * 2017-12-19 2018-04-03 北京奇虎科技有限公司 The detection method and device of fraud text message
US10178223B1 (en) * 2017-04-30 2019-01-08 Symantec Corporation Fraudulent subscriber identity module (SIM) swap detection
CN110139280A (en) * 2019-07-02 2019-08-16 中国联合网络通信集团有限公司 Swindle detection method, device and the storage medium of number
CN110493477A (en) * 2019-09-12 2019-11-22 中国联合网络通信集团有限公司 Swindle number identification method, device, equipment and storage medium
CN110536302A (en) * 2018-05-25 2019-12-03 中国移动通信集团广东有限公司 Telecommunication fraud based reminding method and device
CN110944329A (en) * 2019-11-28 2020-03-31 楚天龙股份有限公司 Information processing method, terminal and server
CN111147668A (en) * 2019-12-27 2020-05-12 杭州安恒信息技术股份有限公司 Anti-telecommunication fraud identification method based on IMEI and communication behaviors
CN113099443A (en) * 2019-12-23 2021-07-09 阿里巴巴集团控股有限公司 Equipment authentication method, device, equipment and system
CN113543134A (en) * 2021-09-14 2021-10-22 广州讯鸿网络技术有限公司 Video verification code authentication system, method and device based on 5G message
CN113596844A (en) * 2021-07-29 2021-11-02 恒安嘉新(北京)科技股份公司 Early warning method, device, medium and electronic equipment based on data information

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9832646B2 (en) * 2013-09-13 2017-11-28 Network Kinetix, LLC System and method for an automated system for continuous observation, audit and control of user activities as they occur within a mobile network

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102469460A (en) * 2010-11-08 2012-05-23 中国移动通信集团广东有限公司 Method for identifying invalid international mobile equipment identity number and apparatus thereof
CN103067896A (en) * 2013-01-17 2013-04-24 中国联合网络通信集团有限公司 Junk short message filtering method and device
CN106657689A (en) * 2015-11-04 2017-05-10 中国移动通信集团公司 Method for preventing and controlling international fraud call and apparatus thereof
CN106791230A (en) * 2015-11-25 2017-05-31 小米科技有限责任公司 Telephone number recognition methods and device
CN106170046A (en) * 2016-09-23 2016-11-30 陕西尚品信息科技有限公司 A kind of event based on mobile device triggers implicit expression auth method
US10178223B1 (en) * 2017-04-30 2019-01-08 Symantec Corporation Fraudulent subscriber identity module (SIM) swap detection
CN107872772A (en) * 2017-12-19 2018-04-03 北京奇虎科技有限公司 The detection method and device of fraud text message
CN110536302A (en) * 2018-05-25 2019-12-03 中国移动通信集团广东有限公司 Telecommunication fraud based reminding method and device
CN110139280A (en) * 2019-07-02 2019-08-16 中国联合网络通信集团有限公司 Swindle detection method, device and the storage medium of number
CN110493477A (en) * 2019-09-12 2019-11-22 中国联合网络通信集团有限公司 Swindle number identification method, device, equipment and storage medium
CN110944329A (en) * 2019-11-28 2020-03-31 楚天龙股份有限公司 Information processing method, terminal and server
CN113099443A (en) * 2019-12-23 2021-07-09 阿里巴巴集团控股有限公司 Equipment authentication method, device, equipment and system
CN111147668A (en) * 2019-12-27 2020-05-12 杭州安恒信息技术股份有限公司 Anti-telecommunication fraud identification method based on IMEI and communication behaviors
CN113596844A (en) * 2021-07-29 2021-11-02 恒安嘉新(北京)科技股份公司 Early warning method, device, medium and electronic equipment based on data information
CN113543134A (en) * 2021-09-14 2021-10-22 广州讯鸿网络技术有限公司 Video verification code authentication system, method and device based on 5G message

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Fraud detection in telecommunication: A rough fuzzy set based approach;Wei Xu;《2008 International Conference on Machine Learning and Cybernetics》;全文 *
一口通办:5G消息媒体场景探究;于智源;宋笑笑;;中国传媒科技(第09期);全文 *
手机账户安全巧应对;王奇;;家庭科技(第07期);全文 *

Also Published As

Publication number Publication date
CN114980116A (en) 2022-08-30

Similar Documents

Publication Publication Date Title
CN106713579B (en) Telephone number identification method and device
CN107229638A (en) A kind of text message processing method and device
CN113098870A (en) Phishing detection method and device, electronic equipment and storage medium
CN110798488B (en) Web application attack detection method
CN105704005A (en) Malicious user reporting method and device, and reporting information processing method and device
CN111859900B (en) Message display method and device and electronic equipment
CN110839216B (en) Method and device for identifying communication information fraud
CN105681257B (en) Information reporting method, device, equipment and system based on instant messaging interaction platform and computer storage medium
CN112039874B (en) Malicious mail identification method and device
CN112163239A (en) Privacy information protection method and device and electronic equipment
CN112770129A (en) Live broadcast-based group chat establishing method, related device, equipment and medium
CN112307464A (en) Fraud identification method and device and electronic equipment
CN111259216B (en) Information identification method, device and equipment
CN116707965A (en) Threat detection method and device, storage medium and electronic equipment
CN109871685B (en) RTF file analysis method and device
CN114980116B (en) Target number identification method based on 5G message and electronic equipment
CN113378161A (en) Security detection method, device, equipment and storage medium
CN113420230A (en) Matching consultation pushing method based on group chat, related device, equipment and medium
CN106980778A (en) Information authentication method, device and terminal device
CN111083705A (en) Group-sending fraud short message detection method, device, server and storage medium
CN111431796B (en) Instant messaging early warning method and device, computing equipment and storage medium
CN111291150B (en) Method and device for determining information to be searched and readable storage medium
CN113691440B (en) Message processing method and device
CN112788603B (en) Verification code forwarding method, device, equipment and medium
CN114338089B (en) Anti-attack method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant