Traffic stealing account identification method and device

An identification method and account technology, applied in the field of communication, can solve problems such as low processing efficiency, inability to detect in advance, lack of classification and judgment rules, etc., to achieve the effect of narrowing the scope of analysis, reducing the possibility, and high processing efficiency

Active Publication Date: 2018-07-24
XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Due to the fact that the existing method handles the whole process manually, it cannot be discovered in advance, and it can only confirm the events that have occurred, lack of clear classific...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic stealing account identification method and device
  • Traffic stealing account identification method and device
  • Traffic stealing account identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The specific embodiments of the present invention will be further described below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, but not to limit the protection scope of the present invention.

[0044] figure 1 It shows a schematic flowchart of a method for identifying stolen traffic accounts provided by this embodiment, including:

[0045] S101. Divide the sneaking traffic phenomenon into several scenarios according to traffic characteristics of the sneaking traffic phenomenon.

[0046] Wherein, the traffic characteristics include short-term bandwidth, data volume, traffic duration, traffic type, and different distributions of uplink and downlink traffic.

[0047] The scenario is a classification of sneak traffic phenomena according to different traffic characteristics, for example: sneak traffic phenomena caused by terminal function failures.

[0048] S1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a traffic stealing account identification method and device. The method comprises the steps that the traffic stealing phenomenon is partitioned into a plurality of scenes according to the traffic characteristics of the traffic stealing phenomenon; traffic data of each scene is subjected to corresponding analysis, and suspected accounts which have the traffic stealing phenomenon are identified; the traffic stealing possibilities of the various suspected accounts are calculated according to the traffic values, the bandwidth values, the counting times andthe traffic characteristics of the various suspected accounts; and the target account which has the traffic stealing phenomenon is screened out according to a possibility threshold and the traffic stealing possibilities of the various suspected accounts. According to the traffic stealing account identification method and device, scene partitioning is conducted by analyzing the traffic characteristics, the suspected accounts are identified according to the different scenes, the analysis range of traffic stealing data is narrowed, the target account stealing the traffic is quickly positioned and discovered by means of cooperation of an identification rule, the traffic stealing account is automatically identified in advance, the processing efficiency is high, and the user complaint possibility is decreased.

Description

technical field [0001] The embodiments of the present invention relate to the field of communication technologies, and in particular to a method and device for identifying stolen traffic accounts. Background technique [0002] The access rate of the mobile communication 4G network is improved, and the throughput performance is improved. When the user is using, some special circumstances may cause the user to generate a high amount of Internet traffic in a short period of time without the user's knowledge, causing the user to complain. [0003] In the prior art, passive analysis and active analysis are mainly used to deal with the analysis of sneak traffic phenomena. Passive analysis mainly analyzes user complaints, collects relevant user complaints through the customer service system, and analyzes the behavior of stealing traffic, specifically including: extracting similar user complaints from the customer service system; The occurrence of relevant traffic billing; submit ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/26H04L29/06H04W12/12H04W12/126
CPCH04L43/0876H04L63/1408H04W12/12
Inventor 张秀成
Owner XINYANG BRANCH HENAN CO LTD OF CHINA MOBILE COMM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products