Fraud user detecting method, fraud user detecting device and fraud user detecting system

A detection device and detection method technology, applied in the field of communication, can solve problems such as switch failure, affecting system stability, and large traffic volume, and achieve the effect of reducing losses

Inactive Publication Date: 2016-06-01
ZTE CORP
View PDF2 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Fraudulent users have a negative impact on the operator's network security and business revenue. Fraudulent users occupy a large amount of wireless resources, resulting in a decrease in the connection rate of normal users, and when the traffic volume is large, it is easy to cause switch failures and affect system performance. stability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fraud user detecting method, fraud user detecting device and fraud user detecting system
  • Fraud user detecting method, fraud user detecting device and fraud user detecting system
  • Fraud user detecting method, fraud user detecting device and fraud user detecting system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] The embodiment of the present invention provides a method for detecting a fraudulent user. The method for detecting a fraudulent user is as follows: according to the set fraud identification rules, extract the information from the user's trial call bill or short message calling bill within the detection period. The data is analyzed to identify fraudulent users.

[0046] Wherein, the call trial record is generated when the ringing time of the call is less than a preset value and the call is not in a talking state.

[0047] The detailed implementation process is as image 3 shown, including:

[0048] Step S301, collecting the user's trial call bill or short message calling bill;

[0049] Step S302, extracting parameters in the bill to form detection data corresponding to the user in the bill;

[0050] Step S303, when the set detection period arrives, analyze the detection data of each user in this period according to the set fraud identification rules, so as to identif...

Embodiment 2

[0087] The invention provides a fraud detection device, which can be an independent third-party device or a module integrated in MSC Server. In consideration of not affecting the working efficiency of the MSC Server, the fraud detection device of the present invention is preferably an independent third-party device. When it belongs to an independent third-party device, add a communication interface on the fraud detection device and MSCServer, so that the fraud detection device can receive the trial call bill and SMS caller bill sent by MSCServer, as well as the detected fraudulent user The MSC Server is notified, so that the MSC Server restricts the call or short message service of the fraudulent user.

[0088] like Figure 7 As shown, the fraud detection device described in this embodiment includes:

[0089]The fraudulent user identification module 710 is configured to analyze the data extracted from the user's call attempt or SMS caller in the detection period according to...

Embodiment 3

[0102] An embodiment of the present invention provides a detection system for fraudulent users, including: MSCServer and the fraud detection device described in Embodiment 2;

[0103] MSCServer is used to generate call trial bills and short message calling bills for the user, and send the trial call bills and short message calling bills to the fraud detection device.

[0104] Further, the fraud detection device is further configured to send the number of the fraudulent user and the service restriction policy set for the fraudulent user to the MSCServer;

[0105] MSCServer adds the fraudulent user's number to the blacklist, and restricts the fraudulent user's service according to its corresponding service restriction policy.

[0106] To sum up, by adopting the system of the present invention, it is possible to timely discover and limit the use of mass message senders to send fraudulent short messages, or to use group calls to harass users in the entire number segment of the ope...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fraud user detecting method, a fraud user detecting device and a fraud user detecting system. The fraud user detecting method comprises analyzing data which are extracted from an attempt calling bill or short message calling bill of a user in a detecting period according to a preset fraud identification rule, thereby identifying the fraud user. The fraud user detecting method detects fraud behaviors based on the attempt calling bill or the short message calling bill and can detect the fraud user efficiently in time.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method, device and system for detecting fraudulent users. Background technique [0002] The third-generation mobile communication system described by 3GPP is usually composed of a user terminal (User Equipment, referred to as UE), a wireless access network (UMTSterrestrialRadioAccessNetwork, referred to as UTRAN), and a core network (CoreNetwork, referred to as CN), such as figure 1 As shown, UTRAN is divided into two parts, the base station (NodeB) and the radio network controller (Radio Network Controller, referred to as RNC), to realize wireless access and radio resource management. The core network is divided into circuit switched domain (Circuit Switched Domain, referred to as CS domain) and packet switched The domain (PacketSwitchedDomain, PS domain for short) is responsible for the connection with other external networks and the communication management of the UE....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/12H04W12/128
CPCH04M15/47H04W4/14H04W4/24H04W12/128
Inventor 谢连升
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products