Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fraud number identification method based on space-time diagram

A spatio-temporal map, spatio-temporal technology, applied in the information field, can solve the problems of difficult to capture, concealed fraud patterns, and low recognition accuracy.

Active Publication Date: 2020-09-29
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1
View PDF4 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] 1) Based on the method of number marking, the disadvantages of this type of scheme are that there is hysteresis, inaccurate marking, and inability to deal with gang fraud;
[0004] 2) Methods based on speech and semantics, such as keyword matching. The problem with this type of scheme is that the detection process is complicated, and because fraudulent methods emerge in endlessly, fraudsters will change their words, resulting in low recognition accuracy;
[0005] 3) Based on the method of feature extraction, because fraudsters have anti-investigation awareness, they will pretend to be dialing normal numbers, make calls with normal frequency, or use the number changing platform to change numbers continuously, and the fraud mode is becoming more and more serious. Covert, so the recognition accuracy is also low
This technical solution is based on the "multi-point-point" communication relationship structure model of fraudulent calls, and will construct a static map according to the user's call signaling within a period of time, but for the periodic call pattern of number change fraud, that is Fraudsters will use multiple calling numbers to make fraudulent calls in sequence. Since the call frequency of each number is very low, it is difficult for this technical solution to dynamically capture the changes in the calling behavior of fraudulent numbers during this period.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fraud number identification method based on space-time diagram
  • Fraud number identification method based on space-time diagram
  • Fraud number identification method based on space-time diagram

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings.

[0019] Such as figure 1 As shown, a method for identifying fraudulent numbers based on time-space diagrams of the present invention includes:

[0020] Step 1. Generate a telecommunication network from the full call record: G={V, E, Y}, and construct a spatio-temporal map for identifying fraudulent numbers based on this. The constructed spatio-temporal map is a collection of consecutive spatiotemporal sub-graphs. Among them, V represents the node set of all communication users, v i ∈V, v i Represents the node of user i, E represents the set of call relations between all user nodes, e ijt =(v i , V j , T) ∈ E, e ijt Represents the call made by user i to user j at time t, Y represents the set of manually labeled user identities, y i ∈Y, y i It is the identity of the ar...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fraud number identification method based on a space-time diagram, and the method comprises the steps: generating a telecommunication network through a full call record, constructing the space-time diagram for identifying a fraud number, and continuously intercepting a plurality of time-space subgraphs from the diagram according to a time interval T through employing a Snapshot method; calculating a call feature index vector of each user in the time period corresponding to each time-space sub-graph based on the call record of the user in the time period corresponding to each time-space sub-graph, and extracting a neighbor user having the same called party as each user from the time-space sub-graph for each user; constructing and training a space-time diagram neuralnetwork for identifying fraud numbers; and inputting the call feature index vectors of the target user to be identified and all neighbor users thereof in all time-space sub-graphs into a space-time graph neural network, and judging whether the number of the target user to be identified is a suspected fraud number according to the output. The invention belongs to the technical field of information, and can dynamically capture the change of a number calling behavior so as to realize accurate identification of a fraud number.

Description

Technical field [0001] The invention relates to a method for identifying fraud numbers based on time-space diagrams, and belongs to the field of information technology. Background technique [0002] At present, the identification of fraudulent numbers mainly includes the following technical solutions: [0003] 1) Based on the number marking method, the defects of this type of scheme are lagging, inaccurate marking, and inability to deal with gang fraud; [0004] 2) Methods based on speech and semantics, such as keyword matching. The problem with this type of scheme is that the detection process is complex, and because fraud methods emerge in an endless stream, fraudsters will change their statements, resulting in low recognition accuracy; [0005] 3) Based on the feature extraction method, due to the anti-detection awareness of the fraudsters, they will pretend to be a normal number dialing behavior, dial the phone at a normal frequency, or use the number change platform to constantly...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04M3/22H04W12/12G06N3/04G06N3/08
CPCH04M3/2281H04W12/12G06N3/08H04M2203/6027G06N3/045
Inventor 李鹏孙旭东戚梦苑初国俊侯炜刘瑶计哲肖红宁珊张震
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products