Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and electronic device for identifying communication network fraud

A technology of electronic equipment and communication network, applied in the field of Internet, which can solve the problems of identification efficiency and limited coverage.

Active Publication Date: 2022-03-08
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Communication network fraud is a non-contact crime that induces others to voluntarily hand over their property. During the crime process, it does not rely on offline contact and the transfer of property is purely voluntary. In the existing related technologies, the risk control means of payment tools can only be based on The risk characteristics of the user's actual operation behavior are used to identify the relevant risks, and the identification efficiency and coverage are limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and electronic device for identifying communication network fraud
  • Method, device and electronic device for identifying communication network fraud
  • Method, device and electronic device for identifying communication network fraud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to better understand the technical solutions of this specification, the embodiments of this specification will be described in detail below in conjunction with the accompanying drawings.

[0070] It should be clear that the described embodiments are only some of the embodiments in this specification, not all of them. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this specification.

[0071] Terms used in the embodiments of the present specification are only for the purpose of describing specific embodiments, and are not intended to limit the present specification. As used in the embodiments of this specification and the appended claims, the singular forms "a", "said" and "the" are also intended to include the plural forms unless the context clearly dictates otherwise.

[0072] For communication network fraud, in the existing rel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of this specification proposes a communication network fraud identification method, device, and electronic device, wherein, in the above communication network fraud identification method, the electronic device establishes a communication connection with the communication peer after receiving a communication request from the communication peer, Then, the electronic device obtains the device information of the above-mentioned communication peer, and collects the data of the first user who uses the above-mentioned electronic device and the second user who uses the communication peer in this communication process, and performs risk analysis according to the device information of the above-mentioned communication peer, and perform text analysis, environmental analysis, and voiceprint recognition based on the collected data, and finally, output prompt information to the first user based on the results of the above risk analysis and / or according to the results of text analysis, environmental analysis, and voiceprint recognition, so that Realize that as soon as the communication parties start to communicate, they will start to identify the information output by the communication peer during the communication process, and give a reminder to realize accompanying risk management and control.

Description

【Technical field】 [0001] The embodiment of this specification relates to the field of Internet technologies, and in particular to a method, device and electronic equipment for identifying communication network fraud. 【Background technique】 [0002] Communication network fraud is a crime of fraud based on the Internet, which can be defined as the perpetrator using non-contact contact methods such as telecommunication networks for the purpose of illegally occupying the victim's property, using fraudulent techniques such as fabricating facts and / or concealing the truth, causing the victim to fall into Mistakes in order to dispose of assets in accordance with the will of the perpetrator. [0003] Communication network fraud is a non-contact crime that induces others to voluntarily hand over their property. During the crime process, it does not rely on offline contact and the transfer of property is purely voluntary. In the existing related technologies, the risk control means of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04M3/22
CPCH04M3/2281
Inventor 蒋志辰
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD