WO2018133284A1 - Prompting method, terminal, and server - Google Patents

Prompting method, terminal, and server Download PDF

Info

Publication number
WO2018133284A1
WO2018133284A1 PCT/CN2017/086643 CN2017086643W WO2018133284A1 WO 2018133284 A1 WO2018133284 A1 WO 2018133284A1 CN 2017086643 W CN2017086643 W CN 2017086643W WO 2018133284 A1 WO2018133284 A1 WO 2018133284A1
Authority
WO
WIPO (PCT)
Prior art keywords
base station
information
terminal
server
pseudo base
Prior art date
Application number
PCT/CN2017/086643
Other languages
French (fr)
Chinese (zh)
Inventor
朱振华
张小菊
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201780005192.7A priority Critical patent/CN108513717B/en
Publication of WO2018133284A1 publication Critical patent/WO2018133284A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Definitions

  • the present application relates to the field of communications, and in particular, to a prompting method, a terminal, and a server.
  • a method of generally identifying a pseudo base station is a method of identifying a pseudo base station by comparing a base station characteristic parameter with a terminal and a method of identifying a pseudo base station based on a base station position.
  • the method for identifying a pseudo base station by comparing the characteristics of the base station with the terminal is: the terminal parses the characteristic parameter of the base station, and matches the locally preset feature parameter database, and if it is within the legal range, it is considered to be a legal base station. Otherwise, it is considered to be a pseudo base station, and the pseudo base station is directly blocked from the terminal.
  • the decision logic relies entirely on the terminal and cannot be upgraded. With the development of the pseudo base station technology, some characteristic parameters can also be adjusted, but the terminal cannot be obtained dynamically, which easily leads to misjudgment.
  • the method for identifying the pseudo base station based on the location of the base station is: when the terminal receives the notification type short message, the short message and the terminal location information are reported to the server.
  • the server performs calculation based on the information reported by a large number of terminals, obtains the base station information in a certain area, and then compares with the location in the carrier base station library, and is not considered as a pseudo base station in the carrier base station library.
  • a judgment method only has a risk for judging a notification type message, and the pseudo base station can construct an arbitrary number, so the sent short messages are not necessarily notification type short messages; the operator itself also has a mobile base station, which is aligned from the position alone. It is not completely reliable; in addition, the location of the base station reported by the terminal is obtained by algorithm calculation, and there is an error in itself.
  • the embodiment of the present application provides a prompting method, a terminal, and a server, which are used by a server to obtain information of a real base station with higher accuracy and information of a pseudo base station according to big data reported by multiple terminals.
  • a first aspect of the embodiments of the present application provides a prompting method, where the method may be applied to a scenario in which a server is connected to multiple terminals, and the method may include: the server receives information of events sent by multiple terminals; the event may be Receiving a short message and/or an incoming call; it should be understood that the information of the event may be information of an event reported by the terminal receiving a certain threshold of the server, or may be information that the server receives a certain threshold number of events, or may be, the server receives the pre- The information of the event reported by the terminal within the duration is not limited herein.
  • the server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  • the server can perform calculation according to the big data reported by multiple terminals, and the accuracy of the obtained real base station information and the pseudo base station information is relatively high. It should be understood that although the more data reported by the terminal, the more accurate the information of the real base station and the information of the pseudo base station acquired by the server, these need to be within the load range of the server.
  • the server obtains the information of the real base station and the information of the pseudo base station. If the target terminal accessing the pseudo base station is determined, the information about the first event reported by the first terminal may be determined next time, and the authenticity of the first base station accessed by the first terminal may be determined.
  • the method may further include: the server, according to information of the real base station, and the pseudo base station And determining, by the information, a target terminal that accesses the pseudo base station among the plurality of terminals; and the server sends the indication information of the pseudo base station to the target terminal.
  • the indication information of the pseudo base station may be sent to the target terminal, and the indication information of the pseudo base station is used for prompting the target terminal, so that the user is alert to the event occurring on the target terminal, and is careful to be fooled. Being cheated.
  • the information of the event includes a terminal identifier, and location information of the terminal.
  • the information of the event may also include a short message content and/or a caller number. It should be understood that the information of the event includes, but is not limited to, the information mentioned above, and the information of the event may be used by the server to perform calculation of big data, and obtain information of the real base station and information of the pseudo base station.
  • the server acquires a real base station according to information about events sent by the multiple terminals.
  • the information may include: the server determining, according to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurs, the time when the event occurs, and the preset location calculation accuracy.
  • the server deletes, from the information about the initial base station of the longitude, latitude, and date, the information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold; where the first threshold may be an empirical value, or may be based on Set according to the actual situation.
  • the server removes the date, and the information of the other initial base stations are combined to obtain information about the longitude and latitude of the screening base station; and the server determines that the information of the screening base station is the information of the real base station.
  • an implementation manner of acquiring information of a real base station is provided, which increases the feasibility of the solution.
  • the server acquires a pseudo base station according to information about events sent by the multiple terminals.
  • the information may include: that is, the server utilizes the characteristics of the pseudo base station movement (movable, suddenly appears and disappears), and identifies potential pseudo base stations. Determining, by the server, location information of the terminal that the target base station accesses at the first time according to the location information of the terminal that is sent by the multiple terminals, the information of the base station that is accessed when the event occurs, and the time when the event occurs.
  • the location information of the terminal accessed at the second time, the target base station is any base station that is accessed when the multiple terminals generate the event; the server is according to the terminal that the target base station accesses at the first time The location information is calculated, the first central location of the accessed terminal is calculated, and the second central location of the accessed terminal is calculated according to the location information of the terminal accessed by the target base station at the second time; the server determines the Determining, by the first central location, a first location of the target base station, determining that the second central location is a second location of the target base station; and determining an absolute value of a difference between the first location and the second location If the value is greater than the second threshold, the server determines that the information of the target base station is information of the pseudo base station.
  • an implementation manner of acquiring information of a real pseudo base station is provided, which increases the feasibility of the solution.
  • the method may further include: The server marks the suspicious probability of the real base station and the pseudo base station; the server may mark the suspicious probability of the real base station as 0, and the suspicious probability of the pseudo base station is marked as 100%, or may be marked according to actual conditions.
  • the server receives the feedback information sent by the first target terminal, where the feedback information is input information that is input by the user, whether the base station that is accessed when the event occurs when the first target terminal is the pseudo base station is accurate;
  • the target terminal may prompt the indication information of the pseudo base station, and the target terminal receives the feedback information input by the user, and the target terminal that receives the feedback information may be referred to as the first
  • the target terminal reports the feedback information to the server.
  • the server correspondingly modifies the suspicious probability of the pseudo base station according to the feedback information, and obtains a modified suspicious probability of the pseudo base station.
  • the information of the saved real base station and the information of the pseudo base station are updated, so that the information of the saved real base station and the information of the pseudo base station are the latest records.
  • the server may modify the saved information of the real base station and the suspicious probability of the information of the pseudo base station, thereby updating the information of the real base station and the information of the pseudo base station.
  • the server may determine, according to the updated information of the real base station and the information of the pseudo base station, whether the first base station accessed by the terminal when the first event occurs is a pseudo base station. In this way, the accuracy of the result judged based on the real-time updated real base station information and the pseudo base station information is higher.
  • the method may further include: determining, by the server, a suspicious probability
  • the information of the base station that is greater than the third threshold is the information of the target pseudo base station, and the information of the base station whose suspicious probability is less than the fourth threshold is the information of the target real base station;
  • the information of the target real base station and the information of the target pseudo base station include but are not limited to (cell) Identification, CID), location area code (LAC), signal strength, difference between acquisition time and reporting time.
  • the server performs model training according to the information of the target pseudo base station and the information of the target real base station, and obtains reference weights of respective features included in the information of the base station.
  • the information of the first base station in the information of the first event reported by the first terminal may be calculated to obtain the first base station.
  • the target suspicious probability, and thus the authenticity of the first base station provides an implementation manner for determining whether the first base station is a real base station or a pseudo base station, so that the embodiment of the present application is more perfect.
  • the method may further include: the server receiving the first The information of the first event sent by the terminal, the information of the first event may include information of the first base station that is accessed when the first event occurs; if the information of the first base station is in the information of the pseudo base station And the server sends the indication information of the pseudo base station to the first terminal.
  • the information of the first event includes, but is not limited to, the information mentioned above.
  • the information of the first event may further include the first terminal identifier, location information of the first terminal, and a time when the first event occurs.
  • an implementation manner of determining a pseudo base station may determine, according to the previously calculated information of the real base station and the information of the pseudo base station, whether the information of the first base station is located therein. If the first base station is in the information of the pseudo base station, the first base station is a pseudo base station, then the server may send the indication information of the pseudo base station to the first terminal, and the information of the pseudo base station calculated according to the big data and the real base station.
  • the accuracy rate is relatively high, so the accuracy of determining the first base station as a pseudo base station is also relatively high.
  • the method may further include: if the information of the first base station is not in the information of the pseudo base station, the server, according to the information of the first event, and the base station The reference weight of each feature included in the information determines a target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the server determines that the first base station is a pseudo base station; The server sends the indication information of the pseudo base station to the first terminal.
  • the reference base weight of each feature in the information of the base station is used to calculate whether the first base station is a pseudo base station, which is an optional implementation manner.
  • the event may include: receiving a short message and/or an incoming call; the information of the event may further include: a content of the short message and/or a number of the incoming call.
  • a second aspect of the embodiments of the present application provides a prompting method, which may include: detecting, by a terminal, an event occurrence and collecting information of the event; the terminal sending information of the event to a server; if multiple terminals send an event to a server Then, the server can obtain the information of the real base station and the information of the pseudo base station according to the information of the event sent by the multiple terminals, so that it can be determined whether the terminal access is a pseudo base station.
  • the terminal receives the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event; and the terminal prompts the indication information of the pseudo base station. If the terminal prompts the indication information of the pseudo base station, the user can be alerted to the event occurring on the target terminal, and be careful to be deceived.
  • the information about the event may include the terminal identifier, location information of the terminal, and the event occurs.
  • the information of the event may also include a short message content and/or a caller number. It should be understood that the information of the event includes, but is not limited to, the information mentioned above, and the information of the event may be used by the server to perform calculation of big data, and obtain information of the real base station and information of the pseudo base station.
  • the method may further include: receiving, by the terminal, feedback information
  • the feedback information is input information input by the user to the base station that is accessed when the terminal occurs when the event occurs, and the terminal information is accurate; the terminal sends the feedback information to the server, the feedback The information is used by the server to modify the suspicious probability of the pseudo base station. It should be understood that, assuming that the terminal receiving the feedback information here is referred to as a first target terminal.
  • the server may modify the saved information of the real base station and the suspicious probability of the information of the pseudo base station, thereby updating the information of the real base station and the information of the pseudo base station. . Therefore, when the server receives the information of the first event reported by the first terminal, the server may determine, according to the updated information of the real base station and the information of the pseudo base station, whether the first base station accessed by the terminal when the first event occurs is a pseudo base station. Thus, the accuracy of the result judged based on the real-time updated real base station information and the pseudo base station information is higher.
  • the terminal The indication information of the pseudo base station may be: the terminal displays the indication information of the pseudo base station by using a text; and/or the terminal displays the indication information of the pseudo base station by using a danger identifier; and/or The terminal prompts the indication information of the pseudo base station by voice. It is to be noted that the terminal displays the information of the event by using an application interface corresponding to the event, where the information of the event may include a short message content and/or an incoming call number, and may prompt the prompt information of the pseudo base station on the application interface. . Should The interface can be an SMS interface or an incoming call interface.
  • the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: a content of the short message and/or a number of the incoming call.
  • a third aspect of the embodiments of the present application provides a server, which has a function of implementing information corresponding to the acquired real base station and information of the pseudo base station provided by the foregoing first aspect.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a fourth aspect of the embodiments of the present application provides a terminal, which has a function of implementing indication information corresponding to the prompting pseudo base station provided by the foregoing second aspect.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a fifth aspect of the embodiments of the present application provides a server, which may include: a transceiver, a processor, a memory, and a bus, where the transceiver, the processor, and the memory are connected by using the bus;
  • the memory is configured to store an operation instruction
  • the transceiver is configured to receive information about events sent by multiple terminals;
  • the processor is configured to invoke the operation instruction, and acquire information of a real base station and information of a pseudo base station according to information of an event sent by the multiple terminals.
  • the processor is further configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals;
  • the transceiver is further configured to send indication information of the pseudo base station to the target terminal.
  • the information of the event includes a terminal identifier, location information of the terminal, information of a base station accessed when the event occurs, and a time when the event occurs.
  • the processor is specifically configured to perform the following steps:
  • an initial base station regarding longitude, latitude, and date according to location information of the terminal transmitted by the plurality of terminals, information of a base station accessed when the event occurs, a time when the event occurs, and preset position calculation accuracy Information from the initial base station on the longitude, latitude, and date, deleting information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold; removing the date, and combining information of other initial base stations to obtain Information about screening base stations for longitude and latitude; determining information of the screening base station as information of a real base station.
  • the processor is specifically configured to perform the following steps:
  • Determining location information and a second time of the terminal accessed by the target base station at the first time according to the location information of the terminal that is sent by the multiple terminals, the information of the base station that is accessed when the event occurs, and the time when the event occurs.
  • the location information of the accessed terminal, the target base station is any base station that is accessed when the multiple terminals generate the event; and the location information of the terminal accessed by the target base station at the first time is calculated and connected.
  • a first central location of the incoming terminal calculating a second central location of the accessed terminal according to the location information of the terminal accessed by the target base station at the second time; determining that the first central location is the target base station a first location, determining that the second central location is a second location of the target base station; if the absolute value of the difference between the first location and the second location is greater than a second threshold, the processing The device determines that the information of the target base station is information of a pseudo base station.
  • the processor is further configured to: perform marking: suspicious probability of the real base station and the pseudo base station; and correspondingly modify a suspicious probability of the pseudo base station according to the feedback information, The modified suspicious probability of the pseudo base station;
  • the transceiver is further configured to: receive feedback information sent by the first target terminal, where the feedback information is an indication that the base station that is accessed by the user when the event occurs when the first target terminal occurs is a pseudo base station Whether the information is entered accurately.
  • the processor is further configured to perform the following steps:
  • Determining information of the base station whose suspicious probability is greater than the third threshold is information of the target pseudo base station, and information of the base station whose suspicious probability is less than the fourth threshold is information of the target real base station; according to the information of the target pseudo base station and the target real base station Information, model training, and reference weights of various features included in the information of the base station.
  • the transceiver is further configured to perform the following steps:
  • the transceiver sends the indication information of the pseudo base station to the first terminal.
  • the processor is further configured to perform the following steps:
  • the processor module determines, according to the information of the first event and the reference weight of each feature included in the information of the base station, a target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the processor determines that the first base station is a pseudo base station;
  • the transceiver is further configured to: send the indication information of the pseudo base station to the first terminal.
  • the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: the content of the short message and/or the number of the incoming call.
  • a sixth aspect of the embodiments of the present application provides a terminal, which may include: a processor, a communication interface, a memory, an output unit, and a bus, wherein the processor, the communication interface, the output unit, and the memory pass through the bus connection;
  • the memory is configured to store an operation instruction
  • the processor is configured to invoke the operation instruction, detect an event occurrence, and collect information about the event;
  • the communication interface is configured to send the information of the event to the server, and receive the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event;
  • the output unit is configured to prompt indication information of the pseudo base station.
  • the information of the event includes the identifier of the terminal, location information of the terminal, information of a base station accessed when the event occurs, time when the event occurs, and prompting the pseudo base station Instructions.
  • the terminal further includes an input unit, where the input unit is further configured to receive feedback information, where the feedback information is a base station that is input by the user when the event occurs when the terminal occurs. Whether the indication information of the pseudo base station is accurate input information;
  • the communication interface is further configured to send the feedback information to the server, where the feedback information is used by the server to modify a suspicious probability of the pseudo base station.
  • the output unit includes a display unit, and the display unit is configured to display indication information of the pseudo base station by text.
  • the output unit includes a display unit, and the display unit is configured to display indication information of the pseudo base station by a danger identifier.
  • the output unit comprises an audio circuit
  • the audio circuit is configured to prompt the indication information of the pseudo base station by voice.
  • a seventh aspect of the present application provides a communication system, where the communication system includes a server and a terminal, and the server is a server that is implemented in the foregoing implementation manner of the first aspect or the optional implementation of the first aspect;
  • the terminal is a terminal that is implemented in the second aspect of the present application or any of the alternative implementations of the second aspect.
  • An eighth aspect of the embodiments of the present invention provides a storage medium.
  • the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be implemented by software.
  • the computer software product is stored in a storage medium for storing computer software instructions for use in the above apparatus, comprising: a server for performing the first aspect, the second aspect, the third aspect or the fourth aspect described above Or the program designed by the terminal.
  • the storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes.
  • a ninth aspect of the embodiments of the present invention provides a computer program product comprising instructions, which when executed on a computer, cause the computer to perform the method as described in the first aspect of the present application or any alternative implementation of the first aspect.
  • a tenth aspect of the embodiments of the present invention provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method as described in the second aspect of the present application or any alternative implementation of the second aspect.
  • the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by the multiple terminals. Therefore, the accuracy of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives the information of the event sent by the multiple terminals, and the information of the event may include the identifier of the terminal, the location information of the terminal, the information of the base station that is accessed when the event occurs, and the time when the event occurs. The server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  • the server may further determine, according to the information of the real base station and the information of the pseudo base station, the target terminal that accesses the pseudo base station among the multiple terminals, and send the indication information of the pseudo base station to the target terminal, so that the user causes an event occurring on the target terminal. Be alert, be careful to be deceived.
  • FIG. 1 is a frame diagram of a communication system applied in an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a scenario applied in an embodiment of the present application.
  • FIG. 3 is a schematic diagram of an embodiment of a prompting method in an embodiment of the present application.
  • FIG. 4(a) is a schematic diagram of a terminal receiving a short message interface display according to an embodiment of the present application.
  • FIG. 4(b) is a schematic diagram of a terminal receiving an incoming call interface display according to an embodiment of the present application
  • FIG. 4(c) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(d) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(e) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(f) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(g) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(h) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(i) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(j) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • 4(k) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(1) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(m) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(n) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(o) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(p) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 5 is a schematic diagram of another embodiment of a prompting method in an embodiment of the present application.
  • FIG. 6(a) is a schematic diagram of a terminal displaying input feedback information on a short message interface according to an embodiment of the present application
  • FIG. 6(b) is another schematic diagram of the terminal displaying input feedback information on the short message interface in the embodiment of the present application.
  • FIG. 6(c) is a schematic diagram of the terminal displaying input feedback information on the incoming call interface in the embodiment of the present application.
  • 6(d) is another schematic diagram of the terminal displaying input feedback information on the incoming call interface in the embodiment of the present application.
  • FIG. 7 is a schematic diagram of another embodiment of a prompting method in an embodiment of the present application.
  • FIG. 8 is a schematic diagram of another embodiment of a prompting method in an embodiment of the present application.
  • FIG. 9(a) is a schematic diagram of an embodiment of a server in an embodiment of the present application.
  • FIG. 9(b) is a schematic diagram of an embodiment of a server in an embodiment of the present application.
  • FIG. 9(c) is a schematic diagram of an embodiment of a server in an embodiment of the present application.
  • FIG. 9(d) is a schematic diagram of an embodiment of a server in an embodiment of the present application.
  • FIG. 10 is a schematic diagram of an embodiment of a terminal in an embodiment of the present application.
  • FIG. 11 is a schematic diagram of another embodiment of a server in an embodiment of the present application.
  • FIG. 12 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the method for identifying a pseudo base station by using a terminal to compare base station characteristic parameters is as follows: when the terminal accesses the base station, parsing characteristic parameters of the base station, including a cell identifier or a cell identification (CID) called a base station, Location area code (LAC) and system information.
  • CID cell identification
  • LAC Location area code
  • the feature parameters are then matched to a locally preset parameter library, which is considered a legitimate base station if it is within the legal range. Otherwise, it is considered to be a pseudo base station, and the pseudo base station is directly blocked from the terminal.
  • the judgment logic of the method is directly preset on the terminal chip, and the terminal device can be directly shielded from accessing the base station after the judgment. However, the decision logic relies entirely on the terminal and cannot be upgraded. With pseudo base station technology Some characteristic parameters of the development of the technique can also be adjusted, but the terminal cannot be obtained dynamically, which is easy to cause misjudgment.
  • the method for identifying the pseudo base station based on the location of the base station is that the notification is only for the notification type message, and the pseudo base station can construct any number not necessarily the notification type short message; the operator itself also has the mobile base station, and the position comparison is not It is completely reliable; in addition, the location of the base station reported by the device side is obtained by algorithm calculation, and there is an error in itself.
  • the technical solution of the present application mainly solves the problem of the accuracy of the judgment caused by the failure of the local parameter database to be updated in time, and the judgment accuracy rate caused by the source of the data report being limited to the notification type short message and the operator mobile base station when using the server for judgment. .
  • the communication system framework diagram applied in the embodiment of the present application is as shown in FIG. 1, and the communication system may include a terminal and a server.
  • FIG. 2 a schematic diagram of a scenario applied by an embodiment of the present application, a legal base station that can be accessed by a terminal in the A area has a base station 2, and a correct base station that can be accessed in the B area has a base station 2, 3, and 4.
  • the server may receive the information of the event reported by the terminal, and the information of the event may include the identifier of the terminal, the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs.
  • the event may be receiving a text message or receiving an incoming call.
  • the server determining, according to the information of the real base station and the information of the pseudo base station, the access pseudo in the large number of terminals. a target terminal of the base station; the server transmitting indication information of the pseudo base station to the target terminal.
  • the server may further determine, according to the determined information of the real base station and the information of the pseudo base station, the target terminal in which the access base station is the pseudo base station, and send the indication information of the pseudo base station to the target terminal, so that the user occurs on the terminal. The incident caused vigilance and was carefully deceived.
  • the server may further improve the suspicious probability of the pseudo base station, update the information of the real base station, and the information of the pseudo base station by using the characteristics of the pseudo base station movement, combined with the feedback information of the terminal, so that the server receives the first terminal next time.
  • the information about the real base station and the information of the pseudo base station may be used to determine whether the first base station accessed by the terminal when the first event occurs is a pseudo base station, such that the real base station according to the real-time update
  • the information and the information of the pseudo base station determine the accuracy of the result.
  • the server may further select, according to the suspicious probability corresponding to the information of the real base station and the information of the pseudo base station, the information of the base station with the highest suspicious probability as the positive example, and the information of the base station with the lowest suspicious probability as the negative example.
  • Model training is performed to obtain reference weights of respective features included in the information of each base station.
  • the reference weights of the respective features may be used when the server receives the information of the first event reported by the first terminal, and according to the reference weight of each feature and the information of the first event, calculate the access time when the first event occurs.
  • the target probability of a base station may be used when the server receives the information of the first event reported by the first terminal, and according to the reference weight of each feature and the information of the first event, calculate the access time when the first event occurs.
  • the server determines that the first base station is a real base station; if the target probability is less than or equal to the preset threshold, the server determines that the first base station is a pseudo base station, and the server sends the indication information of the pseudo base station to the terminal. In this way, the server can calculate whether the first base station accessed by the newly received terminal of the server is a pseudo base station according to the reference weight of each feature and the information of the first event, and provide another method for determining the pseudo base station.
  • the implementation method increases the feasibility of the scheme.
  • FIG. 3 it is a schematic diagram of an embodiment of a prompting method in an embodiment of the present application, including:
  • the server receives information about events sent by multiple terminals.
  • the terminal before the server receives the information of the event sent by the multiple terminals, the terminal generates a detection event and collects information about the event, where the information of the event may include the terminal identifier (International Mobile Equipment Identity, The IMEI), the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs, the time at which the event occurs may also be referred to as a timestamp.
  • the terminal sends the information of the event to the server, it being understood that the event may include receiving a text message and/or receiving an incoming call.
  • the information of the event may also include information such as the content of the short message and/or the number of the incoming call.
  • the terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, etc.
  • the terminal may be a mobile phone.
  • FIG. 4( a ) a schematic diagram of the mobile phone receiving the short message interface display.
  • FIG. 4(b) a schematic diagram of receiving an incoming call interface for a mobile phone.
  • the location information of the terminal may be obtained by using a Global Positioning System (GPS) to obtain latitude and longitude, or using a network to calculate latitude and longitude.
  • the location information of the terminal may include, but is not limited to, latitude and longitude, a Wireless Fidelity (WiFi) wireless access point's physical address (Basic Service Set identifier, BSSID) / a wireless access point identifier or a service set identifier ( Service Set Identifier (SSID)/Medium Access Control address (MAC addr)/Network ID (Network ID), information such as the currently scanned WiFi SSID.
  • WiFi Wireless Fidelity
  • BSSID Base Service Set identifier
  • MAC addr Service Set Identifier
  • Network ID Network ID
  • the information of the base station that is accessed when the event occurs may include the sector identifier of the base station, and may also be referred to as a cell identification (CID), a LAC, an adjacent CID, and may also include information such as signal strength and cell information.
  • CID cell identification
  • LAC LAC
  • adjacent CID information such as signal strength and cell information.
  • the information of the base stations that are accessed when multiple terminals generate events may be the same or different, and the time of occurrence of the events may be the same or different. It is also possible that the same terminal transmits information of multiple events, and the information of the multiple events may be the same or different, and is determined by the information of the event actually collected by the terminal.
  • the server acquires information about a real base station and information of a pseudo base station according to information about events sent by the multiple terminals.
  • the server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  • the server can obtain information of the real base station and information of the pseudo base station by calculation of big data.
  • the server may set a quantity threshold, and when the number of terminals receiving the information of the sending event exceeds the quantity threshold, the server may obtain the real information according to the information of the event sent by the terminal exceeding the quantity threshold.
  • Information of the base station and information of the pseudo base station may be set a quantity threshold, and when the number of terminals receiving the information of the sending event exceeds the quantity threshold, the server may obtain the real information according to the information of the event sent by the terminal exceeding the quantity threshold.
  • the server may also set a specific threshold, which is the number of information for the event, that is, when the server receives information of an event exceeding a certain threshold, the server may The information of the event of the threshold acquires information of the real base station and information of the pseudo base station.
  • the server may further set a preset duration, and the server may acquire information of the real base station and information of the pseudo base station according to information of events sent by the multiple terminals received within the preset duration.
  • the server may acquire information of the real base station and information of the pseudo base station according to information of events sent by the multiple terminals received within the preset duration.
  • the server may obtain information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals in multiple manners.
  • the following examples will be explained separately:
  • the server may obtain the information of the real base station according to the information of the event sent by the multiple terminals, and may include:
  • Information of the initial base station the server deletes, from the information about the initial base station on the longitude, latitude, and date, information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold; the server removes the date,
  • the information of the other initial base stations is combined to obtain information about the longitude and latitude screening base stations; and the server determines that the information of the screening base station is the information of the real base station.
  • Example 1 The server according to the location information of a large number of terminals (the latitude and longitude obtained by the terminal using the Global Positioning System (GPS), or the latitude and longitude calculated by the network), and the base station information that the terminal accesses when receiving the short message and/or the incoming call (
  • the CID and LAC are used to describe the time of receiving the short message and/or the incoming call, or the base station information currently accessed by the terminal, and the adjacent CID information to determine the information of the real base station.
  • a certain degree of computational accuracy such as limiting the latitude and longitude decimal places, such as to 5 decimal places
  • [lat1,lng1,date1] ⁇ cid1,lac1;cid2,lac2;cid3,lac3 ⁇ ;
  • [lat2,lng1,date1] ⁇ cid8, lac8; cid5, lac5; cid6, lac6 ⁇ ;
  • [lat2,lng2,date2] ⁇ cid5, lac5; cid6, lac6; cid7, lac7 ⁇ .
  • the server further combines the data according to the latitude and longitude according to the obtained data about the longitude, latitude and date.
  • the base station with unstable access occurs in consecutive days (for example, only one day of access occurs in a certain area)
  • [lat1,lng2] ⁇ cid1, lac1; cid2, lac2; cid3, lac3; cid4, lac4 ⁇ ;
  • [lat2,lng1] ⁇ cid8, lac8; cid5, lac5; cid6, lac6 ⁇ ;
  • the information of the real base station includes ⁇ cid1, lac1; cid2, lac2; cid3, lac3 ⁇ ; in the area of [lat1, lng2], the information of the real base station includes ⁇ cid1, lac1; cid2, lac2; cid3, lac3; cid4, lac4 ⁇ ; in the region [lat2, lng1], the real base station information includes ⁇ cid8, lac8; cid5, lac5; cid6, lac6 ⁇ ; , lng2] In this area, the real base station information includes ⁇ cid5, lac5; cid6, lac6; cid7, lac7 ⁇ .
  • the server may obtain the information of the pseudo base station according to the information of the event sent by the multiple terminals, and may include:
  • the location information of the terminal accessed at the second time, the target base station is any base station that is accessed when the multiple terminals generate the event; the server is according to the terminal that the target base station accesses at the first time The location information is calculated, the first central location of the accessed terminal is calculated, and the second central location of the accessed terminal is calculated according to the location information of the terminal accessed by the target base station at the second time; the server determines the Determining, by the first central location, a first location of the target base station, determining that the second central location is a second location of the target base station; and determining an absolute value of a difference between the first location and the second location If the value is greater than the second threshold, the server determines that the information of the target base station is information of the pseudo base station.
  • Example 2 The server determines the information of the pseudo base station according to the location information of a large number of terminals, the base station information (here described by CID and LAC) when the terminal receives the short message and/or the incoming call, and the time of receiving the short message and/or the incoming call. That is, the server uses the characteristics of the pseudo base station to move (movable, suddenly appears and disappears), and identifies potential pseudo base stations.
  • Obtaining location information of a group of terminals accessing the base station when each base station occurs: [cid, lac, timestamp] ⁇ lat, lng; lat, lng; ... ⁇ .
  • the server can calculate the first central location of the set of terminals at the first time, the second central location of the set of terminals at the second time, and the third central location of the set of terminals at the third time, at the third The fourth central position of this group of terminals in four time.
  • the first central location can be considered to be the location of the base station 1 at the first time
  • the second central location is the location of the base station 1 at the second time
  • the third central location is the location of the base station 1 at the third time
  • the fourth central location It is the position of the base station 1 at the fourth time.
  • the deviation within a certain distance belongs to the normal range; the deviation of 500 m or more can be considered as the mobile base station.
  • MC ⁇ cid, lac; cid, lac; ... ⁇ .
  • the base station 1 can be considered as the mobile base station.
  • the above description is only taking the base station 1 as an example, and other base stations are similar processing methods, and details are not described herein again.
  • the base station 1 has a high probability Pseudo base station. It should be understood that both MC and SC can be considered as information of the pseudo base station and can identify the suspicious probability as 100%.
  • the terminal position ⁇ which is larger than the first center position ⁇ can be excluded, and the group terminal is calculated again (excluding the deviation from the first center)
  • the first target center position of the larger terminal similarly, after calculating the second center position, the terminal position that deviates from the second center position can be excluded, and then calculated.
  • the second target center position of this group of terminals (excluding the terminal that is larger than the second center position) is excluded; the others can be similarly processed, and will not be described here. Because if the position of the terminal is too far from the first center position ⁇ and the second center position , it means that the calculated center position ⁇ has a large deviation from the position of the base station, and is used to indicate the position of the base station.
  • the reliability is poor. Therefore, the terminal position with large deviation can be eliminated, and then a calculation is performed to indicate the position of the base station, and the accuracy is relatively high.
  • the first target center position ⁇ and the second target center position ⁇ are used to indicate the position of the base station at different times. The subsequent calculation method is similar to the above description, and details are not described herein again.
  • the information of the real base station and the information of the pseudo base station are obtained by the server according to the information of the events sent by the multiple terminals, including but not limited to the above-mentioned methods.
  • the server may determine the information of the pseudo base station according to the information of all the base stations reported by the multiple terminals, and the remaining information may be regarded as the information of the real base station;
  • the information can be determined by the server according to the information of all the base stations reported by the multiple terminals, except for the information of the real base station, and the rest can be regarded as the information of the pseudo base station.
  • the server determines, according to the information about the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals.
  • the information of the real base station is as follows:
  • the information of the pseudo base station is shown in Table 2 below:
  • the base station is the target terminal of the pseudo base station. If 100 terminals access the pseudo base station, the server can send the indication information of the pseudo base station to the 100 terminals.
  • the server sends the indication information of the pseudo base station to the target terminal.
  • the indication information that the server sends the pseudo base station to the 100 terminals may be sent at the same time, and the indication information of the pseudo base station may be sent according to the priority of the terminal, which is not limited herein. It should be noted that, in an actual application, the server may also send the indication information of the real base station to the terminal that is accessed by the base station that is accessed when the event occurs in the multiple terminals.
  • the target terminal prompts indication information of the pseudo base station.
  • the target terminal may display the information of the event by using an application interface corresponding to the event, where the information of the event may include a short message content and/or an incoming call number.
  • the indication information that the target terminal prompts the pseudo base station may include, but is not limited to, the following implementation manners:
  • Manner 1 The terminal displays the indication information of the pseudo base station by text.
  • Manner 2 The terminal prompts the indication information of the pseudo base station by voice.
  • Manner 3 The terminal displays the indication information of the pseudo base station by using a hazard identifier.
  • the information of the pseudo base station can be prompted by the application interface corresponding to the event on the target terminal. That is, the mobile phone may prompt the instruction information of the pseudo base station by using an SMS interface corresponding to the short message, and/or an incoming call interface corresponding to the incoming call, and/or voice.
  • the target terminal here may refer to the above 100 terminals, and one of them is taken as an example (such as a mobile phone) for explanation.
  • the terminal may display the indication information of the pseudo base station by using a text.
  • the mobile phone receives the short message content 11 displayed by the short message, and displays the indication information of the pseudo base station through the text 21 on the short message interface.
  • FIG. 4(c) a schematic diagram of the indication information of the pseudo base station is displayed on the short message interface of the mobile phone.
  • the indication information of the pseudo base station is a text indication of "suspected fraudulent short message".
  • the mobile phone receives the caller ID 12 of the caller ID, and displays the indication information of the pseudo base station through the text 21 on the incoming call interface.
  • the indication information of the pseudo base station is displayed for the mobile phone through the incoming call interface.
  • the indication information of the pseudo base station is a text indication of "suspected fraudulent incoming call".
  • the text prompt may also be a high-risk short message or a high-risk point, and the like is not limited.
  • the terminal may prompt the indication information of the pseudo base station by voice.
  • the mobile phone receives the short message content 11 displayed by the short message, and prompts the indication information of the pseudo base station through the voice 22 on the short message interface.
  • FIG. 4(e) it is a schematic diagram of the mobile phone performing voice prompting on the received short message according to the indication information of the pseudo base station.
  • the indication information of the pseudo base station triggers the preset voice function, and the mobile phone plays the voice (for example, the preset voice may be that the short message may be a fraudulent message, etc., or * The text message sent by the number may be a fraudulent message, etc.) to remind the user.
  • FIG. 4(f) it is a schematic diagram of the mobile phone performing voice reminding on the received incoming call according to the indication information of the pseudo base station.
  • the indication information of the pseudo base station triggers the preset voice function, and the mobile phone reminds the user by playing the voice (for example, the preset voice may be that the number may be a fraudulent number, please be careful to answer, etc.).
  • the terminal may prompt the indication information of the pseudo base station by using a danger icon. It is assumed that the mobile phone receives the short message content 11 displayed by the short message, and prompts the indication information of the pseudo base station through the danger icon 23 on the short message interface. As shown in FIG. 4(g), it is a schematic diagram of the mobile phone reminding the received short message by the danger icon according to the indication information of the pseudo base station. In FIG. 4(g), the indication information of the pseudo base station triggers a danger icon, and the mobile phone displays a danger icon through the short message interface to remind the user. Assume that the mobile phone receives the caller ID 12 of the caller ID and prompts the indication information of the pseudo base station through the danger icon 23 on the incoming call interface.
  • FIG. 4(h) it is a schematic diagram of the mobile phone reminding the received incoming call by the danger icon according to the indication information of the pseudo base station.
  • the indication information of the pseudo base station triggers a danger icon, and the mobile phone displays a danger icon through the incoming call interface to remind the user.
  • the danger icon may include, but is not limited to, the hint of the triangle plus the exclamation mark shown in FIG. 4(g) and 4(h), and may also be a prompt of the triangle icon or an exclamation point icon or other dangerous prompt manner.
  • the prompting information about the indication information of the pseudo base station includes, but is not limited to, the foregoing implementation manners, and may be implemented in other manners, and is not limited thereto.
  • the text + voice prompt mode as shown in FIG. 4( i ), is a schematic diagram of the mobile phone reminding the received short message by text and voice according to the instruction information of the pseudo base station.
  • FIG. 4(j) it is a schematic diagram of the mobile phone reminding the received incoming call by text and voice according to the indication information of the pseudo base station.
  • the prompt mode of the text + danger icon is a schematic diagram of the mobile phone reminding the received short message by the text and the danger icon according to the instruction information of the pseudo base station.
  • FIG. 4(l) it is a schematic diagram for the mobile phone to remind the received incoming call by the text and the danger icon according to the indication information of the pseudo base station.
  • the prompt mode of the voice + danger icon is a schematic diagram of the mobile phone reminding the received short message by using the voice and danger icons according to the indication information of the pseudo base station.
  • FIG. 4(n) it is a schematic diagram for the mobile phone to remind the received incoming call by voice and danger icons according to the indication information of the pseudo base station.
  • the terminal may automatically classify the short message into the spam short message list to prompt the indication information of the pseudo base station, as shown in FIG. 4( o ), automatically classify the short message for the mobile phone to The indication of the pseudo base station is prompted in the spam list.
  • the terminal may prompt the indication information of the pseudo base station by automatically rejecting the incoming call, as shown in FIG. 4(p), which is a schematic diagram of the mobile phone automatically rejecting the indication information of the incoming call prompting pseudo base station.
  • the indication information of the text prompting pseudo base station and the indication information of the icon prompting the pseudo base station may be implemented in the form of a bullet frame, a suspended form, or a bubble, and the like is not limited. . Steps 303-305 are optional steps.
  • the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by the multiple terminals. Therefore, the accuracy of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives the information of the event sent by the multiple terminals, and the information of the event may include the identifier of the terminal, the location information of the terminal, the information of the base station that is accessed when the event occurs, and the time when the event occurs. The server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  • the server may further determine, according to the information of the real base station and the information of the pseudo base station, the target terminal that accesses the pseudo base station among the multiple terminals, and send the indication information of the pseudo base station to the target terminal, so that the user causes an event occurring on the target terminal. Be alert, be careful to be deceived.
  • FIG. 5 it is a schematic diagram of another embodiment of the prompting method in the embodiment of the present application, including:
  • the server receives information about events sent by multiple terminals.
  • the server acquires information about a real base station and information of a pseudo base station according to information about events sent by the multiple terminals.
  • the server determines, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals.
  • the server sends indication information of the pseudo base station to the target terminal.
  • the target terminal prompts indication information of the pseudo base station.
  • the steps 501-505 are similar to the steps 301-305 in the foregoing embodiment shown in FIG. 3, and details are not described herein again.
  • the server marks a suspicious probability of the real base station and the pseudo base station.
  • the server may mark the suspicious probability of the real base station and the pseudo base station, for example, marking the suspicious real base station.
  • the probability is 0, and the suspicious probability of marking the pseudo base station is 100%.
  • Example 1 As shown in Table 3 below, the correspondence between real base stations and suspicious probability in different areas.
  • Example 2 If both the suspicious base station and the mobile base station are considered to be pseudo base stations, as shown in Table 4 below, the correspondence relationship between the suspicious base station, the mobile base station, and the suspicious probability.
  • Suspicious base station Suspicious probability
  • Mobile base station Suspicious probability ⁇ cid8, lac8 ⁇ 100% ⁇ cid12,lac12 ⁇ 100% ⁇ cid15,lac15 ⁇ 100% ⁇ cid8, lac8 ⁇ 100% ⁇ cid19,lac19 ⁇ 100% ⁇ cid19,lac19 ⁇ 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid15,lac15 ⁇ 100% ⁇ cid36,lac36 ⁇ 100% ⁇ cid40,lac40 ⁇ 100%
  • the mobile base station and the suspicious base station shown in Table 4 can be regarded as pseudo base stations, but the suspicious probability that the suspicious base station is a pseudo base station may be higher. Since there are mobile base stations among operators, the suspicious probability that the mobile base station is a pseudo base station is relatively low.
  • Example 3 The suspicious probability flag of other base stations other than the suspicious base station in the mobile base station may also be marked lower, as shown in Table 5 below, as a correspondence relationship between the suspicious base station, the mobile base station, and the suspicious probability.
  • Suspicious base station Suspicious probability
  • Mobile base station Suspicious probability ⁇ cid8, lac8 ⁇ 100% ⁇ cid12,lac12 ⁇ 80% ⁇ cid15,lac15 ⁇ 100% ⁇ cid8, lac8 ⁇ 100% ⁇ cid19,lac19 ⁇ 100% ⁇ cid19,lac19 ⁇ 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid15,lac15 ⁇ 100% ⁇ cid36,lac36 ⁇ 80% ⁇ cid40,lac40 ⁇ 80%
  • step 506 may be after step 502 and before 507.
  • the first target terminal receives the feedback information.
  • the first target terminal may be one of the target terminals, or may be a plurality of terminals in the target terminal, and may be determined according to actual conditions.
  • the feedback information is input information input by the user whether the indication information that the base station accessed by the terminal when the event occurs is a pseudo base station is accurate.
  • the first target terminal may prompt the indication information of the pseudo base station.
  • the following can be illustrated by an example: as shown in FIG. 6( a ), a schematic diagram for displaying the input feedback information on the short message interface of the mobile phone, and also displaying “Please feedback the user whether the short message is a fraudulent short message” on the short message interface.
  • the user can input feedback information in an editable text box 31.
  • FIG. 6(b) another schematic diagram for displaying the input feedback information on the short message interface of the mobile phone may also display the “Yes” and “No” identifiers 32 on the short message interface, and the user directly clicks “Yes” or “No”. "The logo can be.
  • the SMS interface can also display the "ignore" logo, or if there is no input text, then the feedback information is meaningless and need not be reported to the server.
  • the terminal can receive the corresponding feedback information.
  • a schematic diagram for displaying the input feedback information on the incoming call interface of the mobile phone the mobile phone displays “Please feedback the user if the incoming call is a fraudulent call” on the incoming call interface, and the user can edit the text.
  • Block 31 inputs feedback information.
  • a schematic diagram for displaying the input feedback information on the incoming call interface of the mobile phone may also display the “Yes” and “No” identifiers 32 on the incoming call interface, and the user directly clicks “Yes” or “No”.
  • the logo can be.
  • the “Ignore” logo can also be displayed on the incoming call interface, or if there is no input text, then the feedback information is meaningless and need not be reported to the server.
  • the click operation may be more convenient for the user.
  • Displaying the input feedback information on the incoming call interface can also be displayed after the user hangs up the phone.
  • the terminal can receive the corresponding feedback information.
  • the schematic diagram of how the terminal displays the input feedback information may include, but is not limited to, the foregoing manners.
  • the description about the user inputting the feedback information may be that some users may have received the short message sent by the number or received the incoming call of the number, and when receiving the incoming call or the short message sent by the same number again, it may determine whether it is a fraudulent short message or a fraudulent call. It can be determined by this call whether it is a fraudulent call, so that the user can input corresponding feedback information.
  • the input feedback information is described by the instruction information of the character prompting pseudo base station, and the indication information of the pseudo base station or the danger icon is used to prompt the indication information of the pseudo base station.
  • the schematic diagram showing the input feedback information is similar to FIG. 6(a) to FIG. 6(d), and will not be described again here.
  • the first target terminal sends the feedback information to the server.
  • the server determines that there are 100 target terminals accessing the pseudo base station, and the server sends the indication information of the pseudo base station to the 100 target terminals.
  • the 50 target terminals can report the feedback information to the server. Assume that there are 45 users inputting "no" feedback information, and five users inputting "yes" feedback information.
  • the server according to the feedback information, correspondingly modify a suspicious probability of the pseudo base station, to obtain a modified suspicious probability of the pseudo base station.
  • the server can determine that the base station ⁇ cid15, lac15 ⁇ has a 90% probability that it is not a pseudo base station, and the 10% probability is a pseudo base station. That is, the corresponding suspicious probability of the base station ⁇ cid15, lac15 ⁇ can be modified to 10% in the above Table 4 and Table 5.
  • the base station can be considered as a real base station.
  • the server can update the information of the base station ⁇ cid15, lac15 ⁇ to the information of the real base station, assuming The area where the base station ⁇ cid15, lac15 ⁇ appears is [lat7, lng7], the information of the base station ⁇ cid15, lac15 ⁇ is updated to the above table 3, and the information of the base station ⁇ cid15, lac15 ⁇ is deleted in Table 4 and Table 5.
  • Suspicious base station Suspicious probability
  • Mobile base station Suspicious probability ⁇ cid8, lac8 ⁇ 100% ⁇ cid12,lac12 ⁇ 100% ⁇ cid19,lac19 ⁇ 100% ⁇ cid8, lac8 ⁇ 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid19,lac19 ⁇ 100% 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid36,lac36 ⁇ 100% ⁇ cid40,lac40 ⁇ 100%
  • Suspicious base station Suspicious probability
  • Mobile base station Suspicious probability ⁇ cid8, lac8 ⁇ 100% ⁇ cid12,lac12 ⁇ 80% ⁇ cid19,lac19 ⁇ 100% ⁇ cid8, lac8 ⁇ 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid19,lac19 ⁇ 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid36,lac36 ⁇ 80% ⁇ cid40,lac40 ⁇ 80%
  • the feedback information received by the server may be for the same base station, or may be for different base stations, and the manner of modifying the suspicious probability is similar to the foregoing, and details are not described herein again.
  • the information of the real base station and the information of the pseudo base station are updated, but are not limited to other implementation manners. For example, for the same base station, there are two “yes” of the feedback information received by the server in the first time period.
  • Feedback information 6 "no” feedback information; in the feedback information received within the second duration, there is 1 “yes” feedback information, 8 “no” feedback information; received in the third time period
  • the suspicious probability of the base station is not lower than the suspicious probability threshold by 20%, but the server receives according to the The feedback information finds that the number of feedback information with feedback "yes” is less and less, and the number of feedback "no” feedback information is increasing. Therefore, it is highly probable that the base station is not a pseudo base station, and the server can The base station is updated in the information of the real base station.
  • the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by the multiple terminals. Therefore, the accuracy of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives the information of the event sent by the multiple terminals, and the information of the event may include the terminal identifier, the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs. The server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  • the server may further determine, according to the determined information of the real base station and the information of the pseudo base station, the target terminal that accesses the pseudo base station among the multiple terminals, and send the indication information of the pseudo base station to the target terminal, so that the user occurs on the target terminal.
  • the incident caused vigilance and was carefully deceived.
  • the server may also use the characteristics of the pseudo base station to combine with the feedback information of the terminal, modify the suspicious probability of the pseudo base station, update the information of the real base station and the information of the pseudo base station, so that the server receives the first event reported by the first terminal next time. And determining, according to the updated information of the real base station and the information of the pseudo base station, whether the first base station accessed by the terminal when the first event occurs is a pseudo base station, such that the real base station information and the pseudo base station are updated according to the real time. The accuracy of the results judged by the information is higher.
  • FIG. 7 is a schematic diagram of an embodiment of a prompting method in an embodiment of the present application, including:
  • the server receives information about events sent by multiple terminals.
  • the server acquires information of a real base station and information of a pseudo base station according to information about an event sent by the multiple terminals.
  • the server determines, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals.
  • the server sends the indication information of the pseudo base station to the target terminal.
  • the target terminal prompts indication information of the pseudo base station.
  • the server marks a suspicious probability of the real base station and the pseudo base station.
  • the first target terminal receives the feedback information.
  • the first target terminal sends the feedback information to the server.
  • the server according to the feedback information, correspondingly modify a suspicious probability of the pseudo base station, to obtain a modified suspicious probability of the pseudo base station.
  • the steps 701-509 are similar to the steps 501-509 in the foregoing embodiment shown in FIG. 5, and details are not described herein again.
  • the server determines information of a target pseudo base station and information of a target real base station.
  • the server may determine, according to the information of the real base station and the suspicious probability corresponding to the information of the pseudo base station, the information of the base station whose suspicious probability is greater than the third threshold is the information of the target pseudo base station, and the suspicious probability is less than the fourth threshold.
  • the information of the base station is information of the target real base station.
  • the information of the target real base station and the information of the target pseudo base station include, but are not limited to, information such as cid, lac, signal strength, difference between acquisition time and reporting time.
  • the collection time refers to the time when the corresponding terminal has an event.
  • the reporting time refers to the time when the terminal sends the event information to the server.
  • the collection time can be the same as the reporting time, or the reporting time is after the collection time.
  • the server performs model training according to the information of the target pseudo base station and the information of the target real base station, and obtains reference weights of each feature included in the information of the base station.
  • the first terminal detects that the first event occurs and collects information about the first event.
  • the first terminal detects that the first event occurs and collects information about the first event.
  • the information of the first event may include the information of the base station that is accessed when the first event occurs, and the information of the first event may further include the first terminal identifier and the location of the first terminal.
  • Information, information such as the time at which the first event occurred, the content of the first short message, and/or the number of the first incoming call.
  • the first event can include receiving a first short message and/or a first incoming call.
  • step 712 can be between steps 702-713.
  • the first terminal sends information about the first event to the server.
  • the server receives information about a first event sent by the first terminal.
  • the first terminal may be a terminal in the foregoing multiple terminals, or may be another terminal newly accessed outside the multiple terminals.
  • the number of representations of the first terminal is not limited, and may refer to one terminal or multiple terminals.
  • the first terminal is referred to as the mobile phone 1 as an example. That is, the server receives the information of the first event sent by the mobile phone 1, and the information of the first event includes the identifier of the mobile phone 1, the location information of the mobile phone 1, and the information of the first base station that is accessed when the first event occurs. The time at which the first event occurred.
  • the location information of the mobile phone 1 can utilize the latitude and longitude obtained by the Global Positioning System (GPS) or the latitude and longitude calculated by the network.
  • the location information of the mobile phone includes but is not limited to latitude and longitude, and access to wireless fidelity (WiFi).
  • WiFi wireless fidelity
  • the physical address of the wireless access point (Basic Service Set identifier, BSSID)/Wireless Access Point ID or Service Set Identifier (SSID)/Medium Access Control Address (MAC addr)/Network ID (Network ID), currently scanned WiFi SSID, etc. information.
  • the information of the first base station that is accessed when the first event occurs on the mobile phone 1 may include a sector identifier of the base station, which may also be called a cell identification (CID), a LAC, an adjacent CID, and may also include a signal strength and a cell. Information and other information.
  • CID cell identification
  • LAC LAC
  • adjacent CID adjacent CID
  • the server determines whether the first base station is a pseudo base station.
  • the authenticity determination of the first base station may have several different implementation manners, which are respectively described below:
  • the first way the server performs a lookup determination in the information of the real base station and the information of the pseudo base station stored in the database.
  • the server may perform the search in the information of the real base station and the information of the pseudo base station acquired according to the information of the event sent by the multiple terminals, if the information of the first base station is in the information of the pseudo base station.
  • the first base station is a pseudo base station, and the server may send the indication information of the pseudo base station to the mobile phone 1. If the information of the first base station is in the information of the real base station, the first base station is a real base station, and the server may not 1 Send the indication information of the real base station.
  • the server may perform the search in the information of the updated real base station and the information of the pseudo base station, and if the information of the first base station is in the information of the updated pseudo base station, A base station is a pseudo base station, and the server may send the indication information of the pseudo base station to the mobile phone 1. If the information of the first base station is in the information of the updated real base station, the first base station is a real base station, and the server may not send the message to the mobile phone 1. The indication information of the real base station.
  • step 712 is after step 702 and before step 709, the server may first search for information of the first base station by using the information of the pseudo base station stored in the database and the information of the real pseudo base station.
  • step 712 is after step 709 and before step 713, the server may first search for information of the first base station in the updated real base station information and the updated pseudo base station information stored in the database.
  • the server may determine the target probability of the first base station according to the information of the first event and the reference weight of each feature included in the information of the base station.
  • the target probability range calculated according to the reference weight is between 0 and 1, and the approaching to 1 can be regarded as a real base station, and the approaching to 0 can be regarded as a pseudo base station.
  • the fifth threshold can be set to 0.6 and 0.8 is greater than 0.6, so the server determines that the first base station is a real base station.
  • the fifth threshold can be set to 0.6 and 0.3 is less than 0.6, so the server determines that the first base station is a pseudo base station.
  • the server sends the indication information of the pseudo base station to the first terminal.
  • the server sends the pseudo base station to the first terminal. Instructions.
  • the first terminal prompts indication information of the pseudo base station.
  • the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by the multiple terminals. Therefore, the accuracy of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives the information of the event sent by the multiple terminals, and the information of the event may include the identifier of the terminal, the location information of the terminal, the information of the base station that is accessed when the event occurs, and the time when the event occurs. The server determines information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  • the server may further determine, according to the determined information of the real base station and the information of the pseudo base station, the target terminal that accesses the pseudo base station among the multiple terminals, and send the indication information of the pseudo base station to the target terminal, so that the user occurs on the target terminal.
  • the first incident caused vigilance and was carefully deceived.
  • the server may also use the characteristics of the pseudo base station to combine with the feedback information of the terminal, modify the suspicious probability of the pseudo base station, update the information of the real base station and the information of the pseudo base station, so that the server receives the first event reported by the first terminal next time. And determining, according to the updated information of the real base station and the information of the pseudo base station, whether the first base station accessed by the terminal when the first event occurs is a pseudo base station, such that the real base station information and the pseudo base station are updated according to the real time. The accuracy of the results judged by the information is higher.
  • the server may also select, according to the suspicious probability corresponding to the information of the real base station and the information of the pseudo base station, a batch of information of the base station with the highest suspicious probability as a positive example, and the information of the base station with the lowest suspicious probability as a negative example, and perform model training.
  • a reference weight of each feature included in the information of the base station is obtained. The reference weights may be used when the server receives the information of the first event reported by the first terminal, and according to the reference weight of each feature and the information of the first base station, calculate the first base station that is accessed when the first event occurs. Target probability.
  • the server determines that the first base station is a real base station; if the target probability is less than or equal to the preset threshold, the server determines that the first base station is a pseudo base station, and the server sends the indication information of the pseudo base station to the terminal. In this way, the server can calculate whether the access is a pseudo base station when the first event newly received by the server is received according to the reference weight of each feature included in the information of the base station, and provide another method for determining the pseudo base station. Increase the feasibility of the program.
  • the suspicious probability of the real base station and the pseudo base station can be continuously optimized and corrected, which greatly improves the accuracy of the judgment;
  • the identification method can only be compared with the existing base station data of the operator, and has a high accuracy in the case of judging the mobile base station.
  • the server performs model training in real time according to the information of the target real base station and the information of the target pseudo base station, which can ensure the accuracy and real-time of the identification, and can be found in time for the new pseudo base station; and can also identify the pseudo base station according to the technology of big data.
  • the motion trajectory can further prevent pseudo base station scams and even capture pseudo base stations.
  • FIG. 8 is a schematic diagram of an embodiment of a prompting method in an embodiment of the present application, including:
  • the first terminal detects that the first event occurs and collects information about the first event.
  • the first event may be a first event that occurs in an application installed on the first terminal, where
  • the information about the first event may include the first terminal identifier, location information of the first terminal, information of a first base station that is accessed when the first event occurs, time when the first event occurs, and occurs.
  • the time of the first event can also be referred to as a timestamp.
  • the information of the first event may further include information such as the content of the short message and/or the number of the incoming call.
  • the application installed on the first terminal may be a short message application, a call application, or the like, and is not limited herein.
  • the first terminal detects that the short message is received, the first terminal collects the information for receiving the short message, or the first terminal detects the received incoming call, and the first terminal collects the information for receiving the incoming call.
  • a schematic diagram of receiving a short message or receiving an incoming call can be referred to FIG. 4(a) and FIG. 4(b), and details are not described herein again.
  • the first terminal sends the information about the first event to a server.
  • the first terminal may send the collected information of the received short message or the information of the received incoming call to the server. It should be noted that when the first terminal receives the short message or receives the incoming call, the accessed base station is a pseudo base station, and then the first terminal is in the disconnected state, and the information of the first event cannot be reported to the server, so The first terminal needs to wait for the network connection state to send the information of the first event.
  • the first terminal receives the indication information of the pseudo base station sent by the server.
  • the server determines that the first terminal accesses the pseudo base station, the server sends the indication information of the pseudo base station to the first terminal.
  • the manner in which the server determines the pseudo base station may include, but is not limited to, the following implementation manners.
  • the following uses a mobile phone as an example, as follows:
  • Example 1 The server performs a lookup determination in the information of the real base station and the information of the pseudo base station acquired in the embodiment shown in FIG. 3 above.
  • the server may perform a search in the information of the real base station and the information of the pseudo base station obtained according to the information of the event sent by the multiple terminals. If the information of the first base station is in the information of the pseudo base station, the first base station is regarded as a pseudo base station, and the server The indication information of the pseudo base station may be sent to the mobile phone; if the information of the first base station is in the information of the real base station, the first base station is a real base station, and the server may not send the indication information of the real base station to the mobile phone.
  • Example 2 The server performs a lookup determination in the information of the real base station and the information of the pseudo base station updated in the embodiment shown in FIG. 5 described above.
  • the server may perform a lookup determination according to the information of the updated real base station and the information of the pseudo base station in the embodiment shown in FIG. 5, and consider that the first base station is in the information of the updated pseudo base station if the information of the first base station is in the information of the updated pseudo base station.
  • the server may send the indication information of the pseudo base station to the mobile phone; if the information of the first base station is in the information of the updated real base station, the first base station is the real base station, and the server may not send the indication information of the real base station to the mobile phone. .
  • Example 3 The server performs the determination in the embodiment shown in FIG. 7 above based on the reference weights of the respective features included in the obtained information of the base station.
  • the various features included in the information according to the obtained base station in the foregoing embodiment shown in FIG. 7 may be adopted.
  • the reference weights are used to determine.
  • the determination is performed directly according to the reference weight of each feature included in the obtained information of the base station in the embodiment shown in FIG. 7 above.
  • the server performs another big data calculation according to the received information of the event sent by the multiple terminals, and obtains the information of the real base station and the information of the pseudo base station, thereby determining the first One base station Whether it is a pseudo base station.
  • the first terminal prompts the indication information of the pseudo base station.
  • the first terminal prompts the indication information of the pseudo base station, which may include, but is not limited to, the following implementation manners:
  • the terminal displays the indication information of the pseudo base station by using a text; for details, refer to FIG. 4(c) and FIG. 4(d) above, and details are not described herein again.
  • Example 2 The terminal prompts the indication information of the pseudo base station by voice; for details, refer to FIG. 4(e) and FIG. 4(f) above, and details are not described herein again.
  • the terminal displays the indication information of the pseudo base station by using a hazard identifier; for details, refer to FIG. 4(g) and FIG. 4(h), and details are not described herein again.
  • indication information indicating the pseudo base station reference may be made to the foregoing implementation manner of FIG. 4(i)-4(p), and details are not described herein again.
  • the information of the event may be used by the server to obtain information of the pseudo base station, and the server may determine multiple manners, and the foregoing has been performed.
  • the server determination method is based on the calculation of big data. Therefore, the reliability of the judged result is relatively high, and the obtained result is more accurate. If the terminal accesses the pseudo base station, the server sends the indication information of the pseudo base station to the terminal, so that the terminal can prompt the indication information of the pseudo base station, so that the user is alert to the first event occurring on the first terminal, be careful Be deceived.
  • FIG. 9(a) it is a schematic diagram of an embodiment of the server in the embodiment of the present application, including:
  • the receiving module 901 is configured to receive information about events sent by multiple terminals.
  • the obtaining module 902 is configured to obtain information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  • FIG. 9( b ) which is a schematic diagram of another embodiment of the server, the server further includes:
  • a determining module 903 configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals;
  • the sending module 904 is configured to send indication information of the pseudo base station to the target terminal.
  • the information about the event includes a terminal identifier, location information of the terminal, information about a base station that is accessed when the event occurs, and a time when the event occurs.
  • the obtaining module 902 is specifically configured to:
  • Deleting from the information about the initial base station of the longitude, latitude, and date, information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold;
  • the date is removed, and the information of other initial base stations is combined to obtain a letter about the longitude and latitude screening base station. interest;
  • Determining that the information of the screening base station is information of a real base station.
  • the obtaining module 902 is specifically configured to:
  • the first central location is a first location of the target base station, and determining that the second central location is a second location of the target base station;
  • the acquiring module determines that the information of the target base station is information of a pseudo base station.
  • FIG. 9(c) is a schematic diagram of another embodiment of the server
  • the server further includes:
  • a marking module 905, configured to mark a suspicious probability of the real base station and the pseudo base station
  • the receiving module 901 is further configured to receive feedback information sent by the first target terminal, where the feedback information is that the indication information that the base station that the user accesses when the event occurs when the first target terminal is the pseudo base station is Accurate input of information;
  • the modifying module 906 is configured to modify the suspicious probability of the pseudo base station according to the feedback information to obtain a modified suspicious probability of the pseudo base station.
  • FIG. 9(d) which is a schematic diagram of another embodiment of the server, the server further includes:
  • the determining module 903 is further configured to: determine that the information of the base station whose suspicious probability is greater than the third threshold is the information of the target pseudo base station, and the information of the base station whose suspicious probability is less than the fourth threshold is the information of the target real base station;
  • the model training module 907 is configured to perform model training according to the information of the target pseudo base station and the information of the target real base station, and obtain reference weights of respective features included in information of different base stations.
  • the receiving module 901 is further configured to receive information about a first event sent by the first terminal, where the information about the first event includes information about a first base station that is accessed when the first event occurs;
  • the sending module 904 is further configured to: if the information of the first base station is in the information of the pseudo base station, the sending module sends the indication information of the pseudo base station to the first terminal.
  • the determining module 903 is further configured to: if the information of the first base station is not in the information of the pseudo base station, the determining module 903 is included in the information according to the first event and the information in the base station Determining, by the reference weight of each feature, a target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the determining module 903 determines that the first base station is a pseudo base station;
  • the sending module 904 is further configured to send the indication information of the pseudo base station to the first terminal.
  • the event includes: receiving a short message and/or an incoming call;
  • the information of the event further includes: the content of the short message and/or the number of the incoming call.
  • FIG. 10 it is a schematic diagram of an embodiment of a terminal in the embodiment of the present application, including:
  • the collecting module 1001 is configured to detect, by the terminal, an event occurrence and collect information about the event;
  • a sending module 1002 configured to send information about the event to a server
  • the receiving module 1003 is configured to receive indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event;
  • the prompting module 1004 is configured to prompt the indication information of the pseudo base station.
  • the information about the event includes the terminal identifier, location information of the terminal, information about a base station accessed when the event occurs, and a time when the event occurs.
  • the receiving module 1003 is further configured to receive feedback information, where the feedback information is input information that is input by the user, whether the base station that is accessed by the terminal when the event occurs is a pseudo base station, is accurate;
  • the sending module 1004 is further configured to send the feedback information to the server, where the feedback information is used by the server to modify a suspicious probability of the pseudo base station.
  • the prompting module 1004 is specifically configured to display the indication information of the pseudo base station by using a text.
  • the prompting module 1004 is specifically configured to display indication information of the pseudo base station by using a danger identifier.
  • the prompting module 1004 is specifically configured to prompt the indication information of the pseudo base station by voice.
  • the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: a content of the short message and/or a number of the incoming call.
  • FIG. 11 is a schematic diagram of another embodiment of a server in an embodiment of the present application.
  • the server may vary greatly depending on configuration or performance, and may include one or more wired or wireless network interfaces 1150.
  • the wired or wireless network interface may also be referred to as a transceiver, and one or more central processing units (central processing) Units, CPU) 1122 (eg, one or more processors) and memory 1132, one or more storage media 1130 that store application 1142 or data 1144 (eg, one or one storage device in Shanghai).
  • CPU central processing units
  • CPU central processing
  • storage media 1130 that store application 1142 or data 1144 (eg, one or one storage device in Shanghai).
  • the wired or wireless network interface 1150 can receive information of events sent by multiple terminals; the central processor 1122 obtains information of the real base station according to information of events sent by multiple terminals received by the wired or wireless network interface 1150. And information about the pseudo base station.
  • the indication information for prompting the pseudo base station on the target terminal may include, but is not limited to, the implementation manners shown in FIGS. 4(c) to 4(p).
  • the memory 1132 and the storage medium 1130 may be short-term storage or persistent storage.
  • the program stored on storage medium 1130 may include one or more modules (not shown), each of which may include a series of instruction operations in the server.
  • central processor 1122 can be configured to communicate with storage medium 1130, executing a series of instruction operations in storage medium 1130 on server 1100.
  • Server 1100 may also include one or more power supplies 1126, one or more input and output interfaces 1158, and/or one or more operating systems 1141, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and the like.
  • operating systems 1141 such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and the like.
  • the steps performed by the server in the above embodiment may be based on the server structure shown in FIG.
  • the central processing unit 1122 is further configured to: determine, according to information of the real base station and information of the pseudo base station, access pseudo in the multiple terminals The target terminal of the base station;
  • the wired or wireless network interface 1150 is further configured to: send the indication information of the pseudo base station to the target terminal.
  • the information about the event includes a terminal identifier, location information of the terminal, information about a base station that is accessed when the event occurs, and a time when the event occurs.
  • the central processing unit 1122 is specifically configured to perform the following steps:
  • Deleting from the information about the initial base station of the longitude, latitude, and date, information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold;
  • the date is removed, and information of other initial base stations is combined to obtain information about screening base stations for longitude and latitude;
  • Determining that the information of the screening base station is information of a real base station.
  • the central processing unit 1122 is specifically configured to perform the following steps:
  • the first central location is a first location of the target base station, and determining that the second central location is a second location of the target base station;
  • the central processor determines that the information of the target base station is information of a pseudo base station.
  • the central processing unit 1122 is specifically configured to perform the following steps: marking a suspicious probability of the real base station and the pseudo base station; and correspondingly modifying the The suspicious probability of the pseudo base station is obtained by the modified suspicious probability of the pseudo base station;
  • the wired or wireless network interface 1150 is further configured to: receive feedback information sent by the first target terminal, where the feedback information is a pseudo base station that is input by the user when the event occurs when the first target terminal occurs Indicate whether the information is entered accurately.
  • the central processing unit 1122 is specifically configured to perform the following steps:
  • Determining information of the base station whose suspicious probability is greater than the third threshold is information of the target pseudo base station, and information of the base station whose suspicious probability is less than the fourth threshold is information of the target real base station;
  • the wired or wireless network interface 1150 is further configured to perform the following steps:
  • the wired or wireless network interface 1150 sends the indication information of the pseudo base station to the first terminal.
  • the central processing unit 1122 is specifically configured to perform the following steps:
  • the central processing unit 1122 determines, according to the information of the first event and the reference weight of each feature included in the information of the base station, Determining a target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the central processing unit 1122 determines that the first base station is a pseudo base station;
  • the wired or wireless network interface 1150 is further configured to perform the step of: transmitting indication information of the pseudo base station to the first terminal.
  • the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: a content of the short message and/or a number of the incoming call.
  • FIG. 12 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, and the terminal is a mobile phone as an example:
  • FIG. 12 is a block diagram showing a partial structure of a mobile phone related to a terminal provided by an embodiment of the present application.
  • the mobile phone includes a processor 1280, a communication interface 1210, an output unit 1270, a memory 1220, an input unit 1230, a sensor 1250, and a power supply 1290.
  • the communication interface 1210 may include components such as a radio frequency (RF) circuit 1211 and a wireless fidelity (WiFi) module 1212.
  • the output unit 1270 may include components such as a display unit 1240, an audio circuit 1260, and the like. It will be understood by those skilled in the art that the structure of the handset shown in FIG. 12 does not constitute a limitation to the handset, and may include more or less components than those illustrated, or some components may be combined, or different component arrangements.
  • the processor 1280 is a control center for the handset that connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 1220, and invoking data stored in the memory 1220, The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 1280 detects an event occurrence and collects information of the event.
  • the processor 1280 may include one or more processing units; preferably, the processor 1280 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 1280.
  • the RF circuit 1211 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, the processor 1280 processes the data; and, in addition, transmits the designed uplink data to the base station. In the embodiment of the present application, the RF circuit 1211 may send the information about the event collected by the processor 1280 to the server, and receive the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is the server according to the The information of the event is obtained.
  • RF circuit 1211 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • RF circuitry 1211 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • SMS Short Messaging Service
  • the memory 1220 can be used to store software programs and modules, and the processor 1280 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 1220.
  • the memory 1220 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
  • memory 1220 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 1230 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset. As shown in FIGS. 6(a) and 6(b), if the user inputs feedback information, the feedback information can be received by the mobile phone through the input unit 1230.
  • the input unit 1230 may include a touch panel 1231 and other input devices 1232.
  • the touch panel 1231 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 1231 or near the touch panel 1231. Operation), and drive the corresponding connecting device according to a preset program.
  • the touch panel 1231 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 1280 is provided and can receive commands from the processor 1280 and execute them.
  • the touch panel 1231 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 1230 may also include other input devices 1232.
  • other input devices 1232 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the output unit 1270 can include components such as a display unit 1240, an audio circuit 1260, and the like. In the embodiment of the present application, the output unit 1270 may be used to prompt the indication information of the pseudo base station.
  • the display unit 1240 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone. 4(a)-4(p), the interfaces shown in FIGS. 6(a)-6(d) are all displayed by the display unit 1240. of.
  • the display unit 1240 can include a display panel 1241.
  • the display panel 1241 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 1231 may cover the display panel 1241.
  • the touch panel 1231 After the touch panel 1231 detects a touch operation on or near the touch panel 1231, the touch panel 1231 transmits to the processor 1280 to determine the type of the touch event, and then the processor 1280 according to the touch event.
  • the type provides a corresponding visual output on display panel 1241.
  • the touch panel 1231 and the display panel 1241 are used as two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 1231 and the display panel 1241 may be integrated. Realize the input and output functions of the phone.
  • Audio circuit 1260, speaker 1261, and microphone 1262 can provide an audio interface between the user and the handset. 4(e), 4(f), 4(i), 4(j), 4(m), and 4(n), the audio circuit 1260 can be used. The user is prompted with the indication information of the pseudo base station.
  • the audio circuit 1260 can transmit the converted electrical data of the received audio data to the speaker 1261, and convert it into a sound signal output by the speaker 1261; on the other hand, the microphone 1262 converts the collected sound signal into an electrical signal, by the audio circuit 1260. After receiving, it is converted into audio data, and then processed by the audio data output processor 1280, sent to, for example, another mobile phone via the RF circuit 1211, or outputted to the memory 1220 for further processing.
  • the handset can also include at least one type of sensor 1250, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1241 according to the brightness of the ambient light, and the proximity sensor may close the display panel 1241 and/or when the mobile phone moves to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • WiFi is a short-range wireless transmission technology.
  • the mobile phone can help users to send and receive emails, browse web pages and access streaming media through the WiFi module 1212. It provides users with wireless broadband Internet access.
  • FIG. 12 shows the WiFi module 1212, it can be understood that it does not belong to the essential configuration of the mobile phone, and can be omitted as needed within the scope of not changing the essence of the application.
  • the handset also includes a power source 1290 (such as a battery) that supplies power to the various components.
  • a power source 1290 such as a battery
  • the power source can be logically coupled to the processor 1280 via a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the steps performed by the terminal in the above embodiment may be based on the terminal structure shown in FIG.
  • the information about the event includes the terminal identifier, location information of the terminal, information about a base station accessed when the event occurs, and a time when the event occurs.
  • the input unit 1230 is further configured to receive feedback information, where the feedback information is input information input by the user that is accurate when the base station that is accessed by the terminal when the event occurs is a pseudo base station;
  • the radio frequency circuit 1211 is further configured to send the feedback information to the server, where the feedback information is used by the The server modifies the suspicious probability of the pseudo base station.
  • the display unit 1240 is further configured to display indication information of the pseudo base station by text.
  • the display unit 1240 is further configured to display indication information of the pseudo base station by using a hazard identifier.
  • the audio circuit 1260 is further configured to prompt the indication information of the pseudo base station by voice.
  • the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: a content of the short message and/or a number of the incoming call.
  • the above embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).
  • a computer program product comprising instructions, when run on a computer, causes the computer to perform as the server is in FIG. 3, FIG. 5, FIG. 7, or FIG. 8 above.
  • the method shown, its same or corresponding technical features can be cited in this embodiment.
  • a computer program product comprising instructions, when executed on a computer, causes the computer to perform, for example, the terminal in FIG. 3, FIG. 5, FIG. 7, or FIG.
  • the method shown, its same or corresponding technical features can be cited in this embodiment.

Abstract

Disclosed in embodiments of the present application is a prompting method, for use in obtaining, by a server, information of a real base station and information of a pseudo base station according to information of events sent by a plurality of terminals. The information of the real base station and the information of the pseudo base station obtained by the server according to the calculation of big data have high accuracy. The embodiments of the present application comprises: a server obtains information of events sent by a plurality of terminals; the server obtains information of a real base station and information of a pseudo base station according to the information of the events sent by the plurality of terminals. The embodiments of the present application also provide a terminal and a server.

Description

一种提示方法、终端以及服务器Prompt method, terminal and server
本申请要求于2017年1月22日提交中国专利局、申请号为201710052278.7、发明名称为“一种防范伪基站诈骗方法和设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims priority to the Chinese Patent Application, filed on Jan. 22, 2017, the number of which is hereby incorporated by reference. In the application.
技术领域Technical field
本申请涉及通信领域,尤其涉及一种提示方法、终端以及服务器。The present application relates to the field of communications, and in particular, to a prompting method, a terminal, and a server.
背景技术Background technique
随着通信技术的发展,电信诈骗的案例和手段越来越多。在众多的电信诈骗技术中,通过非法基站或者称为伪基站实施作案已经成为主流手段。这些伪基站可以伪装成运营商的基站,假冒他人号码发送诈骗短信。基于伪基站发送的短信,因为可以伪造号码所以具有非常大的迷惑性,终端用户难以辨别真假。With the development of communication technology, there are more and more cases and means of telecom fraud. Among the many telecom fraud technologies, committing crimes through illegal base stations or pseudo-base stations has become the mainstream means. These pseudo base stations can be disguised as carrier's base stations, and fake other people's numbers to send fraudulent text messages. Based on the short message sent by the pseudo base station, it is very confusing because the number can be forged, and it is difficult for the terminal user to distinguish between true and false.
在现有技术中,通常识别伪基站的方法为通过终端对比基站特征参数来识别伪基站的方法和基于基站位置识别伪基站的方法。通过终端对比基站特征参数来识别伪基站的方法是:终端解析基站的特征参数,与本地预置的特征参数库进行匹配,如果在合法范围内就认为是合法的基站。否则认为是伪基站,直接从终端屏蔽接入伪基站。但是,该判断逻辑完全依赖终端,无法进行系统升级。随着伪基站技术的发展一些特征参数也是可以进行调整的,但是终端无法动态获得,容易导致误判。In the prior art, a method of generally identifying a pseudo base station is a method of identifying a pseudo base station by comparing a base station characteristic parameter with a terminal and a method of identifying a pseudo base station based on a base station position. The method for identifying a pseudo base station by comparing the characteristics of the base station with the terminal is: the terminal parses the characteristic parameter of the base station, and matches the locally preset feature parameter database, and if it is within the legal range, it is considered to be a legal base station. Otherwise, it is considered to be a pseudo base station, and the pseudo base station is directly blocked from the terminal. However, the decision logic relies entirely on the terminal and cannot be upgraded. With the development of the pseudo base station technology, some characteristic parameters can also be adjusted, but the terminal cannot be obtained dynamically, which easily leads to misjudgment.
基于基站位置识别伪基站的方法为:当终端收到通知类短信时,会上报短信及终端位置信息到服务器。服务器根据大量终端上报的信息进行计算,获得某个区域内的基站信息,然后与运营商基站库中的位置进行对比,不在运营商基站库中的就认为是伪基站。但是,这样的判断方式仅针对通知类消息进行判断存在风险,伪基站可以构造任意号码,所以发送的短信不一定都是通知类短信;运营商自身也存在移动基站,单从位置上比对并不完全可靠;另外终端上报的基站位置是通过算法计算获得的,本身存在误差。The method for identifying the pseudo base station based on the location of the base station is: when the terminal receives the notification type short message, the short message and the terminal location information are reported to the server. The server performs calculation based on the information reported by a large number of terminals, obtains the base station information in a certain area, and then compares with the location in the carrier base station library, and is not considered as a pseudo base station in the carrier base station library. However, such a judgment method only has a risk for judging a notification type message, and the pseudo base station can construct an arbitrary number, so the sent short messages are not necessarily notification type short messages; the operator itself also has a mobile base station, which is aligned from the position alone. It is not completely reliable; in addition, the location of the base station reported by the terminal is obtained by algorithm calculation, and there is an error in itself.
发明内容Summary of the invention
本申请实施例提供了一种提示方法、终端以及服务器,用于服务器根据多个终端上报的大数据来获取准确率比较高的真实基站的信息和伪基站的信息。The embodiment of the present application provides a prompting method, a terminal, and a server, which are used by a server to obtain information of a real base station with higher accuracy and information of a pseudo base station according to big data reported by multiple terminals.
本申请实施例的第一方面提供一种提示方法,所述方法可以应用在服务器连接有多个终端的场景,所述方法可以包括:服务器接收多个终端发送的事件的信息;所述事件可以接收短信和/或来电;应理解,所述事件的信息可以是服务器接收一定数量阈值的终端上报的事件的信息,也可以是服务器接收特定阈值数量的事件的信息,还可以是,服务器接收预置时长内终端上报的事件的信息,具体此处不做限定。所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。即服务器可以根据多个终端上报的大数据进行计算,获取的真实基站的信息和伪基站的信息的准确率比较高。应理解,虽然说终端上报的数据越多,服务器所获取的真实基站的信息和伪基站的信息也就越准确,但是,这些需要在服务器的负载范围内。这里服务器获取真实基站的信息和伪基站的信息 需要保存,可以确定多个终端中接入伪基站的目标终端,也可以确定下次接收第一终端上报的第一事件的信息,可以确定第一终端接入的第一基站的真伪。A first aspect of the embodiments of the present application provides a prompting method, where the method may be applied to a scenario in which a server is connected to multiple terminals, and the method may include: the server receives information of events sent by multiple terminals; the event may be Receiving a short message and/or an incoming call; it should be understood that the information of the event may be information of an event reported by the terminal receiving a certain threshold of the server, or may be information that the server receives a certain threshold number of events, or may be, the server receives the pre- The information of the event reported by the terminal within the duration is not limited herein. The server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals. That is, the server can perform calculation according to the big data reported by multiple terminals, and the accuracy of the obtained real base station information and the pseudo base station information is relatively high. It should be understood that although the more data reported by the terminal, the more accurate the information of the real base station and the information of the pseudo base station acquired by the server, these need to be within the load range of the server. Here, the server obtains the information of the real base station and the information of the pseudo base station. If the target terminal accessing the pseudo base station is determined, the information about the first event reported by the first terminal may be determined next time, and the authenticity of the first base station accessed by the first terminal may be determined.
结合本申请实施例的第一方面,在本申请实施例的第一方面的第一种实现方式中,所述方法还可以包括:所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;所述服务器向所述目标终端发送伪基站的指示信息。服务器确定有接入伪基站的目标终端后,可以向目标终端发送伪基站的指示信息,所述伪基站的指示信息用于目标终端提示,使得用户对目标终端上发生的事件引起警惕,小心上当受骗。With reference to the first aspect of the embodiments of the present application, in a first implementation manner of the first aspect of the application, the method may further include: the server, according to information of the real base station, and the pseudo base station And determining, by the information, a target terminal that accesses the pseudo base station among the plurality of terminals; and the server sends the indication information of the pseudo base station to the target terminal. After the server determines that there is a target terminal that accesses the pseudo base station, the indication information of the pseudo base station may be sent to the target terminal, and the indication information of the pseudo base station is used for prompting the target terminal, so that the user is alert to the event occurring on the target terminal, and is careful to be fooled. Being cheated.
结合本申请实施例的第一方面、第一方面的第一种实现方式,在本申请实施例的第一方面的第二种实现方式中,所述事件的信息包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。所述事件的信息还可以包括短信内容和/或来电号码。应理解,所述事件的信息包括但不限于上述所提及的信息,所述事件的信息可以用于服务器进行大数据的计算,得到真实基站的信息和伪基站的信息。With reference to the first aspect of the embodiment of the present application, the first implementation manner of the first aspect, in the second implementation manner of the first aspect of the embodiment of the present application, the information of the event includes a terminal identifier, and location information of the terminal. The information of the base station that is accessed when the event occurs, and the time when the event occurs. The information of the event may also include a short message content and/or a caller number. It should be understood that the information of the event includes, but is not limited to, the information mentioned above, and the information of the event may be used by the server to perform calculation of big data, and obtain information of the real base station and information of the pseudo base station.
结合本申请实施例第一方面的第二种实现方式,在本申请实施例的第一方面的第三种实现方式中,所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息,可以包括:所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;这里可以得到多组关于经度、纬度、日期的数据。所述服务器从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;这里的第一阈值可以是一个经验值,也可以根据实际情况而设定。所述服务器去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;所述服务器确定所述筛选基站的信息为真实基站的信息。在本申请实施例中,提供了一种获取真实基站的信息的实现方式,增加了方案的可行性。With reference to the second implementation manner of the first aspect of the embodiments of the present application, in a third implementation manner of the first aspect of the application, the server acquires a real base station according to information about events sent by the multiple terminals. The information may include: the server determining, according to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurs, the time when the event occurs, and the preset location calculation accuracy. Information about the initial base station of longitude, latitude, and date; here, multiple sets of data about longitude, latitude, and date can be obtained. The server deletes, from the information about the initial base station of the longitude, latitude, and date, the information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold; where the first threshold may be an empirical value, or may be based on Set according to the actual situation. The server removes the date, and the information of the other initial base stations are combined to obtain information about the longitude and latitude of the screening base station; and the server determines that the information of the screening base station is the information of the real base station. In the embodiment of the present application, an implementation manner of acquiring information of a real base station is provided, which increases the feasibility of the solution.
结合本申请实施例第一方面的第二种实现方式,在本申请实施例的第一方面的第四种实现方式中,所述服务器根据所述多个终端发送的事件的信息,获取伪基站的信息,可以包括:即服务器利用伪基站移动的特点(可移动,突然出现并消失),识别出可能潜在的伪基站。所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;所述服务器根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;所述服务器确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述服务器确定所述目标基站的信息为伪基站的信息。在本申请实施例中,提供了一种获取真实伪基站的信息的实现方式,增加了方案的可行性。With reference to the second implementation manner of the first aspect of the embodiments of the present application, in a fourth implementation manner of the first aspect of the application, the server acquires a pseudo base station according to information about events sent by the multiple terminals. The information may include: that is, the server utilizes the characteristics of the pseudo base station movement (movable, suddenly appears and disappears), and identifies potential pseudo base stations. Determining, by the server, location information of the terminal that the target base station accesses at the first time according to the location information of the terminal that is sent by the multiple terminals, the information of the base station that is accessed when the event occurs, and the time when the event occurs. The location information of the terminal accessed at the second time, the target base station is any base station that is accessed when the multiple terminals generate the event; the server is according to the terminal that the target base station accesses at the first time The location information is calculated, the first central location of the accessed terminal is calculated, and the second central location of the accessed terminal is calculated according to the location information of the terminal accessed by the target base station at the second time; the server determines the Determining, by the first central location, a first location of the target base station, determining that the second central location is a second location of the target base station; and determining an absolute value of a difference between the first location and the second location If the value is greater than the second threshold, the server determines that the information of the target base station is information of the pseudo base station. In the embodiment of the present application, an implementation manner of acquiring information of a real pseudo base station is provided, which increases the feasibility of the solution.
结合本申请实施例的第一方面、本申请实施例的第一方面的第一种至第四种实现方式中的任意一种,在本申请实施例的第一方面的第五种实现方式中,所述方法还可以包括: 所述服务器标记所述真实基站和所述伪基站的可疑概率;服务器可以将真实基站的可疑概率标记为0,伪基站的可疑概率标为100%,也可以根据实际情况而标记。所述服务器接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;即服务器将伪基站的指示信息向目标终端发送后,目标终端会提示伪基站的指示信息,而有的目标终端上会接收用户输入的反馈信息,这些收到反馈信息的目标终端可以称为第一目标终端,第一目标终端将反馈信息上报给服务器。所述服务器根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率。从而对保存的真实基站的信息和伪基站的信息进行更新,使得保存的真实基站的信息和伪基站的信息是最新的记录。With reference to the first aspect of the embodiments of the present application, any one of the first to fourth implementation manners of the first aspect of the application, in the fifth implementation manner of the first aspect of the embodiment of the present application, The method may further include: The server marks the suspicious probability of the real base station and the pseudo base station; the server may mark the suspicious probability of the real base station as 0, and the suspicious probability of the pseudo base station is marked as 100%, or may be marked according to actual conditions. The server receives the feedback information sent by the first target terminal, where the feedback information is input information that is input by the user, whether the base station that is accessed when the event occurs when the first target terminal is the pseudo base station is accurate; After the server sends the indication information of the pseudo base station to the target terminal, the target terminal may prompt the indication information of the pseudo base station, and the target terminal receives the feedback information input by the user, and the target terminal that receives the feedback information may be referred to as the first The target terminal reports the feedback information to the server. The server correspondingly modifies the suspicious probability of the pseudo base station according to the feedback information, and obtains a modified suspicious probability of the pseudo base station. Thereby, the information of the saved real base station and the information of the pseudo base station are updated, so that the information of the saved real base station and the information of the pseudo base station are the latest records.
在本申请实施例中,服务器接收第一目标终端上报的反馈信息后,就可以对保存的真实基站的信息和伪基站的信息的可疑概率进行修改,从而更新真实基站的信息和伪基站的信息。使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。In the embodiment of the present application, after receiving the feedback information reported by the first target terminal, the server may modify the saved information of the real base station and the suspicious probability of the information of the pseudo base station, thereby updating the information of the real base station and the information of the pseudo base station. . When the server receives the information of the first event reported by the first terminal, the server may determine, according to the updated information of the real base station and the information of the pseudo base station, whether the first base station accessed by the terminal when the first event occurs is a pseudo base station. In this way, the accuracy of the result judged based on the real-time updated real base station information and the pseudo base station information is higher.
结合本申请实施例第一方面的第五种实现方式中的任意一种,在本申请实施例的第一方面的第六种实现方式中,所述方法还可以包括:所述服务器确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息、可疑概率小于第四阈值的基站的信息为目标真实基站的信息;这些目标真实基站的信息和目标伪基站的信息包括但不限于(cell identification,CID)、位置区标识(location area code,LAC)、信号强度、采集时间与上报时间的差异等信息。所述服务器根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到基站的信息中包括的各个特征的参考权重。With reference to any one of the fifth implementation manners of the first aspect of the present application, in a sixth implementation manner of the first aspect of the embodiments, the method may further include: determining, by the server, a suspicious probability The information of the base station that is greater than the third threshold is the information of the target pseudo base station, and the information of the base station whose suspicious probability is less than the fourth threshold is the information of the target real base station; the information of the target real base station and the information of the target pseudo base station include but are not limited to (cell) Identification, CID), location area code (LAC), signal strength, difference between acquisition time and reporting time. The server performs model training according to the information of the target pseudo base station and the information of the target real base station, and obtains reference weights of respective features included in the information of the base station.
在本申请实施例中,如果得到基站的信息中包括的各个特征的参考权重,那么就可以对下次第一终端上报的第一事件的信息中第一基站的信息进行计算,得到第一基站的目标可疑概率,从而,判断第一基站的真伪,提供了一种确定第一基站是真实基站或者伪基站的实现方式,使得本申请实施例更加完善。In the embodiment of the present application, if the reference weight of each feature included in the information of the base station is obtained, the information of the first base station in the information of the first event reported by the first terminal may be calculated to obtain the first base station. The target suspicious probability, and thus the authenticity of the first base station, provides an implementation manner for determining whether the first base station is a real base station or a pseudo base station, so that the embodiment of the present application is more perfect.
结合本申请实施例第一方面的第六种实现方式中的任意一种,在本申请实施例的第一方面的第七种实现方式中,所述方法还可以包括:所述服务器接收第一终端发送的第一事件的信息,所述第一事件的信息可以包括发生所述第一事件时接入的第一基站的信息;若所述第一基站的信息在所述伪基站的信息中,则所述服务器向所述第一终端发送伪基站的指示信息。应理解,第一事件的信息包括但不限于上述所提及的信息。所述第一事件的信息还可以包括所述第一终端标识、所述第一终端的位置信息、发生所述第一事件的时间。With reference to any one of the sixth implementation manners of the first aspect of the present application, in a seventh implementation manner of the first aspect of the embodiments, the method may further include: the server receiving the first The information of the first event sent by the terminal, the information of the first event may include information of the first base station that is accessed when the first event occurs; if the information of the first base station is in the information of the pseudo base station And the server sends the indication information of the pseudo base station to the first terminal. It should be understood that the information of the first event includes, but is not limited to, the information mentioned above. The information of the first event may further include the first terminal identifier, location information of the first terminal, and a time when the first event occurs.
在本申请实施例中,提供了一种确定伪基站的实现方式,服务器可以根据之前计算出来的真实基站的信息和伪基站的信息来确定第一基站的信息是否在其中。若第一基站在伪基站的信息中,则说明第一基站为伪基站,那么,服务器可以向第一终端发送伪基站的指示信息,又因为根据大数据计算出来的伪基站的信息和真实基站的准确率比较高,所以,这样确定出第一基站为伪基站的准确率也比较高。In the embodiment of the present application, an implementation manner of determining a pseudo base station is provided. The server may determine, according to the previously calculated information of the real base station and the information of the pseudo base station, whether the information of the first base station is located therein. If the first base station is in the information of the pseudo base station, the first base station is a pseudo base station, then the server may send the indication information of the pseudo base station to the first terminal, and the information of the pseudo base station calculated according to the big data and the real base station. The accuracy rate is relatively high, so the accuracy of determining the first base station as a pseudo base station is also relatively high.
结合本申请实施例第一方面的第七种实现方式中的任意一种,在本申请实施例的第一 方面的第八种实现方式中,所述方法还可以包括:若所述第一基站的信息未在所述伪基站的信息中,则所述服务器根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率;若所述目标概率小于等于所述第五阈值,则所述服务器确定所述第一基站为伪基站;所述服务器向所述第一终端发送伪基站的指示信息。在本申请实施例中,是根据基站的信息中各个特征的参考权重,计算得出第一基站是否为伪基站,为本申请实施例提供了一种可选的实现方式。With reference to any one of the seventh implementation manners of the first aspect of the present application, the first embodiment of the present application In an eighth implementation manner of the aspect, the method may further include: if the information of the first base station is not in the information of the pseudo base station, the server, according to the information of the first event, and the base station The reference weight of each feature included in the information determines a target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the server determines that the first base station is a pseudo base station; The server sends the indication information of the pseudo base station to the first terminal. In the embodiment of the present application, the reference base weight of each feature in the information of the base station is used to calculate whether the first base station is a pseudo base station, which is an optional implementation manner.
结合本申请实施例的第一方面、本申请实施例的第一方面的第一种至第八种实现方式中的任意一种,在本申请实施例的第一方面的第九种实现方式中,所述事件可以包括:接收短信和/或来电;所述事件的信息还可以包括:所述短信的内容和/或所述来电的号码。With reference to the first aspect of the embodiments of the present application, any one of the first to eighth implementation manners of the first aspect of the application, in the ninth implementation manner of the first aspect of the embodiment of the present application, The event may include: receiving a short message and/or an incoming call; the information of the event may further include: a content of the short message and/or a number of the incoming call.
本申请实施例第二方面提供了一种提示方法,可以包括:终端检测事件发生并采集所述事件的信息;所述终端向服务器发送所述事件的信息;如果有多个终端向服务器发送事件的信息,那么,服务器就可以根据多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息,从而,就可以确定终端接入的是否为伪基站。所述终端接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的;所述终端提示所述伪基站的指示信息。终端如果提示伪基站的指示信息,就可以使得用户对目标终端上发生的事件引起警惕,小心上当受骗。A second aspect of the embodiments of the present application provides a prompting method, which may include: detecting, by a terminal, an event occurrence and collecting information of the event; the terminal sending information of the event to a server; if multiple terminals send an event to a server Then, the server can obtain the information of the real base station and the information of the pseudo base station according to the information of the event sent by the multiple terminals, so that it can be determined whether the terminal access is a pseudo base station. The terminal receives the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event; and the terminal prompts the indication information of the pseudo base station. If the terminal prompts the indication information of the pseudo base station, the user can be alerted to the event occurring on the target terminal, and be careful to be deceived.
结合本申请实施例的第二方面,在本申请实施例的第二方面的第一种实现方式中,所述事件的信息可以包括所述终端标识、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。所述事件的信息还可以包括短信内容和/或来电号码。应理解,所述事件的信息包括但不限于上述所提及的信息,所述事件的信息可以用于服务器进行大数据的计算,得到真实基站的信息和伪基站的信息。With reference to the second aspect of the embodiments of the present application, in a first implementation manner of the second aspect of the application, the information about the event may include the terminal identifier, location information of the terminal, and the event occurs. The information of the base station that is accessed at the time, and the time when the event occurs. The information of the event may also include a short message content and/or a caller number. It should be understood that the information of the event includes, but is not limited to, the information mentioned above, and the information of the event may be used by the server to perform calculation of big data, and obtain information of the real base station and information of the pseudo base station.
结合本申请实施例的第二方面、第二方面的第一种实现方式,在本申请实施例的第二方面的第二种实现方式中,所述方法还可以包括:所述终端接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;所述终端向所述服务器发送所述反馈信息,所述反馈信息用于所述服务器对所述伪基站的可疑概率进行修改。应理解,假设,这里接收反馈信息的终端称为第一目标终端。在本申请实施例中,服务器接收第一目标终端上报的反馈信息后,就可以对保存的真实基站的信息和伪基站的信息的可疑概率进行修改,从而更新真实基站的信息和伪基站的信息。从而使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。With reference to the second aspect of the embodiment of the present application, the first implementation manner of the second aspect, in the second implementation manner of the second aspect of the embodiment of the present application, the method may further include: receiving, by the terminal, feedback information The feedback information is input information input by the user to the base station that is accessed when the terminal occurs when the event occurs, and the terminal information is accurate; the terminal sends the feedback information to the server, the feedback The information is used by the server to modify the suspicious probability of the pseudo base station. It should be understood that, assuming that the terminal receiving the feedback information here is referred to as a first target terminal. In the embodiment of the present application, after receiving the feedback information reported by the first target terminal, the server may modify the saved information of the real base station and the suspicious probability of the information of the pseudo base station, thereby updating the information of the real base station and the information of the pseudo base station. . Therefore, when the server receives the information of the first event reported by the first terminal, the server may determine, according to the updated information of the real base station and the information of the pseudo base station, whether the first base station accessed by the terminal when the first event occurs is a pseudo base station. Thus, the accuracy of the result judged based on the real-time updated real base station information and the pseudo base station information is higher.
结合本申请实施例的第二方面、第二方面的第一种实现方式、第二方面的第二种实现方式,在本申请实施例的第二方面的第三种实现方式中,所述终端提示所述伪基站的指示信息,可以包括:所述终端通过文字显示所述伪基站的指示信息;和/或,所述终端通过危险标识显示所述伪基站的指示信息;和/或,所述终端通过语音提示所述伪基站的指示信息。需要说明的是,终端通过所述事件对应的应用界面显示事件的信息,所述事件的信息可以包括短信内容和/或来电号码,并可以在所述应用界面上提示所述伪基站的提示信息。该应 用界面可以是短信界面或者来电界面。With reference to the second aspect of the embodiment of the present application, the first implementation manner of the second aspect, and the second implementation manner of the second aspect, in the third implementation manner of the second aspect of the embodiment of the present application, the terminal The indication information of the pseudo base station may be: the terminal displays the indication information of the pseudo base station by using a text; and/or the terminal displays the indication information of the pseudo base station by using a danger identifier; and/or The terminal prompts the indication information of the pseudo base station by voice. It is to be noted that the terminal displays the information of the event by using an application interface corresponding to the event, where the information of the event may include a short message content and/or an incoming call number, and may prompt the prompt information of the pseudo base station on the application interface. . Should The interface can be an SMS interface or an incoming call interface.
结合本申请实施例的第二方面、第二方面的第一种实现方式、第二方面的第二种实现方式、第二方面的第三种实现方式,在本申请实施例的第二方面的第四种实现方式中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。With reference to the second aspect of the embodiments of the present application, the first implementation manner of the second aspect, the second implementation manner of the second aspect, and the third implementation manner of the second aspect, In a fourth implementation manner, the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: a content of the short message and/or a number of the incoming call.
本申请实施例第三方面提供一种服务器,具有实现对应于上述第一方面提供的获取真实基站的信息和伪基站的信息的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。A third aspect of the embodiments of the present application provides a server, which has a function of implementing information corresponding to the acquired real base station and information of the pseudo base station provided by the foregoing first aspect. This function can be implemented in hardware or in hardware by executing the corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
本申请实施例第四方面提供一种终端,具有实现对应于上述第二方面提供的提示伪基站的指示信息的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。A fourth aspect of the embodiments of the present application provides a terminal, which has a function of implementing indication information corresponding to the prompting pseudo base station provided by the foregoing second aspect. This function can be implemented in hardware or in hardware by executing the corresponding software. The hardware or software includes one or more modules corresponding to the functions described above.
本申请实施例第五方面提供一种服务器,可以包括:收发器,处理器,存储器和总线,所述收发器、所述处理器和所述存储器通过所述总线连接;A fifth aspect of the embodiments of the present application provides a server, which may include: a transceiver, a processor, a memory, and a bus, where the transceiver, the processor, and the memory are connected by using the bus;
所述存储器,用于存储操作指令;The memory is configured to store an operation instruction;
所述收发器,用于接收多个终端发送的事件的信息;The transceiver is configured to receive information about events sent by multiple terminals;
所述处理器,用于调用所述操作指令,根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。The processor is configured to invoke the operation instruction, and acquire information of a real base station and information of a pseudo base station according to information of an event sent by the multiple terminals.
在一种可能的设计中,所述处理器,还用于根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;In a possible design, the processor is further configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals;
所述收发器,还用于向所述目标终端发送伪基站的指示信息。The transceiver is further configured to send indication information of the pseudo base station to the target terminal.
在一种可能的设计中,所述事件的信息包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。In a possible design, the information of the event includes a terminal identifier, location information of the terminal, information of a base station accessed when the event occurs, and a time when the event occurs.
在一种可能的设计中,所述处理器具体用于执行以下步骤:In a possible design, the processor is specifically configured to perform the following steps:
根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;确定所述筛选基站的信息为真实基站的信息。Determining an initial base station regarding longitude, latitude, and date according to location information of the terminal transmitted by the plurality of terminals, information of a base station accessed when the event occurs, a time when the event occurs, and preset position calculation accuracy Information from the initial base station on the longitude, latitude, and date, deleting information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold; removing the date, and combining information of other initial base stations to obtain Information about screening base stations for longitude and latitude; determining information of the screening base station as information of a real base station.
在一种可能的设计中,所述处理器具体用于执行以下步骤:In a possible design, the processor is specifically configured to perform the following steps:
根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述处理器确定所述目标基站的信息为伪基站的信息。 Determining location information and a second time of the terminal accessed by the target base station at the first time according to the location information of the terminal that is sent by the multiple terminals, the information of the base station that is accessed when the event occurs, and the time when the event occurs. The location information of the accessed terminal, the target base station is any base station that is accessed when the multiple terminals generate the event; and the location information of the terminal accessed by the target base station at the first time is calculated and connected. a first central location of the incoming terminal, calculating a second central location of the accessed terminal according to the location information of the terminal accessed by the target base station at the second time; determining that the first central location is the target base station a first location, determining that the second central location is a second location of the target base station; if the absolute value of the difference between the first location and the second location is greater than a second threshold, the processing The device determines that the information of the target base station is information of a pseudo base station.
在一种可能的设计中,所述处理器还用于执行以下步骤:标记所述真实基站和所述伪基站的可疑概率;根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率;In a possible design, the processor is further configured to: perform marking: suspicious probability of the real base station and the pseudo base station; and correspondingly modify a suspicious probability of the pseudo base station according to the feedback information, The modified suspicious probability of the pseudo base station;
所述收发器还用于执行以下步骤:接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息。The transceiver is further configured to: receive feedback information sent by the first target terminal, where the feedback information is an indication that the base station that is accessed by the user when the event occurs when the first target terminal occurs is a pseudo base station Whether the information is entered accurately.
在一种可能的设计中,所述处理器,还用于执行以下步骤:In one possible design, the processor is further configured to perform the following steps:
确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息、可疑概率小于第四阈值的基站的信息为目标真实基站的信息;根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到基站的信息中包括的各个特征的参考权重。Determining information of the base station whose suspicious probability is greater than the third threshold is information of the target pseudo base station, and information of the base station whose suspicious probability is less than the fourth threshold is information of the target real base station; according to the information of the target pseudo base station and the target real base station Information, model training, and reference weights of various features included in the information of the base station.
在一种可能的设计中,所述收发器,还用于执行以下步骤:In a possible design, the transceiver is further configured to perform the following steps:
接收第一终端发送的第一事件的信息,所述第一事件的信息发生所述第一事件时接入的第一基站的信息;若所述第二基站的信息在所述伪基站的信息中,则所述收发器向所述第一终端发送伪基站的指示信息。Receiving information of the first event sent by the first terminal, where the information of the first event generates information of the first base station that is accessed when the first event is generated; and if the information of the second base station is information of the pseudo base station The transceiver sends the indication information of the pseudo base station to the first terminal.
在一种可能的设计中,所述处理器还用于执行以下步骤:In one possible design, the processor is further configured to perform the following steps:
若所述第一基站的信息未在所述伪基站的信息中,则所述处理器模块根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率;若所述目标概率小于等于所述第五阈值,则所述处理器确定所述第一基站为伪基站;If the information of the first base station is not in the information of the pseudo base station, the processor module determines, according to the information of the first event and the reference weight of each feature included in the information of the base station, a target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the processor determines that the first base station is a pseudo base station;
所述收发器还用于执行以下步骤:向所述第一终端发送伪基站的指示信息。The transceiver is further configured to: send the indication information of the pseudo base station to the first terminal.
在一种可能的设计中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。In a possible design, the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: the content of the short message and/or the number of the incoming call.
本申请实施例第六方面提供一种终端,可以包括:处理器,通信接口,存储器,输出单元和总线,所述处理器、所述通信接口、所述输出单元和所述存储器通过所述总线连接;A sixth aspect of the embodiments of the present application provides a terminal, which may include: a processor, a communication interface, a memory, an output unit, and a bus, wherein the processor, the communication interface, the output unit, and the memory pass through the bus connection;
所述存储器,用于存储操作指令;The memory is configured to store an operation instruction;
所述处理器,用于调用所述操作指令,检测事件发生并采集所述事件的信息;The processor is configured to invoke the operation instruction, detect an event occurrence, and collect information about the event;
所述通信接口,用于向服务器发送所述事件的信息;接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的;The communication interface is configured to send the information of the event to the server, and receive the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event;
所述输出单元,用于提示所述伪基站的指示信息。The output unit is configured to prompt indication information of the pseudo base station.
在一种可能的设计中,所述事件的信息包括所述终端标识、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间;提示所述伪基站的指示信息。In a possible design, the information of the event includes the identifier of the terminal, location information of the terminal, information of a base station accessed when the event occurs, time when the event occurs, and prompting the pseudo base station Instructions.
在一种可能的设计中,所述终端还包括输入单元,所述输入单元,还用于接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;In a possible design, the terminal further includes an input unit, where the input unit is further configured to receive feedback information, where the feedback information is a base station that is input by the user when the event occurs when the terminal occurs. Whether the indication information of the pseudo base station is accurate input information;
所述通信接口,还用于向所述服务器发送所述反馈信息,所述反馈信息用于所述服务器对所述伪基站的可疑概率进行修改。The communication interface is further configured to send the feedback information to the server, where the feedback information is used by the server to modify a suspicious probability of the pseudo base station.
在一种可能的设计中,所述输出单元包括显示单元,所述显示单元,用于通过文字显示所述伪基站的指示信息。 In a possible design, the output unit includes a display unit, and the display unit is configured to display indication information of the pseudo base station by text.
在一种可能的设计中,所述输出单元包括显示单元,所述显示单元,用于通过危险标识显示所述伪基站的指示信息。In a possible design, the output unit includes a display unit, and the display unit is configured to display indication information of the pseudo base station by a danger identifier.
在一种可能的设计中,所述输出单元包括音频电路,所述音频电路,用于通过语音提示所述伪基站的指示信息。In a possible design, the output unit comprises an audio circuit, and the audio circuit is configured to prompt the indication information of the pseudo base station by voice.
本申请实施例第七方面提供一种通信系统,所述通信系统包括服务器和终端,所述服务器为执行本申请第一方面或第一方面任一可选实现方式中所述的服务器;所述终端为执行本申请第二方面或第二方面任一可选实现方式中所述的终端。A seventh aspect of the present application provides a communication system, where the communication system includes a server and a terminal, and the server is a server that is implemented in the foregoing implementation manner of the first aspect or the optional implementation of the first aspect; The terminal is a terminal that is implemented in the second aspect of the present application or any of the alternative implementations of the second aspect.
本发明实施例第八方面提供一种存储介质,需要说明的是,本发的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产口的形式体现出来,该计算机软件产品存储在一个存储介质中,用于储存为上述设备所用的计算机软件指令,其包含用于执行上述第一方面、第二方面、第三方面或第四方面为服务器或者终端所设计的程序。An eighth aspect of the embodiments of the present invention provides a storage medium. It should be noted that the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be implemented by software. Formally embodied, the computer software product is stored in a storage medium for storing computer software instructions for use in the above apparatus, comprising: a server for performing the first aspect, the second aspect, the third aspect or the fourth aspect described above Or the program designed by the terminal.
该存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。The storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes.
本发明实施例第九方面提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如本申请第一方面或第一方面任一可选实现方式中所述的方法。A ninth aspect of the embodiments of the present invention provides a computer program product comprising instructions, which when executed on a computer, cause the computer to perform the method as described in the first aspect of the present application or any alternative implementation of the first aspect.
本发明实施例第十方面提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如本申请第二方面或第二方面任一可选实现方式中所述的方法。A tenth aspect of the embodiments of the present invention provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method as described in the second aspect of the present application or any alternative implementation of the second aspect.
本申请实施例提供的技术方案中,具有以下有益效果:The technical solutions provided by the embodiments of the present application have the following beneficial effects:
在本申请实施例中,服务器是根据多个终端上报的大数据来获取真实基站的信息和伪基站的信息,所以,得到的真实基站的信息和伪基站的信息的准确率比较高。即服务器接收多个终端发送的事件的信息,事件的信息可以包括终端标识、终端的位置信息、发生事件时接入的基站的信息、发生事件的时间。服务器根据所述多个终端发送的事件的信息获取真实基站的信息和伪基站的信息。服务器还可以根据真实基站的信息和伪基站的信息,再确定所述多个终端中接入伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对目标终端上发生的事件引起警惕,小心上当受骗。In the embodiment of the present application, the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by the multiple terminals. Therefore, the accuracy of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives the information of the event sent by the multiple terminals, and the information of the event may include the identifier of the terminal, the location information of the terminal, the information of the base station that is accessed when the event occurs, and the time when the event occurs. The server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals. The server may further determine, according to the information of the real base station and the information of the pseudo base station, the target terminal that accesses the pseudo base station among the multiple terminals, and send the indication information of the pseudo base station to the target terminal, so that the user causes an event occurring on the target terminal. Be alert, be careful to be deceived.
附图说明DRAWINGS
图1为本申请实施例中所应用的一个通信系统框架图;1 is a frame diagram of a communication system applied in an embodiment of the present application;
图2为本申请实施例中所应用的一个场景示意图;2 is a schematic diagram of a scenario applied in an embodiment of the present application;
图3为本申请实施例中提示方法的一个实施例示意图;FIG. 3 is a schematic diagram of an embodiment of a prompting method in an embodiment of the present application; FIG.
图4(a)为本申请实施例中终端接收短信界面显示的一个示意图;4(a) is a schematic diagram of a terminal receiving a short message interface display according to an embodiment of the present application;
图4(b)为本申请实施例中终端接收来电界面显示的一个示意图;4(b) is a schematic diagram of a terminal receiving an incoming call interface display according to an embodiment of the present application;
图4(c)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(c) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application;
图4(d)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(d) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application;
图4(e)为本申请实施例中终端提示伪基站的指示信息的另一个示意图; FIG. 4(e) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application;
图4(f)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(f) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application;
图4(g)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(g) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application;
图4(h)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(h) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application;
图4(i)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(i) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application;
图4(j)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(j) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application;
图4(k)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;4(k) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application;
图4(l)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(1) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application;
图4(m)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(m) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application;
图4(n)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(n) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application;
图4(o)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(o) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application;
图4(p)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(p) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application;
图5为本申请实施例中提示方法的另一个实施例示意图;FIG. 5 is a schematic diagram of another embodiment of a prompting method in an embodiment of the present application; FIG.
图6(a)为本申请实施例中终端在短信界面上显示输入反馈信息的一个示意图;6(a) is a schematic diagram of a terminal displaying input feedback information on a short message interface according to an embodiment of the present application;
图6(b)为本申请实施例中终端在短信界面上显示输入反馈信息的另一个示意图;FIG. 6(b) is another schematic diagram of the terminal displaying input feedback information on the short message interface in the embodiment of the present application;
图6(c)为本申请实施例中终端在来电界面上显示输入反馈信息的一个示意图;FIG. 6(c) is a schematic diagram of the terminal displaying input feedback information on the incoming call interface in the embodiment of the present application;
图6(d)为本申请实施例中终端在来电界面上显示输入反馈信息的另一个示意图;6(d) is another schematic diagram of the terminal displaying input feedback information on the incoming call interface in the embodiment of the present application;
图7为本申请实施例中提示方法的另一个实施例示意图;FIG. 7 is a schematic diagram of another embodiment of a prompting method in an embodiment of the present application; FIG.
图8为本申请实施例中提示方法的另一个实施例示意图;FIG. 8 is a schematic diagram of another embodiment of a prompting method in an embodiment of the present application; FIG.
图9(a)为本申请实施例中服务器的一个实施例示意图;FIG. 9(a) is a schematic diagram of an embodiment of a server in an embodiment of the present application;
图9(b)为本申请实施例中服务器的一个实施例示意图;FIG. 9(b) is a schematic diagram of an embodiment of a server in an embodiment of the present application;
图9(c)为本申请实施例中服务器的一个实施例示意图;FIG. 9(c) is a schematic diagram of an embodiment of a server in an embodiment of the present application;
图9(d)为本申请实施例中服务器的一个实施例示意图;FIG. 9(d) is a schematic diagram of an embodiment of a server in an embodiment of the present application;
图10为本申请实施例中终端的一个实施例示意图;FIG. 10 is a schematic diagram of an embodiment of a terminal in an embodiment of the present application;
图11为本申请实施例中服务器的另一个实施例示意图;11 is a schematic diagram of another embodiment of a server in an embodiment of the present application;
图12为本申请实施例中终端的另一个实施例示意图。FIG. 12 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
具体实施方式detailed description
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The technical solutions in the embodiments of the present application are described below with reference to the accompanying drawings in the embodiments of the present application. It is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person skilled in the art based on the embodiments of the present application without creative efforts are within the scope of the present application.
关于前面所说的通过终端对比基站特征参数来识别伪基站的方法为:当终端接入基站时,解析基站的特征参数,包括小区标识或者称为基站的扇区标识(cell identification,CID)、位置区标识(location area code,LAC)及系统信息等。然后将特征参数与本地预置的参数库进行匹配,如果在合法范围内就认为是合法的基站。否则认为是伪基站,直接从终端屏蔽接入伪基站。该方法的判断逻辑直接预置在终端芯片上,判断后可以直接屏蔽终端设备接入基站。但是,该判断逻辑完全依赖终端,无法进行系统升级。随着伪基站技 术的发展一些特征参数也是可以进行调整的,但是终端无法动态获得,容易导致误判。The method for identifying a pseudo base station by using a terminal to compare base station characteristic parameters is as follows: when the terminal accesses the base station, parsing characteristic parameters of the base station, including a cell identifier or a cell identification (CID) called a base station, Location area code (LAC) and system information. The feature parameters are then matched to a locally preset parameter library, which is considered a legitimate base station if it is within the legal range. Otherwise, it is considered to be a pseudo base station, and the pseudo base station is directly blocked from the terminal. The judgment logic of the method is directly preset on the terminal chip, and the terminal device can be directly shielded from accessing the base station after the judgment. However, the decision logic relies entirely on the terminal and cannot be upgraded. With pseudo base station technology Some characteristic parameters of the development of the technique can also be adjusted, but the terminal cannot be obtained dynamically, which is easy to cause misjudgment.
而基于基站位置识别伪基站的方法为仅针对通知类消息进行判断存在风险,伪基站可以构造任意号码不一定都是通知类短信;运营商自身也存在移动基站,单从位置上比对并不完全可靠;另外设备侧上报的基站位置是通过算法计算获得的,本身存在误差。The method for identifying the pseudo base station based on the location of the base station is that the notification is only for the notification type message, and the pseudo base station can construct any number not necessarily the notification type short message; the operator itself also has the mobile base station, and the position comparison is not It is completely reliable; in addition, the location of the base station reported by the device side is obtained by algorithm calculation, and there is an error in itself.
在本申请实施例中,本申请技术方案主要解决本地参数库无法及时更新导致的判断准确率问题以及使用服务器进行判断时由于数据上报来源限于通知类短信和运营商移动基站导致的判断准确率问题。In the embodiment of the present application, the technical solution of the present application mainly solves the problem of the accuracy of the judgment caused by the failure of the local parameter database to be updated in time, and the judgment accuracy rate caused by the source of the data report being limited to the notification type short message and the operator mobile base station when using the server for judgment. .
本申请实施例应用的通信系统框架图如图1所示,该通信系统可以包括终端和服务器。如图2所示,为本申请实施例所应用的一个场景示意图,A区域终端可以接入的合法基站有2号基站,B区域可以接入的正确基站有2、3、4号基站。The communication system framework diagram applied in the embodiment of the present application is as shown in FIG. 1, and the communication system may include a terminal and a server. As shown in FIG. 2 , a schematic diagram of a scenario applied by an embodiment of the present application, a legal base station that can be accessed by a terminal in the A area has a base station 2, and a correct base station that can be accessed in the B area has a base station 2, 3, and 4.
在本申请实施例中,服务器可以接收大量终端上报的事件的信息,事件的信息可以包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,所述事件可以为接收短信或者接收来电。再根据所述大量终端上报的事件的信息,获取真实基站的信息和伪基站的信息;所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述大量终端中接入伪基站的目标终端;所述服务器向所述目标终端发送伪基站的指示信息。这里对于确定伪基站的信息和真实基站的信息,如果越多的终端上报事件的信息,服务器所确定的结果就越准确。服务器再可以根据确定的真实基站的信息和伪基站的信息,再确定所述多个终端中接入基站为伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对终端上发生的事件引起警惕,小心上当受骗。In the embodiment of the present application, the server may receive the information of the event reported by the terminal, and the information of the event may include the identifier of the terminal, the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs. The event may be receiving a text message or receiving an incoming call. And obtaining, according to the information about the event reported by the plurality of terminals, the information of the real base station and the information of the pseudo base station; the server determining, according to the information of the real base station and the information of the pseudo base station, the access pseudo in the large number of terminals. a target terminal of the base station; the server transmitting indication information of the pseudo base station to the target terminal. Here, for determining the information of the pseudo base station and the information of the real base station, if more terminals report the event information, the more accurate the result determined by the server is. The server may further determine, according to the determined information of the real base station and the information of the pseudo base station, the target terminal in which the access base station is the pseudo base station, and send the indication information of the pseudo base station to the target terminal, so that the user occurs on the terminal. The incident caused vigilance and was carefully deceived.
在本申请的实施例中,服务器还可以利用伪基站移动的特点结合终端的反馈信息,修改伪基站的可疑概率,更新真实基站的信息和伪基站的信息,从而使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。In the embodiment of the present application, the server may further improve the suspicious probability of the pseudo base station, update the information of the real base station, and the information of the pseudo base station by using the characteristics of the pseudo base station movement, combined with the feedback information of the terminal, so that the server receives the first terminal next time. When the information of the first event is reported, the information about the real base station and the information of the pseudo base station may be used to determine whether the first base station accessed by the terminal when the first event occurs is a pseudo base station, such that the real base station according to the real-time update The information and the information of the pseudo base station determine the accuracy of the result.
在本申请的实施例中,服务器还可以根据真实基站的信息和伪基站的信息对应的可疑概率,选择一批可疑概率最高的基站的信息作为正例,可疑概率最低的基站的信息作为负例,进行模型训练,得到各个基站的信息中包括的各个特征的参考权重。这些各个特征的参考权重,可以用于服务器下次接收第一终端上报的第一事件的信息时,根据各个特征的参考权重和第一事件的信息,来计算发生第一事件时接入的第一基站的目标概率。若目标概率大于预设阈值,则服务器确定第一基站为真实基站;若目标概率小于等于所述预设阈值,则服务器确定第一基站为伪基站,服务器向该终端发送伪基站的指示信息。这样,服务器就可以根据各个特征的参考权重和第一事件的信息,来计算服务器新接收的终端发生第一事件时接入的第一基站是否为伪基站,提供了另外一种确定伪基站的实现方式,增加了方案的可行性。In the embodiment of the present application, the server may further select, according to the suspicious probability corresponding to the information of the real base station and the information of the pseudo base station, the information of the base station with the highest suspicious probability as the positive example, and the information of the base station with the lowest suspicious probability as the negative example. Model training is performed to obtain reference weights of respective features included in the information of each base station. The reference weights of the respective features may be used when the server receives the information of the first event reported by the first terminal, and according to the reference weight of each feature and the information of the first event, calculate the access time when the first event occurs. The target probability of a base station. If the target probability is greater than the preset threshold, the server determines that the first base station is a real base station; if the target probability is less than or equal to the preset threshold, the server determines that the first base station is a pseudo base station, and the server sends the indication information of the pseudo base station to the terminal. In this way, the server can calculate whether the first base station accessed by the newly received terminal of the server is a pseudo base station according to the reference weight of each feature and the information of the first event, and provide another method for determining the pseudo base station. The implementation method increases the feasibility of the scheme.
下面以实施例的方式,对本申请实施例中服务器接收多个终端上报信息进行具体说明。如图3所示,为本申请实施例中提示方法的一个实施例示意图,包括:The following is a specific description of the server receiving the multiple terminal reporting information in the embodiment of the present application. As shown in FIG. 3, it is a schematic diagram of an embodiment of a prompting method in an embodiment of the present application, including:
301、服务器接收多个终端发送的事件的信息。 301. The server receives information about events sent by multiple terminals.
在本申请实施例中,在服务器接收多个终端发送的事件的信息之前,终端发生检测事件发生并采集所述事件的信息,所述事件的信息可以包括所述终端标识(International Mobile Equipment Identity,IMEI)、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,发生事件的时间也可以称为时间戳(timestamp)。终端向服务器发送所述事件的信息,应理解,该事件可以包括接收短信和/或接收来电。该事件的信息还可以包括短信的内容和/或来电的号码等信息。In the embodiment of the present application, before the server receives the information of the event sent by the multiple terminals, the terminal generates a detection event and collects information about the event, where the information of the event may include the terminal identifier (International Mobile Equipment Identity, The IMEI), the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs, the time at which the event occurs may also be referred to as a timestamp. The terminal sends the information of the event to the server, it being understood that the event may include receiving a text message and/or receiving an incoming call. The information of the event may also include information such as the content of the short message and/or the number of the incoming call.
该终端可以为包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑等任意终端设备,在下述的示例中,可以以终端为手机为例进行说明。如图4(a)所示,为手机接收短信界面显示的一个示意图。如图4(b)所示,为手机接收来电界面显示的一个示意图。The terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, etc. In the following example, the terminal may be a mobile phone. The example is explained. As shown in FIG. 4( a ), a schematic diagram of the mobile phone receiving the short message interface display. As shown in FIG. 4(b), a schematic diagram of receiving an incoming call interface for a mobile phone.
其中,终端的位置信息可以利用全球定位系统(Global Positioning System,GPS)获得经纬度、或者利用网络计算经纬度。终端的位置信息可以包括但不限于经纬度、接入无线保真(Wireless Fidelity,WiFi)的无线接入点的物理地址(Basic Service Set identifier,BSSID)/无线接入点的标识或服务集标识(Service Set Identifier,SSID)/媒体接入控制地址(Medium Access Control address,MAC addr)/网络标识(Network ID),当前扫描到的WiFi SSID等信息。发生事件时接入的基站的信息可以包括基站的扇区标识、也可以称为小区标识(cell identification,CID)、LAC、相邻的CID,还可以包括信号强度、小区信息等信息。The location information of the terminal may be obtained by using a Global Positioning System (GPS) to obtain latitude and longitude, or using a network to calculate latitude and longitude. The location information of the terminal may include, but is not limited to, latitude and longitude, a Wireless Fidelity (WiFi) wireless access point's physical address (Basic Service Set identifier, BSSID) / a wireless access point identifier or a service set identifier ( Service Set Identifier (SSID)/Medium Access Control address (MAC addr)/Network ID (Network ID), information such as the currently scanned WiFi SSID. The information of the base station that is accessed when the event occurs may include the sector identifier of the base station, and may also be referred to as a cell identification (CID), a LAC, an adjacent CID, and may also include information such as signal strength and cell information.
应理解,这里的多个终端发生事件时接入的基站的信息可以相同,也可以不同,发生事件的时间可以相同,也可以不同。还有可能是相同的终端发送多个事件的信息,这多个事件的信息可以相同,也可以不同,由终端实际采集的事件的信息所决定。It should be understood that the information of the base stations that are accessed when multiple terminals generate events may be the same or different, and the time of occurrence of the events may be the same or different. It is also possible that the same terminal transmits information of multiple events, and the information of the multiple events may be the same or different, and is determined by the information of the event actually collected by the terminal.
302、所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。302. The server acquires information about a real base station and information of a pseudo base station according to information about events sent by the multiple terminals.
服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。所述服务器可以通过大数据的计算获取真实基站的信息和伪基站的信息。关于多个终端发送的事件的信息的说明,下面举例说明:The server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals. The server can obtain information of the real base station and information of the pseudo base station by calculation of big data. For an explanation of the information of events sent by multiple terminals, the following examples are given:
例如,在一种可能的实现方式中,服务器可以设置一个数量阈值,当接收发送事件的信息的终端数量超过该数量阈值时,服务器可以根据这些超过数量阈值的终端发送的事件的信息,获取真实基站的信息和伪基站的信息。For example, in a possible implementation manner, the server may set a quantity threshold, and when the number of terminals receiving the information of the sending event exceeds the quantity threshold, the server may obtain the real information according to the information of the event sent by the terminal exceeding the quantity threshold. Information of the base station and information of the pseudo base station.
在另一种可能的实现方式中,服务器还可以设置一个特定阈值,该特定阈值是针对事件的信息的数量来说的,即当服务器收到超过特定阈值的事件的信息,服务器可以根据超过特定阈值的事件的信息获取真实基站的信息和伪基站的信息。In another possible implementation manner, the server may also set a specific threshold, which is the number of information for the event, that is, when the server receives information of an event exceeding a certain threshold, the server may The information of the event of the threshold acquires information of the real base station and information of the pseudo base station.
在另一种可能的实现方式中,服务器还可以设置一个预置时长,服务器可以根据在预置时长内接收的多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。还可以有其他对多个终端发送的事件的信息的说明,此处不做限定。In another possible implementation manner, the server may further set a preset duration, and the server may acquire information of the real base station and information of the pseudo base station according to information of events sent by the multiple terminals received within the preset duration. There may be other descriptions of the information of the events sent by multiple terminals, which are not limited herein.
服务器可以通过多种方式根据多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。下面将举例分别进行说明:The server may obtain information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals in multiple manners. The following examples will be explained separately:
服务器可以根据多个终端发送的事件的信息,获取真实基站的信息,可以包括: The server may obtain the information of the real base station according to the information of the event sent by the multiple terminals, and may include:
所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;所述服务器从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;所述服务器去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;所述服务器确定所述筛选基站的信息为真实基站的信息。Determining, according to the location information of the terminal that is sent by the multiple terminals, the information of the base station that is accessed when the event occurs, the time when the event occurs, and the preset location calculation accuracy, determining the longitude, latitude, and date. Information of the initial base station; the server deletes, from the information about the initial base station on the longitude, latitude, and date, information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold; the server removes the date, The information of the other initial base stations is combined to obtain information about the longitude and latitude screening base stations; and the server determines that the information of the screening base station is the information of the real base station.
举例1:服务器根据大量终端的位置信息(终端利用全球定位系统(Global Positioning System,GPS)获得的经纬度、或利用网络计算的经纬度)、终端在接收短信和/或来电时接入的基站信息(这里以CID和LAC进行说明)、接收短信和/或来电的时间,或终端当前接入的基站信息,相邻CID信息等信息来确定真实基站的信息。Example 1: The server according to the location information of a large number of terminals (the latitude and longitude obtained by the terminal using the Global Positioning System (GPS), or the latitude and longitude calculated by the network), and the base station information that the terminal accesses when receiving the short message and/or the incoming call ( Here, the CID and LAC are used to describe the time of receiving the short message and/or the incoming call, or the base station information currently accessed by the terminal, and the adjacent CID information to determine the information of the real base station.
首先,地理位置采取一定的计算精度(如对经纬度小数位进行限制,如精确到5位小数),再结合数据的采集日期,即经度(longitude,lng)、纬度(latitude,lat)、日期(date),那么,此时可以获得一组关于经度、纬度、日期的数据[lat,lng,date]={cid,lac;cid,lac;…};需要说明的是,这里由于lat、lng、date实际取值的不同,可以得到多组关于经度、纬度、日期的数据。First, the geographic location takes a certain degree of computational accuracy (such as limiting the latitude and longitude decimal places, such as to 5 decimal places), combined with the data collection date, that is, longitude (lng), latitude (latitude, lat), date ( Date), then, at this time you can get a set of data about longitude, latitude, date [lat, lng, date] = {cid, lac; cid, lac; ...}; need to be explained, here because of lat, lng, The actual value of the date is different, you can get multiple sets of data about longitude, latitude, and date.
例如:[lat1,lng1,date1]={cid1,lac1;cid2,lac2;cid3,lac3};For example: [lat1,lng1,date1]={cid1,lac1;cid2,lac2;cid3,lac3};
[lat1,lng2,date1]={cid1,lac1;cid3,lac3;cid4,lac4};[lat1,lng2,date1]={cid1,lac1;cid3,lac3;cid4,lac4};
[lat1,lng2,date2]={cid2,lac2;cid3,lac3;cid4,lac4};[lat1,lng2,date2]={cid2,lac2;cid3,lac3;cid4,lac4};
[lat2,lng1,date1]={cid8,lac8;cid5,lac5;cid6,lac6};[lat2,lng1,date1]={cid8, lac8; cid5, lac5; cid6, lac6};
[lat2,lng2,date1]={cid5,lac5;cid6,lac6;cid7,lac7};[lat2,lng2,date1]={cid5,lac5;cid6,lac6;cid7,lac7};
[lat2,lng2,date2]={cid5,lac5;cid6,lac6;cid7,lac7}。[lat2,lng2,date2]={cid5, lac5; cid6, lac6; cid7, lac7}.
需要说明的是,上述只是以这几组数据来进行举例说明,实际应用中,数量要比上述这几组数据多的多,因为少量的数据,所确定的结果没有太大的参考性,本实施例就是为了提高获取的伪基站的准确率所提出的方案,所以,数据越多,所确定的结果也就越准确,当然,这些数据的处理需要在服务器的负载范围内。It should be noted that the foregoing is only exemplified by these groups of data. In practical applications, the number is much more than the above-mentioned groups of data, because a small amount of data, the determined result is not much reference, this The embodiment is a solution proposed to improve the accuracy of the acquired pseudo base station. Therefore, the more data, the more accurate the determined result. Of course, the processing of these data needs to be within the load range of the server.
其次,服务器再根据得到的大量关于经度、纬度、日期的数据,按照经纬度进行数据合并,合并过程中,对于连续日期内出现接入不稳定的基站(如某一区域内仅出现过一天接入的基站)进行剔除,可以获得关于经度、纬度的数据[lat,lng]={cid,lac;cid,lac…},即表示在区域[lat,lng]范围内接入的基站是合法基站,也就是真实基站。Secondly, the server further combines the data according to the latitude and longitude according to the obtained data about the longitude, latitude and date. During the merging process, the base station with unstable access occurs in consecutive days (for example, only one day of access occurs in a certain area) The base station is culled, and data about longitude and latitude [lat, lng]={cid, lac; cid, lac...} can be obtained, that is, the base station accessing in the range of [lat, lng] is a legal base station. That is the real base station.
那么,在上述的示例中,因为{cid8,lac8}的基站信息只出现过一次,可以将{cid8,lac8}的基站信息删除,其他基站信息进行合并。有[lat1,lng1]={cid1,lac1;cid2,lac2;cid3,lac3};Then, in the above example, since the base station information of {cid8, lac8} appears only once, the base station information of {cid8, lac8} can be deleted, and other base station information is merged. There are [lat1,lng1]={cid1,lac1;cid2,lac2;cid3,lac3};
[lat1,lng2]={cid1,lac1;cid2,lac2;cid3,lac3;cid4,lac4};[lat1,lng2]={cid1, lac1; cid2, lac2; cid3, lac3; cid4, lac4};
[lat2,lng1]={cid8,lac8;cid5,lac5;cid6,lac6};[lat2,lng1]={cid8, lac8; cid5, lac5; cid6, lac6};
[lat2,lng2]={cid5,lac5;cid6,lac6;cid7,lac7},这些信息就是筛选基站的信息。[lat2,lng2]={cid5, lac5; cid6, lac6; cid7, lac7}, this information is the information for screening the base station.
最后,服务器就得到一组筛选基站的信息数据[lat,lng]={cid,lac;cid,lac…},那么CC=[lat,lng]={cid,lac;cid,lac…},CC表示真实基站并可以标注可疑概率为0。 Finally, the server gets a set of information data for screening the base station [lat, lng] = {cid, lac; cid, lac...}, then CC = [lat, lng] = {cid, lac; cid, lac...}, CC Indicates the real base station and can mark the suspicious probability as 0.
在上述的示例中,在[lat1,lng1]这个区域内,真实基站的信息包括{cid1,lac1;cid2,lac2;cid3,lac3};在[lat1,lng2]这个区域内,真实基站的信息包括{cid1,lac1;cid2,lac2;cid3,lac3;cid4,lac4};在[lat2,lng1]这个区域内,真实基站的信息包括{cid8,lac8;cid5,lac5;cid6,lac6};在[lat2,lng2]这个区域内,真实基站的信息包括{cid5,lac5;cid6,lac6;cid7,lac7}。In the above example, in the area of [lat1, lng1], the information of the real base station includes {cid1, lac1; cid2, lac2; cid3, lac3}; in the area of [lat1, lng2], the information of the real base station includes {cid1, lac1; cid2, lac2; cid3, lac3; cid4, lac4}; in the region [lat2, lng1], the real base station information includes {cid8, lac8; cid5, lac5; cid6, lac6}; , lng2] In this area, the real base station information includes {cid5, lac5; cid6, lac6; cid7, lac7}.
服务器可以根据多个终端发送的事件的信息,获取伪基站的信息,可以包括:The server may obtain the information of the pseudo base station according to the information of the event sent by the multiple terminals, and may include:
所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;所述服务器根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;所述服务器确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述服务器确定所述目标基站的信息为伪基站的信息。Determining, by the server, location information of the terminal that the target base station accesses at the first time according to the location information of the terminal that is sent by the multiple terminals, the information of the base station that is accessed when the event occurs, and the time when the event occurs. The location information of the terminal accessed at the second time, the target base station is any base station that is accessed when the multiple terminals generate the event; the server is according to the terminal that the target base station accesses at the first time The location information is calculated, the first central location of the accessed terminal is calculated, and the second central location of the accessed terminal is calculated according to the location information of the terminal accessed by the target base station at the second time; the server determines the Determining, by the first central location, a first location of the target base station, determining that the second central location is a second location of the target base station; and determining an absolute value of a difference between the first location and the second location If the value is greater than the second threshold, the server determines that the information of the target base station is information of the pseudo base station.
举例2:服务器根据大量终端的位置信息、终端在接收短信和/或来电时接入的基站信息(这里以CID和LAC进行说明)、接收短信和/或来电的时间来确定伪基站的信息,即服务器利用伪基站移动的特点(可移动,突然出现并消失),识别出可能潜在的伪基站。Example 2: The server determines the information of the pseudo base station according to the location information of a large number of terminals, the base station information (here described by CID and LAC) when the terminal receives the short message and/or the incoming call, and the time of receiving the short message and/or the incoming call. That is, the server uses the characteristics of the pseudo base station to move (movable, suddenly appears and disappears), and identifies potential pseudo base stations.
首先,服务器可以根据多个终端上报的事件的信息,获取终端的位置信息与终端在接收短信或者来电时接入的基站信息:[lat,lng,date]={cid,lac;cid,lac…}。获得每个基站出现时接入该基站的一组终端的位置信息:[cid,lac,timestamp]={lat,lng;lat,lng;…}。First, the server can obtain the location information of the terminal and the base station information that the terminal accesses when receiving the short message or the incoming call according to the information of the event reported by the multiple terminals: [lat, lng, date]={cid,lac;cid,lac... }. Obtaining location information of a group of terminals accessing the base station when each base station occurs: [cid, lac, timestamp] = {lat, lng; lat, lng; ...}.
可以以基站1为例来进行说明,假设这个基站1的信息用[cid8,lac8]来表示,在第一时间接入的终端的位置信息包括:[cid8,lac8,timestamp1]={lat1,lng1;lat5,lng5;lat6,lng6;lat9,lng9;lat10,lng10;lat12,lng12};The base station 1 can be taken as an example for description. It is assumed that the information of the base station 1 is represented by [cid8, lac8], and the location information of the terminal accessed at the first time includes: [cid8, lac8, timestamp1]={lat1, lng1 ;lat5,lng5;lat6,lng6;lat9,lng9;lat10,lng10;lat12,lng12};
在第二时间接入的终端的位置信息包括:[cid8,lac8,timestamp2]={lat1,lng1;lat3,lng3;lat4,lng4;lat5,lng5;lat10,lng10;lat11,lng11};The location information of the terminal accessed at the second time includes: [cid8, lac8, timestamp2]={lat1, lng1; lat3, lng3; lat4, lng4; lat5, lng5; lat10, lng10; lat11, lng11};
在第三时间接入的终端的位置信息包括:[cid8,lac8,timestamp3]={lat1,lng1;lat3,lng3;lat4,lng4;lat5,lng5;lat9,lng9;lat12,lng12};The location information of the terminal accessed at the third time includes: [cid8, lac8, timestamp3] = {lat1, lng1; lat3, lng3; lat4, lng4; lat5, lng5; lat9, lng9; lat12, lng12};
在第四时间接入的终端的位置信息包括:[cid8,lac8,timestamp4]={lat1,lng1;lat2,lng2;lat4,lng4;lat5,lng5;lat10,lng10;lat11,lng11}。The location information of the terminal accessed at the fourth time includes: [cid8, lac8, timestamp4] = {lat1, lng1; lat2, lng2; lat4, lng4; lat5, lng5; lat10, lng10; lat11, lng11}.
其次,服务器可以计算出在第一时间这一组终端的第一中心位置,在第二时间这一组终端的第二中心位置,在第三时间这一组终端的第三中心位置,在第四时间这一组终端的第四中心位置。那么,可以认为第一中心位置是基站1在第一时间的位置,第二中心位置是基站1在第二时间的位置,第三中心位置是基站1在第三时间的位置,第四中心位置是基站1在第四时间的位置。Secondly, the server can calculate the first central location of the set of terminals at the first time, the second central location of the set of terminals at the second time, and the third central location of the set of terminals at the third time, at the third The fourth central position of this group of terminals in four time. Then, the first central location can be considered to be the location of the base station 1 at the first time, the second central location is the location of the base station 1 at the second time, and the third central location is the location of the base station 1 at the third time, the fourth central location It is the position of the base station 1 at the fourth time.
最后,对于基站1在不同时间的位置,偏差在一定距离(例如500m)内的属于正常范围;偏差在500m以上的可以认为是移动基站。从而获得一组疑似移动基站的信息:MC={cid,lac;cid,lac;…}。 Finally, for the position of the base station 1 at different times, the deviation within a certain distance (for example, 500 m) belongs to the normal range; the deviation of 500 m or more can be considered as the mobile base station. Thereby obtaining a set of information of a suspected mobile base station: MC = {cid, lac; cid, lac; ...}.
假设,经过上述的计算,基站1在不同时间的位臵的差值的绝对值超过500m了,那么,就可以认为基站1为移动基站。上述只是以基站1为例来进行说明,其他的基站也是类似的处理方法,此处不再赘述。It is assumed that, after the above calculation, the absolute value of the difference between the bits of the base station 1 at different times exceeds 500 m, then the base station 1 can be considered as the mobile base station. The above description is only taking the base station 1 as an example, and other base stations are similar processing methods, and details are not described herein again.
在MC的基础上,再次对比基站出现的时间,对于出现时间较短例如小于1天就消失的基站,形成可疑基站的信息:SC={cid,lac;cid,lac;…}。On the basis of the MC, the time of occurrence of the base station is again compared, and the information of the suspicious base station is formed for the base station that disappears for a short time, for example, less than one day: SC={cid, lac; cid, lac; .
假设,对基站1位臵的计算,上述的第一时间、第二时间、第三时间和第四时间在同一天,之前或者之后再没出现过这个基站,那么,这个基站1很大概率就是伪基站了。应理解,MC,SC都可以认为是伪基站的信息,并可以标识可疑概率为100%。It is assumed that, for the calculation of the base station 1 bit, the first time, the second time, the third time and the fourth time are not present on the same day, before or after the base station, then the base station 1 has a high probability Pseudo base station. It should be understood that both MC and SC can be considered as information of the pseudo base station and can identify the suspicious probability as 100%.
需要说明的是,在上面计算出第一中心位臵之后,还可以对偏离该第一中心位臵较大的终端位臵进行排除后,再计算一次这一组终端(排除了偏离第一中心位臵较大的终端)的第一目标中心位臵;同样的,对于计算出第二中心位臵之后,还可以对偏离该第二中心位臵较大的终端位臵进行排除后,再计算一次这一组终端(排除了偏离第二中心位臵较大的终端)的第二目标中心位臵;其他都可以类似处理,此处不再赘述。因为如果终端的位臵与第一中心位臵和第二中心位臵偏差太远的话,那就说明,计算出的这个中心位臵与基站的位臵偏差较大,用来表示基站的位臵的可靠性较差,所以,可以排除掉偏差较大的终端位臵,再进行一次计算,用来表示基站的位臵,准确率就相对高些。这里用第一目标中心位臵和第二目标中心位臵表示基站在不同时间的位臵,后续的计算方法和上述的描述类似,此处不再赘述。It should be noted that after the first center position 计算 is calculated above, the terminal position 偏离 which is larger than the first center position 排除 can be excluded, and the group terminal is calculated again (excluding the deviation from the first center) The first target center position of the larger terminal); similarly, after calculating the second center position, the terminal position that deviates from the second center position can be excluded, and then calculated. The second target center position of this group of terminals (excluding the terminal that is larger than the second center position) is excluded; the others can be similarly processed, and will not be described here. Because if the position of the terminal is too far from the first center position 第二 and the second center position ,, it means that the calculated center position 臵 has a large deviation from the position of the base station, and is used to indicate the position of the base station. The reliability is poor. Therefore, the terminal position with large deviation can be eliminated, and then a calculation is performed to indicate the position of the base station, and the accuracy is relatively high. Here, the first target center position 臵 and the second target center position 臵 are used to indicate the position of the base station at different times. The subsequent calculation method is similar to the above description, and details are not described herein again.
还需要说明的是,服务器根据多个终端发送的事件的信息来获取真实基站的信息和伪基站的信息包括但不限于上述所提及的方法。例如,如果获取了伪基站的信息,那么,服务器可以根据多个终端上报的所有基站的信息,确定除了伪基站的信息,剩下的可以认为是真实基站的信息;也可以是获取了真实基站的信息,那么,服务器可以根据多个终端上报的所有基站的信息,确定除了真实基站的信息,剩下的可以认为是伪基站的信息。It should be noted that the information of the real base station and the information of the pseudo base station are obtained by the server according to the information of the events sent by the multiple terminals, including but not limited to the above-mentioned methods. For example, if the information of the pseudo base station is obtained, the server may determine the information of the pseudo base station according to the information of all the base stations reported by the multiple terminals, and the remaining information may be regarded as the information of the real base station; The information can be determined by the server according to the information of all the base stations reported by the multiple terminals, except for the information of the real base station, and the rest can be regarded as the information of the pseudo base station.
303、所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端。303. The server determines, according to the information about the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals.
在本申请实施例中,举例说明,真实基站的信息如下表1所示:In the embodiment of the present application, the information of the real base station is as follows:
区域region 真实基站Real base station
[lat1,lng1][lat1,lng1] {cid1,lac1;cid2,lac2;cid3,lac3}{cid1, lac1; cid2, lac2; cid3, lac3}
[lat1,lng2][lat1,lng2] {cid1,lac1;cid2,lac2;cid3,lac3;cid4,lac4}{cid1, lac1; cid2, lac2; cid3, lac3; cid4, lac4}
[lat2,lng1][lat2,lng1] {cid8,lac8;cid5,lac5;cid6,lac6}{cid8, lac8; cid5, lac5; cid6, lac6}
[lat2,lng2][lat2,lng2] {cid5,lac5;cid6,lac6;cid7,lac7}{cid5, lac5; cid6, lac6; cid7, lac7}
表1Table 1
伪基站的信息如下表2所示:
Figure PCTCN2017086643-appb-000001
The information of the pseudo base station is shown in Table 2 below:
Figure PCTCN2017086643-appb-000001
表2 Table 2
所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端,可以是确定所述多个终端中发生所述事件时接入的基站为伪基站的目标终端,假设有100个终端接入的是伪基站,那么服务器可以向这100个终端发送伪基站的指示信息。Determining, by the server, the target terminal that accesses the pseudo base station in the multiple terminals according to the information of the real base station and the information of the pseudo base station, where the server may determine that the event occurs when the event occurs in the multiple terminals. The base station is the target terminal of the pseudo base station. If 100 terminals access the pseudo base station, the server can send the indication information of the pseudo base station to the 100 terminals.
304、所述服务器将伪基站的指示信息发送给所述目标终端。304. The server sends the indication information of the pseudo base station to the target terminal.
示例性的,服务器向这100个终端发送伪基站的指示信息可以同时发送,也可以根据终端的优先级来发送伪基站的指示信息,具体此处不做限定。需要说明的是,在实际应用中,服务器也可以向所述多个终端中发生事件时接入的基站为真实基站的终端发送真实基站的指示信息。For example, the indication information that the server sends the pseudo base station to the 100 terminals may be sent at the same time, and the indication information of the pseudo base station may be sent according to the priority of the terminal, which is not limited herein. It should be noted that, in an actual application, the server may also send the indication information of the real base station to the terminal that is accessed by the base station that is accessed when the event occurs in the multiple terminals.
305、所述目标终端提示所述伪基站的指示信息。305. The target terminal prompts indication information of the pseudo base station.
在本申请实施例中,目标终端可以通过所述事件对应的应用界面显示所述事件的信息,所述事件的信息可以包括短信内容和/或来电号码。所述目标终端提示所述伪基站的指示信息,可以包括但不限于以下几种实现方式:In the embodiment of the present application, the target terminal may display the information of the event by using an application interface corresponding to the event, where the information of the event may include a short message content and/or an incoming call number. The indication information that the target terminal prompts the pseudo base station may include, but is not limited to, the following implementation manners:
方式1:所述终端通过文字显示所述伪基站的指示信息。Manner 1: The terminal displays the indication information of the pseudo base station by text.
方式2:所述终端通过语音提示所述伪基站的指示信息。Manner 2: The terminal prompts the indication information of the pseudo base station by voice.
方式3:所述终端通过危险标识显示所述伪基站的指示信息。Manner 3: The terminal displays the indication information of the pseudo base station by using a hazard identifier.
目标终端上可以通过所述事件对应的应用界面提示所述伪基站的信息。即手机可以通过短信对应的短信界面,和/或,来电对应的来电界面,和/或,语音提示所述伪基站的指示信息。这里的目标终端可以指上述的100个终端,以其中的一个为例(如手机)来进行说明。The information of the pseudo base station can be prompted by the application interface corresponding to the event on the target terminal. That is, the mobile phone may prompt the instruction information of the pseudo base station by using an SMS interface corresponding to the short message, and/or an incoming call interface corresponding to the incoming call, and/or voice. The target terminal here may refer to the above 100 terminals, and one of them is taken as an example (such as a mobile phone) for explanation.
在一种可能的实现方式中,终端可以通过文字显示伪基站的指示信息。假设,手机接收短信显示的短信内容11,在短信界面上通过文字21显示伪基站的指示信息。如图4(c)所示,为手机通过短信界面显示伪基站的指示信息的一个示意图。在图4(c)中,伪基站的指示信息为“疑似欺诈短信”的文字指示。假设,手机接收来电显示的来电号码12,在来电界面上通过文字21显示伪基站的指示信息。如图4(d)所示,为手机通过来电界面显示伪基站的指示信息的另一个示意图。在图4(d)中,伪基站的指示信息为“疑似欺诈来电”的文字指示。需要说明的是,关于文字提示还可以是高风险短信或者高风险来点等提示,具体不做限定。In a possible implementation manner, the terminal may display the indication information of the pseudo base station by using a text. Assume that the mobile phone receives the short message content 11 displayed by the short message, and displays the indication information of the pseudo base station through the text 21 on the short message interface. As shown in FIG. 4(c), a schematic diagram of the indication information of the pseudo base station is displayed on the short message interface of the mobile phone. In FIG. 4(c), the indication information of the pseudo base station is a text indication of "suspected fraudulent short message". Assume that the mobile phone receives the caller ID 12 of the caller ID, and displays the indication information of the pseudo base station through the text 21 on the incoming call interface. As shown in FIG. 4(d), another schematic diagram of the indication information of the pseudo base station is displayed for the mobile phone through the incoming call interface. In FIG. 4(d), the indication information of the pseudo base station is a text indication of "suspected fraudulent incoming call". It should be noted that the text prompt may also be a high-risk short message or a high-risk point, and the like is not limited.
在另一种可能的实现方式中,终端可以通过语音提示伪基站的指示信息。假设,手机接收短信显示的短信内容11,在短信界面上通过语音22提示伪基站的指示信息。如图4(e)所示,为手机根据伪基站的指示信息对接收的短信进行语音提醒的一个示意图。在图4(e)中,伪基站的指示信息会触发预置的语音功能,手机通过播放语音(例如预置的语音可以是此短信可能是欺诈短信等,或者是由*******号码发送的短信可能是欺诈短信等)来提醒用户。假设,手机接收来电显示的来电号码12,在来电界面上通过语音22提示伪基站的指示信息。如图4(f)所示,为手机根据伪基站的指示信息对接收的来电进行语音提醒的一个示意图。在图4(f)中,伪基站的指示信息会触发预置的语音功能,手机通过播放语音(例如预置的语音可以是此号码可能是欺诈号码,请谨慎接听等)来提醒用户。 In another possible implementation manner, the terminal may prompt the indication information of the pseudo base station by voice. Assume that the mobile phone receives the short message content 11 displayed by the short message, and prompts the indication information of the pseudo base station through the voice 22 on the short message interface. As shown in FIG. 4(e), it is a schematic diagram of the mobile phone performing voice prompting on the received short message according to the indication information of the pseudo base station. In FIG. 4(e), the indication information of the pseudo base station triggers the preset voice function, and the mobile phone plays the voice (for example, the preset voice may be that the short message may be a fraudulent message, etc., or * The text message sent by the number may be a fraudulent message, etc.) to remind the user. Assume that the mobile phone receives the caller ID 12 of the caller ID and prompts the indication information of the pseudo base station through the voice 22 on the incoming call interface. As shown in FIG. 4(f), it is a schematic diagram of the mobile phone performing voice reminding on the received incoming call according to the indication information of the pseudo base station. In FIG. 4(f), the indication information of the pseudo base station triggers the preset voice function, and the mobile phone reminds the user by playing the voice (for example, the preset voice may be that the number may be a fraudulent number, please be careful to answer, etc.).
在另一种可能的实现方式中,终端可以通过危险图标提示伪基站的指示信息。假设,手机接收短信显示的短信内容11,在短信界面上通过危险图标23提示伪基站的指示信息。如图4(g)所示,为手机根据伪基站的指示信息通过危险图标对接收的短信进行提醒的一个示意图。在图4(g)中,伪基站的指示信息会触发危险图标,手机通过短信界面显示危险图标来提醒用户。假设,手机接收来电显示的来电号码12,在来电界面上通过危险图标23提示伪基站的指示信息。如图4(h)所示,为手机根据伪基站的指示信息通过危险图标对接收的来电进行提醒的一个示意图。在图4(h)中,伪基站的指示信息会触发危险图标,手机通过来电界面显示危险图标来提醒用户。需要说明的是,危险图标可以包括但不限于图4(g)和4(h)中所示的三角加感叹号的提示,还可以直接是三角图标的提示或者感叹号图标或者其他的危险提示方式。In another possible implementation manner, the terminal may prompt the indication information of the pseudo base station by using a danger icon. It is assumed that the mobile phone receives the short message content 11 displayed by the short message, and prompts the indication information of the pseudo base station through the danger icon 23 on the short message interface. As shown in FIG. 4(g), it is a schematic diagram of the mobile phone reminding the received short message by the danger icon according to the indication information of the pseudo base station. In FIG. 4(g), the indication information of the pseudo base station triggers a danger icon, and the mobile phone displays a danger icon through the short message interface to remind the user. Assume that the mobile phone receives the caller ID 12 of the caller ID and prompts the indication information of the pseudo base station through the danger icon 23 on the incoming call interface. As shown in FIG. 4(h), it is a schematic diagram of the mobile phone reminding the received incoming call by the danger icon according to the indication information of the pseudo base station. In FIG. 4(h), the indication information of the pseudo base station triggers a danger icon, and the mobile phone displays a danger icon through the incoming call interface to remind the user. It should be noted that the danger icon may include, but is not limited to, the hint of the triangle plus the exclamation mark shown in FIG. 4(g) and 4(h), and may also be a prompt of the triangle icon or an exclamation point icon or other dangerous prompt manner.
需要说明的是,关于伪基站的指示信息的提示包括但不限于上述所提及的几种实现方式,还可以通过其他方式来实现,具体不做限定。例如:文字+语音的提示方式:如图4(i)所示,为手机根据伪基站的指示信息通过文字和语音对接收的短信进行提醒的一个示意图。如图4(j)所示,为手机根据伪基站的指示信息通过文字和语音对接收的来电进行提醒的一个示意图。It should be noted that the prompting information about the indication information of the pseudo base station includes, but is not limited to, the foregoing implementation manners, and may be implemented in other manners, and is not limited thereto. For example, the text + voice prompt mode: as shown in FIG. 4( i ), is a schematic diagram of the mobile phone reminding the received short message by text and voice according to the instruction information of the pseudo base station. As shown in FIG. 4(j), it is a schematic diagram of the mobile phone reminding the received incoming call by text and voice according to the indication information of the pseudo base station.
文字+危险图标的提示方式:如图4(k)所示,为手机根据伪基站的指示信息通过文字和危险图标对接收的短信进行提醒的一个示意图。如图4(l)所示,为手机根据伪基站的指示信息通过文字和危险图标对接收的来电进行提醒的一个示意图。The prompt mode of the text + danger icon: as shown in FIG. 4(k), is a schematic diagram of the mobile phone reminding the received short message by the text and the danger icon according to the instruction information of the pseudo base station. As shown in FIG. 4(l), it is a schematic diagram for the mobile phone to remind the received incoming call by the text and the danger icon according to the indication information of the pseudo base station.
语音+危险图标的提示方式:如图4(m)所示,为手机根据伪基站的指示信息通过语音和危险图标对接收的短信进行提醒的一个示意图。如图4(n)所示,为手机根据伪基站的指示信息通过语音和危险图标对接收的来电进行提醒的一个示意图。The prompt mode of the voice + danger icon: as shown in FIG. 4(m), is a schematic diagram of the mobile phone reminding the received short message by using the voice and danger icons according to the indication information of the pseudo base station. As shown in FIG. 4(n), it is a schematic diagram for the mobile phone to remind the received incoming call by voice and danger icons according to the indication information of the pseudo base station.
在另一种可能的实现方式中,对于短信,终端可以将短信自动归类到垃圾短信列表中来提示伪基站的指示信息,如图4(o)所示,为手机将短信自动归类到垃圾短信列表中来提示伪基站的指示信息。对于来电,终端可以通过自动拒绝接听来电来提示伪基站的指示信息,如图4(p)所示,为手机自动拒绝接听来电提示伪基站的指示信息的一个示意图。In another possible implementation manner, for the short message, the terminal may automatically classify the short message into the spam short message list to prompt the indication information of the pseudo base station, as shown in FIG. 4( o ), automatically classify the short message for the mobile phone to The indication of the pseudo base station is prompted in the spam list. For the incoming call, the terminal may prompt the indication information of the pseudo base station by automatically rejecting the incoming call, as shown in FIG. 4(p), which is a schematic diagram of the mobile phone automatically rejecting the indication information of the incoming call prompting pseudo base station.
应理解,在上述短信界面或者来电界面上,对于文字提示伪基站的指示信息和图标提示伪基站的指示信息,其实现方式可以是弹框形式、悬浮形式或者气泡等其他形式,具体不做限定。步骤303-305是可选的步骤。It should be understood that, in the foregoing short message interface or the incoming call interface, the indication information of the text prompting pseudo base station and the indication information of the icon prompting the pseudo base station may be implemented in the form of a bullet frame, a suspended form, or a bubble, and the like is not limited. . Steps 303-305 are optional steps.
在本申请实施例中,服务器是根据多个终端上报的大数据来获取真实基站的信息和伪基站的信息,所以,得到的真实基站的信息和伪基站的信息的准确率比较高。即服务器接收多个终端发送的事件的信息,事件的信息可以包括终端标识、终端的位置信息、发生事件时接入的基站的信息、发生事件的时间。服务器根据所述多个终端发送的事件的信息获取真实基站的信息和伪基站的信息。服务器还可以根据真实基站的信息和伪基站的信息,再确定所述多个终端中接入伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对目标终端上发生的事件引起警惕,小心上当受骗。In the embodiment of the present application, the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by the multiple terminals. Therefore, the accuracy of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives the information of the event sent by the multiple terminals, and the information of the event may include the identifier of the terminal, the location information of the terminal, the information of the base station that is accessed when the event occurs, and the time when the event occurs. The server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals. The server may further determine, according to the information of the real base station and the information of the pseudo base station, the target terminal that accesses the pseudo base station among the multiple terminals, and send the indication information of the pseudo base station to the target terminal, so that the user causes an event occurring on the target terminal. Be alert, be careful to be deceived.
如图5所示,为本申请实施例中提示方法的另一个实施例示意图,包括:As shown in FIG. 5, it is a schematic diagram of another embodiment of the prompting method in the embodiment of the present application, including:
501、服务器接收多个终端发送的事件的信息。 501. The server receives information about events sent by multiple terminals.
502、所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。502. The server acquires information about a real base station and information of a pseudo base station according to information about events sent by the multiple terminals.
503、所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端。503. The server determines, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals.
504、所述服务器将伪基站的指示信息发送给所述目标终端。504. The server sends indication information of the pseudo base station to the target terminal.
505、所述目标终端提示所述伪基站的指示信息。505. The target terminal prompts indication information of the pseudo base station.
在本申请实施例中,步骤501-505与上述图3所示实施例中的步骤301-305类似,此处不再赘述。In the embodiment of the present application, the steps 501-505 are similar to the steps 301-305 in the foregoing embodiment shown in FIG. 3, and details are not described herein again.
506、所述服务器标记所述真实基站和所述伪基站的可疑概率。506. The server marks a suspicious probability of the real base station and the pseudo base station.
在本申请实施例中,服务器根据多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息之后,对真实基站和伪基站的可疑概率可以进行标记,例如,标记真实基站的可疑概率为0,标记伪基站的可疑概率为100%。In the embodiment of the present application, after obtaining the information of the real base station and the information of the pseudo base station according to the information of the event sent by the multiple terminals, the server may mark the suspicious probability of the real base station and the pseudo base station, for example, marking the suspicious real base station. The probability is 0, and the suspicious probability of marking the pseudo base station is 100%.
举例1:如下述表3所示,为不同区域内关于真实基站和可疑概率的对应关系。Example 1: As shown in Table 3 below, the correspondence between real base stations and suspicious probability in different areas.
区域region 真实基站Real base station 可疑概率Suspicious probability
[lat1,lng1][lat1,lng1] {cid1,lac1;cid2,lac2;cid3,lac3}{cid1, lac1; cid2, lac2; cid3, lac3} 00
[lat1,lng2][lat1,lng2] {cid1,lac1;cid2,lac2;cid3,lac3;cid4,lac4}{cid1, lac1; cid2, lac2; cid3, lac3; cid4, lac4} 00
[lat2,lng1][lat2,lng1] {cid8,lac8;cid5,lac5;cid6,lac6}{cid8, lac8; cid5, lac5; cid6, lac6} 00
[lat2,lng2][lat2,lng2] {cid5,lac5;cid6,lac6;cid7,lac7}{cid5, lac5; cid6, lac6; cid7, lac7} 00
表3table 3
举例2:如果将可疑基站和移动基站都认为是伪基站,如下述表4所示,为关于可疑基站、移动基站和可疑概率的对应关系。Example 2: If both the suspicious base station and the mobile base station are considered to be pseudo base stations, as shown in Table 4 below, the correspondence relationship between the suspicious base station, the mobile base station, and the suspicious probability.
可疑基站Suspicious base station 可疑概率Suspicious probability 移动基站Mobile base station 可疑概率Suspicious probability
{cid8,lac8}{cid8, lac8} 100%100% {cid12,lac12}{cid12,lac12} 100%100%
{cid15,lac15}{cid15,lac15} 100%100% {cid8,lac8}{cid8, lac8} 100%100%
{cid19,lac19}{cid19,lac19} 100%100% {cid19,lac19}{cid19,lac19} 100%100%
{cid20,lac20}{cid20,lac20} 100%100% {cid20,lac20}{cid20,lac20} 100%100%
    {cid15,lac15}{cid15,lac15} 100%100%
    {cid36,lac36}{cid36,lac36} 100%100%
    {cid40,lac40}{cid40,lac40} 100%100%
表4Table 4
需要说明的是,在表4所示的移动基站和可疑基站可以认为是伪基站,只不过可疑基站是伪基站的可疑概率可能更高一些。因为在运营商中也存在移动基站,所以,移动基站是伪基站的可疑概率相对低一些。It should be noted that the mobile base station and the suspicious base station shown in Table 4 can be regarded as pseudo base stations, but the suspicious probability that the suspicious base station is a pseudo base station may be higher. Since there are mobile base stations among operators, the suspicious probability that the mobile base station is a pseudo base station is relatively low.
举例3:还可以将移动基站中除可疑基站的其他基站的可疑概率标记的低一些,如下述表5所示,为关于可疑基站、移动基站和可疑概率的对应关系。 Example 3: The suspicious probability flag of other base stations other than the suspicious base station in the mobile base station may also be marked lower, as shown in Table 5 below, as a correspondence relationship between the suspicious base station, the mobile base station, and the suspicious probability.
可疑基站Suspicious base station 可疑概率Suspicious probability 移动基站Mobile base station 可疑概率Suspicious probability
{cid8,lac8}{cid8, lac8} 100%100% {cid12,lac12}{cid12,lac12} 80%80%
{cid15,lac15}{cid15,lac15} 100%100% {cid8,lac8}{cid8, lac8} 100%100%
{cid19,lac19}{cid19,lac19} 100%100% {cid19,lac19}{cid19,lac19} 100%100%
{cid20,lac20}{cid20,lac20} 100%100% {cid20,lac20}{cid20,lac20} 100%100%
    {cid15,lac15}{cid15,lac15} 100%100%
    {cid36,lac36}{cid36,lac36} 80%80%
    {cid40,lac40}{cid40,lac40} 80%80%
表5table 5
需要说明的是,步骤506的时序可以在步骤502之后、507之前。It should be noted that the timing of step 506 may be after step 502 and before 507.
507、第一目标终端接收反馈信息。507. The first target terminal receives the feedback information.
在本申请实施例中,第一目标终端可能是上述目标终端中的一个终端,也可能是上述目标终端中的多个终端,具体可根据实际情况确定。所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息。In the embodiment of the present application, the first target terminal may be one of the target terminals, or may be a plurality of terminals in the target terminal, and may be determined according to actual conditions. The feedback information is input information input by the user whether the indication information that the base station accessed by the terminal when the event occurs is a pseudo base station is accurate.
第一目标终端接收伪基站的指示信息后,第一目标终端会提示伪基站的指示信息。下面可以举例进行说明:如图6(a)所示,为手机在短信界面上显示输入反馈信息的一个示意图,还可以在短信界面上显示“请用户反馈一下,该短信是否为欺诈短信”,用户可以在可编辑的文本框31输入反馈信息。如图6(b)所示,为手机在短信界面上显示输入反馈信息的另一个示意图,也可以在短信界面上显示“是”和“否”标识32,用户直接点击“是”或者“否”的标识即可。当然,短信界面上还可以显示“忽视”的标识,或者没有输入文字,那么就代表这个反馈信息没有意义,不用上报给服务器。当用户在文本框输入反馈信息或者点击“是”或“否”的标识后,终端就可以接收对应的反馈信息。After the first target terminal receives the indication information of the pseudo base station, the first target terminal may prompt the indication information of the pseudo base station. The following can be illustrated by an example: as shown in FIG. 6( a ), a schematic diagram for displaying the input feedback information on the short message interface of the mobile phone, and also displaying “Please feedback the user whether the short message is a fraudulent short message” on the short message interface. The user can input feedback information in an editable text box 31. As shown in FIG. 6(b), another schematic diagram for displaying the input feedback information on the short message interface of the mobile phone may also display the “Yes” and “No” identifiers 32 on the short message interface, and the user directly clicks “Yes” or “No”. "The logo can be. Of course, the SMS interface can also display the "ignore" logo, or if there is no input text, then the feedback information is meaningless and need not be reported to the server. When the user inputs the feedback information in the text box or clicks the "Yes" or "No" identifier, the terminal can receive the corresponding feedback information.
如图6(c)所示,为手机在来电界面上显示输入反馈信息的一个示意图,手机在来电界面上显示“请用户反馈一下,该来电是否为欺诈来电”,用户可以在可编辑的文本框31输入反馈信息。如图6(d)所示,为手机在来电界面上显示输入反馈信息的一个示意图,也可以在来电界面上显示“是”和“否”标识32,用户直接点击“是”或者“否”的标识即可。当然,来电界面上还可以显示“忽视”的标识,或者没有输入文字,那么就代表这个反馈信息没有意义,不用上报给服务器。从便利的角度来考虑,点击的操作对用户来说可能更方便一些。在来电界面上显示输入反馈信息还可以是在用户挂断电话后显示。当用户在文本框输入反馈信息或者点击“是”或“否”的标识后,终端就可以接收对应的反馈信息。As shown in FIG. 6(c), a schematic diagram for displaying the input feedback information on the incoming call interface of the mobile phone, the mobile phone displays “Please feedback the user if the incoming call is a fraudulent call” on the incoming call interface, and the user can edit the text. Block 31 inputs feedback information. As shown in FIG. 6(d), a schematic diagram for displaying the input feedback information on the incoming call interface of the mobile phone may also display the “Yes” and “No” identifiers 32 on the incoming call interface, and the user directly clicks “Yes” or “No”. The logo can be. Of course, the “Ignore” logo can also be displayed on the incoming call interface, or if there is no input text, then the feedback information is meaningless and need not be reported to the server. From a convenience point of view, the click operation may be more convenient for the user. Displaying the input feedback information on the incoming call interface can also be displayed after the user hangs up the phone. When the user inputs the feedback information in the text box or clicks the "Yes" or "No" identifier, the terminal can receive the corresponding feedback information.
需要说明的是,关于终端如何显示输入反馈信息的示意图可以包括但不限于上述所述的几种方式。关于用户输入反馈信息的说明可以是有些用户可能之前接收过该号码发送的短信或者接收过该号码的来电,再次接收相同号码发送的来电或者短信时,可以确定是否为欺诈短信或者欺诈来电,也可以是通过这次的通话,确定是否为欺诈来电,从而用户可以输入对应的反馈信息。在上述图6(a)-图6(d)任一显示输入反馈信息是以文字提示伪基站的指示信息来说明的,以语音提示伪基站的指示信息或者危险图标提示伪基站的指示信息时,显示输入反馈信息的示意图和图6(a)-图6(d)类似,此处不再赘述。 It should be noted that the schematic diagram of how the terminal displays the input feedback information may include, but is not limited to, the foregoing manners. The description about the user inputting the feedback information may be that some users may have received the short message sent by the number or received the incoming call of the number, and when receiving the incoming call or the short message sent by the same number again, it may determine whether it is a fraudulent short message or a fraudulent call. It can be determined by this call whether it is a fraudulent call, so that the user can input corresponding feedback information. In the above-mentioned FIG. 6 (a) - FIG. 6 (d), the input feedback information is described by the instruction information of the character prompting pseudo base station, and the indication information of the pseudo base station or the danger icon is used to prompt the indication information of the pseudo base station. The schematic diagram showing the input feedback information is similar to FIG. 6(a) to FIG. 6(d), and will not be described again here.
508、第一目标终端将反馈信息发送给服务器。508. The first target terminal sends the feedback information to the server.
在本申请实施例中,假设,服务器之前确定接入伪基站的目标终端有100个,服务器向这100个目标终端发送了伪基站的指示信息。但是这100个目标终端只有50个接收到了用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息。那么,这50个目标终端可以将反馈信息上报给服务器。假设,有45个用户输入的是“否”的反馈信息,5个用户输入的是“是”的反馈信息。In the embodiment of the present application, it is assumed that the server determines that there are 100 target terminals accessing the pseudo base station, and the server sends the indication information of the pseudo base station to the 100 target terminals. However, only 50 of the 100 target terminals have received input information from the user that is correct when the base station accessed by the terminal when the event occurs is the pseudo base station. Then, the 50 target terminals can report the feedback information to the server. Assume that there are 45 users inputting "no" feedback information, and five users inputting "yes" feedback information.
509、所述服务器根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率。509. The server, according to the feedback information, correspondingly modify a suspicious probability of the pseudo base station, to obtain a modified suspicious probability of the pseudo base station.
在本申请实施例中,假设,上述50个目标终端上报的反馈信息是针对基站{cid15,lac15}的,基站{cid15,lac15}对应的有45个“否”的反馈信息,5个“是”的反馈信息。那么,服务器可以确定基站{cid15,lac15}有90%的概率不是伪基站,10%的概率是伪基站。即对应的在上述表4和表5中可以将基站{cid15,lac15}的可疑概率修改为10%。当可疑概率小于等于可疑概率阈值时,可以认为这个基站为真实基站,这里假设这个可疑概率阈值为20%,那么,服务器可以将基站{cid15,lac15}的信息更新到真实基站的信息中,假设基站{cid15,lac15}出现的区域为[lat7,lng7],将基站{cid15,lac15}的信息更新到上述表3中,在表4和表5中删除基站{cid15,lac15}的信息。In the embodiment of the present application, it is assumed that the feedback information reported by the 50 target terminals is 45 "No" feedback information corresponding to the base station {cid15, lac15}, and the base station {cid15, lac15}, 5 "is Feedback. Then, the server can determine that the base station {cid15, lac15} has a 90% probability that it is not a pseudo base station, and the 10% probability is a pseudo base station. That is, the corresponding suspicious probability of the base station {cid15, lac15} can be modified to 10% in the above Table 4 and Table 5. When the suspicious probability is less than or equal to the suspicious probability threshold, the base station can be considered as a real base station. If the suspicious probability threshold is 20%, then the server can update the information of the base station {cid15, lac15} to the information of the real base station, assuming The area where the base station {cid15, lac15} appears is [lat7, lng7], the information of the base station {cid15, lac15} is updated to the above table 3, and the information of the base station {cid15, lac15} is deleted in Table 4 and Table 5.
如表6所示,为更新后的表3关于真实基站的信息和可疑概率的对应关系,如下所示:As shown in Table 6, the updated relationship between the information about the real base station and the suspicious probability in Table 3 is as follows:
区域region 真实基站Real base station 可疑概率Suspicious probability
[lat1,lng1][lat1,lng1] {cid1,lac1;cid2,lac2;cid3,lac3}{cid1, lac1; cid2, lac2; cid3, lac3} 00
[lat1,lng2][lat1,lng2] {cid1,lac1;cid2,lac2;cid3,lac3;cid4,lac4}{cid1, lac1; cid2, lac2; cid3, lac3; cid4, lac4} 00
[lat2,lng1][lat2,lng1] {cid8,lac8;cid5,lac5;cid6,lac6}{cid8, lac8; cid5, lac5; cid6, lac6} 00
[lat2,lng2][lat2,lng2] {cid5,lac5;cid6,lac6;cid7,lac7}{cid5, lac5; cid6, lac6; cid7, lac7} 00
[lat7,lng7][lat7,lng7] {cid15,lac15}{cid15,lac15} 10%10%
表6Table 6
如表7所示,为更新后的表4关于可疑基站、移动基站和可疑概率的对应关系,如下所示:As shown in Table 7, for the updated table 4, the relationship between the suspicious base station, the mobile base station, and the suspicious probability is as follows:
可疑基站Suspicious base station 可疑概率Suspicious probability 移动基站Mobile base station 可疑概率Suspicious probability
{cid8,lac8}{cid8, lac8} 100%100% {cid12,lac12}{cid12,lac12} 100%100%
{cid19,lac19}{cid19,lac19} 100%100% {cid8,lac8}{cid8, lac8} 100%100%
{cid20,lac20}{cid20,lac20} 100%100% {cid19,lac19}{cid19,lac19} 100%100%
  100%100% {cid20,lac20}{cid20,lac20} 100%100%
    {cid36,lac36}{cid36,lac36} 100%100%
    {cid40,lac40}{cid40,lac40} 100%100%
表7Table 7
如表8所示,为更新后的表5关于可疑基站、移动基站和可疑概率的对应关系,如下所示: As shown in Table 8, the updated correspondence between Table 5 regarding suspicious base stations, mobile base stations, and suspicious probability is as follows:
可疑基站Suspicious base station 可疑概率Suspicious probability 移动基站Mobile base station 可疑概率Suspicious probability
{cid8,lac8}{cid8, lac8} 100%100% {cid12,lac12}{cid12,lac12} 80%80%
{cid19,lac19}{cid19,lac19} 100%100% {cid8,lac8}{cid8, lac8} 100%100%
{cid20,lac20}{cid20,lac20} 100%100% {cid19,lac19}{cid19,lac19} 100%100%
    {cid20,lac20}{cid20,lac20} 100%100%
    {cid36,lac36}{cid36,lac36} 80%80%
    {cid40,lac40}{cid40,lac40} 80%80%
表8Table 8
需要说明的是,在实际应用中,服务器接收的反馈信息可能是针对同一个基站,也可能是针对不同的基站,修改可疑概率的方式和上述类似,此处不再赘述。而且,更新真实基站的信息和伪基站的信息包括但不限于其他的实现方式,例如,对同一个基站来说,服务器在第一个时长内接收的反馈信息中,有2个“是”的反馈信息,6个“否”的反馈信息;在第二个时长内接收的反馈信息中,有1个“是”的反馈信息,8个“否”的反馈信息;在第三个时长内接收的反馈信息中,有0个“是”的反馈信息,10个“否”的反馈信息;可能这3次修改后,该基站的可疑概率还没有低于可疑概率阈值20%,但是服务器根据接收的反馈信息发现反馈“是”的反馈信息的数量越来越少,反馈“否”反馈信息的数量越来越多,那么,就可以认为该基站不是伪基站的可能性很大,服务器可以将该基站更新在真实基站的信息中。It should be noted that, in actual applications, the feedback information received by the server may be for the same base station, or may be for different base stations, and the manner of modifying the suspicious probability is similar to the foregoing, and details are not described herein again. Moreover, the information of the real base station and the information of the pseudo base station are updated, but are not limited to other implementation manners. For example, for the same base station, there are two “yes” of the feedback information received by the server in the first time period. Feedback information, 6 "no" feedback information; in the feedback information received within the second duration, there is 1 "yes" feedback information, 8 "no" feedback information; received in the third time period In the feedback information, there are 0 "yes" feedback information and 10 "no" feedback information; maybe after 3 revisions, the suspicious probability of the base station is not lower than the suspicious probability threshold by 20%, but the server receives according to the The feedback information finds that the number of feedback information with feedback "yes" is less and less, and the number of feedback "no" feedback information is increasing. Therefore, it is highly probable that the base station is not a pseudo base station, and the server can The base station is updated in the information of the real base station.
在本申请实施例中,服务器是根据多个终端上报的大数据来获取真实基站的信息和伪基站的信息,所以,得到的真实基站的信息和伪基站的信息的准确率比较高。即服务器接收多个终端发送的事件的信息,该事件的信息可以包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。服务器根据所述多个终端发送的事件的信息获取真实基站的信息和伪基站的信息。服务器还可以根据确定的真实基站的信息和伪基站的信息,再确定所述多个终端中接入伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对目标终端上发生的事件引起警惕,小心上当受骗。In the embodiment of the present application, the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by the multiple terminals. Therefore, the accuracy of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives the information of the event sent by the multiple terminals, and the information of the event may include the terminal identifier, the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs. The server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals. The server may further determine, according to the determined information of the real base station and the information of the pseudo base station, the target terminal that accesses the pseudo base station among the multiple terminals, and send the indication information of the pseudo base station to the target terminal, so that the user occurs on the target terminal. The incident caused vigilance and was carefully deceived.
进一步的,服务器还可以利用伪基站移动的特点结合终端的反馈信息,修改伪基站的可疑概率,更新真实基站的信息和伪基站的信息,从而使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。Further, the server may also use the characteristics of the pseudo base station to combine with the feedback information of the terminal, modify the suspicious probability of the pseudo base station, update the information of the real base station and the information of the pseudo base station, so that the server receives the first event reported by the first terminal next time. And determining, according to the updated information of the real base station and the information of the pseudo base station, whether the first base station accessed by the terminal when the first event occurs is a pseudo base station, such that the real base station information and the pseudo base station are updated according to the real time. The accuracy of the results judged by the information is higher.
如图7所示,为本申请实施例中提示方法的一个实施例示意图,包括:FIG. 7 is a schematic diagram of an embodiment of a prompting method in an embodiment of the present application, including:
701、服务器接收多个终端发送的事件的信息。701. The server receives information about events sent by multiple terminals.
702、所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。702. The server acquires information of a real base station and information of a pseudo base station according to information about an event sent by the multiple terminals.
703、所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端。703. The server determines, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals.
704、所述服务器将伪基站的指示信息发送给所述目标终端。704. The server sends the indication information of the pseudo base station to the target terminal.
705、所述目标终端提示所述伪基站的指示信息。 705. The target terminal prompts indication information of the pseudo base station.
706、所述服务器标记所述真实基站和所述伪基站的可疑概率。706. The server marks a suspicious probability of the real base station and the pseudo base station.
707、第一目标终端接收反馈信息。707. The first target terminal receives the feedback information.
708、第一目标终端将反馈信息发送给服务器。708. The first target terminal sends the feedback information to the server.
709、所述服务器根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率。709. The server, according to the feedback information, correspondingly modify a suspicious probability of the pseudo base station, to obtain a modified suspicious probability of the pseudo base station.
在本申请实施例中,步骤701-509与上述图5所示实施例中的步骤501-509类似,此处不再赘述。In the embodiment of the present application, the steps 701-509 are similar to the steps 501-509 in the foregoing embodiment shown in FIG. 5, and details are not described herein again.
710、所述服务器确定目标伪基站的信息和目标真实基站的信息。710. The server determines information of a target pseudo base station and information of a target real base station.
在本申请实施例中,所述服务器可以根据真实基站的信息和伪基站的信息对应的可疑概率,确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息,可疑概率小于第四阈值的基站的信息为目标真实基站的信息。这些目标真实基站的信息和目标伪基站的信息包括但不限于cid、lac、信号强度、采集时间与上报时间的差异等信息。其中,采集时间指的是对应的终端发生事件的时间,上报时间指的是,终端向服务器发送事件的信息的时间,采集时间可以和上报时间相同,或者,上报时间在采集时间之后。In the embodiment of the present application, the server may determine, according to the information of the real base station and the suspicious probability corresponding to the information of the pseudo base station, the information of the base station whose suspicious probability is greater than the third threshold is the information of the target pseudo base station, and the suspicious probability is less than the fourth threshold. The information of the base station is information of the target real base station. The information of the target real base station and the information of the target pseudo base station include, but are not limited to, information such as cid, lac, signal strength, difference between acquisition time and reporting time. The collection time refers to the time when the corresponding terminal has an event. The reporting time refers to the time when the terminal sends the event information to the server. The collection time can be the same as the reporting time, or the reporting time is after the collection time.
711、所述服务器根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到基站的信息中包括的各个特征的参考权重。711. The server performs model training according to the information of the target pseudo base station and the information of the target real base station, and obtains reference weights of each feature included in the information of the base station.
在本申请实施例中,服务器根据所述目标伪基站的信息和所述目标真实基站的信息,可以使用Logistics算法等其他算法进行模型训练,得到基站的信息中包括的各个特征的参考权重。例如:cid=w1,lac=w2,信号强度=w3,时间差=w4……In the embodiment of the present application, the server may perform model training using other algorithms such as the Logistics algorithm according to the information of the target pseudo base station and the information of the target real base station, and obtain reference weights of each feature included in the information of the base station. For example: cid=w1, lac=w2, signal strength=w3, time difference=w4...
712、第一终端检测第一事件发生并采集所述第一事件的信息。712. The first terminal detects that the first event occurs and collects information about the first event.
在本申请实施例中,第一终端检测第一事件发生并采集所述第一事件的信息。所述第一事件的信息可以包括发生所述第一事件时接入的基站的信息,应理解,所述第一事件的信息还可以包括所述第一终端标识、所述第一终端的位置信息、发生所述第一事件的时间、第一短信的内容和/或第一来电的号码等信息。所述第一事件可以包括接收第一短信和/或第一来电。关于第一终端接收第一短信或者第一来电的示意图可以参考上述图4(a)和图4(b)所示,此处不再赘述。In the embodiment of the present application, the first terminal detects that the first event occurs and collects information about the first event. The information of the first event may include the information of the base station that is accessed when the first event occurs, and the information of the first event may further include the first terminal identifier and the location of the first terminal. Information, information such as the time at which the first event occurred, the content of the first short message, and/or the number of the first incoming call. The first event can include receiving a first short message and/or a first incoming call. For a schematic diagram of the first terminal receiving the first short message or the first incoming call, refer to FIG. 4(a) and FIG. 4(b) above, and details are not described herein again.
需要说明的是,步骤712可以在步骤702-713之间。It should be noted that step 712 can be between steps 702-713.
713、第一终端将第一事件的信息发送给服务器。713. The first terminal sends information about the first event to the server.
在本申请实施例中,所述服务器接收第一终端发送的第一事件的信息。需要说明的是,第一终端可以是前面所述多个终端中的终端,也可以是所述多个终端之外新接入的其他终端。而且,第一终端表示的数量不做限定,可以指代一个终端,也可以指代多个终端。在下述的说明中,以第一终端为手机1为例来进行说明。即服务器接收手机1发送的第一事件的信息,所述第一事件的信息包括所述手机1标识、所述手机1的位置信息、发生所述第一事件时接入的第一基站的信息、发生所述第一事件的时间。In the embodiment of the present application, the server receives information about a first event sent by the first terminal. It should be noted that the first terminal may be a terminal in the foregoing multiple terminals, or may be another terminal newly accessed outside the multiple terminals. Moreover, the number of representations of the first terminal is not limited, and may refer to one terminal or multiple terminals. In the following description, the first terminal is referred to as the mobile phone 1 as an example. That is, the server receives the information of the first event sent by the mobile phone 1, and the information of the first event includes the identifier of the mobile phone 1, the location information of the mobile phone 1, and the information of the first base station that is accessed when the first event occurs. The time at which the first event occurred.
其中,手机1的位置信息可以利用全球定位系统(Global Positioning System,GPS)获得的经纬度、或者利用网络计算的经纬度,手机的位置信息包括但不限于经纬度、接入无线保真(Wireless Fidelity,WiFi)的无线接入点的物理地址(Basic Service Set identifier, BSSID)/无线接入点的标识或服务集标识(Service Set Identifier,SSID)/媒体接入控制地址(Medium Access Control address,MAC addr)/网络标识(Network ID),当前扫描到的WiFi SSID等信息。手机1发生第一事件时接入的第一基站的信息可以包括基站的扇区标识、也可以称为小区标识(cell identification,CID)、LAC、相邻的CID,还可以包括信号强度、小区信息等信息。The location information of the mobile phone 1 can utilize the latitude and longitude obtained by the Global Positioning System (GPS) or the latitude and longitude calculated by the network. The location information of the mobile phone includes but is not limited to latitude and longitude, and access to wireless fidelity (WiFi). The physical address of the wireless access point (Basic Service Set identifier, BSSID)/Wireless Access Point ID or Service Set Identifier (SSID)/Medium Access Control Address (MAC addr)/Network ID (Network ID), currently scanned WiFi SSID, etc. information. The information of the first base station that is accessed when the first event occurs on the mobile phone 1 may include a sector identifier of the base station, which may also be called a cell identification (CID), a LAC, an adjacent CID, and may also include a signal strength and a cell. Information and other information.
714、服务器确定第一基站是否为伪基站。714. The server determines whether the first base station is a pseudo base station.
在本申请实施例中,第一基站的真伪确定可以有几种不同的实现方式,下面分别进行说明:In the embodiment of the present application, the authenticity determination of the first base station may have several different implementation manners, which are respectively described below:
第一种方式:服务器在数据库中保存的真实基站的信息和伪基站的信息中进行查找确定。The first way: the server performs a lookup determination in the information of the real base station and the information of the pseudo base station stored in the database.
若步骤712在步骤702之后、步骤709之前,服务器可以在根据多个终端发送的事件的信息获取的真实基站的信息和伪基站的信息中进行查找,若第一基站的信息在伪基站的信息中,则认为第一基站为伪基站,服务器可以向手机1发送伪基站的指示信息;若第一基站的信息在真实基站的信息中,则说明第一基站为真实基站,服务器可以不向手机1发送真实基站的指示信息。If the step 712 is after the step 702 and before the step 709, the server may perform the search in the information of the real base station and the information of the pseudo base station acquired according to the information of the event sent by the multiple terminals, if the information of the first base station is in the information of the pseudo base station. The first base station is a pseudo base station, and the server may send the indication information of the pseudo base station to the mobile phone 1. If the information of the first base station is in the information of the real base station, the first base station is a real base station, and the server may not 1 Send the indication information of the real base station.
若步骤712在步骤709之后、步骤713之前,服务器可以在更新后的真实基站的信息和伪基站的信息中进行查找,若第一基站的信息在更新后的伪基站的信息中,则认为第一基站为伪基站,服务器可以向手机1发送伪基站的指示信息,若第一基站的信息在更新后的真实基站的信息中,则说明第一基站为真实基站,服务器可以不向手机1发送真实基站的指示信息。If the step 712 is after the step 709 and before the step 713, the server may perform the search in the information of the updated real base station and the information of the pseudo base station, and if the information of the first base station is in the information of the updated pseudo base station, A base station is a pseudo base station, and the server may send the indication information of the pseudo base station to the mobile phone 1. If the information of the first base station is in the information of the updated real base station, the first base station is a real base station, and the server may not send the message to the mobile phone 1. The indication information of the real base station.
第二种方式:若步骤712在步骤702之后、步骤709之前,服务器可以在数据库中保存的伪基站的信息和真实的伪基站的信息先查找第一基站的信息。或者,若步骤712在步骤709之后、步骤713之前,服务器可以在数据库中保存的更新的真实基站的信息和更新的伪基站的信息中先查找第一基站的信息。The second way: if step 712 is after step 702 and before step 709, the server may first search for information of the first base station by using the information of the pseudo base station stored in the database and the information of the real pseudo base station. Alternatively, if step 712 is after step 709 and before step 713, the server may first search for information of the first base station in the updated real base station information and the updated pseudo base station information stored in the database.
如果没有查找到第一基站的信息,则所述服务器可以根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率。服务器确定第一基站的目标可疑概率Rate=sum(特征*权重)=cid*w1+lac*w2+信号强度*w3+时间差*w4+……。若所述目标概率小于等于所述第五阈值,则所述服务器确定所述第一站为伪基站。If the information of the first base station is not found, the server may determine the target probability of the first base station according to the information of the first event and the reference weight of each feature included in the information of the base station. The server determines the target suspicious probability of the first base station Rate=sum (feature*weight)=cid*w1+lac*w2+signal strength*w3+time difference*w4+.... If the target probability is less than or equal to the fifth threshold, the server determines that the first station is a pseudo base station.
需要说明的是,根据参考权重计算出来的目标概率范围在0和1之间,趋近于1的可以认为是真实基站,趋近于0的可以认为是伪基站。假设这里计算出来的目标概率为0.8,第五阈值可以设为0.6,0.8大于0.6,所以,服务器确定第一基站为真实基站。假设这里计算出来的目标概率为0.3,第五阈值可以设为0.6,0.3小于0.6,所以,服务器确定第一基站为伪基站。It should be noted that the target probability range calculated according to the reference weight is between 0 and 1, and the approaching to 1 can be regarded as a real base station, and the approaching to 0 can be regarded as a pseudo base station. Assuming that the target probability calculated here is 0.8, the fifth threshold can be set to 0.6 and 0.8 is greater than 0.6, so the server determines that the first base station is a real base station. Assuming that the target probability calculated here is 0.3, the fifth threshold can be set to 0.6 and 0.3 is less than 0.6, so the server determines that the first base station is a pseudo base station.
第三种方式:所述服务器直接根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率。即服务器确定第一基站的目标可疑概率Rate=sum(特征*权重)=cid*w1+lac*w2+信号强度*w3+时间差*w4+……。若所述目 标概率小于等于所述第五阈值,则所述服务器确定所述第一基站为伪基站。The third mode: the server directly determines the target probability of the first base station according to the information of the first event and the reference weight of each feature included in the information of the base station. That is, the server determines the target suspicious probability of the first base station Rate=sum (feature*weight)=cid*w1+lac*w2+signal strength*w3+time difference*w4+.... If the head If the target probability is less than or equal to the fifth threshold, the server determines that the first base station is a pseudo base station.
715、若第一基站为伪基站,则所述服务器向所述第一终端发送伪基站的指示信息。715. If the first base station is a pseudo base station, the server sends the indication information of the pseudo base station to the first terminal.
在本申请实施例中,若经过步骤714中所述的任意一种确定第一基站的真伪的方式,确定出第一基站是伪基站的话,所述服务器向所述第一终端发送伪基站的指示信息。In the embodiment of the present application, if it is determined that the first base station is a pseudo base station by using any one of the methods described in step 714 to determine the authenticity of the first base station, the server sends the pseudo base station to the first terminal. Instructions.
716、所述第一终端提示伪基站的指示信息。716. The first terminal prompts indication information of the pseudo base station.
这里第一终端提示伪基站的指示信息的方式可以参考上述图4(c)-图4(p)任一的提示方式,此处不再赘述。For the manner in which the first terminal prompts the indication information of the pseudo base station, reference may be made to the prompting manner of any of the foregoing FIG. 4(c) to FIG. 4(p), and details are not described herein again.
在本申请实施例中,服务器是根据多个终端上报的大数据来获取真实基站的信息和伪基站的信息,所以,得到的真实基站的信息和伪基站的信息的准确率比较高。即服务器接收多个终端发送的事件的信息,事件的信息可以包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。服务器根据所述多个终端发送的事件的信息确定真实基站的信息和伪基站的信息。服务器还可以根据确定的真实基站的信息和伪基站的信息,再确定所述多个终端中接入伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对目标终端上发生的第一事件引起警惕,小心上当受骗。In the embodiment of the present application, the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by the multiple terminals. Therefore, the accuracy of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives the information of the event sent by the multiple terminals, and the information of the event may include the identifier of the terminal, the location information of the terminal, the information of the base station that is accessed when the event occurs, and the time when the event occurs. The server determines information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals. The server may further determine, according to the determined information of the real base station and the information of the pseudo base station, the target terminal that accesses the pseudo base station among the multiple terminals, and send the indication information of the pseudo base station to the target terminal, so that the user occurs on the target terminal. The first incident caused vigilance and was carefully deceived.
进一步的,服务器还可以利用伪基站移动的特点结合终端的反馈信息,修改伪基站的可疑概率,更新真实基站的信息和伪基站的信息,从而使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。Further, the server may also use the characteristics of the pseudo base station to combine with the feedback information of the terminal, modify the suspicious probability of the pseudo base station, update the information of the real base station and the information of the pseudo base station, so that the server receives the first event reported by the first terminal next time. And determining, according to the updated information of the real base station and the information of the pseudo base station, whether the first base station accessed by the terminal when the first event occurs is a pseudo base station, such that the real base station information and the pseudo base station are updated according to the real time. The accuracy of the results judged by the information is higher.
更进一步的,服务器还可以根据真实基站的信息和伪基站的信息对应的可疑概率,选择一批可疑概率最高的基站的信息作为正例,可疑概率最低的基站的信息作为负例,进行模型训练,得到基站的信息包括的各个特征的参考权重。这些参考权重,可以用于服务器下次接收第一终端上报的第一事件的信息时,根据各个特征的参考权重和第一基站的信息,来计算发生第一事件时接入的第一基站的目标概率。若目标概率大于预设阈值,则服务器确定第一基站为真实基站;若目标概率小于等于所述预设阈值,则服务器确定第一基站为伪基站,服务器向该终端发送伪基站的指示信息。这样,服务器就可以根据基站的信息中包括的各个特征的参考权重,来计算服务器新接收的第一终端发生第一事件时接入是不是伪基站,提供了另外一种确定伪基站的实现方式,增加了方案的可行性。Further, the server may also select, according to the suspicious probability corresponding to the information of the real base station and the information of the pseudo base station, a batch of information of the base station with the highest suspicious probability as a positive example, and the information of the base station with the lowest suspicious probability as a negative example, and perform model training. A reference weight of each feature included in the information of the base station is obtained. The reference weights may be used when the server receives the information of the first event reported by the first terminal, and according to the reference weight of each feature and the information of the first base station, calculate the first base station that is accessed when the first event occurs. Target probability. If the target probability is greater than the preset threshold, the server determines that the first base station is a real base station; if the target probability is less than or equal to the preset threshold, the server determines that the first base station is a pseudo base station, and the server sends the indication information of the pseudo base station to the terminal. In this way, the server can calculate whether the access is a pseudo base station when the first event newly received by the server is received according to the reference weight of each feature included in the information of the base station, and provide another method for determining the pseudo base station. Increase the feasibility of the program.
另一方面,根据大量终端上报的事件的信息以及用户的反馈信息可以对真实基站和伪基站的可疑概率进行不断的学习优化和校正,会大大提升判断的准确率;相对于“基于基站位置的识别方法”只能和运营商的已有基站数据进行对比分析,在判断移动基站的情况下有较高的准确率。服务器根据目标真实基站的信息和目标伪基站的信息实时进行模型训练,能够确保识别的准确性和实时性,对于新的伪基站可以及时发现;还可以根据大数据的技术,识别出伪基站的运动轨迹,进而可以更有效的预防伪基站诈骗甚至捕获伪基站。On the other hand, according to the information of the events reported by a large number of terminals and the feedback information of the user, the suspicious probability of the real base station and the pseudo base station can be continuously optimized and corrected, which greatly improves the accuracy of the judgment; The identification method can only be compared with the existing base station data of the operator, and has a high accuracy in the case of judging the mobile base station. The server performs model training in real time according to the information of the target real base station and the information of the target pseudo base station, which can ensure the accuracy and real-time of the identification, and can be found in time for the new pseudo base station; and can also identify the pseudo base station according to the technology of big data. The motion trajectory can further prevent pseudo base station scams and even capture pseudo base stations.
如图8所示,为本申请实施例中提示方法的一个实施例示意图,包括:FIG. 8 is a schematic diagram of an embodiment of a prompting method in an embodiment of the present application, including:
801、第一终端检测第一事件发生并采集所述第一事件的信息;801. The first terminal detects that the first event occurs and collects information about the first event.
在本申请实施例中,该第一事件可以是第一终端上安装的应用所发生的第一事件,所 述第一事件的信息可以包括所述第一终端标识、所述第一终端的位置信息、发生所述第一事件时接入的第一基站的信息、发生所述第一事件的时间,发生第一事件的时间也可以称为时间戳。该第一事件的信息还可以包括短信的内容和/或来电的号码等信息。第一终端上安装的应用可以是短信应用、呼叫应用等其他应用,此处不做限定。例如,第一终端检测到接收短消息,第一终端采集接收短消息的信息,或者,第一终端检测到接收来电,第一终端采集接收来电的信息。接收短消息或者接收来电的示意图可以参考图4(a)和4(b)所示,此处不再赘述。In the embodiment of the present application, the first event may be a first event that occurs in an application installed on the first terminal, where The information about the first event may include the first terminal identifier, location information of the first terminal, information of a first base station that is accessed when the first event occurs, time when the first event occurs, and occurs. The time of the first event can also be referred to as a timestamp. The information of the first event may further include information such as the content of the short message and/or the number of the incoming call. The application installed on the first terminal may be a short message application, a call application, or the like, and is not limited herein. For example, the first terminal detects that the short message is received, the first terminal collects the information for receiving the short message, or the first terminal detects the received incoming call, and the first terminal collects the information for receiving the incoming call. A schematic diagram of receiving a short message or receiving an incoming call can be referred to FIG. 4(a) and FIG. 4(b), and details are not described herein again.
802、第一终端将所述第一事件的信息发送给服务器;802. The first terminal sends the information about the first event to a server.
在本申请实施例中,第一终端可以将采集的接收短消息的信息,或者,接收采集的来电的信息发送给服务器。需要说明的是,当第一终端接收短消息或者接收来电时,接入的基站为伪基站,那么,第一终端是处于断网状态的,没法向服务器上报第一事件的信息,所以,第一终端需要等到处于网络连接状态的时候,发送所述第一事件的信息。In the embodiment of the present application, the first terminal may send the collected information of the received short message or the information of the received incoming call to the server. It should be noted that when the first terminal receives the short message or receives the incoming call, the accessed base station is a pseudo base station, and then the first terminal is in the disconnected state, and the information of the first event cannot be reported to the server, so The first terminal needs to wait for the network connection state to send the information of the first event.
803、第一终端接收所述服务器发送的伪基站的指示信息。803. The first terminal receives the indication information of the pseudo base station sent by the server.
在本申请实施例中,如果服务器确定第一终端接入的是伪基站,服务器向第一终端发送伪基站的指示信息。关于服务器确定伪基站的方式,可以包括但不限于以下几种实现方式,下面以手机为例进行说明,如下所示:In the embodiment of the present application, if the server determines that the first terminal accesses the pseudo base station, the server sends the indication information of the pseudo base station to the first terminal. The manner in which the server determines the pseudo base station may include, but is not limited to, the following implementation manners. The following uses a mobile phone as an example, as follows:
举例1:服务器在上述图3所示的实施例中获取的真实基站的信息和伪基站的信息中进行查找确定。Example 1: The server performs a lookup determination in the information of the real base station and the information of the pseudo base station acquired in the embodiment shown in FIG. 3 above.
服务器可以在根据多个终端发送的事件的信息获取的真实基站的信息和伪基站的信息中进行查找,若第一基站的信息在伪基站的信息中,则认为第一基站为伪基站,服务器可以向手机发送伪基站的指示信息;若第一基站的信息在真实基站的信息中,则说明第一基站为真实基站,服务器可以不向手机发送真实基站的指示信息。The server may perform a search in the information of the real base station and the information of the pseudo base station obtained according to the information of the event sent by the multiple terminals. If the information of the first base station is in the information of the pseudo base station, the first base station is regarded as a pseudo base station, and the server The indication information of the pseudo base station may be sent to the mobile phone; if the information of the first base station is in the information of the real base station, the first base station is a real base station, and the server may not send the indication information of the real base station to the mobile phone.
举例2:服务器在上述图5所示的实施例中更新的真实基站的信息和伪基站的信息中进行查找确定。Example 2: The server performs a lookup determination in the information of the real base station and the information of the pseudo base station updated in the embodiment shown in FIG. 5 described above.
服务器可以在上述图5所示的实施例中,根据更新的真实基站的信息和伪基站的信息中进行查找确定,若第一基站的信息在更新的伪基站的信息中,则认为第一基站为伪基站,服务器可以向手机发送伪基站的指示信息;若第一基站的信息在更新的真实基站的信息中,则说明第一基站为真实基站,服务器可以不向手机发送真实基站的指示信息。The server may perform a lookup determination according to the information of the updated real base station and the information of the pseudo base station in the embodiment shown in FIG. 5, and consider that the first base station is in the information of the updated pseudo base station if the information of the first base station is in the information of the updated pseudo base station. For the pseudo base station, the server may send the indication information of the pseudo base station to the mobile phone; if the information of the first base station is in the information of the updated real base station, the first base station is the real base station, and the server may not send the indication information of the real base station to the mobile phone. .
举例3:服务器在上述图7所示的实施例中根据得到的基站的信息中包括的各个特征的参考权重来进行确定。Example 3: The server performs the determination in the embodiment shown in FIG. 7 above based on the reference weights of the respective features included in the obtained information of the base station.
如果在上述图3或者图5所示的实施例中都未查找到第一基站是真实基站还是伪基站,可以采用上述图7所示的实施例中根据得到的基站的信息中包括的各个特征的参考权重来进行确定。或者,直接采用上述图7所示的实施例中根据得到的基站的信息中包括的各个特征的参考权重来进行确定。具体实现方式可以参考上述实施例7中步骤714的说明,此处不再赘述。If the first base station is a real base station or a pseudo base station, in the embodiment shown in FIG. 3 or FIG. 5, the various features included in the information according to the obtained base station in the foregoing embodiment shown in FIG. 7 may be adopted. The reference weights are used to determine. Alternatively, the determination is performed directly according to the reference weight of each feature included in the obtained information of the base station in the embodiment shown in FIG. 7 above. For a specific implementation, refer to the description of step 714 in the foregoing Embodiment 7, and details are not described herein again.
举例4:服务器在上述图3所示的实施例中根据接收的多个终端发送的事件的信息,再进行一次大数据的计算,获取真实基站的信息和伪基站的信息,从而,确定该第一基站 是否为伪基站。For example, in the embodiment shown in FIG. 3, the server performs another big data calculation according to the received information of the event sent by the multiple terminals, and obtains the information of the real base station and the information of the pseudo base station, thereby determining the first One base station Whether it is a pseudo base station.
804、第一终端提示所述伪基站的指示信息。804. The first terminal prompts the indication information of the pseudo base station.
在本申请实施例中,第一终端提示所述伪基站的指示信息,可以包括但不限于以下几种实现方式:In the embodiment of the present application, the first terminal prompts the indication information of the pseudo base station, which may include, but is not limited to, the following implementation manners:
举例1:所述终端通过文字显示所述伪基站的指示信息;具体可以参考上述图4(c)和4(d)所示,此处不再赘述。For example, the terminal displays the indication information of the pseudo base station by using a text; for details, refer to FIG. 4(c) and FIG. 4(d) above, and details are not described herein again.
举例2:所述终端通过语音提示所述伪基站的指示信息;具体可以参考上述图4(e)和4(f)所示,此处不再赘述。Example 2: The terminal prompts the indication information of the pseudo base station by voice; for details, refer to FIG. 4(e) and FIG. 4(f) above, and details are not described herein again.
举例3:所述终端通过危险标识显示所述伪基站的指示信息;具体可以参考上述图4(g)和4(h)所示,此处不再赘述。For example, the terminal displays the indication information of the pseudo base station by using a hazard identifier; for details, refer to FIG. 4(g) and FIG. 4(h), and details are not described herein again.
可选的,在其他提示伪基站的指示信息,可以参考上述图4(i)-4(p)的实现方式,此处不再赘述。Optionally, in other indication information indicating the pseudo base station, reference may be made to the foregoing implementation manner of FIG. 4(i)-4(p), and details are not described herein again.
在本申请实施例中,对于第一终端来说,主要是上报采集的事件的信息,该事件的信息可以用于服务器获取伪基站的信息,而服务器确定的方式可以有多种,上述已经进行说明,但服务器确定方式是根据大数据的计算得到的,因此,所判断出来的结果可靠性比较高,得到的结果也就越准确。如果终端上接入的是伪基站,那么,服务器会向终端发送伪基站的指示信息,从而,终端可以提示伪基站的指示信息,使得用户对第一终端上发生的第一事件引起警惕,小心上当受骗。In the embodiment of the present application, for the first terminal, information about the collected event is mainly reported, and the information of the event may be used by the server to obtain information of the pseudo base station, and the server may determine multiple manners, and the foregoing has been performed. Note, but the server determination method is based on the calculation of big data. Therefore, the reliability of the judged result is relatively high, and the obtained result is more accurate. If the terminal accesses the pseudo base station, the server sends the indication information of the pseudo base station to the terminal, so that the terminal can prompt the indication information of the pseudo base station, so that the user is alert to the first event occurring on the first terminal, be careful Be deceived.
上面对本申请实施例中提示方法进行了描述,下面对本申请实施例中的服务器和终端进行描述,如图9(a)所示,为本申请实施例中服务器的一个实施例示意图,包括:The description of the method in the embodiment of the present application is as follows. The following describes the server and the terminal in the embodiment of the present application. As shown in FIG. 9(a), it is a schematic diagram of an embodiment of the server in the embodiment of the present application, including:
接收模块901,用于接收多个终端发送的事件的信息;The receiving module 901 is configured to receive information about events sent by multiple terminals.
获取模块902,用于根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。The obtaining module 902 is configured to obtain information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
可选的,在本申请的一些实施例中,在上述图9(a)所示的基础上,如图9(b)所示,为服务器的另一个实施例示意图,所述服务器还包括:Optionally, in some embodiments of the present application, on the basis of the foregoing FIG. 9( a ), as shown in FIG. 9( b ), which is a schematic diagram of another embodiment of the server, the server further includes:
确定模块903,用于根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;a determining module 903, configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals;
发送模块904,用于向所述目标终端发送伪基站的指示信息。The sending module 904 is configured to send indication information of the pseudo base station to the target terminal.
可选的,在本申请的一些实施例中,所述事件的信息包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。Optionally, in some embodiments of the present application, the information about the event includes a terminal identifier, location information of the terminal, information about a base station that is accessed when the event occurs, and a time when the event occurs.
可选的,在本申请的一些实施例中,所述获取模块902,具体用于:Optionally, in some embodiments of the present application, the obtaining module 902 is specifically configured to:
根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;Determining an initial base station regarding longitude, latitude, and date according to location information of the terminal transmitted by the plurality of terminals, information of a base station accessed when the event occurs, a time when the event occurs, and preset position calculation accuracy Information;
从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;Deleting, from the information about the initial base station of the longitude, latitude, and date, information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold;
去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信 息;The date is removed, and the information of other initial base stations is combined to obtain a letter about the longitude and latitude screening base station. interest;
确定所述筛选基站的信息为真实基站的信息。Determining that the information of the screening base station is information of a real base station.
可选的,在本申请的一些实施例中,所述获取模块902,具体还用于:Optionally, in some embodiments of the present application, the obtaining module 902 is specifically configured to:
根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;Determining location information and a second time of the terminal accessed by the target base station at the first time according to the location information of the terminal that is sent by the multiple terminals, the information of the base station that is accessed when the event occurs, and the time when the event occurs. Location information of the accessed terminal, where the target base station is any base station that is accessed when the multiple terminals generate the event;
根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;Calculating the first central location of the accessed terminal according to the location information of the terminal accessed by the target base station at the first time, and calculating the access according to the location information of the terminal accessed by the target base station at the second time The second central location of the terminal;
确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;Determining that the first central location is a first location of the target base station, and determining that the second central location is a second location of the target base station;
若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述获取模块确定所述目标基站的信息为伪基站的信息。And if the absolute value of the difference between the first location and the second location is greater than a second threshold, the acquiring module determines that the information of the target base station is information of a pseudo base station.
可选的,在本申请的一些实施例中,在上述图9(b)所示的基础上,如图9(c)所示,为服务器的另一个实施例示意图,所述服务器还包括:Optionally, in some embodiments of the present application, on the basis of the foregoing FIG. 9(b), as shown in FIG. 9(c), which is a schematic diagram of another embodiment of the server, the server further includes:
标记模块905,用于标记所述真实基站和所述伪基站的可疑概率;a marking module 905, configured to mark a suspicious probability of the real base station and the pseudo base station;
所述接收模块901,还用于接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;The receiving module 901 is further configured to receive feedback information sent by the first target terminal, where the feedback information is that the indication information that the base station that the user accesses when the event occurs when the first target terminal is the pseudo base station is Accurate input of information;
修改模块906,用于根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率。The modifying module 906 is configured to modify the suspicious probability of the pseudo base station according to the feedback information to obtain a modified suspicious probability of the pseudo base station.
可选的,在本申请的一些实施例中,在上述图9(c)所示的基础上,如图9(d)所示,为服务器的另一个实施例示意图,所述服务器还包括:Optionally, in some embodiments of the present application, on the basis of the foregoing FIG. 9(c), as shown in FIG. 9(d), which is a schematic diagram of another embodiment of the server, the server further includes:
所述确定模块903,还用于确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息、可疑概率小于第四阈值的基站的信息为目标真实基站的信息;The determining module 903 is further configured to: determine that the information of the base station whose suspicious probability is greater than the third threshold is the information of the target pseudo base station, and the information of the base station whose suspicious probability is less than the fourth threshold is the information of the target real base station;
模型训练模块907,用于根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到不同基站的信息中包括的各个特征的参考权重。The model training module 907 is configured to perform model training according to the information of the target pseudo base station and the information of the target real base station, and obtain reference weights of respective features included in information of different base stations.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
所述接收模块901,还用于接收第一终端发送的第一事件的信息,所述第一事件的信息包括发生所述第一事件时接入的第一基站的信息;The receiving module 901 is further configured to receive information about a first event sent by the first terminal, where the information about the first event includes information about a first base station that is accessed when the first event occurs;
所述发送模块904,还用于若所述第一基站的信息在所述伪基站的信息中,则所述发送模块向所述第一终端发送伪基站的指示信息。The sending module 904 is further configured to: if the information of the first base station is in the information of the pseudo base station, the sending module sends the indication information of the pseudo base station to the first terminal.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
所述确定模块903,还用于若所述第一基站的信息未在所述伪基站的信息中,则所述确定模块903根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率;若所述目标概率小于等于所述第五阈值,则所述确定模块903确定所述第一基站为伪基站; The determining module 903 is further configured to: if the information of the first base station is not in the information of the pseudo base station, the determining module 903 is included in the information according to the first event and the information in the base station Determining, by the reference weight of each feature, a target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the determining module 903 determines that the first base station is a pseudo base station;
所述发送模块904,还用于向所述第一终端发送伪基站的指示信息。The sending module 904 is further configured to send the indication information of the pseudo base station to the first terminal.
可选的,在本申请的一些实施例中,所述事件包括:接收短信和/或来电;Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call;
所述事件的信息还包括:所述短信的内容和/或所述来电的号码。The information of the event further includes: the content of the short message and/or the number of the incoming call.
如图10所示,为本申请实施例中终端的一个实施例示意图,包括:As shown in FIG. 10, it is a schematic diagram of an embodiment of a terminal in the embodiment of the present application, including:
采集模块1001,用于终端检测事件发生并采集所述事件的信息;The collecting module 1001 is configured to detect, by the terminal, an event occurrence and collect information about the event;
发送模块1002,用于向服务器发送所述事件的信息;a sending module 1002, configured to send information about the event to a server;
接收模块1003,用于接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的;The receiving module 1003 is configured to receive indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event;
提示模块1004,用于提示所述伪基站的指示信息。The prompting module 1004 is configured to prompt the indication information of the pseudo base station.
可选的,在本申请的一些实施例中,所述事件的信息包括所述终端标识、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。Optionally, in some embodiments of the present application, the information about the event includes the terminal identifier, location information of the terminal, information about a base station accessed when the event occurs, and a time when the event occurs.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
所述接收模块1003,还用于接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;The receiving module 1003 is further configured to receive feedback information, where the feedback information is input information that is input by the user, whether the base station that is accessed by the terminal when the event occurs is a pseudo base station, is accurate;
所述发送模块1004,还用于向所述服务器发送所述反馈信息,所述反馈信息用于所述服务器对所述伪基站的可疑概率进行修改。The sending module 1004 is further configured to send the feedback information to the server, where the feedback information is used by the server to modify a suspicious probability of the pseudo base station.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
所述提示模块1004,具体用于通过文字显示所述伪基站的指示信息。The prompting module 1004 is specifically configured to display the indication information of the pseudo base station by using a text.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
所述提示模块1004,具体用于通过危险标识显示所述伪基站的指示信息。The prompting module 1004 is specifically configured to display indication information of the pseudo base station by using a danger identifier.
所述提示模块1004,具体用于通过语音提示所述伪基站的指示信息。The prompting module 1004 is specifically configured to prompt the indication information of the pseudo base station by voice.
可选的,在本申请的一些实施例中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: a content of the short message and/or a number of the incoming call.
如图11所示,为本申请实施例中服务器的另一个实施例示意图。FIG. 11 is a schematic diagram of another embodiment of a server in an embodiment of the present application.
该服务器可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上有线或无线网络接口1150,有线或无线网络接口也可以称为收发器,一个或一个以上中央处理器(central processing units,CPU)1122(例如,一个或一个以上处理器)和存储器1132,一个或一个以上存储应用程序1142或数据1144的存储介质1130(例如一个或一个以上海量存储设备)。The server may vary greatly depending on configuration or performance, and may include one or more wired or wireless network interfaces 1150. The wired or wireless network interface may also be referred to as a transceiver, and one or more central processing units (central processing) Units, CPU) 1122 (eg, one or more processors) and memory 1132, one or more storage media 1130 that store application 1142 or data 1144 (eg, one or one storage device in Shanghai).
本申请实施例中,有线或无线网络接口1150可以接收多个终端发送的事件的信息;中央处理器1122根据有线或无线网络接口1150接收的多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。对于在目标终端上提示所述伪基站的指示信息,可以包括但不限于图4(c)-图4(p)所示的实现方式。In the embodiment of the present application, the wired or wireless network interface 1150 can receive information of events sent by multiple terminals; the central processor 1122 obtains information of the real base station according to information of events sent by multiple terminals received by the wired or wireless network interface 1150. And information about the pseudo base station. The indication information for prompting the pseudo base station on the target terminal may include, but is not limited to, the implementation manners shown in FIGS. 4(c) to 4(p).
其中,存储器1132和存储介质1130可以是短暂存储或持久存储。存储在存储介质1130的程序可以包括一个或一个以上模块(图示没标出),每个模块可以包括对服务器中的一系列指令操作。更进一步地,中央处理器1122可以设置为与存储介质1130通信,在服务器1100上执行存储介质1130中的一系列指令操作。 The memory 1132 and the storage medium 1130 may be short-term storage or persistent storage. The program stored on storage medium 1130 may include one or more modules (not shown), each of which may include a series of instruction operations in the server. Still further, central processor 1122 can be configured to communicate with storage medium 1130, executing a series of instruction operations in storage medium 1130 on server 1100.
服务器1100还可以包括一个或一个以上电源1126,一个或一个以上输入输出接口1158,和/或,一个或一个以上操作系统1141,例如Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM等等。Server 1100 may also include one or more power supplies 1126, one or more input and output interfaces 1158, and/or one or more operating systems 1141, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and the like.
上述实施例中由服务器所执行的步骤可以基于该图11所示的服务器结构。The steps performed by the server in the above embodiment may be based on the server structure shown in FIG.
可选的,在本申请的一些实施例中,中央处理器1122,还用于执行以下步骤:根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;Optionally, in some embodiments of the present application, the central processing unit 1122 is further configured to: determine, according to information of the real base station and information of the pseudo base station, access pseudo in the multiple terminals The target terminal of the base station;
有线或无线网络接口1150,还用于执行以下步骤:向所述目标终端发送伪基站的指示信息。The wired or wireless network interface 1150 is further configured to: send the indication information of the pseudo base station to the target terminal.
可选的,在本申请的一些实施例中,所述事件的信息包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。Optionally, in some embodiments of the present application, the information about the event includes a terminal identifier, location information of the terminal, information about a base station that is accessed when the event occurs, and a time when the event occurs.
可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤:Optionally, in some embodiments of the present application, the central processing unit 1122 is specifically configured to perform the following steps:
根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;Determining an initial base station regarding longitude, latitude, and date according to location information of the terminal transmitted by the plurality of terminals, information of a base station accessed when the event occurs, a time when the event occurs, and preset position calculation accuracy Information;
从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;Deleting, from the information about the initial base station of the longitude, latitude, and date, information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold;
去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;The date is removed, and information of other initial base stations is combined to obtain information about screening base stations for longitude and latitude;
确定所述筛选基站的信息为真实基站的信息。Determining that the information of the screening base station is information of a real base station.
可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤:Optionally, in some embodiments of the present application, the central processing unit 1122 is specifically configured to perform the following steps:
所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;Determining, by the server, location information of the terminal that the target base station accesses at the first time according to the location information of the terminal that is sent by the multiple terminals, the information of the base station that is accessed when the event occurs, and the time when the event occurs. The location information of the terminal accessed at the second time, where the target base station is any base station that is accessed when the multiple terminals generate the event;
根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;Calculating the first central location of the accessed terminal according to the location information of the terminal accessed by the target base station at the first time, and calculating the access according to the location information of the terminal accessed by the target base station at the second time The second central location of the terminal;
确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;Determining that the first central location is a first location of the target base station, and determining that the second central location is a second location of the target base station;
若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述中央处理器确定所述目标基站的信息为伪基站的信息。And if the absolute value of the difference between the first location and the second location is greater than a second threshold, the central processor determines that the information of the target base station is information of a pseudo base station.
可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤:标记所述真实基站和所述伪基站的可疑概率;根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率;Optionally, in some embodiments of the present application, the central processing unit 1122 is specifically configured to perform the following steps: marking a suspicious probability of the real base station and the pseudo base station; and correspondingly modifying the The suspicious probability of the pseudo base station is obtained by the modified suspicious probability of the pseudo base station;
有线或无线网络接口1150还用于执行以下步骤:接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息。The wired or wireless network interface 1150 is further configured to: receive feedback information sent by the first target terminal, where the feedback information is a pseudo base station that is input by the user when the event occurs when the first target terminal occurs Indicate whether the information is entered accurately.
可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤: Optionally, in some embodiments of the present application, the central processing unit 1122 is specifically configured to perform the following steps:
确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息、可疑概率小于第四阈值的基站的信息为目标真实基站的信息;Determining information of the base station whose suspicious probability is greater than the third threshold is information of the target pseudo base station, and information of the base station whose suspicious probability is less than the fourth threshold is information of the target real base station;
根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到基站的信息中包括的各个特征的参考权重。Performing model training according to the information of the target pseudo base station and the information of the target real base station, and obtaining reference weights of respective features included in the information of the base station.
可选的,在本申请的一些实施例中,有线或无线网络接口1150还用于执行以下步骤:Optionally, in some embodiments of the present application, the wired or wireless network interface 1150 is further configured to perform the following steps:
接收第一终端发送的第一事件的信息,所述第一事件的信息包括发生所述第一事件时接入的第一基站的信息;Receiving information of the first event sent by the first terminal, where the information of the first event includes information of the first base station that is accessed when the first event occurs;
若所述第一基站的信息在所述伪基站的信息中,则所述有线或无线网络接口1150向所述第一终端发送伪基站的指示信息。If the information of the first base station is in the information of the pseudo base station, the wired or wireless network interface 1150 sends the indication information of the pseudo base station to the first terminal.
可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤:Optionally, in some embodiments of the present application, the central processing unit 1122 is specifically configured to perform the following steps:
若所述第一基站的信息未在所述伪基站的信息中,则所述中央处理器1122根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率;若所述目标概率小于等于所述第五阈值,则所述中央处理器1122确定所述第一基站为伪基站;If the information of the first base station is not in the information of the pseudo base station, the central processing unit 1122 determines, according to the information of the first event and the reference weight of each feature included in the information of the base station, Determining a target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the central processing unit 1122 determines that the first base station is a pseudo base station;
有线或无线网络接口1150还用于执行以下步骤:向所述第一终端发送伪基站的指示信息。The wired or wireless network interface 1150 is further configured to perform the step of: transmitting indication information of the pseudo base station to the first terminal.
可选的,在本申请的一些实施例中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: a content of the short message and/or a number of the incoming call.
如图12所示,为本申请实施例中终端的另一个实施例示意图。FIG. 12 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
为了便于说明,图12仅示出了与本申请实施例相关的部分,具体技术细节未揭示的,请参照本申请实施例方法部分。该终端可以为包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑等任意终端设备,以终端为手机为例:For the convenience of description, FIG. 12 only shows a part related to the embodiment of the present application, and the specific technical details are not disclosed. Please refer to the method part of the embodiment of the present application. The terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, and the terminal is a mobile phone as an example:
图12示出的是与本申请实施例提供的终端相关的手机的部分结构的框图。参考图12,手机包括:处理器1280、通信接口1210、输出单元1270、存储器1220、输入单元1230、传感器1250、以及电源1290等部件。其中,通信接口1210可以包括射频(Radio Frequency,RF)电路1211、无线保真(wireless fidelity,WiFi)模块1212等部件;输出单元1270可以包括显示单元1240、音频电路1260等部件。本领域技术人员可以理解,图12中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。FIG. 12 is a block diagram showing a partial structure of a mobile phone related to a terminal provided by an embodiment of the present application. Referring to FIG. 12, the mobile phone includes a processor 1280, a communication interface 1210, an output unit 1270, a memory 1220, an input unit 1230, a sensor 1250, and a power supply 1290. The communication interface 1210 may include components such as a radio frequency (RF) circuit 1211 and a wireless fidelity (WiFi) module 1212. The output unit 1270 may include components such as a display unit 1240, an audio circuit 1260, and the like. It will be understood by those skilled in the art that the structure of the handset shown in FIG. 12 does not constitute a limitation to the handset, and may include more or less components than those illustrated, or some components may be combined, or different component arrangements.
下面结合图12对手机的各个构成部件进行具体的介绍:The following describes the components of the mobile phone in detail with reference to FIG. 12:
处理器1280是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1220内的软件程序和/或模块,以及调用存储在存储器1220内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。在本申请实施例中,所述处理器1280检测事件发生并采集所述事件的信息。可选的,处理器1280可包括一个或多个处理单元;优选的,处理器1280可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。 可以理解的是,上述调制解调处理器也可以不集成到处理器1280中。The processor 1280 is a control center for the handset that connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 1220, and invoking data stored in the memory 1220, The phone's various functions and processing data, so that the overall monitoring of the phone. In the embodiment of the present application, the processor 1280 detects an event occurrence and collects information of the event. Optionally, the processor 1280 may include one or more processing units; preferably, the processor 1280 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like. The modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 1280.
RF电路1211可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器1280处理;另外,将设计上行的数据发送给基站。在本申请实施例中,RF电路1211可以向服务器发送处理器1280所采集的所述事件的信息,接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的。The RF circuit 1211 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, the processor 1280 processes the data; and, in addition, transmits the designed uplink data to the base station. In the embodiment of the present application, the RF circuit 1211 may send the information about the event collected by the processor 1280 to the server, and receive the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is the server according to the The information of the event is obtained.
通常,RF电路1211包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路1211还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。Generally, RF circuit 1211 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuitry 1211 can also communicate with the network and other devices via wireless communication. The above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
存储器1220可用于存储软件程序以及模块,处理器1280通过运行存储在存储器1220的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器1220可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器1220可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 1220 can be used to store software programs and modules, and the processor 1280 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 1220. The memory 1220 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.). Moreover, memory 1220 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
输入单元1230可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。如图6(a)和6(b)中,若用户输入反馈信息,那么该反馈信息可以通过输入单元1230被手机接收。具体地,输入单元1230可包括触控面板1231以及其他输入设备1232。触控面板1231,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1231上或在触控面板1231附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板1231可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1280,并能接收处理器1280发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板1231。除了触控面板1231,输入单元1230还可以包括其他输入设备1232。具体地,其他输入设备1232可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The input unit 1230 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset. As shown in FIGS. 6(a) and 6(b), if the user inputs feedback information, the feedback information can be received by the mobile phone through the input unit 1230. Specifically, the input unit 1230 may include a touch panel 1231 and other input devices 1232. The touch panel 1231, also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 1231 or near the touch panel 1231. Operation), and drive the corresponding connecting device according to a preset program. Optionally, the touch panel 1231 may include two parts: a touch detection device and a touch controller. Wherein, the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information. The processor 1280 is provided and can receive commands from the processor 1280 and execute them. In addition, the touch panel 1231 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves. In addition to the touch panel 1231, the input unit 1230 may also include other input devices 1232. Specifically, other input devices 1232 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
输出单元1270可以包括显示单元1240、音频电路1260等部件。在本申请实施例中,输出单元1270可以用于提示所述伪基站的指示信息。The output unit 1270 can include components such as a display unit 1240, an audio circuit 1260, and the like. In the embodiment of the present application, the output unit 1270 may be used to prompt the indication information of the pseudo base station.
显示单元1240可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。如图4(a)-4(p),图6(a)-图6(d)所示的界面,都是通过显示单元1240来显示 的。显示单元1240可包括显示面板1241,可选的,可以采用液晶显示器(Liquid Crystal Display,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板1241。进一步的,触控面板1231可覆盖显示面板1241,当触控面板1231检测到在其上或附近的触摸操作后,传送给处理器1280以确定触摸事件的类型,随后处理器1280根据触摸事件的类型在显示面板1241上提供相应的视觉输出。虽然在图12中,触控面板1231与显示面板1241是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板1231与显示面板1241集成而实现手机的输入和输出功能。The display unit 1240 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone. 4(a)-4(p), the interfaces shown in FIGS. 6(a)-6(d) are all displayed by the display unit 1240. of. The display unit 1240 can include a display panel 1241. Alternatively, the display panel 1241 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like. Further, the touch panel 1231 may cover the display panel 1241. After the touch panel 1231 detects a touch operation on or near the touch panel 1231, the touch panel 1231 transmits to the processor 1280 to determine the type of the touch event, and then the processor 1280 according to the touch event. The type provides a corresponding visual output on display panel 1241. Although in FIG. 12, the touch panel 1231 and the display panel 1241 are used as two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 1231 and the display panel 1241 may be integrated. Realize the input and output functions of the phone.
音频电路1260、扬声器1261,传声器1262可提供用户与手机之间的音频接口。如图4(e)、图4(f)所示、图4(i)、图4(j)所示、图4(m)、图4(n)所示,可以通过音频电路1260,来向用户提示伪基站的指示信息。音频电路1260可将接收到的音频数据转换后的电信号,传输到扬声器1261,由扬声器1261转换为声音信号输出;另一方面,传声器1262将收集的声音信号转换为电信号,由音频电路1260接收后转换为音频数据,再将音频数据输出处理器1280处理后,经RF电路1211以发送给比如另一手机,或者将音频数据输出至存储器1220以便进一步处理。 Audio circuit 1260, speaker 1261, and microphone 1262 can provide an audio interface between the user and the handset. 4(e), 4(f), 4(i), 4(j), 4(m), and 4(n), the audio circuit 1260 can be used. The user is prompted with the indication information of the pseudo base station. The audio circuit 1260 can transmit the converted electrical data of the received audio data to the speaker 1261, and convert it into a sound signal output by the speaker 1261; on the other hand, the microphone 1262 converts the collected sound signal into an electrical signal, by the audio circuit 1260. After receiving, it is converted into audio data, and then processed by the audio data output processor 1280, sent to, for example, another mobile phone via the RF circuit 1211, or outputted to the memory 1220 for further processing.
手机还可包括至少一种传感器1250,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板1241的亮度,接近传感器可在手机移动到耳边时,关闭显示面板1241和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The handset can also include at least one type of sensor 1250, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1241 according to the brightness of the ambient light, and the proximity sensor may close the display panel 1241 and/or when the mobile phone moves to the ear. Or backlight. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity. It can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
WiFi属于短距离无线传输技术,手机通过WiFi模块1212可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图12示出了WiFi模块1212,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变申请的本质的范围内而省略。WiFi is a short-range wireless transmission technology. The mobile phone can help users to send and receive emails, browse web pages and access streaming media through the WiFi module 1212. It provides users with wireless broadband Internet access. Although FIG. 12 shows the WiFi module 1212, it can be understood that it does not belong to the essential configuration of the mobile phone, and can be omitted as needed within the scope of not changing the essence of the application.
手机还包括给各个部件供电的电源1290(比如电池),优选的,电源可以通过电源管理系统与处理器1280逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The handset also includes a power source 1290 (such as a battery) that supplies power to the various components. Preferably, the power source can be logically coupled to the processor 1280 via a power management system to manage functions such as charging, discharging, and power management through the power management system.
尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown, the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
上述实施例中由终端所执行的步骤可以基于该图12所示的终端结构。The steps performed by the terminal in the above embodiment may be based on the terminal structure shown in FIG.
可选的,在本申请的一些实施例中,所述事件的信息包括所述终端标识、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。Optionally, in some embodiments of the present application, the information about the event includes the terminal identifier, location information of the terminal, information about a base station accessed when the event occurs, and a time when the event occurs.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
所述输入单元1230,还用于接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;The input unit 1230 is further configured to receive feedback information, where the feedback information is input information input by the user that is accurate when the base station that is accessed by the terminal when the event occurs is a pseudo base station;
所述射频电路1211,还用于向所述服务器发送所述反馈信息,所述反馈信息用于所述 服务器对所述伪基站的可疑概率进行修改。The radio frequency circuit 1211 is further configured to send the feedback information to the server, where the feedback information is used by the The server modifies the suspicious probability of the pseudo base station.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
所述显示单元1240,还用于通过文字显示所述伪基站的指示信息。The display unit 1240 is further configured to display indication information of the pseudo base station by text.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
所述显示单元1240,还用于通过危险标识显示所述伪基站的指示信息。The display unit 1240 is further configured to display indication information of the pseudo base station by using a hazard identifier.
可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,
所述音频电路1260,还用于通过语音提示所述伪基站的指示信息。The audio circuit 1260 is further configured to prompt the indication information of the pseudo base station by voice.
可选的,在本申请的一些实施例中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: a content of the short message and/or a number of the incoming call.
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device. The computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.). The computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media. The usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).
可选的,在本申请的一些实施例中,提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如服务器在上述图3、图5、图7或图8所示的方法,其相同或相应的技术特征可援引在本实施例中。Optionally, in some embodiments of the present application, a computer program product comprising instructions, when run on a computer, causes the computer to perform as the server is in FIG. 3, FIG. 5, FIG. 7, or FIG. 8 above. The method shown, its same or corresponding technical features can be cited in this embodiment.
可选的,在本申请的一些实施例中,提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如终端在上述图3、图5、图7或图8所示的方法,其相同或相应的技术特征可援引在本实施例中。Optionally, in some embodiments of the present application, a computer program product comprising instructions, when executed on a computer, causes the computer to perform, for example, the terminal in FIG. 3, FIG. 5, FIG. 7, or FIG. The method shown, its same or corresponding technical features can be cited in this embodiment.
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”、“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。 The terms "first", "second", "third", "fourth", etc. (if present) in the specification and claims of the present application and the above figures are used to distinguish similar objects without having to use To describe a specific order or order. It is to be understood that the data so used may be interchanged where appropriate so that the embodiments described herein can be implemented in a sequence other than what is illustrated or described herein. In addition, the terms "comprises" and "comprises" and "the" and "the" are intended to cover a non-exclusive inclusion, for example, a process, method, system, product, or device that comprises a series of steps or units is not necessarily limited to Those steps or units may include other steps or units not explicitly listed or inherent to such processes, methods, products or devices.

Claims (32)

  1. 一种提示方法,其特征在于,包括:A prompting method, comprising:
    服务器接收多个终端发送的事件的信息;The server receives information of events sent by multiple terminals;
    所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。The server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:
    所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;Determining, by the server, the target terminal that accesses the pseudo base station among the multiple terminals according to the information of the real base station and the information of the pseudo base station;
    所述服务器向所述目标终端发送伪基站的指示信息。The server sends indication information of the pseudo base station to the target terminal.
  3. 根据权利要求1或2所述的方法,其特征在于,所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息,包括:The method according to claim 1 or 2, wherein the server acquires information of the real base station according to the information of the event sent by the multiple terminals, including:
    所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;Determining, according to the location information of the terminal that is sent by the multiple terminals, the information of the base station that is accessed when the event occurs, the time when the event occurs, and the preset location calculation accuracy, determining the longitude, latitude, and date. Information of the initial base station;
    所述服务器从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;The server deletes, from the information about the initial base station of the longitude, latitude, and date, the information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold;
    所述服务器去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;The server removes the date, and the information of other initial base stations are combined to obtain information about the longitude and latitude screening base stations;
    所述服务器确定所述筛选基站的信息为真实基站的信息。The server determines that the information of the screening base station is information of a real base station.
  4. 根据权利要求1或2所述的方法,其特征在于,所述服务器根据所述多个终端发送的事件的信息,获取伪基站的信息,包括:The method according to claim 1 or 2, wherein the server acquires the information of the pseudo base station according to the information of the event sent by the multiple terminals, including:
    所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;Determining, by the server, location information of the terminal that the target base station accesses at the first time according to the location information of the terminal that is sent by the multiple terminals, the information of the base station that is accessed when the event occurs, and the time when the event occurs. The location information of the terminal accessed at the second time, where the target base station is any base station that is accessed when the multiple terminals generate the event;
    所述服务器根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;The server calculates a first central location of the accessed terminal according to the location information of the terminal accessed by the target base station at the first time, and calculates the location information of the terminal accessed by the target base station at the second time. a second central location of the terminal that is accessed;
    所述服务器确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;Determining, by the server, that the first central location is a first location of the target base station, and determining that the second central location is a second location of the target base station;
    若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述服务器确定所述目标基站的信息为伪基站的信息。And if the absolute value of the difference between the first location and the second location is greater than a second threshold, the server determines that the information of the target base station is information of a pseudo base station.
  5. 根据权利要求1-4任一所述的方法,其特征在于,所述方法还包括:The method according to any one of claims 1 to 4, wherein the method further comprises:
    所述服务器标记所述真实基站和所述伪基站的可疑概率;The server marking a suspicious probability of the real base station and the pseudo base station;
    所述服务器接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;The server receives the feedback information sent by the first target terminal, where the feedback information is input information that is input by the user, whether the base station accessed by the first target terminal when the event occurs is a pseudo base station;
    所述服务器根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率。 The server correspondingly modifies the suspicious probability of the pseudo base station according to the feedback information, and obtains a modified suspicious probability of the pseudo base station.
  6. 一种提示方法,其特征在于,包括:A prompting method, comprising:
    终端检测事件发生并采集所述事件的信息;The terminal detects an event occurrence and collects information of the event;
    所述终端向服务器发送所述事件的信息;Sending, by the terminal, information about the event to a server;
    所述终端接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的;The terminal receives the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event;
    所述终端提示所述伪基站的指示信息。The terminal prompts the indication information of the pseudo base station.
  7. 根据权利要求6所述的方法,其特征在于,所述方法还包括:The method of claim 6 wherein the method further comprises:
    所述终端接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;The terminal receives the feedback information, where the feedback information is input information that is input by the user, whether the base station accessed by the terminal when the event occurs is a pseudo base station, is accurate;
    所述终端向所述服务器发送所述反馈信息,所述反馈信息用于所述服务器对所述伪基站的可疑概率进行修改。The terminal sends the feedback information to the server, where the feedback information is used by the server to modify the suspicious probability of the pseudo base station.
  8. 根据权利要求6或7所述的方法,其特征在于,所述终端提示所述伪基站的指示信息,包括:The method according to claim 6 or 7, wherein the terminal prompts the indication information of the pseudo base station, including:
    所述终端通过文字显示所述伪基站的指示信息。The terminal displays the indication information of the pseudo base station by text.
  9. 根据权利要求6或7所述的方法,其特征在于,所述终端提示所述伪基站的指示信息,包括:The method according to claim 6 or 7, wherein the terminal prompts the indication information of the pseudo base station, including:
    所述终端通过危险标识显示所述伪基站的指示信息。The terminal displays the indication information of the pseudo base station by using a hazard identifier.
  10. 根据权利要求6或7所述的方法,其特征在于,所述终端提示所述伪基站的指示信息,包括:The method according to claim 6 or 7, wherein the terminal prompts the indication information of the pseudo base station, including:
    所述终端通过语音提示所述伪基站的指示信息。The terminal prompts the indication information of the pseudo base station by voice.
  11. 一种服务器,其特征在于,包括:A server, comprising:
    接收模块,用于接收多个终端发送的事件的信息;a receiving module, configured to receive information about events sent by multiple terminals;
    获取模块,用于根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。And an acquiring module, configured to acquire information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  12. 根据权利要求11所述的服务器,其特征在于,所述服务器还包括:The server according to claim 11, wherein the server further comprises:
    确定模块,用于根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;a determining module, configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals;
    发送模块,用于向所述目标终端发送伪基站的指示信息。And a sending module, configured to send, to the target terminal, indication information of the pseudo base station.
  13. 根据权利要求11或12所述的服务器,其特征在于,所述获取模块,具体用于:The server according to claim 11 or 12, wherein the obtaining module is specifically configured to:
    根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;Determining an initial base station regarding longitude, latitude, and date according to location information of the terminal transmitted by the plurality of terminals, information of a base station accessed when the event occurs, a time when the event occurs, and preset position calculation accuracy Information;
    从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;Deleting, from the information about the initial base station of the longitude, latitude, and date, information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold;
    去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;The date is removed, and information of other initial base stations is combined to obtain information about screening base stations for longitude and latitude;
    确定所述筛选基站的信息为真实基站的信息。 Determining that the information of the screening base station is information of a real base station.
  14. 根据权利要求11或12所述的服务器,其特征在于,所述获取模块,具体还用于:The server according to claim 11 or 12, wherein the obtaining module is further configured to:
    根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;Determining location information and a second time of the terminal accessed by the target base station at the first time according to the location information of the terminal that is sent by the multiple terminals, the information of the base station that is accessed when the event occurs, and the time when the event occurs. Location information of the accessed terminal, where the target base station is any base station that is accessed when the multiple terminals generate the event;
    根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;Calculating the first central location of the accessed terminal according to the location information of the terminal accessed by the target base station at the first time, and calculating the access according to the location information of the terminal accessed by the target base station at the second time The second central location of the terminal;
    确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;Determining that the first central location is a first location of the target base station, and determining that the second central location is a second location of the target base station;
    若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述获取模块确定所述目标基站的信息为伪基站的信息。And if the absolute value of the difference between the first location and the second location is greater than a second threshold, the acquiring module determines that the information of the target base station is information of a pseudo base station.
  15. 根据权利要求11-14任一所述的服务器,其特征在于,所述服务器还包括:The server according to any one of claims 11-14, wherein the server further comprises:
    标记模块,用于标记所述真实基站和所述伪基站的可疑概率;a marking module, configured to mark a suspicious probability of the real base station and the pseudo base station;
    所述接收模块,还用于接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;The receiving module is further configured to receive feedback information sent by the first target terminal, where the feedback information is that the indication information that the base station that the user accesses when the event occurs when the first target terminal is the pseudo base station is accurate. Input information;
    修改模块,用于根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率。And a modifying module, configured to modify a suspicious probability of the pseudo base station according to the feedback information, to obtain a modified suspicious probability of the pseudo base station.
  16. 一种终端,其特征在于,包括:A terminal, comprising:
    采集模块,用于检测事件发生并采集所述事件的信息;An acquisition module, configured to detect an event occurrence and collect information about the event;
    发送模块,用于向服务器发送所述事件的信息;a sending module, configured to send information about the event to a server;
    接收模块,用于接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的;a receiving module, configured to receive indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event;
    提示模块,用于提示所述伪基站的指示信息。And a prompting module, configured to prompt the indication information of the pseudo base station.
  17. 根据权利要求16所述的终端,其特征在于,The terminal of claim 16 wherein:
    所述接收模块,还用于接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;The receiving module is further configured to receive feedback information, where the feedback information is input information that is input by the user to determine whether the base station that is accessed by the terminal when the event occurs is a pseudo base station is accurate;
    所述发送模块,还用于向所述服务器发送所述反馈信息,所述反馈信息用于所述服务器对所述伪基站的可疑概率进行修改。The sending module is further configured to send the feedback information to the server, where the feedback information is used by the server to modify a suspicious probability of the pseudo base station.
  18. 根据权利要求16或17所述的终端,其特征在于,The terminal according to claim 16 or 17, wherein
    所述提示模块,具体用于通过文字显示所述伪基站的指示信息。The prompting module is specifically configured to display indication information of the pseudo base station by text.
  19. 根据权利要求16或17所述的终端,其特征在于,The terminal according to claim 16 or 17, wherein
    所述提示模块,具体用于通过危险标识显示所述伪基站的指示信息。The prompting module is specifically configured to display indication information of the pseudo base station by using a hazard identifier.
  20. 根据权利要求16或17所述的终端,其特征在于,The terminal according to claim 16 or 17, wherein
    所述提示模块,具体用于通过语音提示所述伪基站的指示信息。The prompting module is specifically configured to prompt the indication information of the pseudo base station by voice.
  21. 一种服务器,其特征在于,包括:A server, comprising:
    收发器,处理器,存储器和总线,所述收发器、所述处理器和所述存储器通过所述总 线连接;a transceiver, a processor, a memory and a bus, the transceiver, the processor and the memory passing the total Line connection
    所述存储器,用于存储操作指令;The memory is configured to store an operation instruction;
    所述收发器,用于接收多个终端发送的事件的信息;The transceiver is configured to receive information about events sent by multiple terminals;
    所述处理器,用于调用所述操作指令,根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。The processor is configured to invoke the operation instruction, and acquire information of a real base station and information of a pseudo base station according to information of an event sent by the multiple terminals.
  22. 根据权利要求21所述的服务器,其特征在于,The server according to claim 21, wherein
    所述处理器,还用于根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;The processor is further configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals;
    所述收发器,还用于向所述目标终端发送伪基站的指示信息。The transceiver is further configured to send indication information of the pseudo base station to the target terminal.
  23. 根据权利要求21或22所述的服务器,其特征在于,所述处理器具体用于执行以下步骤:The server according to claim 21 or 22, wherein the processor is specifically configured to perform the following steps:
    根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;Determining an initial base station regarding longitude, latitude, and date according to location information of the terminal transmitted by the plurality of terminals, information of a base station accessed when the event occurs, a time when the event occurs, and preset position calculation accuracy Information;
    从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;Deleting, from the information about the initial base station of the longitude, latitude, and date, information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold;
    去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;The date is removed, and information of other initial base stations is combined to obtain information about screening base stations for longitude and latitude;
    确定所述筛选基站的信息为真实基站的信息。Determining that the information of the screening base station is information of a real base station.
  24. 根据权利要求21或22所述的服务器,其特征在于,所述处理器具体用于执行以下步骤:The server according to claim 21 or 22, wherein the processor is specifically configured to perform the following steps:
    根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;Determining location information and a second time of the terminal accessed by the target base station at the first time according to the location information of the terminal that is sent by the multiple terminals, the information of the base station that is accessed when the event occurs, and the time when the event occurs. Location information of the accessed terminal, where the target base station is any base station that is accessed when the multiple terminals generate the event;
    根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;Calculating the first central location of the accessed terminal according to the location information of the terminal accessed by the target base station at the first time, and calculating the access according to the location information of the terminal accessed by the target base station at the second time The second central location of the terminal;
    确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;Determining that the first central location is a first location of the target base station, and determining that the second central location is a second location of the target base station;
    若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述处理器确定所述目标基站的信息为伪基站的信息。And if the absolute value of the difference between the first location and the second location is greater than a second threshold, the processor determines that the information of the target base station is information of a pseudo base station.
  25. 根据权利要求21-24任一所述的服务器,其特征在于,所述处理器还用于执行以下步骤:The server according to any one of claims 21-24, wherein the processor is further configured to perform the following steps:
    标记所述真实基站和所述伪基站的可疑概率;Marking a suspicious probability of the real base station and the pseudo base station;
    根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率;Determining the suspicious probability of the pseudo base station according to the feedback information, and obtaining a modified suspicious probability of the pseudo base station;
    所述收发器还用于执行以下步骤: The transceiver is also configured to perform the following steps:
    接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息。The feedback information sent by the first target terminal is received, and the feedback information is input information input by the user whether the indication information that the base station accessed by the first target terminal is the pseudo base station is accurate.
  26. 一种终端,其特征在于,包括:A terminal, comprising:
    处理器,通信接口,存储器,输出单元和总线,所述处理器、所述通信接口、所述输出单元和所述存储器通过所述总线连接;a processor, a communication interface, a memory, an output unit, and a bus, wherein the processor, the communication interface, the output unit, and the memory are connected by the bus;
    所述存储器,用于存储操作指令;The memory is configured to store an operation instruction;
    所述处理器,用于调用所述操作指令,检测事件发生并采集所述事件的信息;The processor is configured to invoke the operation instruction, detect an event occurrence, and collect information about the event;
    所述通信接口,用于向服务器发送所述事件的信息;接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的;The communication interface is configured to send the information of the event to the server, and receive the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event;
    所述输出单元,用于提示所述伪基站的指示信息。The output unit is configured to prompt indication information of the pseudo base station.
  27. 根据权利要求26所述的终端,其特征在于,所述终端还包括输入单元,The terminal according to claim 26, wherein the terminal further comprises an input unit,
    所述输入单元,还用于接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;The input unit is further configured to receive feedback information, where the feedback information is input information input by the user that is accurate when the base station that is accessed by the terminal when the event occurs is a pseudo base station;
    所述通信接口,还用于向所述服务器发送所述反馈信息,所述反馈信息用于所述服务器对所述伪基站的可疑概率进行修改。The communication interface is further configured to send the feedback information to the server, where the feedback information is used by the server to modify a suspicious probability of the pseudo base station.
  28. 根据权利要求26或27所述的终端,其特征在于,所述输出单元包括显示单元,The terminal according to claim 26 or 27, wherein the output unit comprises a display unit,
    所述显示单元,用于通过文字显示所述伪基站的指示信息。The display unit is configured to display indication information of the pseudo base station by text.
  29. 根据权利要求26或27所述的终端,其特征在于,所述输出单元包括显示单元,The terminal according to claim 26 or 27, wherein the output unit comprises a display unit,
    所述显示单元,用于通过危险标识显示所述伪基站的指示信息。The display unit is configured to display indication information of the pseudo base station by using a hazard identifier.
  30. 根据权利要求26或27所述的终端,其特征在于,所述输出单元包括音频电路,A terminal according to claim 26 or 27, wherein said output unit comprises an audio circuit,
    所述音频电路,用于通过语音提示所述伪基站的指示信息。The audio circuit is configured to prompt the indication information of the pseudo base station by voice.
  31. 一种计算机可读存储介质,包括指令,当其在计算机上运行时,使得计算机执行如权利要求1-17任意一项所述的方法。A computer readable storage medium comprising instructions which, when executed on a computer, cause the computer to perform the method of any of claims 1-17.
  32. 一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如权利要求1-17任意一项所述的方法。 A computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any of claims 1-17.
PCT/CN2017/086643 2017-01-22 2017-05-31 Prompting method, terminal, and server WO2018133284A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201780005192.7A CN108513717B (en) 2017-01-22 2017-05-31 Prompting method, terminal and server

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710052278 2017-01-22
CN201710052278.7 2017-01-22

Publications (1)

Publication Number Publication Date
WO2018133284A1 true WO2018133284A1 (en) 2018-07-26

Family

ID=62907654

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/086643 WO2018133284A1 (en) 2017-01-22 2017-05-31 Prompting method, terminal, and server

Country Status (2)

Country Link
CN (1) CN108513717B (en)
WO (1) WO2018133284A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124698A (en) * 2018-10-30 2020-05-08 北京奇虎科技有限公司 Communication event identification method and device, electronic equipment and readable storage medium

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213724B (en) * 2019-05-17 2020-10-20 国家计算机网络与信息安全管理中心 Pseudo base station motion trajectory identification method
CN111582679B (en) * 2020-04-24 2023-04-18 腾讯科技(成都)有限公司 Processing method, device and equipment for application service partition and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430653A (en) * 2014-09-19 2016-03-23 中国电信股份有限公司 Pseudo base station discovery method and system
CN105744527A (en) * 2016-03-28 2016-07-06 河海大学 Pseudo base station detection method and system based on big data and cloud computing
CN105764059A (en) * 2014-12-15 2016-07-13 北京新讯世纪信息技术有限公司 Method for identifying pseudo base station based on terminal position information
US20160381545A1 (en) * 2015-06-26 2016-12-29 Futurewei Technologies, Inc. System and Method for Faked Base Station Detection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430653A (en) * 2014-09-19 2016-03-23 中国电信股份有限公司 Pseudo base station discovery method and system
CN105764059A (en) * 2014-12-15 2016-07-13 北京新讯世纪信息技术有限公司 Method for identifying pseudo base station based on terminal position information
US20160381545A1 (en) * 2015-06-26 2016-12-29 Futurewei Technologies, Inc. System and Method for Faked Base Station Detection
CN105744527A (en) * 2016-03-28 2016-07-06 河海大学 Pseudo base station detection method and system based on big data and cloud computing

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124698A (en) * 2018-10-30 2020-05-08 北京奇虎科技有限公司 Communication event identification method and device, electronic equipment and readable storage medium

Also Published As

Publication number Publication date
CN108513717B (en) 2020-09-04
CN108513717A (en) 2018-09-07

Similar Documents

Publication Publication Date Title
CN107480533B (en) Vulnerability repairing method and device and storage medium
WO2016134630A1 (en) Method and device for recognizing malicious call
CN108712561B (en) Authority management method, device, mobile terminal and storage medium
WO2018177425A1 (en) Rescue request method, device and system
US20170316781A1 (en) Remote electronic service requesting and processing method, server, and terminal
US10678942B2 (en) Information processing method and related products
CN107506646B (en) Malicious application detection method and device and computer readable storage medium
US20170353593A1 (en) Communication event processing method and apparatus
CN108235308B (en) Data reporting method and device, mobile terminal and computer readable medium
WO2020077485A1 (en) Geo-fence updating method, and communication device
WO2018133284A1 (en) Prompting method, terminal, and server
CN109428871B (en) Defense strategy determination method and device
CN108322897B (en) Card package meal combination method and device
CN105740715A (en) Safety assessment method and terminal equipment
US20160308879A1 (en) Application-Based Service Providing Method, Apparatus, and System
CN109275146A (en) A kind of pseudo-base station detection method, terminal and computer readable storage medium
CN106020945B (en) Shortcut item adding method and device
CN113485899A (en) Information processing method, terminal device and storage medium
CN108171000B (en) Method and device for early warning of water damage disasters of oil and gas pipelines
CN109041212B (en) Positioning method and wearable device
CN106685796B (en) A kind of information identifying method, device and system
CN110908586A (en) Keyboard display method and device and terminal equipment
CN109548028B (en) Base station type identification method, device, terminal and computer readable storage medium
CN108959960B (en) Method, device and computer readable storage medium for preventing privacy disclosure
CN111901740B (en) Data processing method, device and equipment

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17893192

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17893192

Country of ref document: EP

Kind code of ref document: A1