CN109769244B - Abnormal telephone card identification method, device, equipment and readable storage medium - Google Patents
Abnormal telephone card identification method, device, equipment and readable storage medium Download PDFInfo
- Publication number
- CN109769244B CN109769244B CN201910014132.2A CN201910014132A CN109769244B CN 109769244 B CN109769244 B CN 109769244B CN 201910014132 A CN201910014132 A CN 201910014132A CN 109769244 B CN109769244 B CN 109769244B
- Authority
- CN
- China
- Prior art keywords
- numbers
- group
- user
- abnormal
- determining
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000002159 abnormal effect Effects 0.000 title claims abstract description 104
- 238000000034 method Methods 0.000 title claims abstract description 61
- 230000006854 communication Effects 0.000 claims abstract description 90
- 238000004891 communication Methods 0.000 claims abstract description 89
- 238000004590 computer program Methods 0.000 claims description 11
- 238000010586 diagram Methods 0.000 description 6
- RWSOTUBLDIXVET-UHFFFAOYSA-N Dihydrogen sulfide Chemical compound S RWSOTUBLDIXVET-UHFFFAOYSA-N 0.000 description 4
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Landscapes
- Telephone Function (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The disclosure provides a method, a device, equipment and a readable storage medium for identifying an abnormal telephone card, wherein the method comprises the following steps: acquiring a corresponding relation between a user identity and a user number; determining all first user numbers corresponding to the same user identity according to the corresponding relation; and acquiring the communication record of each first user number, and determining an abnormal number in the first user numbers according to the communication record. According to the method, the device, the equipment and the readable storage medium, whether abnormal numbers exist in the numbers is determined according to the communication records of a plurality of first user numbers bound with the same user, so that the identity of a user actually using the telephone card is rapidly determined in a plurality of numbers and is not consistent with the identity of the bound user, and the risk of the user can be reduced.
Description
Technical Field
The present disclosure relates to communications technologies, and in particular, to a method, an apparatus, a device, and a readable storage medium for identifying an abnormal phone card.
Background
At present, with the popularization of real-name telephone systems, when a user opens a telephone number, the user needs to provide a real identity, and an operator opens a card according to the user identity and binds a mobile phone number corresponding to the telephone card with the user identity.
In the prior art, a user can take an original identity card, a copy or even an identity card picture, and can open a mobile phone card in a business hall.
And whether the identity card is consistent with the user identity can not be accurately checked by staff in the business hall, so that the problem that the identity of the user actually used by the number is inconsistent with the identity of the user bound by the number exists in the card opening process in the prior art, and certain risks exist for the user bound by the number.
Disclosure of Invention
The disclosure provides an identification method, device and equipment of an abnormal telephone card and a readable storage medium, which are used for solving the problem that in the prior art, the actually used number is inconsistent with the number-bound user identity.
A first aspect of the present disclosure provides a method for identifying an abnormal phone card, including:
acquiring a corresponding relation between a user identity and a user number;
determining all first user numbers corresponding to the same user identity according to the corresponding relation;
and acquiring a communication record of each first user number, and determining an abnormal number in the first user numbers according to the communication record.
Another aspect of the present disclosure is to provide an apparatus for recognizing an abnormal phone card, including:
the acquisition module is used for acquiring the corresponding relation between the user identity and the user number;
the first determining module is used for determining all first user numbers corresponding to the same user identity according to the corresponding relation;
and the second determining module is used for acquiring the communication record of each first user number and determining an abnormal number in the first user numbers according to the communication record.
Still another aspect of the present disclosure is to provide an identification apparatus of an abnormal phone card, including:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method of identifying an abnormal phone card as described in the first aspect above.
A further aspect of the present disclosure is to provide a computer-readable storage medium having stored thereon a computer program which is executed by a processor to implement the method for identifying an abnormal telephone card as described in the above first aspect.
The technical effects of the method, the device and the equipment for identifying the abnormal telephone card and the readable storage medium provided by the disclosure are as follows:
the method, the device, the equipment and the readable storage medium for identifying the abnormal telephone card provided by the disclosure comprise the following steps: acquiring a corresponding relation between a user identity and a user number; determining all first user numbers corresponding to the same user identity according to the corresponding relation; and acquiring the communication record of each first user number, and determining an abnormal number in the first user numbers according to the communication record. According to the method, the device, the equipment and the readable storage medium, whether abnormal numbers exist in the numbers is determined according to the communication records of a plurality of first user numbers bound with the same user, so that the identity of a user actually using the telephone card is rapidly determined in a plurality of numbers and is not consistent with the identity of the bound user, and the risk of the user can be reduced.
Drawings
Fig. 1 is a flowchart illustrating an abnormal phone card identification method according to an exemplary embodiment of the present invention;
fig. 2 is a flowchart illustrating an abnormal phone card recognition method according to another exemplary embodiment of the present invention;
fig. 2A is a flowchart illustrating a process of determining whether a second group of numbers is abnormal according to an exemplary embodiment of the present invention;
fig. 2B is a flowchart illustrating a process of determining whether a second group of numbers is abnormal according to another exemplary embodiment of the present invention;
fig. 3 is a flowchart illustrating an abnormal phone card recognition method according to still another exemplary embodiment of the present invention;
FIG. 3A is a flowchart illustrating the determination of exception numbers in accordance with an exemplary embodiment of the present invention;
fig. 4 is a block diagram illustrating an abnormal phone card recognition apparatus according to an exemplary embodiment of the present invention;
fig. 5 is a block diagram illustrating an abnormal phone card recognition apparatus according to another exemplary embodiment of the present invention;
fig. 6 is a block diagram illustrating an identification apparatus of an abnormal phone card according to an exemplary embodiment of the present invention.
Detailed Description
When the user opens the card in the operator, the user only needs to hold the identification information, and the business hall can open the card for the user and bind with the user identity corresponding to the identification information. For example, the user A can hold an identity card, the operator opens the card, and the obtained telephone card is bound with the identity card information. In the process, the user A can hold the identity card of the user A to obtain the card bound with the identity information of the user A, but the user also can hold the identity cards of other people, for example, the user A can hold the identity card of the user B picked up to open the card, and because whether the personnel in the business hall can not accurately distinguish the identity card of the user A, the identity card of the user B can be possibly used to open the card, but the actual owner of the telephone card is A, so that the risk is brought to the actual user bound with the telephone card. In another application scenario, some agents selling the telephone cards can also open the cards by using the held identity card information, and then the obtained telephone cards are given to other users for use. Therefore, in the prior art, there is a situation that a plurality of actual users of the phone card are inconsistent with the bound user of the phone card, and therefore, how to accurately distinguish whether the actual users of the phone card and the bound user are the same person is a technical problem that needs to be solved by those skilled in the art.
According to the embodiment of the invention, whether abnormal numbers exist in the numbers is determined according to the communication records of a plurality of first user numbers bound with the same user, so that the identity of the user actually using the telephone card is rapidly determined in a plurality of numbers and is not consistent with the identity of the bound user, and the risk of the user can be reduced.
Fig. 1 is a flowchart illustrating an abnormal phone card identification method according to an exemplary embodiment of the present invention.
As shown in fig. 1, the method for identifying an abnormal phone card provided in this embodiment includes:
The method provided by the embodiment may be executed by an electronic device with a computing function, where the electronic device may be a computer, and for example, may be a server disposed on a carrier side. The electronic device may be connected to a system on the operator side, specifically, may be connected to the system through a network, and for example, may access the electronic device to the system of the operator through a wired or wireless manner. The method provided by the embodiment can be packaged in software, and the electronic device can execute the method provided by the embodiment by installing the software in the electronic device. Of course, the electronic device may also be an electronic device such as a smart phone and a tablet computer, which is not limited in this embodiment.
Specifically, the system on the operator side stores information corresponding to each phone number, such as user identity information, package information, balance information, and the like. The identity information corresponding to each number, that is, the corresponding relationship between the user identity and the user number, can be obtained. For example, the content obtained may be user first-130 xxxxxxxx.
In one embodiment, a database for storing the correspondence between the user identity and the user number may be provided, and the obtained information may be stored in the database.
In another implementation, the device executing the method provided in this embodiment may be a device belonging to an operator-side system, where information of each number is stored in the device, where the information includes user information corresponding to the number, and at this time, the internally stored corresponding relationship may be directly obtained, and a database may be set to store the corresponding relationship, or the obtained corresponding relationship may be directly processed without setting the database.
And 102, determining all first user numbers corresponding to the same user identity according to the corresponding relation.
Further, in the correspondence, all the user numbers with the same identity information may be determined, and these user numbers are determined as the first user number. The unique identities identify the same user identity, and may be considered to be the same user identity, for example, the identity card numbers are the same, and may be considered to be the same for both user identities.
In practical application, the user identity information in the corresponding relationship can be traversed, the identity card number can be traversed specifically, and if the same identity card number corresponds to a plurality of user numbers, the user numbers are determined as the first user number corresponding to the identity card number.
And if so, the number corresponding to the same identity information is considered as the first user number.
With the popularization of mobile terminals, basically everyone has a mobile phone number, and with the development of the real-name system of telephones, almost every adult has a mobile phone number. If one identity information only corresponds to one telephone number, it can be considered as a normal situation. Therefore, the abnormal number can be found out by screening mainly aiming at the condition that one identity corresponds to a plurality of numbers.
Specifically, the communication record of each first user number may be acquired from the system on the carrier side. Specifically, the communication record of each first number may be obtained from the charging system, and the communication record may include a call record, a record of sending/receiving a short message, and a record of sending/receiving a multimedia message.
Furthermore, if the first subscriber number does belong to the subscriber corresponding to the number, there will be some regularity in their communication records. For example, these numbers may have call records with other identical numbers. For example, if user A holds two numbers, then he would use both numbers to talk to the same number, e.g., both talking to a colleague.
In another case, it is possible that the user may open the card with his own identification card, but the actual user of the phone number is a relative of the user, for example, in the case where children do the phone number for parents. At this time, there is a communication situation between the mobile phone cards belonging to the same user, so that the situation can be recognized through the communication record, and the situation can be used as a normal number use situation.
In practical application, if the identity information of the first user corresponds to three user numbers, the first user only has one user number, and the other two user numbers are cards which are opened by others through impersonation, the situation of two-to-two conversation between the three cards hardly exists, and therefore the abnormal number in the first user number can be identified according to the communication record.
The method provided by the embodiment is used for identifying the abnormal telephone card, and is executed by the equipment provided with the method provided by the embodiment, and the equipment is usually realized in a hardware and/or software mode.
The method for identifying the abnormal telephone card provided by the embodiment comprises the following steps: acquiring a corresponding relation between a user identity and a user number; determining all first user numbers corresponding to the same user identity according to the corresponding relation; and acquiring the communication record of each first user number, and determining an abnormal number in the first user numbers according to the communication record. According to the method provided by the embodiment, whether abnormal numbers exist in the numbers is determined according to the communication records of the first user numbers bound with the same user, so that the identity of the user actually using the telephone card is rapidly determined in a plurality of numbers and is not consistent with the identity of the bound user, and the risk of the user can be reduced.
Fig. 2 is a flowchart illustrating an abnormal phone card identification method according to another exemplary embodiment of the present invention.
As shown in fig. 2, the method for identifying an abnormal phone card provided in this embodiment includes:
If the first user number is actually used by the user corresponding to the numbers, some communication situations may exist among the numbers, for example, if a child purchases a mobile phone number for a elder, communication situations may exist among the numbers.
In the method provided in this embodiment, the first group of numbers and the second group of numbers may be determined according to the first subscriber number, specifically, all the first subscriber numbers may be directly divided into two groups, or some of the first subscriber numbers may be divided into two groups.
Specifically, at least one telephone number in the first group has communication records with other numbers in the group; the second packet has at least one telephone number that has a record of communication with all other numbers in the packet.
And step 204, arbitrarily determining a first number in the first group of numbers, wherein the first number and other numbers in the first group of numbers have communication records.
And step 205, arbitrarily determining a second number in the second group of numbers, wherein the second number and other numbers in the second group of numbers have communication records.
Further, a first number N may be determined from the first set of numbersiThe first number and other numbers in the first group of numbers have communication records, and a second number N can be determined in a second group of numbersjThe second number has a record of communications with other numbers in the packet.
In practical application, the first group of numbers can be regarded as a number group, and the first number and any one of the numbers have intersection; the second group of numbers is a group of numbers, the second number intersecting any one of the numbers.
Communication records corresponding to numbers included in the first grouping number and the second grouping number can be acquired, and therefore the first number and the second number are determined according to the communication records. If the first group number includes a plurality of first numbers meeting the requirements, or the second group number includes a plurality of second numbers meeting the requirements, step 206 may be performed one by one according to the combination of each first number and each second number. For example, two first numbers, N, respectively, are identifiedi、Ni', determining to obtain a second number NjThen can be according to NiAnd NjStep 206 may be performed according to the combination of Ni' and NjThe combination of (a) and (b) performs step 206.
The timing of steps 204 and 205 is not limited.
In step 206, if there is no communication record in any of the first number and the second number, and there is no communication record in any of the second number and the first number, it is determined whether the second number is an abnormal number according to a preset method.
Specifically, it may be determined whether the first group number or the second group number is likely to be an abnormal number according to the communication record of the first number and the second number.
Further, whether a communication record exists between the first number and each number in the second group of numbers can be judged, and whether a communication record exists between the second number and each number in the first group of numbers can also be determined. If no communication record exists between any number in the first number and any number in the second number group, and no communication record exists between any number in the second number group and any number in the first number group, it can be considered that there is no intersection between the two number groups, and it can be considered that the numbers included in one of the number groups are all abnormal numbers.
In practical application, the grouping result has a decisive role in the determination result of step 206, so that multiple grouping possibilities can be determined in step 203, and if each grouping meets the condition described in step 206, it is considered that an abnormal condition exists in the first number grouping and the second number grouping.
In the method provided by this embodiment, the determined abnormal numbers may be fed back to the manual customer service, so that the manual customer service further determines whether the numbers are abnormal numbers.
In this embodiment, the first packet is used as a reference packet, the first packet is determined to be normal, and whether the second packet is normal is determined according to a preset method. In determining the grouping, a first group number in a first grouping may be the same as a second group number in a second grouping, and the second group number in the first grouping may be the same as the first group number in the second grouping, among two different groupings. For example, in a first grouping, the first group of numbers includes NiThe second group of numbers includes NjIn the second group, the first group number includes NjThe second group of numbers includes Ni。
Fig. 2A is a flowchart illustrating a process of determining whether a second group of numbers is abnormal according to an exemplary embodiment of the present invention.
As shown in fig. 2A, according to a preset method, determining whether the second group number is an abnormal number may specifically include:
The first group of numbers and the second group of numbers can be regarded as two disjoint groups of numbers and are two independent number groups, so that certificates used by one of the number groups when opening the card can be found or obtained from other ways, such certificates cannot be updated and can only be fixed, and therefore, whether the second group of numbers is abnormal or not can be determined based on certificate information corresponding to the two groups of numbers.
Specifically, first certificate information corresponding to each number included in the first group of numbers may be acquired from a system side of the operator, and second certificate information corresponding to each number included in the second group of numbers may be acquired. The specific order of acquisition is not limited.
Furthermore, because the current mobile phone number needs to be named in real name, the operator system stores the certificate information corresponding to each number, and can directly acquire the certificate information.
In actual application, the first certificate information and the second certificate information can be compared, specifically, the issuing date of the certificate can be compared, and the validity period of the certificate can also be compared. If the first group number or the second group number includes a plurality of numbers, the plurality of first certificate information and the plurality of second certificate information may be obtained, and each of the first certificate information and the second certificate information may be compared one by one, for example, there are two first certificate information a1 and a2, and two second certificate information B1 and B2, and then a1 and B1, a1 and B2, a2 and B1, and a2 and B2 may be compared, respectively.
And if the comparison result includes that the first certificate information is later than the issue date or the validity period of any second certificate information, determining that all the numbers in the second group of numbers are abnormal numbers. If the first group of numbers includes one number, the first certificate information of the first group of numbers is newer than the certificate information of all numbers in the second group of numbers, the user can be considered to have lost the certificate, and the user can transact the telephone card by using the newly subsidized certificate. And the first group of numbers and the second group of numbers do not intersect in the communication record, so that the second group of numbers can be considered as abnormal numbers handled by someone using the numbers lost by the user.
Fig. 2B is a flowchart illustrating a process of determining whether a second group number is abnormal according to another exemplary embodiment of the present invention.
As shown in fig. 2B, according to a preset method, the determining whether the second group number is an abnormal number may specifically include:
In the method provided by this embodiment, it is also determined whether the second group number is abnormal based on the certificate information, and the determination is mainly performed according to the certificate information used for handling the service.
The service handling information corresponding to each number included in the first group of numbers can be acquired, and the service handling information does not include an account opening and services handled during the account opening. Similarly, the service handling information corresponding to each number in the second group of numbers can be acquired. When a user opens an account, the user must carry certificate information, and if the user holds a certificate which is not the own certificate, the user is unlikely to hold the certificate and transact business.
Specifically, the first service transaction information and the second service transaction information may be obtained from a system on the operator side.
The timing of steps 2063, 2064 is not limiting.
The services handled by using the certificate can be screened from the first service information and the second service information, and if the services handled by using the certificate are included in the first service handling information and the services handled by using the certificate are not included in the second service handling information, the second group of numbers are judged to be abnormal numbers.
Further, if all the numbers in the second group do not use the certificate to handle the service, the second group of numbers can be considered as suspicious, and the second group of numbers are determined to be abnormal numbers.
In practical application, the above-mentioned mode of determining whether the second group number is an abnormal number may be adopted, or two modes may be adopted simultaneously, and the setting may be specifically performed according to the requirements.
Fig. 3 is a flowchart illustrating an abnormal phone card recognition method according to still another exemplary embodiment of the present invention.
As shown in fig. 3, the method for identifying an abnormal phone card provided in this embodiment includes:
The specific principles and implementation of steps 301 and 302 are similar to those of steps 101 and 102, and are not described herein again.
Step 303 is similar to the specific principle and implementation manner of obtaining the first user number communication record in step 103, and is not described herein again.
The method provided by this embodiment, in combination with the communication record and the location information of the first user number, determines whether the actual users of these numbers are bound users of the numbers.
When the telephone number is placed in the mobile phone, the mobile phone can use the number to communicate with a nearby base station, and the base station can acquire the position information of the mobile phone in the communication process. The system of the operator can obtain the position information of the first user number according to the information obtained by the base station. The electronic device executing the method provided by the embodiment may acquire the location information of the first user number from the system of the operator.
Specifically, the electronic device may send a location information request message including the first user number to the operator system, so that the operator system feeds back the location information to the electronic device.
In one application scenario, a user may transact multiple telephone numbers, for example, transact two telephone numbers, one for communication, such as making a call, sending a message, etc., and the other for surfing the internet. In this case, the communication record of the phone card used for surfing the internet may be less.
At this time, the abnormal number may be determined in the first user number in combination with the location information of each first user number. In the above example, if a user holds two phone cards, one for communication and the other for internet access, the user will carry both phone cards at the same time.
Fig. 3A is a flowchart illustrating the determination of an exception number according to an exemplary embodiment of the present invention.
As shown in fig. 3A, in the first embodiment, step 305 may further include:
The third group of numbers can be determined according to the first user number, the third group of numbers comprises part of telephone numbers in the first user number, a plurality of third group of numbers can be obtained according to different grouping modes, and the third group of numbers comprises at least one telephone number. For example, if the third group of numbers includes two or more numbers, then there are communication records for any two numbers in the third group of numbers.
Specifically, if there is a communication record between any two numbers in the third group of numbers, it may be considered that the third group of numbers is a number group, and it may be that the same user opens multiple numbers for use by relatives or friends.
Further, the third group of numbers includes a part of the first subscriber numbers, and therefore, a part of the first subscriber numbers that do not belong to the third group of numbers can be used to determine the suspected number.
In practical application, communication records exist in any two numbers in the third group of numbers, that is, any two numbers are communicated, that is, the third group of numbers is a number group, and if a first user number exists and no communication record exists with any number in the third group of numbers, the first user number and any number in the third group of numbers can be determined as a suspected number.
If there is no communication record between a user number and any number in the third group of numbers, it may be considered that the first user number and the third group of numbers do not have an intersection, and therefore, it may be considered that the first user number and the third group of numbers may be abnormal numbers.
Specifically, it may be further determined whether the suspected number is an abnormal number based on the position information of each number.
Further, the suspected location information of the suspected number may be obtained by obtaining third location information of each number included in the third group of numbers based on the location information of the first user number obtained in step 304. The location information includes, in particular, at what time, the location information of the phone card.
And step 3054, determining whether the suspected number is an abnormal number according to the third position information and the suspected position information.
In practical application, whether the suspected number is abnormal or not can be judged according to the position information of each number in the third group of numbers and the position information of the suspected number.
At the same time, it may be determined whether the distance between the suspected number and any number included in the third group of numbers does not exceed the distance threshold, and the time when the distance between the suspected number and any number included in the third group of numbers does not exceed the time threshold, if not, it is determined that the suspected number is an abnormal number.
Specifically, it may be determined whether the time for which any one of the third group of numbers appears in the same area with the suspected number exceeds the threshold, and if yes, it may be determined that the two numbers are actually used by the same user, and the number is not an abnormal number.
If the time length of the suspected number appearing in the same area with any number in the third group of numbers does not exceed the threshold value, the suspected number can be considered as an abnormal number.
Further, the communication record includes at least one of:
call record, short message record and multimedia message record.
Fig. 4 is a block diagram illustrating an apparatus for recognizing an abnormal phone card according to an exemplary embodiment of the present invention.
As shown in fig. 4, the device for identifying an abnormal phone card provided in this embodiment includes:
an obtaining module 41, configured to obtain a correspondence between a user identity and a user number;
a first determining module 42, configured to determine, according to the corresponding relationship, all first user numbers corresponding to the same user identity;
the second determining module 43 is configured to obtain a communication record of each first user number, and determine an abnormal number in the first user numbers according to the communication record.
The device for identifying the abnormal telephone card provided by the embodiment comprises: the acquisition module is used for acquiring the corresponding relation between the user identity and the user number; the first determining module is used for determining all first user numbers corresponding to the same user identity according to the corresponding relation; and the second determining module is used for acquiring the communication record of each first user number and determining an abnormal number in the first user numbers according to the communication record. The device provided by the embodiment determines whether abnormal numbers exist in the numbers according to the communication records of a plurality of first user numbers bound with the same user, so that the identity of the user actually using the telephone card is rapidly determined in a plurality of numbers and is not consistent with the identity of the bound user, and the risk of the user can be reduced.
The specific principle and implementation of the identification apparatus for an abnormal phone card provided in this embodiment are similar to those of the embodiment shown in fig. 1, and are not described herein again.
Fig. 5 is a block diagram illustrating an apparatus for recognizing an abnormal phone card according to another exemplary embodiment of the present invention.
As shown in fig. 5, on the basis of the foregoing embodiment, in the identification apparatus for an abnormal phone card provided in this embodiment, the second determining module 43 includes:
a grouping unit 431, configured to determine a first group number and a second group number according to the first user number;
a determining unit 432, configured to determine a first number arbitrarily in the first group of numbers, where the first number and other numbers in the first group of numbers all have communication records;
the determining unit 432 is further configured to determine a second number arbitrarily in the second group of numbers, where the second number and other numbers in the second group of numbers all have communication records;
a determining unit 433, configured to determine whether the second group of numbers is an abnormal number according to a preset method if neither the first number nor the second group of numbers has a communication record, and neither the second number nor the first group of numbers has a communication record.
The determining unit 433 is specifically configured to:
acquiring first certificate information corresponding to each number included in the first group of numbers, and acquiring second certificate information corresponding to each number included in the second group of numbers;
and comparing the first certificate information with the second certificate information, and determining whether the second group of numbers are abnormal numbers according to the comparison result.
The determining unit 433 is specifically configured to:
acquiring first service handling information corresponding to each number included in the first group of numbers, wherein the first service handling information does not include account opening operation and services handled simultaneously by account opening;
acquiring second service handling information corresponding to each number included in the second group of numbers, wherein the second service handling information does not include account opening operation and services handled simultaneously by account opening;
and if the first service transaction information comprises the service transacted by using the certificate, and the second service transaction information does not comprise the service transacted by using the certificate, judging that the second group of numbers are abnormal numbers.
The obtaining module 431 is further configured to:
acquiring the position information of each first user number;
the second determining module 43 is further configured to:
and determining an abnormal number in the first user number according to the communication record and the position information of the first user number.
The second determining module 43 is specifically configured to:
determining a third group of numbers according to the first user number, wherein any two numbers in the third group of numbers have communication records;
determining a suspected number which has no communication record with any number in the third group of numbers in the first user number which does not belong to the third group of numbers;
acquiring third position information of each number included in the third group of numbers, and acquiring suspected position information of the suspected number;
and determining whether the suspected number is an abnormal number according to the third position information and the suspected position information.
The second determining module 43 is specifically configured to:
and judging whether the position distance between the suspected number and any number in the third group does not exceed a distance threshold value at the same moment, and determining that the suspected number is an abnormal number if the position distance does not exceed the distance threshold value and the time for which the position distance does not exceed the distance threshold value does not exceed a time threshold value.
The communication record includes at least one of:
call record, short message record and multimedia message record.
The specific principle and implementation of the apparatus provided in this embodiment are similar to those of the embodiments shown in fig. 2 to 3, and are not described herein again.
Fig. 6 is a block diagram illustrating an identification apparatus of an abnormal phone card according to an exemplary embodiment of the present invention.
As shown in fig. 6, the identification device for an abnormal phone card provided in this embodiment includes:
a memory 61;
a processor 62; and
a computer program;
wherein the computer program is stored in the memory 61 and configured to be executed by the processor 62 to implement any of the above-described abnormal calling card identification methods.
The present embodiments also provide a computer-readable storage medium, having stored thereon a computer program,
the computer program is executed by a processor to realize any abnormal telephone card identification method.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (8)
1. An identification method of an abnormal telephone card is characterized by comprising the following steps:
acquiring a corresponding relation between a user identity and a user number;
determining all first user numbers corresponding to the same user identity according to the corresponding relation;
acquiring a communication record of each first user number, and determining an abnormal number in the first user numbers according to the communication record;
the determining an abnormal number in the first user number according to the communication record comprises:
determining a first group of numbers and a second group of numbers according to the first user number;
randomly determining a first number in the first group of numbers, wherein the first number and other numbers in the first group of numbers have communication records;
a second number is determined arbitrarily in the second group of numbers, and the second number and other numbers in the second group of numbers have communication records;
if no communication record exists between any number in the first group of numbers and any number in the second group of numbers, and no communication record exists between any number in the second group of numbers and any number in the first group of numbers, judging whether the second group of numbers are abnormal numbers or not according to a preset method;
or,
the determining an abnormal number in the first user number according to the communication record comprises:
acquiring the position information of each first user number;
determining a third group of numbers according to the first user number, wherein any two numbers in the third group of numbers have communication records;
determining a suspected number which has no communication record with any number in the third group of numbers in the first user number which does not belong to the third group of numbers;
acquiring third position information of each number included in the third group of numbers, and acquiring suspected position information of the suspected number;
and determining whether the suspected number is an abnormal number according to the third position information and the suspected position information.
2. The method of claim 1, wherein the determining whether the second group of numbers are abnormal numbers according to a predetermined method comprises:
acquiring first certificate information corresponding to each number included in the first group of numbers, and acquiring second certificate information corresponding to each number included in the second group of numbers;
and comparing the first certificate information with the second certificate information, and determining whether the second group of numbers are abnormal numbers according to the comparison result.
3. The method of claim 1, wherein the determining whether the second group of numbers are abnormal numbers according to a predetermined method comprises:
acquiring first service handling information corresponding to each number included in the first group of numbers, wherein the first service handling information does not include account opening operation and services handled simultaneously by account opening;
acquiring second service handling information corresponding to each number included in the second group of numbers, wherein the second service handling information does not include account opening operation and services handled simultaneously by account opening;
and if the first service transaction information comprises the service transacted by using the certificate, and the second service transaction information does not comprise the service transacted by using the certificate, judging that the second group of numbers are abnormal numbers.
4. The method according to claim 1, wherein the determining whether the suspected number is an abnormal number according to the third location information and the suspected location information includes:
and judging whether the position distance between the suspected number and any number in the third group does not exceed a distance threshold value at the same moment, and determining that the suspected number is an abnormal number if the position distance does not exceed the distance threshold value and the time for which the position distance does not exceed the distance threshold value exceeds a time threshold value.
5. The method of any of claims 1-3, wherein the communication record comprises at least one of:
call record, short message record and multimedia message record.
6. An apparatus for recognizing an abnormal telephone card, comprising:
the acquisition module is used for acquiring the corresponding relation between the user identity and the user number;
the first determining module is used for determining all first user numbers corresponding to the same user identity according to the corresponding relation;
the second determining module is used for acquiring the communication record of each first user number and determining an abnormal number in the first user numbers according to the communication record;
the second determining module includes:
the grouping unit is used for determining a first group number and a second group number according to the first user number;
the determining unit is used for determining a first number in the first group of numbers at will, and the first number and other numbers in the first group of numbers have communication records;
the determining unit is further configured to determine a second number arbitrarily in the second group of numbers, where the second number and other numbers in the second group of numbers all have communication records;
a determining unit, configured to determine whether a second group of numbers is an abnormal number according to a preset method if neither the first number nor any number in the second group of numbers has a communication record, and neither the second number nor any number in the first group of numbers has a communication record;
or,
the acquisition module is further configured to:
acquiring the position information of each first user number;
the second determination module is further to:
determining a third group of numbers according to the first user number, wherein any two numbers in the third group of numbers have communication records;
determining a suspected number which has no communication record with any number in the third group of numbers in the first user number which does not belong to the third group of numbers;
acquiring third position information of each number included in the third group of numbers, and acquiring suspected position information of the suspected number;
and determining whether the suspected number is an abnormal number according to the third position information and the suspected position information.
7. An identification device for an abnormal telephone card, comprising:
a memory;
a processor; and
a computer program;
wherein the computer program is stored in the memory and configured to be executed by the processor to implement the method of any of claims 1-5.
8. A computer-readable storage medium, having stored thereon a computer program,
the computer program is executed by a processor to implement the method according to any of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910014132.2A CN109769244B (en) | 2019-01-08 | 2019-01-08 | Abnormal telephone card identification method, device, equipment and readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910014132.2A CN109769244B (en) | 2019-01-08 | 2019-01-08 | Abnormal telephone card identification method, device, equipment and readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109769244A CN109769244A (en) | 2019-05-17 |
CN109769244B true CN109769244B (en) | 2021-10-15 |
Family
ID=66453414
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910014132.2A Active CN109769244B (en) | 2019-01-08 | 2019-01-08 | Abnormal telephone card identification method, device, equipment and readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109769244B (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110930155B (en) * | 2019-10-17 | 2023-09-08 | 平安科技(深圳)有限公司 | Risk management and control method, risk management and control device, computer device and storage medium |
CN113038480B (en) * | 2019-12-24 | 2022-08-30 | 中国移动通信集团山东有限公司 | Identification method, device, server and storage medium |
US11330101B2 (en) * | 2020-05-21 | 2022-05-10 | Micron Technology, Inc. | Managing spoofed calls to mobile devices |
CN112153222B (en) * | 2020-10-20 | 2021-10-22 | 中国联合网络通信集团有限公司 | Harassment number identification method and server |
CN114640983B (en) * | 2020-12-15 | 2024-05-24 | 中国移动通信集团山东有限公司 | User identification method and device, server and storage medium |
CN114971836A (en) * | 2021-02-22 | 2022-08-30 | 中国移动通信集团江苏有限公司 | One-certificate-multiple-number user identification method and device, electronic equipment and storage medium |
CN114979958B (en) * | 2022-06-08 | 2024-10-18 | 中国联合网络通信集团有限公司 | Teenager user identification method, platform, computer equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170034147A1 (en) * | 2015-07-27 | 2017-02-02 | Alibaba Group Holding Limited | User identity verification method and system, and verification server |
CN108600961A (en) * | 2018-03-23 | 2018-09-28 | 广州杰赛科技股份有限公司 | Preparation method and device, equipment, the storage medium of user's similarity |
CN108966226A (en) * | 2018-06-15 | 2018-12-07 | 中国联合网络通信集团有限公司 | The method for processing business and device of identity-based information |
-
2019
- 2019-01-08 CN CN201910014132.2A patent/CN109769244B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170034147A1 (en) * | 2015-07-27 | 2017-02-02 | Alibaba Group Holding Limited | User identity verification method and system, and verification server |
CN108600961A (en) * | 2018-03-23 | 2018-09-28 | 广州杰赛科技股份有限公司 | Preparation method and device, equipment, the storage medium of user's similarity |
CN108966226A (en) * | 2018-06-15 | 2018-12-07 | 中国联合网络通信集团有限公司 | The method for processing business and device of identity-based information |
Also Published As
Publication number | Publication date |
---|---|
CN109769244A (en) | 2019-05-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109769244B (en) | Abnormal telephone card identification method, device, equipment and readable storage medium | |
US11563734B2 (en) | System and method for authenticating called parties of individuals within a controlled environment | |
CN105227786B (en) | A kind of means of communication and device based on virtual-number | |
CN106303099B (en) | A kind of method, apparatus and system for verifying user's communicating number validity | |
CN104349324A (en) | Mobile terminal number intelligent protection system and method | |
CN106302927A (en) | The voice call platform that two-way number is hidden | |
CN111786994B (en) | Data processing method based on block chain and related equipment | |
CN109688273B (en) | Reminding method, reminding device, terminal and storage medium | |
CN109767284A (en) | Incoming information methods of exhibiting, device, electronic equipment and readable storage medium storing program for executing | |
CN111567012A (en) | Decentralized automated phone fraud risk management | |
CN108055238A (en) | A kind of account verification method and system | |
CN109246319A (en) | A kind of calling name card business implementation method, device, equipment and storage medium | |
WO2017035945A1 (en) | Method, device and system for marking conversation caller | |
CN110505623A (en) | A kind of method, system and server handling labeled number complaint | |
JP5633984B1 (en) | Unauthorized transaction prevention device, method, and program | |
CN109150864B (en) | Anti-cheating method and device based on secondary authentication | |
US11627218B2 (en) | Caller identification information analyzer | |
CN108933857A (en) | The processing method and processing device of secondary user's harassing call of distributing telephone numbers | |
CN105871937A (en) | Data processing method, data processing device and data processing system | |
CN104427136A (en) | Authentication method and interactive voice response (IVR) system | |
CN110324794A (en) | Method, apparatus, server and the readable storage medium storing program for executing that Articles found, owner please contact | |
CN114979992B (en) | Call state determining method and device | |
CN111405555B (en) | Network authentication method and device | |
US20240242303A1 (en) | Tool differentiator between fraud and struggling customers in real time | |
CN113038480B (en) | Identification method, device, server and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |