Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Social worker robot simulation method for loan investment network fraud

A simulation method and robot technology, applied in the field of artificial intelligence/social engineering, can solve problems such as inability to effectively save and collect deceived evidence, inability to defraud personnel to track and trace the source, etc., to improve the collection efficiency of attack behavior, save police force, improve effect of possibility

Pending Publication Date: 2022-05-31
BEIJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] Aiming at the problems in the prior art that it is impossible to effectively preserve and collect complete evidence of being cheated, and to effectively track and trace fraudsters, the present invention proposes a social worker robot simulation method for loan investment network fraud, which realizes efficient The effect of collecting the attack behavior of criminals accurately and preserving the evidence of being cheated completely, and a practical and effective method for tracking and tracing fraudsters is given.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Social worker robot simulation method for loan investment network fraud
  • Social worker robot simulation method for loan investment network fraud
  • Social worker robot simulation method for loan investment network fraud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0110] Module 1: Property Setting Module

[0111] Basic attributes: A fourth-year student in an ordinary undergraduate college, female, 22 years old, with an estimated loan amount of 20,000 yuan for consumption. The detailed attributes should be consistent with the basic attributes, especially whether there are houses, cars, provident funds, social security, check-in wages, insurance policies, business licenses and other attributes in the "asset information section". The attribute values ​​​​are all "none".

[0112] Module 2: Personal Information Leakage Module

[0113] As mentioned above, I applied for small loans on various loan platforms, used search engines to find online loan channels, clicked on loan pop-up advertisements on websites, etc., and left my mobile phone number and other personal information when filling out the report.

[0114] Module 3: Interaction with Offenders Module

[0115] According to the behavior of the real deceived person in the process of real c...

Embodiment 2

[0121] Module 1: Property Setting Module

[0122] Basic attributes: individual industrial and commercial household (entrepreneur), male, 35 years old, college degree, estimated loan amount of 300,000 yuan, used for capital turnover and investment in new projects. The detailed attributes should be consistent with the basic attributes, especially in the "asset information part", the attribute values ​​of whether there are properties such as housing, provident fund, social security, punch card wages, and insurance policies are "none"; whether there are attributes such as cars and business licenses The value is "Yes".

[0123] Module 2: Personal Information Leakage Module

[0124] As mentioned above, I applied for small loans on various loan platforms, used search engines to find online loan channels, clicked on loan pop-up advertisements on websites, etc., and left my mobile phone number and other personal information when filling out the report.

[0125] Module 3: Interaction ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a social worker robot simulation method for loan investment network fraud, and belongs to the field of artificial intelligence / social engineering. The method specifically comprises the steps that firstly, a plurality of social work robots with different attributes are set according to actual requirements, and user attributes are configured for all the social work robots; filling a small loan application form in each loan platform according to the attribute value, and leaving personal information of the social robot to be leaked to the fraud; then, a behavior, language and voice database conforming to basic human settings of the social worker robot and a fraud process archive library are constructed; then, the social worker robot interacts with the fraud person, and all information is reserved and stored in a database; and when the fraud person induces the social worker robot to transfer accounts, the social worker robot sends an account transfer failure picture with the embedded Trojan horse program, traces the fraud person and feeds back the traced fraud person to the public security department. The method is easy to operate and high in practicability, and the implementation efficiency is greatly improved.

Description

technical field [0001] The invention relates to a social worker robot simulation method for loan investment network fraud, and belongs to the technical field of artificial intelligence / social engineering. Background technique [0002] At present, telecom network fraud has increasingly become one of the social "diseases" in various countries. The target of fraud has also gradually changed from casting a wide net to precise fraud. Different from wide-spread and random fraud methods, precise fraud is more targeted and directional, so its deception and confusion are further enhanced, and the success rate is also higher. The leakage of personal information has become a key factor and an important driving force for the implementation of precise fraud. In addition, fraud crimes usually present the characteristics of a mixed mode of multiple criminal methods and a long time span. [0003] Social Engineering (Social Engineering, also translated as: Social Engineering) appeared a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F30/20G06Q40/02G06Q50/26
CPCG06F30/20G06Q50/265G06Q40/03
Inventor 黄煜可郑康锋杨润东王清
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products