Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User fraud suspiciousness degree calculation method and suspiciousness degree calculation system

A calculation method and technology of a calculation system, applied in the field of communication, can solve problems such as loss of income, potential information security risks, and fraudulent users, and achieve the effects of increasing call charges, improving network information security, and increasing operating income

Active Publication Date: 2016-05-25
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF4 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the above problems, the present invention provides a suspicious degree calculation method and a suspicious degree calculation system for fraudulent users, which are used to solve the problem of information security while the international interconnection bypass fraud brings revenue losses to operators in the prior art. Hidden problems

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User fraud suspiciousness degree calculation method and suspiciousness degree calculation system
  • User fraud suspiciousness degree calculation method and suspiciousness degree calculation system
  • User fraud suspiciousness degree calculation method and suspiciousness degree calculation system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] figure 1 It is a flow chart of a method for calculating the suspiciousness of fraudulent users provided by Embodiment 1 of the present invention. Such as figure 1 As shown, the method for calculating the suspicious degree of the fraudulent user includes:

[0053] Step 1001. Obtain communication behavior data of a user, the communication behavior data including voice bills and short message bills.

[0054] Step 1002: Obtain the characteristic value of the user's communication behavior according to the communication behavior data, and the characteristic value of the communication behavior includes the proportion of callers, the non-repetition rate of called numbers, and the average call duration.

[0055]In this embodiment, the characteristic value of communication behavior may also include effective call duration, LAC / Cellid change frequency, and number of short messages sent. Specifically, the proportion of calling calls is defined as: within a unit time, the ratio o...

Embodiment 2

[0069] figure 2 It is a schematic structural diagram of a system for calculating the suspiciousness of fraudulent users provided by Embodiment 2 of the present invention. Such as figure 2 As shown, the system for calculating the suspiciousness of fraudulent users includes a first acquisition unit 101 , a second acquisition unit 102 and a first calculation unit 103 . The first acquiring unit 101 is configured to acquire communication behavior data of a user, and the communication behavior data includes voice bills and short message bills. The second acquiring unit 102 is configured to acquire the characteristic value of the user's communication behavior according to the communication behavior data, and the characteristic value of the communication behavior includes the percentage of calling, the non-repetition rate of the called number and the average call duration. The first calculation unit 103 is configured to calculate the suspiciousness through a preset weighting algor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a suspiciousness degree calculation method and a suspiciousness degree calculation system. The suspiciousness degree calculation method comprises the steps of acquiring communication behavior data of a user, wherein the communication behavior data includes a voice call list and a short message service list; acquiring a communication behavior characteristic value of the user according to the communication behavior data, wherein the communication behavior characteristic value includes a calling ratio, a called number non-repetition rate and an average call time period; and calculating the suspiciousness degree by using a preset weighing algorithm according to the communication behavior characteristic value. According to the method, international interconnect bypass fraud calls can be effectively identified, and other call fees, besides local call fee, also can be charged in the international call service, so that the call fee of the international call service is increased, loss of call fees of telecommunication operators is reduced, and the operating income of the telecommunication operators is increased. The network resources of a region in which an SIMBox apparatus is not occupied for long, so that the network service quality is improved, user complaint rate is lowered, and the network information security is improved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and system for calculating the degree of suspicion of fraudulent users. Background technique [0002] International bypass fraud refers to the use of IP networks and SIMBox devices to convert international calls into local calls. A SIMBox device is a hardware device that can insert a large number of SIM cards. The SIMBox device is shaped like a router and usually has 8-64 SIM card slots. Under the control of computer software, the SIM card of the SIMBox device can make phone calls and send text messages. SIMBox devices are generally deployed in the landing network, using the SIM card of the landing operator. For the operators, the above-mentioned fraudulent methods transform the international settlement fees into domestic inter-network settlement fees or extremely low-priced local call fees, resulting in a significant reduction in the revenue of telecom operator...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M3/22H04W12/12
CPCH04M3/22H04M3/2281H04W12/12
Inventor 宫雪王志军张尼李正陶冶
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products