Method, device and system for identifying mobile generators

A generator and technology to be identified, applied in the field of network security, can solve problems such as the inability to determine the vehicle information of a mobile generator

Active Publication Date: 2021-03-09
ZHEJIANG TMALL TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] Embodiments of the present invention provide a method, device and system for identifying mobile generators, to at least solve the technical problem that the existing methods for detecting mobile generators cannot determine the information of vehicles carrying mobile generators

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for identifying mobile generators
  • Method, device and system for identifying mobile generators
  • Method, device and system for identifying mobile generators

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] Before describing further details of the various embodiments of the present application, reference will be made to figure 1 to describe one suitable server that can be used to implement the principles of the present application.

[0049] The server provided by Embodiment 1 of the present application can be widely applied to network security. With the rapid development of modern science and technology, the Internet has been widely used in people's daily life, and people's life, work, and study are inseparable from the Internet. However, it is precisely because of the continuous popularization of Internet technology applications that criminals have begun to spread bad information to people or obtain people’s private information through network channels. After this link, criminals will obtain the user's information, such as the user's bank card password. In order to ensure the safety of people using the network and purify the network environment, it is necessary to funda...

Embodiment 2

[0074] According to an embodiment of the present invention, an embodiment of a method for identifying a mobile generator is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0075] The present application provides an embodiment of a method for identifying mobile generators, figure 2 is a flowchart of a method for identifying mobile generators according to Embodiment 2 of the present invention, such as figure 2 As shown, the method includes the following steps:

[0076] Step S202, receiving information to be identified reported by at least one information collection device, wherein the information to be identified includes: a plurality of location information, ...

Embodiment 3

[0132] According to an embodiment of the present invention, a device for identifying a mobile generator for implementing the above method for identifying a mobile generator is also provided, such as Figure 13 A structural schematic diagram of a device for identifying a mobile generator is shown, the device includes: a receiving module 1301 , a determining module 1303 and a matching module 1305 .

[0133] The receiving module 1301 is configured to receive information to be identified reported by at least one information collection device, wherein the information to be identified includes: a plurality of location information, wherein the location information is location information of the information collection device reporting the information to be identified.

[0134] In the above-mentioned receiving module 1301, the above-mentioned at least one information collection device may be, but not limited to, a terminal device or a mobile device that can receive information or signal...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, device and system for identifying a mobile generator. Wherein, the method includes: receiving information to be identified reported by at least one information collection device, wherein the information to be identified includes: a plurality of location information, wherein the location information is the positioning information of the information collection device reporting the information to be identified; The position information determines the moving track of the mobile generator; the moving track of the mobile generator is matched with at least one vehicle track, and at least one vehicle to be checked is determined. The invention solves the technical problem that the existing method for detecting the mobile generator cannot determine the information of the vehicle carrying the mobile generator.

Description

technical field [0001] The present invention relates to the field of network security, in particular to a method, device and system for identifying mobile generators. Background technique [0002] With the rapid development of Internet technology, the network has been widely used in people's life, work and study. However, because people rely too much on the Internet in their daily lives, it creates opportunities for criminals to conduct network fraud or illegal marketing. Among them, pseudo base stations are one of the main channels for criminals to conduct network fraud or illegal marketing. [0003] A fake base station can impersonate any number, such as that of a bank or mobile operator, and send fraudulent, promotional text messages, etc. to mobile phones within its control range. According to conservative estimates, the financial sector in China suffers annual losses of up to 10 billion yuan due to attacks by fake base stations. Therefore, fraud through fake base stati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/029H04W4/40H04W12/12H04W64/00H04W12/122
CPCH04W4/025H04W12/12H04W64/003H04W64/006
Inventor 李裕宏潘爱民
Owner ZHEJIANG TMALL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products