[go: up one dir, main page]

CN110932960A - Social software-based fraud prevention method, server and system - Google Patents

Social software-based fraud prevention method, server and system Download PDF

Info

Publication number
CN110932960A
CN110932960A CN201911065981.7A CN201911065981A CN110932960A CN 110932960 A CN110932960 A CN 110932960A CN 201911065981 A CN201911065981 A CN 201911065981A CN 110932960 A CN110932960 A CN 110932960A
Authority
CN
China
Prior art keywords
content
abnormal
initiator
server
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911065981.7A
Other languages
Chinese (zh)
Inventor
彭子娇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Sound Yang Technology Co Ltd
Original Assignee
Shenzhen Sound Yang Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Sound Yang Technology Co Ltd filed Critical Shenzhen Sound Yang Technology Co Ltd
Priority to CN201911065981.7A priority Critical patent/CN110932960A/en
Publication of CN110932960A publication Critical patent/CN110932960A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • GPHYSICS
    • G10MUSICAL INSTRUMENTS; ACOUSTICS
    • G10LSPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
    • G10L17/00Speaker identification or verification techniques
    • G10L17/22Interactive procedures; Man-machine interfaces
    • G10L17/24Interactive procedures; Man-machine interfaces the user being prompted to utter a password or a predefined phrase
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/04Real-time or near real-time messaging, e.g. instant messaging [IM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3231Biological data, e.g. fingerprint, voice or retina

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Acoustics & Sound (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Biodiversity & Conservation Biology (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to the technical field of internet, and discloses a social software-based fraud prevention method, a server and a system. The method comprises the following steps: detecting whether the chat content is abnormal; if the chat content is abnormal, starting an identification mode and verifying the identity of the abnormal content initiator; when the identity of the abnormal content initiator is abnormal, the safety measure is executed, so that the fraud can be prevented timely and effectively.

Description

Social software-based fraud prevention method, server and system
Technical Field
The invention relates to the technical field of internet, in particular to a social software-based fraud prevention method, a server and a system.
Background
With the development of internet technology, more and more people start to use Instant Messaging (IM), which is an internet-based Instant Messaging service.
When users communicate through instant messaging, some user accounts are stolen or viruses cause the abnormality of the user accounts. These abnormal users often send some malicious messages to other users, which may cause troubles or losses for other users.
In the traditional technology, sensitive words appearing in instant messaging software are detected in real time through intelligent recognition of keywords, and prompt information is sent to a user, but the identity of an abnormal user cannot be accurately judged only through a word-only phrase, and the intelligent recognition of the keywords has no obvious effect on fraud prevention.
Disclosure of Invention
In view of the above, there is a need to provide a social software-based fraud prevention method, server and system, which can prevent fraud timely and effectively.
In a first aspect, an embodiment of the present invention provides a social software-based fraud prevention method, which is applied to a server, and the method includes:
detecting whether the chat content is abnormal;
if the chat content is abnormal, starting an identification mode and verifying the identity of the abnormal content initiator;
and when the identity of the abnormal content initiator is abnormal, executing a safety measure.
In some embodiments, the detecting whether the chat content is abnormal includes:
when the chat content comprises sensitive information, determining that the chat content is abnormal; and/or the presence of a gas in the gas,
and when the chat content does not accord with the behavior tag of the chat content initiator, determining that the chat content is abnormal.
In some embodiments, said initiating an identification mode if said chat content is abnormal, verifying the identity of the sender of the abnormal content, comprises:
if the chat content is abnormal, inquiring whether the opposite side of the abnormal content initiator starts an identification mode or not;
and if the opposite side of the abnormal content initiator confirms to start the identification mode, starting the identification mode for the abnormal content initiator.
In some embodiments, said initiating an identification mode for said anomalous content originator comprises:
sending specified content to an abnormal content initiator so that the abnormal content initiator completes voice input of the specified content within a preset duration;
and receiving the voice recorded by the abnormal content initiator, and verifying the identity of the abnormal content initiator according to the voice.
In some embodiments, said initiating an identification mode for said anomalous content originator comprises:
sending specified content to an abnormal content initiator so that the abnormal content initiator completes voice input of the specified content within a preset duration;
and obtaining a verification result for verifying the identity of the abnormal content initiator.
In some embodiments, said verifying the identity of the originator of the anomalous content from said speech comprises:
recognizing the text content of the voice, and calculating the matching degree of the text content of the voice and the specified content to obtain a first matching degree;
recognizing the voiceprint features of the voice, and calculating the matching degree of the voiceprint features and preset voiceprint features to obtain a second matching degree;
if the first matching degree reaches a first preset threshold value and the second matching degree also reaches a second preset threshold value, determining that the identity of the abnormal content initiator is normal;
otherwise, determining that the identity of the abnormal content initiator is abnormal.
In some embodiments, the method further comprises:
and if the abnormal content initiator does not finish the voice input of the specified content within the preset time length, determining that the identity of the abnormal content initiator is abnormal.
In some embodiments, when the identity of the abnormal content originator is abnormal, performing a security measure includes:
and when the identity of the abnormal content initiator is abnormal, freezing the account of the abnormal content initiator.
In a second aspect, an embodiment of the present invention further provides a social software-based fraud prevention apparatus, where the apparatus includes:
the detection module is used for detecting whether the chat content is abnormal;
the identification module is used for starting an identification mode and verifying the identity of an abnormal content initiator if the chat content is abnormal;
and the execution module is used for executing safety measures when the identity of the abnormal content initiator is abnormal.
In some embodiments, the detection module is specifically configured to:
when the chat content comprises sensitive information, determining that the chat content is abnormal; and/or the presence of a gas in the gas,
and when the chat content does not accord with the behavior tag of the chat content initiator, determining that the chat content is abnormal.
In some embodiments, the identification module is specifically configured to:
if the chat content is abnormal, inquiring whether the opposite side of the abnormal content initiator starts an identification mode or not;
and if the opposite side of the abnormal content initiator confirms to start the identification mode, starting the identification mode for the abnormal content initiator.
Sending specified content to an abnormal content initiator so that the abnormal content initiator completes voice input of the specified content within a preset duration;
and receiving the voice recorded by the abnormal content initiator, and verifying the identity of the abnormal content initiator according to the voice.
Sending specified content to an abnormal content initiator so that the abnormal content initiator completes voice input of the specified content within a preset duration;
obtaining a verification result for verifying the identity of the abnormal content initiator;
recognizing the text content of the voice, and calculating the matching degree of the text content of the voice and the specified content to obtain a first matching degree;
recognizing the voiceprint features of the voice, and calculating the matching degree of the voiceprint features and preset voiceprint features to obtain a second matching degree;
if the first matching degree reaches a first preset threshold value and the second matching degree also reaches a second preset threshold value, determining that the identity of the abnormal content initiator is normal;
otherwise, determining that the identity of the abnormal content initiator is abnormal.
In some embodiments, the execution module is specifically configured to:
and when the identity of the abnormal content initiator is abnormal, freezing the account of the abnormal content initiator.
In a third aspect, an embodiment of the present invention further provides a server, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the social software-based fraud prevention method described above.
In a fourth aspect, an embodiment of the present invention further provides a fraud prevention system based on social software, where the system includes the server and at least two terminals, each of the terminals is in communication with the server, and the server is configured to receive chat content of the terminal and detect the chat content.
In a fifth aspect, embodiments of the present invention also provide a non-transitory computer-readable storage medium storing computer-executable instructions that, when executed by a server, cause the server to perform a social software-based fraud prevention method.
In a sixth aspect, embodiments of the present invention also provide a computer program product comprising a computer program stored on a non-volatile computer-readable storage medium, the computer program comprising program instructions which, when executed by a server, cause the server to perform the social software-based anti-fraud method as described above.
Compared with the prior art, the invention has the beneficial effects that: different from the situation of the prior art, in the fraud prevention method based on the social software, the server detects whether the chat content in the chat interface of the instant messaging software is abnormal or not, if the chat content is abnormal, an identification mode is started to verify the identity of the abnormal content initiator, and when the identity of the abnormal content initiator is abnormal, a safety measure is executed, so that fraud can be prevented timely and effectively.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
FIG. 1 is a schematic diagram of an application scenario of the social software-based fraud prevention method of the present invention;
FIG. 2 is a flow diagram of one embodiment of a social software based anti-fraud method of the present invention;
FIG. 3 is a flow chart of detecting whether chat content is abnormal in one embodiment of the social software based fraud prevention method of the present invention;
FIG. 4 is a flow diagram of an embodiment of a social software based fraud prevention method of the present invention initiating a recognition mode;
FIG. 5 is a specific flowchart of a startup recognition mode executed by the server in one embodiment of the social software based fraud prevention method of the present invention;
FIG. 6 is a flowchart illustrating the operation of the terminal executing the start recognition mode according to an embodiment of the social software-based fraud prevention method of the present invention;
FIG. 7 is a flow chart of the method for social software based fraud prevention of the present invention for verifying the identity of the originator of the anomalous content;
FIG. 8 is a schematic diagram of chat content containing sensitive information in an embodiment of a social software based fraud prevention method of the present invention;
FIG. 9 is a schematic illustration of a failure to verify in one embodiment of a social software based fraud prevention method of the present invention;
FIG. 10 is a schematic illustration of the success of the verification in one embodiment of the social software based fraud prevention method of the present invention;
FIG. 11 is a schematic representation of chat content not matching the chat content originator's behavior tag in an embodiment of the social software based fraud prevention method of the present invention;
FIG. 12 is a flow diagram of one embodiment of a social software based fraud prevention method of the present invention;
FIG. 13 is a schematic structural diagram of an embodiment of a social software based fraud prevention apparatus of the present invention;
fig. 14 is a schematic diagram of a hardware structure of a server provided by the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that, if not conflicted, the various features of the embodiments of the invention may be combined with each other within the scope of protection of the invention. Additionally, while functional block divisions are performed in apparatus schematics, with logical sequences shown in flowcharts, in some cases, steps shown or described may be performed in sequences other than block divisions in apparatus or flowcharts. The terms "first", "second", "third", and the like used in the present invention do not limit data and execution order, but distinguish the same items or similar items having substantially the same function and action.
In this embodiment, the application scenario is a fraud prevention system based on social software, and includes a server and a plurality of terminals, fig. 1 exemplarily shows a server 10, a terminal a1, a terminal a2, a terminal A3, a terminal B1, a terminal B2, and a terminal B3, where the terminal a1, the terminal a2, and the terminal A3 are used as a user a terminal, the terminal B1, the terminal B2, and the terminal B3 are used as a user B terminal, and further include more terminals in an actual network environment. The user a terminal and the user B terminal are connected to the server 10 through network communication, for example: the server 10 is connected to the mobile communication network by communication in a local area network, a wide area network, a wireless network, a Global System for mobile communication (GSM), a third generation mobile communication network, a fourth generation mobile communication network, a fifth generation mobile communication network, or the like. The server 10 is configured to receive the chat content sent by the user a terminal and the user B terminal, and detect the chat content, so as to determine whether the chat content is abnormal, when the chat content is abnormal, the server 10 starts an identification mode to verify an identity of an originator of the abnormal content, and if the identity of the originator of the abnormal content is abnormal, the server executes a security measure.
The terminal may be, for example, a smart phone, a tablet computer, a personal computer, a laptop computer, and the like. The server may be a server, such as a rack server, a blade server, a tower server, or a rack server, or may be a server cluster composed of a plurality of servers, or a cloud computing service center.
It should be noted that the method provided by the embodiment of the present application may be further extended to other suitable application environments, and is not limited to the application environment shown in fig. 1. In practical applications, the application environment may also include more or fewer terminals and servers.
As shown in fig. 2, an embodiment of the present invention provides a social software-based fraud prevention method, which is applied to a server, and the method includes:
step 202, detecting whether the chat content is abnormal.
In the embodiment of the present invention, the user may chat through a third-party application program, and the third-party application program may be an instant messaging application platform or other application platforms, where the instant messaging platform may include WeChat, QQ, an applet, and the like. Specifically, in an instant messaging chat environment, at least one user a and at least one user B exist, and a server regularly and intelligently detects chat contents of chat windows of the user a and the user B, wherein the chat contents include text information or voice information and the like of chatting between two parties, so as to determine whether the chat contents are abnormal. It should be noted that a detection period may be preset, for example, 5 minutes, the server detects the chat content of the user a and the user B every 5 minutes, and the detection period may be set according to the actual situation. Chat content can also be detected in real time.
Step 204, if the chat content is abnormal, starting an identification mode and verifying the identity of the abnormal content initiator.
In the embodiment of the invention, the recognition mode comprises two modes of voice recognition and voiceprint recognition, wherein the voiceprint recognition is one of biological recognition technologies, also called speaker recognition, and a speaker corresponding to the voice can be known according to the voiceprint characteristics of the voice to be recognized. The server detects the chat contents of the user A and the user B at intervals of a preset period, and when the chat contents, namely the text information or the voice information of the chat, are abnormal, the server starts an identification mode so as to verify the identity of the abnormal content initiator.
And step 206, when the identity of the abnormal content initiator is abnormal, executing a safety measure.
In the embodiment of the present invention, a security measure is a measure for ensuring security for an initiator of abnormal content. Specifically, the user A chats with the user B through the instant messaging platform, the server receives the chatting contents of the user A and the user B and detects the chatting contents regularly, and when the server detects that the identity of the user B of the abnormal content initiator is abnormal, the server immediately executes safety measures, so that the safety of the user A is guaranteed.
In the embodiment of the invention, the server regularly detects whether the chat content is abnormal, when the chat content is abnormal, the server starts an identification mode so as to verify the identity of the abnormal content initiator, and when the identity of the abnormal content initiator is abnormal, the server immediately executes safety measures, thereby effectively preventing fraud in time.
In some embodiments, as shown in fig. 3, the detecting whether the chat content is abnormal includes:
step 302, when the chat content includes sensitive information, determining that the chat content is abnormal.
Specifically, the server performs real-time or irregular intelligent detection on the chat content of the user, so as to find sensitive information, or finds sensitive information included in the chat content based on rule matching, or finds sensitive information included in the chat content by determining a Finite Automaton (DFA), where the sensitive information may be a sensitive keyword, such as a keyword of money, a password, and the like. And/or the presence of a gas in the gas,
and step 304, when the chat content does not accord with the behavior tag of the chat content initiator, determining that the chat content is abnormal.
In the embodiment of the invention, the identity information of the user and the corresponding label are stored in the database of the server in advance. The identity information of the user is used to identify a character string of the identity of the user, which may be a string of numbers, or a combination of numbers and letters, and the like, and different user identity information has different corresponding tags. For example, the label corresponding to the identity information of the user a is a mature, steady, business person, and the like, and when the user a has an interaction behavior that is not consistent with the label during the chat process, the server determines that the chat content of the user a is abnormal. It should be noted that, the steps 302 and 304 are defined only for convenience of description of the present application, are relative concepts, and are not used to indicate a sequential order.
It will be appreciated that in other embodiments, the representation of the user may be tagged and stored together in the database. When the user has behavior inconsistent with the portrait label, the server determines that the chat content of the user is abnormal.
In some embodiments, as shown in fig. 4, if the chat content is abnormal, the starting of the recognition mode and the verifying of the identity of the abnormal content initiator comprises:
if the chat content is abnormal, step 402, inquiring whether the opposite side of the abnormal content initiator starts the identification mode.
In the embodiment of the invention, when the server detects that the chat content has sensitive information or the user has communication behavior which is not in accordance with the label of the chat content, the server sends prompt information, namely whether the identification mode is started or not, so that the identity verification information is sent to the opposite user and the detected sensitive information is highlighted on the chat interface of the opposite user.
Step 404, if the opposite side of the abnormal content initiator confirms to start the identification mode, starting the identification mode for the abnormal content initiator.
When the opposite side of the abnormal content initiator, namely the user A, receives the prompt message sent by the system, the user A can select to start the identification mode or ignore the prompt, and if the user A selects to start the identification mode, the user A starts the identification mode for the abnormal content initiator B.
In some embodiments, as shown in fig. 5, the initiating an identification mode for the anomalous content initiator includes:
step 502, sending the specified content to an abnormal content initiator, so that the abnormal content initiator completes the voice input of the specified content within a preset time length.
In the embodiment of the invention, the designated content can be designated text information or video information, and the bound user account information and the corresponding voiceprint information are pre-stored in the database of the server. Specifically, after the opposite side of the abnormal content initiator selects the start recognition mode, the server pushes the specified content list to the opposite side of the abnormal content initiator so that the opposite side of the abnormal content initiator can select the specified content for verification, and after the opposite side of the abnormal content initiator selects the specified content and reports the selected specified content to the server, the server sends the selected specified content to the abnormal content initiator so that the abnormal content initiator completes the voice input of the specified content within a preset time length.
Step 504, receiving the voice recorded by the abnormal content initiator, and verifying the identity of the abnormal content initiator according to the voice.
Specifically, in the embodiment of the present invention, the server verifies the entered voice, and since the database of the server stores the account of the user and the voiceprint feature corresponding to the account in advance, after receiving the voice entered by the abnormal content originator, the server compares the voice with the voiceprint feature bound to the account, so as to verify the identity of the abnormal content originator.
In some other embodiments, the verifying the entered speech may further be performed by a terminal of the abnormal content originator, as shown in fig. 6, where the initiating a recognition mode for the abnormal content originator further includes:
step 602, sending a specified content to an abnormal content initiator, so that the abnormal content initiator completes voice entry of the specified content within a preset time length.
Step 604, obtaining a verification result for verifying the identity of the abnormal content initiator.
In the embodiment of the invention, the abnormal content initiator can use a microphone for recording audio on the terminal to input the specified content, and uses a preset voice recognition model on the terminal to verify the voice signal to obtain the verification result, and then the server obtains the verification result of the identity of the abnormal content initiator and sends the verification result to the opposite side of the abnormal content initiator, thereby determining whether the abnormal content initiator is the person or not according to the verification result.
In some embodiments, as shown in fig. 7, the verifying the identity of the anomalous content originator from the speech includes:
step 702, recognizing the text content of the voice, and calculating the matching degree of the text content of the voice and the specified content to obtain a first matching degree.
In the embodiment of the present invention, the specified content is a content selected by an opposite party of an abnormal content initiator or a content randomly sent by a server, and the specified content includes specific information. And when the abnormal content initiator sends the recorded voice to the server, the server identifies the recorded voice. Specifically, the server first identifies the text content of the voice, and calculates the matching degree of the text content of the voice and the specified content to obtain a first matching degree.
Step 704, recognizing the voiceprint features of the voice, and calculating the matching degree of the voiceprint features and preset voiceprint features to obtain a second matching degree.
The preset voiceprint characteristics can be obtained in advance and stored in a database of the server. And after the text content of the voice is recognized, the server recognizes the voiceprint features of the voice, extracts the voiceprint features contained in the voice data by adopting an algorithm, and calculates the matching degree of the voiceprint features and the preset voiceprint features stored in the database in advance so as to obtain a second matching degree. It should be noted that, the text content of the voice and the voiceprint feature of the voice are recognized, there is no sequence, the text content of the voice may be recognized first, and then the voiceprint feature of the voice is recognized, or the voiceprint feature of the voice is recognized first, and then the text content of the voice is recognized, or both of them are recognized at the same time, and there is no need to be limited in this embodiment.
Step 706, if the first matching degree reaches a first preset threshold value and the second matching degree also reaches a second preset threshold value, determining that the identity of the abnormal content initiator is normal.
In the embodiment of the present invention, the first preset threshold and the second preset threshold may be preset, and the first preset threshold and the second preset threshold may be the same or different, specifically, it is determined that the identity of the abnormal content initiator is normal, and two conditions need to be satisfied at the same time. Illustratively, if the matching degree of the text content of the voice and the specified content is 80%, that is, the first matching degree is 80%, and the first preset threshold is 70%, the first matching degree is considered to reach the first preset threshold; alternatively, the first matching degree is 70%, the first preset threshold is 70%, and the first matching degree is considered to reach the first preset threshold. If the matching degree of the voiceprint features and the preset voiceprint features is 75%, that is, the second matching degree is 75% and the second preset threshold is 75%, the second matching degree is considered to reach the preset threshold, or, the second matching degree is 87% and the second preset threshold is 75%, the second matching degree is also considered to reach the second preset threshold. And only when the first matching degree reaches a first preset threshold value and the second matching degree reaches a second preset threshold value, the identity of the abnormal content initiator is considered to be normal, and the chat can be carried out.
Step 708, otherwise, determining that the identity of the abnormal content initiator is abnormal.
If the first matching degree does not reach a first preset threshold value and the second matching degree does not reach a second preset threshold value, confirming that the identity of the abnormal content initiator is abnormal; or if the first matching degree reaches a first preset threshold value, but the second matching degree does not reach a second preset threshold value, the identity of the abnormal content initiator is confirmed to be abnormal; or if the first matching degree does not reach the first preset threshold value, but the second matching degree reaches the second preset threshold value, the identity of the abnormal content initiator is confirmed to be abnormal. When the identity of the abnormal content initiator is abnormal, the abnormal content initiator is determined not to be the user, and the server freezes the account number of the abnormal content initiator.
In other embodiments, if the abnormal content initiator does not complete the voice input of the specified content within the preset time length, it is determined that the identity of the abnormal content initiator is abnormal, and the server freezes the account.
To facilitate an understanding of the invention, the following examples are given;
referring to fig. 8 to 10 together, fig. 8 to 10 are embodiments of the chat content including sensitive information;
referring to fig. 8, the originator of the abnormal content is user B, and the opposite party of the originator of the abnormal content is user a. The method comprises the steps that a user A and a user B chat through an instant messaging platform, a server intelligently detects the chat content of the user A and the user B in real time or in variable time, and when the server finds that text information sent by the user B or voice information carries sensitive keywords, such as money. At this time, the server sends a prompt message to the user a, where the prompt message may specifically be information such as "the system detects that the user B is abnormal, and whether to start identity verification", and the like, and highlights the detected sensitive keyword to the user a.
Then, if the user A selects to start the identity verification, the server sends the specified content list to the user A, the user A can select the specified content to authenticate the user B, or the server randomly sends the specified content to the user B to authenticate. Specifically, after the user a selects a specific content, that is, text information (which is desirable to be good, perhaps good among people, and good things never disappear) to report to the server, the server sends the text information to the user B, and displays the text information to be subjected to voice entry on a chat interface of the user B, wherein the specific content carries a preset time, for example, 60S. The user B needs to complete the input of the specified content within the preset time 60S.
Referring to fig. 9, after the user B completes the entry of the specified content within the preset time, the user B sends the specified content to the server, the server first identifies the text content of the entered voice, and calculates the matching degree between the text content of the voice and the specified content, so as to obtain a first matching degree, if the first matching degree does not reach a first preset threshold, it is determined that the identity of the user B is abnormal, and the server sends a prompt message to the user a, where the prompt message may be a prompt message such as "the user B may be stolen, and the system has processed". Meanwhile, the server can also push verification failure information, namely complaint prompt, to the user B and force the user B to quit logging, so that the condition of non-real-time voice can be avoided.
If the first matching degree of the input voice of the user B reaches a first preset threshold value, acquiring voiceprint features contained in voice data by using an algorithm, and calculating the matching degree of the voiceprint features and the preset voiceprint features to obtain a second matching degree, if the second matching degree reaches a second preset threshold value, please refer to fig. 10, the server respectively sends prompt information that voiceprint verification is successful to the user A and the user B, and the user A and the user B can continue chat conversation after receiving the prompt information. If the second matching degree of the user B does not reach a second preset threshold value, the identity of the abnormal content initiator is determined to be abnormal, and the server freezes the account of the abnormal content initiator.
Referring to fig. 11, fig. 11 shows an embodiment where the chat content does not conform to the behavior tag of the chat content originator;
similarly, the chat content initiator is user B, and the opposite party of the chat content initiator is user a. The database of the server stores the identity information of the user and the corresponding label in advance, or the database stores the portrait of the user and the corresponding label in advance. The label corresponding to the identity information or the image information of the user B is mature, steady, commercial people and the like, when the user B has an exchange behavior which is not consistent with the label in the chatting process, the server determines that the chatting content of the user B is abnormal, and highlights and displays the detected abnormal content to the user A. When the user a selects to start the recognition mode, the process returns to step 502, please refer to fig. 12, where fig. 12 is a specific flowchart illustrating the implementation of the method.
It should be noted that, in the foregoing embodiments, a certain order does not necessarily exist between the foregoing steps, and it can be understood by those skilled in the art from the description of the embodiments of the present invention that, in different embodiments, the foregoing steps may have different execution orders, that is, may be executed in parallel, may also be executed in an exchange manner, and the like.
Correspondingly, an embodiment of the present invention further provides a social software-based fraud prevention apparatus 1300, as shown in fig. 13, including:
a detecting module 1302, configured to detect whether chat content is abnormal;
an identification module 1304, configured to, if the chat content is abnormal, start an identification mode, and verify an identity of an originator of the abnormal content;
an executing module 1306, configured to execute a security measure when the identity of the abnormal content originator is abnormal.
According to the fraud prevention device based on the social software, provided by the embodiment of the invention, whether the chat content of the user chat interface is abnormal is detected in real time or irregularly through the detection module, when the chat content is abnormal, the identification module starts an identification mode to verify the identity of the abnormal content initiator, and when the identity of the abnormal content initiator is abnormal, the execution module executes safety measures, so that fraud can be prevented timely and effectively.
Optionally, in some embodiments of the apparatus, the detecting module 1302 is specifically configured to:
when the chat content comprises sensitive information, determining that the chat content is abnormal; and/or the presence of a gas in the gas,
and when the chat content does not accord with the behavior tag of the chat content initiator, determining that the chat content is abnormal.
Optionally, in some embodiments of the apparatus, the identifying module 1304 is specifically configured to:
if the chat content is abnormal, inquiring whether the opposite side of the abnormal content initiator starts an identification mode or not;
and if the opposite side of the abnormal content initiator confirms to start the identification mode, starting the identification mode for the abnormal content initiator.
Sending specified content to an abnormal content initiator so that the abnormal content initiator completes voice input of the specified content within a preset duration;
and receiving the voice recorded by the abnormal content initiator, and verifying the identity of the abnormal content initiator according to the voice.
Sending specified content to an abnormal content initiator so that the abnormal content initiator completes voice input of the specified content within a preset duration;
obtaining a verification result for verifying the identity of the abnormal content initiator;
identifying whether the voice accords with the specified content, and if the voice does not accord with the specified content, determining that the identity of an abnormal content initiator is abnormal;
recognizing the text content of the voice, and calculating the matching degree of the text content of the voice and the specified content to obtain a first matching degree;
recognizing the voiceprint features of the voice, and calculating the matching degree of the voiceprint features and preset voiceprint features to obtain a second matching degree;
if the first matching degree reaches a first preset threshold value and the second matching degree also reaches a second preset threshold value, determining that the identity of the abnormal content initiator is normal;
otherwise, determining that the identity of the abnormal content initiator is abnormal.
Optionally, in some embodiments of the apparatus, the executing module 1306 is specifically configured to:
and when the identity of the abnormal content initiator is abnormal, freezing the account of the abnormal content initiator.
It should be noted that, the social software-based fraud prevention apparatus described above may execute the social software-based fraud prevention method provided in the embodiment of the present invention, and has corresponding functional modules and beneficial effects of the execution method.
Fig. 14 is a schematic diagram of a hardware structure of a server according to an embodiment of the present invention, and as shown in fig. 14, the server 10 includes:
one or more processors 102 and memory 104, with one processor 102 being an example in FIG. 14.
The processor 102 and the memory 104 may be connected by a bus or other means, such as by a bus in FIG. 14.
Memory 104, which is a non-volatile computer-readable storage medium, may be used to store non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions/modules corresponding to the social software-based anti-fraud method in the embodiments of the present invention (e.g., detection module 1302, identification module 1304, and execution module 1306 of fig. 13). The processor 102 executes various functional applications of the server and data processing by executing nonvolatile software programs, instructions and modules stored in the memory 104, namely, implementing the social software-based fraud prevention method of the above-described method embodiment.
The memory 104 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created from social software-based fraud prevention device usage, and the like. Further, the memory 104 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, the memory 104 optionally includes memory located remotely from the processor 102, and these remote memories may be networked to a social software-based fraud prevention apparatus. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The one or more modules stored in the memory 104, when executed by the one or more servers 10, perform the social software-based fraud prevention method of any of the above-described method embodiments, e.g., performing the above-described method steps 202-206 of fig. 2, 302-304 of fig. 3, 402-404 of fig. 4, 502-504 of fig. 5, 602-604 of fig. 6, 702-708 of fig. 7; the functions of modules 1302 to 1306 in fig. 13 are implemented.
The terminal of the embodiments of the present invention exists in various forms, including but not limited to:
(1) mobile communication devices, which are characterized by mobile communication capabilities and are primarily targeted at providing voice and data communications. Such terminals include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) Portable entertainment devices such devices may display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, as well as smart toys and portable car navigation devices.
The server of embodiments of the present invention exists in a variety of forms, including but not limited to:
(1) tower server
The general tower server chassis is almost as large as the commonly used PC chassis, while the large tower chassis is much larger, and the overall dimension is not a fixed standard.
(2) Rack-mounted server
Rack-mounted servers are a type of server that has a standard width of 19 inch racks, with a height of from 1U to several U, due to the dense deployment of the enterprise. Placing servers on racks not only facilitates routine maintenance and management, but also may avoid unexpected failures. First, placing the server does not take up too much space. The rack servers are arranged in the rack in order, and no space is wasted. Secondly, the connecting wires and the like can be neatly stored in the rack. The power line, the LAN line and the like can be distributed in the cabinet, so that the connection lines accumulated on the ground can be reduced, and the accidents such as the electric wire kicking off by feet can be prevented. The specified dimensions are the width (48.26cm ═ 19 inches) and height (multiples of 4.445 cm) of the server. Because of its 19 inch width, a rack that meets this specification is sometimes referred to as a "19 inch rack".
(3) Blade server
A blade server is a HAHD (High Availability High Density) low cost server platform designed specifically for the application specific industry and High Density computer environment, where each "blade" is actually a system motherboard, similar to an individual server. In this mode, each motherboard runs its own system, serving a designated group of different users, without any relationship to each other. Although system software may be used to group these motherboards into a server cluster. In the cluster mode, all motherboards can be connected to provide a high-speed network environment, and resources can be shared to serve the same user group.
(4) Cloud server
The cloud server (ECS) is a computing Service with simplicity, high efficiency, safety, reliability, and flexible processing capability. The management mode is simpler and more efficient than that of a physical server, and a user can quickly create or release any plurality of cloud servers without purchasing hardware in advance. The distributed storage of the cloud server is used for integrating a large number of servers into a super computer, and a large number of data storage and processing services are provided. The distributed file system and the distributed database allow access to common storage resources, and IO sharing of application data files is achieved. The virtual machine can break through the limitation of a single physical machine, dynamically adjust and allocate resources to eliminate single-point faults of the server and the storage equipment, and realize high availability.
An embodiment of the present invention provides a computer program product comprising a computer program stored on a non-volatile computer-readable storage medium, the computer program comprising program instructions which, when executed by a computer, cause the computer to perform: method steps 202 to 206 in fig. 2, method steps 302 to 304 in fig. 3, method steps 402 to 404 in fig. 4, method steps 502 to 504 in fig. 5, method steps 602 to 604 in fig. 6, and method steps 702 to 708 in fig. 7.
The product can execute the method provided by the embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method. For technical details that are not described in detail in this embodiment, reference may be made to the method provided by the embodiment of the present invention.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a general hardware platform, and certainly can also be implemented by hardware. It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a computer readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; within the idea of the invention, also technical features in the above embodiments or in different embodiments may be combined, steps may be implemented in any order, and there are many other variations of the different aspects of the invention as described above, which are not provided in detail for the sake of brevity; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (11)

1. A social software-based anti-fraud method is applied to a server and is characterized by comprising the following steps:
detecting whether the chat content is abnormal;
if the chat content is abnormal, starting an identification mode and verifying the identity of the abnormal content initiator;
and when the identity of the abnormal content initiator is abnormal, executing a safety measure.
2. The method of claim 1, wherein the detecting whether the chat content is abnormal comprises:
when the chat content comprises sensitive information, determining that the chat content is abnormal; and/or the presence of a gas in the gas,
and when the chat content does not accord with the behavior tag of the chat content initiator, determining that the chat content is abnormal.
3. The method of claim 1 or 2, wherein if the chat content is abnormal, initiating an identification mode to verify the identity of the originator of the abnormal content comprises:
if the chat content is abnormal, inquiring whether the opposite side of the abnormal content initiator starts an identification mode or not;
and if the opposite side of the abnormal content initiator confirms to start the identification mode, starting the identification mode for the abnormal content initiator.
4. The method of claim 3, wherein initiating an identification mode for the anomalous content originator comprises:
sending specified content to an abnormal content initiator so that the abnormal content initiator completes voice input of the specified content within a preset duration;
and receiving the voice recorded by the abnormal content initiator, and verifying the identity of the abnormal content initiator according to the voice.
5. The method of claim 3, wherein initiating an identification mode for the anomalous content originator comprises:
sending specified content to an abnormal content initiator so that the abnormal content initiator completes voice input of the specified content within a preset duration;
and obtaining a verification result for verifying the identity of the abnormal content initiator.
6. The method of claim 4, wherein the verifying the identity of the originator of the anomalous content from the speech comprises:
recognizing the text content of the voice, and calculating the matching degree of the text content of the voice and the specified content to obtain a first matching degree;
recognizing the voiceprint features of the voice, and calculating the matching degree of the voiceprint features and preset voiceprint features to obtain a second matching degree;
if the first matching degree reaches a first preset threshold value and the second matching degree also reaches a second preset threshold value, determining that the identity of the abnormal content initiator is normal;
otherwise, determining that the identity of the abnormal content initiator is abnormal.
7. The method of claim 6, further comprising:
and if the abnormal content initiator does not finish the voice input of the specified content within the preset time length, determining that the identity of the abnormal content initiator is abnormal.
8. The method according to claim 1 or 2, wherein when the identity of the abnormal content originator is abnormal, a security measure is executed, comprising:
and when the identity of the abnormal content initiator is abnormal, freezing the account of the abnormal content initiator.
9. A server, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-8.
10. A social software based fraud prevention system comprising a server according to claim 9 and at least two terminals, each of said terminals being communicatively connected to said server, said server being adapted to receive chat content from said terminals and to detect said chat content.
11. A non-transitory computer-readable storage medium storing computer-executable instructions that, when executed by a server, cause the server to perform the method of any one of claims 1-8.
CN201911065981.7A 2019-11-04 2019-11-04 Social software-based fraud prevention method, server and system Pending CN110932960A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911065981.7A CN110932960A (en) 2019-11-04 2019-11-04 Social software-based fraud prevention method, server and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911065981.7A CN110932960A (en) 2019-11-04 2019-11-04 Social software-based fraud prevention method, server and system

Publications (1)

Publication Number Publication Date
CN110932960A true CN110932960A (en) 2020-03-27

Family

ID=69850213

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911065981.7A Pending CN110932960A (en) 2019-11-04 2019-11-04 Social software-based fraud prevention method, server and system

Country Status (1)

Country Link
CN (1) CN110932960A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111601000A (en) * 2020-05-14 2020-08-28 支付宝(杭州)信息技术有限公司 Communication network fraud identification method and device and electronic equipment
CN111739547A (en) * 2020-07-24 2020-10-02 深圳市声扬科技有限公司 Voice matching method and device, computer equipment and storage medium
CN113822062A (en) * 2021-09-22 2021-12-21 未鲲(上海)科技服务有限公司 Text data processing method, device and equipment and readable storage medium
CN118245970A (en) * 2024-04-16 2024-06-25 北京面壁智能科技有限责任公司 Detection method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140270154A1 (en) * 2013-03-15 2014-09-18 Genesys Telecommunications Laboratories, Inc. System and method for encrypting and recording media for a contact center
CN104392353A (en) * 2014-10-08 2015-03-04 无锡指网生物识别科技有限公司 Payment method and system of voice recognition terminal
CN106161183A (en) * 2015-03-30 2016-11-23 重庆邮电大学 Method for message interaction and social interaction server device and communication system
CN106572049A (en) * 2015-10-09 2017-04-19 腾讯科技(深圳)有限公司 Identity verifying apparatus and method
CN107508834A (en) * 2017-09-25 2017-12-22 联想(北京)有限公司 A kind of Information Authentication method and electronic equipment
CN109218269A (en) * 2017-07-05 2019-01-15 阿里巴巴集团控股有限公司 Identity authentication method, device, equipment and data processing method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140270154A1 (en) * 2013-03-15 2014-09-18 Genesys Telecommunications Laboratories, Inc. System and method for encrypting and recording media for a contact center
CN104392353A (en) * 2014-10-08 2015-03-04 无锡指网生物识别科技有限公司 Payment method and system of voice recognition terminal
CN106161183A (en) * 2015-03-30 2016-11-23 重庆邮电大学 Method for message interaction and social interaction server device and communication system
CN106572049A (en) * 2015-10-09 2017-04-19 腾讯科技(深圳)有限公司 Identity verifying apparatus and method
CN109218269A (en) * 2017-07-05 2019-01-15 阿里巴巴集团控股有限公司 Identity authentication method, device, equipment and data processing method
CN107508834A (en) * 2017-09-25 2017-12-22 联想(北京)有限公司 A kind of Information Authentication method and electronic equipment

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111601000A (en) * 2020-05-14 2020-08-28 支付宝(杭州)信息技术有限公司 Communication network fraud identification method and device and electronic equipment
CN111739547A (en) * 2020-07-24 2020-10-02 深圳市声扬科技有限公司 Voice matching method and device, computer equipment and storage medium
CN113822062A (en) * 2021-09-22 2021-12-21 未鲲(上海)科技服务有限公司 Text data processing method, device and equipment and readable storage medium
CN118245970A (en) * 2024-04-16 2024-06-25 北京面壁智能科技有限责任公司 Detection method and device
CN118245970B (en) * 2024-04-16 2024-11-12 北京面壁智能科技有限责任公司 Detection method and device

Similar Documents

Publication Publication Date Title
US9763100B2 (en) Instant messaging message processing method and device and storage medium
CN104426885B (en) Abnormal account providing method and device
CN104468249B (en) Account abnormity detection method and device
CN110932960A (en) Social software-based fraud prevention method, server and system
CN108810831A (en) Method for pushing, electronic device and the readable storage medium storing program for executing of short message verification code
CN110048879B (en) Microservice registration method, microservice registration device, electronic equipment and computer-readable storage medium
CN105591743B (en) Method and device for identity authentication through equipment operation characteristics of user terminal
CN103532797A (en) Abnormity monitoring method and device for user registration
CN104618315B (en) A kind of method, apparatus and system of verification information push and Information Authentication
CN110868377B (en) Method and device for generating network attack graph and electronic equipment
CN114327803A (en) Method, apparatus, device and medium for accessing machine learning model by block chain
CN104253714A (en) Monitoring method, system, browser and server
CN104639521A (en) Application safety verification method and system, application server and application client
CN113766487B (en) Cloud mobile phone information acquisition method, device, equipment and medium
CN109495378A (en) Detect method, apparatus, server and the storage medium of abnormal account number
CN109150621A (en) Method, apparatus, computer equipment and the storage medium of monitoring business flowpath
CN110324673A (en) A kind of processing method and processing device that network connection is abnormal
CN105635048B (en) Service request processing method and device
CN110248211B (en) Live broadcast room message current limiting method and device, electronic equipment and storage medium
CN106507300A (en) A kind of method for giving loss terminal for change, device and terminal
CN115038062A (en) A Bluetooth authentication method, device and device
CN113242301A (en) Method and device for selecting real server, computer equipment and storage medium
CN105577621B (en) Business operation verification method, device and system
CN110858132B (en) Configuration security detection method and device for printing equipment
CN115242608B (en) Alarm information generation method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200327

RJ01 Rejection of invention patent application after publication