Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fraud number identification method based on graph embedding

A recognition method and graph embedding technology, applied in the information field, can solve the problems of little effect, loss of fraudulent activities, inability to restore fraudulent patterns, etc., and achieve the effect of accurate recognition

Active Publication Date: 2019-08-27
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1
View PDF20 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

During this process, the typical "point-to-multipoint" contact map of fraudulent calls has been transformed into a "multipoint-to-point" communication relationship. Multi-point communication fraud is even carried out across borders, and the monitoring of a single international gateway cannot restore the change in fraud patterns. , such fraudulent activities usually cause heavy losses and are extremely harmful to society
[0003] In the face of such sparse and cross-border integration of telephone communication relationships, traditional template matching, signaling statistical analysis, and simple international gateway monitoring and other technical means for detecting single-point fraudulent call behaviors have little effect. Therefore, how to It has become a technical problem that technicians need to solve urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fraud number identification method based on graph embedding
  • Fraud number identification method based on graph embedding
  • Fraud number identification method based on graph embedding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0014] Such as figure 1 As shown, a kind of fraud number identification method based on graph embedding of the present invention comprises:

[0015] Step 1. Based on the user's call signaling within a period of time, calculate multiple call feature indicators for each user, and form a call feature index vector for each user from all call feature indicators of each user. At the same time, extract and user Contacts who have a call relationship within a period of time are regarded as the direct neighbors of the user, and all the direct neighbors of each user form the direct neighbor group of each user;

[0016] The call feature indicators in step 1 may include but not limited to: call frequency, number of called numbers, dispersion, busy hour rate, average call inte...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fraud number identification method based on graph embedding. The method comprises the following steps: calculating a call characteristic index of a user based on a call signaling of the user in a period of time, forming a call characteristic index vector of each user, and extracting a contact person having a call relationship with the user in a period of time as a directneighbor of the user to form a direct neighbor group of each user; constructing and training a graph for identifying the fraud number, embedding the graph into a neural network, inputting conversationcharacteristic index vectors of a target user and a plurality of associated users, and outputting label information for identifying whether the number of the target user is a suspected fraud number or not; and inputting the call characteristic index vectors of the target user to be identified and the plurality of associated users into the trained graph, embedding the graph into the neural network, and then judging whether the target user number to be identified is a suspected fraud number according to the output. The invention belongs to the technical field of information, and can realize accurate identification of a fraud number based on a multi-point-point communication relationship structure mode of a fraud phone.

Description

technical field [0001] The invention relates to a method for identifying fraudulent numbers based on graph embedding, which belongs to the field of information technology. Background technique [0002] With the deepening of the country's prevention work on communication and information fraud technology, traditional telephone fraud has been curbed to a certain extent, but criminal gangs are using complex and changeable methods to carry out new types of fraud. The new type of fraud is generally based on gang crimes, usually using number tampering, camouflage, etc., to carry out routine and scripted precise fraud activities against specific individuals. During this process, the typical "point-to-multipoint" contact map of fraudulent calls has been transformed into a "multipoint-to-point" communication relationship. Multi-point communication fraud is even carried out across borders, and the monitoring of a single international gateway cannot restore the change in fraud patterns....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M3/22H04W12/12G06N3/04G06N3/08H04W12/128
CPCH04M3/2281H04W12/12G06N3/08H04M2203/6027G06N3/045
Inventor 万辛李鹏安茂波林格平刘发强孙旭东刘铭李正正
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products