CN112583649A - Method and device for identifying mobile phone hot spots - Google Patents
Method and device for identifying mobile phone hot spots Download PDFInfo
- Publication number
- CN112583649A CN112583649A CN201910922998.3A CN201910922998A CN112583649A CN 112583649 A CN112583649 A CN 112583649A CN 201910922998 A CN201910922998 A CN 201910922998A CN 112583649 A CN112583649 A CN 112583649A
- Authority
- CN
- China
- Prior art keywords
- user
- mobile phone
- behavior
- same
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/02—Capturing of monitoring data
- H04L43/028—Capturing of monitoring data by filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/50—Testing arrangements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/029—Location-based management or tracking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/18—Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W8/00—Network data management
- H04W8/22—Processing or transfer of terminal data, e.g. status or physical capabilities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The disclosure provides a method and a device for identifying mobile phone hot spots, and relates to the field of data communication. The method comprises the steps of obtaining user internet behavior information from a mobile core network through a deep packet inspection method, and identifying a user using a mobile phone hotspot by matching the user internet behavior information with preset behavior characteristics.
Description
Technical Field
The present disclosure relates to the field of data communications, and in particular, to a method and an apparatus for identifying a hotspot of a mobile phone.
Background
The mobile phone hotspot is a technology for converting cellular Network signals received by a mobile phone, such as GPRS (General Packet Radio Service), 3G (third generation), 4G (fourth generation), or 5G (fifth generation), into WiFi (Wireless Fidelity, Wireless Local Area Network based on IEEE 802.11b standard) signals to be transmitted, so that portable devices such as a mobile phone, a tablet, or a notebook can surf the internet also outdoors or in places without a Network through a Wireless Network card or a WLAN (Wireless Local Area Network) module, thereby realizing Network resource sharing.
After the unlimited flow package is on the market, many users make hot spots through mobile phones to provide access services for other users, and network flow is further promoted. From the network operation aspect, such users occupy more network resources and shunt potential traffic profits of operators, so it is necessary to identify the hot spot behavior of the mobile phone and take corresponding measures.
Disclosure of Invention
According to the method, the user internet behavior information is acquired from the mobile core network through a deep packet inspection method, and the user who uses the mobile phone hot spot is identified by matching the user internet behavior information with the preset behavior characteristics.
Some embodiments of the present disclosure provide a method for identifying a mobile phone hotspot, including: acquiring user internet behavior information from a mobile core network by a deep packet inspection method; matching the user internet behavior information with preset behavior characteristics; and identifying the user using the mobile phone hot spot according to the matching result.
In some embodiments, the preset behavior features include: the network management system comprises one or more of a mutual exclusion behavior characteristic, a concurrent behavior characteristic, a mobility behavior characteristic, a busy and idle behavior characteristic, a traffic behavior characteristic, an internet surfing duration behavior characteristic and a rate behavior characteristic.
In some embodiments, when the preset behavior feature includes a combination of multiple behavior features, the matching results of the single behavior features in the combination are weighted and summed to obtain a combined matching result.
In some embodiments, the mutual exclusion behavior feature includes a first mutual exclusion service, and/or a second mutual exclusion service and a third mutual exclusion service that are mutually exclusive; matching the user number, the internet surfing time, the user identification of the service with the mutual exclusion behavior characteristic; if the matching result is that a plurality of user identifications of the first mutual exclusion service exist under the same user number at the same time, identifying the user corresponding to the same user number as a user using the mobile phone hot spot; and if the matching result is that the user identification of the second mutual exclusion service and the user identification of the third mutual exclusion service exist at the same time under the same user number, identifying the user corresponding to the same user number as the user using the mobile phone hot spot.
In some embodiments, the first mutually exclusive service comprises an instant messaging service.
In some embodiments, the second mutually exclusive service and the third mutually exclusive service are any two video services, any two audio services, or one video service and one audio service.
In some embodiments, the concurrent behavior characteristics include concurrent traffic and its connection threshold; and matching the user number, the internet surfing time, the service type information and the service connection information with the concurrent behavior characteristics, and identifying the user corresponding to the same user number as a user using the mobile phone hot spot if the matching result is that the concurrent services under the same user number have the service connection quantity which is larger than the connection threshold of the concurrent services.
In some embodiments, the concurrency behavior characteristics include a time period and a traffic connection total threshold; and matching the user number, the internet surfing time and the service connection information with the concurrent behavior characteristics, and identifying the user corresponding to the same user number as a user using the mobile phone hotspot if the matching result is that the total number of service connections in the time period under the same user number is greater than the threshold value of the total number of service connections.
In some embodiments, the mobility behavior feature comprises a preset location area; and matching the user number, the internet surfing time and internet surfing position information corresponding to each internet surfing time with the mobility behavior characteristics, and identifying the user corresponding to the same user number as a user using a mobile phone hotspot if the matching result is that the same user number is located in the preset position area and the position change in the preset position area is smaller than a preset value, wherein the position information is base station information or sector information.
In some embodiments, the busy-idle time behavior characteristics include busy-idle time law information; and matching the user number, the internet surfing time and the internet surfing flow with the busy and idle time behavior characteristics, and identifying the user corresponding to the same user number as the user using the mobile phone hotspot if the busy and idle time rule information corresponding to the same user number is not accordant with the busy and idle time rule information specified by the busy and idle time behavior characteristics.
In some embodiments, the traffic behavior feature includes a traffic threshold, and the user number, the internet surfing time, the internet surfing traffic and the traffic behavior feature are matched, and if the internet surfing traffic of the same user number within a preset time exceeds the traffic threshold, a user corresponding to the same user number is identified as a user using a mobile phone hotspot.
In some embodiments, the internet surfing time duration behavior characteristics include a time duration threshold, the user number, the internet surfing time and the internet surfing time duration behavior characteristics are matched, and if the internet surfing time duration of the same user number exceeds the time duration threshold, the user corresponding to the same user number is identified as the user using the mobile phone hotspot.
In some embodiments, the rate behavior feature includes a rate threshold, the user number, the internet surfing rate and the rate behavior feature are matched, and if the internet surfing rate of the same user number exceeds the rate threshold, the user corresponding to the same user number is identified as the user using the mobile phone hotspot.
In some embodiments, further comprising: and verifying the user using the mobile phone hot spot identified by the behavior characteristics by using the user internet surfing technical information so as to confirm that the user is the user using the mobile phone hot spot.
In some embodiments, the IP address of the user to be verified and the ID value of the data packet are obtained, and if the ID value of the data packet corresponding to the same IP address does not have an increasing rule, it is determined that the user corresponding to the same IP address is a user using a mobile phone hotspot.
In some embodiments, an IP address of a user to be authenticated and a TTL value of a data packet are obtained, and if the range of the TTL value of the data packet corresponding to the same IP address is smaller than a preset range, it is determined that the user corresponding to the same IP address is a user using a mobile phone hotspot.
In some embodiments, the user using the mobile phone hotspot may also be restricted from internet qualification or internet performance.
Some embodiments of the present disclosure provide an apparatus for identifying a hotspot of a mobile phone, including:
a memory; and
a processor coupled to the memory, the processor configured to perform the method of identifying a hotspot of a cell phone of any of the embodiments based on instructions stored in the memory.
Some embodiments of the present disclosure propose a non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of identifying a mobile phone hotspot in any of the embodiments.
Drawings
The drawings that will be used in the description of the embodiments or the related art will be briefly described below. The present disclosure will be more clearly understood from the following detailed description, which proceeds with reference to the accompanying drawings,
it is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without undue inventive faculty.
Fig. 1 is a schematic flow chart of some embodiments of a method for identifying a hotspot in a mobile phone according to the present disclosure.
Fig. 2 is a schematic structural diagram of some embodiments of the device for identifying a hotspot of a mobile phone according to the present disclosure.
Detailed Description
The technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the drawings in the embodiments of the present disclosure.
Fig. 1 is a schematic flow chart of some embodiments of a method for identifying a hotspot in a mobile phone according to the present disclosure.
As shown in fig. 1, the method of this embodiment includes: steps 11 and 13, optionally, may further include one or more of steps 12, 14, and 15.
In step 11, the method for obtaining the user internet information from the mobile core network by the deep packet inspection method includes, for example: user internet behavior information and user internet technology information.
The Deep Packet Inspection (DPI) method is to add application protocol identification, Packet content Inspection, Deep decoding, and the like to application layer data on top of the traditional IP Packet Inspection technology.
The conventional IP packet detection refers to detection of packet elements included between Open System Interconnection (OSI) layers L2-L4 (link layer, network layer, and transport layer), such as a Media Access Control (MAC) address, an IP address, a transport layer protocol, and port information. The information is obtained in the header part of the IP data packet without analyzing the content part of the IP data packet.
By deep packet inspection, not only can information (referred to as user internet technology information in this disclosure), such as MAC, IP address, transport layer protocol, port information, etc., of an L2-L4 layer packet element of a packet header portion of an IP data packet be acquired, but also information (referred to as user internet behavior information in this disclosure) of a content portion of the IP data packet, such as user number (e.g., user telephone number), internet time, user identification of a service (used to represent user ID under a certain service), service connection information, internet location information, internet traffic, internet speed, internet duration, etc., can be acquired, but not limited to the examples given above.
In step 12, according to the behavior information such as internet traffic, internet speed, internet duration and the like in the user internet information, suspicious users using mobile phone hotspots are preliminarily screened out.
For example, the user number, the internet surfing time, the internet surfing flow and preset flow behavior characteristics (including a flow threshold value, for example) are matched, and if the internet surfing flow of the same user number in the preset time exceeds the flow threshold value, a user corresponding to the same user number is identified as a suspicious user using a mobile phone hotspot.
For example, the user number and the internet surfing time are matched with the preset internet surfing time behavior characteristics (including the time threshold), and if the internet surfing time of the same user number exceeds the time threshold, the user corresponding to the same user number is identified as a suspicious user using a mobile phone hotspot.
For example, the user number and the internet speed are matched with a preset speed behavior characteristic (including a speed threshold), and if the internet speed of the same user number exceeds the speed threshold, the user corresponding to the same user number is identified as a suspicious user using a mobile phone hotspot.
Therefore, suspicious users with internet traffic, internet speed or internet duration and the like obviously deviating from normal values are screened out, and the probability that the suspicious users use mobile phone hotspots is high.
In step 13, behavior information verification: and matching the user internet behavior information with preset behavior characteristics to identify the user using the mobile phone hotspot.
The preset behavior characteristics comprise: a combination of one or more of mutually exclusive behavior features, concurrent behavior features, mobility behavior features, busy-idle behavior features.
When the preset behavior features comprise a combination of multiple behavior features, the matching results of the single behavior features in the combination are weighted and summed to obtain a comprehensive matching result, and the comprehensive matching result is analyzed from multiple dimensions, so that the accuracy of identifying the user using the mobile phone hot spot is higher. The weight of each behavior feature can be determined according to the confidence of the behavior feature for identifying the mobile phone hot spot, and the higher the confidence is, the larger the dependent weight is. For example, the weight of the mutually exclusive behavior feature, the concurrent behavior feature may be greater than the weight of the mobility behavior feature, the busy-idle behavior feature.
The mutual exclusion behavior characteristics comprise first mutual exclusion services and/or second mutual exclusion services and third mutual exclusion services which are mutually exclusive. The first mutual exclusion service is, for example, an instant messaging service, such as WeChat, or may also be a preset service that allows only one user to use at the same time, such as a certain video, audio, shopping application, or the like. The mutually exclusive second and third mutual exclusion services are, for example, any two video services, any two audio services, or one video service and one audio service.
Matching the user number, the internet surfing time, the user identification (used for representing the user ID under a certain service) of the service with the mutual exclusion behavior characteristic; if the matching result is that a plurality of user identifications of the first mutual exclusion service exist under the same user number at the same time, identifying the user corresponding to the same user number as a user using the mobile phone hot spot; and if the matching result is that the user identification of the second mutual exclusion service and the user identification of the third mutual exclusion service exist at the same time under the same user number, identifying the user corresponding to the same user number as the user using the mobile phone hot spot.
For example, if there are multiple micro-signals simultaneously under the same user number, and the abnormality indicates that there are multiple users using the micro-signal application simultaneously under one phone number, the user corresponding to the same user number may be a user using a hot spot of a mobile phone. If there are multiple user video service numbers under the same user number at the same time, and the abnormality indicates that there are multiple users watching videos under one phone number at the same time, the user corresponding to the same user number may be a user using a mobile phone hotspot. Thus, the mutual exclusivity of the service is utilized to identify the user using the mobile phone hotspot.
The concurrent behavior characteristics include, for example, concurrent traffic and its connection threshold. And matching the user number, the internet surfing time, the service type information (which is used for indicating which kind of service is so as to ensure whether the user uses the concurrent service limited in the concurrent behavior characteristic), the service connection information and the concurrent behavior characteristic, and identifying the user corresponding to the same user number as the user using the mobile phone hot spot if the matching result shows that the service connection quantity of the concurrent services under the same user number is larger than the connection threshold of the concurrent services.
For example, if a video under the same user number has multiple service connections at the same time, the exception indicates that multiple users under the user number watch the video at the same time, and the user corresponding to the same user number is identified as a user using a mobile phone hotspot. If a plurality of service connections occur in a certain shopping application under the same user number at the same time, the abnormity indicates that a plurality of users under the user number shop on the shopping application at the same time, and the user corresponding to the same user number is identified as the user using the mobile phone hotspot.
The concurrency behavior characteristics include, for example, a time period and a traffic connection total threshold. And matching the user number, the internet surfing time, the service connection information and the concurrent behavior characteristics, and identifying the user corresponding to the same user number as the user using the mobile phone hot spot if the matching result is that the total number of service connections in the same user number in a time period is greater than the threshold value of the total number of service connections.
For example, if the total number of service connections in the same subscriber number in the time period is much greater than the normal total number of service connections, the abnormality indicates that there may be multiple subscribers on the internet under the subscriber number, and the subscriber corresponding to the same subscriber number is identified as a subscriber using a mobile phone hotspot.
The mobility behaviour characteristic for example comprises a preset location area. And matching the user number, the internet surfing time and internet surfing position information (such as base station information or sector information) corresponding to each internet surfing time with the mobility behavior characteristics, and identifying the user corresponding to the same user number as a user using the mobile phone hotspot if the matching result shows that the same user number is located in a preset position area and the position change in the preset position area is smaller than a preset value.
For example, the same user number is located in a place with concentrated shared crowd such as a rural area in a city, a student dormitory, and the like, and the location of the user number is unchanged for a long time, so that the user corresponding to the same user number may be a user using a mobile phone hotspot.
The busy and idle time behavior characteristics comprise busy and idle time rule information. And matching the user number, the internet surfing time, the internet surfing flow and the busy and idle time behavior characteristics, and identifying the user corresponding to the same user number as the user using the mobile phone hotspot if the busy and idle time rule information corresponding to the same user number is not accordant with the busy and idle time rule information specified by the busy and idle time behavior characteristics.
For example, the normal busy-idle time rule is that the flow of a working day is small, the flow of a rest day is large, if the information of the busy-idle time rule corresponding to the same subscriber number does not conform to the flow, and the rest day has almost no flow, it is indicated that the subscriber can surf the internet by means of the hotspot of another person, and therefore, the subscriber corresponding to the subscriber number is identified as the subscriber using the mobile phone hotspot.
At step 14, technical information verification: and confirming whether the user is the user using the mobile phone hot spot or not by using the user internet surfing technical information.
The first method is to obtain the IP address of the user to be verified and the Identification (ID) value of the data packet, and if the Identification (ID) value of the data packet corresponding to the same IP address does not have a simple increasing rule but is chaotic, the user corresponding to the same IP address is determined to be the user using the mobile phone hot spot.
The second method is To obtain the IP address of the user To be verified and the TTL (Time To Live, the field specifies the maximum number of network segments allowed To pass before the IP packet is discarded by the router) value of the data packet, and if the TTL value range of the data packet corresponding To the same IP address is smaller than the normal preset range, it is determined that the user corresponding To the same IP address is the user using the mobile phone hot spot.
In step 15, the user using the mobile phone hot spot is restricted in the qualification or performance of internet access.
For example, the network of the user using the mobile phone hotspot is closed, so that the user cannot use the network within a limited time. Or, the internet speed of the user using the mobile phone hot spot is limited, so that the user can only surf the internet at a very slow speed within the limited time. The limit time may be, for example, several minutes for the purpose of alerting the user.
The method comprises the steps of obtaining user internet behavior information from a mobile core network through a deep packet detection method, identifying a user using a mobile phone hotspot through matching the user internet behavior information with preset behavior characteristics, and taking some limiting measures.
Fig. 2 is a schematic structural diagram of some embodiments of the device for identifying a hotspot of a mobile phone according to the present disclosure.
As shown in fig. 2, the device 20 for identifying a hotspot of a mobile phone in this embodiment includes:
a memory 21; and a processor 22 coupled to the memory, the processor 22 configured to perform the method of identifying a hotspot of a cell phone in any of the embodiments based on instructions stored in the memory.
The memory 21 may include, for example, a system memory, a fixed nonvolatile storage medium, and the like. The system memory stores, for example, an operating system, an application program, a Boot Loader (Boot Loader), and other programs.
The present disclosure also proposes a non-transitory computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of identifying a hotspot of a mobile phone in any of the embodiments.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable non-transitory storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only exemplary of the present disclosure and is not intended to limit the present disclosure, so that any modification, equivalent replacement, or improvement made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.
Claims (15)
1. A method for identifying a hotspot of a mobile phone is characterized by comprising the following steps:
acquiring user internet behavior information from a mobile core network by a deep packet inspection method;
matching the user internet behavior information with preset behavior characteristics;
and identifying the user using the mobile phone hot spot according to the matching result.
2. The method of claim 1, wherein the preset behavior feature comprises: the network management system comprises one or more of a mutual exclusion behavior characteristic, a concurrent behavior characteristic, a mobility behavior characteristic, a busy and idle behavior characteristic, a traffic behavior characteristic, an internet surfing duration behavior characteristic and a rate behavior characteristic.
3. The method according to claim 2, wherein when the preset behavior features comprise a combination of multiple behavior features, the matching results of the single behavior features in the combination are weighted and summed to obtain a comprehensive matching result.
4. The method according to claim 2, characterized in that the mutual exclusion behavior feature comprises a first mutual exclusion service, and/or a second mutual exclusion service and a third mutual exclusion service that are mutually exclusive;
matching the user number, the internet surfing time, the user identification of the service with the mutual exclusion behavior characteristic;
if the matching result is that a plurality of user identifications of the first mutual exclusion service exist under the same user number at the same time, identifying the user corresponding to the same user number as a user using the mobile phone hot spot;
and if the matching result is that the user identification of the second mutual exclusion service and the user identification of the third mutual exclusion service exist at the same time under the same user number, identifying the user corresponding to the same user number as the user using the mobile phone hot spot.
5. The method of claim 4,
the first mutual exclusion service comprises an instant messaging service;
the mutually exclusive second and third mutual exclusion services are any two video services, any two audio services, or one video service and one audio service.
6. The method of claim 2, wherein the concurrent behavior characteristics comprise concurrent traffic and its connection threshold;
and matching the user number, the internet surfing time, the service type information and the service connection information with the concurrent behavior characteristics, and identifying the user corresponding to the same user number as a user using the mobile phone hot spot if the matching result is that the concurrent services under the same user number have the service connection quantity which is larger than the connection threshold of the concurrent services.
7. The method of claim 2, wherein the concurrent behavior characteristics include a time period and a traffic connection total threshold;
and matching the user number, the internet surfing time and the service connection information with the concurrent behavior characteristics, and identifying the user corresponding to the same user number as a user using the mobile phone hotspot if the matching result is that the total number of service connections in the time period under the same user number is greater than the threshold value of the total number of service connections.
8. The method of claim 2, wherein the mobility behavior characteristic comprises a preset location area;
matching the user number, the internet surfing time and the internet surfing position information corresponding to each internet surfing time with the mobility behavior characteristics, if the matching result is that the same user number is located in the preset position area and the position change in the preset position area is smaller than a preset value, identifying the user corresponding to the same user number as the user using the mobile phone hot spot,
the position information is base station information or sector information.
9. The method of claim 2, wherein the busy-idle time behavior characteristics include busy-idle time law information;
and matching the user number, the internet surfing time and the internet surfing flow with the busy and idle time behavior characteristics, and identifying the user corresponding to the same user number as the user using the mobile phone hotspot if the busy and idle time rule information corresponding to the same user number is not accordant with the busy and idle time rule information specified by the busy and idle time behavior characteristics.
10. The method of claim 2,
the flow behavior characteristics comprise a flow threshold value, a user number, internet surfing time, internet surfing flow and the flow behavior characteristics are matched, and if the internet surfing flow of the same user number in preset time exceeds the flow threshold value, a user corresponding to the same user number is identified as a user using a mobile phone hotspot;
or the internet surfing time length behavior characteristics comprise a time length threshold value, the user number, the internet surfing time and the internet surfing time length behavior characteristics are matched, and if the internet surfing time length of the same user number exceeds the time length threshold value, the user corresponding to the same user number is identified as the user using the mobile phone hot spot;
or, the speed behavior characteristics comprise a speed threshold, the user number, the internet speed and the speed behavior characteristics are matched, and if the internet speed of the same user number exceeds the speed threshold, the user corresponding to the same user number is identified as the user using the mobile phone hotspot.
11. The method of claim 1, further comprising:
and verifying the user using the mobile phone hot spot identified by the behavior characteristics by using the user internet surfing technical information so as to confirm that the user is the user using the mobile phone hot spot.
12. The method of claim 11,
acquiring an IP address of a user to be verified and an identification ID value of a data packet, and if the identification ID value of the data packet corresponding to the same IP address does not have an increasing rule, determining that the user corresponding to the same IP address is a user using a mobile phone hotspot;
and/or the first and/or second light sources,
and acquiring the IP address of the user to be verified and the TTL value of the data packet, and if the range of the TTL value of the data packet corresponding to the same IP address is smaller than a preset range, determining that the user corresponding to the same IP address is the user using the mobile phone hot spot.
13. The method of any one of claims 1-12, further comprising:
and limiting the internet surfing qualification or internet surfing performance of the user using the mobile phone hot spot.
14. An apparatus for identifying hotspots of a handset, comprising:
a memory; and
a processor coupled to the memory, the processor configured to perform the method of identifying a hotspot of a mobile phone of any of claims 1-13 based on instructions stored in the memory.
15. A non-transitory computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of identifying a hotspot of a mobile phone of any one of claims 1-13.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910922998.3A CN112583649B (en) | 2019-09-27 | 2019-09-27 | Method and device for identifying mobile phone hot spots |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910922998.3A CN112583649B (en) | 2019-09-27 | 2019-09-27 | Method and device for identifying mobile phone hot spots |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112583649A true CN112583649A (en) | 2021-03-30 |
CN112583649B CN112583649B (en) | 2022-05-10 |
Family
ID=75109679
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910922998.3A Active CN112583649B (en) | 2019-09-27 | 2019-09-27 | Method and device for identifying mobile phone hot spots |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112583649B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6681387B1 (en) * | 1999-12-01 | 2004-01-20 | Board Of Trustees Of The University Of Illinois | Method and apparatus for instruction execution hot spot detection and monitoring in a data processing unit |
CN103139015A (en) * | 2013-02-08 | 2013-06-05 | 华为技术有限公司 | Method, device and equipment of network sharing detection |
CN104243618A (en) * | 2014-07-02 | 2014-12-24 | 北京润通丰华科技有限公司 | Method and system based on client behaviour identification network sharing |
CN108235303A (en) * | 2017-12-29 | 2018-06-29 | 中国移动通信集团江苏有限公司 | Method, apparatus, equipment and the medium of the shared flow user of identification |
CN108574607A (en) * | 2017-03-08 | 2018-09-25 | 中兴通讯股份有限公司 | Shared verification detection method and device based on Virtual Private Network |
-
2019
- 2019-09-27 CN CN201910922998.3A patent/CN112583649B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6681387B1 (en) * | 1999-12-01 | 2004-01-20 | Board Of Trustees Of The University Of Illinois | Method and apparatus for instruction execution hot spot detection and monitoring in a data processing unit |
CN103139015A (en) * | 2013-02-08 | 2013-06-05 | 华为技术有限公司 | Method, device and equipment of network sharing detection |
CN104243618A (en) * | 2014-07-02 | 2014-12-24 | 北京润通丰华科技有限公司 | Method and system based on client behaviour identification network sharing |
CN108574607A (en) * | 2017-03-08 | 2018-09-25 | 中兴通讯股份有限公司 | Shared verification detection method and device based on Virtual Private Network |
CN108235303A (en) * | 2017-12-29 | 2018-06-29 | 中国移动通信集团江苏有限公司 | Method, apparatus, equipment and the medium of the shared flow user of identification |
Also Published As
Publication number | Publication date |
---|---|
CN112583649B (en) | 2022-05-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3214861B1 (en) | Method, device and system for detecting fraudulent user | |
US9015808B1 (en) | Restricting mobile device services between an occurrence of an account change and acquisition of a security code | |
US9106603B2 (en) | Apparatus, method and computer-readable storage mediums for determining application protocol elements as different types of lawful interception content | |
US11770267B2 (en) | Systems and methods for selective provisioning of a charging function in a wireless network | |
CN109699026A (en) | A kind of the communication management-control method and device of base station | |
CN104869554A (en) | System for realizing mobile communication through co-location of SIM card and corresponding method | |
TWI640214B (en) | Network access method, related equipment and system | |
WO2016123822A1 (en) | Data transmission method and device, and terminal | |
TWI751265B (en) | Access method and terminal | |
CN108235335B (en) | Method and device for determining weak coverage area of indoor network | |
CN103999438B (en) | It is subscribe to callback more | |
CN113543216B (en) | Method, device and system for transmitting media message | |
CN108243631B (en) | Network access method and equipment | |
CN112583649B (en) | Method and device for identifying mobile phone hot spots | |
CN108738023A (en) | Prevent method, Internet of Things server and the system of internet-of-things terminal access pseudo-base station | |
KR102353814B1 (en) | Method and appratus for providing roaming services | |
CN105574453A (en) | Two-dimensional code processing method and mobile terminal | |
CN112004228B (en) | Real person authentication method and system | |
CN106793119A (en) | Channel method to set up and device | |
CN105682082A (en) | Terminal identification method and device | |
US20140323145A1 (en) | Base station paging based on traffic content type | |
CN114557045A (en) | Communication method and related device | |
KR100954831B1 (en) | Apparatus and method for providing advertisement service target | |
US11956322B1 (en) | Systems and methods for determining locations of emergency callers in standalone non-public networks | |
CN110944365B (en) | Multi-reference-point association method and system based on 5G core network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |