Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method, device and system for processing built-in behavior of illegal terminals

A behavioral and terminal technology, applied in the field of communication, can solve problems such as difficulty in obtaining evidence, insufficient basis for business violations, inaccurate dialing test results, etc., to achieve the effect of protecting interests, reducing the number of complaints, and reducing illegal charges

Active Publication Date: 2017-11-03
卓望数码技术(深圳)有限公司 +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Its disadvantages are: the coverage of models is limited, and only some counterfeit machine violations can be found; counterfeit machine manufacturers have implemented selective built-in by batch, so the dial test results are inaccurate
Its disadvantages are: it is a passive process, which cannot effectively reduce the user complaint rate; at the same time, there is insufficient evidence as a business violation, and it is difficult to obtain evidence

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, device and system for processing built-in behavior of illegal terminals
  • A method, device and system for processing built-in behavior of illegal terminals
  • A method, device and system for processing built-in behavior of illegal terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0055] See figure 1 , is a flow chart of the first embodiment of the method for processing the built-in behavior of the violating terminal according to the present invention; the method includes:

[0056] Step S101, collecting behavior log data of all users of the service management platform.

[0057] In specific implementation, collecting behavior log data of users of the service management platform is an existing technology, and will not be repeated here.

[00...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a method, device and system for processing built-in behaviors of illegal terminals. The method includes: collecting behavior log data of all users on the service management platform; extracting log data of the users' uplink services; There are 182 wrong uplink numbers in the log data of the user terminal number, and an abnormal user is checked; according to the SP business, there are 182 wrong uplink numbers in the log data of the abnormal user's uplink usage business, and the abnormal SP business is checked out; The user orders the operation of the abnormal SP service to perform service authentication control. The devices and systems of the present invention can be used to implement the methods. By adopting the present invention, the built-in behavior of the illegal terminal can be accurately discovered and effectively curbed, thereby reducing the situation of terminal illegal charging and protecting the interests of users from being infringed.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a method, device and system for processing built-in behaviors of illegal terminals. Background technique [0002] With the increasing number of users using counterfeit mobile phones, some service providers, together with solution providers and mobile phone manufacturers, illegally built SP (Service Provider, Service Provider) services in counterfeit mobile phones, triggering Internal illegal built-in SP business deduction, this is the so-called "fake phone trap". The illegal built-in behavior of such terminals (cottage phones) has caused a large number of complaints from users. Some users even asked to turn off the mobile information service switch in order to avoid being charged, which seriously affected the promotion of normal business. At present, there are many illegal built-in behaviors of terminals (counterfeit phones). The common illegal built-in methods in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/12H04W12/122
Inventor 胡铁胡云杨刚张磊水波王珂
Owner 卓望数码技术(深圳)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products