Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for real-time detection of communication fraud base on suspicious behavior recognition

A real-time detection and communication technology, applied in speech recognition, wireless communication, telephone communication, etc., can solve the problems of lack of anti-communication fraud, uneven level of cultural accomplishment, and affecting the normal development of the telecommunications industry

Active Publication Date: 2017-09-29
PEKING UNIV
View PDF5 Cites 48 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, the level of cultural accomplishment of the people themselves is uneven, and it is difficult to ensure that everyone can have a high level of vigilance.
In terms of increasing the combat intensity, the existing method relies on the cooperation of government agencies and commercial companies, and requires a lot of manpower and material resources. If this method is to be used to quickly and effectively combat communication fraud, it will need to consume a lot of social resources. If too many resources are invested here, it will seriously affect the normal development of the entire telecommunications industry
Therefore, there is still a lack of technical solutions to prevent communication fraud, which can be fast and effective without consuming more social resources, and can effectively combat the increasingly rampant communication fraud

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for real-time detection of communication fraud base on suspicious behavior recognition
  • Method and system for real-time detection of communication fraud base on suspicious behavior recognition
  • Method and system for real-time detection of communication fraud base on suspicious behavior recognition

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Below in conjunction with accompanying drawing, further describe the present invention through embodiment, but do not limit the scope of the present invention in any way.

[0045] The present invention provides a method for preventing communication fraud based on suspicious behavior recognition. By identifying call voice and short message content, and using natural language processing technology to extract the action behavior characteristics of the caller's voice, each behavior characteristic is represented by a triplet Formally expressed, all behavioral characteristics in the call will be identified for suspicious behaviors one by one and the corresponding risk prediction score will be calculated, and the detection and reminder of communication fraud will be realized through this score.

[0046] figure 1 It is a flow chart of a communication fraud prevention method based on suspicious behavior identification; figure 2 It is a structural block diagram of a communicati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for real-time detection of communication fraud base on suspicious behavior recognition. The method comprises an offline model training stage and a real-time fraud detection stage, wherein an action characteristic recognition model and an action characteristic risk prediction model are established, and a voice call and a content of a short message of a strange call are analyzed to detect abnormal and suspicious behaviors in order to carry out fraud prediction. Through a voice-to-text way, a call content of the voice call of a calling party is turned into text information, and the call content and the content of the short message synchronously utilize a natural language processing method to extract action behavior characteristics and judge whether the action behavior characteristics in dialogue include suspicious behaviors, such as privacy information inquiry and malicious commands. According to the technical scheme for the real-time detection of the communication fraud, the quick and accurate communication fraud prevention detection can be realized, and the possibility of fraud of a user is reduced.

Description

technical field [0001] The invention relates to the field of communication fraud detection, in particular to a method and system for real-time detection of communication fraud based on machine learning analysis of suspicious behavior for mobile phone terminals. Background technique [0002] In recent years, thanks to the rapid development of the telecommunications field, mobile communication has become an indispensable part of people's life and work. According to statistics from the Ministry of Industry and Information Technology, as of July 2016, the total number of mobile phone users in China reached 1.304 billion, including 646 million 4G users. However, not only convenience is brought along with mobile communication, but also many problems are also brought. [0003] While mobile communication technology brings convenience to our work and life, it also opens the door for criminals to cheat. Among them, communication fraud is the most common. Communication fraud refers t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/12H04M1/725G10L15/26G10L15/19G10L15/14G10L15/04G06F17/27G06F17/30
CPCG10L15/04G10L15/144G10L15/19G10L15/26G06F16/35G06F40/253G06F40/289H04W12/12H04M1/72433H04M1/72436
Inventor 李影巫思杏岳阳吴中海
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products