[go: up one dir, main page]

CN108513717A - A kind of reminding method, terminal and server - Google Patents

A kind of reminding method, terminal and server Download PDF

Info

Publication number
CN108513717A
CN108513717A CN201780005192.7A CN201780005192A CN108513717A CN 108513717 A CN108513717 A CN 108513717A CN 201780005192 A CN201780005192 A CN 201780005192A CN 108513717 A CN108513717 A CN 108513717A
Authority
CN
China
Prior art keywords
information
base station
terminal
pseudo
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201780005192.7A
Other languages
Chinese (zh)
Other versions
CN108513717B (en
Inventor
朱振华
张小菊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Publication of CN108513717A publication Critical patent/CN108513717A/en
Application granted granted Critical
Publication of CN108513717B publication Critical patent/CN108513717B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本申请实施例公开了一种提示方法,用于服务器根据多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息,服务器根据大数据的计算得到的真实基站的信息和伪基站的信息,准确率比较高。本申请实施例包括:服务器接收多个终端发送的事件的信息;所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。本申请实施例还提供一种服务器和一种终端。

The embodiment of the present application discloses a prompt method, which is used for the server to obtain the information of the real base station and the information of the pseudo base station according to the event information sent by multiple terminals, and the information of the real base station and the pseudo base station obtained by the server according to the calculation of big data information with high accuracy. The embodiment of the present application includes: the server receives event information sent by multiple terminals; the server acquires information of real base stations and information of pseudo base stations according to the event information sent by the multiple terminals. The embodiment of the present application also provides a server and a terminal.

Description

一种提示方法、终端以及服务器A prompt method, terminal and server

本申请要求于2017年1月22日提交中国专利局、申请号为201710052278.7、发明名称为“一种防范伪基站诈骗方法和设备”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。This application claims the priority of the Chinese patent application with the application number 201710052278.7 and the invention title "A method and device for preventing fake base station fraud" submitted to the China Patent Office on January 22, 2017, the entire contents of which are incorporated herein by reference Applying.

技术领域technical field

本申请涉及通信领域,尤其涉及一种提示方法、终端以及服务器。The present application relates to the communication field, and in particular to a prompt method, a terminal and a server.

背景技术Background technique

随着通信技术的发展,电信诈骗的案例和手段越来越多。在众多的电信诈骗技术中,通过非法基站或者称为伪基站实施作案已经成为主流手段。这些伪基站可以伪装成运营商的基站,假冒他人号码发送诈骗短信。基于伪基站发送的短信,因为可以伪造号码所以具有非常大的迷惑性,终端用户难以辨别真假。With the development of communication technology, there are more and more cases and methods of telecom fraud. Among the many telecommunications fraud techniques, committing crimes through illegal base stations or pseudo-base stations has become the mainstream method. These fake base stations can pretend to be the base stations of operators, and send fraudulent text messages by pretending to be other people's numbers. The short message sent based on the fake base station is very confusing because the number can be forged, and it is difficult for the end user to distinguish the true from the false.

在现有技术中,通常识别伪基站的方法为通过终端对比基站特征参数来识别伪基站的方法和基于基站位置识别伪基站的方法。通过终端对比基站特征参数来识别伪基站的方法是:终端解析基站的特征参数,与本地预置的特征参数库进行匹配,如果在合法范围内就认为是合法的基站。否则认为是伪基站,直接从终端屏蔽接入伪基站。但是,该判断逻辑完全依赖终端,无法进行系统升级。随着伪基站技术的发展一些特征参数也是可以进行调整的,但是终端无法动态获得,容易导致误判。In the prior art, methods for identifying pseudo base stations generally include a method for identifying pseudo base stations by comparing characteristic parameters of base stations by terminals and a method for identifying pseudo base stations based on base station locations. The method of identifying a false base station by comparing the characteristic parameters of the base station by the terminal is: the terminal analyzes the characteristic parameters of the base station, matches with the local preset characteristic parameter library, and if it is within the legal range, it is considered a legal base station. Otherwise, it is regarded as a pseudo base station, and access to the pseudo base station is directly blocked from the terminal. However, the judgment logic is completely dependent on the terminal, and system upgrades cannot be performed. With the development of pseudo base station technology, some characteristic parameters can also be adjusted, but the terminal cannot obtain it dynamically, which may easily lead to misjudgment.

基于基站位置识别伪基站的方法为:当终端收到通知类短信时,会上报短信及终端位置信息到服务器。服务器根据大量终端上报的信息进行计算,获得某个区域内的基站信息,然后与运营商基站库中的位置进行对比,不在运营商基站库中的就认为是伪基站。但是,这样的判断方式仅针对通知类消息进行判断存在风险,伪基站可以构造任意号码,所以发送的短信不一定都是通知类短信;运营商自身也存在移动基站,单从位置上比对并不完全可靠;另外终端上报的基站位置是通过算法计算获得的,本身存在误差。The method for identifying a false base station based on the location of the base station is as follows: when the terminal receives a notification short message, it will report the short message and the terminal location information to the server. The server calculates based on the information reported by a large number of terminals to obtain the base station information in a certain area, and then compares it with the location in the operator's base station database. If it is not in the operator's base station database, it is considered a fake base station. However, there are risks in such a judgment method only for notification messages. Pseudo base stations can construct arbitrary numbers, so the short messages sent are not necessarily notification short messages; operators themselves also have mobile base stations. It is not completely reliable; in addition, the base station location reported by the terminal is obtained through algorithm calculation, and there are errors in itself.

发明内容Contents of the invention

本申请实施例提供了一种提示方法、终端以及服务器,用于服务器根据多个终端上报的大数据来获取准确率比较高的真实基站的信息和伪基站的信息。The embodiment of the present application provides a prompting method, a terminal and a server, which are used for the server to obtain the information of the real base station and the information of the pseudo base station with relatively high accuracy according to the big data reported by multiple terminals.

本申请实施例的第一方面提供一种提示方法,所述方法可以应用在服务器连接有多个终端的场景,所述方法可以包括:服务器接收多个终端发送的事件的信息;所述事件可以接收短信和/或来电;应理解,所述事件的信息可以是服务器接收一定数量阈值的终端上报的事件的信息,也可以是服务器接收特定阈值数量的事件的信息,还可以是,服务器接收预置时长内终端上报的事件的信息,具体此处不做限定。所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。即服务器可以根据多个终端上报的大数据进行计算,获取的真实基站的信息和伪基站的信息的准确率比较高。应理解,虽然说终端上报的数据越多,服务器所获取的真实基站的信息和伪基站的信息也就越准确,但是,这些需要在服务器的负载范围内。这里服务器获取真实基站的信息和伪基站的信息需要保存,可以确定多个终端中接入伪基站的目标终端,也可以确定下次接收第一终端上报的第一事件的信息,可以确定第一终端接入的第一基站的真伪。The first aspect of the embodiments of the present application provides a prompt method, which can be applied to a scenario where multiple terminals are connected to the server, and the method can include: the server receives event information sent by multiple terminals; the event can be Receive text messages and/or incoming calls; it should be understood that the event information may be information about events reported by the server receiving a certain number of threshold terminals, or information about the server receiving a specific threshold number of events, or that the server receives a predetermined number of events. The event information reported by the terminal within the set time period is not limited here. The server acquires the information of the real base station and the information of the pseudo base station according to the event information sent by the multiple terminals. That is to say, the server can perform calculations based on the big data reported by multiple terminals, and the accuracy rate of the acquired real base station information and pseudo base station information is relatively high. It should be understood that although the more data reported by the terminal, the more accurate the information of the real base station and the information of the pseudo base station acquired by the server are, but these need to be within the load range of the server. Here, the server needs to save the information of the real base station and the information of the pseudo base station. It can determine the target terminal that accesses the pseudo base station among multiple terminals, and can also determine the information of the first event reported by the first terminal next time. The authenticity of the first base station accessed by the terminal.

结合本申请实施例的第一方面,在本申请实施例的第一方面的第一种实现方式中,所述方法还可以包括:所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;所述服务器向所述目标终端发送伪基站的指示信息。服务器确定有接入伪基站的目标终端后,可以向目标终端发送伪基站的指示信息,所述伪基站的指示信息用于目标终端提示,使得用户对目标终端上发生的事件引起警惕,小心上当受骗。With reference to the first aspect of the embodiments of the present application, in the first implementation manner of the first aspect of the embodiments of the present application, the method may further include: the server according to the information of the real base station and the pseudo base station information to determine a target terminal accessing the pseudo base station among the plurality of terminals; the server sends indication information of the pseudo base station to the target terminal. After the server determines that there is a target terminal accessing the pseudo base station, it can send the indication information of the pseudo base station to the target terminal. The indication information of the pseudo base station is used for prompting the target terminal, so that the user is vigilant about the events occurring on the target terminal and be careful not to be fooled. deceived.

结合本申请实施例的第一方面、第一方面的第一种实现方式,在本申请实施例的第一方面的第二种实现方式中,所述事件的信息包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。所述事件的信息还可以包括短信内容和/或来电号码。应理解,所述事件的信息包括但不限于上述所提及的信息,所述事件的信息可以用于服务器进行大数据的计算,得到真实基站的信息和伪基站的信息。In combination with the first aspect of the embodiment of the present application and the first implementation of the first aspect, in the second implementation of the first aspect of the embodiment of the present application, the information of the event includes the terminal identifier and the location information of the terminal , the information of the base station accessed when the event occurs, and the time when the event occurs. The event information may also include short message content and/or caller number. It should be understood that the event information includes but not limited to the information mentioned above, and the event information can be used by the server to perform big data calculations to obtain real base station information and pseudo base station information.

结合本申请实施例第一方面的第二种实现方式,在本申请实施例的第一方面的第三种实现方式中,所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息,可以包括:所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;这里可以得到多组关于经度、纬度、日期的数据。所述服务器从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;这里的第一阈值可以是一个经验值,也可以根据实际情况而设定。所述服务器去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;所述服务器确定所述筛选基站的信息为真实基站的信息。在本申请实施例中,提供了一种获取真实基站的信息的实现方式,增加了方案的可行性。With reference to the second implementation manner of the first aspect of the embodiment of the present application, in the third implementation manner of the first aspect of the embodiment of the present application, the server obtains the real base station according to the event information sent by the multiple terminals The information may include: the server determines according to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurs, the time when the event occurs, and the preset location calculation accuracy Information about the initial base station of longitude, latitude, and date; multiple sets of data about longitude, latitude, and date can be obtained here. The server deletes, from the information about the initial base stations of longitude, latitude, and date, the information of the initial base stations whose occurrences in consecutive days are less than a first threshold; the first threshold here may be an empirical value, or may be based on set according to the actual situation. The server removes the date, and merges the information of other initial base stations to obtain the information about the longitude and latitude screening base stations; the server determines that the information of the screening base stations is the information of real base stations. In the embodiment of the present application, an implementation manner of obtaining information of a real base station is provided, which increases the feasibility of the solution.

结合本申请实施例第一方面的第二种实现方式,在本申请实施例的第一方面的第四种实现方式中,所述服务器根据所述多个终端发送的事件的信息,获取伪基站的信息,可以包括:即服务器利用伪基站移动的特点(可移动,突然出现并消失),识别出可能潜在的伪基站。所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;所述服务器根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;所述服务器确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述服务器确定所述目标基站的信息为伪基站的信息。在本申请实施例中,提供了一种获取真实伪基站的信息的实现方式,增加了方案的可行性。With reference to the second implementation manner of the first aspect of the embodiments of the present application, in the fourth implementation manner of the first aspect of the embodiments of the present application, the server obtains the pseudo base station according to the event information sent by the multiple terminals The information may include: that is, the server identifies a possible potential pseudo base station by using characteristics of the pseudo base station's movement (movable, sudden appearance and disappearance). The server determines the location information of the terminal accessed by the target base station at the first time and The location information of the terminal accessed at the second time, the target base station is any base station accessed by the plurality of terminals when the event occurs; position information, calculating the first center position of the terminal to be accessed, and calculating the second center position of the terminal to be accessed according to the position information of the terminal accessed by the target base station at the second time; the server determines the The first central position is the first position of the target base station, and the second central position is determined to be the second position of the target base station; if the absolute value of the difference between the first position and the second position is greater than the second threshold, the server determines that the information of the target base station is information of a pseudo base station. In the embodiment of the present application, an implementation manner of obtaining information about real pseudo base stations is provided, which increases the feasibility of the solution.

结合本申请实施例的第一方面、本申请实施例的第一方面的第一种至第四种实现方式中的任意一种,在本申请实施例的第一方面的第五种实现方式中,所述方法还可以包括:所述服务器标记所述真实基站和所述伪基站的可疑概率;服务器可以将真实基站的可疑概率标记为0,伪基站的可疑概率标为100%,也可以根据实际情况而标记。所述服务器接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;即服务器将伪基站的指示信息向目标终端发送后,目标终端会提示伪基站的指示信息,而有的目标终端上会接收用户输入的反馈信息,这些收到反馈信息的目标终端可以称为第一目标终端,第一目标终端将反馈信息上报给服务器。所述服务器根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率。从而对保存的真实基站的信息和伪基站的信息进行更新,使得保存的真实基站的信息和伪基站的信息是最新的记录。In combination with the first aspect of the embodiments of the present application, any of the first to fourth implementations of the first aspect of the embodiments of the present application, in the fifth implementation of the first aspect of the embodiments of the present application , the method may further include: the server marks the suspicious probability of the real base station and the false base station; the server may mark the suspicious probability of the real base station as 0, and the suspicious probability of the false base station as 100%, or it may be based on Marked according to the actual situation. The server receives feedback information sent by the first target terminal, where the feedback information is input information input by the user indicating whether the base station accessed when the event occurs by the first target terminal is a pseudo base station; that is, After the server sends the indication information of the pseudo base station to the target terminal, the target terminal will prompt the indication information of the pseudo base station, and some target terminals will receive the feedback information input by the user. These target terminals that receive the feedback information can be called the first For the target terminal, the first target terminal reports the feedback information to the server. The server correspondingly modifies the suspicious probability of the pseudo base station according to the feedback information, and obtains the modified suspicious probability of the pseudo base station. Therefore, the stored information of the real base station and the information of the pseudo base station are updated, so that the stored information of the real base station and the information of the pseudo base station are the latest records.

在本申请实施例中,服务器接收第一目标终端上报的反馈信息后,就可以对保存的真实基站的信息和伪基站的信息的可疑概率进行修改,从而更新真实基站的信息和伪基站的信息。使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。In the embodiment of the present application, after the server receives the feedback information reported by the first target terminal, it can modify the suspicious probability of the saved information of the real base station and the information of the pseudo base station, thereby updating the information of the real base station and the information of the pseudo base station . so that when the server receives the information of the first event reported by the first terminal next time, it can determine whether the first base station accessed by the terminal when the first event occurs is a pseudo base station according to the updated information of the real base station and the information of the pseudo base station, In this way, the accuracy of the result judged based on the information of the real base station and the information of the pseudo base station updated in real time is higher.

结合本申请实施例第一方面的第五种实现方式中的任意一种,在本申请实施例的第一方面的第六种实现方式中,所述方法还可以包括:所述服务器确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息、可疑概率小于第四阈值的基站的信息为目标真实基站的信息;这些目标真实基站的信息和目标伪基站的信息包括但不限于(cellidentification,CID)、位置区标识(location area code,LAC)、信号强度、采集时间与上报时间的差异等信息。所述服务器根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到基站的信息中包括的各个特征的参考权重。With reference to any one of the fifth implementation manners of the first aspect of the embodiments of the present application, in the sixth implementation manner of the first aspect of the embodiments of the present application, the method may further include: the server determining the suspicious probability The information of the base station greater than the third threshold is the information of the target pseudo base station, and the information of the base station with a suspicious probability less than the fourth threshold is the information of the target real base station; the information of these target real base stations and the information of the target pseudo base station include but are not limited to (cellidentification , CID), location area code (location area code, LAC), signal strength, difference between collection time and reporting time, etc. The server performs model training according to the information of the target pseudo base station and the information of the target real base station, and obtains reference weights of each feature included in the information of the base station.

在本申请实施例中,如果得到基站的信息中包括的各个特征的参考权重,那么就可以对下次第一终端上报的第一事件的信息中第一基站的信息进行计算,得到第一基站的目标可疑概率,从而,判断第一基站的真伪,提供了一种确定第一基站是真实基站或者伪基站的实现方式,使得本申请实施例更加完善。In the embodiment of the present application, if the reference weights of each feature included in the information of the base station are obtained, then the information of the first base station in the information of the first event reported by the first terminal next time can be calculated to obtain the first base station Therefore, judging the authenticity of the first base station provides an implementation manner of determining whether the first base station is a real base station or a fake base station, making the embodiments of the present application more perfect.

结合本申请实施例第一方面的第六种实现方式中的任意一种,在本申请实施例的第一方面的第七种实现方式中,所述方法还可以包括:所述服务器接收第一终端发送的第一事件的信息,所述第一事件的信息可以包括发生所述第一事件时接入的第一基站的信息;若所述第一基站的信息在所述伪基站的信息中,则所述服务器向所述第一终端发送伪基站的指示信息。应理解,第一事件的信息包括但不限于上述所提及的信息。所述第一事件的信息还可以包括所述第一终端标识、所述第一终端的位置信息、发生所述第一事件的时间。With reference to any one of the sixth implementation manners of the first aspect of the embodiments of the present application, in the seventh implementation manner of the first aspect of the embodiments of the present application, the method may further include: the server receiving the first The information of the first event sent by the terminal, the information of the first event may include the information of the first base station accessed when the first event occurs; if the information of the first base station is included in the information of the pseudo base station , the server sends the indication information of the pseudo base station to the first terminal. It should be understood that the information of the first event includes but not limited to the information mentioned above. The information of the first event may further include the identifier of the first terminal, the location information of the first terminal, and the time when the first event occurs.

在本申请实施例中,提供了一种确定伪基站的实现方式,服务器可以根据之前计算出来的真实基站的信息和伪基站的信息来确定第一基站的信息是否在其中。若第一基站在伪基站的信息中,则说明第一基站为伪基站,那么,服务器可以向第一终端发送伪基站的指示信息,又因为根据大数据计算出来的伪基站的信息和真实基站的准确率比较高,所以,这样确定出第一基站为伪基站的准确率也比较高。In the embodiment of the present application, an implementation manner of determining a pseudo base station is provided, and the server may determine whether the information of the first base station is included according to the previously calculated information of the real base station and the information of the pseudo base station. If the first base station is in the information of the pseudo base station, it means that the first base station is a pseudo base station, then the server can send the indication information of the pseudo base station to the first terminal, and because the information of the pseudo base station calculated according to the big data and the real base station Therefore, the accuracy rate of determining that the first base station is a pseudo base station is also relatively high.

结合本申请实施例第一方面的第七种实现方式中的任意一种,在本申请实施例的第一方面的第八种实现方式中,所述方法还可以包括:若所述第一基站的信息未在所述伪基站的信息中,则所述服务器根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率;若所述目标概率小于等于所述第五阈值,则所述服务器确定所述第一基站为伪基站;所述服务器向所述第一终端发送伪基站的指示信息。在本申请实施例中,是根据基站的信息中各个特征的参考权重,计算得出第一基站是否为伪基站,为本申请实施例提供了一种可选的实现方式。In combination with any of the seventh implementation manners of the first aspect of the embodiments of the present application, in the eighth implementation manner of the first aspect of the embodiments of the present application, the method may further include: if the first base station The information of the pseudo base station is not in the information of the pseudo base station, then the server determines the target probability of the first base station according to the information of the first event and the reference weight of each feature included in the information of the base station; if If the target probability is less than or equal to the fifth threshold, the server determines that the first base station is a pseudo base station; and the server sends indication information of the pseudo base station to the first terminal. In the embodiment of the present application, whether the first base station is a pseudo base station is calculated according to the reference weight of each feature in the information of the base station, which provides an optional implementation manner for the embodiment of the present application.

结合本申请实施例的第一方面、本申请实施例的第一方面的第一种至第八种实现方式中的任意一种,在本申请实施例的第一方面的第九种实现方式中,所述事件可以包括:接收短信和/或来电;所述事件的信息还可以包括:所述短信的内容和/或所述来电的号码。In combination with the first aspect of the embodiments of the present application, any of the first to eighth implementations of the first aspect of the embodiments of the present application, in the ninth implementation of the first aspect of the embodiments of the present application , the event may include: receiving a short message and/or an incoming call; the event information may further include: the content of the short message and/or the number of the incoming call.

本申请实施例第二方面提供了一种提示方法,可以包括:终端检测事件发生并采集所述事件的信息;所述终端向服务器发送所述事件的信息;如果有多个终端向服务器发送事件的信息,那么,服务器就可以根据多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息,从而,就可以确定终端接入的是否为伪基站。所述终端接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的;所述终端提示所述伪基站的指示信息。终端如果提示伪基站的指示信息,就可以使得用户对目标终端上发生的事件引起警惕,小心上当受骗。The second aspect of the embodiment of the present application provides a reminder method, which may include: the terminal detects the occurrence of an event and collects the information of the event; the terminal sends the information of the event to the server; if there are multiple terminals sending the event to the server Then, the server can obtain the information of the real base station and the information of the fake base station according to the event information sent by multiple terminals, so as to determine whether the terminal accesses is a fake base station. The terminal receives the indication information of the pseudo base station sent by the server, and the indication information of the pseudo base station is obtained by the server according to the information of the event; the terminal prompts the indication information of the pseudo base station. If the terminal prompts the instruction information of the fake base station, the user can be vigilant about the events occurring on the target terminal and be careful not to be deceived.

结合本申请实施例的第二方面,在本申请实施例的第二方面的第一种实现方式中,所述事件的信息可以包括所述终端标识、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。所述事件的信息还可以包括短信内容和/或来电号码。应理解,所述事件的信息包括但不限于上述所提及的信息,所述事件的信息可以用于服务器进行大数据的计算,得到真实基站的信息和伪基站的信息。With reference to the second aspect of the embodiments of the present application, in the first implementation manner of the second aspect of the embodiments of the present application, the event information may include the terminal identifier, the location information of the terminal, the occurrence of the event Information about the base station accessed at the time, and the time when the event occurred. The event information may also include short message content and/or caller number. It should be understood that the event information includes but not limited to the information mentioned above, and the event information can be used by the server to perform big data calculations to obtain real base station information and pseudo base station information.

结合本申请实施例的第二方面、第二方面的第一种实现方式,在本申请实施例的第二方面的第二种实现方式中,所述方法还可以包括:所述终端接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;所述终端向所述服务器发送所述反馈信息,所述反馈信息用于所述服务器对所述伪基站的可疑概率进行修改。应理解,假设,这里接收反馈信息的终端称为第一目标终端。在本申请实施例中,服务器接收第一目标终端上报的反馈信息后,就可以对保存的真实基站的信息和伪基站的信息的可疑概率进行修改,从而更新真实基站的信息和伪基站的信息。从而使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。In combination with the second aspect of the embodiment of the present application and the first implementation of the second aspect, in the second implementation of the second aspect of the embodiment of the present application, the method may further include: the terminal receiving feedback information , the feedback information is the input information input by the user indicating whether the base station accessed when the event occurs to the terminal is a pseudo base station; the terminal sends the feedback information to the server, and the feedback The information is used by the server to modify the suspicious probability of the pseudo base station. It should be understood that it is assumed that the terminal receiving the feedback information here is called the first target terminal. In the embodiment of the present application, after the server receives the feedback information reported by the first target terminal, it can modify the suspicious probability of the saved information of the real base station and the information of the pseudo base station, thereby updating the information of the real base station and the information of the pseudo base station . Therefore, when the server receives the information of the first event reported by the first terminal next time, it can determine whether the first base station accessed by the terminal when the first event occurs is a pseudo base station according to the updated information of the real base station and the information of the pseudo base station , so that the accuracy of the result judged according to the information of the real base station and the information of the pseudo base station updated in real time is higher.

结合本申请实施例的第二方面、第二方面的第一种实现方式、第二方面的第二种实现方式,在本申请实施例的第二方面的第三种实现方式中,所述终端提示所述伪基站的指示信息,可以包括:所述终端通过文字显示所述伪基站的指示信息;和/或,所述终端通过危险标识显示所述伪基站的指示信息;和/或,所述终端通过语音提示所述伪基站的指示信息。需要说明的是,终端通过所述事件对应的应用界面显示事件的信息,所述事件的信息可以包括短信内容和/或来电号码,并可以在所述应用界面上提示所述伪基站的提示信息。该应用界面可以是短信界面或者来电界面。In combination with the second aspect of the embodiments of the present application, the first implementation of the second aspect, and the second implementation of the second aspect, in the third implementation of the second aspect of the embodiments of the present application, the terminal Prompting the indication information of the pseudo base station may include: the terminal displays the indication information of the pseudo base station in text; and/or, the terminal displays the indication information of the pseudo base station through a danger sign; and/or, the The terminal prompts the indication information of the pseudo base station by voice. It should be noted that the terminal displays the information of the event through the application interface corresponding to the event, the information of the event may include the text message content and/or the caller number, and may prompt the prompt information of the pseudo base station on the application interface . The application interface may be a text message interface or an incoming call interface.

结合本申请实施例的第二方面、第二方面的第一种实现方式、第二方面的第二种实现方式、第二方面的第三种实现方式,在本申请实施例的第二方面的第四种实现方式中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。In combination with the second aspect of the embodiment of the present application, the first implementation of the second aspect, the second implementation of the second aspect, and the third implementation of the second aspect, in the second aspect of the embodiment of the application In a fourth implementation manner, the event includes: receiving a short message and/or an incoming call; the event information further includes: content of the short message and/or a number of the incoming call.

本申请实施例第三方面提供一种服务器,具有实现对应于上述第一方面提供的获取真实基站的信息和伪基站的信息的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。The third aspect of the embodiment of the present application provides a server, which has the function of obtaining the information of the real base station and the information of the pseudo base station corresponding to the above-mentioned first aspect. This function may be implemented by hardware, or may be implemented by executing corresponding software on the hardware. The hardware or software includes one or more modules corresponding to the above functions.

本申请实施例第四方面提供一种终端,具有实现对应于上述第二方面提供的提示伪基站的指示信息的功能。该功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的模块。The fourth aspect of the embodiment of the present application provides a terminal, which has a function of prompting the indication information of the pseudo base station corresponding to the second aspect. This function may be implemented by hardware, or may be implemented by executing corresponding software on the hardware. The hardware or software includes one or more modules corresponding to the above functions.

本申请实施例第五方面提供一种服务器,可以包括:收发器,处理器,存储器和总线,所述收发器、所述处理器和所述存储器通过所述总线连接;The fifth aspect of the embodiment of the present application provides a server, which may include: a transceiver, a processor, a memory, and a bus, and the transceiver, the processor, and the memory are connected through the bus;

所述存储器,用于存储操作指令;The memory is used to store operation instructions;

所述收发器,用于接收多个终端发送的事件的信息;The transceiver is configured to receive event information sent by multiple terminals;

所述处理器,用于调用所述操作指令,根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。The processor is configured to call the operation instruction, and acquire information about real base stations and information about pseudo base stations according to event information sent by the multiple terminals.

在一种可能的设计中,所述处理器,还用于根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;In a possible design, the processor is further configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the plurality of terminals;

所述收发器,还用于向所述目标终端发送伪基站的指示信息。The transceiver is further configured to send indication information of the pseudo base station to the target terminal.

在一种可能的设计中,所述事件的信息包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。In a possible design, the event information includes a terminal identifier, terminal location information, information about a base station accessed when the event occurs, and a time when the event occurs.

在一种可能的设计中,所述处理器具体用于执行以下步骤:In a possible design, the processor is specifically configured to perform the following steps:

根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;确定所述筛选基站的信息为真实基站的信息。According to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurred, the time when the event occurred, and the preset position calculation accuracy, determine the initial base station with respect to longitude, latitude, and date information; from the information about the initial base station of longitude, latitude, and date, delete the information of the initial base station whose occurrence times in consecutive days is less than the first threshold; remove the date, and merge the information of other initial base stations to obtain The information about the screening base station of longitude and latitude; the information of determining that the information of the screening base station is the information of the real base station.

在一种可能的设计中,所述处理器具体用于执行以下步骤:In a possible design, the processor is specifically configured to perform the following steps:

根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述处理器确定所述目标基站的信息为伪基站的信息。According to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurred, and the time when the event occurred, determine the location information and the second time of the terminal accessed by the target base station at the first time The location information of the accessed terminal, the target base station is any base station accessed by the multiple terminals when the event occurs; according to the location information of the terminal accessed by the target base station at the first time, the connected terminal is calculated. The first central position of the incoming terminal is calculated according to the location information of the terminal accessed by the target base station at the second time, and the second central position of the incoming terminal is calculated; the first central position is determined as the target base station The first position of the target base station is determined to be the second central position; if the absolute value of the difference between the first position and the second position is greater than a second threshold, the processing The device determines that the information of the target base station is information of a pseudo base station.

在一种可能的设计中,所述处理器还用于执行以下步骤:标记所述真实基站和所述伪基站的可疑概率;根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率;In a possible design, the processor is further configured to perform the following steps: mark the suspicious probabilities of the real base station and the false base station; according to the feedback information, correspondingly modify the suspicious probability of the false base station to obtain The modification suspicious probability of the pseudo base station;

所述收发器还用于执行以下步骤:接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息。The transceiver is further configured to perform the following step: receiving feedback information sent by the first target terminal, where the feedback information is an indication input by the user that the base station accessed when the event occurs for the first target terminal is a pseudo base station Whether the information is entered accurately.

在一种可能的设计中,所述处理器,还用于执行以下步骤:In a possible design, the processor is further configured to perform the following steps:

确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息、可疑概率小于第四阈值的基站的信息为目标真实基站的信息;根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到基站的信息中包括的各个特征的参考权重。Determining that the information of base stations whose suspicious probability is greater than the third threshold is the information of the target pseudo base station, and the information of the base stations whose suspicious probability is less than the fourth threshold is the information of the target real base station; according to the information of the target pseudo base station and the information of the target real base station information, perform model training, and obtain the reference weights of each feature included in the information of the base station.

在一种可能的设计中,所述收发器,还用于执行以下步骤:In a possible design, the transceiver is also used to perform the following steps:

接收第一终端发送的第一事件的信息,所述第一事件的信息发生所述第一事件时接入的第一基站的信息;若所述第二基站的信息在所述伪基站的信息中,则所述收发器向所述第一终端发送伪基站的指示信息。receiving the information of the first event sent by the first terminal, the information of the first event is the information of the first base station accessed when the first event occurs; if the information of the second base station is in the information of the pseudo base station , the transceiver sends indication information of the pseudo base station to the first terminal.

在一种可能的设计中,所述处理器还用于执行以下步骤:In a possible design, the processor is also configured to perform the following steps:

若所述第一基站的信息未在所述伪基站的信息中,则所述处理器模块根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率;若所述目标概率小于等于所述第五阈值,则所述处理器确定所述第一基站为伪基站;If the information of the first base station is not included in the information of the pseudo base station, the processor module determines the The target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the processor determines that the first base station is a pseudo base station;

所述收发器还用于执行以下步骤:向所述第一终端发送伪基站的指示信息。The transceiver is further configured to perform the following step: sending indication information of a pseudo base station to the first terminal.

在一种可能的设计中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。In a possible design, the event includes: receiving a short message and/or an incoming call; the event information further includes: content of the short message and/or a number of the incoming call.

本申请实施例第六方面提供一种终端,可以包括:处理器,通信接口,存储器,输出单元和总线,所述处理器、所述通信接口、所述输出单元和所述存储器通过所述总线连接;The sixth aspect of the embodiment of the present application provides a terminal, which may include: a processor, a communication interface, a memory, an output unit, and a bus, and the processor, the communication interface, the output unit, and the memory pass through the bus connect;

所述存储器,用于存储操作指令;The memory is used to store operation instructions;

所述处理器,用于调用所述操作指令,检测事件发生并采集所述事件的信息;The processor is configured to invoke the operation instruction, detect the occurrence of an event and collect information about the event;

所述通信接口,用于向服务器发送所述事件的信息;接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的;The communication interface is configured to send information about the event to a server; receive indication information of a pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to information about the event;

所述输出单元,用于提示所述伪基站的指示信息。The output unit is configured to prompt the indication information of the pseudo base station.

在一种可能的设计中,所述事件的信息包括所述终端标识、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间;提示所述伪基站的指示信息。In a possible design, the information of the event includes the terminal identifier, the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs; prompting the pseudo base station instructions for the .

在一种可能的设计中,所述终端还包括输入单元,所述输入单元,还用于接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;In a possible design, the terminal further includes an input unit, and the input unit is further configured to receive feedback information, the feedback information is the base station accessed when the event occurs on the terminal input by the user is Whether the indication information of the pseudo base station is accurate input information;

所述通信接口,还用于向所述服务器发送所述反馈信息,所述反馈信息用于所述服务器对所述伪基站的可疑概率进行修改。The communication interface is further configured to send the feedback information to the server, where the feedback information is used by the server to modify the suspicious probability of the pseudo base station.

在一种可能的设计中,所述输出单元包括显示单元,所述显示单元,用于通过文字显示所述伪基站的指示信息。In a possible design, the output unit includes a display unit, configured to display the indication information of the pseudo base station in text.

在一种可能的设计中,所述输出单元包括显示单元,所述显示单元,用于通过危险标识显示所述伪基站的指示信息。In a possible design, the output unit includes a display unit, configured to display the indication information of the pseudo base station by using a danger sign.

在一种可能的设计中,所述输出单元包括音频电路,所述音频电路,用于通过语音提示所述伪基站的指示信息。In a possible design, the output unit includes an audio circuit, and the audio circuit is configured to prompt the indication information of the pseudo base station by voice.

本申请实施例第七方面提供一种通信系统,所述通信系统包括服务器和终端,所述服务器为执行本申请第一方面或第一方面任一可选实现方式中所述的服务器;所述终端为执行本申请第二方面或第二方面任一可选实现方式中所述的终端。The seventh aspect of the embodiment of the present application provides a communication system, the communication system includes a server and a terminal, and the server is the server that executes the first aspect of the application or any optional implementation manner of the first aspect; the The terminal is the terminal that executes the second aspect of this application or any optional implementation manner of the second aspect.

本发明实施例第八方面提供一种存储介质,需要说明的是,本发的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产口的形式体现出来,该计算机软件产品存储在一个存储介质中,用于储存为上述设备所用的计算机软件指令,其包含用于执行上述第一方面、第二方面、第三方面或第四方面为服务器或者终端所设计的程序。The eighth aspect of the embodiment of the present invention provides a storage medium. It should be noted that the technical solution of the present invention is essentially or the part that contributes to the prior art or all or part of the technical solution can be produced by software. Formally embodied, the computer software product is stored in a storage medium for storing computer software instructions used by the above-mentioned equipment, which includes a server for performing the above-mentioned first aspect, second aspect, third aspect or fourth aspect Or the program designed by the terminal.

该存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。The storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM, Read-Only Memory), a random access memory (RAM, Random Access Memory), a magnetic disk or an optical disk, and other media capable of storing program codes.

本发明实施例第九方面提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如本申请第一方面或第一方面任一可选实现方式中所述的方法。A ninth aspect of the embodiments of the present invention provides a computer program product including instructions, which, when run on a computer, cause the computer to execute the method described in the first aspect or any optional implementation manner of the first aspect of the present application.

本发明实施例第十方面提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如本申请第二方面或第二方面任一可选实现方式中所述的方法。The tenth aspect of the embodiments of the present invention provides a computer program product including instructions, which, when run on a computer, cause the computer to execute the method described in the second aspect or any optional implementation manner of the second aspect of the present application.

本申请实施例提供的技术方案中,具有以下有益效果:In the technical solution provided by the embodiment of the present application, it has the following beneficial effects:

在本申请实施例中,服务器是根据多个终端上报的大数据来获取真实基站的信息和伪基站的信息,所以,得到的真实基站的信息和伪基站的信息的准确率比较高。即服务器接收多个终端发送的事件的信息,事件的信息可以包括终端标识、终端的位置信息、发生事件时接入的基站的信息、发生事件的时间。服务器根据所述多个终端发送的事件的信息获取真实基站的信息和伪基站的信息。服务器还可以根据真实基站的信息和伪基站的信息,再确定所述多个终端中接入伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对目标终端上发生的事件引起警惕,小心上当受骗。In the embodiment of the present application, the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by multiple terminals, so the accuracy rate of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives event information sent by multiple terminals, and the event information may include terminal identifiers, terminal location information, information about base stations accessed when an event occurs, and time when the event occurs. The server obtains the information of the real base station and the information of the pseudo base station according to the event information sent by the multiple terminals. The server can also determine the target terminal that accesses the pseudo base station among the plurality of terminals according to the information of the real base station and the information of the pseudo base station; send the indication information of the pseudo base station to the target terminal, so that the user can understand the events that occur on the target terminal. Be vigilant and be careful not to be deceived.

附图说明Description of drawings

图1为本申请实施例中所应用的一个通信系统框架图;Fig. 1 is a frame diagram of a communication system applied in the embodiment of the present application;

图2为本申请实施例中所应用的一个场景示意图;FIG. 2 is a schematic diagram of a scene applied in the embodiment of the present application;

图3为本申请实施例中提示方法的一个实施例示意图;Fig. 3 is a schematic diagram of an embodiment of the prompting method in the embodiment of the present application;

图4(a)为本申请实施例中终端接收短信界面显示的一个示意图;Fig. 4 (a) is a schematic diagram of the terminal receiving short message interface display in the embodiment of the present application;

图4(b)为本申请实施例中终端接收来电界面显示的一个示意图;Fig. 4 (b) is a schematic diagram of the interface display of the terminal receiving an incoming call in the embodiment of the present application;

图4(c)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(c) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(d)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(d) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(e)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(e) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(f)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(f) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(g)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(g) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(h)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(h) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(i)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(i) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(j)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(j) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(k)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(k) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(l)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(l) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(m)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(m) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(n)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(n) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(o)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(o) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图4(p)为本申请实施例中终端提示伪基站的指示信息的另一个示意图;FIG. 4(p) is another schematic diagram of the terminal prompting the indication information of the pseudo base station in the embodiment of the present application;

图5为本申请实施例中提示方法的另一个实施例示意图;FIG. 5 is a schematic diagram of another embodiment of the prompting method in the embodiment of the present application;

图6(a)为本申请实施例中终端在短信界面上显示输入反馈信息的一个示意图;Fig. 6 (a) is a schematic diagram of the terminal displaying input feedback information on the short message interface in the embodiment of the present application;

图6(b)为本申请实施例中终端在短信界面上显示输入反馈信息的另一个示意图;FIG. 6(b) is another schematic diagram of the terminal displaying input feedback information on the short message interface in the embodiment of the present application;

图6(c)为本申请实施例中终端在来电界面上显示输入反馈信息的一个示意图;FIG. 6(c) is a schematic diagram of the terminal displaying input feedback information on the incoming call interface in the embodiment of the present application;

图6(d)为本申请实施例中终端在来电界面上显示输入反馈信息的另一个示意图;FIG. 6(d) is another schematic diagram of the terminal displaying input feedback information on the incoming call interface in the embodiment of the present application;

图7为本申请实施例中提示方法的另一个实施例示意图;Fig. 7 is a schematic diagram of another embodiment of the prompting method in the embodiment of the present application;

图8为本申请实施例中提示方法的另一个实施例示意图;FIG. 8 is a schematic diagram of another embodiment of the prompting method in the embodiment of the present application;

图9(a)为本申请实施例中服务器的一个实施例示意图;Figure 9(a) is a schematic diagram of an embodiment of the server in the embodiment of the present application;

图9(b)为本申请实施例中服务器的一个实施例示意图;Figure 9(b) is a schematic diagram of an embodiment of the server in the embodiment of the present application;

图9(c)为本申请实施例中服务器的一个实施例示意图;Figure 9(c) is a schematic diagram of an embodiment of the server in the embodiment of the present application;

图9(d)为本申请实施例中服务器的一个实施例示意图;Figure 9(d) is a schematic diagram of an embodiment of the server in the embodiment of the present application;

图10为本申请实施例中终端的一个实施例示意图;FIG. 10 is a schematic diagram of an embodiment of a terminal in the embodiment of the present application;

图11为本申请实施例中服务器的另一个实施例示意图;FIG. 11 is a schematic diagram of another embodiment of the server in the embodiment of the present application;

图12为本申请实施例中终端的另一个实施例示意图。FIG. 12 is a schematic diagram of another embodiment of a terminal in the embodiment of the present application.

具体实施方式Detailed ways

下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。The following will describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

关于前面所说的通过终端对比基站特征参数来识别伪基站的方法为:当终端接入基站时,解析基站的特征参数,包括小区标识或者称为基站的扇区标识(cellidentification,CID)、位置区标识(location area code,LAC)及系统信息等。然后将特征参数与本地预置的参数库进行匹配,如果在合法范围内就认为是合法的基站。否则认为是伪基站,直接从终端屏蔽接入伪基站。该方法的判断逻辑直接预置在终端芯片上,判断后可以直接屏蔽终端设备接入基站。但是,该判断逻辑完全依赖终端,无法进行系统升级。随着伪基站技术的发展一些特征参数也是可以进行调整的,但是终端无法动态获得,容易导致误判。Regarding the above-mentioned method of identifying a pseudo base station by comparing the characteristic parameters of the base station with the terminal: when the terminal accesses the base station, analyze the characteristic parameters of the base station, including the cell identification or the sector identification (cell identification, CID) of the base station, the location Area identification (location area code, LAC) and system information, etc. Then match the characteristic parameters with the local preset parameter library, and if it is within the legal range, it is considered a legal base station. Otherwise, it is regarded as a pseudo base station, and access to the pseudo base station is directly blocked from the terminal. The judging logic of this method is directly preset on the terminal chip, and after judging, the terminal equipment can be directly shielded from accessing the base station. However, the judgment logic is completely dependent on the terminal, and system upgrades cannot be performed. With the development of pseudo base station technology, some characteristic parameters can also be adjusted, but the terminal cannot obtain it dynamically, which may easily lead to misjudgment.

而基于基站位置识别伪基站的方法为仅针对通知类消息进行判断存在风险,伪基站可以构造任意号码不一定都是通知类短信;运营商自身也存在移动基站,单从位置上比对并不完全可靠;另外设备侧上报的基站位置是通过算法计算获得的,本身存在误差。The method of identifying pseudo-base stations based on the location of the base station is risky only for notification messages. The pseudo-base station can construct any number that is not necessarily a notification-type text message; the operator itself also has mobile base stations, and it is not necessary to compare only from the location. It is completely reliable; in addition, the base station position reported by the device side is obtained through algorithm calculation, and there are errors in itself.

在本申请实施例中,本申请技术方案主要解决本地参数库无法及时更新导致的判断准确率问题以及使用服务器进行判断时由于数据上报来源限于通知类短信和运营商移动基站导致的判断准确率问题。In the embodiment of this application, the technical solution of this application mainly solves the problem of judgment accuracy caused by the failure of the local parameter database to be updated in time, and the judgment accuracy problem caused by the fact that the source of data reporting is limited to notification text messages and mobile base stations of the operator when using the server for judgment .

本申请实施例应用的通信系统框架图如图1所示,该通信系统可以包括终端和服务器。如图2所示,为本申请实施例所应用的一个场景示意图,A区域终端可以接入的合法基站有2号基站,B区域可以接入的正确基站有2、3、4号基站。A frame diagram of a communication system applied in the embodiment of the present application is shown in FIG. 1 , and the communication system may include a terminal and a server. As shown in Figure 2, which is a schematic diagram of a scenario applied in the embodiment of this application, the legal base station that the terminal in area A can access is base station No. 2, and the correct base stations that can be accessed in area B are base station No. 2, 3, and 4.

在本申请实施例中,服务器可以接收大量终端上报的事件的信息,事件的信息可以包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,所述事件可以为接收短信或者接收来电。再根据所述大量终端上报的事件的信息,获取真实基站的信息和伪基站的信息;所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述大量终端中接入伪基站的目标终端;所述服务器向所述目标终端发送伪基站的指示信息。这里对于确定伪基站的信息和真实基站的信息,如果越多的终端上报事件的信息,服务器所确定的结果就越准确。服务器再可以根据确定的真实基站的信息和伪基站的信息,再确定所述多个终端中接入基站为伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对终端上发生的事件引起警惕,小心上当受骗。In this embodiment of the application, the server may receive event information reported by a large number of terminals. The event information may include terminal identification, terminal location information, information about the base station accessed when the event occurred, and the time when the event occurred. The event may be receiving a text message or receiving an incoming call. Then, according to the event information reported by the large number of terminals, the information of the real base station and the information of the pseudo base station are obtained; A target terminal of a base station; the server sends indication information of a pseudo base station to the target terminal. Here, for determining the information of the fake base station and the information of the real base station, if more terminals report event information, the result determined by the server will be more accurate. The server can further determine the target terminal of the multiple terminals that access the base station as a pseudo base station according to the determined information of the real base station and the information of the pseudo base station; The incident arouses vigilance and be careful of being deceived.

在本申请的实施例中,服务器还可以利用伪基站移动的特点结合终端的反馈信息,修改伪基站的可疑概率,更新真实基站的信息和伪基站的信息,从而使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。In the embodiment of this application, the server can also use the characteristics of the movement of the pseudo base station and the feedback information of the terminal to modify the suspicious probability of the pseudo base station, update the information of the real base station and the information of the pseudo base station, so that the server will receive the first terminal next time When reporting the information of the first event, it can be determined whether the first base station accessed by the terminal when the first event occurs is a pseudo base station according to the updated information of the real base station and the information of the pseudo base station. The accuracy of the result judged by the information and the information of the pseudo base station is higher.

在本申请的实施例中,服务器还可以根据真实基站的信息和伪基站的信息对应的可疑概率,选择一批可疑概率最高的基站的信息作为正例,可疑概率最低的基站的信息作为负例,进行模型训练,得到各个基站的信息中包括的各个特征的参考权重。这些各个特征的参考权重,可以用于服务器下次接收第一终端上报的第一事件的信息时,根据各个特征的参考权重和第一事件的信息,来计算发生第一事件时接入的第一基站的目标概率。若目标概率大于预设阈值,则服务器确定第一基站为真实基站;若目标概率小于等于所述预设阈值,则服务器确定第一基站为伪基站,服务器向该终端发送伪基站的指示信息。这样,服务器就可以根据各个特征的参考权重和第一事件的信息,来计算服务器新接收的终端发生第一事件时接入的第一基站是否为伪基站,提供了另外一种确定伪基站的实现方式,增加了方案的可行性。In the embodiment of this application, the server can also select a batch of base station information with the highest suspicious probability as positive examples, and base station information with the lowest suspicious probability as negative examples according to the suspicious probabilities corresponding to the information of the real base station and the fake base station information , perform model training to obtain the reference weights of each feature included in the information of each base station. The reference weights of these various features can be used for calculating the first event accessed when the first event occurs according to the reference weights of each feature and the information of the first event when the server receives the information of the first event reported by the first terminal next time. Target probability for a base station. If the target probability is greater than the preset threshold, the server determines that the first base station is a real base station; if the target probability is less than or equal to the preset threshold, the server determines that the first base station is a pseudo base station, and the server sends indication information of the pseudo base station to the terminal. In this way, the server can calculate whether the first base station accessed by the terminal newly received by the server when the first event occurs is a pseudo base station according to the reference weight of each feature and the information of the first event, providing another way to determine the pseudo base station The realization method increases the feasibility of the scheme.

下面以实施例的方式,对本申请实施例中服务器接收多个终端上报信息进行具体说明。如图3所示,为本申请实施例中提示方法的一个实施例示意图,包括:In the following, by way of an embodiment, the server receives the information reported by multiple terminals in the embodiment of the present application for specific description. As shown in Figure 3, it is a schematic diagram of an embodiment of the prompting method in the embodiment of the present application, including:

301、服务器接收多个终端发送的事件的信息。301. The server receives event information sent by multiple terminals.

在本申请实施例中,在服务器接收多个终端发送的事件的信息之前,终端发生检测事件发生并采集所述事件的信息,所述事件的信息可以包括所述终端标识(International Mobile Equipment Identity,IMEI)、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,发生事件的时间也可以称为时间戳(timestamp)。终端向服务器发送所述事件的信息,应理解,该事件可以包括接收短信和/或接收来电。该事件的信息还可以包括短信的内容和/或来电的号码等信息。In the embodiment of the present application, before the server receives the event information sent by multiple terminals, the terminal detects the occurrence of the event and collects the information of the event, and the information of the event may include the terminal identification (International Mobile Equipment Identity, IMEI), the location information of the terminal, the information of the access base station when the event occurs, the time when the event occurs, and the time when the event occurs may also be called a timestamp (timestamp). The terminal sends information about the event to the server. It should be understood that the event may include receiving a short message and/or receiving an incoming call. The event information may also include information such as the content of the short message and/or the number of the incoming call.

该终端可以为包括手机、平板电脑、PDA(Personal Digital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑等任意终端设备,在下述的示例中,可以以终端为手机为例进行说明。如图4(a)所示,为手机接收短信界面显示的一个示意图。如图4(b)所示,为手机接收来电界面显示的一个示意图。The terminal can be any terminal device including mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, sales terminal), vehicle-mounted computer, etc. In the following example, the terminal can be a mobile phone as example to illustrate. As shown in FIG. 4( a ), it is a schematic diagram of an interface displayed on a mobile phone for receiving short messages. As shown in FIG. 4( b ), it is a schematic diagram displayed on an interface of a mobile phone receiving an incoming call.

其中,终端的位置信息可以利用全球定位系统(Global Positioning System,GPS)获得经纬度、或者利用网络计算经纬度。终端的位置信息可以包括但不限于经纬度、接入无线保真(Wireless Fidelity,WiFi)的无线接入点的物理地址(Basic Service Setidentifier,BSSID)/无线接入点的标识或服务集标识(Service Set Identifier,SSID)/媒体接入控制地址(Medium Access Control address,MAC addr)/网络标识(NetworkID),当前扫描到的WiFi SSID等信息。发生事件时接入的基站的信息可以包括基站的扇区标识、也可以称为小区标识(cell identification,CID)、LAC、相邻的CID,还可以包括信号强度、小区信息等信息。Wherein, the location information of the terminal may use a Global Positioning System (Global Positioning System, GPS) to obtain the latitude and longitude, or use the network to calculate the latitude and longitude. The location information of the terminal may include but not limited to latitude and longitude, the physical address (Basic Service Setidentifier, BSSID) of the wireless access point (Basic Service Setidentifier, BSSID)/the identifier of the wireless access point or the service set identifier (Service Set Identifier, SSID)/Medium Access Control address (Medium Access Control address, MAC addr)/Network ID (NetworkID), currently scanned WiFi SSID and other information. The information of the base station accessed when the event occurs may include the sector identifier of the base station, which may also be called cell identification (CID), LAC, adjacent CID, and may also include information such as signal strength and cell information.

应理解,这里的多个终端发生事件时接入的基站的信息可以相同,也可以不同,发生事件的时间可以相同,也可以不同。还有可能是相同的终端发送多个事件的信息,这多个事件的信息可以相同,也可以不同,由终端实际采集的事件的信息所决定。It should be understood that the information of base stations accessed by multiple terminals when an event occurs here may be the same or different, and the time when the event occurs may be the same or different. It is also possible that the same terminal sends information of multiple events, and the information of these multiple events may be the same or different, which is determined by the event information actually collected by the terminal.

302、所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。302. The server acquires information about real base stations and information about pseudo base stations according to event information sent by the multiple terminals.

服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。所述服务器可以通过大数据的计算获取真实基站的信息和伪基站的信息。关于多个终端发送的事件的信息的说明,下面举例说明:The server acquires the information of the real base station and the information of the pseudo base station according to the event information sent by the multiple terminals. The server can obtain the information of the real base station and the information of the pseudo base station through the calculation of big data. Regarding the description of the event information sent by multiple terminals, the following example illustrates:

例如,在一种可能的实现方式中,服务器可以设置一个数量阈值,当接收发送事件的信息的终端数量超过该数量阈值时,服务器可以根据这些超过数量阈值的终端发送的事件的信息,获取真实基站的信息和伪基站的信息。For example, in a possible implementation manner, the server may set a quantity threshold, and when the number of terminals receiving and sending event information exceeds the quantity threshold, the server may acquire real Base station information and pseudo base station information.

在另一种可能的实现方式中,服务器还可以设置一个特定阈值,该特定阈值是针对事件的信息的数量来说的,即当服务器收到超过特定阈值的事件的信息,服务器可以根据超过特定阈值的事件的信息获取真实基站的信息和伪基站的信息。In another possible implementation, the server can also set a specific threshold, which refers to the amount of event information, that is, when the server receives information about events exceeding a specific threshold, the server can The event information of the threshold value obtains the information of the real base station and the information of the fake base station.

在另一种可能的实现方式中,服务器还可以设置一个预置时长,服务器可以根据在预置时长内接收的多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。还可以有其他对多个终端发送的事件的信息的说明,此处不做限定。In another possible implementation manner, the server may also set a preset duration, and the server may obtain information about real base stations and information about pseudo base stations according to received event information sent by multiple terminals within the preset duration. There may also be other descriptions of the event information sent by multiple terminals, which is not limited here.

服务器可以通过多种方式根据多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。下面将举例分别进行说明:The server may obtain the information of the real base station and the information of the pseudo base station according to the event information sent by multiple terminals in various ways. The following will illustrate with examples:

服务器可以根据多个终端发送的事件的信息,获取真实基站的信息,可以包括:The server can obtain the information of the real base station according to the event information sent by multiple terminals, which may include:

所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;所述服务器从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;所述服务器去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;所述服务器确定所述筛选基站的信息为真实基站的信息。The server determines the longitude, latitude, and date according to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurred, the time when the event occurred, and the preset location calculation accuracy. The information of the initial base station; the server deletes the information of the initial base station whose occurrence times is less than the first threshold in consecutive days from the information about the initial base station of longitude, latitude, and date; the server removes the date, The information of other initial base stations is combined to obtain the information about the longitude and latitude screening base stations; the server determines that the information of the screening base stations is the information of real base stations.

举例1:服务器根据大量终端的位置信息(终端利用全球定位系统(GlobalPositioning System,GPS)获得的经纬度、或利用网络计算的经纬度)、终端在接收短信和/或来电时接入的基站信息(这里以CID和LAC进行说明)、接收短信和/或来电的时间,或终端当前接入的基站信息,相邻CID信息等信息来确定真实基站的信息。Example 1: The server bases on the location information of a large number of terminals (the latitude and longitude obtained by the terminal using the Global Positioning System (Global Positioning System, GPS), or the latitude and longitude calculated by using the network), the base station information that the terminal accesses when receiving a short message and/or an incoming call (here CID and LAC are used for illustration), the time of receiving SMS and/or incoming call, or the base station information currently accessed by the terminal, adjacent CID information and other information to determine the information of the real base station.

首先,地理位置采取一定的计算精度(如对经纬度小数位进行限制,如精确到5位小数),再结合数据的采集日期,即经度(longitude,lng)、纬度(latitude,lat)、日期(date),那么,此时可以获得一组关于经度、纬度、日期的数据[lat,lng,date]={cid,lac;cid,lac;…};需要说明的是,这里由于lat、lng、date实际取值的不同,可以得到多组关于经度、纬度、日期的数据。First of all, the geographic location adopts a certain calculation accuracy (for example, to limit the decimal places of latitude and longitude, such as accurate to 5 decimal places), combined with the date of data collection, that is, longitude (longitude, lng), latitude (latitude, lat), date ( date), then a group of data [lat, lng, date]={cid, lac; cid, lac;...} about longitude, latitude and date can be obtained at this time; Depending on the actual value of date, multiple sets of data about longitude, latitude, and date can be obtained.

例如:[lat1,lng1,date1]={cid1,lac1;cid2,lac2;cid3,lac3};For example: [lat1, lng1, date1] = {cid1, lac1; cid2, lac2; cid3, lac3};

[lat1,lng2,date1]={cid1,lac1;cid3,lac3;cid4,lac4};[lat1, lng2, date1] = {cid1, lac1; cid3, lac3; cid4, lac4};

[lat1,lng2,date2]={cid2,lac2;cid3,lac3;cid4,lac4};[lat1, lng2, date2] = {cid2, lac2; cid3, lac3; cid4, lac4};

[lat2,lng1,date1]={cid8,lac8;cid5,lac5;cid6,lac6};[lat2, lng1, date1] = {cid8, lac8; cid5, lac5; cid6, lac6};

[lat2,lng2,date1]={cid5,lac5;cid6,lac6;cid7,lac7};[lat2, lng2, date1] = {cid5, lac5; cid6, lac6; cid7, lac7};

[lat2,lng2,date2]={cid5,lac5;cid6,lac6;cid7,lac7}。[lat2, lng2, date2] = {cid5, lac5; cid6, lac6; cid7, lac7}.

需要说明的是,上述只是以这几组数据来进行举例说明,实际应用中,数量要比上述这几组数据多的多,因为少量的数据,所确定的结果没有太大的参考性,本实施例就是为了提高获取的伪基站的准确率所提出的方案,所以,数据越多,所确定的结果也就越准确,当然,这些数据的处理需要在服务器的负载范围内。It should be noted that the above is just an example of these sets of data. In practical applications, the number is much larger than the above sets of data. Because of a small amount of data, the determined results are not very informative. The embodiment is a solution proposed to improve the accuracy of the acquired pseudo base station, so the more data there is, the more accurate the determined result will be. Of course, the processing of these data needs to be within the load range of the server.

其次,服务器再根据得到的大量关于经度、纬度、日期的数据,按照经纬度进行数据合并,合并过程中,对于连续日期内出现接入不稳定的基站(如某一区域内仅出现过一天接入的基站)进行剔除,可以获得关于经度、纬度的数据[lat,lng]={cid,lac;cid,lac…},即表示在区域[lat,lng]范围内接入的基站是合法基站,也就是真实基站。Secondly, the server merges the data according to the longitude and latitude according to the large amount of data obtained about longitude, latitude, and date. base station) to remove the longitude and latitude data [lat, lng] = {cid, lac; cid, lac...}, which means that the base station accessed within the area [lat, lng] is a legal base station, That is the real base station.

那么,在上述的示例中,因为{cid8,lac8}的基站信息只出现过一次,可以将{cid8,lac8}的基站信息删除,其他基站信息进行合并。有[lat1,lng1]={cid1,lac1;cid2,lac2;cid3,lac3};Then, in the above example, because the base station information of {cid8, lac8} appears only once, the base station information of {cid8, lac8} can be deleted, and other base station information can be combined. have[lat1,lng1]={cid1,lac1;cid2,lac2;cid3,lac3};

[lat1,lng2]={cid1,lac1;cid2,lac2;cid3,lac3;cid4,lac4};[lat1, lng2] = {cid1, lac1; cid2, lac2; cid3, lac3; cid4, lac4};

[lat2,lng1]={cid8,lac8;cid5,lac5;cid6,lac6};[lat2, lng1] = {cid8, lac8; cid5, lac5; cid6, lac6};

[lat2,lng2]={cid5,lac5;cid6,lac6;cid7,lac7},这些信息就是筛选基站的信息。[lat2, lng2]={cid5, lac5; cid6, lac6; cid7, lac7}, these information are the information for screening base stations.

最后,服务器就得到一组筛选基站的信息数据[lat,lng]={cid,lac;cid,lac…},那么CC=[lat,lng]={cid,lac;cid,lac…},CC表示真实基站并可以标注可疑概率为0。Finally, the server obtains a set of information data [lat, lng]={cid, lac; cid, lac...} for screening base stations, then CC=[lat, lng]={cid, lac; cid, lac...}, CC Indicates the real base station and can mark the suspicious probability as 0.

在上述的示例中,在[lat1,lng1]这个区域内,真实基站的信息包括{cid1,lac1;cid2,lac2;cid3,lac3};在[lat1,lng2]这个区域内,真实基站的信息包括{cid1,lac1;cid2,lac2;cid3,lac3;cid4,lac4};在[lat2,lng1]这个区域内,真实基站的信息包括{cid8,lac8;cid5,lac5;cid6,lac6};在[lat2,lng2]这个区域内,真实基站的信息包括{cid5,lac5;cid6,lac6;cid7,lac7}。In the above example, in the area [lat1, lng1], the information of the real base station includes {cid1, lac1; cid2, lac2; cid3, lac3}; in the area [lat1, lng2], the information of the real base station includes {cid1, lac1; cid2, lac2; cid3, lac3; cid4, lac4}; in the area [lat2, lng1], the real base station information includes {cid8, lac8; cid5, lac5; cid6, lac6}; in [lat2 , lng2] In this area, the real base station information includes {cid5, lac5; cid6, lac6; cid7, lac7}.

服务器可以根据多个终端发送的事件的信息,获取伪基站的信息,可以包括:The server can obtain the information of the pseudo base station according to the event information sent by multiple terminals, which may include:

所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;所述服务器根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;所述服务器确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述服务器确定所述目标基站的信息为伪基站的信息。The server determines the location information of the terminal accessed by the target base station at the first time and The location information of the terminal accessed at the second time, the target base station is any base station accessed by the plurality of terminals when the event occurs; position information, calculating the first center position of the terminal to be accessed, and calculating the second center position of the terminal to be accessed according to the position information of the terminal accessed by the target base station at the second time; the server determines the The first central position is the first position of the target base station, and the second central position is determined to be the second position of the target base station; if the absolute value of the difference between the first position and the second position is greater than the second threshold, the server determines that the information of the target base station is information of a pseudo base station.

举例2:服务器根据大量终端的位置信息、终端在接收短信和/或来电时接入的基站信息(这里以CID和LAC进行说明)、接收短信和/或来电的时间来确定伪基站的信息,即服务器利用伪基站移动的特点(可移动,突然出现并消失),识别出可能潜在的伪基站。Example 2: The server determines the pseudo-base station information based on the location information of a large number of terminals, the base station information that the terminal accesses when receiving text messages and/or incoming calls (here, CID and LAC are used for illustration), and the time of receiving text messages and/or incoming calls. That is, the server identifies possible potential pseudo base stations by using the mobile characteristics of the pseudo base stations (movable, appearing and disappearing suddenly).

首先,服务器可以根据多个终端上报的事件的信息,获取终端的位置信息与终端在接收短信或者来电时接入的基站信息:[lat,lng,date]={cid,lac;cid,lac…}。获得每个基站出现时接入该基站的一组终端的位置信息:[cid,lac,timestamp]={lat,lng;lat,lng;…}。First, the server can obtain the location information of the terminal and the base station information that the terminal accesses when receiving a text message or an incoming call based on the event information reported by multiple terminals: [lat, lng, date]={cid, lac; cid, lac... }. Obtain the location information of a group of terminals accessing the base station when each base station appears: [cid, lac, timestamp]={lat, lng; lat, lng;  …}.

可以以基站1为例来进行说明,假设这个基站1的信息用[cid8,lac8]来表示,在第一时间接入的终端的位置信息包括:[cid8,lac8,timestamp1]={lat1,lng1;lat5,lng5;lat6,lng6;lat9,lng9;lat10,lng10;lat12,lng12};Base station 1 can be used as an example for illustration. Assume that the information of base station 1 is represented by [cid8, lac8], and the location information of the terminal accessed at the first time includes: [cid8, lac8, timestamp1]={lat1, lng1 ;lat5,lng5;lat6,lng6;lat9,lng9;lat10,lng10;lat12,lng12};

在第二时间接入的终端的位置信息包括:[cid8,lac8,timestamp2]={lat1,lng1;lat3,lng3;lat4,lng4;lat5,lng5;lat10,lng10;lat11,lng11};The location information of the terminal accessed at the second time includes: [cid8, lac8, timestamp2]={lat1, lng1; lat3, lng3; lat4, lng4; lat5, lng5; lat10, lng10; lat11, lng11};

在第三时间接入的终端的位置信息包括:[cid8,lac8,timestamp3]={lat1,lng1;lat3,lng3;lat4,lng4;lat5,lng5;lat9,lng9;lat12,lng12};The location information of the terminal accessed at the third time includes: [cid8, lac8, timestamp3]={lat1, lng1; lat3, lng3; lat4, lng4; lat5, lng5; lat9, lng9; lat12, lng12};

在第四时间接入的终端的位置信息包括:[cid8,lac8,timestamp4]={lat1,lng1;lat2,lng2;lat4,lng4;lat5,lng5;lat10,lng10;lat11,lng11}。The location information of the terminal accessed at the fourth time includes: [cid8, lac8, timestamp4]={lat1, lng1; lat2, lng2; lat4, lng4; lat5, lng5; lat10, lng10; lat11, lng11}.

其次,服务器可以计算出在第一时间这一组终端的第一中心位置,在第二时间这一组终端的第二中心位置,在第三时间这一组终端的第三中心位置,在第四时间这一组终端的第四中心位置。那么,可以认为第一中心位置是基站1在第一时间的位置,第二中心位置是基站1在第二时间的位置,第三中心位置是基站1在第三时间的位置,第四中心位置是基站1在第四时间的位置。Secondly, the server may calculate the first central position of the group of terminals at the first time, the second central position of the group of terminals at the second time, the third central position of the group of terminals at the third time, and the third central position of the group of terminals at the third time. Four times the fourth center position of this group of terminals. Then, it can be considered that the first central position is the position of base station 1 at the first time, the second central position is the position of base station 1 at the second time, the third central position is the position of base station 1 at the third time, and the fourth central position is the position of base station 1 at the fourth time.

最后,对于基站1在不同时间的位置,偏差在一定距离(例如500m)内的属于正常范围;偏差在500m以上的可以认为是移动基站。从而获得一组疑似移动基站的信息:MC={cid,lac;cid,lac;…}。Finally, for the position of base station 1 at different times, those with a deviation within a certain distance (for example, 500m) belong to the normal range; those with a deviation of more than 500m can be considered as mobile base stations. Thus, a group of suspected mobile base station information is obtained: MC={cid, lac; cid, lac; . . . }.

假设,经过上述的计算,基站1在不同时间的位置的差值的绝对值超过500m了,那么,就可以认为基站1为移动基站。上述只是以基站1为例来进行说明,其他的基站也是类似的处理方法,此处不再赘述。Assuming that, after the above calculation, the absolute value of the difference between the positions of the base station 1 at different times exceeds 500m, then the base station 1 can be considered as a mobile base station. The above description is only taking the base station 1 as an example, and other base stations also have similar processing methods, which will not be repeated here.

在MC的基础上,再次对比基站出现的时间,对于出现时间较短例如小于1天就消失的基站,形成可疑基站的信息:SC={cid,lac;cid,lac;…}。On the basis of MC, compare the appearance time of the base station again. For the base station that disappears after a short appearance time, for example, less than 1 day, the information of the suspicious base station is formed: SC={cid, lac; cid, lac;...}.

假设,对基站1位置的计算,上述的第一时间、第二时间、第三时间和第四时间在同一天,之前或者之后再没出现过这个基站,那么,这个基站1很大概率就是伪基站了。应理解,MC,SC都可以认为是伪基站的信息,并可以标识可疑概率为100%。Assuming that, for the calculation of the position of base station 1, the above-mentioned first time, second time, third time and fourth time are on the same day, and this base station has never appeared before or after, then this base station 1 has a high probability of being a fake base station. It should be understood that both the MC and the SC can be regarded as the information of the pseudo base station, and the suspicious probability can be identified as 100%.

需要说明的是,在上面计算出第一中心位置之后,还可以对偏离该第一中心位置较大的终端位置进行排除后,再计算一次这一组终端(排除了偏离第一中心位置较大的终端)的第一目标中心位置;同样的,对于计算出第二中心位置之后,还可以对偏离该第二中心位置较大的终端位置进行排除后,再计算一次这一组终端(排除了偏离第二中心位置较大的终端)的第二目标中心位置;其他都可以类似处理,此处不再赘述。因为如果终端的位置与第一中心位置和第二中心位置偏差太远的话,那就说明,计算出的这个中心位置与基站的位置偏差较大,用来表示基站的位置的可靠性较差,所以,可以排除掉偏差较大的终端位置,再进行一次计算,用来表示基站的位置,准确率就相对高些。这里用第一目标中心位置和第二目标中心位置表示基站在不同时间的位置,后续的计算方法和上述的描述类似,此处不再赘述。It should be noted that, after the first center position is calculated above, it is also possible to exclude terminal positions that deviate greatly from the first center position, and then calculate this group of terminals again (excluding terminal positions that deviate greatly from the first center position) the first target center position of the terminal); similarly, after calculating the second center position, it is also possible to exclude the terminal positions that deviate from the second center position, and then calculate this group of terminals again (excluding The second target center position of the terminal that is far from the second center position); other things can be handled similarly, and will not be repeated here. Because if the position of the terminal deviates too far from the first central position and the second central position, it means that the calculated central position deviates greatly from the position of the base station, and the reliability of the position used to indicate the base station is poor. Therefore, the position of the terminal with a large deviation can be excluded, and another calculation is performed to indicate the position of the base station, and the accuracy rate is relatively high. Here, the first target center position and the second target center position are used to represent the positions of the base station at different times, and the subsequent calculation method is similar to the above description, and will not be repeated here.

还需要说明的是,服务器根据多个终端发送的事件的信息来获取真实基站的信息和伪基站的信息包括但不限于上述所提及的方法。例如,如果获取了伪基站的信息,那么,服务器可以根据多个终端上报的所有基站的信息,确定除了伪基站的信息,剩下的可以认为是真实基站的信息;也可以是获取了真实基站的信息,那么,服务器可以根据多个终端上报的所有基站的信息,确定除了真实基站的信息,剩下的可以认为是伪基站的信息。It should also be noted that the server acquires the information of the real base station and the information of the pseudo base station according to the event information sent by multiple terminals, including but not limited to the methods mentioned above. For example, if the information of the pseudo-base station is obtained, the server can determine, based on the information of all the base stations reported by multiple terminals, that the remaining information of the pseudo-base station can be regarded as the information of the real base station; Then, according to the information of all the base stations reported by multiple terminals, the server can determine that, except the information of the real base station, the remaining information can be regarded as the information of the pseudo base station.

303、所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端。303. The server determines, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals.

在本申请实施例中,举例说明,真实基站的信息如下表1所示:In the embodiment of this application, as an example, the information of the real base station is shown in Table 1 below:

表1Table 1

伪基站的信息如下表2所示:The information of the pseudo base station is shown in Table 2 below:

表2Table 2

所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端,可以是确定所述多个终端中发生所述事件时接入的基站为伪基站的目标终端,假设有100个终端接入的是伪基站,那么服务器可以向这100个终端发送伪基站的指示信息。The server determines, according to the information of the real base station and the information of the pseudo base station, the target terminal that accesses the pseudo base station among the multiple terminals, which may be the one that is accessed when the event occurs among the multiple terminals. The base station is a target terminal of the pseudo base station. Assuming that 100 terminals access the pseudo base station, the server may send indication information of the pseudo base station to the 100 terminals.

304、所述服务器将伪基站的指示信息发送给所述目标终端。304. The server sends the indication information of the pseudo base station to the target terminal.

示例性的,服务器向这100个终端发送伪基站的指示信息可以同时发送,也可以根据终端的优先级来发送伪基站的指示信息,具体此处不做限定。需要说明的是,在实际应用中,服务器也可以向所述多个终端中发生事件时接入的基站为真实基站的终端发送真实基站的指示信息。Exemplarily, the server may send the indication information of the pseudo base station to the 100 terminals at the same time, or may send the indication information of the pseudo base station according to the priority of the terminals, which is not specifically limited here. It should be noted that, in practical applications, the server may also send the indication information of the real base station to a terminal among the plurality of terminals whose base station accessed when the event occurs is a real base station.

305、所述目标终端提示所述伪基站的指示信息。305. The target terminal prompts the indication information of the pseudo base station.

在本申请实施例中,目标终端可以通过所述事件对应的应用界面显示所述事件的信息,所述事件的信息可以包括短信内容和/或来电号码。所述目标终端提示所述伪基站的指示信息,可以包括但不限于以下几种实现方式:In this embodiment of the present application, the target terminal may display the event information through the application interface corresponding to the event, and the event information may include short message content and/or caller number. The target terminal prompts the indication information of the pseudo base station, which may include but not limited to the following implementations:

方式1:所述终端通过文字显示所述伪基站的指示信息。Mode 1: The terminal displays the indication information of the pseudo base station in text.

方式2:所述终端通过语音提示所述伪基站的指示信息。Mode 2: the terminal prompts the indication information of the pseudo base station by voice.

方式3:所述终端通过危险标识显示所述伪基站的指示信息。Manner 3: The terminal displays the indication information of the pseudo base station through the danger sign.

目标终端上可以通过所述事件对应的应用界面提示所述伪基站的信息。即手机可以通过短信对应的短信界面,和/或,来电对应的来电界面,和/或,语音提示所述伪基站的指示信息。这里的目标终端可以指上述的100个终端,以其中的一个为例(如手机)来进行说明。The information of the pseudo base station may be prompted on the target terminal through an application interface corresponding to the event. That is, the mobile phone can prompt the instruction information of the pseudo base station through the short message interface corresponding to the short message, and/or the incoming call interface corresponding to the incoming call, and/or voice prompt. The target terminal here may refer to the above 100 terminals, and one of them (such as a mobile phone) is taken as an example for illustration.

在一种可能的实现方式中,终端可以通过文字显示伪基站的指示信息。假设,手机接收短信显示的短信内容11,在短信界面上通过文字21显示伪基站的指示信息。如图4(c)所示,为手机通过短信界面显示伪基站的指示信息的一个示意图。在图4(c)中,伪基站的指示信息为“疑似欺诈短信”的文字指示。假设,手机接收来电显示的来电号码12,在来电界面上通过文字21显示伪基站的指示信息。如图4(d)所示,为手机通过来电界面显示伪基站的指示信息的另一个示意图。在图4(d)中,伪基站的指示信息为“疑似欺诈来电”的文字指示。需要说明的是,关于文字提示还可以是高风险短信或者高风险来点等提示,具体不做限定。In a possible implementation manner, the terminal may display the indication information of the pseudo base station in text. Assume that the mobile phone receives the message content 11 displayed in the message, and displays the instruction information of the pseudo base station through text 21 on the message interface. As shown in FIG. 4( c ), it is a schematic diagram of displaying indication information of a pseudo base station by a mobile phone through a short message interface. In FIG. 4(c), the indication information of the pseudo base station is a text indication of "suspected fraudulent SMS". Assume that the mobile phone receives the caller number 12 of the caller ID, and displays the instruction information of the pseudo base station through text 21 on the caller interface. As shown in FIG. 4( d ), it is another schematic diagram of a mobile phone displaying indication information of a pseudo base station through an incoming call interface. In FIG. 4( d ), the indication information of the pseudo base station is a text indication of "suspected fraudulent call". It should be noted that the text reminder can also be a high-risk text message or a high-risk call reminder, which is not specifically limited.

在另一种可能的实现方式中,终端可以通过语音提示伪基站的指示信息。假设,手机接收短信显示的短信内容11,在短信界面上通过语音22提示伪基站的指示信息。如图4(e)所示,为手机根据伪基站的指示信息对接收的短信进行语音提醒的一个示意图。在图4(e)中,伪基站的指示信息会触发预置的语音功能,手机通过播放语音(例如预置的语音可以是此短信可能是欺诈短信等,或者是由*******号码发送的短信可能是欺诈短信等)来提醒用户。假设,手机接收来电显示的来电号码12,在来电界面上通过语音22提示伪基站的指示信息。如图4(f)所示,为手机根据伪基站的指示信息对接收的来电进行语音提醒的一个示意图。在图4(f)中,伪基站的指示信息会触发预置的语音功能,手机通过播放语音(例如预置的语音可以是此号码可能是欺诈号码,请谨慎接听等)来提醒用户。In another possible implementation manner, the terminal may prompt the indication information of the pseudo base station by voice. Assume that the mobile phone receives the text message content 11 displayed in the text message, and prompts the instruction information of the pseudo base station through voice 22 on the text message interface. As shown in FIG. 4( e ), it is a schematic diagram of the mobile phone performing a voice reminder to the received short message according to the indication information of the pseudo base station. In Figure 4(e), the instruction information of the pseudo base station will trigger the preset voice function. *The text message sent by the number may be a fraudulent text message, etc.) to remind the user. Assume that the mobile phone receives the caller number 12 of the caller display, and prompts the instruction information of the pseudo base station through voice 22 on the caller interface. As shown in FIG. 4( f ), it is a schematic diagram of a mobile phone performing a voice reminder for an incoming call received according to the instruction information of the pseudo base station. In Figure 4(f), the instruction information of the pseudo base station will trigger the preset voice function, and the mobile phone will remind the user by playing the voice (for example, the preset voice may be that this number may be a fraudulent number, please answer carefully, etc.).

在另一种可能的实现方式中,终端可以通过危险图标提示伪基站的指示信息。假设,手机接收短信显示的短信内容11,在短信界面上通过危险图标23提示伪基站的指示信息。如图4(g)所示,为手机根据伪基站的指示信息通过危险图标对接收的短信进行提醒的一个示意图。在图4(g)中,伪基站的指示信息会触发危险图标,手机通过短信界面显示危险图标来提醒用户。假设,手机接收来电显示的来电号码12,在来电界面上通过危险图标23提示伪基站的指示信息。如图4(h)所示,为手机根据伪基站的指示信息通过危险图标对接收的来电进行提醒的一个示意图。在图4(h)中,伪基站的指示信息会触发危险图标,手机通过来电界面显示危险图标来提醒用户。需要说明的是,危险图标可以包括但不限于图4(g)和4(h)中所示的三角加感叹号的提示,还可以直接是三角图标的提示或者感叹号图标或者其他的危险提示方式。In another possible implementation manner, the terminal may prompt the indication information of the pseudo base station through a danger icon. Assume that the mobile phone receives the message content 11 displayed in the message, and prompts the instruction information of the fake base station through the danger icon 23 on the message interface. As shown in FIG. 4(g), it is a schematic diagram of the mobile phone reminding the received short message through the danger icon according to the indication information of the pseudo base station. In Figure 4(g), the indication information of the fake base station will trigger the danger icon, and the mobile phone will display the danger icon through the SMS interface to remind the user. Suppose, the mobile phone receives the caller number 12 of the caller display, and prompts the instruction information of the fake base station through the danger icon 23 on the caller interface. As shown in FIG. 4(h), it is a schematic diagram of a mobile phone reminding a received incoming call through a danger icon according to the indication information of the pseudo base station. In Figure 4(h), the indication information of the fake base station will trigger the danger icon, and the mobile phone will display the danger icon on the incoming call interface to remind the user. It should be noted that the danger icon may include, but not limited to, the prompt of a triangle plus an exclamation mark as shown in Fig. 4(g) and 4(h), and may also directly be a prompt of a triangle icon or an exclamation mark icon or other danger prompting methods.

需要说明的是,关于伪基站的指示信息的提示包括但不限于上述所提及的几种实现方式,还可以通过其他方式来实现,具体不做限定。例如:文字+语音的提示方式:如图4(i)所示,为手机根据伪基站的指示信息通过文字和语音对接收的短信进行提醒的一个示意图。如图4(j)所示,为手机根据伪基站的指示信息通过文字和语音对接收的来电进行提醒的一个示意图。It should be noted that the prompting of the indication information about the pseudo base station includes but is not limited to the above-mentioned several implementation manners, and may also be implemented in other manners, which are not specifically limited. For example: text+voice prompting method: as shown in Figure 4(i), it is a schematic diagram of the mobile phone reminding the received short message through text and voice according to the instruction information of the pseudo base station. As shown in FIG. 4(j), it is a schematic diagram of the mobile phone reminding the received incoming call through text and voice according to the instruction information of the pseudo base station.

文字+危险图标的提示方式:如图4(k)所示,为手机根据伪基站的指示信息通过文字和危险图标对接收的短信进行提醒的一个示意图。如图4(l)所示,为手机根据伪基站的指示信息通过文字和危险图标对接收的来电进行提醒的一个示意图。Prompt method of text + danger icon: as shown in Fig. 4(k), it is a schematic diagram of the mobile phone reminding the received text message through text and danger icon according to the instruction information of the pseudo base station. As shown in Figure 4(l), it is a schematic diagram of the mobile phone reminding the received incoming call through text and danger icons according to the instruction information of the pseudo base station.

语音+危险图标的提示方式:如图4(m)所示,为手机根据伪基站的指示信息通过语音和危险图标对接收的短信进行提醒的一个示意图。如图4(n)所示,为手机根据伪基站的指示信息通过语音和危险图标对接收的来电进行提醒的一个示意图。Prompt mode of voice + danger icon: as shown in Figure 4(m), it is a schematic diagram of the mobile phone reminding the received text message through voice and danger icon according to the instruction information of the pseudo base station. As shown in FIG. 4(n), it is a schematic diagram of the mobile phone reminding the received incoming call through voice and danger icon according to the indication information of the pseudo base station.

在另一种可能的实现方式中,对于短信,终端可以将短信自动归类到垃圾短信列表中来提示伪基站的指示信息,如图4(o)所示,为手机将短信自动归类到垃圾短信列表中来提示伪基站的指示信息。对于来电,终端可以通过自动拒绝接听来电来提示伪基站的指示信息,如图4(p)所示,为手机自动拒绝接听来电提示伪基站的指示信息的一个示意图。应理解,在上述短信界面或者来电界面上,对于文字提示伪基站的指示信息和图标提示伪基站的指示信息,其实现方式可以是弹框形式、悬浮形式或者气泡等其他形式,具体不做限定。步骤303-305是可选的步骤。In another possible implementation, for short messages, the terminal can automatically classify the short messages into the spam list to prompt the indication information of the pseudo base station, as shown in Figure 4(o), the mobile phone automatically classifies the short messages into The spam message list will prompt the instruction information of the fake base station. For an incoming call, the terminal can automatically reject the call to prompt the indication information of the pseudo base station, as shown in Figure 4(p), which is a schematic diagram of the mobile phone automatically rejecting the incoming call to prompt the indication information of the pseudo base station. It should be understood that on the above-mentioned text message interface or incoming call interface, for the indication information of the text prompting the pseudo base station and the indication information of the icon prompting the pseudo base station, the implementation method can be in the form of a pop-up frame, a floating form, or a bubble, etc., and is not specifically limited. . Steps 303-305 are optional steps.

在本申请实施例中,服务器是根据多个终端上报的大数据来获取真实基站的信息和伪基站的信息,所以,得到的真实基站的信息和伪基站的信息的准确率比较高。即服务器接收多个终端发送的事件的信息,事件的信息可以包括终端标识、终端的位置信息、发生事件时接入的基站的信息、发生事件的时间。服务器根据所述多个终端发送的事件的信息获取真实基站的信息和伪基站的信息。服务器还可以根据真实基站的信息和伪基站的信息,再确定所述多个终端中接入伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对目标终端上发生的事件引起警惕,小心上当受骗。In the embodiment of the present application, the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by multiple terminals, so the accuracy rate of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives event information sent by multiple terminals, and the event information may include terminal identifiers, terminal location information, information about base stations accessed when an event occurs, and time when the event occurs. The server obtains the information of the real base station and the information of the pseudo base station according to the event information sent by the multiple terminals. The server can also determine the target terminal that accesses the pseudo base station among the plurality of terminals according to the information of the real base station and the information of the pseudo base station; send the indication information of the pseudo base station to the target terminal, so that the user can understand the events that occur on the target terminal. Be vigilant and be careful not to be deceived.

如图5所示,为本申请实施例中提示方法的另一个实施例示意图,包括:As shown in Figure 5, it is a schematic diagram of another embodiment of the prompting method in the embodiment of the present application, including:

501、服务器接收多个终端发送的事件的信息。501. The server receives event information sent by multiple terminals.

502、所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。502. The server acquires information about real base stations and information about pseudo base stations according to event information sent by the multiple terminals.

503、所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端。503. The server determines, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals.

504、所述服务器将伪基站的指示信息发送给所述目标终端。504. The server sends the indication information of the pseudo base station to the target terminal.

505、所述目标终端提示所述伪基站的指示信息。505. The target terminal prompts the indication information of the pseudo base station.

在本申请实施例中,步骤501-505与上述图3所示实施例中的步骤301-305类似,此处不再赘述。In this embodiment of the present application, steps 501-505 are similar to steps 301-305 in the above-mentioned embodiment shown in FIG. 3 , and will not be repeated here.

506、所述服务器标记所述真实基站和所述伪基站的可疑概率。506. The server marks suspicious probabilities of the real base station and the pseudo base station.

在本申请实施例中,服务器根据多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息之后,对真实基站和伪基站的可疑概率可以进行标记,例如,标记真实基站的可疑概率为0,标记伪基站的可疑概率为100%。In the embodiment of the present application, after the server obtains the information of the real base station and the information of the fake base station according to the event information sent by multiple terminals, the suspicious probability of the real base station and the fake base station can be marked, for example, the suspicious probability of the real base station can be marked The probability is 0, and the suspicious probability of marking a fake base station is 100%.

举例1:如下述表3所示,为不同区域内关于真实基站和可疑概率的对应关系。Example 1: As shown in Table 3 below, it is the corresponding relationship between real base stations and suspicious probabilities in different areas.

表3table 3

举例2:如果将可疑基站和移动基站都认为是伪基站,如下述表4所示,为关于可疑基站、移动基站和可疑概率的对应关系。Example 2: If both the suspicious base station and the mobile base station are regarded as pseudo base stations, as shown in Table 4 below, it is the corresponding relationship between suspicious base stations, mobile base stations and suspicious probabilities.

可疑基站suspicious base station 可疑概率suspicious probability 移动基站mobile base station 可疑概率suspicious probability {cid8,lac8}{cid8, lac8} 100%100% {cid12,lac12}{cid12, lac12} 100%100% {cid15,lac15}{cid15, lac15} 100%100% {cid8,lac8}{cid8, lac8} 100%100% {cid19,lac19}{cid19, lac19} 100%100% {cid19,lac19}{cid19, lac19} 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid15,lac15}{cid15, lac15} 100%100% {cid36,lac36}{cid36, lac36} 100%100% {cid40,lac40}{cid40, lac40} 100%100%

表4Table 4

需要说明的是,在表4所示的移动基站和可疑基站可以认为是伪基站,只不过可疑基站是伪基站的可疑概率可能更高一些。因为在运营商中也存在移动基站,所以,移动基站是伪基站的可疑概率相对低一些。It should be noted that the mobile base stations and suspicious base stations shown in Table 4 can be considered as pseudo base stations, but the suspicious probability that the suspicious base stations are pseudo base stations may be higher. Because there are also mobile base stations in the operator, the suspicious probability that the mobile base station is a pseudo base station is relatively low.

举例3:还可以将移动基站中除可疑基站的其他基站的可疑概率标记的低一些,如下述表5所示,为关于可疑基站、移动基站和可疑概率的对应关系。Example 3: It is also possible to mark the suspicious probabilities of other base stations in the mobile base station lower than the suspicious base station, as shown in Table 5 below, which is the corresponding relationship between suspicious base stations, mobile base stations and suspicious probabilities.

可疑基站suspicious base station 可疑概率suspicious probability 移动基站mobile base station 可疑概率suspicious probability {cid8,lac8}{cid8, lac8} 100%100% {cid12,lac12}{cid12, lac12} 80%80% {cid15,lac15}{cid15, lac15} 100%100% {cid8,lac8}{cid8, lac8} 100%100% {cid19,lac19}{cid19, lac19} 100%100% {cid19,lac19}{cid19, lac19} 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid15,lac15}{cid15, lac15} 100%100% {cid36,lac36}{cid36, lac36} 80%80% {cid40,lac40}{cid40, lac40} 80%80%

表5table 5

需要说明的是,步骤506的时序可以在步骤502之后、507之前。It should be noted that the timing of step 506 may be after step 502 and before step 507 .

507、第一目标终端接收反馈信息。507. The first target terminal receives feedback information.

在本申请实施例中,第一目标终端可能是上述目标终端中的一个终端,也可能是上述目标终端中的多个终端,具体可根据实际情况确定。所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息。In this embodiment of the present application, the first target terminal may be one of the above-mentioned target terminals, or may be multiple terminals among the above-mentioned target terminals, which may be determined according to actual conditions. The feedback information is input information input by the user indicating whether the base station accessed by the terminal when the event occurs is a pseudo base station is accurate.

第一目标终端接收伪基站的指示信息后,第一目标终端会提示伪基站的指示信息。下面可以举例进行说明:如图6(a)所示,为手机在短信界面上显示输入反馈信息的一个示意图,还可以在短信界面上显示“请用户反馈一下,该短信是否为欺诈短信”,用户可以在可编辑的文本框31输入反馈信息。如图6(b)所示,为手机在短信界面上显示输入反馈信息的另一个示意图,也可以在短信界面上显示“是”和“否”标识32,用户直接点击“是”或者“否”的标识即可。当然,短信界面上还可以显示“忽视”的标识,或者没有输入文字,那么就代表这个反馈信息没有意义,不用上报给服务器。当用户在文本框输入反馈信息或者点击“是”或“否”的标识后,终端就可以接收对应的反馈信息。After the first target terminal receives the indication information of the pseudo base station, the first target terminal will prompt the indication information of the pseudo base station. The following can be illustrated with an example: as shown in Figure 6 (a), it is a schematic diagram of the mobile phone displaying input feedback information on the text message interface, and can also display "Please give feedback to the user whether the text message is a fraudulent text message" on the text message interface, The user can enter feedback information in the editable text box 31 . As shown in Figure 6(b), it is another schematic diagram of the mobile phone displaying input feedback information on the text message interface, and the "yes" and "no" signs 32 may also be displayed on the text message interface, and the user directly clicks "yes" or "no". " logo is enough. Of course, the "ignored" mark can also be displayed on the text message interface, or if no text is entered, it means that the feedback information is meaningless and there is no need to report it to the server. After the user enters feedback information in the text box or clicks on the sign of "yes" or "no", the terminal can receive the corresponding feedback information.

如图6(c)所示,为手机在来电界面上显示输入反馈信息的一个示意图,手机在来电界面上显示“请用户反馈一下,该来电是否为欺诈来电”,用户可以在可编辑的文本框31输入反馈信息。如图6(d)所示,为手机在来电界面上显示输入反馈信息的一个示意图,也可以在来电界面上显示“是”和“否”标识32,用户直接点击“是”或者“否”的标识即可。当然,来电界面上还可以显示“忽视”的标识,或者没有输入文字,那么就代表这个反馈信息没有意义,不用上报给服务器。从便利的角度来考虑,点击的操作对用户来说可能更方便一些。在来电界面上显示输入反馈信息还可以是在用户挂断电话后显示。当用户在文本框输入反馈信息或者点击“是”或“否”的标识后,终端就可以接收对应的反馈信息。As shown in Figure 6(c), it is a schematic diagram of the mobile phone displaying input feedback information on the incoming call interface. The mobile phone displays "Please give feedback to the user whether the incoming call is a fraudulent call" on the incoming call interface. The user can edit the text Box 31 inputs feedback information. As shown in Figure 6(d), it is a schematic diagram of the mobile phone displaying input feedback information on the incoming call interface, and may also display "yes" and "no" signs 32 on the incoming call interface, and the user directly clicks "yes" or "no". The identification of the . Of course, the "Ignore" logo can also be displayed on the incoming call interface, or if no text is entered, it means that the feedback information is meaningless and there is no need to report it to the server. From the perspective of convenience, the operation of clicking may be more convenient for users. The input feedback information displayed on the incoming call interface may also be displayed after the user hangs up the phone. After the user enters feedback information in the text box or clicks on the sign of "yes" or "no", the terminal can receive the corresponding feedback information.

需要说明的是,关于终端如何显示输入反馈信息的示意图可以包括但不限于上述所述的几种方式。关于用户输入反馈信息的说明可以是有些用户可能之前接收过该号码发送的短信或者接收过该号码的来电,再次接收相同号码发送的来电或者短信时,可以确定是否为欺诈短信或者欺诈来电,也可以是通过这次的通话,确定是否为欺诈来电,从而用户可以输入对应的反馈信息。在上述图6(a)-图6(d)任一显示输入反馈信息是以文字提示伪基站的指示信息来说明的,以语音提示伪基站的指示信息或者危险图标提示伪基站的指示信息时,显示输入反馈信息的示意图和图6(a)-图6(d)类似,此处不再赘述。It should be noted that, the schematic diagram of how the terminal displays the input feedback information may include but not limited to the above-mentioned several manners. The explanation about user input feedback information can be that some users may have received text messages or incoming calls from this number before, and when they receive incoming calls or text messages from the same number again, they can determine whether it is a fraudulent text message or a fraudulent call, or It may be through this call to determine whether it is a fraudulent call, so that the user can input corresponding feedback information. In any of the above-mentioned Figures 6(a)-6(d), the input feedback information is explained by prompting the indication information of the pseudo base station in text, and when the indication information of the pseudo base station is prompted by voice or the danger icon prompts the indication information of the pseudo base station , the schematic diagrams showing the input feedback information are similar to those shown in FIG. 6(a)-FIG. 6(d), and will not be repeated here.

508、第一目标终端将反馈信息发送给服务器。508. The first target terminal sends the feedback information to the server.

在本申请实施例中,假设,服务器之前确定接入伪基站的目标终端有100个,服务器向这100个目标终端发送了伪基站的指示信息。但是这100个目标终端只有50个接收到了用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息。那么,这50个目标终端可以将反馈信息上报给服务器。假设,有45个用户输入的是“否”的反馈信息,5个用户输入的是“是”的反馈信息。In the embodiment of the present application, it is assumed that the server previously determined that there are 100 target terminals accessing the pseudo base station, and the server sends indication information of the pseudo base station to the 100 target terminals. However, only 50 of the 100 target terminals have received the input information input by the user indicating whether the base station accessed when the event occurs by the terminal is a pseudo base station or not. Then, the 50 target terminals can report the feedback information to the server. Assume that 45 users input feedback information of "No", and 5 users input feedback information of "Yes".

509、所述服务器根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率。509. The server correspondingly modifies the suspicious probability of the pseudo base station according to the feedback information, and obtains the modified suspicious probability of the pseudo base station.

在本申请实施例中,假设,上述50个目标终端上报的反馈信息是针对基站{cid15,lac15}的,基站{cid15,lac15}对应的有45个“否”的反馈信息,5个“是”的反馈信息。那么,服务器可以确定基站{cid15,lac15}有90%的概率不是伪基站,10%的概率是伪基站。即对应的在上述表4和表5中可以将基站{cid15,lac15}的可疑概率修改为10%。当可疑概率小于等于可疑概率阈值时,可以认为这个基站为真实基站,这里假设这个可疑概率阈值为20%,那么,服务器可以将基站{cid15,lac15}的信息更新到真实基站的信息中,假设基站{cid15,lac15}出现的区域为[lat7,lng7],将基站{cid15,lac15}的信息更新到上述表3中,在表4和表5中删除基站{cid15,lac15}的信息。In the embodiment of this application, it is assumed that the feedback information reported by the above 50 target terminals is for the base station {cid15, lac15}, and the base station {cid15, lac15} corresponds to 45 "No" feedback information, and 5 "Yes" feedback information. " feedback information. Then, the server can determine that the base station {cid15, lac15} has a 90% probability that it is not a pseudo base station, and a 10% probability that it is a pseudo base station. That is, correspondingly, in the above Table 4 and Table 5, the suspicious probability of the base station {cid15, lac15} can be modified to 10%. When the suspicious probability is less than or equal to the suspicious probability threshold, the base station can be considered as a real base station, assuming that the suspicious probability threshold is 20%, then the server can update the information of the base station {cid15, lac15} to the information of the real base station, assuming The area where the base station {cid15, lac15} appears is [lat7, lng7], update the information of the base station {cid15, lac15} to the above Table 3, and delete the information of the base station {cid15, lac15} in Table 4 and Table 5.

如表6所示,为更新后的表3关于真实基站的信息和可疑概率的对应关系,如下所示:As shown in Table 6, the corresponding relationship between the information about the real base station and the suspicious probability in the updated Table 3 is as follows:

表6Table 6

如表7所示,为更新后的表4关于可疑基站、移动基站和可疑概率的对应关系,如下所示:As shown in Table 7, the corresponding relationship between suspicious base stations, mobile base stations and suspicious probabilities in Table 4 after updating is as follows:

可疑基站suspicious base station 可疑概率suspicious probability 移动基站mobile base station 可疑概率suspicious probability {cid8,lac8}{cid8, lac8} 100%100% {cid12,lac12}{cid12, lac12} 100%100% {cid19,lac19}{cid19, lac19} 100%100% {cid8,lac8}{cid8, lac8} 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid19,lac19}{cid19, lac19} 100%100% 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid36,lac36}{cid36, lac36} 100%100% {cid40,lac40}{cid40, lac40} 100%100%

表7Table 7

如表8所示,为更新后的表5关于可疑基站、移动基站和可疑概率的对应关系,如下所示:As shown in Table 8, the corresponding relationship between suspicious base stations, mobile base stations and suspicious probabilities in Table 5 after updating is as follows:

可疑基站suspicious base station 可疑概率suspicious probability 移动基站mobile base station 可疑概率suspicious probability {cid8,lac8}{cid8, lac8} 100%100% {cid12,lac12}{cid12, lac12} 80%80% {cid19,lac19}{cid19, lac19} 100%100% {cid8,lac8}{cid8, lac8} 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid19,lac19}{cid19, lac19} 100%100% {cid20,lac20}{cid20, lac20} 100%100% {cid36,lac36}{cid36, lac36} 80%80% {cid40,lac40}{cid40, lac40} 80%80%

表8Table 8

需要说明的是,在实际应用中,服务器接收的反馈信息可能是针对同一个基站,也可能是针对不同的基站,修改可疑概率的方式和上述类似,此处不再赘述。而且,更新真实基站的信息和伪基站的信息包括但不限于其他的实现方式,例如,对同一个基站来说,服务器在第一个时长内接收的反馈信息中,有2个“是”的反馈信息,6个“否”的反馈信息;在第二个时长内接收的反馈信息中,有1个“是”的反馈信息,8个“否”的反馈信息;在第三个时长内接收的反馈信息中,有0个“是”的反馈信息,10个“否”的反馈信息;可能这3次修改后,该基站的可疑概率还没有低于可疑概率阈值20%,但是服务器根据接收的反馈信息发现反馈“是”的反馈信息的数量越来越少,反馈“否”反馈信息的数量越来越多,那么,就可以认为该基站不是伪基站的可能性很大,服务器可以将该基站更新在真实基站的信息中。It should be noted that, in practical applications, the feedback information received by the server may be for the same base station, or may be for different base stations, and the method of modifying the suspicious probability is similar to the above, and will not be repeated here. Moreover, updating the information of the real base station and the information of the pseudo base station includes but is not limited to other implementations. For example, for the same base station, among the feedback information received by the server within the first duration, there are 2 "yes" Feedback information, 6 "No" feedback information; among the feedback information received within the second duration, there is 1 "Yes" feedback information and 8 "No" feedback information; received within the third duration Among the feedback information, there are 0 "yes" feedback information and 10 "no" feedback information; maybe after these 3 revisions, the suspicious probability of the base station is not lower than the suspicious probability threshold of 20%, but the server receives Feedback information found that the number of "yes" feedback information is getting less and less, and the number of "no" feedback information is increasing. Then, it can be considered that the base station is not a pseudo base station. The server can send The base station is updated in the information of the real base station.

在本申请实施例中,服务器是根据多个终端上报的大数据来获取真实基站的信息和伪基站的信息,所以,得到的真实基站的信息和伪基站的信息的准确率比较高。即服务器接收多个终端发送的事件的信息,该事件的信息可以包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。服务器根据所述多个终端发送的事件的信息获取真实基站的信息和伪基站的信息。服务器还可以根据确定的真实基站的信息和伪基站的信息,再确定所述多个终端中接入伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对目标终端上发生的事件引起警惕,小心上当受骗。In the embodiment of the present application, the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by multiple terminals, so the accuracy rate of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives event information sent by multiple terminals, and the event information may include terminal identifiers, terminal location information, information about base stations accessed when the event occurs, and time when the event occurs. The server obtains the information of the real base station and the information of the pseudo base station according to the event information sent by the multiple terminals. The server can also determine the target terminal that accesses the pseudo base station among the plurality of terminals according to the determined information of the real base station and the information of the pseudo base station; send the indication information of the pseudo base station to the target terminal, so that the user can check the information that occurs on the target terminal. The incident has aroused vigilance and be careful of being deceived.

进一步的,服务器还可以利用伪基站移动的特点结合终端的反馈信息,修改伪基站的可疑概率,更新真实基站的信息和伪基站的信息,从而使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。Furthermore, the server can also use the characteristics of the movement of the pseudo base station and the feedback information of the terminal to modify the suspicious probability of the pseudo base station, update the information of the real base station and the information of the pseudo base station, so that the server will receive the first event reported by the first terminal next time When the information of the real base station and the fake base station are updated, it can be determined whether the first base station accessed by the terminal when the first event occurs is a fake base station. The accuracy of the results judged by the information is higher.

如图7所示,为本申请实施例中提示方法的一个实施例示意图,包括:As shown in Figure 7, it is a schematic diagram of an embodiment of the prompting method in the embodiment of the present application, including:

701、服务器接收多个终端发送的事件的信息。701. The server receives event information sent by multiple terminals.

702、所述服务器根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。702. The server acquires information about real base stations and information about pseudo base stations according to event information sent by the multiple terminals.

703、所述服务器根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端。703. The server determines, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals.

704、所述服务器将伪基站的指示信息发送给所述目标终端。704. The server sends the indication information of the pseudo base station to the target terminal.

705、所述目标终端提示所述伪基站的指示信息。705. The target terminal prompts the indication information of the pseudo base station.

706、所述服务器标记所述真实基站和所述伪基站的可疑概率。706. The server marks suspicious probabilities of the real base station and the pseudo base station.

707、第一目标终端接收反馈信息。707. The first target terminal receives feedback information.

708、第一目标终端将反馈信息发送给服务器。708. The first target terminal sends the feedback information to the server.

709、所述服务器根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率。709. The server correspondingly modifies the suspicious probability of the pseudo base station according to the feedback information, and obtains the modified suspicious probability of the pseudo base station.

在本申请实施例中,步骤701-509与上述图5所示实施例中的步骤501-509类似,此处不再赘述。In this embodiment of the present application, steps 701-509 are similar to steps 501-509 in the above-mentioned embodiment shown in FIG. 5 , and will not be repeated here.

710、所述服务器确定目标伪基站的信息和目标真实基站的信息。710. The server determines information about the target pseudo base station and information about the target real base station.

在本申请实施例中,所述服务器可以根据真实基站的信息和伪基站的信息对应的可疑概率,确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息,可疑概率小于第四阈值的基站的信息为目标真实基站的信息。这些目标真实基站的信息和目标伪基站的信息包括但不限于cid、lac、信号强度、采集时间与上报时间的差异等信息。其中,采集时间指的是对应的终端发生事件的时间,上报时间指的是,终端向服务器发送事件的信息的时间,采集时间可以和上报时间相同,或者,上报时间在采集时间之后。In this embodiment of the present application, the server may determine, according to the suspicious probability corresponding to the information of the real base station and the information of the pseudo base station, that the information of the base station with a suspicious probability greater than the third threshold is the information of the target pseudo base station, and the suspicious probability is less than the fourth threshold The information of the base station is the information of the target real base station. The information of the target real base station and the target pseudo base station include but not limited to information such as cid, lac, signal strength, difference between collection time and reporting time, and the like. Wherein, the collection time refers to the time when the event occurs on the corresponding terminal, and the reporting time refers to the time when the terminal sends the event information to the server. The collection time may be the same as the reporting time, or the reporting time may be after the collection time.

711、所述服务器根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到基站的信息中包括的各个特征的参考权重。711. The server performs model training according to the information of the target pseudo base station and the information of the target real base station, and obtains reference weights of each feature included in the information of the base station.

在本申请实施例中,服务器根据所述目标伪基站的信息和所述目标真实基站的信息,可以使用Logistics算法等其他算法进行模型训练,得到基站的信息中包括的各个特征的参考权重。例如:cid=w1,lac=w2,信号强度=w3,时间差=w4……In this embodiment of the application, the server may use other algorithms such as the Logistics algorithm to perform model training according to the information of the target pseudo base station and the information of the target real base station, and obtain reference weights of each feature included in the information of the base station. For example: cid=w1, lac=w2, signal strength=w3, time difference=w4...

712、第一终端检测第一事件发生并采集所述第一事件的信息。712. The first terminal detects the occurrence of a first event and collects information about the first event.

在本申请实施例中,第一终端检测第一事件发生并采集所述第一事件的信息。所述第一事件的信息可以包括发生所述第一事件时接入的基站的信息,应理解,所述第一事件的信息还可以包括所述第一终端标识、所述第一终端的位置信息、发生所述第一事件的时间、第一短信的内容和/或第一来电的号码等信息。所述第一事件可以包括接收第一短信和/或第一来电。关于第一终端接收第一短信或者第一来电的示意图可以参考上述图4(a)和图4(b)所示,此处不再赘述。In this embodiment of the present application, the first terminal detects the occurrence of the first event and collects information about the first event. The information of the first event may include the information of the base station accessed when the first event occurs. It should be understood that the information of the first event may also include the identifier of the first terminal and the location of the first terminal. information, the time when the first event occurs, the content of the first short message and/or the number of the first incoming call and other information. The first event may include receiving a first text message and/or a first incoming call. For the schematic diagram of the first terminal receiving the first short message or the first incoming call, reference may be made to the above-mentioned FIG. 4( a ) and FIG. 4( b ), which will not be repeated here.

需要说明的是,步骤712可以在步骤702-713之间。It should be noted that step 712 may be between steps 702-713.

713、第一终端将第一事件的信息发送给服务器。713. The first terminal sends information about the first event to the server.

在本申请实施例中,所述服务器接收第一终端发送的第一事件的信息。需要说明的是,第一终端可以是前面所述多个终端中的终端,也可以是所述多个终端之外新接入的其他终端。而且,第一终端表示的数量不做限定,可以指代一个终端,也可以指代多个终端。在下述的说明中,以第一终端为手机1为例来进行说明。即服务器接收手机1发送的第一事件的信息,所述第一事件的信息包括所述手机1标识、所述手机1的位置信息、发生所述第一事件时接入的第一基站的信息、发生所述第一事件的时间。In this embodiment of the present application, the server receives information about the first event sent by the first terminal. It should be noted that, the first terminal may be a terminal among the aforementioned multiple terminals, or may be another newly accessed terminal other than the multiple terminals. Moreover, the number indicated by the first terminal is not limited, and may refer to one terminal, or may refer to multiple terminals. In the following description, the mobile phone 1 is taken as an example for description. That is, the server receives the information of the first event sent by the mobile phone 1, and the information of the first event includes the identification of the mobile phone 1, the location information of the mobile phone 1, and the information of the first base station accessed when the first event occurs , the time when the first event occurs.

其中,手机1的位置信息可以利用全球定位系统(Global Positioning System,GPS)获得的经纬度、或者利用网络计算的经纬度,手机的位置信息包括但不限于经纬度、接入无线保真(Wireless Fidelity,WiFi)的无线接入点的物理地址(Basic Service Setidentifier,BSSID)/无线接入点的标识或服务集标识(Service Set Identifier,SSID)/媒体接入控制地址(Medium Access Control address,MAC addr)/网络标识(NetworkID),当前扫描到的WiFi SSID等信息。手机1发生第一事件时接入的第一基站的信息可以包括基站的扇区标识、也可以称为小区标识(cell identification,CID)、LAC、相邻的CID,还可以包括信号强度、小区信息等信息。Wherein, the location information of the mobile phone 1 can use the longitude and latitude obtained by the Global Positioning System (Global Positioning System, GPS), or the longitude and latitude calculated by using the network. ) physical address of the wireless access point (Basic Service Setidentifier, BSSID)/identification of the wireless access point or service set identifier (Service Set Identifier, SSID)/media access control address (Medium Access Control address, MAC addr)/ Network ID (NetworkID), currently scanned WiFi SSID and other information. The information of the first base station accessed when the first event occurs on the mobile phone 1 may include the sector identifier of the base station, which may also be called cell identification (cell identification, CID), LAC, adjacent CID, and may also include signal strength, cell information etc.

714、服务器确定第一基站是否为伪基站。714. The server determines whether the first base station is a pseudo base station.

在本申请实施例中,第一基站的真伪确定可以有几种不同的实现方式,下面分别进行说明:In the embodiment of the present application, the authenticity determination of the first base station can be implemented in several different manners, which are described below:

第一种方式:服务器在数据库中保存的真实基站的信息和伪基站的信息中进行查找确定。The first way: the server searches and determines the real base station information and the fake base station information stored in the database.

若步骤712在步骤702之后、步骤709之前,服务器可以在根据多个终端发送的事件的信息获取的真实基站的信息和伪基站的信息中进行查找,若第一基站的信息在伪基站的信息中,则认为第一基站为伪基站,服务器可以向手机1发送伪基站的指示信息;若第一基站的信息在真实基站的信息中,则说明第一基站为真实基站,服务器可以不向手机1发送真实基站的指示信息。If step 712 is after step 702 and before step 709, the server can search in the information of the real base station and the information of the pseudo base station obtained according to the event information sent by multiple terminals, if the information of the first base station is in the information of the pseudo base station , it is considered that the first base station is a fake base station, and the server can send the indication information of the fake base station to mobile phone 1; 1. Send the indication information of the real base station.

若步骤712在步骤709之后、步骤713之前,服务器可以在更新后的真实基站的信息和伪基站的信息中进行查找,若第一基站的信息在更新后的伪基站的信息中,则认为第一基站为伪基站,服务器可以向手机1发送伪基站的指示信息,若第一基站的信息在更新后的真实基站的信息中,则说明第一基站为真实基站,服务器可以不向手机1发送真实基站的指示信息。If step 712 is after step 709 and before step 713, the server can search in the information of the updated real base station and the information of the pseudo base station, and if the information of the first base station is in the information of the updated pseudo base station, it is considered that the second If a base station is a pseudo base station, the server can send the indication information of the pseudo base station to the mobile phone 1. If the information of the first base station is in the updated information of the real base station, it means that the first base station is a real base station, and the server does not need to send the instruction information to the mobile phone 1. Instructions for real base stations.

第二种方式:若步骤712在步骤702之后、步骤709之前,服务器可以在数据库中保存的伪基站的信息和真实的伪基站的信息先查找第一基站的信息。或者,若步骤712在步骤709之后、步骤713之前,服务器可以在数据库中保存的更新的真实基站的信息和更新的伪基站的信息中先查找第一基站的信息。The second way: if step 712 is after step 702 and before step 709, the server may first search for the information of the first base station in the information of the pseudo base station and the information of the real pseudo base station stored in the database. Alternatively, if step 712 is after step 709 and before step 713, the server may first search for the information of the first base station in the updated information of the real base station and the updated information of the pseudo base station stored in the database.

如果没有查找到第一基站的信息,则所述服务器可以根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率。服务器确定第一基站的目标可疑概率Rate=sum(特征*权重)=cid*w1+lac*w2+信号强度*w3+时间差*w4+……。若所述目标概率小于等于所述第五阈值,则所述服务器确定所述第一站为伪基站。If the information of the first base station is not found, the server may determine the target probability of the first base station according to the information of the first event and the reference weight of each feature included in the information of the base station. The server determines the target suspicious probability of the first base station Rate=sum(feature*weight)=cid*w1+lac*w2+signal strength*w3+time difference*w4+.... If the target probability is less than or equal to the fifth threshold, the server determines that the first station is a pseudo base station.

需要说明的是,根据参考权重计算出来的目标概率范围在0和1之间,趋近于1的可以认为是真实基站,趋近于0的可以认为是伪基站。假设这里计算出来的目标概率为0.8,第五阈值可以设为0.6,0.8大于0.6,所以,服务器确定第一基站为真实基站。假设这里计算出来的目标概率为0.3,第五阈值可以设为0.6,0.3小于0.6,所以,服务器确定第一基站为伪基站。It should be noted that the range of the target probability calculated according to the reference weight is between 0 and 1, and those close to 1 can be regarded as real base stations, and those close to 0 can be regarded as pseudo base stations. Assuming that the target probability calculated here is 0.8, the fifth threshold may be set to 0.6, and 0.8 is greater than 0.6. Therefore, the server determines that the first base station is a real base station. Assuming that the target probability calculated here is 0.3, the fifth threshold may be set to 0.6, and 0.3 is smaller than 0.6. Therefore, the server determines that the first base station is a pseudo base station.

第三种方式:所述服务器直接根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率。即服务器确定第一基站的目标可疑概率Rate=sum(特征*权重)=cid*w1+lac*w2+信号强度*w3+时间差*w4+……。若所述目标概率小于等于所述第五阈值,则所述服务器确定所述第一基站为伪基站。A third manner: the server directly determines the target probability of the first base station according to the information of the first event and the reference weights of the features included in the information of the base station. That is, the server determines the target suspicious probability of the first base station Rate=sum(feature*weight)=cid*w1+lac*w2+signal strength*w3+time difference*w4+.... If the target probability is less than or equal to the fifth threshold, the server determines that the first base station is a pseudo base station.

715、若第一基站为伪基站,则所述服务器向所述第一终端发送伪基站的指示信息。715. If the first base station is a pseudo base station, the server sends indication information of the pseudo base station to the first terminal.

在本申请实施例中,若经过步骤714中所述的任意一种确定第一基站的真伪的方式,确定出第一基站是伪基站的话,所述服务器向所述第一终端发送伪基站的指示信息。In this embodiment of the present application, if it is determined that the first base station is a fake base station through any of the methods for determining the authenticity of the first base station described in step 714, the server sends the fake base station to the first terminal. instructions for the .

716、所述第一终端提示伪基站的指示信息。716. The first terminal prompts the indication information of the pseudo base station.

这里第一终端提示伪基站的指示信息的方式可以参考上述图4(c)-图4(p)任一的提示方式,此处不再赘述。Here, the manner in which the first terminal prompts the indication information of the pseudo base station may refer to any of the prompt manners in FIG. 4(c)-FIG. 4(p), which will not be repeated here.

在本申请实施例中,服务器是根据多个终端上报的大数据来获取真实基站的信息和伪基站的信息,所以,得到的真实基站的信息和伪基站的信息的准确率比较高。即服务器接收多个终端发送的事件的信息,事件的信息可以包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。服务器根据所述多个终端发送的事件的信息确定真实基站的信息和伪基站的信息。服务器还可以根据确定的真实基站的信息和伪基站的信息,再确定所述多个终端中接入伪基站的目标终端;向目标终端发送伪基站的指示信息,使得用户对目标终端上发生的第一事件引起警惕,小心上当受骗。In the embodiment of the present application, the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by multiple terminals, so the accuracy rate of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives event information sent by multiple terminals, and the event information may include terminal identifiers, terminal location information, information about base stations accessed when the event occurs, and time when the event occurs. The server determines the information of the real base station and the information of the pseudo base station according to the event information sent by the multiple terminals. The server can also determine the target terminal that accesses the pseudo base station among the plurality of terminals according to the determined information of the real base station and the information of the pseudo base station; send the indication information of the pseudo base station to the target terminal, so that the user can check the information that occurs on the target terminal. The first incident arouses vigilance and be careful of being deceived.

进一步的,服务器还可以利用伪基站移动的特点结合终端的反馈信息,修改伪基站的可疑概率,更新真实基站的信息和伪基站的信息,从而使得服务器下次接收第一终端上报的第一事件的信息时,可以根据更新的真实基站的信息和伪基站的信息来确定该终端发生第一事件时接入的第一基站是否为伪基站,这样根据实时更新的真实基站的信息和伪基站的信息判断出来的结果准确率更高。Furthermore, the server can also use the characteristics of the movement of the pseudo base station and the feedback information of the terminal to modify the suspicious probability of the pseudo base station, update the information of the real base station and the information of the pseudo base station, so that the server will receive the first event reported by the first terminal next time When the information of the real base station and the fake base station are updated, it can be determined whether the first base station accessed by the terminal when the first event occurs is a fake base station. The accuracy of the results judged by the information is higher.

更进一步的,服务器还可以根据真实基站的信息和伪基站的信息对应的可疑概率,选择一批可疑概率最高的基站的信息作为正例,可疑概率最低的基站的信息作为负例,进行模型训练,得到基站的信息包括的各个特征的参考权重。这些参考权重,可以用于服务器下次接收第一终端上报的第一事件的信息时,根据各个特征的参考权重和第一基站的信息,来计算发生第一事件时接入的第一基站的目标概率。若目标概率大于预设阈值,则服务器确定第一基站为真实基站;若目标概率小于等于所述预设阈值,则服务器确定第一基站为伪基站,服务器向该终端发送伪基站的指示信息。这样,服务器就可以根据基站的信息中包括的各个特征的参考权重,来计算服务器新接收的第一终端发生第一事件时接入是不是伪基站,提供了另外一种确定伪基站的实现方式,增加了方案的可行性。Furthermore, the server can also select a batch of base station information with the highest suspicious probability as positive examples and base station information with the lowest suspicious probability as negative examples according to the suspicious probabilities corresponding to the information of the real base station and the fake base station for model training. , to obtain the reference weight of each feature included in the information of the base station. These reference weights can be used when the server receives the information of the first event reported by the first terminal next time, according to the reference weights of each feature and the information of the first base station, to calculate the weight of the first base station accessed when the first event occurs. target probability. If the target probability is greater than the preset threshold, the server determines that the first base station is a real base station; if the target probability is less than or equal to the preset threshold, the server determines that the first base station is a pseudo base station, and the server sends indication information of the pseudo base station to the terminal. In this way, the server can calculate whether the access of the first terminal newly received by the server is a pseudo base station when the first event occurs according to the reference weight of each feature included in the information of the base station, providing another implementation method of determining a pseudo base station , increasing the feasibility of the scheme.

另一方面,根据大量终端上报的事件的信息以及用户的反馈信息可以对真实基站和伪基站的可疑概率进行不断的学习优化和校正,会大大提升判断的准确率;相对于“基于基站位置的识别方法”只能和运营商的已有基站数据进行对比分析,在判断移动基站的情况下有较高的准确率。服务器根据目标真实基站的信息和目标伪基站的信息实时进行模型训练,能够确保识别的准确性和实时性,对于新的伪基站可以及时发现;还可以根据大数据的技术,识别出伪基站的运动轨迹,进而可以更有效的预防伪基站诈骗甚至捕获伪基站。On the other hand, according to the event information reported by a large number of terminals and the feedback information of users, the suspicious probabilities of real base stations and pseudo base stations can be continuously learned, optimized and corrected, which will greatly improve the accuracy of judgment; "Identification method" can only be compared and analyzed with the existing base station data of the operator, and has a high accuracy rate in the case of judging mobile base stations. The server conducts model training in real time according to the information of the target real base station and the information of the target pseudo base station, which can ensure the accuracy and real-time performance of the recognition, and can detect new pseudo base stations in time; it can also identify the pseudo base station based on big data technology The trajectory of the movement can more effectively prevent fake base station fraud and even capture fake base stations.

如图8所示,为本申请实施例中提示方法的一个实施例示意图,包括:As shown in Figure 8, it is a schematic diagram of an embodiment of the prompting method in the embodiment of the present application, including:

801、第一终端检测第一事件发生并采集所述第一事件的信息;801. The first terminal detects the occurrence of a first event and collects information about the first event;

在本申请实施例中,该第一事件可以是第一终端上安装的应用所发生的第一事件,所述第一事件的信息可以包括所述第一终端标识、所述第一终端的位置信息、发生所述第一事件时接入的第一基站的信息、发生所述第一事件的时间,发生第一事件的时间也可以称为时间戳。该第一事件的信息还可以包括短信的内容和/或来电的号码等信息。第一终端上安装的应用可以是短信应用、呼叫应用等其他应用,此处不做限定。例如,第一终端检测到接收短消息,第一终端采集接收短消息的信息,或者,第一终端检测到接收来电,第一终端采集接收来电的信息。接收短消息或者接收来电的示意图可以参考图4(a)和4(b)所示,此处不再赘述。In this embodiment of the present application, the first event may be a first event that occurs in an application installed on the first terminal, and the information of the first event may include the first terminal identifier and the location of the first terminal information, information of the first base station accessed when the first event occurs, time when the first event occurs, and time when the first event occurs may also be referred to as a time stamp. The information of the first event may also include information such as the content of the short message and/or the number of the incoming call. The applications installed on the first terminal may be other applications such as SMS applications and call applications, which are not limited here. For example, when the first terminal detects that a short message is received, the first terminal collects information about the received short message; or, when the first terminal detects that an incoming call is received, the first terminal collects information about the incoming call. For a schematic diagram of receiving a short message or an incoming call, reference may be made to FIGS. 4( a ) and 4 ( b ), which will not be repeated here.

802、第一终端将所述第一事件的信息发送给服务器;802. The first terminal sends information about the first event to the server;

在本申请实施例中,第一终端可以将采集的接收短消息的信息,或者,接收采集的来电的信息发送给服务器。需要说明的是,当第一终端接收短消息或者接收来电时,接入的基站为伪基站,那么,第一终端是处于断网状态的,没法向服务器上报第一事件的信息,所以,第一终端需要等到处于网络连接状态的时候,发送所述第一事件的信息。In this embodiment of the present application, the first terminal may send the collected short message received information, or the collected incoming call received information, to the server. It should be noted that when the first terminal receives a short message or receives an incoming call, the base station accessed is a pseudo base station, then the first terminal is in a disconnected state and cannot report the information of the first event to the server. Therefore, The first terminal needs to wait until it is in a network connection state before sending the information of the first event.

803、第一终端接收所述服务器发送的伪基站的指示信息。803. The first terminal receives the indication information of the pseudo base station sent by the server.

在本申请实施例中,如果服务器确定第一终端接入的是伪基站,服务器向第一终端发送伪基站的指示信息。关于服务器确定伪基站的方式,可以包括但不限于以下几种实现方式,下面以手机为例进行说明,如下所示:In this embodiment of the present application, if the server determines that the first terminal is accessing a pseudo base station, the server sends indication information of the pseudo base station to the first terminal. Regarding the method for the server to determine the pseudo base station, it may include but not limited to the following implementation methods. The following uses a mobile phone as an example to illustrate, as follows:

举例1:服务器在上述图3所示的实施例中获取的真实基站的信息和伪基站的信息中进行查找确定。Example 1: The server searches and determines the real base station information and pseudo base station information obtained in the embodiment shown in FIG. 3 above.

服务器可以在根据多个终端发送的事件的信息获取的真实基站的信息和伪基站的信息中进行查找,若第一基站的信息在伪基站的信息中,则认为第一基站为伪基站,服务器可以向手机发送伪基站的指示信息;若第一基站的信息在真实基站的信息中,则说明第一基站为真实基站,服务器可以不向手机发送真实基站的指示信息。The server can search in the information of the real base station and the information of the pseudo base station obtained according to the information of the event sent by multiple terminals. If the information of the first base station is in the information of the pseudo base station, the first base station is considered to be a pseudo base station, and the server The indication information of the fake base station can be sent to the mobile phone; if the information of the first base station is in the information of the real base station, it means that the first base station is a real base station, and the server may not send the indication information of the real base station to the mobile phone.

举例2:服务器在上述图5所示的实施例中更新的真实基站的信息和伪基站的信息中进行查找确定。Example 2: The server searches and determines the real base station information and the fake base station information updated in the above embodiment shown in FIG. 5 .

服务器可以在上述图5所示的实施例中,根据更新的真实基站的信息和伪基站的信息中进行查找确定,若第一基站的信息在更新的伪基站的信息中,则认为第一基站为伪基站,服务器可以向手机发送伪基站的指示信息;若第一基站的信息在更新的真实基站的信息中,则说明第一基站为真实基站,服务器可以不向手机发送真实基站的指示信息。In the above-mentioned embodiment shown in FIG. 5 , the server may search and determine based on the updated real base station information and pseudo base station information. If the information of the first base station is in the updated pseudo base station information, the first base station is considered If the base station is a fake base station, the server can send the indication information of the fake base station to the mobile phone; if the information of the first base station is in the updated information of the real base station, it means that the first base station is a real base station, and the server does not need to send the indication information of the real base station to the mobile phone .

举例3:服务器在上述图7所示的实施例中根据得到的基站的信息中包括的各个特征的参考权重来进行确定。Example 3: In the above-mentioned embodiment shown in FIG. 7 , the server determines according to the reference weights of each feature included in the obtained base station information.

如果在上述图3或者图5所示的实施例中都未查找到第一基站是真实基站还是伪基站,可以采用上述图7所示的实施例中根据得到的基站的信息中包括的各个特征的参考权重来进行确定。或者,直接采用上述图7所示的实施例中根据得到的基站的信息中包括的各个特征的参考权重来进行确定。具体实现方式可以参考上述实施例7中步骤714的说明,此处不再赘述。If it is not found whether the first base station is a real base station or a pseudo base station in the above-mentioned embodiment shown in FIG. 3 or FIG. 5 , the above-mentioned embodiment shown in FIG. to determine the reference weight. Alternatively, the determination is made directly by using the reference weights of each feature included in the obtained base station information in the embodiment shown in FIG. 7 . For a specific implementation manner, reference may be made to the description of step 714 in the above-mentioned Embodiment 7, and details are not repeated here.

举例4:服务器在上述图3所示的实施例中根据接收的多个终端发送的事件的信息,再进行一次大数据的计算,获取真实基站的信息和伪基站的信息,从而,确定该第一基站是否为伪基站。Example 4: In the embodiment shown in FIG. 3 above, the server performs another big data calculation according to the received event information sent by multiple terminals, and obtains the information of the real base station and the information of the pseudo base station, thereby determining the first Whether a base station is a pseudo base station.

804、第一终端提示所述伪基站的指示信息。804. The first terminal prompts the indication information of the pseudo base station.

在本申请实施例中,第一终端提示所述伪基站的指示信息,可以包括但不限于以下几种实现方式:In this embodiment of the present application, the first terminal prompts the indication information of the pseudo base station, which may include but not limited to the following implementations:

举例1:所述终端通过文字显示所述伪基站的指示信息;具体可以参考上述图4(c)和4(d)所示,此处不再赘述。Example 1: The terminal displays the indication information of the pseudo base station in text; for details, refer to the above-mentioned Figures 4(c) and 4(d), which will not be repeated here.

举例2:所述终端通过语音提示所述伪基站的指示信息;具体可以参考上述图4(e)和4(f)所示,此处不再赘述。Example 2: The terminal prompts the indication information of the pseudo base station by voice; for details, refer to the above-mentioned Figures 4(e) and 4(f), which will not be repeated here.

举例3:所述终端通过危险标识显示所述伪基站的指示信息;具体可以参考上述图4(g)和4(h)所示,此处不再赘述。Example 3: The terminal displays the indication information of the pseudo base station through the danger sign; for details, refer to the above-mentioned Figures 4(g) and 4(h), which will not be repeated here.

可选的,在其他提示伪基站的指示信息,可以参考上述图4(i)-4(p)的实现方式,此处不再赘述。Optionally, for other indication information prompting the pseudo base station, reference may be made to the implementation manners in FIGS. 4(i)-4(p), which will not be repeated here.

在本申请实施例中,对于第一终端来说,主要是上报采集的事件的信息,该事件的信息可以用于服务器获取伪基站的信息,而服务器确定的方式可以有多种,上述已经进行说明,但服务器确定方式是根据大数据的计算得到的,因此,所判断出来的结果可靠性比较高,得到的结果也就越准确。如果终端上接入的是伪基站,那么,服务器会向终端发送伪基站的指示信息,从而,终端可以提示伪基站的指示信息,使得用户对第一终端上发生的第一事件引起警惕,小心上当受骗。In this embodiment of the application, for the first terminal, it is mainly to report the collected event information, which can be used by the server to obtain the information of the pseudo base station, and there are many ways for the server to determine. Note, but the determination method of the server is calculated based on big data, therefore, the reliability of the judged results is relatively high, and the obtained results are more accurate. If the terminal is connected to a pseudo base station, then the server will send the indication information of the pseudo base station to the terminal, so that the terminal can prompt the indication information of the pseudo base station, so that the user is alert to the first event that occurs on the first terminal, be careful Be deceived.

上面对本申请实施例中提示方法进行了描述,下面对本申请实施例中的服务器和终端进行描述,如图9(a)所示,为本申请实施例中服务器的一个实施例示意图,包括:The prompting method in the embodiment of the present application is described above, and the server and the terminal in the embodiment of the present application are described below, as shown in FIG. 9(a), which is a schematic diagram of an embodiment of the server in the embodiment of the present application, including:

接收模块901,用于接收多个终端发送的事件的信息;A receiving module 901, configured to receive event information sent by multiple terminals;

获取模块902,用于根据所述多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。The acquiring module 902 is configured to acquire the information of the real base station and the information of the pseudo base station according to the event information sent by the multiple terminals.

可选的,在本申请的一些实施例中,在上述图9(a)所示的基础上,如图9(b)所示,为服务器的另一个实施例示意图,所述服务器还包括:Optionally, in some embodiments of the present application, on the basis of the above shown in FIG. 9(a), as shown in FIG. 9(b), it is a schematic diagram of another embodiment of the server, and the server further includes:

确定模块903,用于根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;A determining module 903, configured to determine, among the plurality of terminals, a target terminal that accesses the pseudo base station according to the information of the real base station and the information of the pseudo base station;

发送模块904,用于向所述目标终端发送伪基站的指示信息。The sending module 904 is configured to send the indication information of the pseudo base station to the target terminal.

可选的,在本申请的一些实施例中,所述事件的信息包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。Optionally, in some embodiments of the present application, the event information includes a terminal identifier, terminal location information, information about a base station accessed when the event occurs, and a time when the event occurs.

可选的,在本申请的一些实施例中,所述获取模块902,具体用于:Optionally, in some embodiments of the present application, the acquiring module 902 is specifically configured to:

根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;According to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurred, the time when the event occurred, and the preset position calculation accuracy, determine the initial base station with respect to longitude, latitude, and date Information;

从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;From the information about the initial base station of longitude, latitude, and date, delete the information of the initial base station whose occurrence times in consecutive days is less than the first threshold;

去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;Remove the date, and merge the information of other initial base stations to obtain the information about the longitude and latitude screening base stations;

确定所述筛选基站的信息为真实基站的信息。It is determined that the information of the screened base station is information of a real base station.

可选的,在本申请的一些实施例中,所述获取模块902,具体还用于:Optionally, in some embodiments of the present application, the acquiring module 902 is specifically further configured to:

根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;According to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurred, and the time when the event occurred, determine the location information and the second time of the terminal accessed by the target base station at the first time location information of the accessed terminal, the target base station is any base station accessed by the plurality of terminals when the event occurs;

根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;According to the position information of the terminal accessed by the target base station at the first time, calculate the first central position of the terminal accessed, and according to the position information of the terminal accessed by the target base station at the second time, calculate the access the second central location of the terminal;

确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;determining the first central location as a first location of the target base station, and determining the second central location as a second location of the target base station;

若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述获取模块确定所述目标基站的信息为伪基站的信息。If the absolute value of the difference between the first position and the second position is greater than a second threshold, the obtaining module determines that the information of the target base station is information of a pseudo base station.

可选的,在本申请的一些实施例中,在上述图9(b)所示的基础上,如图9(c)所示,为服务器的另一个实施例示意图,所述服务器还包括:Optionally, in some embodiments of the present application, on the basis of the above-mentioned FIG. 9(b), as shown in FIG. 9(c), it is a schematic diagram of another embodiment of the server, and the server further includes:

标记模块905,用于标记所述真实基站和所述伪基站的可疑概率;A marking module 905, configured to mark the suspicious probability of the real base station and the false base station;

所述接收模块901,还用于接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;The receiving module 901 is further configured to receive feedback information sent by the first target terminal, where the feedback information is input by the user indicating whether the base station accessed by the first target terminal when the event occurs is a pseudo base station Enter information accurately;

修改模块906,用于根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率。The modification module 906 is configured to correspondingly modify the suspicious probability of the pseudo base station according to the feedback information, and obtain the modified suspicious probability of the pseudo base station.

可选的,在本申请的一些实施例中,在上述图9(c)所示的基础上,如图9(d)所示,为服务器的另一个实施例示意图,所述服务器还包括:Optionally, in some embodiments of the present application, on the basis of the above-mentioned FIG. 9(c), as shown in FIG. 9(d), it is a schematic diagram of another embodiment of the server, and the server further includes:

所述确定模块903,还用于确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息、可疑概率小于第四阈值的基站的信息为目标真实基站的信息;The determination module 903 is further configured to determine that the information of base stations with a suspicious probability greater than the third threshold is the information of the target pseudo base station, and the information of the base stations with a suspicious probability less than the fourth threshold is the information of the target real base station;

模型训练模块907,用于根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到不同基站的信息中包括的各个特征的参考权重。The model training module 907 is configured to perform model training according to the information of the target pseudo base station and the information of the target real base station, and obtain reference weights of various features included in the information of different base stations.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述接收模块901,还用于接收第一终端发送的第一事件的信息,所述第一事件的信息包括发生所述第一事件时接入的第一基站的信息;The receiving module 901 is further configured to receive information about a first event sent by a first terminal, where the information about the first event includes information about a first base station accessed when the first event occurs;

所述发送模块904,还用于若所述第一基站的信息在所述伪基站的信息中,则所述发送模块向所述第一终端发送伪基站的指示信息。The sending module 904 is further configured to send the indication information of the pseudo base station to the first terminal if the information of the first base station is included in the information of the pseudo base station.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述确定模块903,还用于若所述第一基站的信息未在所述伪基站的信息中,则所述确定模块903根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率;若所述目标概率小于等于所述第五阈值,则所述确定模块903确定所述第一基站为伪基站;The determining module 903 is further configured to: if the information of the first base station is not included in the information of the pseudo base station, the determining module 903, according to the information of the first event and the information of the base station, Determine the target probability of the first base station by referring to the weight of each feature; if the target probability is less than or equal to the fifth threshold, the determination module 903 determines that the first base station is a pseudo base station;

所述发送模块904,还用于向所述第一终端发送伪基站的指示信息。The sending module 904 is further configured to send indication information of the pseudo base station to the first terminal.

可选的,在本申请的一些实施例中,所述事件包括:接收短信和/或来电;Optionally, in some embodiments of the present application, the event includes: receiving a text message and/or an incoming call;

所述事件的信息还包括:所述短信的内容和/或所述来电的号码。The event information also includes: the content of the short message and/or the number of the incoming call.

如图10所示,为本申请实施例中终端的一个实施例示意图,包括:As shown in Figure 10, it is a schematic diagram of an embodiment of a terminal in the embodiment of the present application, including:

采集模块1001,用于终端检测事件发生并采集所述事件的信息;A collection module 1001, configured for the terminal to detect the occurrence of an event and collect information about the event;

发送模块1002,用于向服务器发送所述事件的信息;A sending module 1002, configured to send information about the event to a server;

接收模块1003,用于接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的;A receiving module 1003, configured to receive indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the event information;

提示模块1004,用于提示所述伪基站的指示信息。The prompt module 1004 is configured to prompt the indication information of the pseudo base station.

可选的,在本申请的一些实施例中,所述事件的信息包括所述终端标识、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。Optionally, in some embodiments of the present application, the information of the event includes the terminal identifier, the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述接收模块1003,还用于接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;The receiving module 1003 is further configured to receive feedback information, where the feedback information is input information input by the user indicating whether the base station accessed when the event occurs by the terminal is a pseudo base station;

所述发送模块1004,还用于向所述服务器发送所述反馈信息,所述反馈信息用于所述服务器对所述伪基站的可疑概率进行修改。The sending module 1004 is further configured to send the feedback information to the server, where the feedback information is used by the server to modify the suspicious probability of the pseudo base station.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述提示模块1004,具体用于通过文字显示所述伪基站的指示信息。The prompt module 1004 is specifically configured to display the indication information of the pseudo base station in text.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述提示模块1004,具体用于通过危险标识显示所述伪基站的指示信息。The prompt module 1004 is specifically configured to display the indication information of the pseudo base station through a danger sign.

所述提示模块1004,具体用于通过语音提示所述伪基站的指示信息。The prompting module 1004 is specifically configured to prompt the indication information of the pseudo base station by voice.

可选的,在本申请的一些实施例中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call; the information of the event further includes: the content of the short message and/or the number of the incoming call.

如图11所示,为本申请实施例中服务器的另一个实施例示意图。As shown in FIG. 11 , it is a schematic diagram of another embodiment of the server in the embodiment of the present application.

该服务器可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上有线或无线网络接口1150,有线或无线网络接口也可以称为收发器,一个或一个以上中央处理器(central processing units,CPU)1122(例如,一个或一个以上处理器)和存储器1132,一个或一个以上存储应用程序1142或数据1144的存储介质1130(例如一个或一个以上海量存储设备)。The server can have relatively large differences due to different configurations or performances, and can include one or more wired or wireless network interfaces 1150, which can also be called transceivers, and one or more central processing units (central processing units, CPU) 1122 (eg, one or more processors) and memory 1132, and one or more storage media 1130 (eg, one or more mass storage devices) for storing application programs 1142 or data 1144.

本申请实施例中,有线或无线网络接口1150可以接收多个终端发送的事件的信息;中央处理器1122根据有线或无线网络接口1150接收的多个终端发送的事件的信息,获取真实基站的信息和伪基站的信息。对于在目标终端上提示所述伪基站的指示信息,可以包括但不限于图4(c)-图4(p)所示的实现方式。In the embodiment of the present application, the wired or wireless network interface 1150 can receive information about events sent by multiple terminals; the central processor 1122 obtains information about real base stations according to the information about events sent by multiple terminals received by the wired or wireless network interface 1150 and pseudo base station information. For prompting the indication information of the pseudo base station on the target terminal, it may include but not limited to the implementation manners shown in FIG. 4(c)-FIG. 4(p).

其中,存储器1132和存储介质1130可以是短暂存储或持久存储。存储在存储介质1130的程序可以包括一个或一个以上模块(图示没标出),每个模块可以包括对服务器中的一系列指令操作。更进一步地,中央处理器1122可以设置为与存储介质1130通信,在服务器1100上执行存储介质1130中的一系列指令操作。Wherein, the memory 1132 and the storage medium 1130 may be temporary storage or persistent storage. The program stored in the storage medium 1130 may include one or more modules (not shown in the figure), and each module may include a series of instruction operations on the server. Furthermore, the central processing unit 1122 may be configured to communicate with the storage medium 1130 , and execute a series of instruction operations in the storage medium 1130 on the server 1100 .

服务器1100还可以包括一个或一个以上电源1126,一个或一个以上输入输出接口1158,和/或,一个或一个以上操作系统1141,例如Windows ServerTM,Mac OS XTM,UnixTM,LinuxTM,FreeBSDTM等等。The server 1100 may also include one or more power supplies 1126, one or more input/output interfaces 1158, and/or, one or more operating systems 1141, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.

上述实施例中由服务器所执行的步骤可以基于该图11所示的服务器结构。The steps performed by the server in the foregoing embodiments may be based on the server structure shown in FIG. 11 .

可选的,在本申请的一些实施例中,中央处理器1122,还用于执行以下步骤:根据所述真实基站的信息和所述伪基站的信息,确定所述多个终端中接入伪基站的目标终端;Optionally, in some embodiments of the present application, the central processing unit 1122 is further configured to perform the following step: according to the information of the real base station and the information of the pseudo base station, determine the access pseudo base station among the plurality of terminals The target terminal of the base station;

有线或无线网络接口1150,还用于执行以下步骤:向所述目标终端发送伪基站的指示信息。The wired or wireless network interface 1150 is further configured to perform the following step: sending indication information of the pseudo base station to the target terminal.

可选的,在本申请的一些实施例中,所述事件的信息包括终端标识、终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。Optionally, in some embodiments of the present application, the event information includes a terminal identifier, terminal location information, information about a base station accessed when the event occurs, and a time when the event occurs.

可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤:Optionally, in some embodiments of the present application, the central processing unit 1122 is specifically configured to perform the following steps:

根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,以及预置的位置计算精度,确定关于经度、纬度、日期的初始基站的信息;According to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurred, the time when the event occurred, and the preset position calculation accuracy, determine the initial base station with respect to longitude, latitude, and date Information;

从所述关于经度、纬度、日期的初始基站的信息中,删除连续日期内出现次数少于第一阈值的初始基站的信息;From the information about the initial base station of longitude, latitude, and date, delete the information of the initial base station whose occurrence times in consecutive days is less than the first threshold;

去掉所述日期,其他初始基站的信息进行合并,得到关于经度、纬度的筛选基站的信息;Remove the date, and merge the information of other initial base stations to obtain the information about the longitude and latitude screening base stations;

确定所述筛选基站的信息为真实基站的信息。It is determined that the information of the screened base station is information of a real base station.

可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤:Optionally, in some embodiments of the present application, the central processing unit 1122 is specifically configured to perform the following steps:

所述服务器根据所述多个终端发送的终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间,确定目标基站在第一时间接入的终端的位置信息和第二时间接入的终端的位置信息,所述目标基站为所述多个终端发生所述事件时接入的任一基站;The server determines the location information of the terminal accessed by the target base station at the first time and location information of terminals accessed at the second time, the target base station being any base station accessed by the multiple terminals when the event occurs;

根据所述目标基站在第一时间接入的终端的位置信息,计算出接入的终端的第一中心位置,根据所述目标基站在第二时间接入的终端的位置信息,计算出接入的终端的第二中心位置;According to the position information of the terminal accessed by the target base station at the first time, calculate the first central position of the terminal accessed, and according to the position information of the terminal accessed by the target base station at the second time, calculate the access the second central location of the terminal;

确定所述第一中心位置为所述目标基站的第一位置,确定所述第二中心位置为所述目标基站的第二位置;determining the first central location as a first location of the target base station, and determining the second central location as a second location of the target base station;

若所述第一位置和所述第二位置之间差值的绝对值大于第二阈值,则所述中央处理器确定所述目标基站的信息为伪基站的信息。If the absolute value of the difference between the first position and the second position is greater than a second threshold, the central processor determines that the information of the target base station is information of a pseudo base station.

可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤:标记所述真实基站和所述伪基站的可疑概率;根据所述反馈信息,对应修改所述伪基站的可疑概率,得到所述伪基站的修改可疑概率;Optionally, in some embodiments of the present application, the central processor 1122 is specifically configured to perform the following steps: mark suspicious probabilities of the real base station and the false base station; modify the corresponding the suspicious probability of the pseudo base station, obtaining the modified suspicious probability of the pseudo base station;

有线或无线网络接口1150还用于执行以下步骤:接收第一目标终端发送的反馈信息,所述反馈信息是用户输入的对所述第一目标终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息。The wired or wireless network interface 1150 is further configured to perform the following steps: receive feedback information sent by the first target terminal, the feedback information is the base station accessed by the user when the event occurs to the first target terminal is a pseudo base station Indicates whether the input information is accurate.

可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤:Optionally, in some embodiments of the present application, the central processing unit 1122 is specifically configured to perform the following steps:

确定可疑概率大于第三阈值的基站的信息为目标伪基站的信息、可疑概率小于第四阈值的基站的信息为目标真实基站的信息;Determining that the information of the base station with a suspicious probability greater than the third threshold is the information of the target pseudo base station, and the information of the base station with a suspicious probability less than the fourth threshold is the information of the target real base station;

根据所述目标伪基站的信息和所述目标真实基站的信息,进行模型训练,得到基站的信息中包括的各个特征的参考权重。According to the information of the target pseudo base station and the information of the target real base station, model training is performed to obtain the reference weights of each feature included in the information of the base station.

可选的,在本申请的一些实施例中,有线或无线网络接口1150还用于执行以下步骤:Optionally, in some embodiments of the present application, the wired or wireless network interface 1150 is also used to perform the following steps:

接收第一终端发送的第一事件的信息,所述第一事件的信息包括发生所述第一事件时接入的第一基站的信息;receiving information about a first event sent by a first terminal, where the information about the first event includes information about a first base station accessed when the first event occurs;

若所述第一基站的信息在所述伪基站的信息中,则所述有线或无线网络接口1150向所述第一终端发送伪基站的指示信息。If the information of the first base station is included in the information of the pseudo base station, the wired or wireless network interface 1150 sends indication information of the pseudo base station to the first terminal.

可选的,在本申请的一些实施例中,所述中央处理器1122具体用于执行以下步骤:Optionally, in some embodiments of the present application, the central processing unit 1122 is specifically configured to perform the following steps:

若所述第一基站的信息未在所述伪基站的信息中,则所述中央处理器1122根据所述第一事件的信息和所述基站的信息中包括的各个特征的参考权重,确定所述第一基站的目标概率;若所述目标概率小于等于所述第五阈值,则所述中央处理器1122确定所述第一基站为伪基站;If the information of the first base station is not in the information of the pseudo base station, the central processor 1122 determines the reference weight of each feature included in the information of the first event and the information of the base station. The target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the central processor 1122 determines that the first base station is a pseudo base station;

有线或无线网络接口1150还用于执行以下步骤:向所述第一终端发送伪基站的指示信息。The wired or wireless network interface 1150 is further configured to perform the following step: sending indication information of the pseudo base station to the first terminal.

可选的,在本申请的一些实施例中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call; the information of the event further includes: the content of the short message and/or the number of the incoming call.

如图12所示,为本申请实施例中终端的另一个实施例示意图。As shown in FIG. 12 , it is a schematic diagram of another embodiment of the terminal in the embodiment of the present application.

为了便于说明,图12仅示出了与本申请实施例相关的部分,具体技术细节未揭示的,请参照本申请实施例方法部分。该终端可以为包括手机、平板电脑、PDA(PersonalDigital Assistant,个人数字助理)、POS(Point of Sales,销售终端)、车载电脑等任意终端设备,以终端为手机为例:For ease of description, FIG. 12 only shows the parts related to the embodiment of the present application. For specific technical details not disclosed, please refer to the method part of the embodiment of the present application. The terminal can be any terminal device including mobile phone, tablet computer, PDA (Personal Digital Assistant, personal digital assistant), POS (Point of Sales, sales terminal), vehicle-mounted computer, etc. Taking the terminal as a mobile phone as an example:

图12示出的是与本申请实施例提供的终端相关的手机的部分结构的框图。参考图12,手机包括:处理器1280、通信接口1210、输出单元1270、存储器1220、输入单元1230、传感器1250、以及电源1290等部件。其中,通信接口1210可以包括射频(Radio Frequency,RF)电路1211、无线保真(wireless fidelity,WiFi)模块1212等部件;输出单元1270可以包括显示单元1240、音频电路1260等部件。本领域技术人员可以理解,图12中示出的手机结构并不构成对手机的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。FIG. 12 shows a block diagram of a partial structure of a mobile phone related to the terminal provided by the embodiment of the present application. Referring to FIG. 12 , the mobile phone includes: a processor 1280 , a communication interface 1210 , an output unit 1270 , a memory 1220 , an input unit 1230 , a sensor 1250 , and a power supply 1290 and other components. Wherein, the communication interface 1210 may include a radio frequency (Radio Frequency, RF) circuit 1211, a wireless fidelity (wireless fidelity, WiFi) module 1212 and other components; the output unit 1270 may include a display unit 1240, an audio circuit 1260 and other components. Those skilled in the art can understand that the structure of the mobile phone shown in FIG. 12 does not constitute a limitation to the mobile phone, and may include more or less components than shown in the figure, or combine some components, or arrange different components.

下面结合图12对手机的各个构成部件进行具体的介绍:The following is a specific introduction to each component of the mobile phone in conjunction with Figure 12:

处理器1280是手机的控制中心,利用各种接口和线路连接整个手机的各个部分,通过运行或执行存储在存储器1220内的软件程序和/或模块,以及调用存储在存储器1220内的数据,执行手机的各种功能和处理数据,从而对手机进行整体监控。在本申请实施例中,所述处理器1280检测事件发生并采集所述事件的信息。可选的,处理器1280可包括一个或多个处理单元;优选的,处理器1280可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器1280中。The processor 1280 is the control center of the mobile phone. It uses various interfaces and lines to connect various parts of the entire mobile phone. By running or executing software programs and/or modules stored in the memory 1220, and calling data stored in the memory 1220, execution Various functions and processing data of the mobile phone, so as to monitor the mobile phone as a whole. In this embodiment of the present application, the processor 1280 detects the occurrence of an event and collects information about the event. Optionally, the processor 1280 may include one or more processing units; preferably, the processor 1280 may integrate an application processor and a modem processor, wherein the application processor mainly processes operating systems, user interfaces, and application programs, etc. , the modem processor mainly handles wireless communications. It can be understood that the foregoing modem processor may not be integrated into the processor 1280 .

RF电路1211可用于收发信息或通话过程中,信号的接收和发送,特别地,将基站的下行信息接收后,给处理器1280处理;另外,将设计上行的数据发送给基站。在本申请实施例中,RF电路1211可以向服务器发送处理器1280所采集的所述事件的信息,接收所述服务器发送的伪基站的指示信息,所述伪基站的指示信息为所述服务器根据所述事件的信息获取的。The RF circuit 1211 can be used for sending and receiving information or receiving and sending signals during a call. In particular, after receiving the downlink information from the base station, it is processed by the processor 1280; in addition, it sends the designed uplink data to the base station. In this embodiment of the present application, the RF circuit 1211 may send the information of the event collected by the processor 1280 to the server, and receive the indication information of the pseudo base station sent by the server, and the indication information of the pseudo base station is determined by the server according to the Information about the event is obtained.

通常,RF电路1211包括但不限于天线、至少一个放大器、收发信机、耦合器、低噪声放大器(Low Noise Amplifier,LNA)、双工器等。此外,RF电路1211还可以通过无线通信与网络和其他设备通信。上述无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(Global System of Mobile communication,GSM)、通用分组无线服务(General Packet Radio Service,GPRS)、码分多址(Code Division Multiple Access,CDMA)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、长期演进(Long Term Evolution,LTE)、电子邮件、短消息服务(Short Messaging Service,SMS)等。Generally, the RF circuit 1211 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (Low Noise Amplifier, LNA), a duplexer, and the like. In addition, the RF circuit 1211 can also communicate with networks and other devices through wireless communication. The above-mentioned wireless communication can use any communication standard or protocol, including but not limited to Global System of Mobile Communication (Global System of Mobile communication, GSM), General Packet Radio Service (General Packet Radio Service, GPRS), Code Division Multiple Access (Code Division Multiple Access, CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (Long Term Evolution, LTE), email, Short Messaging Service (Short Messaging Service, SMS), etc.

存储器1220可用于存储软件程序以及模块,处理器1280通过运行存储在存储器1220的软件程序以及模块,从而执行手机的各种功能应用以及数据处理。存储器1220可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据手机的使用所创建的数据(比如音频数据、电话本等)等。此外,存储器1220可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。The memory 1220 can be used to store software programs and modules, and the processor 1280 executes various functional applications and data processing of the mobile phone by running the software programs and modules stored in the memory 1220 . The memory 1220 can mainly include a program storage area and a data storage area, wherein the program storage area can store an operating system, at least one application program required by a function (such as a sound playback function, an image playback function, etc.) and the like; Data created by the use of mobile phones (such as audio data, phonebook, etc.), etc. In addition, the memory 1220 may include a high-speed random access memory, and may also include a non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage devices.

输入单元1230可用于接收输入的数字或字符信息,以及产生与手机的用户设置以及功能控制有关的键信号输入。如图6(a)和6(b)中,若用户输入反馈信息,那么该反馈信息可以通过输入单元1230被手机接收。具体地,输入单元1230可包括触控面板1231以及其他输入设备1232。触控面板1231,也称为触摸屏,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触控面板1231上或在触控面板1231附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触控面板1231可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器1280,并能接收处理器1280发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触控面板1231。除了触控面板1231,输入单元1230还可以包括其他输入设备1232。具体地,其他输入设备1232可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。The input unit 1230 can be used to receive input numbers or character information, and generate key signal input related to user settings and function control of the mobile phone. As shown in FIG. 6( a ) and 6 ( b ), if the user inputs feedback information, the feedback information can be received by the mobile phone through the input unit 1230 . Specifically, the input unit 1230 may include a touch panel 1231 and other input devices 1232 . The touch panel 1231, also referred to as a touch screen, can collect touch operations of the user on or near it (for example, the user uses any suitable object or accessory such as a finger or a stylus on the touch panel 1231 or near the touch panel 1231). operation), and drive the corresponding connection device according to the preset program. Optionally, the touch panel 1231 may include two parts, a touch detection device and a touch controller. Among them, the touch detection device detects the user's touch orientation, and detects the signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts it into contact coordinates, and sends it to the to the processor 1280, and can receive and execute commands sent by the processor 1280. In addition, the touch panel 1231 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave. In addition to the touch panel 1231 , the input unit 1230 may also include other input devices 1232 . Specifically, other input devices 1232 may include but not limited to one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), trackball, mouse, joystick, and the like.

输出单元1270可以包括显示单元1240、音频电路1260等部件。在本申请实施例中,输出单元1270可以用于提示所述伪基站的指示信息。The output unit 1270 may include a display unit 1240, an audio circuit 1260 and other components. In this embodiment of the present application, the output unit 1270 may be configured to prompt the indication information of the pseudo base station.

显示单元1240可用于显示由用户输入的信息或提供给用户的信息以及手机的各种菜单。如图4(a)-4(p),图6(a)-图6(d)所示的界面,都是通过显示单元1240来显示的。显示单元1240可包括显示面板1241,可选的,可以采用液晶显示器(Liquid CrystalDisplay,LCD)、有机发光二极管(Organic Light-Emitting Diode,OLED)等形式来配置显示面板1241。进一步的,触控面板1231可覆盖显示面板1241,当触控面板1231检测到在其上或附近的触摸操作后,传送给处理器1280以确定触摸事件的类型,随后处理器1280根据触摸事件的类型在显示面板1241上提供相应的视觉输出。虽然在图12中,触控面板1231与显示面板1241是作为两个独立的部件来实现手机的输入和输入功能,但是在某些实施例中,可以将触控面板1231与显示面板1241集成而实现手机的输入和输出功能。The display unit 1240 may be used to display information input by or provided to the user and various menus of the mobile phone. The interfaces shown in FIGS. 4(a)-4(p) and FIGS. 6(a)-6(d) are all displayed by the display unit 1240 . The display unit 1240 may include a display panel 1241. Optionally, the display panel 1241 may be configured in the form of a liquid crystal display (Liquid Crystal Display, LCD) or an organic light-emitting diode (Organic Light-Emitting Diode, OLED). Further, the touch panel 1231 can cover the display panel 1241, and when the touch panel 1231 detects a touch operation on or near it, it sends it to the processor 1280 to determine the type of the touch event, and then the processor 1280 determines the type of the touch event according to the The type provides a corresponding visual output on the display panel 1241 . Although in FIG. 12 , the touch panel 1231 and the display panel 1241 are used as two independent components to realize the input and input functions of the mobile phone, in some embodiments, the touch panel 1231 and the display panel 1241 can be integrated to form a mobile phone. Realize the input and output functions of the mobile phone.

音频电路1260、扬声器1261,传声器1262可提供用户与手机之间的音频接口。如图4(e)、图4(f)所示、图4(i)、图4(j)所示、图4(m)、图4(n)所示,可以通过音频电路1260,来向用户提示伪基站的指示信息。音频电路1260可将接收到的音频数据转换后的电信号,传输到扬声器1261,由扬声器1261转换为声音信号输出;另一方面,传声器1262将收集的声音信号转换为电信号,由音频电路1260接收后转换为音频数据,再将音频数据输出处理器1280处理后,经RF电路1211以发送给比如另一手机,或者将音频数据输出至存储器1220以便进一步处理。The audio circuit 1260, the speaker 1261, and the microphone 1262 can provide an audio interface between the user and the mobile phone. As shown in Figure 4(e), Figure 4(f), Figure 4(i), Figure 4(j), Figure 4(m), Figure 4(n), the audio circuit 1260 can be used to The indication information of the pseudo base station is prompted to the user. The audio circuit 1260 can transmit the electrical signal converted from the received audio data to the speaker 1261, and the speaker 1261 converts it into an audio signal for output; After being received, it is converted into audio data, and then the audio data is processed by the output processor 1280, and then sent to, for example, another mobile phone through the RF circuit 1211, or the audio data is output to the memory 1220 for further processing.

手机还可包括至少一种传感器1250,比如光传感器、运动传感器以及其他传感器。具体地,光传感器可包括环境光传感器及接近传感器,其中,环境光传感器可根据环境光线的明暗来调节显示面板1241的亮度,接近传感器可在手机移动到耳边时,关闭显示面板1241和/或背光。作为运动传感器的一种,加速计传感器可检测各个方向上(一般为三轴)加速度的大小,静止时可检测出重力的大小及方向,可用于识别手机姿态的应用(比如横竖屏切换、相关游戏、磁力计姿态校准)、振动识别相关功能(比如计步器、敲击)等;至于手机还可配置的陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。The handset may also include at least one sensor 1250, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1241 according to the brightness of the ambient light, and the proximity sensor may turn off the display panel 1241 and/or when the mobile phone is moved to the ear. or backlight. As a kind of motion sensor, the accelerometer sensor can detect the magnitude of acceleration in various directions (generally three axes), and can detect the magnitude and direction of gravity when it is stationary, and can be used to identify the application of mobile phone posture (such as horizontal and vertical screen switching, related Games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tap), etc.; as for other sensors such as gyroscope, barometer, hygrometer, thermometer, infrared sensor, etc. repeat.

WiFi属于短距离无线传输技术,手机通过WiFi模块1212可以帮助用户收发电子邮件、浏览网页和访问流式媒体等,它为用户提供了无线的宽带互联网访问。虽然图12示出了WiFi模块1212,但是可以理解的是,其并不属于手机的必须构成,完全可以根据需要在不改变申请的本质的范围内而省略。WiFi is a short-distance wireless transmission technology. The mobile phone can help users send and receive emails, browse web pages, and access streaming media through the WiFi module 1212, which provides users with wireless broadband Internet access. Although Fig. 12 shows a WiFi module 1212, it can be understood that it is not an essential component of the mobile phone, and can be completely omitted as required without changing the essence of the application.

手机还包括给各个部件供电的电源1290(比如电池),优选的,电源可以通过电源管理系统与处理器1280逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。The mobile phone also includes a power supply 1290 (such as a battery) for supplying power to various components. Preferably, the power supply can be logically connected to the processor 1280 through the power management system, so that functions such as charging, discharging, and power consumption management can be realized through the power management system.

尽管未示出,手机还可以包括摄像头、蓝牙模块等,在此不再赘述。Although not shown, the mobile phone may also include a camera, a Bluetooth module, etc., which will not be repeated here.

上述实施例中由终端所执行的步骤可以基于该图12所示的终端结构。The steps performed by the terminal in the foregoing embodiments may be based on the terminal structure shown in FIG. 12 .

可选的,在本申请的一些实施例中,所述事件的信息包括所述终端标识、所述终端的位置信息、发生所述事件时接入的基站的信息、发生所述事件的时间。Optionally, in some embodiments of the present application, the information of the event includes the terminal identifier, the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述输入单元1230,还用于接收反馈信息,所述反馈信息是用户输入的对所述终端发生所述事件时接入的基站是伪基站的指示信息是否准确的输入信息;The input unit 1230 is further configured to receive feedback information, where the feedback information is input information input by the user indicating whether the base station accessed when the event occurs by the terminal is a pseudo base station;

所述射频电路1211,还用于向所述服务器发送所述反馈信息,所述反馈信息用于所述服务器对所述伪基站的可疑概率进行修改。The radio frequency circuit 1211 is further configured to send the feedback information to the server, where the feedback information is used by the server to modify the suspicious probability of the pseudo base station.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述显示单元1240,还用于通过文字显示所述伪基站的指示信息。The display unit 1240 is further configured to display the indication information of the pseudo base station in text.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述显示单元1240,还用于通过危险标识显示所述伪基站的指示信息。The display unit 1240 is further configured to display the indication information of the pseudo base station through a danger sign.

可选的,在本申请的一些实施例中,Optionally, in some embodiments of the present application,

所述音频电路1260,还用于通过语音提示所述伪基站的指示信息。The audio circuit 1260 is further configured to prompt the indication information of the pseudo base station by voice.

可选的,在本申请的一些实施例中,所述事件包括:接收短信和/或来电;所述事件的信息还包括:所述短信的内容和/或所述来电的号码。Optionally, in some embodiments of the present application, the event includes: receiving a short message and/or an incoming call; the information of the event further includes: the content of the short message and/or the number of the incoming call.

在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。In the above embodiments, all or part of them may be implemented by software, hardware, firmware or any combination thereof. When implemented using software, it may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on the computer, all or part of the processes or functions according to the embodiments of the present invention will be generated. The computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable devices. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from a website, computer, server or data center Transmission to another website site, computer, server, or data center by wired (eg, coaxial cable, optical fiber, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be accessed by a computer, or a data storage device such as a server or a data center integrated with one or more available media. The available medium may be a magnetic medium (for example, a floppy disk, a hard disk, or a magnetic tape), an optical medium (for example, DVD), or a semiconductor medium (for example, a Solid State Disk (SSD)).

可选的,在本申请的一些实施例中,提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如服务器在上述图3、图5、图7或图8所示的方法,其相同或相应的技术特征可援引在本实施例中。Optionally, in some embodiments of the present application, a computer program product containing instructions is provided. When it is run on a computer, the computer executes the server as shown in FIG. 3 , FIG. 5 , FIG. 7 or FIG. 8 above. In the method shown, the same or corresponding technical features can be cited in this embodiment.

可选的,在本申请的一些实施例中,提供一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行如终端在上述图3、图5、图7或图8所示的方法,其相同或相应的技术特征可援引在本实施例中。Optionally, in some embodiments of the present application, a computer program product containing instructions is provided. When it is run on a computer, the computer executes the terminal as shown in FIG. 3 , FIG. 5 , FIG. 7 or FIG. 8 above. In the method shown, the same or corresponding technical features can be cited in this embodiment.

本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”、“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of this application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments described herein can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to cover a non-exclusive inclusion, for example, a process, method, system, product or device comprising a sequence of steps or elements is not necessarily limited to the expressly listed Those steps or elements may instead include other steps or elements not explicitly listed or inherent to the process, method, product or apparatus.

Claims (32)

1. a kind of reminding method, which is characterized in that including:
Server receives the information for the event that multiple terminals are sent;
The information for the event that the server is sent according to the multiple terminal obtains the information of real ones and the letter of pseudo-base station Breath.
2. according to the method described in claim 1, it is characterized in that, the method further includes:
The server is determined and is accessed in the multiple terminal according to the information of the information and the pseudo-base station of the real ones The target terminal of pseudo-base station;
The server sends the instruction information of pseudo-base station to the target terminal.
3. method according to claim 1 or 2, which is characterized in that the server is sent according to the multiple terminal The information of event obtains the information of real ones, including:
The base station accessed when the event occurs for the location information for the terminal that the server is sent according to the multiple terminal Information, the time that the event occurs and preset position computational accuracy, determine about longitude, latitude, the first primordium on date The information stood;
The server from it is described about longitude, latitude, the initial base station on date information in, delete in the continuous date and go out occurrence Information of the number less than the initial base station of first threshold;
The server removes the date, and the information of other initial base stations merges, and obtains the screening about longitude, latitude The information of base station;
The server determines that the information of the screening base station is the information of real ones.
4. method according to claim 1 or 2, which is characterized in that the server is sent according to the multiple terminal The information of event obtains the information of pseudo-base station, including:
The base station accessed when the event occurs for the location information for the terminal that the server is sent according to the multiple terminal Information, the time that the event occurs determine location information and second time of the target BS in the terminal of first time access The location information of the terminal of access, the target BS are that any base station accessed when the event occurs for the multiple terminal;
The server, in the location information of the terminal of first time access, calculates the terminal of access according to the target BS The first center, the location information of the terminal accessed in the second time according to the target BS calculates the end of access Second center at end;
The server determines that first center is the first position of the target BS, determines second centre bit It is set to the second position of the target BS;
If the absolute value of difference is more than second threshold between the first position and the second position, the server determines The information of the target BS is the information of pseudo-base station.
5. according to any methods of claim 1-4, which is characterized in that the method further includes:
The suspicious probability of real ones and the pseudo-base station described in the server-tag;
The server receives the feedback information that first object terminal is sent, and the feedback information is input by user to described the The base station that one target terminal occurs to access when the event is whether the instruction information of pseudo-base station accurately enters information;
The server obtains the pseudo-base station according to the feedback information, the corresponding suspicious probability for changing the pseudo-base station Change suspicious probability.
6. a kind of reminding method, which is characterized in that including:
Terminal detecting event occurs and acquires the information of the event;
The terminal to server sends the information of the event;
The terminal receives the instruction information for the pseudo-base station that the server is sent, and the instruction information of the pseudo-base station is the clothes Device be engaged according to the acquisition of information of the event;
The instruction information of pseudo-base station described in the terminal notifying.
7. according to the method described in claim 6, it is characterized in that, the method further includes:
The terminal receives feedback information, and the feedback information accesses when being the generation event input by user to the terminal Base station be whether the instruction information of pseudo-base station accurately enters information;
The terminal sends the feedback information to the server, and the feedback information is for the server to the pseudo- base The suspicious probability stood is modified.
8. the method described according to claim 6 or 7, which is characterized in that the instruction information of pseudo-base station described in the terminal notifying, Including:
The instruction information that the terminal passes through pseudo-base station described in text importing.
9. the method described according to claim 6 or 7, which is characterized in that the instruction information of pseudo-base station described in the terminal notifying, Including:
The terminal shows the instruction information of the pseudo-base station by risk identification.
10. the method described according to claim 6 or 7, which is characterized in that the instruction of pseudo-base station described in the terminal notifying is believed Breath, including:
The instruction information that the terminal passes through pseudo-base station described in voice prompt.
11. a kind of server, which is characterized in that including:
Receiving module, the information for receiving the event that multiple terminals are sent;
Acquisition module, the information of the event for being sent according to the multiple terminal, obtains the information and pseudo-base station of real ones Information.
12. server according to claim 11, which is characterized in that the server further includes:
Determining module is used for the information of the information and the pseudo-base station according to the real ones, determines in the multiple terminal Access the target terminal of pseudo-base station;
Sending module, the instruction information for sending pseudo-base station to the target terminal.
13. server according to claim 11 or 12, which is characterized in that the acquisition module is specifically used for:
The location information of the terminal sent according to the multiple terminal, occurs the information that the base station accessed when the event occurs The time of the event and preset position computational accuracy determine the information about longitude, latitude, the initial base station on date;
From it is described about longitude, latitude, the initial base station on date information in, delete in the continuous date occurrence number and be less than first The information of the initial base station of threshold value;
Remove the date, the information of other initial base stations merges, and obtains the letter of the screening base station about longitude, latitude Breath;
Determine that the information of the screening base station is the information of real ones.
14. server according to claim 11 or 12, which is characterized in that the acquisition module is specifically additionally operable to:
The location information of the terminal sent according to the multiple terminal, occurs the information that the base station accessed when the event occurs The time of the event determines the terminal that target BS is accessed in the location information of the terminal of first time access and the second time Location information, the target BS be the multiple terminal any base station accessed when the event occurs;
According to the target BS in the location information of the terminal of first time access, the first center of the terminal of access is calculated Position, the location information of the terminal accessed in the second time according to the target BS, in calculate the terminal of access second Heart position;
It determines that first center is the first position of the target BS, determines that second center is the mesh Mark the second position of base station;
If the absolute value of difference is more than second threshold between the first position and the second position, the acquisition module is true The information of the fixed target BS is the information of pseudo-base station.
15. according to any servers of claim 11-14, which is characterized in that the server further includes:
Mark module, the suspicious probability for marking the real ones and the pseudo-base station;
The receiving module is additionally operable to receive the feedback information that first object terminal is sent, and the feedback information is user's input The base station accessed when the event occurs to the first object terminal be whether the instruction information of pseudo-base station accurately enters Information;
Modified module, for according to the feedback information, the corresponding suspicious probability for changing the pseudo-base station to obtain the pseudo-base station The suspicious probability of modification.
16. a kind of terminal, which is characterized in that including:
The information of the event occurs and is acquired for detecting event for acquisition module;
Sending module, the information for sending the event to server;
Receiving module, the instruction information for receiving the pseudo-base station that the server is sent, the instruction information of the pseudo-base station are The server is according to the acquisition of information of the event;
Reminding module, the instruction information for prompting the pseudo-base station.
17. terminal according to claim 16, which is characterized in that
The receiving module is additionally operable to receive feedback information, and the feedback information is input by user to terminal generation institute State whether the instruction information that the base station accessed when event is pseudo-base station accurately enters information;
The sending module is additionally operable to send the feedback information to the server, and the feedback information is used for the service Device modifies to the suspicious probability of the pseudo-base station.
18. terminal according to claim 16 or 17, which is characterized in that
The reminding module is specifically used for the instruction information by pseudo-base station described in text importing.
19. terminal according to claim 16 or 17, which is characterized in that
The reminding module, specifically for showing the instruction information of the pseudo-base station by risk identification.
20. terminal according to claim 16 or 17, which is characterized in that
The reminding module is specifically used for the instruction information by pseudo-base station described in voice prompt.
21. a kind of server, which is characterized in that including:
Transceiver, processor, memory and bus, the transceiver, the processor and the memory pass through the bus Connection;
The memory, for storing operational order;
The transceiver, the information for receiving the event that multiple terminals are sent;
The processor, according to the information for the event that the multiple terminal is sent, obtains true for calling the operational order The information of base station and the information of pseudo-base station.
22. server according to claim 21, which is characterized in that
The processor is additionally operable to the information of the information and the pseudo-base station according to the real ones, determines the multiple end The target terminal of pseudo-base station is accessed in end;
The transceiver is additionally operable to send the instruction information of pseudo-base station to the target terminal.
23. the server according to claim 21 or 22, which is characterized in that the processor is specifically used for executing following step Suddenly:
The location information of the terminal sent according to the multiple terminal, occurs the information that the base station accessed when the event occurs The time of the event and preset position computational accuracy determine the information about longitude, latitude, the initial base station on date;
From it is described about longitude, latitude, the initial base station on date information in, delete in the continuous date occurrence number and be less than first The information of the initial base station of threshold value;
Remove the date, the information of other initial base stations merges, and obtains the letter of the screening base station about longitude, latitude Breath;
Determine that the information of the screening base station is the information of real ones.
24. the server according to claim 21 or 22, which is characterized in that the processor is specifically used for executing following step Suddenly:
The location information of the terminal sent according to the multiple terminal, occurs the information that the base station accessed when the event occurs The time of the event determines the terminal that target BS is accessed in the location information of the terminal of first time access and the second time Location information, the target BS be the multiple terminal any base station accessed when the event occurs;
According to the target BS in the location information of the terminal of first time access, the first center of the terminal of access is calculated Position, the location information of the terminal accessed in the second time according to the target BS, in calculate the terminal of access second Heart position;
It determines that first center is the first position of the target BS, determines that second center is the mesh Mark the second position of base station;
If the absolute value of difference is more than second threshold between the first position and the second position, the processor determines The information of the target BS is the information of pseudo-base station.
25. according to any servers of claim 21-24, which is characterized in that the processor is additionally operable to execute following Step:
Mark the real ones and the suspicious probability of the pseudo-base station;
According to the feedback information, the suspicious probability for changing the pseudo-base station is corresponded to, the modification for obtaining the pseudo-base station is suspicious general Rate;
The transceiver is additionally operable to execute following steps:
The feedback information that first object terminal is sent is received, the feedback information is input by user to the first object terminal The base station for occurring to access when the event is whether the instruction information of pseudo-base station accurately enters information.
26. a kind of terminal, which is characterized in that including:
Processor, communication interface, memory, output unit and bus, the processor, the communication interface, the output are single It is first to be connected by the bus with the memory;
The memory, for storing operational order;
The processor, for calling the operational order, detecting event to occur and acquire the information of the event;
The communication interface, the information for sending the event to server;Receive the pseudo-base station that the server is sent Indicate information, the instruction information of the pseudo-base station is acquisition of information of the server according to the event;
The output unit, the instruction information for prompting the pseudo-base station.
27. terminal according to claim 26, which is characterized in that the terminal further includes input unit,
The input unit is additionally operable to receive feedback information, and the feedback information is input by user to terminal generation institute State whether the instruction information that the base station accessed when event is pseudo-base station accurately enters information;
The communication interface is additionally operable to send the feedback information to the server, and the feedback information is used for the service Device modifies to the suspicious probability of the pseudo-base station.
28. the terminal according to claim 26 or 27, which is characterized in that the output unit includes display unit,
The display unit, for the instruction information by pseudo-base station described in text importing.
29. the terminal according to claim 26 or 27, which is characterized in that the output unit includes display unit,
The display unit, the instruction information for showing the pseudo-base station by risk identification.
30. the terminal according to claim 26 or 27, which is characterized in that the output unit includes voicefrequency circuit,
The voicefrequency circuit, for the instruction information by pseudo-base station described in voice prompt.
31. a kind of computer readable storage medium, including instruction, when run on a computer so that computer executes such as Method described in claim 1-17 any one.
32. a kind of computer program product including instruction, when run on a computer so that computer executes such as right It is required that the method described in 1-17 any one.
CN201780005192.7A 2017-01-22 2017-05-31 A prompting method, terminal and server Active CN108513717B (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
CN201710052278 2017-01-22
CN2017100522787 2017-01-22
PCT/CN2017/086643 WO2018133284A1 (en) 2017-01-22 2017-05-31 Prompting method, terminal, and server

Publications (2)

Publication Number Publication Date
CN108513717A true CN108513717A (en) 2018-09-07
CN108513717B CN108513717B (en) 2020-09-04

Family

ID=62907654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780005192.7A Active CN108513717B (en) 2017-01-22 2017-05-31 A prompting method, terminal and server

Country Status (2)

Country Link
CN (1) CN108513717B (en)
WO (1) WO2018133284A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213724A (en) * 2019-05-17 2019-09-06 国家计算机网络与信息安全管理中心 A kind of recognition methods of pseudo-base station motion profile
CN111582679A (en) * 2020-04-24 2020-08-25 腾讯科技(成都)有限公司 Processing method, device and equipment for application service partition and storage medium

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124698A (en) * 2018-10-30 2020-05-08 北京奇虎科技有限公司 Communication event identification method and device, electronic equipment and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430653A (en) * 2014-09-19 2016-03-23 中国电信股份有限公司 Pseudo base station discovery method and system
CN105744527A (en) * 2016-03-28 2016-07-06 河海大学 Pseudo base station detection method and system based on big data and cloud computing
CN105764059A (en) * 2014-12-15 2016-07-13 北京新讯世纪信息技术有限公司 Method for identifying pseudo base station based on terminal position information
US20160381545A1 (en) * 2015-06-26 2016-12-29 Futurewei Technologies, Inc. System and Method for Faked Base Station Detection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430653A (en) * 2014-09-19 2016-03-23 中国电信股份有限公司 Pseudo base station discovery method and system
CN105764059A (en) * 2014-12-15 2016-07-13 北京新讯世纪信息技术有限公司 Method for identifying pseudo base station based on terminal position information
US20160381545A1 (en) * 2015-06-26 2016-12-29 Futurewei Technologies, Inc. System and Method for Faked Base Station Detection
CN105744527A (en) * 2016-03-28 2016-07-06 河海大学 Pseudo base station detection method and system based on big data and cloud computing

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213724A (en) * 2019-05-17 2019-09-06 国家计算机网络与信息安全管理中心 A kind of recognition methods of pseudo-base station motion profile
CN110213724B (en) * 2019-05-17 2020-10-20 国家计算机网络与信息安全管理中心 Pseudo base station motion trajectory identification method
CN111582679A (en) * 2020-04-24 2020-08-25 腾讯科技(成都)有限公司 Processing method, device and equipment for application service partition and storage medium
CN111582679B (en) * 2020-04-24 2023-04-18 腾讯科技(成都)有限公司 Processing method, device and equipment for application service partition and storage medium

Also Published As

Publication number Publication date
CN108513717B (en) 2020-09-04
WO2018133284A1 (en) 2018-07-26

Similar Documents

Publication Publication Date Title
US9813538B2 (en) Malicious call recognition method and apparatus
US10785369B1 (en) Multi-factor scam call detection and alerting
CN111316673B (en) Electronic fence updating method and communication device
CN106657690A (en) Method and device for preventing phone scam, and mobile terminal
US10587741B2 (en) Communication event processing method and apparatus
CN107959936A (en) Recognition methods, system, terminal and the computer-readable storage medium of 4G pseudo-base stations
CN108124262A (en) Pseudo-base station recognition methods, terminal and computer readable storage medium
CN106161749A (en) A kind of malicious call recognition methods, and device
CN108600516B (en) Data acquisition method, mobile terminal and computer readable storage medium
CN112351441B (en) A data processing method, device and electronic equipment
CN109771952A (en) Based reminding method, terminal and computer readable storage medium based on game fatigue strength
CN108845821A (en) Application program update method, terminal and computer readable storage medium
CN108513717B (en) A prompting method, terminal and server
CN109144705A (en) Application management method, mobile terminal and computer readable storage medium
CN106941564A (en) Voice message playing method and mobile terminal
CN108174384A (en) Pseudo-base station recognition methods, terminal and computer readable storage medium
CN108959960B (en) Method, device and computer readable storage medium for preventing privacy disclosure
CN113596907B (en) Call processing method, terminal device and computer readable storage medium
CN106020945A (en) Shortcut item adding method and device
CN113485899A (en) Information processing method, terminal device and storage medium
KR20220122731A (en) Multicast service processing method, multicast service setting method and communication device
CN107967155A (en) Method, apparatus, the server of program operation are realized based on Hook shared libraries
CN109548028B (en) Base station type identification method, device, terminal and computer readable storage medium
CN110175125A (en) Using operation exception solution, device, mobile terminal and storage medium
CN109831798A (en) Signal acquiring method, system, storage medium and mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant