Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Fraud phone recognition method, system and equipment based on multi-source features

A technology of fraudulent calls and identification methods, applied in the information field, can solve problems such as no mention, inconvenience in daily life, and affecting user experience

Active Publication Date: 2021-05-28
XI AN JIAOTONG UNIV
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the continuous development of the communication industry, more and more users enjoy the convenience that communication brings to life, but at the same time, more and more fraudulent calls are emerging, and a large number of groups or individuals use Attacks and other methods harass the target group and defraud people of money. Similar scam calls emerge in endlessly in life, which seriously affects the user experience and brings great inconvenience to the daily life of users.
[0003] At present, methods for identifying fraudulent calls are based on some basic feature extraction using machine learning or deep learning methods for identification, such as: [A fraudulent application detection method based on deep learning], [An analysis of fraudulent calls based on multidimensional time series] Methods], [method and system for identifying fraudulent phone numbers], etc., there are also methods for identifying fraudulent patterns, such as: [a method for detecting fraudulent calls based on intent understanding technology], [a method for identifying fraudulent calls based on graph embedding] method], etc., but based on the above patents, we found some points that the existing patents did not pay attention to:
[0004] In real life, there are a variety of other numbers that are similar to fraudulent calls and have the characteristics of high frequency and high frequency, such as: sales calls, express delivery calls, taxi Didi calls, company calls, etc. Especially sales calls, which have a short life cycle and are difficult to identify in a timely and effective manner through the black and white lists, but the existing technology does not mention the various interference situations in this actual environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Fraud phone recognition method, system and equipment based on multi-source features

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The method for identifying fraudulent calls based on multi-source features provided by the present invention includes: the user selects a normal number, a promotional number and a fraudulent number, constructs a more practical user classification, and based on the second call of the selected user for a period of time Signaling, portrait data, location data, and Internet access data construct multi-source feature indicators, including basic features of user call data, user basic call features, portrait features, user location and Internet access features, and a graph network model based on similar graph structures ——Struct2Vec extracts the structural features of the user's second-degree network, identifies fraudulent pattern structures such as multi-point and one-line, and converts the user's second-degree call data into call time series data, extracts time-series-based feature combinations, and builds multi-source features. Use the improved smote oversampling method Bord...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a fraud phone recognition method, system and equipment based on multi-source characteristics, and the method comprises the steps: a user selects a normal number, a promotion number and a fraud number, constructs a user classification which is more practical, and based on the multi-source characteristic indexes of the selected user, the basic characteristics of user call data, and the basic call characteristics of the user, image characteristic, user position and Internet-surfing characteristic are included; structural features of a user two-degree network is extracted based on a Struct2Vec image network model with a similar image structure; multi-point and one-line fraud mode structures and the like are identified; based on the fact that user two-degree call data is converted into call time sequence data, a feature combination based on a time sequence is extracted, and on the basis of constructing the multi-source feature, a sample data set is balanced by using an oversampling method Borderline-SMOTE, a classification model for normal, fraud and promotion identification is finally constructed. The model carries out training prediction by using a plurality of different integrated learning combination modes, and accurate and effective identification of fraud calls is realized in combination with a black and white list filtering mechanism.

Description

technical field [0001] The invention belongs to the field of information technology, and in particular relates to a fraud phone identification method, system and equipment based on multi-source features. Background technique [0002] With the continuous development of the communication industry, more and more users enjoy the convenience that communication brings to life, but at the same time, more and more fraudulent calls are emerging, and a large number of groups or individuals use Attacks and other means harass the target group and defraud people of money. Similar scam calls emerge in endlessly in life, which seriously affects the user experience and brings great inconvenience to the daily life of users. [0003] At present, methods for identifying fraudulent calls are based on some basic feature extraction using machine learning or deep learning methods for identification, such as: [A fraudulent application detection method based on deep learning], [An analysis of fraudu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04M3/22G06K9/62G06N3/04G06N3/08
CPCH04M3/2281G06N3/049G06N3/08G06F18/285G06F18/251G06F18/214
Inventor 赵玺褚启伍任一民邹建华
Owner XI AN JIAOTONG UNIV
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More