Social network topology model and construction method, user confidence and intimacy calculation method and telecommunication fraud intelligent interception system

A topology model and social network technology, which is applied in the field of telecommunications fraud intelligent interception system and social network topology model, can solve the problems of poor practicality, inability to reasonably distinguish fraudulent users from harassing ordinary users, and inapplicability to deal with massive call data, etc.

Active Publication Date: 2020-11-10
上海阿尔卡特网络支援系统有限公司
View PDF18 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The advantage of this technology is that it can flexibly detect fraudulent users based on user behavior. The disadvantage is that it does not take into account the long-term social relationship between users and the trust degree of user historical behavior. When the number of ordinary users far exceeds that of fraudulent users, The performance of the model will be greatly limited
[0005] Chinese patent (CN201710721594.9) discloses a telecom fraud recognition and defense system based on deep learning. Its technical defect is that the existing telecom fraud recognition system uses speech recognition technology to detect abnormal information in the call content, which is This method requires the mobile phone to install the specified App, which will record all the call content of the user and convert it into text and upload it to the server
In terms of fraud identification technology, only the text content information in the current call is considered, and the historical behavior of the calling number, the intimacy relationship with the called number, etc. are not considered comprehensively, so it may cause misjudgment
[0006] Chinese patent (CN201910110374.1) discloses a communication fraud identification method and system, and its technical defects are: the existing fraudulent user identification technology is based on user call frequency, terminal location and whether the called party belongs to a group prone to fraud , to identify whether the calling party is communication fraud
This identification technology has relatively large limitations. In terms of judging the frequency of calls, it only uses a predetermined threshold for screening, and cannot reasonably distinguish fraudulent users, harassing users, and ordinary users with a large number of calls.
In terms of terminal location, it is susceptible to the influenc

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social network topology model and construction method, user confidence and intimacy calculation method and telecommunication fraud intelligent interception system
  • Social network topology model and construction method, user confidence and intimacy calculation method and telecommunication fraud intelligent interception system
  • Social network topology model and construction method, user confidence and intimacy calculation method and telecommunication fraud intelligent interception system

Examples

Experimental program
Comparison scheme
Effect test

no. 5 example

[0149] Optionally, to further improve the fifth embodiment above, the basic evaluation subsystem includes:

[0150] Abnormal data cleaning module, which is used to clean short numbers or numbers whose number of short-term calls is greater than the third threshold

[0151] A user inherent attribute extraction module, which is used for statistics of user inherent attributes;

[0152] User call relationship extraction module, which is used to count the call relationship between users. The user call relationship is the data extracted according to the user's long-term call behavior, including: number of calls and call duration;

[0153] The intimacy calculation module between users is used to calculate the intimacy between users according to the user call relationship;

[0154] A user confidence degree calculation module, which is used to calculate the target user confidence degree according to the target user's inherent attributes and the target user's two-way intimacy;

[0155]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a social network topology model, and the model is a three-layer two-order star-shaped structure constructed by taking each target user as a center and comprises a first-layer node, second-layer nodes and third-layer nodes; the first-layer node is a target user, the second-layer nodes are a direct called user, and the third-layer node is obtained by modularization of neighbor nodes generated by each second-layer node; the node value of the social network topology model is the user confidence, and the edge weight of the social network topology model is the intimacy between users. The invention further discloses a construction method of the social network topology model, a user confidence coefficient and intimacy calculation method and a telecommunication fraud intelligent interception system. The social network topology model does not infinitely increase the data volume over time. According to the telecommunication fraud intelligent interception system, based on user historical data, the infinite increase of the system data size along with time can be avoided, and original and newly-added fraud users can be accurately identified.

Description

technical field [0001] The invention relates to the field of telecommunications, in particular to a social network topology model based on telecommunications call records. The present invention also relates to a construction method of the social network topology model, a user confidence iterative update subsystem utilizing the social network topology model, and a telecommunications fraud system with the user confidence iterative update subsystem Intelligent interception system. Background technique [0002] With the continuous development of society, the updating of science and technology and the wide application of Internet technology, telecommunications fraud has become one of the most common means of fraud, which has attracted widespread attention from all sectors of society. At present, various operators are actively studying various methods to deal with the problem of telecom fraud, so as to reduce economic losses. At present, a telecommunications fraud identification...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06H04W12/00H04W12/12
CPCH04L41/145H04L41/12H04L63/306H04W12/12Y02D30/70
Inventor 陆炜魏玮瞿亚蝶杨浩波戴浩
Owner 上海阿尔卡特网络支援系统有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products