Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

System, device and method for treatment of violation terminal built-in behaviors

A behavioral and terminal technology, applied in the field of communication, can solve problems such as difficulties in obtaining evidence, inaccurate dial test results, and limited coverage of models

Active Publication Date: 2013-02-06
卓望数码技术(深圳)有限公司 +1
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its disadvantages are: the coverage of models is limited, and only some counterfeit machine violations can be found; counterfeit machine manufacturers have implemented selective built-in by batch, so the dial test results are inaccurate
Its disadvantages are: it is a passive process, which cannot effectively reduce the user complaint rate; at the same time, there is insufficient evidence as a business violation, and it is difficult to obtain evidence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System, device and method for treatment of violation terminal built-in behaviors
  • System, device and method for treatment of violation terminal built-in behaviors
  • System, device and method for treatment of violation terminal built-in behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0092] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0093] See figure 1 , is a flow chart of the first embodiment of the method for processing the built-in behavior of the violating terminal according to the present invention; the method includes:

[0094] Step S101, collecting behavior log data of all users of the service management platform.

[0095] In a specific implementation, collecting the behavior log data of all users of the service management platform is an existing technology, and will not be repeate...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a system, a device and a method for treatment of violation terminal built-in behaviors. The method includes: acquiring behavior log data of all users of a service management platform; extracting log data of uplink use services of the users; calculating uplink frequency of a user terminal number each time and each day according to the user terminal number and judging whether the frequency is within a preset numerical value range or not, and if yes, recording one-time frequency abnormity; judging whether the frequency normality times of the user terminal number within a certain period exceeds a set number or not, and if yes, determining that the user terminal is an abnormal user; and subjecting requesting operations of the abnormal SP (service provider) services by the users to service authentication control. The device and the system can be used for implementation of the method for treatment of violation terminal built-in behaviors. Using the system, the device and the method can accurately find the violation terminal built-in behaviors to effectively restrain the behaviors, violation fee collection of the terminal is reduced, and benefits of users are guaranteed against infringement.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, device and system for processing built-in behaviors of illegal terminals. Background technique [0002] With the increasing number of users using counterfeit mobile phones, some service providers, together with solution providers and mobile phone manufacturers, illegally built SP (Service Provider, Service Provider) services in counterfeit mobile phones, triggering Internal illegal built-in SP business deduction, this is the so-called "fake phone trap". The illegal built-in behavior of such terminals (cottage phones) has caused a large number of complaints from users. Some users even asked to turn off the mobile information service switch in order to avoid being charged, which seriously affected the promotion of normal business. At present, there are many illegal built-in behaviors of terminals (counterfeit phones). The common illegal built-in methods in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/18H04W12/06
Inventor 胡铁胡云杨刚张磊水波王珂
Owner 卓望数码技术(深圳)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products