Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for screening, categorizing and intercepting fraud samples of suspicious numbers

A number and suspicious technology, applied in electrical components, automatic switching offices, telephone communications, etc., can solve problems such as hidden dangers of network security, difficult deployment, and call paralysis of the entire network, to avoid infringement, improve trust and perception, Avoid the effects of subjectivity and blindness

Active Publication Date: 2019-05-17
上海欣方智能系统有限公司 +1
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0014] The disadvantage of the above method is that, for technology 4, the need for physical serial access to the transmission optical path brings great hidden dangers to network security. Once a device failure occurs, it will face the risk of paralyzed calls on the entire network, and the actual deployment is very difficult.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for screening, categorizing and intercepting fraud samples of suspicious numbers
  • Method and system for screening, categorizing and intercepting fraud samples of suspicious numbers
  • Method and system for screening, categorizing and intercepting fraud samples of suspicious numbers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0035] Such as Figure 1-7 As shown, according to the embodiment of the present invention, a method for screening, categorizing and intercepting fraudulent samples of suspicious numbers includes: S1 accessing the core network, collecting call logs: connecting the anti-fraud interception platform to the core network, and the core The network redirects the call to the interception device, and the interception device generates a call log for all calls, and sends the call log to the gray list ana...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for screening, categorizing and intercepting fraudulent samples of suspicious numbers. The method includes 1) accessing the core network and collecting call logs; 2) mining and analyzing suspicious numbers; 3) obtaining fraudulent numbers; 4) hacking The list is manually reviewed, and fraudulent calls are intercepted in real time. The present invention adopts mature keyword voice recognition technology to identify whether the suspicious number recording sample contains a predefined combination of fraudulent keywords, realizes the function of intercepting and identifying fraudulent calls, and can accurately identify illegal calls including but not limited to fraudulent voices, Then, the anti-fraud interception platform connected to the core network is used to intercept fraudulent numbers. This system is applicable to various network standards, covering the fixed communication network and mobile communication network of China Telecom, China Mobile and China Unicom, and can identify and intercept overseas fraudulent calls and domestic fraudulent calls.

Description

technical field [0001] The invention relates to the technical field of telephone security, in particular to a method and system for screening, classifying and intercepting fraudulent samples of suspicious numbers. Background technique [0002] Since 2009, phone scams have intensified. Criminals fabricate false information over the phone, set up scams, implement remote and non-contact fraud on victims, and induce victims to transfer money to criminals to defraud them of money. Compared with other crimes, telephone fraud has the characteristics of high-tech crimes, difficulty in verification, recovery, arrest, and handling. After long-term practice, the current consensus is to link departments, coordinate management, combine prevention and control, and focus on prevention. Using technical means to intercept fraudulent calls, cutting off the incentives for crimes from the source and suppressing crimes has become an important means of prevention. [0003] After research, it i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04M3/436
CPCH04M3/436H04M2203/6027
Inventor 丁正王红熳顾晓东祝敬安贾岩峰杨鹏飞邢喜云
Owner 上海欣方智能系统有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products