Fraud call detection method and device

A detection method and call list technology, which is applied to security devices, telephone communications, electrical components, etc., can solve problems such as poor operability, weak practicability of fraudulent calls, and inability to adapt to types and methods of fraud, and achieve operability strong effect

Active Publication Date: 2019-03-08
BEIJING UNIV OF POSTS & TELECOMM +1
View PDF7 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this patent is that it needs to collect sensitive information such as the address book, and it is mainly used in credit fraud, and its practicability for fraudulent calls is weak
[0012] It can be seen from the above that many of the existing methods for detecting fraudulent calls cannot adapt to various fraud types and means, and in the method of using complex networks to identify fraudulent calls, it is often necessary to obtain sensitive information of users, which can be Operability is not strong

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fraud call detection method and device
  • Fraud call detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical means and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings.

[0041] Nodes in complex networks identify individuals in the system, and edges identify relationships between individuals, such as social network, food chain, World Wide Web, urban transportation network, and power grid. Community structure is a common feature in complex networks. Communities reflect the local characteristics of individual behaviors in the network and their interrelationships. The entire complex network is composed of many communities. Community discovery is a complex and meaningful process that plays an important role in studying the properties of complex networks. In recent years, the discovery and analysis of community structures in complex networks has attracted the attention of many scholars, and many community discovery algorithms have als...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a fraud call detection method. The method comprises the following steps that all call voices are converted into texts, thereby forming a text set; each text in the text set isconverted into a key word weight vector; a plurality of clusters are formed by performing text clustering on all key word weight vectors, and whether each cluster is a fraud cluster or not is determined according to a fraud keyword set; calls corresponding to all the keyword weight vectors in the fraud clusters are determined as fraud calls; a text social network is constructed by utilizing all the calls and keywords, nodes corresponding to the fraud calls are marked as the fraud calls in the text social network, and other nodes marked as the fraud calls are determined through label propagation; and the calls corresponding to all the nodes marked as the fraud calls are determined as the fraud calls. The method can be applied to various fraud types, and meanwhile, user sensitive data does not need to be acquired, so that the operability is higher.

Description

technical field [0001] The present application relates to the technical fields of complex networks and mobile communications, and in particular to a method and device for detecting fraudulent calls. Background technique [0002] With the continuous development of the communication industry, while bringing more convenience, the rampant telecommunications and network fraud activities follow, and there are more and more means of telephone fraud, which makes people hard to guard against. [0003] Currently, fraudulent call detection methods mainly include call source detection, blacklist interception, etc., and these methods generally have the characteristics of poor real-time and poor flexibility. The update of fraudulent techniques and methods can easily lead to the failure of the original interception means. At present, the high incidence of fraudulent calls is mainly concentrated on mobile phone users. Most of the calling numbers are from overseas. Fraudsters use number cha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M3/22H04W12/12G10L15/26G06F16/332G06F16/35
CPCH04M3/2281H04W12/12H04M2203/6027G10L15/26
Inventor 林荣恒张震彭潞闵星吴步丹邹华
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products