Decentralized automatic phone fraud risk management

a fraud risk management and decentralized technology, applied in the field of decentralized automatic phone fraud risk management, can solve the problems of fraudulent entities that also try to harm the system, fraudulent entities may make fake reports, and the inability to insert fake transactions into the blockchain, so as to improve the robustness of the system and increase the false positive detection

Active Publication Date: 2021-04-15
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0005]A clear advantage of using a decentralized database of blockchain to store the list of fraud identifiers is fraud prevention. A blockchain prevents people from making fraudulent transactions that would seriously harm the system. With so many computing nodes maintaining their own copies of the ledger, inserting a fake transaction into the blockchain is almost impossible. In phone frauds, fraudulent entities also try to harm the system. For example, fraudulent entities may make fake reports of “fraud identifier” to a system to disturb the operation of the system. If a system contains too many “fraud identifiers” that are actually not fraudulent, the increased false positive detection of phone frauds will become unacceptable. In a blockchain network, with many computing nodes conducting the verification and validation in hashing a data entry, the chance of faked “fraud identifier” being hashed into the blockchain effectively shrinks to zero. Moreover, fraud identifiers stored in a blockchain cannot be modified at copy of ledger without being detected by other copies of ledgers. Further, because a blockchain keeps track of every hashed transaction as chained “blocks”, the full processing history of a fraud identifier is available. For example, the full records of a fraud identifier being classified to a black list, a grey list or a white list or being removed from a black list, a grey list or a white list are all available to be viewed or audited through a blockchain. Also, the fraud identifiers are stored in copies of ledger across many computing nodes, which greatly improve the robustness of the system. Practically, the system will not fail in operation because those computing nodes do not all go down.

Problems solved by technology

With so many computing nodes maintaining their own copies of the ledger, inserting a fake transaction into the blockchain is almost impossible.
In phone frauds, fraudulent entities also try to harm the system.
For example, fraudulent entities may make fake reports of “fraud identifier” to a system to disturb the operation of the system.
If a system contains too many “fraud identifiers” that are actually not fraudulent, the increased false positive detection of phone frauds will become unacceptable.
Moreover, fraud identifiers stored in a blockchain cannot be modified at copy of ledger without being detected by other copies of ledgers.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Decentralized automatic phone fraud risk management
  • Decentralized automatic phone fraud risk management
  • Decentralized automatic phone fraud risk management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017]This specification describes technologies for managing phone fraud risk through a blockchain platform. These technologies generally involve user terminal devices providing information about one or more instances of phone fraud to a blockchain network. For example, the information includes a caller identification (“caller ID”) or a characteristic of a phone fraud event (“fraud fingerprints”), collectively referred to as “phone fraud identifiers.” The phone fraud identifiers are each stored in the blockchain database as a block or a chain of blocks. The stored phone fraud identifiers are further classified into categories or lists of phone fraud identifiers. When a user device detects a caller ID or a fingerprint of an incoming phone event, the detected caller ID or fingerprint is compared with lists of fraud identifiers to assess whether the incoming phone event involves a phone fraud risk.

[0018]To provide further context for embodiments of this specification, and as introduced...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed herein are methods, systems, and apparatus, including computer programs encoded on computer storage media, for phone fraud prevention. One of the methods includes adding a first identifier of a first phone event of a first user into a blockchain managed by one or more devices on a decentralized network. The first identifier of the first phone event is classified into a list of phone fraud identifiers. A second identifier of a second phone event involving a second user is received. The second identifier is compared with the list of phone fraud identifiers that includes the first identifier. In a case where the second identifier matches a phone fraud identifier in the list of phone fraud identifiers, the first user is notified that the second phone event involves a risk of phone fraud.

Description

BACKGROUND[0001]Distributed ledger systems (DLSs), also referred to as consensus networks and / or blockchain networks, enable participating entities to store data securely and immutably. Examples of types of blockchain networks can include public blockchain networks, private blockchain networks, and consortium blockchain networks. A consortium blockchain network is provided for a selected group of entities that control the consensus process, and includes an access control layer.[0002]Phone fraud, or more generally communications fraud, uses telecommunication devices or services for illegal purposes or in illegal manners. Types of phone frauds include autodialers, telemarketing fraud, caller ID spoofing, telephone scams, mobile phone spam, and other types of frauds against a customer, a telecommunication company or a third party. Phone fraud is conducted as scammers, pranksters, or even harassers. The recipients of such phone fraud may be selected based on their perceived vulnerabilit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04M3/42H04L9/06H04M3/22
CPCH04M3/42042H04M3/2281H04M3/42068H04L9/0637H04L63/1466H04L63/101H04L9/3239H04M15/47H04M15/00H04W4/24H04L12/14H04L9/50
Inventor ZHAO, WENQIANGLI, YANPENGJIA, BOYAN
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products