[go: up one dir, main page]

WO2018133284A1 - Procédé d'invite, terminal et serveur - Google Patents

Procédé d'invite, terminal et serveur Download PDF

Info

Publication number
WO2018133284A1
WO2018133284A1 PCT/CN2017/086643 CN2017086643W WO2018133284A1 WO 2018133284 A1 WO2018133284 A1 WO 2018133284A1 CN 2017086643 W CN2017086643 W CN 2017086643W WO 2018133284 A1 WO2018133284 A1 WO 2018133284A1
Authority
WO
WIPO (PCT)
Prior art keywords
base station
information
terminal
server
pseudo base
Prior art date
Application number
PCT/CN2017/086643
Other languages
English (en)
Chinese (zh)
Inventor
朱振华
张小菊
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201780005192.7A priority Critical patent/CN108513717B/zh
Publication of WO2018133284A1 publication Critical patent/WO2018133284A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • H04W12/121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
    • H04W12/122Counter-measures against attacks; Protection against rogue devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/12Detection or prevention of fraud
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/08Access point devices

Definitions

  • the present application relates to the field of communications, and in particular, to a prompting method, a terminal, and a server.
  • a method of generally identifying a pseudo base station is a method of identifying a pseudo base station by comparing a base station characteristic parameter with a terminal and a method of identifying a pseudo base station based on a base station position.
  • the method for identifying a pseudo base station by comparing the characteristics of the base station with the terminal is: the terminal parses the characteristic parameter of the base station, and matches the locally preset feature parameter database, and if it is within the legal range, it is considered to be a legal base station. Otherwise, it is considered to be a pseudo base station, and the pseudo base station is directly blocked from the terminal.
  • the decision logic relies entirely on the terminal and cannot be upgraded. With the development of the pseudo base station technology, some characteristic parameters can also be adjusted, but the terminal cannot be obtained dynamically, which easily leads to misjudgment.
  • the method for identifying the pseudo base station based on the location of the base station is: when the terminal receives the notification type short message, the short message and the terminal location information are reported to the server.
  • the server performs calculation based on the information reported by a large number of terminals, obtains the base station information in a certain area, and then compares with the location in the carrier base station library, and is not considered as a pseudo base station in the carrier base station library.
  • a judgment method only has a risk for judging a notification type message, and the pseudo base station can construct an arbitrary number, so the sent short messages are not necessarily notification type short messages; the operator itself also has a mobile base station, which is aligned from the position alone. It is not completely reliable; in addition, the location of the base station reported by the terminal is obtained by algorithm calculation, and there is an error in itself.
  • the embodiment of the present application provides a prompting method, a terminal, and a server, which are used by a server to obtain information of a real base station with higher accuracy and information of a pseudo base station according to big data reported by multiple terminals.
  • a first aspect of the embodiments of the present application provides a prompting method, where the method may be applied to a scenario in which a server is connected to multiple terminals, and the method may include: the server receives information of events sent by multiple terminals; the event may be Receiving a short message and/or an incoming call; it should be understood that the information of the event may be information of an event reported by the terminal receiving a certain threshold of the server, or may be information that the server receives a certain threshold number of events, or may be, the server receives the pre- The information of the event reported by the terminal within the duration is not limited herein.
  • the server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  • the server can perform calculation according to the big data reported by multiple terminals, and the accuracy of the obtained real base station information and the pseudo base station information is relatively high. It should be understood that although the more data reported by the terminal, the more accurate the information of the real base station and the information of the pseudo base station acquired by the server, these need to be within the load range of the server.
  • the server obtains the information of the real base station and the information of the pseudo base station. If the target terminal accessing the pseudo base station is determined, the information about the first event reported by the first terminal may be determined next time, and the authenticity of the first base station accessed by the first terminal may be determined.
  • the method may further include: the server, according to information of the real base station, and the pseudo base station And determining, by the information, a target terminal that accesses the pseudo base station among the plurality of terminals; and the server sends the indication information of the pseudo base station to the target terminal.
  • the indication information of the pseudo base station may be sent to the target terminal, and the indication information of the pseudo base station is used for prompting the target terminal, so that the user is alert to the event occurring on the target terminal, and is careful to be fooled. Being cheated.
  • the information of the event includes a terminal identifier, and location information of the terminal.
  • the information of the event may also include a short message content and/or a caller number. It should be understood that the information of the event includes, but is not limited to, the information mentioned above, and the information of the event may be used by the server to perform calculation of big data, and obtain information of the real base station and information of the pseudo base station.
  • the server acquires a real base station according to information about events sent by the multiple terminals.
  • the information may include: the server determining, according to the location information of the terminal sent by the multiple terminals, the information of the base station accessed when the event occurs, the time when the event occurs, and the preset location calculation accuracy.
  • the server deletes, from the information about the initial base station of the longitude, latitude, and date, the information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold; where the first threshold may be an empirical value, or may be based on Set according to the actual situation.
  • the server removes the date, and the information of the other initial base stations are combined to obtain information about the longitude and latitude of the screening base station; and the server determines that the information of the screening base station is the information of the real base station.
  • an implementation manner of acquiring information of a real base station is provided, which increases the feasibility of the solution.
  • the server acquires a pseudo base station according to information about events sent by the multiple terminals.
  • the information may include: that is, the server utilizes the characteristics of the pseudo base station movement (movable, suddenly appears and disappears), and identifies potential pseudo base stations. Determining, by the server, location information of the terminal that the target base station accesses at the first time according to the location information of the terminal that is sent by the multiple terminals, the information of the base station that is accessed when the event occurs, and the time when the event occurs.
  • the location information of the terminal accessed at the second time, the target base station is any base station that is accessed when the multiple terminals generate the event; the server is according to the terminal that the target base station accesses at the first time The location information is calculated, the first central location of the accessed terminal is calculated, and the second central location of the accessed terminal is calculated according to the location information of the terminal accessed by the target base station at the second time; the server determines the Determining, by the first central location, a first location of the target base station, determining that the second central location is a second location of the target base station; and determining an absolute value of a difference between the first location and the second location If the value is greater than the second threshold, the server determines that the information of the target base station is information of the pseudo base station.
  • an implementation manner of acquiring information of a real pseudo base station is provided, which increases the feasibility of the solution.
  • the method may further include: The server marks the suspicious probability of the real base station and the pseudo base station; the server may mark the suspicious probability of the real base station as 0, and the suspicious probability of the pseudo base station is marked as 100%, or may be marked according to actual conditions.
  • the server receives the feedback information sent by the first target terminal, where the feedback information is input information that is input by the user, whether the base station that is accessed when the event occurs when the first target terminal is the pseudo base station is accurate;
  • the target terminal may prompt the indication information of the pseudo base station, and the target terminal receives the feedback information input by the user, and the target terminal that receives the feedback information may be referred to as the first
  • the target terminal reports the feedback information to the server.
  • the server correspondingly modifies the suspicious probability of the pseudo base station according to the feedback information, and obtains a modified suspicious probability of the pseudo base station.
  • the information of the saved real base station and the information of the pseudo base station are updated, so that the information of the saved real base station and the information of the pseudo base station are the latest records.
  • the server may modify the saved information of the real base station and the suspicious probability of the information of the pseudo base station, thereby updating the information of the real base station and the information of the pseudo base station.
  • the server may determine, according to the updated information of the real base station and the information of the pseudo base station, whether the first base station accessed by the terminal when the first event occurs is a pseudo base station. In this way, the accuracy of the result judged based on the real-time updated real base station information and the pseudo base station information is higher.
  • the method may further include: determining, by the server, a suspicious probability
  • the information of the base station that is greater than the third threshold is the information of the target pseudo base station, and the information of the base station whose suspicious probability is less than the fourth threshold is the information of the target real base station;
  • the information of the target real base station and the information of the target pseudo base station include but are not limited to (cell) Identification, CID), location area code (LAC), signal strength, difference between acquisition time and reporting time.
  • the server performs model training according to the information of the target pseudo base station and the information of the target real base station, and obtains reference weights of respective features included in the information of the base station.
  • the information of the first base station in the information of the first event reported by the first terminal may be calculated to obtain the first base station.
  • the target suspicious probability, and thus the authenticity of the first base station provides an implementation manner for determining whether the first base station is a real base station or a pseudo base station, so that the embodiment of the present application is more perfect.
  • the method may further include: the server receiving the first The information of the first event sent by the terminal, the information of the first event may include information of the first base station that is accessed when the first event occurs; if the information of the first base station is in the information of the pseudo base station And the server sends the indication information of the pseudo base station to the first terminal.
  • the information of the first event includes, but is not limited to, the information mentioned above.
  • the information of the first event may further include the first terminal identifier, location information of the first terminal, and a time when the first event occurs.
  • an implementation manner of determining a pseudo base station may determine, according to the previously calculated information of the real base station and the information of the pseudo base station, whether the information of the first base station is located therein. If the first base station is in the information of the pseudo base station, the first base station is a pseudo base station, then the server may send the indication information of the pseudo base station to the first terminal, and the information of the pseudo base station calculated according to the big data and the real base station.
  • the accuracy rate is relatively high, so the accuracy of determining the first base station as a pseudo base station is also relatively high.
  • the method may further include: if the information of the first base station is not in the information of the pseudo base station, the server, according to the information of the first event, and the base station The reference weight of each feature included in the information determines a target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the server determines that the first base station is a pseudo base station; The server sends the indication information of the pseudo base station to the first terminal.
  • the reference base weight of each feature in the information of the base station is used to calculate whether the first base station is a pseudo base station, which is an optional implementation manner.
  • the event may include: receiving a short message and/or an incoming call; the information of the event may further include: a content of the short message and/or a number of the incoming call.
  • a second aspect of the embodiments of the present application provides a prompting method, which may include: detecting, by a terminal, an event occurrence and collecting information of the event; the terminal sending information of the event to a server; if multiple terminals send an event to a server Then, the server can obtain the information of the real base station and the information of the pseudo base station according to the information of the event sent by the multiple terminals, so that it can be determined whether the terminal access is a pseudo base station.
  • the terminal receives the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event; and the terminal prompts the indication information of the pseudo base station. If the terminal prompts the indication information of the pseudo base station, the user can be alerted to the event occurring on the target terminal, and be careful to be deceived.
  • the information about the event may include the terminal identifier, location information of the terminal, and the event occurs.
  • the information of the event may also include a short message content and/or a caller number. It should be understood that the information of the event includes, but is not limited to, the information mentioned above, and the information of the event may be used by the server to perform calculation of big data, and obtain information of the real base station and information of the pseudo base station.
  • the method may further include: receiving, by the terminal, feedback information
  • the feedback information is input information input by the user to the base station that is accessed when the terminal occurs when the event occurs, and the terminal information is accurate; the terminal sends the feedback information to the server, the feedback The information is used by the server to modify the suspicious probability of the pseudo base station. It should be understood that, assuming that the terminal receiving the feedback information here is referred to as a first target terminal.
  • the server may modify the saved information of the real base station and the suspicious probability of the information of the pseudo base station, thereby updating the information of the real base station and the information of the pseudo base station. . Therefore, when the server receives the information of the first event reported by the first terminal, the server may determine, according to the updated information of the real base station and the information of the pseudo base station, whether the first base station accessed by the terminal when the first event occurs is a pseudo base station. Thus, the accuracy of the result judged based on the real-time updated real base station information and the pseudo base station information is higher.
  • the terminal The indication information of the pseudo base station may be: the terminal displays the indication information of the pseudo base station by using a text; and/or the terminal displays the indication information of the pseudo base station by using a danger identifier; and/or The terminal prompts the indication information of the pseudo base station by voice. It is to be noted that the terminal displays the information of the event by using an application interface corresponding to the event, where the information of the event may include a short message content and/or an incoming call number, and may prompt the prompt information of the pseudo base station on the application interface. . Should The interface can be an SMS interface or an incoming call interface.
  • the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: a content of the short message and/or a number of the incoming call.
  • a third aspect of the embodiments of the present application provides a server, which has a function of implementing information corresponding to the acquired real base station and information of the pseudo base station provided by the foregoing first aspect.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a fourth aspect of the embodiments of the present application provides a terminal, which has a function of implementing indication information corresponding to the prompting pseudo base station provided by the foregoing second aspect.
  • This function can be implemented in hardware or in hardware by executing the corresponding software.
  • the hardware or software includes one or more modules corresponding to the functions described above.
  • a fifth aspect of the embodiments of the present application provides a server, which may include: a transceiver, a processor, a memory, and a bus, where the transceiver, the processor, and the memory are connected by using the bus;
  • the memory is configured to store an operation instruction
  • the transceiver is configured to receive information about events sent by multiple terminals;
  • the processor is configured to invoke the operation instruction, and acquire information of a real base station and information of a pseudo base station according to information of an event sent by the multiple terminals.
  • the processor is further configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals;
  • the transceiver is further configured to send indication information of the pseudo base station to the target terminal.
  • the information of the event includes a terminal identifier, location information of the terminal, information of a base station accessed when the event occurs, and a time when the event occurs.
  • the processor is specifically configured to perform the following steps:
  • an initial base station regarding longitude, latitude, and date according to location information of the terminal transmitted by the plurality of terminals, information of a base station accessed when the event occurs, a time when the event occurs, and preset position calculation accuracy Information from the initial base station on the longitude, latitude, and date, deleting information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold; removing the date, and combining information of other initial base stations to obtain Information about screening base stations for longitude and latitude; determining information of the screening base station as information of a real base station.
  • the processor is specifically configured to perform the following steps:
  • Determining location information and a second time of the terminal accessed by the target base station at the first time according to the location information of the terminal that is sent by the multiple terminals, the information of the base station that is accessed when the event occurs, and the time when the event occurs.
  • the location information of the accessed terminal, the target base station is any base station that is accessed when the multiple terminals generate the event; and the location information of the terminal accessed by the target base station at the first time is calculated and connected.
  • a first central location of the incoming terminal calculating a second central location of the accessed terminal according to the location information of the terminal accessed by the target base station at the second time; determining that the first central location is the target base station a first location, determining that the second central location is a second location of the target base station; if the absolute value of the difference between the first location and the second location is greater than a second threshold, the processing The device determines that the information of the target base station is information of a pseudo base station.
  • the processor is further configured to: perform marking: suspicious probability of the real base station and the pseudo base station; and correspondingly modify a suspicious probability of the pseudo base station according to the feedback information, The modified suspicious probability of the pseudo base station;
  • the transceiver is further configured to: receive feedback information sent by the first target terminal, where the feedback information is an indication that the base station that is accessed by the user when the event occurs when the first target terminal occurs is a pseudo base station Whether the information is entered accurately.
  • the processor is further configured to perform the following steps:
  • Determining information of the base station whose suspicious probability is greater than the third threshold is information of the target pseudo base station, and information of the base station whose suspicious probability is less than the fourth threshold is information of the target real base station; according to the information of the target pseudo base station and the target real base station Information, model training, and reference weights of various features included in the information of the base station.
  • the transceiver is further configured to perform the following steps:
  • the transceiver sends the indication information of the pseudo base station to the first terminal.
  • the processor is further configured to perform the following steps:
  • the processor module determines, according to the information of the first event and the reference weight of each feature included in the information of the base station, a target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the processor determines that the first base station is a pseudo base station;
  • the transceiver is further configured to: send the indication information of the pseudo base station to the first terminal.
  • the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: the content of the short message and/or the number of the incoming call.
  • a sixth aspect of the embodiments of the present application provides a terminal, which may include: a processor, a communication interface, a memory, an output unit, and a bus, wherein the processor, the communication interface, the output unit, and the memory pass through the bus connection;
  • the memory is configured to store an operation instruction
  • the processor is configured to invoke the operation instruction, detect an event occurrence, and collect information about the event;
  • the communication interface is configured to send the information of the event to the server, and receive the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event;
  • the output unit is configured to prompt indication information of the pseudo base station.
  • the information of the event includes the identifier of the terminal, location information of the terminal, information of a base station accessed when the event occurs, time when the event occurs, and prompting the pseudo base station Instructions.
  • the terminal further includes an input unit, where the input unit is further configured to receive feedback information, where the feedback information is a base station that is input by the user when the event occurs when the terminal occurs. Whether the indication information of the pseudo base station is accurate input information;
  • the communication interface is further configured to send the feedback information to the server, where the feedback information is used by the server to modify a suspicious probability of the pseudo base station.
  • the output unit includes a display unit, and the display unit is configured to display indication information of the pseudo base station by text.
  • the output unit includes a display unit, and the display unit is configured to display indication information of the pseudo base station by a danger identifier.
  • the output unit comprises an audio circuit
  • the audio circuit is configured to prompt the indication information of the pseudo base station by voice.
  • a seventh aspect of the present application provides a communication system, where the communication system includes a server and a terminal, and the server is a server that is implemented in the foregoing implementation manner of the first aspect or the optional implementation of the first aspect;
  • the terminal is a terminal that is implemented in the second aspect of the present application or any of the alternative implementations of the second aspect.
  • An eighth aspect of the embodiments of the present invention provides a storage medium.
  • the technical solution of the present invention may contribute to the prior art or all or part of the technical solution may be implemented by software.
  • the computer software product is stored in a storage medium for storing computer software instructions for use in the above apparatus, comprising: a server for performing the first aspect, the second aspect, the third aspect or the fourth aspect described above Or the program designed by the terminal.
  • the storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like, which can store program codes.
  • a ninth aspect of the embodiments of the present invention provides a computer program product comprising instructions, which when executed on a computer, cause the computer to perform the method as described in the first aspect of the present application or any alternative implementation of the first aspect.
  • a tenth aspect of the embodiments of the present invention provides a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method as described in the second aspect of the present application or any alternative implementation of the second aspect.
  • the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by the multiple terminals. Therefore, the accuracy of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives the information of the event sent by the multiple terminals, and the information of the event may include the identifier of the terminal, the location information of the terminal, the information of the base station that is accessed when the event occurs, and the time when the event occurs. The server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  • the server may further determine, according to the information of the real base station and the information of the pseudo base station, the target terminal that accesses the pseudo base station among the multiple terminals, and send the indication information of the pseudo base station to the target terminal, so that the user causes an event occurring on the target terminal. Be alert, be careful to be deceived.
  • FIG. 1 is a frame diagram of a communication system applied in an embodiment of the present application.
  • FIG. 2 is a schematic diagram of a scenario applied in an embodiment of the present application.
  • FIG. 3 is a schematic diagram of an embodiment of a prompting method in an embodiment of the present application.
  • FIG. 4(a) is a schematic diagram of a terminal receiving a short message interface display according to an embodiment of the present application.
  • FIG. 4(b) is a schematic diagram of a terminal receiving an incoming call interface display according to an embodiment of the present application
  • FIG. 4(c) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(d) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(e) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(f) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(g) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(h) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(i) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(j) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • 4(k) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(1) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(m) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(n) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(o) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 4(p) is another schematic diagram of the indication information of the terminal prompting the pseudo base station in the embodiment of the present application.
  • FIG. 5 is a schematic diagram of another embodiment of a prompting method in an embodiment of the present application.
  • FIG. 6(a) is a schematic diagram of a terminal displaying input feedback information on a short message interface according to an embodiment of the present application
  • FIG. 6(b) is another schematic diagram of the terminal displaying input feedback information on the short message interface in the embodiment of the present application.
  • FIG. 6(c) is a schematic diagram of the terminal displaying input feedback information on the incoming call interface in the embodiment of the present application.
  • 6(d) is another schematic diagram of the terminal displaying input feedback information on the incoming call interface in the embodiment of the present application.
  • FIG. 7 is a schematic diagram of another embodiment of a prompting method in an embodiment of the present application.
  • FIG. 8 is a schematic diagram of another embodiment of a prompting method in an embodiment of the present application.
  • FIG. 9(a) is a schematic diagram of an embodiment of a server in an embodiment of the present application.
  • FIG. 9(b) is a schematic diagram of an embodiment of a server in an embodiment of the present application.
  • FIG. 9(c) is a schematic diagram of an embodiment of a server in an embodiment of the present application.
  • FIG. 9(d) is a schematic diagram of an embodiment of a server in an embodiment of the present application.
  • FIG. 10 is a schematic diagram of an embodiment of a terminal in an embodiment of the present application.
  • FIG. 11 is a schematic diagram of another embodiment of a server in an embodiment of the present application.
  • FIG. 12 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the method for identifying a pseudo base station by using a terminal to compare base station characteristic parameters is as follows: when the terminal accesses the base station, parsing characteristic parameters of the base station, including a cell identifier or a cell identification (CID) called a base station, Location area code (LAC) and system information.
  • CID cell identification
  • LAC Location area code
  • the feature parameters are then matched to a locally preset parameter library, which is considered a legitimate base station if it is within the legal range. Otherwise, it is considered to be a pseudo base station, and the pseudo base station is directly blocked from the terminal.
  • the judgment logic of the method is directly preset on the terminal chip, and the terminal device can be directly shielded from accessing the base station after the judgment. However, the decision logic relies entirely on the terminal and cannot be upgraded. With pseudo base station technology Some characteristic parameters of the development of the technique can also be adjusted, but the terminal cannot be obtained dynamically, which is easy to cause misjudgment.
  • the method for identifying the pseudo base station based on the location of the base station is that the notification is only for the notification type message, and the pseudo base station can construct any number not necessarily the notification type short message; the operator itself also has the mobile base station, and the position comparison is not It is completely reliable; in addition, the location of the base station reported by the device side is obtained by algorithm calculation, and there is an error in itself.
  • the technical solution of the present application mainly solves the problem of the accuracy of the judgment caused by the failure of the local parameter database to be updated in time, and the judgment accuracy rate caused by the source of the data report being limited to the notification type short message and the operator mobile base station when using the server for judgment. .
  • the communication system framework diagram applied in the embodiment of the present application is as shown in FIG. 1, and the communication system may include a terminal and a server.
  • FIG. 2 a schematic diagram of a scenario applied by an embodiment of the present application, a legal base station that can be accessed by a terminal in the A area has a base station 2, and a correct base station that can be accessed in the B area has a base station 2, 3, and 4.
  • the server may receive the information of the event reported by the terminal, and the information of the event may include the identifier of the terminal, the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs.
  • the event may be receiving a text message or receiving an incoming call.
  • the server determining, according to the information of the real base station and the information of the pseudo base station, the access pseudo in the large number of terminals. a target terminal of the base station; the server transmitting indication information of the pseudo base station to the target terminal.
  • the server may further determine, according to the determined information of the real base station and the information of the pseudo base station, the target terminal in which the access base station is the pseudo base station, and send the indication information of the pseudo base station to the target terminal, so that the user occurs on the terminal. The incident caused vigilance and was carefully deceived.
  • the server may further improve the suspicious probability of the pseudo base station, update the information of the real base station, and the information of the pseudo base station by using the characteristics of the pseudo base station movement, combined with the feedback information of the terminal, so that the server receives the first terminal next time.
  • the information about the real base station and the information of the pseudo base station may be used to determine whether the first base station accessed by the terminal when the first event occurs is a pseudo base station, such that the real base station according to the real-time update
  • the information and the information of the pseudo base station determine the accuracy of the result.
  • the server may further select, according to the suspicious probability corresponding to the information of the real base station and the information of the pseudo base station, the information of the base station with the highest suspicious probability as the positive example, and the information of the base station with the lowest suspicious probability as the negative example.
  • Model training is performed to obtain reference weights of respective features included in the information of each base station.
  • the reference weights of the respective features may be used when the server receives the information of the first event reported by the first terminal, and according to the reference weight of each feature and the information of the first event, calculate the access time when the first event occurs.
  • the target probability of a base station may be used when the server receives the information of the first event reported by the first terminal, and according to the reference weight of each feature and the information of the first event, calculate the access time when the first event occurs.
  • the server determines that the first base station is a real base station; if the target probability is less than or equal to the preset threshold, the server determines that the first base station is a pseudo base station, and the server sends the indication information of the pseudo base station to the terminal. In this way, the server can calculate whether the first base station accessed by the newly received terminal of the server is a pseudo base station according to the reference weight of each feature and the information of the first event, and provide another method for determining the pseudo base station.
  • the implementation method increases the feasibility of the scheme.
  • FIG. 3 it is a schematic diagram of an embodiment of a prompting method in an embodiment of the present application, including:
  • the server receives information about events sent by multiple terminals.
  • the terminal before the server receives the information of the event sent by the multiple terminals, the terminal generates a detection event and collects information about the event, where the information of the event may include the terminal identifier (International Mobile Equipment Identity, The IMEI), the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs, the time at which the event occurs may also be referred to as a timestamp.
  • the terminal sends the information of the event to the server, it being understood that the event may include receiving a text message and/or receiving an incoming call.
  • the information of the event may also include information such as the content of the short message and/or the number of the incoming call.
  • the terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, etc.
  • the terminal may be a mobile phone.
  • FIG. 4( a ) a schematic diagram of the mobile phone receiving the short message interface display.
  • FIG. 4(b) a schematic diagram of receiving an incoming call interface for a mobile phone.
  • the location information of the terminal may be obtained by using a Global Positioning System (GPS) to obtain latitude and longitude, or using a network to calculate latitude and longitude.
  • the location information of the terminal may include, but is not limited to, latitude and longitude, a Wireless Fidelity (WiFi) wireless access point's physical address (Basic Service Set identifier, BSSID) / a wireless access point identifier or a service set identifier ( Service Set Identifier (SSID)/Medium Access Control address (MAC addr)/Network ID (Network ID), information such as the currently scanned WiFi SSID.
  • WiFi Wireless Fidelity
  • BSSID Base Service Set identifier
  • MAC addr Service Set Identifier
  • Network ID Network ID
  • the information of the base station that is accessed when the event occurs may include the sector identifier of the base station, and may also be referred to as a cell identification (CID), a LAC, an adjacent CID, and may also include information such as signal strength and cell information.
  • CID cell identification
  • LAC LAC
  • adjacent CID information such as signal strength and cell information.
  • the information of the base stations that are accessed when multiple terminals generate events may be the same or different, and the time of occurrence of the events may be the same or different. It is also possible that the same terminal transmits information of multiple events, and the information of the multiple events may be the same or different, and is determined by the information of the event actually collected by the terminal.
  • the server acquires information about a real base station and information of a pseudo base station according to information about events sent by the multiple terminals.
  • the server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  • the server can obtain information of the real base station and information of the pseudo base station by calculation of big data.
  • the server may set a quantity threshold, and when the number of terminals receiving the information of the sending event exceeds the quantity threshold, the server may obtain the real information according to the information of the event sent by the terminal exceeding the quantity threshold.
  • Information of the base station and information of the pseudo base station may be set a quantity threshold, and when the number of terminals receiving the information of the sending event exceeds the quantity threshold, the server may obtain the real information according to the information of the event sent by the terminal exceeding the quantity threshold.
  • the server may also set a specific threshold, which is the number of information for the event, that is, when the server receives information of an event exceeding a certain threshold, the server may The information of the event of the threshold acquires information of the real base station and information of the pseudo base station.
  • the server may further set a preset duration, and the server may acquire information of the real base station and information of the pseudo base station according to information of events sent by the multiple terminals received within the preset duration.
  • the server may acquire information of the real base station and information of the pseudo base station according to information of events sent by the multiple terminals received within the preset duration.
  • the server may obtain information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals in multiple manners.
  • the following examples will be explained separately:
  • the server may obtain the information of the real base station according to the information of the event sent by the multiple terminals, and may include:
  • Information of the initial base station the server deletes, from the information about the initial base station on the longitude, latitude, and date, information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold; the server removes the date,
  • the information of the other initial base stations is combined to obtain information about the longitude and latitude screening base stations; and the server determines that the information of the screening base station is the information of the real base station.
  • Example 1 The server according to the location information of a large number of terminals (the latitude and longitude obtained by the terminal using the Global Positioning System (GPS), or the latitude and longitude calculated by the network), and the base station information that the terminal accesses when receiving the short message and/or the incoming call (
  • the CID and LAC are used to describe the time of receiving the short message and/or the incoming call, or the base station information currently accessed by the terminal, and the adjacent CID information to determine the information of the real base station.
  • a certain degree of computational accuracy such as limiting the latitude and longitude decimal places, such as to 5 decimal places
  • [lat1,lng1,date1] ⁇ cid1,lac1;cid2,lac2;cid3,lac3 ⁇ ;
  • [lat2,lng1,date1] ⁇ cid8, lac8; cid5, lac5; cid6, lac6 ⁇ ;
  • [lat2,lng2,date2] ⁇ cid5, lac5; cid6, lac6; cid7, lac7 ⁇ .
  • the server further combines the data according to the latitude and longitude according to the obtained data about the longitude, latitude and date.
  • the base station with unstable access occurs in consecutive days (for example, only one day of access occurs in a certain area)
  • [lat1,lng2] ⁇ cid1, lac1; cid2, lac2; cid3, lac3; cid4, lac4 ⁇ ;
  • [lat2,lng1] ⁇ cid8, lac8; cid5, lac5; cid6, lac6 ⁇ ;
  • the information of the real base station includes ⁇ cid1, lac1; cid2, lac2; cid3, lac3 ⁇ ; in the area of [lat1, lng2], the information of the real base station includes ⁇ cid1, lac1; cid2, lac2; cid3, lac3; cid4, lac4 ⁇ ; in the region [lat2, lng1], the real base station information includes ⁇ cid8, lac8; cid5, lac5; cid6, lac6 ⁇ ; , lng2] In this area, the real base station information includes ⁇ cid5, lac5; cid6, lac6; cid7, lac7 ⁇ .
  • the server may obtain the information of the pseudo base station according to the information of the event sent by the multiple terminals, and may include:
  • the location information of the terminal accessed at the second time, the target base station is any base station that is accessed when the multiple terminals generate the event; the server is according to the terminal that the target base station accesses at the first time The location information is calculated, the first central location of the accessed terminal is calculated, and the second central location of the accessed terminal is calculated according to the location information of the terminal accessed by the target base station at the second time; the server determines the Determining, by the first central location, a first location of the target base station, determining that the second central location is a second location of the target base station; and determining an absolute value of a difference between the first location and the second location If the value is greater than the second threshold, the server determines that the information of the target base station is information of the pseudo base station.
  • Example 2 The server determines the information of the pseudo base station according to the location information of a large number of terminals, the base station information (here described by CID and LAC) when the terminal receives the short message and/or the incoming call, and the time of receiving the short message and/or the incoming call. That is, the server uses the characteristics of the pseudo base station to move (movable, suddenly appears and disappears), and identifies potential pseudo base stations.
  • Obtaining location information of a group of terminals accessing the base station when each base station occurs: [cid, lac, timestamp] ⁇ lat, lng; lat, lng; ... ⁇ .
  • the server can calculate the first central location of the set of terminals at the first time, the second central location of the set of terminals at the second time, and the third central location of the set of terminals at the third time, at the third The fourth central position of this group of terminals in four time.
  • the first central location can be considered to be the location of the base station 1 at the first time
  • the second central location is the location of the base station 1 at the second time
  • the third central location is the location of the base station 1 at the third time
  • the fourth central location It is the position of the base station 1 at the fourth time.
  • the deviation within a certain distance belongs to the normal range; the deviation of 500 m or more can be considered as the mobile base station.
  • MC ⁇ cid, lac; cid, lac; ... ⁇ .
  • the base station 1 can be considered as the mobile base station.
  • the above description is only taking the base station 1 as an example, and other base stations are similar processing methods, and details are not described herein again.
  • the base station 1 has a high probability Pseudo base station. It should be understood that both MC and SC can be considered as information of the pseudo base station and can identify the suspicious probability as 100%.
  • the terminal position ⁇ which is larger than the first center position ⁇ can be excluded, and the group terminal is calculated again (excluding the deviation from the first center)
  • the first target center position of the larger terminal similarly, after calculating the second center position, the terminal position that deviates from the second center position can be excluded, and then calculated.
  • the second target center position of this group of terminals (excluding the terminal that is larger than the second center position) is excluded; the others can be similarly processed, and will not be described here. Because if the position of the terminal is too far from the first center position ⁇ and the second center position , it means that the calculated center position ⁇ has a large deviation from the position of the base station, and is used to indicate the position of the base station.
  • the reliability is poor. Therefore, the terminal position with large deviation can be eliminated, and then a calculation is performed to indicate the position of the base station, and the accuracy is relatively high.
  • the first target center position ⁇ and the second target center position ⁇ are used to indicate the position of the base station at different times. The subsequent calculation method is similar to the above description, and details are not described herein again.
  • the information of the real base station and the information of the pseudo base station are obtained by the server according to the information of the events sent by the multiple terminals, including but not limited to the above-mentioned methods.
  • the server may determine the information of the pseudo base station according to the information of all the base stations reported by the multiple terminals, and the remaining information may be regarded as the information of the real base station;
  • the information can be determined by the server according to the information of all the base stations reported by the multiple terminals, except for the information of the real base station, and the rest can be regarded as the information of the pseudo base station.
  • the server determines, according to the information about the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals.
  • the information of the real base station is as follows:
  • the information of the pseudo base station is shown in Table 2 below:
  • the base station is the target terminal of the pseudo base station. If 100 terminals access the pseudo base station, the server can send the indication information of the pseudo base station to the 100 terminals.
  • the server sends the indication information of the pseudo base station to the target terminal.
  • the indication information that the server sends the pseudo base station to the 100 terminals may be sent at the same time, and the indication information of the pseudo base station may be sent according to the priority of the terminal, which is not limited herein. It should be noted that, in an actual application, the server may also send the indication information of the real base station to the terminal that is accessed by the base station that is accessed when the event occurs in the multiple terminals.
  • the target terminal prompts indication information of the pseudo base station.
  • the target terminal may display the information of the event by using an application interface corresponding to the event, where the information of the event may include a short message content and/or an incoming call number.
  • the indication information that the target terminal prompts the pseudo base station may include, but is not limited to, the following implementation manners:
  • Manner 1 The terminal displays the indication information of the pseudo base station by text.
  • Manner 2 The terminal prompts the indication information of the pseudo base station by voice.
  • Manner 3 The terminal displays the indication information of the pseudo base station by using a hazard identifier.
  • the information of the pseudo base station can be prompted by the application interface corresponding to the event on the target terminal. That is, the mobile phone may prompt the instruction information of the pseudo base station by using an SMS interface corresponding to the short message, and/or an incoming call interface corresponding to the incoming call, and/or voice.
  • the target terminal here may refer to the above 100 terminals, and one of them is taken as an example (such as a mobile phone) for explanation.
  • the terminal may display the indication information of the pseudo base station by using a text.
  • the mobile phone receives the short message content 11 displayed by the short message, and displays the indication information of the pseudo base station through the text 21 on the short message interface.
  • FIG. 4(c) a schematic diagram of the indication information of the pseudo base station is displayed on the short message interface of the mobile phone.
  • the indication information of the pseudo base station is a text indication of "suspected fraudulent short message".
  • the mobile phone receives the caller ID 12 of the caller ID, and displays the indication information of the pseudo base station through the text 21 on the incoming call interface.
  • the indication information of the pseudo base station is displayed for the mobile phone through the incoming call interface.
  • the indication information of the pseudo base station is a text indication of "suspected fraudulent incoming call".
  • the text prompt may also be a high-risk short message or a high-risk point, and the like is not limited.
  • the terminal may prompt the indication information of the pseudo base station by voice.
  • the mobile phone receives the short message content 11 displayed by the short message, and prompts the indication information of the pseudo base station through the voice 22 on the short message interface.
  • FIG. 4(e) it is a schematic diagram of the mobile phone performing voice prompting on the received short message according to the indication information of the pseudo base station.
  • the indication information of the pseudo base station triggers the preset voice function, and the mobile phone plays the voice (for example, the preset voice may be that the short message may be a fraudulent message, etc., or * The text message sent by the number may be a fraudulent message, etc.) to remind the user.
  • FIG. 4(f) it is a schematic diagram of the mobile phone performing voice reminding on the received incoming call according to the indication information of the pseudo base station.
  • the indication information of the pseudo base station triggers the preset voice function, and the mobile phone reminds the user by playing the voice (for example, the preset voice may be that the number may be a fraudulent number, please be careful to answer, etc.).
  • the terminal may prompt the indication information of the pseudo base station by using a danger icon. It is assumed that the mobile phone receives the short message content 11 displayed by the short message, and prompts the indication information of the pseudo base station through the danger icon 23 on the short message interface. As shown in FIG. 4(g), it is a schematic diagram of the mobile phone reminding the received short message by the danger icon according to the indication information of the pseudo base station. In FIG. 4(g), the indication information of the pseudo base station triggers a danger icon, and the mobile phone displays a danger icon through the short message interface to remind the user. Assume that the mobile phone receives the caller ID 12 of the caller ID and prompts the indication information of the pseudo base station through the danger icon 23 on the incoming call interface.
  • FIG. 4(h) it is a schematic diagram of the mobile phone reminding the received incoming call by the danger icon according to the indication information of the pseudo base station.
  • the indication information of the pseudo base station triggers a danger icon, and the mobile phone displays a danger icon through the incoming call interface to remind the user.
  • the danger icon may include, but is not limited to, the hint of the triangle plus the exclamation mark shown in FIG. 4(g) and 4(h), and may also be a prompt of the triangle icon or an exclamation point icon or other dangerous prompt manner.
  • the prompting information about the indication information of the pseudo base station includes, but is not limited to, the foregoing implementation manners, and may be implemented in other manners, and is not limited thereto.
  • the text + voice prompt mode as shown in FIG. 4( i ), is a schematic diagram of the mobile phone reminding the received short message by text and voice according to the instruction information of the pseudo base station.
  • FIG. 4(j) it is a schematic diagram of the mobile phone reminding the received incoming call by text and voice according to the indication information of the pseudo base station.
  • the prompt mode of the text + danger icon is a schematic diagram of the mobile phone reminding the received short message by the text and the danger icon according to the instruction information of the pseudo base station.
  • FIG. 4(l) it is a schematic diagram for the mobile phone to remind the received incoming call by the text and the danger icon according to the indication information of the pseudo base station.
  • the prompt mode of the voice + danger icon is a schematic diagram of the mobile phone reminding the received short message by using the voice and danger icons according to the indication information of the pseudo base station.
  • FIG. 4(n) it is a schematic diagram for the mobile phone to remind the received incoming call by voice and danger icons according to the indication information of the pseudo base station.
  • the terminal may automatically classify the short message into the spam short message list to prompt the indication information of the pseudo base station, as shown in FIG. 4( o ), automatically classify the short message for the mobile phone to The indication of the pseudo base station is prompted in the spam list.
  • the terminal may prompt the indication information of the pseudo base station by automatically rejecting the incoming call, as shown in FIG. 4(p), which is a schematic diagram of the mobile phone automatically rejecting the indication information of the incoming call prompting pseudo base station.
  • the indication information of the text prompting pseudo base station and the indication information of the icon prompting the pseudo base station may be implemented in the form of a bullet frame, a suspended form, or a bubble, and the like is not limited. . Steps 303-305 are optional steps.
  • the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by the multiple terminals. Therefore, the accuracy of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives the information of the event sent by the multiple terminals, and the information of the event may include the identifier of the terminal, the location information of the terminal, the information of the base station that is accessed when the event occurs, and the time when the event occurs. The server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  • the server may further determine, according to the information of the real base station and the information of the pseudo base station, the target terminal that accesses the pseudo base station among the multiple terminals, and send the indication information of the pseudo base station to the target terminal, so that the user causes an event occurring on the target terminal. Be alert, be careful to be deceived.
  • FIG. 5 it is a schematic diagram of another embodiment of the prompting method in the embodiment of the present application, including:
  • the server receives information about events sent by multiple terminals.
  • the server acquires information about a real base station and information of a pseudo base station according to information about events sent by the multiple terminals.
  • the server determines, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals.
  • the server sends indication information of the pseudo base station to the target terminal.
  • the target terminal prompts indication information of the pseudo base station.
  • the steps 501-505 are similar to the steps 301-305 in the foregoing embodiment shown in FIG. 3, and details are not described herein again.
  • the server marks a suspicious probability of the real base station and the pseudo base station.
  • the server may mark the suspicious probability of the real base station and the pseudo base station, for example, marking the suspicious real base station.
  • the probability is 0, and the suspicious probability of marking the pseudo base station is 100%.
  • Example 1 As shown in Table 3 below, the correspondence between real base stations and suspicious probability in different areas.
  • Example 2 If both the suspicious base station and the mobile base station are considered to be pseudo base stations, as shown in Table 4 below, the correspondence relationship between the suspicious base station, the mobile base station, and the suspicious probability.
  • Suspicious base station Suspicious probability
  • Mobile base station Suspicious probability ⁇ cid8, lac8 ⁇ 100% ⁇ cid12,lac12 ⁇ 100% ⁇ cid15,lac15 ⁇ 100% ⁇ cid8, lac8 ⁇ 100% ⁇ cid19,lac19 ⁇ 100% ⁇ cid19,lac19 ⁇ 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid15,lac15 ⁇ 100% ⁇ cid36,lac36 ⁇ 100% ⁇ cid40,lac40 ⁇ 100%
  • the mobile base station and the suspicious base station shown in Table 4 can be regarded as pseudo base stations, but the suspicious probability that the suspicious base station is a pseudo base station may be higher. Since there are mobile base stations among operators, the suspicious probability that the mobile base station is a pseudo base station is relatively low.
  • Example 3 The suspicious probability flag of other base stations other than the suspicious base station in the mobile base station may also be marked lower, as shown in Table 5 below, as a correspondence relationship between the suspicious base station, the mobile base station, and the suspicious probability.
  • Suspicious base station Suspicious probability
  • Mobile base station Suspicious probability ⁇ cid8, lac8 ⁇ 100% ⁇ cid12,lac12 ⁇ 80% ⁇ cid15,lac15 ⁇ 100% ⁇ cid8, lac8 ⁇ 100% ⁇ cid19,lac19 ⁇ 100% ⁇ cid19,lac19 ⁇ 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid15,lac15 ⁇ 100% ⁇ cid36,lac36 ⁇ 80% ⁇ cid40,lac40 ⁇ 80%
  • step 506 may be after step 502 and before 507.
  • the first target terminal receives the feedback information.
  • the first target terminal may be one of the target terminals, or may be a plurality of terminals in the target terminal, and may be determined according to actual conditions.
  • the feedback information is input information input by the user whether the indication information that the base station accessed by the terminal when the event occurs is a pseudo base station is accurate.
  • the first target terminal may prompt the indication information of the pseudo base station.
  • the following can be illustrated by an example: as shown in FIG. 6( a ), a schematic diagram for displaying the input feedback information on the short message interface of the mobile phone, and also displaying “Please feedback the user whether the short message is a fraudulent short message” on the short message interface.
  • the user can input feedback information in an editable text box 31.
  • FIG. 6(b) another schematic diagram for displaying the input feedback information on the short message interface of the mobile phone may also display the “Yes” and “No” identifiers 32 on the short message interface, and the user directly clicks “Yes” or “No”. "The logo can be.
  • the SMS interface can also display the "ignore" logo, or if there is no input text, then the feedback information is meaningless and need not be reported to the server.
  • the terminal can receive the corresponding feedback information.
  • a schematic diagram for displaying the input feedback information on the incoming call interface of the mobile phone the mobile phone displays “Please feedback the user if the incoming call is a fraudulent call” on the incoming call interface, and the user can edit the text.
  • Block 31 inputs feedback information.
  • a schematic diagram for displaying the input feedback information on the incoming call interface of the mobile phone may also display the “Yes” and “No” identifiers 32 on the incoming call interface, and the user directly clicks “Yes” or “No”.
  • the logo can be.
  • the “Ignore” logo can also be displayed on the incoming call interface, or if there is no input text, then the feedback information is meaningless and need not be reported to the server.
  • the click operation may be more convenient for the user.
  • Displaying the input feedback information on the incoming call interface can also be displayed after the user hangs up the phone.
  • the terminal can receive the corresponding feedback information.
  • the schematic diagram of how the terminal displays the input feedback information may include, but is not limited to, the foregoing manners.
  • the description about the user inputting the feedback information may be that some users may have received the short message sent by the number or received the incoming call of the number, and when receiving the incoming call or the short message sent by the same number again, it may determine whether it is a fraudulent short message or a fraudulent call. It can be determined by this call whether it is a fraudulent call, so that the user can input corresponding feedback information.
  • the input feedback information is described by the instruction information of the character prompting pseudo base station, and the indication information of the pseudo base station or the danger icon is used to prompt the indication information of the pseudo base station.
  • the schematic diagram showing the input feedback information is similar to FIG. 6(a) to FIG. 6(d), and will not be described again here.
  • the first target terminal sends the feedback information to the server.
  • the server determines that there are 100 target terminals accessing the pseudo base station, and the server sends the indication information of the pseudo base station to the 100 target terminals.
  • the 50 target terminals can report the feedback information to the server. Assume that there are 45 users inputting "no" feedback information, and five users inputting "yes" feedback information.
  • the server according to the feedback information, correspondingly modify a suspicious probability of the pseudo base station, to obtain a modified suspicious probability of the pseudo base station.
  • the server can determine that the base station ⁇ cid15, lac15 ⁇ has a 90% probability that it is not a pseudo base station, and the 10% probability is a pseudo base station. That is, the corresponding suspicious probability of the base station ⁇ cid15, lac15 ⁇ can be modified to 10% in the above Table 4 and Table 5.
  • the base station can be considered as a real base station.
  • the server can update the information of the base station ⁇ cid15, lac15 ⁇ to the information of the real base station, assuming The area where the base station ⁇ cid15, lac15 ⁇ appears is [lat7, lng7], the information of the base station ⁇ cid15, lac15 ⁇ is updated to the above table 3, and the information of the base station ⁇ cid15, lac15 ⁇ is deleted in Table 4 and Table 5.
  • Suspicious base station Suspicious probability
  • Mobile base station Suspicious probability ⁇ cid8, lac8 ⁇ 100% ⁇ cid12,lac12 ⁇ 100% ⁇ cid19,lac19 ⁇ 100% ⁇ cid8, lac8 ⁇ 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid19,lac19 ⁇ 100% 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid36,lac36 ⁇ 100% ⁇ cid40,lac40 ⁇ 100%
  • Suspicious base station Suspicious probability
  • Mobile base station Suspicious probability ⁇ cid8, lac8 ⁇ 100% ⁇ cid12,lac12 ⁇ 80% ⁇ cid19,lac19 ⁇ 100% ⁇ cid8, lac8 ⁇ 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid19,lac19 ⁇ 100% ⁇ cid20,lac20 ⁇ 100% ⁇ cid36,lac36 ⁇ 80% ⁇ cid40,lac40 ⁇ 80%
  • the feedback information received by the server may be for the same base station, or may be for different base stations, and the manner of modifying the suspicious probability is similar to the foregoing, and details are not described herein again.
  • the information of the real base station and the information of the pseudo base station are updated, but are not limited to other implementation manners. For example, for the same base station, there are two “yes” of the feedback information received by the server in the first time period.
  • Feedback information 6 "no” feedback information; in the feedback information received within the second duration, there is 1 “yes” feedback information, 8 “no” feedback information; received in the third time period
  • the suspicious probability of the base station is not lower than the suspicious probability threshold by 20%, but the server receives according to the The feedback information finds that the number of feedback information with feedback "yes” is less and less, and the number of feedback "no” feedback information is increasing. Therefore, it is highly probable that the base station is not a pseudo base station, and the server can The base station is updated in the information of the real base station.
  • the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by the multiple terminals. Therefore, the accuracy of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives the information of the event sent by the multiple terminals, and the information of the event may include the terminal identifier, the location information of the terminal, the information of the base station accessed when the event occurs, and the time when the event occurs. The server acquires information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  • the server may further determine, according to the determined information of the real base station and the information of the pseudo base station, the target terminal that accesses the pseudo base station among the multiple terminals, and send the indication information of the pseudo base station to the target terminal, so that the user occurs on the target terminal.
  • the incident caused vigilance and was carefully deceived.
  • the server may also use the characteristics of the pseudo base station to combine with the feedback information of the terminal, modify the suspicious probability of the pseudo base station, update the information of the real base station and the information of the pseudo base station, so that the server receives the first event reported by the first terminal next time. And determining, according to the updated information of the real base station and the information of the pseudo base station, whether the first base station accessed by the terminal when the first event occurs is a pseudo base station, such that the real base station information and the pseudo base station are updated according to the real time. The accuracy of the results judged by the information is higher.
  • FIG. 7 is a schematic diagram of an embodiment of a prompting method in an embodiment of the present application, including:
  • the server receives information about events sent by multiple terminals.
  • the server acquires information of a real base station and information of a pseudo base station according to information about an event sent by the multiple terminals.
  • the server determines, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals.
  • the server sends the indication information of the pseudo base station to the target terminal.
  • the target terminal prompts indication information of the pseudo base station.
  • the server marks a suspicious probability of the real base station and the pseudo base station.
  • the first target terminal receives the feedback information.
  • the first target terminal sends the feedback information to the server.
  • the server according to the feedback information, correspondingly modify a suspicious probability of the pseudo base station, to obtain a modified suspicious probability of the pseudo base station.
  • the steps 701-509 are similar to the steps 501-509 in the foregoing embodiment shown in FIG. 5, and details are not described herein again.
  • the server determines information of a target pseudo base station and information of a target real base station.
  • the server may determine, according to the information of the real base station and the suspicious probability corresponding to the information of the pseudo base station, the information of the base station whose suspicious probability is greater than the third threshold is the information of the target pseudo base station, and the suspicious probability is less than the fourth threshold.
  • the information of the base station is information of the target real base station.
  • the information of the target real base station and the information of the target pseudo base station include, but are not limited to, information such as cid, lac, signal strength, difference between acquisition time and reporting time.
  • the collection time refers to the time when the corresponding terminal has an event.
  • the reporting time refers to the time when the terminal sends the event information to the server.
  • the collection time can be the same as the reporting time, or the reporting time is after the collection time.
  • the server performs model training according to the information of the target pseudo base station and the information of the target real base station, and obtains reference weights of each feature included in the information of the base station.
  • the first terminal detects that the first event occurs and collects information about the first event.
  • the first terminal detects that the first event occurs and collects information about the first event.
  • the information of the first event may include the information of the base station that is accessed when the first event occurs, and the information of the first event may further include the first terminal identifier and the location of the first terminal.
  • Information, information such as the time at which the first event occurred, the content of the first short message, and/or the number of the first incoming call.
  • the first event can include receiving a first short message and/or a first incoming call.
  • step 712 can be between steps 702-713.
  • the first terminal sends information about the first event to the server.
  • the server receives information about a first event sent by the first terminal.
  • the first terminal may be a terminal in the foregoing multiple terminals, or may be another terminal newly accessed outside the multiple terminals.
  • the number of representations of the first terminal is not limited, and may refer to one terminal or multiple terminals.
  • the first terminal is referred to as the mobile phone 1 as an example. That is, the server receives the information of the first event sent by the mobile phone 1, and the information of the first event includes the identifier of the mobile phone 1, the location information of the mobile phone 1, and the information of the first base station that is accessed when the first event occurs. The time at which the first event occurred.
  • the location information of the mobile phone 1 can utilize the latitude and longitude obtained by the Global Positioning System (GPS) or the latitude and longitude calculated by the network.
  • the location information of the mobile phone includes but is not limited to latitude and longitude, and access to wireless fidelity (WiFi).
  • WiFi wireless fidelity
  • the physical address of the wireless access point (Basic Service Set identifier, BSSID)/Wireless Access Point ID or Service Set Identifier (SSID)/Medium Access Control Address (MAC addr)/Network ID (Network ID), currently scanned WiFi SSID, etc. information.
  • the information of the first base station that is accessed when the first event occurs on the mobile phone 1 may include a sector identifier of the base station, which may also be called a cell identification (CID), a LAC, an adjacent CID, and may also include a signal strength and a cell. Information and other information.
  • CID cell identification
  • LAC LAC
  • adjacent CID adjacent CID
  • the server determines whether the first base station is a pseudo base station.
  • the authenticity determination of the first base station may have several different implementation manners, which are respectively described below:
  • the first way the server performs a lookup determination in the information of the real base station and the information of the pseudo base station stored in the database.
  • the server may perform the search in the information of the real base station and the information of the pseudo base station acquired according to the information of the event sent by the multiple terminals, if the information of the first base station is in the information of the pseudo base station.
  • the first base station is a pseudo base station, and the server may send the indication information of the pseudo base station to the mobile phone 1. If the information of the first base station is in the information of the real base station, the first base station is a real base station, and the server may not 1 Send the indication information of the real base station.
  • the server may perform the search in the information of the updated real base station and the information of the pseudo base station, and if the information of the first base station is in the information of the updated pseudo base station, A base station is a pseudo base station, and the server may send the indication information of the pseudo base station to the mobile phone 1. If the information of the first base station is in the information of the updated real base station, the first base station is a real base station, and the server may not send the message to the mobile phone 1. The indication information of the real base station.
  • step 712 is after step 702 and before step 709, the server may first search for information of the first base station by using the information of the pseudo base station stored in the database and the information of the real pseudo base station.
  • step 712 is after step 709 and before step 713, the server may first search for information of the first base station in the updated real base station information and the updated pseudo base station information stored in the database.
  • the server may determine the target probability of the first base station according to the information of the first event and the reference weight of each feature included in the information of the base station.
  • the target probability range calculated according to the reference weight is between 0 and 1, and the approaching to 1 can be regarded as a real base station, and the approaching to 0 can be regarded as a pseudo base station.
  • the fifth threshold can be set to 0.6 and 0.8 is greater than 0.6, so the server determines that the first base station is a real base station.
  • the fifth threshold can be set to 0.6 and 0.3 is less than 0.6, so the server determines that the first base station is a pseudo base station.
  • the server sends the indication information of the pseudo base station to the first terminal.
  • the server sends the pseudo base station to the first terminal. Instructions.
  • the first terminal prompts indication information of the pseudo base station.
  • the server obtains the information of the real base station and the information of the pseudo base station according to the big data reported by the multiple terminals. Therefore, the accuracy of the obtained information of the real base station and the information of the pseudo base station is relatively high. That is, the server receives the information of the event sent by the multiple terminals, and the information of the event may include the identifier of the terminal, the location information of the terminal, the information of the base station that is accessed when the event occurs, and the time when the event occurs. The server determines information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  • the server may further determine, according to the determined information of the real base station and the information of the pseudo base station, the target terminal that accesses the pseudo base station among the multiple terminals, and send the indication information of the pseudo base station to the target terminal, so that the user occurs on the target terminal.
  • the first incident caused vigilance and was carefully deceived.
  • the server may also use the characteristics of the pseudo base station to combine with the feedback information of the terminal, modify the suspicious probability of the pseudo base station, update the information of the real base station and the information of the pseudo base station, so that the server receives the first event reported by the first terminal next time. And determining, according to the updated information of the real base station and the information of the pseudo base station, whether the first base station accessed by the terminal when the first event occurs is a pseudo base station, such that the real base station information and the pseudo base station are updated according to the real time. The accuracy of the results judged by the information is higher.
  • the server may also select, according to the suspicious probability corresponding to the information of the real base station and the information of the pseudo base station, a batch of information of the base station with the highest suspicious probability as a positive example, and the information of the base station with the lowest suspicious probability as a negative example, and perform model training.
  • a reference weight of each feature included in the information of the base station is obtained. The reference weights may be used when the server receives the information of the first event reported by the first terminal, and according to the reference weight of each feature and the information of the first base station, calculate the first base station that is accessed when the first event occurs. Target probability.
  • the server determines that the first base station is a real base station; if the target probability is less than or equal to the preset threshold, the server determines that the first base station is a pseudo base station, and the server sends the indication information of the pseudo base station to the terminal. In this way, the server can calculate whether the access is a pseudo base station when the first event newly received by the server is received according to the reference weight of each feature included in the information of the base station, and provide another method for determining the pseudo base station. Increase the feasibility of the program.
  • the suspicious probability of the real base station and the pseudo base station can be continuously optimized and corrected, which greatly improves the accuracy of the judgment;
  • the identification method can only be compared with the existing base station data of the operator, and has a high accuracy in the case of judging the mobile base station.
  • the server performs model training in real time according to the information of the target real base station and the information of the target pseudo base station, which can ensure the accuracy and real-time of the identification, and can be found in time for the new pseudo base station; and can also identify the pseudo base station according to the technology of big data.
  • the motion trajectory can further prevent pseudo base station scams and even capture pseudo base stations.
  • FIG. 8 is a schematic diagram of an embodiment of a prompting method in an embodiment of the present application, including:
  • the first terminal detects that the first event occurs and collects information about the first event.
  • the first event may be a first event that occurs in an application installed on the first terminal, where
  • the information about the first event may include the first terminal identifier, location information of the first terminal, information of a first base station that is accessed when the first event occurs, time when the first event occurs, and occurs.
  • the time of the first event can also be referred to as a timestamp.
  • the information of the first event may further include information such as the content of the short message and/or the number of the incoming call.
  • the application installed on the first terminal may be a short message application, a call application, or the like, and is not limited herein.
  • the first terminal detects that the short message is received, the first terminal collects the information for receiving the short message, or the first terminal detects the received incoming call, and the first terminal collects the information for receiving the incoming call.
  • a schematic diagram of receiving a short message or receiving an incoming call can be referred to FIG. 4(a) and FIG. 4(b), and details are not described herein again.
  • the first terminal sends the information about the first event to a server.
  • the first terminal may send the collected information of the received short message or the information of the received incoming call to the server. It should be noted that when the first terminal receives the short message or receives the incoming call, the accessed base station is a pseudo base station, and then the first terminal is in the disconnected state, and the information of the first event cannot be reported to the server, so The first terminal needs to wait for the network connection state to send the information of the first event.
  • the first terminal receives the indication information of the pseudo base station sent by the server.
  • the server determines that the first terminal accesses the pseudo base station, the server sends the indication information of the pseudo base station to the first terminal.
  • the manner in which the server determines the pseudo base station may include, but is not limited to, the following implementation manners.
  • the following uses a mobile phone as an example, as follows:
  • Example 1 The server performs a lookup determination in the information of the real base station and the information of the pseudo base station acquired in the embodiment shown in FIG. 3 above.
  • the server may perform a search in the information of the real base station and the information of the pseudo base station obtained according to the information of the event sent by the multiple terminals. If the information of the first base station is in the information of the pseudo base station, the first base station is regarded as a pseudo base station, and the server The indication information of the pseudo base station may be sent to the mobile phone; if the information of the first base station is in the information of the real base station, the first base station is a real base station, and the server may not send the indication information of the real base station to the mobile phone.
  • Example 2 The server performs a lookup determination in the information of the real base station and the information of the pseudo base station updated in the embodiment shown in FIG. 5 described above.
  • the server may perform a lookup determination according to the information of the updated real base station and the information of the pseudo base station in the embodiment shown in FIG. 5, and consider that the first base station is in the information of the updated pseudo base station if the information of the first base station is in the information of the updated pseudo base station.
  • the server may send the indication information of the pseudo base station to the mobile phone; if the information of the first base station is in the information of the updated real base station, the first base station is the real base station, and the server may not send the indication information of the real base station to the mobile phone. .
  • Example 3 The server performs the determination in the embodiment shown in FIG. 7 above based on the reference weights of the respective features included in the obtained information of the base station.
  • the various features included in the information according to the obtained base station in the foregoing embodiment shown in FIG. 7 may be adopted.
  • the reference weights are used to determine.
  • the determination is performed directly according to the reference weight of each feature included in the obtained information of the base station in the embodiment shown in FIG. 7 above.
  • the server performs another big data calculation according to the received information of the event sent by the multiple terminals, and obtains the information of the real base station and the information of the pseudo base station, thereby determining the first One base station Whether it is a pseudo base station.
  • the first terminal prompts the indication information of the pseudo base station.
  • the first terminal prompts the indication information of the pseudo base station, which may include, but is not limited to, the following implementation manners:
  • the terminal displays the indication information of the pseudo base station by using a text; for details, refer to FIG. 4(c) and FIG. 4(d) above, and details are not described herein again.
  • Example 2 The terminal prompts the indication information of the pseudo base station by voice; for details, refer to FIG. 4(e) and FIG. 4(f) above, and details are not described herein again.
  • the terminal displays the indication information of the pseudo base station by using a hazard identifier; for details, refer to FIG. 4(g) and FIG. 4(h), and details are not described herein again.
  • indication information indicating the pseudo base station reference may be made to the foregoing implementation manner of FIG. 4(i)-4(p), and details are not described herein again.
  • the information of the event may be used by the server to obtain information of the pseudo base station, and the server may determine multiple manners, and the foregoing has been performed.
  • the server determination method is based on the calculation of big data. Therefore, the reliability of the judged result is relatively high, and the obtained result is more accurate. If the terminal accesses the pseudo base station, the server sends the indication information of the pseudo base station to the terminal, so that the terminal can prompt the indication information of the pseudo base station, so that the user is alert to the first event occurring on the first terminal, be careful Be deceived.
  • FIG. 9(a) it is a schematic diagram of an embodiment of the server in the embodiment of the present application, including:
  • the receiving module 901 is configured to receive information about events sent by multiple terminals.
  • the obtaining module 902 is configured to obtain information of the real base station and information of the pseudo base station according to the information of the event sent by the multiple terminals.
  • FIG. 9( b ) which is a schematic diagram of another embodiment of the server, the server further includes:
  • a determining module 903 configured to determine, according to the information of the real base station and the information of the pseudo base station, a target terminal that accesses the pseudo base station among the multiple terminals;
  • the sending module 904 is configured to send indication information of the pseudo base station to the target terminal.
  • the information about the event includes a terminal identifier, location information of the terminal, information about a base station that is accessed when the event occurs, and a time when the event occurs.
  • the obtaining module 902 is specifically configured to:
  • Deleting from the information about the initial base station of the longitude, latitude, and date, information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold;
  • the date is removed, and the information of other initial base stations is combined to obtain a letter about the longitude and latitude screening base station. interest;
  • Determining that the information of the screening base station is information of a real base station.
  • the obtaining module 902 is specifically configured to:
  • the first central location is a first location of the target base station, and determining that the second central location is a second location of the target base station;
  • the acquiring module determines that the information of the target base station is information of a pseudo base station.
  • FIG. 9(c) is a schematic diagram of another embodiment of the server
  • the server further includes:
  • a marking module 905, configured to mark a suspicious probability of the real base station and the pseudo base station
  • the receiving module 901 is further configured to receive feedback information sent by the first target terminal, where the feedback information is that the indication information that the base station that the user accesses when the event occurs when the first target terminal is the pseudo base station is Accurate input of information;
  • the modifying module 906 is configured to modify the suspicious probability of the pseudo base station according to the feedback information to obtain a modified suspicious probability of the pseudo base station.
  • FIG. 9(d) which is a schematic diagram of another embodiment of the server, the server further includes:
  • the determining module 903 is further configured to: determine that the information of the base station whose suspicious probability is greater than the third threshold is the information of the target pseudo base station, and the information of the base station whose suspicious probability is less than the fourth threshold is the information of the target real base station;
  • the model training module 907 is configured to perform model training according to the information of the target pseudo base station and the information of the target real base station, and obtain reference weights of respective features included in information of different base stations.
  • the receiving module 901 is further configured to receive information about a first event sent by the first terminal, where the information about the first event includes information about a first base station that is accessed when the first event occurs;
  • the sending module 904 is further configured to: if the information of the first base station is in the information of the pseudo base station, the sending module sends the indication information of the pseudo base station to the first terminal.
  • the determining module 903 is further configured to: if the information of the first base station is not in the information of the pseudo base station, the determining module 903 is included in the information according to the first event and the information in the base station Determining, by the reference weight of each feature, a target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the determining module 903 determines that the first base station is a pseudo base station;
  • the sending module 904 is further configured to send the indication information of the pseudo base station to the first terminal.
  • the event includes: receiving a short message and/or an incoming call;
  • the information of the event further includes: the content of the short message and/or the number of the incoming call.
  • FIG. 10 it is a schematic diagram of an embodiment of a terminal in the embodiment of the present application, including:
  • the collecting module 1001 is configured to detect, by the terminal, an event occurrence and collect information about the event;
  • a sending module 1002 configured to send information about the event to a server
  • the receiving module 1003 is configured to receive indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is obtained by the server according to the information of the event;
  • the prompting module 1004 is configured to prompt the indication information of the pseudo base station.
  • the information about the event includes the terminal identifier, location information of the terminal, information about a base station accessed when the event occurs, and a time when the event occurs.
  • the receiving module 1003 is further configured to receive feedback information, where the feedback information is input information that is input by the user, whether the base station that is accessed by the terminal when the event occurs is a pseudo base station, is accurate;
  • the sending module 1004 is further configured to send the feedback information to the server, where the feedback information is used by the server to modify a suspicious probability of the pseudo base station.
  • the prompting module 1004 is specifically configured to display the indication information of the pseudo base station by using a text.
  • the prompting module 1004 is specifically configured to display indication information of the pseudo base station by using a danger identifier.
  • the prompting module 1004 is specifically configured to prompt the indication information of the pseudo base station by voice.
  • the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: a content of the short message and/or a number of the incoming call.
  • FIG. 11 is a schematic diagram of another embodiment of a server in an embodiment of the present application.
  • the server may vary greatly depending on configuration or performance, and may include one or more wired or wireless network interfaces 1150.
  • the wired or wireless network interface may also be referred to as a transceiver, and one or more central processing units (central processing) Units, CPU) 1122 (eg, one or more processors) and memory 1132, one or more storage media 1130 that store application 1142 or data 1144 (eg, one or one storage device in Shanghai).
  • CPU central processing units
  • CPU central processing
  • storage media 1130 that store application 1142 or data 1144 (eg, one or one storage device in Shanghai).
  • the wired or wireless network interface 1150 can receive information of events sent by multiple terminals; the central processor 1122 obtains information of the real base station according to information of events sent by multiple terminals received by the wired or wireless network interface 1150. And information about the pseudo base station.
  • the indication information for prompting the pseudo base station on the target terminal may include, but is not limited to, the implementation manners shown in FIGS. 4(c) to 4(p).
  • the memory 1132 and the storage medium 1130 may be short-term storage or persistent storage.
  • the program stored on storage medium 1130 may include one or more modules (not shown), each of which may include a series of instruction operations in the server.
  • central processor 1122 can be configured to communicate with storage medium 1130, executing a series of instruction operations in storage medium 1130 on server 1100.
  • Server 1100 may also include one or more power supplies 1126, one or more input and output interfaces 1158, and/or one or more operating systems 1141, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and the like.
  • operating systems 1141 such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and the like.
  • the steps performed by the server in the above embodiment may be based on the server structure shown in FIG.
  • the central processing unit 1122 is further configured to: determine, according to information of the real base station and information of the pseudo base station, access pseudo in the multiple terminals The target terminal of the base station;
  • the wired or wireless network interface 1150 is further configured to: send the indication information of the pseudo base station to the target terminal.
  • the information about the event includes a terminal identifier, location information of the terminal, information about a base station that is accessed when the event occurs, and a time when the event occurs.
  • the central processing unit 1122 is specifically configured to perform the following steps:
  • Deleting from the information about the initial base station of the longitude, latitude, and date, information of the initial base station whose number of occurrences in the consecutive date is less than the first threshold;
  • the date is removed, and information of other initial base stations is combined to obtain information about screening base stations for longitude and latitude;
  • Determining that the information of the screening base station is information of a real base station.
  • the central processing unit 1122 is specifically configured to perform the following steps:
  • the first central location is a first location of the target base station, and determining that the second central location is a second location of the target base station;
  • the central processor determines that the information of the target base station is information of a pseudo base station.
  • the central processing unit 1122 is specifically configured to perform the following steps: marking a suspicious probability of the real base station and the pseudo base station; and correspondingly modifying the The suspicious probability of the pseudo base station is obtained by the modified suspicious probability of the pseudo base station;
  • the wired or wireless network interface 1150 is further configured to: receive feedback information sent by the first target terminal, where the feedback information is a pseudo base station that is input by the user when the event occurs when the first target terminal occurs Indicate whether the information is entered accurately.
  • the central processing unit 1122 is specifically configured to perform the following steps:
  • Determining information of the base station whose suspicious probability is greater than the third threshold is information of the target pseudo base station, and information of the base station whose suspicious probability is less than the fourth threshold is information of the target real base station;
  • the wired or wireless network interface 1150 is further configured to perform the following steps:
  • the wired or wireless network interface 1150 sends the indication information of the pseudo base station to the first terminal.
  • the central processing unit 1122 is specifically configured to perform the following steps:
  • the central processing unit 1122 determines, according to the information of the first event and the reference weight of each feature included in the information of the base station, Determining a target probability of the first base station; if the target probability is less than or equal to the fifth threshold, the central processing unit 1122 determines that the first base station is a pseudo base station;
  • the wired or wireless network interface 1150 is further configured to perform the step of: transmitting indication information of the pseudo base station to the first terminal.
  • the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: a content of the short message and/or a number of the incoming call.
  • FIG. 12 is a schematic diagram of another embodiment of a terminal in an embodiment of the present application.
  • the terminal may be any terminal device including a mobile phone, a tablet computer, a PDA (Personal Digital Assistant), a POS (Point of Sales), an in-vehicle computer, and the terminal is a mobile phone as an example:
  • FIG. 12 is a block diagram showing a partial structure of a mobile phone related to a terminal provided by an embodiment of the present application.
  • the mobile phone includes a processor 1280, a communication interface 1210, an output unit 1270, a memory 1220, an input unit 1230, a sensor 1250, and a power supply 1290.
  • the communication interface 1210 may include components such as a radio frequency (RF) circuit 1211 and a wireless fidelity (WiFi) module 1212.
  • the output unit 1270 may include components such as a display unit 1240, an audio circuit 1260, and the like. It will be understood by those skilled in the art that the structure of the handset shown in FIG. 12 does not constitute a limitation to the handset, and may include more or less components than those illustrated, or some components may be combined, or different component arrangements.
  • the processor 1280 is a control center for the handset that connects various portions of the entire handset using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 1220, and invoking data stored in the memory 1220, The phone's various functions and processing data, so that the overall monitoring of the phone.
  • the processor 1280 detects an event occurrence and collects information of the event.
  • the processor 1280 may include one or more processing units; preferably, the processor 1280 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the modem processor primarily handles wireless communications. It will be appreciated that the above described modem processor may also not be integrated into the processor 1280.
  • the RF circuit 1211 can be used for receiving and transmitting signals during the transmission or reception of information or during a call. Specifically, after receiving the downlink information of the base station, the processor 1280 processes the data; and, in addition, transmits the designed uplink data to the base station. In the embodiment of the present application, the RF circuit 1211 may send the information about the event collected by the processor 1280 to the server, and receive the indication information of the pseudo base station sent by the server, where the indication information of the pseudo base station is the server according to the The information of the event is obtained.
  • RF circuit 1211 includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like.
  • RF circuitry 1211 can also communicate with the network and other devices via wireless communication.
  • the above wireless communication may use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (Code Division). Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), E-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • SMS Short Messaging Service
  • the memory 1220 can be used to store software programs and modules, and the processor 1280 executes various functional applications and data processing of the mobile phone by running software programs and modules stored in the memory 1220.
  • the memory 1220 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the mobile phone (such as audio data, phone book, etc.).
  • memory 1220 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the input unit 1230 can be configured to receive input numeric or character information and to generate key signal inputs related to user settings and function controls of the handset. As shown in FIGS. 6(a) and 6(b), if the user inputs feedback information, the feedback information can be received by the mobile phone through the input unit 1230.
  • the input unit 1230 may include a touch panel 1231 and other input devices 1232.
  • the touch panel 1231 also referred to as a touch screen, can collect touch operations on or near the user (such as the user using a finger, a stylus, or the like on the touch panel 1231 or near the touch panel 1231. Operation), and drive the corresponding connecting device according to a preset program.
  • the touch panel 1231 may include two parts: a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 1280 is provided and can receive commands from the processor 1280 and execute them.
  • the touch panel 1231 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 1230 may also include other input devices 1232.
  • other input devices 1232 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the output unit 1270 can include components such as a display unit 1240, an audio circuit 1260, and the like. In the embodiment of the present application, the output unit 1270 may be used to prompt the indication information of the pseudo base station.
  • the display unit 1240 can be used to display information input by the user or information provided to the user as well as various menus of the mobile phone. 4(a)-4(p), the interfaces shown in FIGS. 6(a)-6(d) are all displayed by the display unit 1240. of.
  • the display unit 1240 can include a display panel 1241.
  • the display panel 1241 can be configured in the form of a liquid crystal display (LCD), an organic light-emitting diode (OLED), or the like.
  • the touch panel 1231 may cover the display panel 1241.
  • the touch panel 1231 After the touch panel 1231 detects a touch operation on or near the touch panel 1231, the touch panel 1231 transmits to the processor 1280 to determine the type of the touch event, and then the processor 1280 according to the touch event.
  • the type provides a corresponding visual output on display panel 1241.
  • the touch panel 1231 and the display panel 1241 are used as two independent components to implement the input and input functions of the mobile phone, in some embodiments, the touch panel 1231 and the display panel 1241 may be integrated. Realize the input and output functions of the phone.
  • Audio circuit 1260, speaker 1261, and microphone 1262 can provide an audio interface between the user and the handset. 4(e), 4(f), 4(i), 4(j), 4(m), and 4(n), the audio circuit 1260 can be used. The user is prompted with the indication information of the pseudo base station.
  • the audio circuit 1260 can transmit the converted electrical data of the received audio data to the speaker 1261, and convert it into a sound signal output by the speaker 1261; on the other hand, the microphone 1262 converts the collected sound signal into an electrical signal, by the audio circuit 1260. After receiving, it is converted into audio data, and then processed by the audio data output processor 1280, sent to, for example, another mobile phone via the RF circuit 1211, or outputted to the memory 1220 for further processing.
  • the handset can also include at least one type of sensor 1250, such as a light sensor, motion sensor, and other sensors.
  • the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1241 according to the brightness of the ambient light, and the proximity sensor may close the display panel 1241 and/or when the mobile phone moves to the ear. Or backlight.
  • the accelerometer sensor can detect the magnitude of acceleration in all directions (usually three axes). When it is stationary, it can detect the magnitude and direction of gravity.
  • the mobile phone can be used to identify the gesture of the mobile phone (such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration), vibration recognition related functions (such as pedometer, tapping), etc.; as for the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • the gesture of the mobile phone such as horizontal and vertical screen switching, related Game, magnetometer attitude calibration
  • vibration recognition related functions such as pedometer, tapping
  • the mobile phone can also be configured with gyroscopes, barometers, hygrometers, thermometers, infrared sensors and other sensors, no longer Narration.
  • WiFi is a short-range wireless transmission technology.
  • the mobile phone can help users to send and receive emails, browse web pages and access streaming media through the WiFi module 1212. It provides users with wireless broadband Internet access.
  • FIG. 12 shows the WiFi module 1212, it can be understood that it does not belong to the essential configuration of the mobile phone, and can be omitted as needed within the scope of not changing the essence of the application.
  • the handset also includes a power source 1290 (such as a battery) that supplies power to the various components.
  • a power source 1290 such as a battery
  • the power source can be logically coupled to the processor 1280 via a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the mobile phone may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the steps performed by the terminal in the above embodiment may be based on the terminal structure shown in FIG.
  • the information about the event includes the terminal identifier, location information of the terminal, information about a base station accessed when the event occurs, and a time when the event occurs.
  • the input unit 1230 is further configured to receive feedback information, where the feedback information is input information input by the user that is accurate when the base station that is accessed by the terminal when the event occurs is a pseudo base station;
  • the radio frequency circuit 1211 is further configured to send the feedback information to the server, where the feedback information is used by the The server modifies the suspicious probability of the pseudo base station.
  • the display unit 1240 is further configured to display indication information of the pseudo base station by text.
  • the display unit 1240 is further configured to display indication information of the pseudo base station by using a hazard identifier.
  • the audio circuit 1260 is further configured to prompt the indication information of the pseudo base station by voice.
  • the event includes: receiving a short message and/or an incoming call; and the information of the event further includes: a content of the short message and/or a number of the incoming call.
  • the above embodiments it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof.
  • software it may be implemented in whole or in part in the form of a computer program product.
  • the computer program product includes one or more computer instructions.
  • the computer program instructions When the computer program instructions are loaded and executed on a computer, the processes or functions described in accordance with embodiments of the present invention are generated in whole or in part.
  • the computer can be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer instructions can be stored in a computer readable storage medium or transferred from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions can be from a website site, computer, server or data center Transfer to another website site, computer, server, or data center by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL), or wireless (eg, infrared, wireless, microwave, etc.).
  • the computer readable storage medium can be any available media that can be accessed by a computer or a data storage device such as a server, data center, or the like that includes one or more available media.
  • the usable medium may be a magnetic medium (eg, a floppy disk, a hard disk, a magnetic tape), an optical medium (eg, a DVD), or a semiconductor medium (such as a solid state disk (SSD)).
  • a computer program product comprising instructions, when run on a computer, causes the computer to perform as the server is in FIG. 3, FIG. 5, FIG. 7, or FIG. 8 above.
  • the method shown, its same or corresponding technical features can be cited in this embodiment.
  • a computer program product comprising instructions, when executed on a computer, causes the computer to perform, for example, the terminal in FIG. 3, FIG. 5, FIG. 7, or FIG.
  • the method shown, its same or corresponding technical features can be cited in this embodiment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

Des modes de réalisation de la présente invention concernent un procédé d'invite, destiné à être utilisé pour obtenir, par un serveur, des informations d'une station de base réelle et des informations d'une pseudo-station de base en fonction d'informations d'événements envoyées par une pluralité de terminaux. Les informations de la station de base réelle et les informations de la pseudo-station de base obtenues par le serveur conformément au calcul de mégadonnées ont une précision élevée. Les modes de réalisation de la présente invention comprennent les étapes suivantes : un serveur obtient des informations d'événements envoyées par une pluralité de terminaux ; le serveur obtient des informations d'une station de base réelle et des informations d'une pseudo-station de base en fonction des informations des événements envoyées par la pluralité de terminaux. Les modes de réalisation de la présente invention concernent également un terminal et un serveur.
PCT/CN2017/086643 2017-01-22 2017-05-31 Procédé d'invite, terminal et serveur WO2018133284A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201780005192.7A CN108513717B (zh) 2017-01-22 2017-05-31 一种提示方法、终端以及服务器

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710052278 2017-01-22
CN201710052278.7 2017-01-22

Publications (1)

Publication Number Publication Date
WO2018133284A1 true WO2018133284A1 (fr) 2018-07-26

Family

ID=62907654

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/086643 WO2018133284A1 (fr) 2017-01-22 2017-05-31 Procédé d'invite, terminal et serveur

Country Status (2)

Country Link
CN (1) CN108513717B (fr)
WO (1) WO2018133284A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124698A (zh) * 2018-10-30 2020-05-08 北京奇虎科技有限公司 通信事件的识别方法、装置、电子设备及可读存储介质

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110213724B (zh) * 2019-05-17 2020-10-20 国家计算机网络与信息安全管理中心 一种伪基站运动轨迹的识别方法
CN111582679B (zh) * 2020-04-24 2023-04-18 腾讯科技(成都)有限公司 应用服务分区的处理方法、装置、设备及存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430653A (zh) * 2014-09-19 2016-03-23 中国电信股份有限公司 伪基站发现方法和系统
CN105744527A (zh) * 2016-03-28 2016-07-06 河海大学 一种基于大数据和云计算的伪基站检测方法和系统
CN105764059A (zh) * 2014-12-15 2016-07-13 北京新讯世纪信息技术有限公司 一种基于终端位置信息来识别伪基站的方法
US20160381545A1 (en) * 2015-06-26 2016-12-29 Futurewei Technologies, Inc. System and Method for Faked Base Station Detection

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105430653A (zh) * 2014-09-19 2016-03-23 中国电信股份有限公司 伪基站发现方法和系统
CN105764059A (zh) * 2014-12-15 2016-07-13 北京新讯世纪信息技术有限公司 一种基于终端位置信息来识别伪基站的方法
US20160381545A1 (en) * 2015-06-26 2016-12-29 Futurewei Technologies, Inc. System and Method for Faked Base Station Detection
CN105744527A (zh) * 2016-03-28 2016-07-06 河海大学 一种基于大数据和云计算的伪基站检测方法和系统

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111124698A (zh) * 2018-10-30 2020-05-08 北京奇虎科技有限公司 通信事件的识别方法、装置、电子设备及可读存储介质

Also Published As

Publication number Publication date
CN108513717A (zh) 2018-09-07
CN108513717B (zh) 2020-09-04

Similar Documents

Publication Publication Date Title
CN107480533B (zh) 一种漏洞修复的方法、装置及存储介质
US9813538B2 (en) Malicious call recognition method and apparatus
CN108712561B (zh) 权限管理方法、装置、移动终端以及存储介质
CN108574940B (zh) 一种来电呼叫的处理方法和装置
CN106657690A (zh) 一种防止电话诈骗的方法、装置及移动终端
WO2018177425A1 (fr) Procédé, dispositif et système de demande de secours
US20170316781A1 (en) Remote electronic service requesting and processing method, server, and terminal
CN106302938B (zh) 通信事件处理方法和装置
CN108235308B (zh) 数据上报方法、装置、移动终端及计算机可读介质
WO2020077485A1 (fr) Procédé de mise à jour de barrière géographique, et dispositif de communication
CN109428871B (zh) 防御策略确定方法及装置
CN108124262A (zh) 伪基站识别方法、终端及计算机可读存储介质
CN105740715A (zh) 一种安全评估方法及终端设备
WO2018157519A1 (fr) Procédé de notification de message et terminal
CN112351441B (zh) 一种数据处理方法、装置及电子设备
CN109275146A (zh) 一种伪基站检测方法、终端及计算机可读存储介质
WO2018133284A1 (fr) Procédé d'invite, terminal et serveur
US20160308879A1 (en) Application-Based Service Providing Method, Apparatus, and System
CN106020945B (zh) 快捷项添加方法及装置
CN108959960B (zh) 防止隐私泄露的方法、装置及计算机可读存储介质
CN106648460A (zh) 计步数据过滤方法及智能终端
CN113485899A (zh) 信息处理方法、终端设备及存储介质
CN108171000B (zh) 一种油气管道水毁灾害预警的方法和装置
CN107995146B (zh) 登录处理方法及装置
KR20220122731A (ko) 멀티캐스트 서비스 처리 방법, 멀티캐스트 서비스 설정 방법 및 통신 장치

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17893192

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17893192

Country of ref document: EP

Kind code of ref document: A1