Terminal fraud phone recognition method based on call text word vector

A technology of fraudulent phone calls and word vectors, applied in the information field, can solve the problems of inability to detect fraudulent phone calls in real time, victims being deceived, etc., so as to improve the accuracy and recall rate of recognition, solve semantic deviation, and ensure the effect of user privacy.

Active Publication Date: 2020-09-15
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1
View PDF8 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that it is impossible to detect fraudulen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Terminal fraud phone recognition method based on call text word vector
  • Terminal fraud phone recognition method based on call text word vector
  • Terminal fraud phone recognition method based on call text word vector

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0016] like figure 1 As shown in the present invention, a method for identifying fraudulent phone calls based on a call text word vector includes:

[0017] Step 1. The user marks the incoming calls in the mobile terminal App. For the incoming calls marked by the user as fraudulent, the call is extracted and converted into text after the user authorizes and agrees, and then the converted text is handed over to the user for viewing and desensitization, and finally After the user authorizes and agrees, upload the user-viewed and desensitized text to the server and save it as a text sample. Desensitization means removing sensitive information related to personal identity, such as ID number, name, mobile phone number, etc.;

[0018] Step 2. Perform word segmentation a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A terminal fraud phone recognition method based on a call text word vector comprises the steps: enabling a user to mark an incoming call in a terminal App; when the incoming call is marked as a fraudcategory, converting the incoming call into a text after user authorization agreement, and checking and desensitizing the text by the user and uploading the text to a server to be stored as a text sample after user authorization; performing word segmentation and part-of-speech tagging on the text sample to obtain syntactic dependency tags and word combination vectors of the segmented words, splicing the word combination vectors, the part-of-speech tagging and the syntactic dependency tags to form content vectors of the segmented words, and calculating scene element tags to which the segmentedwords belong to obtain semantic vectors of the text sample; constructing a fraud classification and recognition model, using a text sample in a server as a training sample, and pushing the trained model to the App from the server; and after the App receives the new to-be-identified call, obtaining a fraud-related category to which the new to-be-identified call belongs according to the model, and prompting a user. The invention belongs to the technical field of information, and can accurately identify fraudulent calls based on call texts.

Description

technical field [0001] The invention relates to a terminal fraudulent call identification method based on a call text word vector, which belongs to the field of information technology. Background technique [0002] At present, the number of telecommunications fraud cases initiated abroad is increasing day by day, and mobile phone users have higher and higher requirements for filtering fraudulent calls. However, more and more fraudsters’ call behavior tends to be concealed, and the characteristics related to call behavior are weakened. Only by analyzing and identifying call texts can it be possible to further improve the accuracy and recall rate of mobile phone systems for identifying bad calls. [0003] At present, the fraudulent call filtering method based on the mobile terminal system on the market is still relatively rudimentary. Mainstream manufacturers usually use the method of user marking, that is, relying on the user to actively mark the category of the phone and up...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/12G06F40/211G06F40/284G06F40/30G06N3/04
CPCH04W12/12G06F40/211G06F40/30G06F40/284G06N3/045Y02D30/70
Inventor 孙晓晨宁珊林格平张之含侯炜洪永婷倪善金周书敏万辛沈亮
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products