Telecommunication network fraud identification method and device, equipment and storage medium

A telecommunication network and identification model technology, applied in the field of network communication, can solve problems affecting work and life, economic loss of users, troubles in normal life, etc., and achieve the effect of avoiding losses and solving identification problems

Pending Publication Date: 2022-03-11
EVERSEC BEIJING TECH
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Harassing calls often cause great trouble to people's normal life, affect work and life, bring additional mental pressure to users, and even lure users to consume or participate in illegal activities in disguise, resulting in economic losses for users
[0003] The governance of traditional telecommunications network fraud often uses various reporting data to deal with fraud cases after the fact. In this way, several or dozens of fraudulent calls have been implemented, and the user's property has been violated.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Telecommunication network fraud identification method and device, equipment and storage medium
  • Telecommunication network fraud identification method and device, equipment and storage medium
  • Telecommunication network fraud identification method and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] Figure 1a It is a flow chart of a telecommunications network fraud identification method provided by Embodiment 1 of the present invention. This embodiment is applicable to the situation of identifying fraudulent mobile phone numbers in a telecommunications network for fraud early warning, especially applicable to fraudulent mobile phone numbers for online shopping identification, the method can be performed by a telecommunications network fraud identification device, the device can be implemented by software and / or hardware, and the device can be integrated in electronic equipment such as mobile phones, servers or computers, such as Figure 1a As shown, the method specifically includes:

[0028] Step 110, acquiring historical billing data of fraudulent numbers in historical telecommunication network fraud events.

[0029] Wherein, the historical telecommunication network fraud event may be an event composed of recorded historical fraud information reported by the defra...

Embodiment 2

[0071] figure 2 It is a schematic structural diagram of a telecommunications network fraud identification device provided in Embodiment 2 of the present invention. to combine figure 2 , the device includes: historical billing bill data acquisition module 210, target historical billing bill data determination module 220, telecommunications network fraud identification model forming module 230 and telecommunications network fraud identification result determination module 240. in:

[0072] The historical billing bill data acquisition module 210 is used to obtain the historical billing bill data of the fraudulent number in the historical telecom network fraud event;

[0073] The target historical billing bill data determination module 220 is used to perform feature extraction for the historical billing bill data, and determine the target historical billing bill data that meets the preset telecommunications network fraud type;

[0074] A telecommunications network fraud ident...

Embodiment 3

[0096] image 3 It is a schematic structural diagram of an electronic device provided in Embodiment 3 of the present invention, such as image 3 As shown, the equipment includes:

[0097] one or more processors 310, image 3 Take a processor 310 as an example;

[0098] memory 320;

[0099] The device may also include: an input device 330 and an output device 340 .

[0100] The processor 310, the memory 320, the input device 330 and the output device 340 in the device can be connected by a bus or in other ways, image 3 Take connection via bus as an example.

[0101] The memory 320, as a non-transitory computer-readable storage medium, can be used to store software programs, computer-executable programs and modules, such as program instructions / modules corresponding to a telecommunications network fraud identification method in an embodiment of the present invention (for example, attached figure 2 The historical charging bill data acquisition module 210 shown, the targe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The technical scheme of the embodiment of the invention discloses a telecommunication network fraud identification method and device, equipment and a storage medium. The method comprises the following steps: acquiring historical charging ticket data of a fraud number in a historical telecommunication network fraud event; performing feature extraction on the historical charging ticket data, and determining target historical charging ticket data meeting a preset telecommunication network fraud type; forming a telecommunication network fraud identification model according to feature data matched with a preset telecommunication network fraud type in the target historical charging ticket data; and obtaining target charging ticket data of the target number in real time, and inputting the target charging ticket data into the telecommunication network fraud recognition model to obtain a telecommunication network fraud recognition result of the target number. According to the method, the telecommunication network fraud can be detected in advance, so that the loss caused by the telecommunication network fraud is avoided.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of network communication, and in particular, to a method, device, equipment and storage medium for identifying telecommunications network fraud. Background technique [0002] Harassing calls often cause great trouble to people's normal life, affect work and life, bring additional mental pressure to users, and even lure users to consume or participate in illegal activities in disguise, resulting in economic losses for users. [0003] The governance of traditional telecommunications network fraud often uses various reporting data to deal with fraud cases after the event. Under this method of disposal, usually several or dozens of fraudulent calls have been carried out, and the user's property has been infringed. Contents of the invention [0004] Embodiments of the present invention provide a method, device, device and storage medium for identifying telecommunication network fraud, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62G06F16/2458G06F16/2457G06N20/00
CPCG06F16/2462G06F16/2457G06N20/00G06F18/24323
Inventor 张宁王方圆尚程傅强梁彧蔡琳田野王杰杨满智金红陈晓光
Owner EVERSEC BEIJING TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products