CN110166635A - Suspicious terminal identification method and suspicious terminal recognition system - Google Patents

Suspicious terminal identification method and suspicious terminal recognition system Download PDF

Info

Publication number
CN110166635A
CN110166635A CN201910623219.XA CN201910623219A CN110166635A CN 110166635 A CN110166635 A CN 110166635A CN 201910623219 A CN201910623219 A CN 201910623219A CN 110166635 A CN110166635 A CN 110166635A
Authority
CN
China
Prior art keywords
terminal
suspicious
mobile terminals
mobile terminal
mobile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910623219.XA
Other languages
Chinese (zh)
Other versions
CN110166635B (en
Inventor
袁晓静
翟京卿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201910623219.XA priority Critical patent/CN110166635B/en
Publication of CN110166635A publication Critical patent/CN110166635A/en
Application granted granted Critical
Publication of CN110166635B publication Critical patent/CN110166635B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2218Call detail recording
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/36Statistical metering, e.g. recording occasions when traffic exceeds capacity of trunks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42025Calling or Called party identification service
    • H04M3/42034Calling party identification service
    • H04M3/42042Notifying the called party of information on the calling party
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42348Location-based services which utilize the location information of a target
    • H04M3/42357Location-based services which utilize the location information of a target where the information is provided to a monitoring entity such as a potential calling party or a call processing server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it
    • H04M3/4365Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it based on information specified by the calling party, e.g. priority or subject
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Telephonic Communication Services (AREA)
  • Telephone Function (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Present disclose provides a kind of suspicious terminal identification methods and suspicious terminal recognition system, comprising: obtains the user behavior characteristics data of multiple mobile terminals;For every any two mobile terminal in multiple mobile terminals, according to the user behavior characteristics data of two mobile terminals, identify whether two mobile terminals have friendly relation;The message registration information of two mobile terminals is obtained, and it is suspicious come electrical feature according to message registration information to judge whether two mobile terminals are provided with;When judge two mobile terminals be provided with it is suspicious come electrical feature when, determine the resident position of two mobile terminals, and obtain position attribution corresponding to resident position;Judge whether position attribution is one of predetermined attribute set;If so, identifying that two mobile terminals are suspicious terminal.The technical solution of the disclosure can realize agency, promote, financing, and the harassing call of the industries such as education is identified and marked, and facilitate user and obtain before receiving calls mutually, it should be mentioned that promoting call experience.

Description

Suspicious terminal identification method and suspicious terminal recognition system
Technical field
This disclosure relates to mobile communication technology field, in particular to a kind of suspicious terminal identification method and suspicious terminal recognition System.
Background technique
While Internet era brings various convenient to people's lives, many security risks are also brought, people's Data and contact method are largely leaked, and in daily life, we are often connected to various harassing calls, existing Identification technology needs user or client that actively harassing call is marked mostly, brings inconvenience to users, partially uses Family cannot get prior early warning before receiving calls, reduce call experience.
Summary of the invention
The disclosure aims to solve at least one of the technical problems existing in the prior art, proposes a kind of suspicious terminal recognition Method and suspicious terminal recognition system.
To achieve the above object, the embodiment of the present disclosure provides a kind of suspicious terminal identification method, comprising:
Obtain the user behavior characteristics data of multiple mobile terminals;
For every any two mobile terminal in the multiple mobile terminal, according to the use of two mobile terminals Family behavioural characteristic data, identify whether two mobile terminals have friendly relation;Wherein, tool friendly two is identified A mobile terminal constitutes a good friend couple;
For each good friend couple, it is performed both by following step:
The good friend is obtained to the message registration information for two mobile terminals for being included, and according to the message registration information Judge two mobile terminals whether be provided with it is suspicious come electrical feature;
When judge two mobile terminals be provided with it is suspicious come electrical feature when, determine the resident of two mobile terminals Position, and obtain position attribution corresponding to the resident position;
Judge whether the position attribution is one of predetermined attribute set;If so, identifying this two movements eventually End is suspicious terminal.
In some embodiments, it is described identify the step of two terminals are suspicious terminal after, further includes:
Two mobile terminals are carried out using the position attribution of the resident position of two mobile terminals Label.
In some embodiments, it is described identify the step of two mobile terminals are suspicious terminal after, also wrap It includes:
Using the resident position of two mobile terminals as suspected locations, determination entered and left the suspected locations Other mobile terminals, using as destination mobile terminal;
For each destination mobile terminal, the target is judged according to the user behavior characteristics data of the destination mobile terminal Whether mobile terminal is suspicious terminal.
In some embodiments, the user behavior characteristics data include: the real-time position information of mobile terminal;
The user behavior characteristics data according to the destination mobile terminal judge whether the destination mobile terminal is suspicious The step of terminal, specifically includes:
According to the real-time position information of the destination mobile terminal, obtaining the destination mobile terminal can position doubtful described in The total duration set;
Judge whether the total duration is greater than scheduled duration threshold value;If so, judging that the destination mobile terminal is suspicious Terminal.
In some embodiments, further includes:
Position attribution corresponding to the suspicious terminal and telephone number are sent to suspicious call processing system.
To achieve the above object, the embodiment of the present disclosure provides a kind of suspicious terminal recognition system, comprising:
First obtains module, for obtaining the user behavior characteristics data of multiple mobile terminals;
First identification module, for for every any two mobile terminal in the multiple mobile terminal, according to this two The user behavior characteristics data of a mobile terminal, identify whether two mobile terminals have friendly relation;Wherein, it identifies It provides friendly two mobile terminals and constitutes a good friend couple;
Second obtains module, for being directed to each good friend couple, obtains the good friend to two mobile terminals for being included Message registration information, and it is suspicious come electrical feature according to the message registration information to judge whether two mobile terminals are provided with;
First determining module, for when judge two mobile terminals be provided with it is suspicious come electrical feature when, determine this The resident position of two mobile terminals, and obtain position attribution corresponding to the resident position;
First judgment module, for judging whether the position attribution is one of predetermined attribute set;
Second identification module, for judging that the position attribution is one in predetermined attribute set when first judgment module When person, identify that two mobile terminals are suspicious terminal.
In some embodiments, suspicious terminal recognition system further include:
Mark module, for making when second identification module identifies that two mobile terminals are suspicious terminal Two mobile terminals are marked with the position attribution of the resident position of two mobile terminals.
In some embodiments, suspicious terminal recognition system further include:
Second determining module, for identifying that two mobile terminals are suspicious terminal in second identification module When, using the resident position of two mobile terminals as suspected locations, determine other for entering and leaving the suspected locations Mobile terminal, using as destination mobile terminal;
Second judgment module, for being directed to each destination mobile terminal, according to the user behavior of the destination mobile terminal Characteristic judges whether the destination mobile terminal is suspicious terminal.
In some embodiments, the user behavior characteristics data include: the real-time position information of mobile terminal;
Second judgment module includes:
Acquiring unit obtains the destination mobile terminal for the real-time position information according to the destination mobile terminal Positioned at the total duration of the suspected locations;
Judging unit, for judging whether the total duration is greater than scheduled duration threshold value;If so, judging that the target is moved Dynamic terminal is suspicious terminal.
In some embodiments, suspicious terminal recognition system further include:
Sending module, for inciting somebody to action when second identification module identifies that two mobile terminals are suspicious terminal Position attribution corresponding to the suspicious terminal and telephone number are sent to suspicious call processing system.
The suspicious terminal identification method and suspicious terminal recognition system that the embodiment of the present disclosure provides can be realized by being joined The identification of dynamic property is had to judge the friendly relation between mobile terminal using message registration information and the judgement of permanent residence position attribution Whether the mobile terminal of friendly relation is suspicious terminal, while can be more suspicious according to the permanent residence position mark of suspicious terminal Suspicious end message is sent to suspicious call processing system by terminal, and realization provides early warning before user receives calls.
Detailed description of the invention
Fig. 1 is a kind of flow chart for suspicious terminal identification method that the embodiment of the present disclosure provides;
Fig. 2 is the flow chart for the suspicious terminal identification method of another kind that the embodiment of the present disclosure provides;
Fig. 3 is the flow chart for another suspicious terminal identification method that the embodiment of the present disclosure provides;
Fig. 4 is a kind of specific implementation method flow chart of embodiment of the present disclosure step S9;
Fig. 5 is the flow chart for another suspicious terminal identification method that the embodiment of the present disclosure provides;
Fig. 6 is a kind of structural block diagram for suspicious terminal recognition system that the embodiment of the present disclosure provides.
Specific embodiment
To make those skilled in the art more fully understand the technical solution of the disclosure, the disclosure is mentioned with reference to the accompanying drawing A kind of suspicious terminal identification method and suspicious terminal recognition system supplied is described in detail.
Suspicious terminal identification method provided by the disclosure and suspicious terminal recognition system can be used for according between mobile terminal Friendly relation and message registration information judge mobile terminal whether have it is suspicious come electrical feature, according to resident position determine should Whether mobile terminal is suspicious terminal, and clear attribute type, to identification and mark suspicious terminal.
Fig. 1 is a kind of flow chart for suspicious terminal identification method that the embodiment of the present disclosure provides.
As shown in Figure 1, the suspicious terminal identification method includes:
Step S1, the user behavior characteristics data of multiple mobile terminals are obtained.
In practical applications, user behavior characteristics data are obtained from user behavior characteristics library, user behavior characteristics data It include: flow service condition, software service condition, business datum, user data and location information etc..
Step S2, for every any two mobile terminal in multiple mobile terminals, according to the use of two mobile terminals Family behavioural characteristic data, identify whether two mobile terminals have friendly relation.
Wherein, identify that friendly two mobile terminals of tool constitute a good friend couple.Whether two mobile terminals Whether the user with friendly relation i.e. two mobile terminal is friendly relation.
In practical applications, by taking Peer Relationships as an example, if the user of two mobile terminals is Peer Relationships, he Will be interosculated using the time and position and cell phone software service condition of mobile terminal, then be identified as Peer Relationships Foundation include: that two mobile terminals enter and leave the number in same place and the time reaches certain threshold value, or meet similar two The cell phone software interaction scenario of a user wechat good friend each other.
For each good friend couple, it is performed both by following step S3~step S6 process:
Step S3, the message registration information of two mobile terminals is obtained, and judges this two according to message registration information Mobile terminal whether be provided with it is suspicious come electrical feature.
In step s3, which is a good friend couple.When judging that two mobile terminals are unsatisfactory for Have it is suspicious come electrical feature when, complete identification to two mobile terminals, that is, complete the identification of current good friend couple, it is subsequent can needle To next good friend to progress step S3 again;When judge two mobile terminals be provided with it is suspicious come electrical feature when, execute Step S4.
In practical applications, it is suspicious come electrical feature specifically can behave as: outbound calling frequency is big within a certain fixed period In preset frequency threshold value, and in the period, average call duration is less than scheduled duration threshold value.
Step S4, it determines the resident position of two mobile terminals, and obtains position corresponding to resident position Attribute.
In practical applications, position coordinates corresponding to the resident position of two mobile terminals are mapped to actual In geographical map, the corresponding building in the geographical location or office space are obtained, and obtains position attribution corresponding to resident position (such as the industries such as insurance, intermediary, distribution, financing, education attribute).The resident position be have it is suspicious come electrical feature movement The place that terminal is often made a phone call.
Step S5, judge whether position attribution is one of predetermined attribute set.
In practical applications, predetermined attribute set includes: the industries attribute such as intermediary, distribution, financing, education;It needs to illustrate , the position attribution that predetermined attribute set is included can be preset and be adjusted according to actual needs.
In step s 5, if the determination result is YES, S6 is thened follow the steps;If judging result be it is no, complete to this two The identification of mobile terminal.
Step S6, identify that two mobile terminals are suspicious terminal.
In practical applications, when have it is suspicious come electrical feature mobile terminal resident position be possible be disturbed by dialing When disturbing phone to reach the mechanism of marketing purpose, then identify that the mobile terminal is suspicious terminal.
The embodiment of the present disclosure provides a kind of suspicious terminal identification method, and this method can be used for by between mobile terminal Friendly relation carry out judgement construction good friend couple, judge two of good friend's centering using message registration information and permanent residence position attribution Whether mobile terminal is suspicious terminal.
Fig. 2 is the flow chart for the suspicious terminal identification method of another kind that the embodiment of the present disclosure provides.As shown in Fig. 2, this reality The suspicious terminal identification method for applying example offer not only includes above-mentioned steps S1~step S6, after step S6, further includes: step S7.Only step S7 is described in detail below.
Step S7, two mobile terminals are marked using the position attribution of the resident position of two mobile terminals Note.
In practical applications, suspicious terminal is marked, it can be achieved that it is subsequent suspicious terminal is monitored when, once Suspicious terminal outbound calling then sends the corresponding attribute label of suspicious terminal to corresponding callee, to have the function that prompting.
The embodiment of the present disclosure provides a kind of suspicious terminal identification method, and this method can be used for the mobile terminal identified Attribute label is carried out, harassing call called subscriber is reminded for subsequent.
Fig. 3 is the flow chart for another suspicious terminal identification method that the embodiment of the present disclosure provides.As shown in figure 3, this reality The suspicious terminal identification method for applying example offer not only includes above-mentioned steps S1~step S6, after step S6, further includes: step S8 and step S9.Only step S8 and step S9 are described in detail below.
Step S8, using the resident position of two mobile terminals as suspected locations, determination entered and left the suspected locations Other mobile terminals, using as destination mobile terminal.
Step S9, it is directed to each destination mobile terminal, is sentenced according to the user behavior characteristics data of the destination mobile terminal Whether the destination mobile terminal that breaks is suspicious terminal.
Fig. 4 is a kind of specific implementation method flow chart of embodiment of the present disclosure step S9.As shown in Figure 4, wherein Yong Huhang It is characterized the real-time position information that data include: mobile terminal.Step S9 is specifically included: step S901~step S904.
Step S901, according to the real-time position information of the destination mobile terminal, the destination mobile terminal is obtained positioned at suspicious The total duration of position.
Step S902, judge whether total duration is greater than scheduled duration threshold value.
If the determination result is YES, S903 is thened follow the steps;If judging result be it is no, then follow the steps S904.
Step S903, identify that the destination mobile terminal is suspicious terminal.
Step S904, identifying the destination mobile terminal not is suspicious terminal.
It in practical applications, can also be by sentencing using the information such as message registration information and resident position as judgment basis Whether the destination mobile terminal that breaks is suspicious terminal, and specific algorithm no longer illustrates one by one herein.
The embodiment of the present disclosure provides a kind of suspicious terminal identification method, and this method can be used for choosing by the identification of relevance Destination mobile terminal associated with fixed suspicious terminal is selected, and judges that destination mobile terminal is from specified conditions No is suspicious terminal, realizes the purpose for identifying a large amount of suspicious terminals.
Fig. 5 is the flow chart for another suspicious terminal identification method that the embodiment of the present disclosure provides.As shown in figure 5, this reality The suspicious terminal identification method for applying example offer not only includes above-mentioned steps S1~step S6, after step S6, further includes: step S10.Only step S10 is described in detail below.
Step S10, position attribution corresponding to suspicious terminal and telephone number are sent to suspicious call processing system.
In practical applications, suspicious call processing system is not only able to achieve the monitoring to suspicious terminal and record, at other When system inquires suspicious terminal, moreover it is possible to relevant information is sent, so that other systems use for reference recognition result.
It should be noted that can be combined with each other between different step in the various embodiments described above in the disclosure, to constitute New technical solution;Specifically, implement shown in the step S8 in step S7, Fig. 3 in embodiment illustrated in fig. 2 and step S9, Fig. 4 Any at least the two is combined in step S10 in example, and gained is combined with step S1~step S6 in embodiment illustrated in fig. 1 The technical solution arrived.
The embodiment of the present disclosure provides a kind of suspicious terminal identification method, and this method can be used for judging the friend between mobile terminal Good relationship judges whether the friendly mobile terminal of tool is suspicious end using message registration information and permanent residence position attribution End, is finally sent to suspicious call processing system for suspicious end message, to realize the early warning before user receives calls.
Fig. 6 is a kind of structural block diagram for suspicious terminal recognition system that the embodiment of the present disclosure provides.As shown in fig. 6, this can Doubting terminal recognition system can be used for realizing suspicious terminal identification method provided by the various embodiments described above, the suspicious terminal recognition system System includes: the first acquisition module 1, the first identification module 2, second acquisition module 3, the first determining module 4, first judgment module 5 With the second identification module 6.
First obtains module 1, for obtaining the user behavior characteristics data of multiple mobile terminals.
First identification module 2, for being moved according to this two for every any two mobile terminal in multiple mobile terminals The user behavior characteristics data of dynamic terminal, identify whether two mobile terminals have friendly relation.
Wherein, identify that friendly two mobile terminals of tool constitute a good friend couple.
Second obtains module 3, for being directed to each good friend couple, obtains the good friend to two mobile terminals for being included Message registration information, and it is suspicious come electrical feature according to message registration information to judge whether two mobile terminals are provided with.
First determining module 4, for when judge two mobile terminals be provided with it is suspicious come electrical feature when, determine this The resident position of two mobile terminals, and obtain position attribution corresponding to resident position.
First judgment module 5, for judging whether position attribution is one of predetermined attribute set.
Second identification module 6, for judging that position attribution is one of predetermined attribute set when first judgment module 5 When, identify that two mobile terminals are suspicious terminal.
In some embodiments, suspicious terminal recognition system further include: mark module 7.
Mark module 7, for using when the second identification module 6 identifies that two mobile terminals are suspicious terminal Two mobile terminals are marked in the position attribution of the resident position of two mobile terminals.
In some embodiments, suspicious terminal recognition system further include: the second determining module 8 and the second judgment module 9.
Second determining module 8, for when the second identification module 6 identifies that two mobile terminals are suspicious terminal, Using the resident position of two mobile terminals as suspected locations, other mobile terminals for entering and leaving suspected locations are determined, with As destination mobile terminal.
Second judgment module 9, for being directed to each destination mobile terminal, according to the user behavior of the destination mobile terminal Characteristic judges whether the destination mobile terminal is suspicious terminal.
In some embodiments, user behavior characteristics data include: the real-time position information of mobile terminal.Second judges mould Block 9 includes: acquiring unit 901 and judging unit 902.
Acquiring unit 901 obtains the destination mobile terminal position for the real-time position information according to the destination mobile terminal In the total duration of suspected locations.
Judging unit 902, for judging whether total duration is greater than scheduled duration threshold value.
Wherein, if the judging result of judging unit 902 be it is yes, the second judgment module 9 judges the destination mobile terminal For suspicious terminal.
In some embodiments, suspicious terminal recognition system further include: sending module 10.
Sending module 10 can for when the second identification module 6 identifies that two mobile terminals are suspicious terminal It doubts position attribution corresponding to terminal and telephone number is sent to suspicious call processing system.
It should be noted that can to the connection between the specific implementation procedure and each module of each module in this present embodiment Referring to the corresponding contents in aforementioned suspicious terminal identification method embodiment, details are not described herein again.
The suspicious terminal identification method and suspicious terminal recognition system that the embodiment of the present disclosure provides can be realized to be moved by judgement The friendly relation of dynamic terminal room establish good friend couple, judge the two of good friend's centering using message registration information and permanent residence position attribution Whether a mobile terminal is suspicious terminal, marks more suspicious terminals from relevance later, finally believes suspicious terminal Breath is sent to suspicious call processing system, to realize the early warning before user receives calls, promotes user's communication experience.
It is understood that embodiment of above is merely to illustrate that the principle of the disclosure and the exemplary implementation that uses Mode, however the disclosure is not limited thereto.For those skilled in the art, in the essence for not departing from the disclosure In the case where mind and essence, various changes and modifications can be made therein, these variations and modifications are also considered as the protection scope of the disclosure.

Claims (10)

1. a kind of suspicious terminal identification method characterized by comprising
Obtain the user behavior characteristics data of multiple mobile terminals;
For every any two mobile terminal in the multiple mobile terminal, according to user's row of two mobile terminals Data are characterized, identify whether two mobile terminals have friendly relation;Wherein, friendly two shiftings of tool are identified Dynamic terminal constitutes a good friend couple;
For each good friend couple, it is performed both by following step:
The good friend is obtained to the message registration information for two mobile terminals for being included, and is judged according to the message registration information Two mobile terminals whether be provided with it is suspicious come electrical feature;
When judge two mobile terminals be provided with it is suspicious come electrical feature when, determine the resident status of two mobile terminals It sets, and obtains position attribution corresponding to the resident position;
Judge whether the position attribution is one of predetermined attribute set;If so, identifying that two mobile terminals are equal For suspicious terminal.
2. suspicious terminal identification method according to claim 1, which is characterized in that identify that two terminals are equal described After the step of for suspicious terminal, further includes:
Two mobile terminals are marked using the position attribution of the resident position of two mobile terminals.
3. suspicious terminal identification method according to claim 1, which is characterized in that identify this two movements eventually described After the step of end is suspicious terminal, further includes:
Using the resident position of two mobile terminals as suspected locations, other for entering and leaving the suspected locations are determined Mobile terminal, using as destination mobile terminal;
For each destination mobile terminal, judge that the target is mobile according to the user behavior characteristics data of the destination mobile terminal Whether terminal is suspicious terminal.
4. suspicious terminal identification method according to claim 3, which is characterized in that the user behavior characteristics data packet It includes: the real-time position information of mobile terminal;
The user behavior characteristics data according to the destination mobile terminal judge whether the destination mobile terminal is suspicious terminal The step of specifically include:
According to the real-time position information of the destination mobile terminal, obtains the destination mobile terminal and be located at the suspected locations Total duration;
Judge whether the total duration is greater than scheduled duration threshold value;If so, judging that the destination mobile terminal is suspicious terminal.
5. suspicious terminal identification method according to any one of claims 1 to 4, which is characterized in that further include:
Position attribution corresponding to the suspicious terminal and telephone number are sent to suspicious call processing system.
6. a kind of suspicious terminal recognition system characterized by comprising
First obtains module, for obtaining the user behavior characteristics data of multiple mobile terminals;
First identification module, for being moved according to this two for every any two mobile terminal in the multiple mobile terminal The user behavior characteristics data of dynamic terminal, identify whether two mobile terminals have friendly relation;Wherein, identification is provided Friendly two mobile terminals constitute a good friend couple;
Second obtains module, for being directed to each good friend couple, obtains call of the good friend to two mobile terminals for being included Information is recorded, and it is suspicious come electrical feature according to the message registration information to judge whether two mobile terminals are provided with;
First determining module, for when judge two mobile terminals be provided with it is suspicious come electrical feature when, determine this two The resident position of mobile terminal, and obtain position attribution corresponding to the resident position;
First judgment module, for judging whether the position attribution is one of predetermined attribute set;
Second identification module, for judging that the position attribution is one of predetermined attribute set when first judgment module When, identify that two mobile terminals are suspicious terminal.
7. suspicious terminal recognition system according to claim 6, which is characterized in that further include:
Mark module, for using this when second identification module identifies that two mobile terminals are suspicious terminal Two mobile terminals are marked in the position attribution of the resident position of two mobile terminals.
8. suspicious terminal recognition system according to claim 6, which is characterized in that further include:
Second determining module, for when second identification module identifies that two mobile terminals are suspicious terminal, with The resident position of two mobile terminals determines that other movements for entering and leaving the suspected locations are whole as suspected locations End, using as destination mobile terminal;
Second judgment module, for being directed to each destination mobile terminal, according to the user behavior characteristics of the destination mobile terminal Data judge whether the destination mobile terminal is suspicious terminal.
9. suspicious terminal recognition system according to claim 8, which is characterized in that the user behavior characteristics data packet It includes: the real-time position information of mobile terminal;
Second judgment module includes:
Acquiring unit obtains the destination mobile terminal and is located at for the real-time position information according to the destination mobile terminal The total duration of the suspected locations;
Judging unit, for judging whether the total duration is greater than scheduled duration threshold value;If so, judging that the target is mobile eventually End is suspicious terminal.
10. the suspicious terminal recognition system according to claim 6~9, which is characterized in that further include:
Sending module will be described for when second identification module identifies that two mobile terminals are suspicious terminal Position attribution corresponding to suspicious terminal and telephone number are sent to suspicious call processing system.
CN201910623219.XA 2019-07-11 2019-07-11 Suspicious terminal identification method and suspicious terminal identification system Active CN110166635B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910623219.XA CN110166635B (en) 2019-07-11 2019-07-11 Suspicious terminal identification method and suspicious terminal identification system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910623219.XA CN110166635B (en) 2019-07-11 2019-07-11 Suspicious terminal identification method and suspicious terminal identification system

Publications (2)

Publication Number Publication Date
CN110166635A true CN110166635A (en) 2019-08-23
CN110166635B CN110166635B (en) 2021-06-08

Family

ID=67638059

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910623219.XA Active CN110166635B (en) 2019-07-11 2019-07-11 Suspicious terminal identification method and suspicious terminal identification system

Country Status (1)

Country Link
CN (1) CN110166635B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113766069A (en) * 2021-09-06 2021-12-07 中国银行股份有限公司 Crank call interception method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101227511A (en) * 2008-01-30 2008-07-23 中兴通讯股份有限公司 Terminal and method for recognizing and controlling nuisance call
CN101472008A (en) * 2007-12-28 2009-07-01 ***通信集团公司 Method and corresponding system for identifying and controlling disturbance telephone
CN104853357A (en) * 2015-04-21 2015-08-19 杭州东信北邮信息技术有限公司 Method and system for automatically identifying and triggering fraud number
US9179259B2 (en) * 2012-08-01 2015-11-03 Polaris Wireless, Inc. Recognizing unknown actors based on wireless behavior
CN106534463A (en) * 2015-09-15 2017-03-22 ***通信集团公司 Strange incoming call processing method, device, terminal and server
CN109600344A (en) * 2017-09-30 2019-04-09 腾讯科技(深圳)有限公司 Identify the method, apparatus and electronic equipment of risk group
CN109819126A (en) * 2017-11-21 2019-05-28 中移(杭州)信息技术有限公司 A kind of exception number identification method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101472008A (en) * 2007-12-28 2009-07-01 ***通信集团公司 Method and corresponding system for identifying and controlling disturbance telephone
CN101227511A (en) * 2008-01-30 2008-07-23 中兴通讯股份有限公司 Terminal and method for recognizing and controlling nuisance call
US9179259B2 (en) * 2012-08-01 2015-11-03 Polaris Wireless, Inc. Recognizing unknown actors based on wireless behavior
CN104853357A (en) * 2015-04-21 2015-08-19 杭州东信北邮信息技术有限公司 Method and system for automatically identifying and triggering fraud number
CN106534463A (en) * 2015-09-15 2017-03-22 ***通信集团公司 Strange incoming call processing method, device, terminal and server
CN109600344A (en) * 2017-09-30 2019-04-09 腾讯科技(深圳)有限公司 Identify the method, apparatus and electronic equipment of risk group
CN109819126A (en) * 2017-11-21 2019-05-28 中移(杭州)信息技术有限公司 A kind of exception number identification method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113766069A (en) * 2021-09-06 2021-12-07 中国银行股份有限公司 Crank call interception method and device
CN113766069B (en) * 2021-09-06 2023-08-18 中国银行股份有限公司 Harassment call interception method and device

Also Published As

Publication number Publication date
CN110166635B (en) 2021-06-08

Similar Documents

Publication Publication Date Title
CN101155324B (en) Instant communication method and system based on or containing mobile phone book
CN102663106B (en) Establish the method and system of number information database
US7196630B2 (en) Method and apparatus for routing a communication to a user based on a predicted presence
US7895154B2 (en) Communication reputation
CN110337059B (en) Analysis algorithm, server and network system for family relationship of user
CN102611746B (en) Method and system for sharing contact person information
CN104660809A (en) Answer management method and device for incoming call of private contact person
CN107920154A (en) The processing method and terminal of Stranger Calls
CN109995929A (en) Processing method, the processing method of account information, device and the storage medium of operation
CN106936971B (en) A kind of incoming person's information presentation system and reminding method
CN110493476A (en) A kind of detection method, device, server and storage medium
CN107295491A (en) The method and system of automatic screening calling subscribe during call forwarding
CN103873704A (en) Caller identification method and system for calling number
CN107018227A (en) Incoming call processing method and device
CN110166635A (en) Suspicious terminal identification method and suspicious terminal recognition system
CN104506743B (en) A kind of method and device of dynamic interception phone
KR100946983B1 (en) Method and apparatus for processing spam
KR101764920B1 (en) Method for determining spam phone number using spam model
CN104202462A (en) Communication control method and system
CN107018235A (en) Call the treating method and apparatus of unmanned response
CN108696858B (en) Method and system for establishing social relationship based on mobile phone number
CN106791232A (en) The means of communication of identity-based certification
CN106888229B (en) Call management method and server
CN109548185B (en) Group user number portability communication method and gateway mobile switching center
CN108449517A (en) Call method and device based on the more card business of No.1

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant