CN115460548A - Method, device, medium and equipment for identifying illegal use of mobile phone - Google Patents

Method, device, medium and equipment for identifying illegal use of mobile phone Download PDF

Info

Publication number
CN115460548A
CN115460548A CN202211080011.6A CN202211080011A CN115460548A CN 115460548 A CN115460548 A CN 115460548A CN 202211080011 A CN202211080011 A CN 202211080011A CN 115460548 A CN115460548 A CN 115460548A
Authority
CN
China
Prior art keywords
user
monitoring area
base station
target monitoring
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211080011.6A
Other languages
Chinese (zh)
Inventor
王树鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202211080011.6A priority Critical patent/CN115460548A/en
Publication of CN115460548A publication Critical patent/CN115460548A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data

Abstract

The invention discloses a method, a device, a medium and equipment for identifying illegal use of a mobile phone, and belongs to the field of mobile communication. It comprises the following steps: preprocessing mobile signaling data acquired in real time to obtain preprocessed mobile signaling data; acquiring the movement track data of a user according to the preprocessed movement signaling data; acquiring base station information of a target monitoring area; judging whether the user number enters the target monitoring area or not according to the moving track data of the user and the base station information of the target monitoring area to obtain the moving track data of the user in the target monitoring area; and matching the movement track data of the users in the target monitoring area with the set abnormal communication behavior rule to obtain the number of the illegal user. The invention can realize the mobile phone identification and the illegal behavior discovery in the target monitoring area without arranging video monitoring equipment and wireless signal spectrum monitoring equipment, has wide coverage and good area flexibility, and can mine and discover abnormal behaviors such as use modes, numbers and the like.

Description

Method, device, medium and equipment for identifying illegal use of mobile phone
Technical Field
The invention relates to the field of mobile communication, in particular to a method, a device, a medium and equipment for identifying illegal use of a mobile phone.
Background
At present, the method for monitoring illegal mobile phone behaviors in a specific area mainly comprises a video monitoring-based area user abnormal behavior monitoring method and a wireless signal spectrum monitoring-based illegal mobile phone usage monitoring method.
The method for monitoring the abnormal behaviors of the regional users based on video monitoring comprises the steps of mastering the motion track information of each target in a monitoring scene through a series of computer vision and image processing means, further analyzing and extracting key frames in a video source, quickly responding and positioning an abnormal picture, analyzing and judging the abnormal behaviors in the monitoring picture, sending a corresponding alarm according to a rule preset by an administrator or triggering other subsequent operations, effectively carrying out early warning, and timely notifying the staff of intervention as required.
The video monitoring-based method for monitoring the abnormal behavior of the regional users needs to deploy a large number of cameras and servers, the purchase cost of hardware equipment is high, and early-stage installation and later-stage operation and maintenance are complex. And the application range is limited, and the large-range area cannot be monitored and flexibly adjusted.
The illegal mobile phone based on wireless signal spectrum monitoring uses a monitoring and discovering method to monitor, locate, identify and analyze wireless signals in a specific area range, wherein the wireless signals comprise mobile phones, 2G/3G/4G/5G, land mobile wireless systems, wi-Fi and broadcast signals. The wireless signal spectrum monitoring device is arranged and deployed around a specific monitoring area, and the device can identify the occurrence of mobile phone signals in the specific area by performing spectrum analysis and measurement on burst pulse sequence signals of mobile phones in mobile communication.
The illegal mobile phone use monitoring and discovering method based on wireless signal spectrum monitoring has the following defects:
1. the coverage area of single equipment is limited, and the deployment cost of large-scale areas is high: the technology needs to install and deploy equipment in a specific area, the detection coverage range of single equipment is limited, and the behavior of illegally using a mobile phone in the area cannot be met at low cost in a scene with a large area.
2. The monitoring area has poor expandability, the replacement of the monitoring area needs to move the current equipment or deploy new equipment, the investment cost is high, and low-cost monitoring and discovery cannot be carried out.
3. The mobile phone number of the user cannot be monitored and acquired: the wireless spectrum carries out illegal mobile phone monitoring, can only discover the position of the signal appearing at that time, cannot judge the mobile phone number, provides personal information related to the mobile phone number, and is not beneficial to subsequent mining and discovery.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a method, a device, a medium and equipment for identifying illegal use of a mobile phone, video monitoring equipment and wireless signal spectrum monitoring equipment are not required to be arranged, the coverage range is wide, the flexibility of a coverage area is good, and abnormal behaviors such as a use mode, a number and the like can be mined and discovered.
The technical scheme provided by the invention is as follows:
in a first aspect, the present invention provides a method for identifying a mobile phone used in a violation, where the method includes:
preprocessing mobile signaling data acquired in real time to obtain preprocessed mobile signaling data;
acquiring the movement track data of a user according to the preprocessed movement signaling data;
acquiring base station information of a target monitoring area;
judging whether the user number enters the target monitoring area or not according to the moving track data of the user and the base station information of the target monitoring area to obtain the moving track data of the user in the target monitoring area;
and matching the movement track data of the users in the target monitoring area with the set abnormal communication behavior rule to obtain the number of the illegal user.
Further, the preprocessing the mobile signaling data collected in real time to obtain the preprocessed mobile signaling data includes:
real-time access is carried out on the real-time collected mobile signaling data;
removing mobile signaling data missing multiple fields and repeated mobile signaling data;
and completing the mobile signaling data missing the basic information field through a basic information table or a statistical method.
Further, the acquiring the movement track data of the user according to the preprocessed movement signaling data includes:
always storing the latest mobile signaling data of the user in a memory;
comparing the user number, time information and base station position information of the newly acquired mobile signaling data with the mobile signaling data stored in the memory, and if the user activity range stays in a certain base station area for more than a certain limited time, judging the base station as a staying point;
taking two continuous adjacent stopover points of a user as a primary effective track behavior of the user, wherein the primary effective track behavior comprises starting base station information, starting time, ending base station information, current base station residence time information and a communication behavior event;
and combining all the one-time effective track behaviors of the user according to time to obtain the moving track data of the user, and outputting the moving track data to the message buffer queue Kafka.
Further, the obtaining of the base station information of the target monitoring area includes:
forming a closed area through a longitude and latitude coordinate set of a plurality of vertexes of the target monitoring area;
traversing the base station basic information table by using a ray algorithm, and judging whether the longitude and latitude points of each base station are in the range of a target monitoring area;
and outputting and storing the information of the base station in the target monitoring area range in a relational database Mysql to form a base station information table representing the base station information of the target monitoring area.
Further, the determining whether the user number enters the target monitoring area according to the movement track data of the user and the base station information of the target monitoring area to obtain the movement track data of the user in the target monitoring area includes:
creating a Flink real-time streaming type calculation program, loading the base station information table to a memory, and consuming the moving track data in the message cache queue Kafka in real time;
judging whether the user number enters a target monitoring area or not by comparing whether the base station information in the moving track data is matched with the base station information table or not;
and filtering the moving track data corresponding to the unmatched user numbers, and outputting the moving track data corresponding to the matched user numbers to a relational database Mysql to obtain a personnel behavior table in the target area representing the moving track data of the users in the target monitoring area.
Further, the matching the movement track data of the user in the target monitoring area with the set abnormal communication behavior rule to obtain the number of the illegal user includes:
obtaining communication behaviors in the target monitoring area range according to the type of the communication behavior event of the movement track data of the user in the target monitoring area and the communication state behaviors of the identification numbers;
matching the communication behavior in the target monitoring area range with a set abnormal communication behavior rule, and outputting the user number and the communication behavior event meeting the abnormal communication behavior rule to a personnel abnormal behavior table in the target area in a relational database Mysql;
and periodically reading the personnel behavior table in the target area and the user number of the abnormal behavior table of the personnel in the target area, identifying the finding and abnormal behaviors of the illegal mobile phone in the target monitoring area, and outputting the illegal user number and the illegal behaviors.
In a second aspect, the present invention provides a device for identifying illegal use of a mobile phone, the device comprising:
the data preprocessing module is used for preprocessing the mobile signaling data acquired in real time to obtain preprocessed mobile signaling data;
the track data generation module is used for acquiring the moving track data of the user according to the preprocessed moving signaling data;
the base station information acquisition module is used for acquiring the base station information of the target monitoring area;
the target area user discovery module is used for judging whether the user number enters the target monitoring area or not according to the movement track data of the user and the base station information of the target monitoring area to obtain the movement track data of the user in the target monitoring area;
and the illegal mobile phone identification module is used for matching the movement track data of the user in the target monitoring area with the set abnormal communication behavior rule to obtain the illegal user number.
Further, the data preprocessing module comprises:
the data acquisition unit is used for accessing the real-time acquisition mobile signaling data in real time;
the data removing unit is used for removing the mobile signaling data missing multiple fields and the repeated mobile signaling data;
and the data completion unit is used for completing the mobile signaling data missing the basic information field through a basic information table or a statistical method.
Further, the trajectory data generation module includes:
the memory storage unit is used for always storing the latest mobile signaling data of the user in the memory;
a stop point judging unit, which is used for comparing the user number, the time information and the base station position information of the newly collected mobile signaling data with the mobile signaling data stored in the memory, and judging the base station as a stop point if the user activity range stops in a certain base station area for more than a certain limited time;
the effective track behavior calculation unit is used for taking two continuous adjacent stop points of the user as one-time effective track behavior of the user, wherein the one-time effective track behavior comprises starting base station information, starting time, ending base station information, current base station residence time information and a communication behavior event;
and the moving track generating unit is used for combining all the one-time effective track behaviors of the user according to time to obtain moving track data of the user and outputting the moving track data to the message buffer queue Kafka.
Further, the base station information obtaining module includes:
the closed area generating unit is used for forming a closed area through a longitude and latitude coordinate set of a plurality of vertexes of the target monitoring area;
the comparison unit is used for traversing the base station basic information table by using a ray algorithm and judging whether the longitude and latitude points of each base station are positioned in the target monitoring area range;
and the base station information table generating unit is used for outputting and storing the information of the base stations in the range of the target monitoring area in the relational database Mysql to form a base station information table representing the base station information of the target monitoring area.
Further, the target area user discovery module includes:
the loading unit is used for creating a Flink real-time streaming calculation program, loading the base station information table to a memory, and consuming the moving track data in the message buffer queue Kafka in real time;
the matching unit is used for judging whether the user number enters a target monitoring area or not by comparing whether the base station information in the moving track data is matched with the base station information table or not;
and the personnel behavior table generation unit in the target area is used for filtering the movement track data corresponding to the unmatched user numbers and outputting the movement track data corresponding to the matched user numbers to the relational database Mysql to obtain the personnel behavior table in the target area, which represents the movement track data of the users in the target monitoring area.
Further, the illegal mobile phone identification module includes:
the communication behavior acquisition unit is used for acquiring communication behaviors in the target monitoring area range according to the types of the communication behavior events of the movement track data of the user in the target monitoring area and the communication state behaviors of the identification numbers;
the secondary matching unit is used for matching the communication behavior in the target monitoring area range with the set abnormal communication behavior rule and outputting the user number and the communication behavior event which meet the abnormal communication behavior rule to a personnel abnormal behavior table in the target area in the relational database Mysql;
and the illegal mobile phone identification module unit is used for periodically reading the personnel behavior table in the target area and the user number of the abnormal behavior table of the personnel in the target area, identifying the discovery and abnormal behaviors of the illegal mobile phone in the target monitoring area range, and outputting the illegal user number and the illegal behaviors.
In a third aspect, the invention provides a computer-readable storage medium for demographics, comprising a memory for storing processor-executable instructions that, when executed by the processor, implement steps comprising the method for identifying illicit use of handsets as described in the first aspect.
In a fourth aspect, the present invention provides an apparatus for demographics, comprising at least one processor and a memory storing computer-executable instructions, which when executed by the processor, implement the steps of the method for identifying an offending mobile phone according to the first aspect.
The invention has the following beneficial effects:
the invention generates the movement track data of the user in real time based on the original movement signaling data, constructs a model for discovering illegal mobile phone behaviors, realizes the real-time mobile phone user discovery and abnormal behavior identification on the target monitoring area, outputs a target area mobile phone user information table and a target area mobile phone user abnormal behavior information table, and effectively supports the follow-up monitoring and early warning of the illegal mobile phone user behaviors in the area.
According to the invention, through mobile signaling data, the mobile phone identification and illegal behavior discovery of a user-defined specific target monitoring area are realized, video monitoring equipment and wireless signal spectrum monitoring equipment are not required to be arranged, the monitoring range and the extensibility of the target area are expanded, and the illegal mobile phone behavior in the area is flexibly monitored and early warned according to the definition of the illegal behavior.
Drawings
FIG. 1 is a flow chart of a method for identifying illegal use of a mobile phone according to the present invention;
fig. 2 is a schematic diagram of a device for identifying illegal use of a mobile phone according to the present invention.
Detailed Description
In order to make the technical problems, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings and specific embodiments. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present invention without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
the embodiment of the invention provides a method for identifying a mobile phone illegally used, which comprises the following steps of:
s100: and preprocessing the mobile signaling data acquired in real time to obtain the preprocessed mobile signaling data.
The mobile signaling data refers to information recording of a mobile phone user when a communication event (including short message sending and receiving, calling and called, switching on and off, cell switching and location updating events) occurs, and signals except voice signals are collectively called signaling in a communication system. With the development of modern internet technology and mobile intelligent terminals, the amount of signaling data of mobile operators is also becoming huge. Desensitization mobile phone signaling data has the characteristics of wide personnel and area coverage, high real-time performance and the like, and by 12 months in 2021, the total number of mobile phone users in China is 16.43 hundred million users, the total number of mobile communication base stations is 996 ten thousand, and base station signals cover 99% of population nationwide. And calculating the mobile signaling data by using the base station coding information and the time information carried in the signaling to obtain the space-time trajectory data for user behavior analysis.
In the step, original mobile signaling data is generated through a signaling data acquisition processing method, data preprocessing operations such as invalid data elimination and basic data information complementation are performed on the original mobile signaling data accessed in real time, and the preprocessed mobile signaling data are output.
In one example, the specific operation process of this step includes:
s110: and accessing the real-time collected mobile signaling data in real time.
S120: and removing the mobile signaling data with missing multi-fields and the repeated mobile signaling data.
The method is used for removing invalid data, and mainly aims at removing missing multi-field data and repeated data. The missing multi-field data means that a small amount of data is missing due to the fact that a signaling system may be unstable, and the missing data inevitably has a serious influence on subsequent analysis, so that the missing data needs to be eliminated. And screening out records with a plurality of fields as null values according to rule matching when accessing data in real time, and deleting the data row. The repeated data refers to continuous data with identical fields, and the invalid data is also caused by instability of a signaling acquisition system. The large amount of duplicate data increases the cost of the operation. Therefore, a basic field matching algorithm is adopted to identify a plurality of repeated records, and only the first record is required to be reserved.
S130: and completing the mobile signaling data missing the basic information field through a basic information table or a statistical method.
The step is used for completing basic data information, and mainly performs real-time completion on fields missing basic information in original data by combining a basic information table, for example, completion on position fields and other information in operators and home locations of numbers in cdr and general internet logs. Meanwhile, for some missing non-explicit technical information fields, the commonly adopted completion method includes a statistical method, that is, for numerical data, methods such as a mean value, a weighted average value, a median and the like can be used for completion.
S200: and acquiring the moving track data of the user according to the preprocessed moving signaling data.
The mobile communication network signal covers a planar service area formed by connecting a plurality of polygonal base station cells which are logically designed to be adjacent to each other, a mobile phone user can always keep contact with one base station cell, and the mobile communication network can record the mobile phone user time-series base station number in mobile signaling data periodically or aperiodically actively or passively, so that the mobile signaling data can acquire the mobile track data of the user.
In one example, the specific operation process of this step includes:
s210: the latest piece of mobile signaling data of the user is always stored in the memory.
In the week, the latest signaling data of the user is always stored in the program memory by acquiring the signaling data in real time.
S220: comparing the user number, time information and base station position information of the newly collected mobile signaling data with the mobile signaling data stored in the memory, and if the user activity range stays in a certain base station area for more than a certain limited time, judging the base station as a stay point.
And in the process of acquiring the mobile signaling data in real time, comparing the state of the newly generated mobile signaling data acquired in real time with the latest mobile signaling data in the memory according to the mobile phone number, the time information and the base station position information of the user, and judging a positioning point where the user activity range stays in a certain limited area for more than a certain limited time as a stopping point.
S230: and taking two continuous adjacent stop points of the user as a primary effective track behavior of the user, wherein the primary effective track behavior comprises starting base station information, starting time, ending base station information, current base station residence time information and a communication behavior event between the two stop points of the current outgoing section.
S240: and combining all the one-time effective track behaviors of the user according to time to obtain the total historical movement track data of the user, and outputting the total historical movement track data to a message buffer queue Kafka.
S300: and acquiring the base station information of the target monitoring area.
The monitoring of the target monitoring area can be performed by analyzing the behavior of the mobile phone user under the base station covering the area, so that the information of the base station specifically constructed in the target monitoring area needs to be obtained. In one example, the specific operation process of this step includes:
s310: and forming a closed area through a latitude and longitude coordinate set of a plurality of vertexes of the target monitoring area.
The method converts a target monitoring area into a closed area range point set composed of a plurality of GIS longitude and latitude vertex coordinates for representation.
S320: and traversing the base station basic information table by using a ray algorithm, and judging whether the longitude and latitude point of each base station is in the range of the target monitoring area.
S330: and outputting and storing the information of the base station in the range of the target monitoring area in a relational database Mysql to form a base station information table representing the base station information of the target monitoring area.
S400: and judging whether the user number enters the target monitoring area or not according to the moving track data of the user and the base station information of the target monitoring area to obtain the moving track data of the user in the target monitoring area.
In one example, the specific operation process of this step includes:
s410: and (3) creating a Flink real-time streaming type calculation program, loading the base station information table to a memory, and consuming the moving track data in the message cache queue Kafka in real time.
In this step, the base station information table representing the base station information of the target monitoring area generated in S300 is loaded into the memory to be cached, and then the movement trajectory data output to the message cache queue Kafka in S200 is consumed in real time.
S420: and judging whether the user number enters a target monitoring area by comparing whether the base station information in the moving track data is matched with the base station information table.
The step is mainly to judge whether the user number enters the range of the target monitoring area by comparing whether the base station number information in the moving track data matches the base station set data (namely, a base station information table) of the target monitoring area.
S430: and filtering the movement track data corresponding to the unmatched user numbers, and outputting the movement track data corresponding to the matched user numbers to a relational database Mysql to obtain a personnel behavior table in the target area representing the movement track data of the users in the target monitoring area.
S500: and matching the movement track data of the user in the target monitoring area with the set abnormal communication behavior rule to obtain the number of the illegal user.
In the step, the moving track data of the user in the target monitoring area obtained by screening in the step S400 is subjected to secondary rule matching, and the number of the illegal user is obtained by judging through an abnormal communication behavior rule.
In one example, the specific operation process of this step includes:
s510: and obtaining the communication behavior in the target monitoring area range according to the type of the communication behavior event of the movement track data of the user in the target monitoring area and the communication state behavior of the identification number.
In the step, abnormal behavior judgment is carried out through a communication behavior event field CDRType: the communication behavior of the user number in the target monitoring area range is obtained mainly through the CDRtype type and the communication state behavior of the identification number (including startup and shutdown, calling and called calls, short and multimedia message receiving and sending, internet access and the like).
S520: and matching the communication behavior in the target monitoring area range with the set abnormal communication behavior rule, and outputting the user number and the communication behavior event meeting the abnormal communication behavior rule to a personnel abnormal behavior table in the target area in the relational database Mysql.
For example, the abnormal communication behavior rule may include: the number is called, short messages are sent too frequently (e.g., short messages are sent within a day, calls are made more than tens or even hundreds of times), or the phone number is homed in a zone where fraud offenders gather or the phone number location is in a zone where fraud offenders gather for a long time, etc.
S530: and periodically reading the personnel behavior table in the target area and the user number of the abnormal behavior table of the personnel in the target area, identifying the finding and abnormal behaviors of the illegally used mobile phone in the target monitoring area range, and outputting the illegal user number and the illegal behaviors.
Establishing an early warning rule, periodically reading the personnel behavior table in the target area and the user number in the personnel abnormal behavior table in the target area established in S430 and S520, respectively discovering illegal use of the mobile phone in the target monitoring area and identifying abnormal behaviors, outputting the illegal user number and the illegal behaviors, and finishing monitoring and early warning.
The invention generates the movement track data of the user in real time based on the original mobile signaling data, constructs a model for discovering illegal mobile phone behaviors, realizes the real-time mobile phone user discovery and abnormal behavior identification on the target monitoring area, outputs a target area mobile phone user information table and a target area mobile phone user abnormal behavior information table, and effectively supports the follow-up monitoring and early warning of illegal mobile phone user behaviors in the area.
According to the invention, through mobile signaling data, the mobile phone identification and illegal behavior discovery of a user-defined specific target monitoring area are realized, video monitoring equipment and wireless signal spectrum monitoring equipment are not required to be arranged, the monitoring range and the extensibility of the target area are expanded, and the illegal mobile phone behavior in the area is flexibly monitored and early warned according to the definition of the illegal behavior.
Example 2:
an embodiment of the present invention provides a device for identifying illegal use of a mobile phone, as shown in fig. 2, the device includes:
the data preprocessing module 1 is configured to preprocess the mobile signaling data acquired in real time to obtain the preprocessed mobile signaling data.
And the track data generation module 2 is used for acquiring the movement track data of the user according to the preprocessed movement signaling data.
And the base station information acquisition module 3 is used for acquiring the base station information of the target monitoring area.
And the target area user discovery module 4 is configured to judge whether the user number enters the target monitoring area according to the movement track data of the user and the base station information of the target monitoring area, so as to obtain the movement track data of the user in the target monitoring area.
And the illegal mobile phone identification module 5 is used for matching the movement track data of the user in the target monitoring area with the set abnormal communication behavior rule to obtain the illegal user number.
Wherein the data preprocessing module comprises:
and the data acquisition unit is used for accessing the mobile signaling data acquired in real time.
And the data removing unit is used for removing the mobile signaling data missing the multi-field and the repeated mobile signaling data.
And the data completion unit is used for completing the mobile signaling data missing the basic information field through a basic information table or a statistical method.
The trajectory data generation module comprises:
and the memory storage unit is used for always storing the latest mobile signaling data of the user in the memory.
And the stop point judging unit is used for comparing the user number, the time information and the base station position information of the newly acquired mobile signaling data with the mobile signaling data stored in the memory, and judging the base station as a stop point if the user activity range stays in a certain base station area for more than a certain limited time.
And the effective track behavior calculation unit is used for taking two continuous adjacent stop points of the user as one-time effective track behavior of the user, wherein the one-time effective track behavior comprises starting base station information, starting time, ending base station information, current base station residence time information and a communication behavior event.
And the moving track generating unit is used for combining all the primary effective track behaviors of the user according to time to obtain moving track data of the user and outputting the moving track data to the message buffer queue Kafka.
The base station information acquisition module comprises:
and the closed area generating unit is used for forming a closed area through a longitude and latitude coordinate set of a plurality of vertexes of the target monitoring area.
And the comparison unit is used for traversing the base station basic information table by using a ray algorithm and judging whether the longitude and latitude point of each base station is in the target monitoring area range.
And the base station information table generating unit is used for outputting and storing the information of the base stations in the target monitoring area range in the relational database Mysql to form a base station information table representing the base station information of the target monitoring area.
The target area user discovery module comprises:
and the loading unit is used for creating a Flink real-time streaming type calculation program, loading the base station information table to the memory, and consuming the moving track data in the message cache queue Kafka in real time.
And the matching unit is used for judging whether the user number enters the target monitoring area by comparing whether the base station information in the moving track data is matched with the base station information table.
And the personnel behavior table generation unit in the target area is used for filtering the movement track data corresponding to the unmatched user numbers and outputting the movement track data corresponding to the matched user numbers to the relational database Mysql to obtain the personnel behavior table in the target area, which represents the movement track data of the users in the target monitoring area.
The illegal mobile phone identification module comprises:
and the communication behavior acquisition unit is used for acquiring the communication behavior in the target monitoring area range according to the type of the communication behavior event of the movement track data of the user in the target monitoring area and the communication state behavior of the identification number.
And the secondary matching unit is used for matching the communication behavior in the target monitoring area range with the set abnormal communication behavior rule and outputting the user number and the communication behavior event meeting the abnormal communication behavior rule to a personnel abnormal behavior table in the target area in the relational database Mysql.
And the illegal mobile phone identification module unit is used for periodically reading the personnel behavior table in the target area and the user number of the abnormal behavior table of the personnel in the target area, identifying the finding and abnormal behaviors of the illegal mobile phone in the target monitoring area range, and outputting the illegal user number and the illegal behaviors.
The invention generates the movement track data of the user in real time based on the original mobile signaling data, constructs a model for discovering illegal mobile phone behaviors, realizes the real-time mobile phone user discovery and abnormal behavior identification on the target monitoring area, outputs a target area mobile phone user information table and a target area mobile phone user abnormal behavior information table, and effectively supports the follow-up monitoring and early warning of illegal mobile phone user behaviors in the area.
According to the invention, through mobile signaling data, the mobile phone identification and illegal behavior discovery in a user-defined specific target monitoring area are realized, video monitoring equipment and wireless signal spectrum monitoring equipment are not required to be arranged, the monitoring range and the extensibility of the target area are expanded, and illegal mobile phone behaviors are flexibly monitored and early warned according to the definition of the illegal behaviors.
The device provided by the embodiment of the present invention has the same implementation principle and technical effect as the method embodiment 1, and for the sake of brief description, reference may be made to the corresponding content in the method embodiment 1 for the part where the embodiment of the device is not mentioned. It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the apparatus and the unit described above may all refer to the corresponding processes in the above method embodiment 1, and are not described herein again.
Example 3:
the method of the embodiment 1 provided by the present invention can implement the service logic through a computer program and record the service logic on a storage medium, and the storage medium can be read and executed by a computer, so as to implement the effect of the solution described in the embodiment 1 of the present specification. Accordingly, the present invention also provides a computer readable storage medium for demographics, comprising a memory for storing processor-executable instructions that, when executed by a processor, implement steps comprising the method of illegal use handset identification of embodiment 1.
The storage medium may include a physical device for storing information, and typically, the information is digitized and stored using an electrical, magnetic, or optical media. The storage medium may include: devices that store information using electrical energy, such as various types of memory, e.g., RAM, ROM, etc.; devices that store information using magnetic energy such as hard disks, floppy disks, tapes, core memories, bubble memories, and usb disks; devices that store information optically, such as CDs or DVDs. Of course, there are other ways of storing media that can be read, such as quantum memory, graphene memory, and so forth.
The above description of the storage medium according to method embodiment 1 may also include other implementation manners, the implementation principle and the generated technical effect of this embodiment are the same as those of method embodiment 1, and reference may be specifically made to the description of related method embodiment 1, which is not repeated here.
Example 4:
the invention also provides a device for demographics, which can be a stand-alone computer, and can also comprise an actual operation device using one or more methods or one or more embodiment devices of the specification and the like. The demographic device may include at least one processor and a memory storing computer-executable instructions that, when executed by the processor, implement the steps of the method for identifying an offending mobile phone as described in any one or more of embodiments 1 above.
The above-described device may also include other implementation manners according to the description of method embodiment 1, the implementation principle and the generated technical effect of this embodiment are the same as those of method embodiment 1, and specific reference may be made to the description of related method embodiment 1, which is not described in detail herein.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present invention, which are used for illustrating the technical solutions of the present invention and not for limiting the same, and the protection scope of the present invention is not limited thereto, although the present invention is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: those skilled in the art can still make modifications or changes to the embodiments described in the foregoing embodiments, or make equivalent substitutions for some features, within the scope of the disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present invention. Are intended to be covered by the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A method for identifying illegal use of a mobile phone, comprising the following steps:
preprocessing mobile signaling data acquired in real time to obtain preprocessed mobile signaling data;
acquiring the movement track data of a user according to the preprocessed movement signaling data;
acquiring base station information of a target monitoring area;
judging whether the user number enters the target monitoring area or not according to the moving track data of the user and the base station information of the target monitoring area to obtain the moving track data of the user in the target monitoring area;
and matching the movement track data of the user in the target monitoring area with the set abnormal communication behavior rule to obtain the number of the illegal user.
2. The method for identifying an illegally-used mobile phone according to claim 1, wherein the preprocessing the mobile signaling data collected in real time to obtain the preprocessed mobile signaling data comprises:
real-time access is carried out on the real-time collected mobile signaling data;
removing the mobile signaling data missing multiple fields and the repeated mobile signaling data;
and completing the mobile signaling data missing the basic information field through a basic information table or a statistical method.
3. The method for identifying the illegal mobile phone according to claim 2, wherein the step of acquiring the movement track data of the user according to the preprocessed movement signaling data comprises the following steps:
always storing the latest mobile signaling data of the user in a memory;
comparing the user number, time information and base station position information of the newly acquired mobile signaling data with the mobile signaling data stored in the memory, and if the user activity range stays in a certain base station area for more than a certain limited time, judging the base station as a staying point;
taking two continuous adjacent stopover points of a user as a primary effective track behavior of the user, wherein the primary effective track behavior comprises starting base station information, starting time, ending base station information, current base station residence time information and a communication behavior event;
and combining all the one-time effective track behaviors of the user according to time to obtain the moving track data of the user, and outputting the moving track data to a message buffer queue Kafka.
4. The method for identifying the illegal mobile phone according to claim 3, wherein the obtaining of the base station information of the target monitoring area comprises:
forming a closed area through a longitude and latitude coordinate set of a plurality of vertexes of the target monitoring area;
traversing the base station basic information table by using a ray algorithm, and judging whether the longitude and latitude point of each base station is in the range of a target monitoring area;
and outputting and storing the information of the base station in the range of the target monitoring area in a relational database Mysql to form a base station information table representing the base station information of the target monitoring area.
5. The method for identifying the illegally-used mobile phone according to claim 4, wherein the step of judging whether the user number enters the target monitoring area or not according to the moving track data of the user and the base station information of the target monitoring area to obtain the moving track data of the user in the target monitoring area comprises the following steps:
creating a Flink real-time streaming type calculation program, loading the base station information table to a memory, and consuming the moving track data in the message cache queue Kafka in real time;
judging whether the user number enters a target monitoring area or not by comparing whether the base station information in the moving track data is matched with the base station information table or not;
and filtering the movement track data corresponding to the unmatched user numbers, and outputting the movement track data corresponding to the matched user numbers to a relational database Mysql to obtain a personnel behavior table in the target area representing the movement track data of the users in the target monitoring area.
6. The method for identifying the illegal mobile phone according to claim 5, wherein the step of matching the movement track data of the user in the target monitoring area with the set abnormal communication behavior rule to obtain the number of the illegal user comprises the following steps:
obtaining communication behaviors in the target monitoring area range according to the type of the communication behavior event of the movement track data of the user in the target monitoring area and the communication state behaviors of the identification numbers;
matching the communication behavior in the target monitoring area range with a set abnormal communication behavior rule, and outputting the user number and the communication behavior event meeting the abnormal communication behavior rule to a personnel abnormal behavior table in the target area in a relational database Mysql;
and periodically reading the personnel behavior table in the target area and the user number of the abnormal behavior table of the personnel in the target area, identifying the finding and abnormal behaviors of the illegal mobile phone in the target monitoring area, and outputting the illegal user number and the illegal behaviors.
7. An illegal use mobile phone recognition device, comprising:
the data preprocessing module is used for preprocessing the mobile signaling data acquired in real time to obtain preprocessed mobile signaling data;
the track data generation module is used for acquiring the moving track data of the user according to the preprocessed moving signaling data;
the base station information acquisition module is used for acquiring the base station information of the target monitoring area;
the target area user discovery module is used for judging whether the user number enters the target monitoring area or not according to the movement track data of the user and the base station information of the target monitoring area to obtain the movement track data of the user in the target monitoring area;
and the illegal mobile phone identification module is used for matching the movement track data of the user in the target monitoring area with the set abnormal communication behavior rule to obtain the illegal user number.
8. The illegal-use mobile phone recognition device according to claim 7, wherein the data preprocessing module comprises:
the data acquisition unit is used for accessing the real-time acquisition mobile signaling data in real time;
the data removing unit is used for removing the mobile signaling data missing multiple fields and the repeated mobile signaling data;
and the data completion unit is used for completing the mobile signaling data missing the basic information field through a basic information table or a statistical method.
9. A computer-readable storage medium for demographics, comprising a memory for storing processor-executable instructions that, when executed by the processor, perform steps comprising the method for identifying illicit use of a handset as recited in any of claims 1-6.
10. An apparatus for demographics, comprising at least one processor and a memory storing computer-executable instructions, which when executed by the processor implement the steps of the method of illegal use of cell phone identification according to any one of claims 1-6.
CN202211080011.6A 2022-09-05 2022-09-05 Method, device, medium and equipment for identifying illegal use of mobile phone Pending CN115460548A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211080011.6A CN115460548A (en) 2022-09-05 2022-09-05 Method, device, medium and equipment for identifying illegal use of mobile phone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211080011.6A CN115460548A (en) 2022-09-05 2022-09-05 Method, device, medium and equipment for identifying illegal use of mobile phone

Publications (1)

Publication Number Publication Date
CN115460548A true CN115460548A (en) 2022-12-09

Family

ID=84303405

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211080011.6A Pending CN115460548A (en) 2022-09-05 2022-09-05 Method, device, medium and equipment for identifying illegal use of mobile phone

Country Status (1)

Country Link
CN (1) CN115460548A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116249084A (en) * 2023-03-24 2023-06-09 北京大也智慧数据科技服务有限公司 Method, device, storage medium and equipment for identifying stealth organizer

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116249084A (en) * 2023-03-24 2023-06-09 北京大也智慧数据科技服务有限公司 Method, device, storage medium and equipment for identifying stealth organizer

Similar Documents

Publication Publication Date Title
US9165288B2 (en) Inferring relationships based on geo-temporal data other than telecommunications
CN109104438B (en) Botnet early warning method and device in narrow-band Internet of things and readable storage medium
CN104348650A (en) Website monitoring method, business device and website monitoring system
US9179259B2 (en) Recognizing unknown actors based on wireless behavior
CN111080501B (en) Real crowd density space-time distribution estimation method based on mobile phone signaling data
CN108271157B (en) Pseudo base station identification method and device
CN115460548A (en) Method, device, medium and equipment for identifying illegal use of mobile phone
Zhang et al. Comprehensive IoT SIM card anomaly detection algorithm based on big data
CN111212381B (en) Mobile user behavior data analysis method and device, computer equipment and medium
CN103458453A (en) Network analyzing method, network analyzing device and network analyzing system
CN115334560B (en) Base station abnormality monitoring method, device, equipment and computer readable storage medium
Bessho et al. Sensing Street-level Crowd Density by Observing Public Bluetooth Low Energy Advertisements from Contact Tracing Applications
CN116345689A (en) Secondary equipment monitoring method, device, computer equipment and storage medium
CN110807014A (en) Cross validation based station data anomaly discrimination method and device
CN106878948B (en) Signal blind spot positioning method and system
CN115913652A (en) Abnormal access behavior detection method and device, electronic equipment and readable storage medium
EP3563592B1 (en) Method for determining the mobility status of a user of a wireless communication network
CN102075990A (en) Large-area base station out-of-service alarm monitoring method and system
CN101029926B (en) Mobile-object tracking method
CN114490560A (en) Full-boundary power network data analysis method based on artificial intelligence technology
CN114036711A (en) Network quality degradation detection method and system
CN107770734B (en) Method and device for identifying mobile subscriber permanent station
KR20210030761A (en) Method for monitoring wireless network quality and apparatus therefor
CN108495268B (en) Security method and platform for sensitive area
CN111405504B (en) Halt number detection method and system based on mobile communication network attachment signaling

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination