A fraud phone identification method and system

A technology of fraudulent calls and identification methods, which is applied in the field of information security, can solve the problems of user information leakage, slow detection speed, and low accuracy rate, and achieve the effects of strong practicability, improved detection efficiency, and improved identification accuracy

Active Publication Date: 2019-04-30
CHINA TELECOM CORP LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the large amount of data in the operator's local bill, the current technology processes the entire bill, with slow detection speed and relatively low performance.
Moreover, using a single-level behavior matching model, the accuracy rate is relatively low
In addition, this technology also has the risk of user information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A fraud phone identification method and system
  • A fraud phone identification method and system
  • A fraud phone identification method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present disclosure unless specifically stated otherwise.

[0026] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0027] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way intended as any limitation of the disclosure, its application or uses.

[0028] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a fraud phone identification method and system. The method comprises the following steps: obtaining a local real-time call ticket of an operator, encrypting a telephone number in the local real-time call ticket, and obtaining a corresponding desensitization call ticket; Extracting a calling number, a called number, call duration and call starting time in the desensitizationcall ticket; Analyzing the calling number, and screening out an abnormal number; Analyzing the called number corresponding to the abnormal number, and judging whether the user of the called number isa suspected victim user or not; Analyzing the specific conversation process of the abnormal number and the called number corresponding to the abnormal number, judging whether the abnormal number meetsthe fraud conformity or not, if yes, decrypting the abnormal number and the called number, and determining that the decrypted abnormal number and called number are the fraud number and the number ofthe victim user respectively; And outputting the fraud number and the victim user number. According to the invention, the identification of the fraud phone is realized.

Description

technical field [0001] The present disclosure relates to the field of information security, in particular to a method and system for identifying fraudulent calls. Background technique [0002] Traditional fraud detection methods are generally implemented based on blacklist comparison. However, due to the rapid change of fraudulent numbers, the real-time update of the blacklist cannot keep up, and the fraudulent numbers processed by the number changing software cannot be identified, so the detection effect of this blacklist comparison detection method is limited. [0003] Aiming at the above-mentioned limitations, a fraudulent call detection method based on call behavior has emerged. However, due to the large amount of data in the operator's local bill, the current technology processes the entire bill, with slow detection speed and relatively low performance. Moreover, using a single-stage behavior matching model, the accuracy rate is relatively low. In addition, this tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M3/22H04M3/436
CPCH04M3/2281H04M3/436H04M2203/6027
Inventor 薄明霞唐洪玉唐维张静
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products