Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

55 results about "Internet fraud" patented technology

Internet fraud is a type of fraud or deception which makes use of the Internet and could involve hiding of information or providing incorrect information for the purpose of tricking victims out of money, property, and inheritance. Internet fraud is not considered a single, distinctive crime but covers a range of illegal and illicit actions that are committed in cyberspace. It is, however, differentiated from theft since, in this case, the victim voluntarily and knowingly provides the information, money or property to the perpetrator. It is also distinguished by the way it involves temporally and spatially separated offenders.

Block chain technology-based network digital identity authentication method

InactiveCN107181765AShorten confirmation timeAvoid the possibility of trending towards exclusive verificationUser identity/authority verificationDigital data protectionDigital identityInternet fraud
The present invention provides a block chain technology-based network digital identity authentication method. The method comprises the steps of 1) user registration: conducting the identity authentication service based on the vLink protocol, uploading a block chain if the identity of a user is legal, broadcasting the information of the user to the whole network by the block chain, and adding the information of the user into a corresponding block at each node, wherein blocks are mutually verified; 2) obtaining the information of the user, searching the information of the user through the vKey attribute authorization service, returning the user name, the gender and the age information of the user and returning a particular opened at the same time for distinguishing different users; 3) subjecting data to signature treatment during the digital identity authentication process based on the above block chain technology. According to the technical scheme of the invention, the personal data of a user are stored in a block chain, so that the occurrence of information leakage and internet fraud behaviors is radically avoided. The data security is ensured. During the data transmission process, the digital signature treatment is adopted. Therefore, the sensitive information is not tampered during the digital signature transmission process.
Owner:兰考同心互联数据管理有限公司

System and method for monitoring real data of website

The invention discloses a system and a method for monitoring the real data of a website. The system at least comprises a data acquisition module, an authoritative information exchange module, an analysis module and a central processing unit (CPU), wherein the CPU is connected with the analysis module; the analysis module is connected with the data acquisition module and the authoritative information exchange module respectively; the data acquisition module and the authoritative information exchange module acquire the data of a browsed website or web page and the data published by an official or authoritative website or a database, and transmit the data to the analysis module; and the analysis module analyzes and compares the data to confirm the authenticity and legality of the browsed website or web page. By the system and the method, a reliable evaluation system is provided for Internet users to avoid the harms of fraudulent websites or web pages to the users; and questionable websites or web pages can be complained or reported to related supervision and control departments, and evaluation can be provided for a credit rating mechanism to suppress Internet fraud and illegal operations and safeguard lawful operations as well as customer rights.
Owner:乔永清

Network fraud identification method and system based on knowledge graph

The invention belongs to the technical field of knowledge graph application, and particularly provides a network fraud identification method and system based on a knowledge graph, and the method comprises the steps: constructing a mode layer of a network fraud knowledge graph from top to bottom; loading data to the data layer of the network fraud knowledge graph; based on the constructed network fraud knowledge graph, fusing a third-party knowledge base in a data layer, and expanding the data volume of the data layer of the network fraud knowledge graph; discretizing and normalizing attribute frequency values of key behavior relationships in the network fraud knowledge graph, and converting the attribute frequency values into weight values of graph edges; and based on a network fraud case graph, by utilizing a spark graphics graph and an LPA algorithm, identifying a criminal gang, and then by utilizing a PageRank algorithm, identifying core members in the gang. The network fraud case and the criminal gang can be effectively organized through entities, relationships and attributes by using the strong relevance of the knowledge graph. The case detection efficiency is improved, and the occurrence rate of network fraud cases is reduced.
Owner:武汉众智数字技术有限公司

A detection method for network fraud information

The invention provides a detection method for network fraud information, comprising an information extraction server, a fraud information detection cloud platform and a communication network. When theinformation extraction server receives the information sent by the user, a network link, a telephone number or a bank account number, which may contain fraudulent content, is extracted from the network link, the telephone number or the bank account number, and the suspected fraudulent information is called, then the suspected fraudulent information is detected to determine whether the fraudulentinformation exists or not, and if so, the user is notified, otherwise the suspected fraudulent information is sent to the fraudulent information detection cloud platform. The fraud information detection cloud platform further detects the suspected fraud information to determine whether there is fraud. The fraud information detection cloud platform transmits the detected result to the information extraction server, and the information extraction server sends the result to the user. The invention can reduce adverse influence or loss caused by various network fraud information to smart phone users, personal computer users and the like, thereby providing an effective network fraud prevention mode.
Owner:GUANGDONG UNIV OF PETROCHEMICAL TECH

Communication network fraud identification method and apparatus, and electronic device

Embodiments of the invention provide a communication network fraud identification method and apparatus, and an electronic device. The invention discloses a communication network fraud identification method. The electronic devicereceives a communication request of a communication opposite terminal, and then establishes communication connection with a communication opposite terminal; then, the electronic deviceacquires equipment information of the communication opposite terminal; thedata of a first user is acquired by using the electronic device and a second user using the communication opposite terminal in the communication process; risk analysis is carried out according to the equipment information of the opposite communication terminal; text analysis, environment analysis and voiceprintrecognition are carried out according to the collected data; and finally, according to a risk analysis result, a and/or the prompt information is output to the first user according to the results of the text analysis, the environment analysis and the voiceprint recognition, so that the information output by the communication opposite terminal in the communication process can be recognized and prompted at the first time when the two communication parties begin to communicate, and accompanying risk management and control are realized.
Owner:ALIPAY (HANGZHOU) INFORMATION TECH CO LTD

Third-party-based verified information non-leakage data integrity and source verification method

The invention provides a third-party-based verified information non-leakage data integrity and data source verification method which comprises a third-party-based verified information non-leakage dataintegrity and source verification method in a simple mode, a third-party-based verified information non-leakage data integrity and source verification method in a key exchange mode and a third-party-based verified information non-leakage data integrity and source verification method in a secure communication mode, wherein the third-party-based verified information non-leakage data integrity and source verification method in the simple mode is used for a case that verified and transmitted data is a cleartext, a sender does not encrypt the data and a receiver also does not need to decrypt the received data; according to the third-party-based verified information non-leakage data integrity and source verification method in the key exchange mode, on the basis of the simple mode, key securitytransmission is further provided for the sender and the receiver so as to support more secure communication between the sender and the receiver; and according to the third-party-based verified information non-leakage data integrity and source verification method in the secure communication mode, on the basis of the simple mode, the verified and transmitted data is a ciphertext. Acquired information can be used for identity verification of both the sender and the receiver, and two users who do not know public keys of opposite parties are allowed to verify an integrity and a source of data sentbetween the users, and the third-party-based verified information non-leakage data integrity and source verification method can be used for defending internet frauds and establishing an authoritativeinformation release and verification platform.
Owner:SHANGHAI MARITIME UNIVERSITY

Electronic data comprehensive evidence storage method and evidence storage system

InactiveCN111885085AProtect economic assetsEffective Evidence CollectionDigital data protectionDigital data authenticationData synchronizationCloud systems
The invention discloses an electronic data comprehensive evidence storage method. The method comprises the following steps: S10, an identity verification request: carrying out identity compliance andsecurity verification on a user individual; S20, requesting data preservation: analyzing certificate storage data pre-collected by a user individual in the data certificate storage request in a business execution process, encrypting the certificate storage data by an electronic data certificate storage background service, generating a unique identifier, and storing the unique identifier into a database; and S30, evidence storage cloud data synchronization: synchronizing the evidence storage data preserved to the database in the step S20 to an electronic data evidence storage cloud system. Theinvention further discloses an electronic data comprehensive evidence storage system which comprises an electronic data evidence storage application program, a data evidence storage background servicesystem and an electronic data evidence storage cloud system. Key data in internet telecommunication network fraud can be stored in the data storage cloud system, a victim can be helped to fix electronic data at the first time, and the storage data can be quickly synchronized to related public security organizations.
Owner:上海弘连网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products