CN111541818A - Fraud prevention method for screening, classifying and intercepting suspicious numbers based on big data - Google Patents
Fraud prevention method for screening, classifying and intercepting suspicious numbers based on big data Download PDFInfo
- Publication number
- CN111541818A CN111541818A CN202010278281.2A CN202010278281A CN111541818A CN 111541818 A CN111541818 A CN 111541818A CN 202010278281 A CN202010278281 A CN 202010278281A CN 111541818 A CN111541818 A CN 111541818A
- Authority
- CN
- China
- Prior art keywords
- fraud
- phone
- suspicious
- fraud prevention
- base station
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/2281—Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6027—Fraud preventions
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Technology Law (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The invention discloses a fraud prevention method for screening, classifying and intercepting suspicious numbers based on big data, which comprises the following steps of setting telephone number zone values: when the area value of the active calling number call reaches the threshold value, the phone fraud prevention identification software actively identifies the active calling number at the moment, fraud phone number marking is not carried out, and the network base station carries out manual auditing at the moment. According to the fraud prevention method for screening, classifying and intercepting suspicious numbers based on big data, the telephone fraud prevention recognition software is connected with the network base station by constructing the network base station, the suspicious number fraud prevention is preliminarily prevented by marking fraud telephone numbers, voice prompt and call transfer, the purpose of deeply preventing the suspicious number fraud is achieved by matching with telephone number region value setting and suspicious number mining analysis, the suspicious number is screened, classified and intercepted, and the effect of preventing telecommunication fraud is effectively improved.
Description
Technical Field
The invention relates to the technical field of anti-telecommunication fraud, in particular to a fraud prevention method for discriminating, classifying and intercepting suspicious numbers based on big data.
Background
It has been found through research that fraud telephones generally consist of two classes of telephones with distinct characteristics, which are determined by the criminal skills of telephone fraud. The first category of fraud phones feature significant high frequency calls, with high calling frequency, high called dispersion, average call duration, low call completion rate, ringing duration, called key press, and other call features, mainly because criminals use the call platform to perform group call scanning at this stage to find potential victims. The second category of components of fraud phones has a calling number change feature, and criminals typically modify the calling number to be similar or identical to a number of a domestic public inspection authority or the like, so as to implement fraud in a role of counterfeiting a public inspection authority or the like.
The existing fraud prevention method for suspicious numbers can directly find fraud calls and other illegal calls mostly through monitoring and auditing voice contents, but because the suspicious call volume is huge, huge manpower and police force are required to be invested only by manual auditing, the suspicious calls cannot be handled practically, and a large number of missed fishes exist.
Disclosure of Invention
Technical problem to be solved
Aiming at the defects of the prior art, the invention provides a fraud prevention method for screening, classifying and intercepting suspicious numbers based on big data, and solves the problems that the existing fraud prevention method for suspicious numbers has huge suspicious call volume through monitoring and auditing voice contents, and only depends on manual auditing, and huge manpower and police force are required to be invested.
(II) technical scheme
In order to achieve the purpose, the invention is realized by the following technical scheme: a fraud prevention method for screening, classifying and intercepting suspicious numbers based on big data specifically comprises the following steps:
s1, constructing a network base station: establishing a network base station, accessing the telephone fraud prevention identification software to the network base station through a wireless communication module, and synchronously displaying the calling number identified by the telephone fraud prevention identification software by the network base station;
s2, fraud call reminding: after the network base station marks or the phone anti-fraud interception software marks the fraud phone number, when the marked fraud phone actively calls, the called number phone has a voice prompt, and when the number of times of marking the phone number reaches a threshold value and the marked fraud phone actively calls, the call is transferred;
s3, setting a telephone number zone value: when the area value called by the active calling number reaches the threshold value, the phone fraud prevention identification software actively identifies the active calling number at the moment, the fraud phone number marking is not carried out, the network base station carries out manual auditing at the moment, and the audited result gives an instruction to the phone fraud prevention interception software through the wireless feedback module;
s4, suspicious number mining analysis: extracting a large number of telephone numbers from the big data, mining and analyzing according to the calling feature model to generate suspicious numbers, marking by using a network base station, and recording the suspicious numbers on a case;
s5, fraud telephone number handling: after the fraud phone numbers are screened out in S1-S5, the network base station will read the IP addresses of the phone numbers, and at this time, the network base station is connected with the alarm center, and the fraud phone numbers are handed over to the alarm center for processing.
Preferably, the phone fraud prevention recognition software in S1 actively recognizes the active call times greater than 90 times/month of the phone number, the alarm phone number and the blacklist phone number, and actively recognizes any one of the active call times greater than 90 times/month of the phone number, the alarm phone number and the blacklist phone number when the number of active calls occurs.
Preferably, when the voice prompts in S2, the announcement is performed before the marked fraud phone actively calls through, and the threshold value of the phone number marked as call forwarding in S2 is 300 times/month.
Preferably, the area value of the active calling number call in S3 reaches a threshold value of three urban areas or two different provinces.
Preferably, the content manually checked in S3 is that the phone number to be checked is actively called, then the manually checked content is recorded in a record, and the manually checked content is recorded in the whole process.
Preferably, the instruction to the phone anti-fraud interception software in S3 is to mark as a fraud phone number or not to mark as a fraud phone number.
Preferably, when mining is performed according to the call feature model in S4, the call feature includes any one or a combination of the active call duration, the number of times of the individual registered phone numbers, and the reputation score of the phone number.
Preferably, when the network base station in S5 is connected to the alarm center, the connection includes any one or a combination of a wireless communication connection and an active call connection.
(III) advantageous effects
The invention provides a fraud prevention method for screening, classifying and intercepting suspicious numbers based on big data. Compared with the prior art, the method has the following beneficial effects: the fraud prevention method for screening, classifying and intercepting suspicious numbers based on big data comprises the following steps that (S1) the network base station is constructed: establishing a network base station, accessing the telephone fraud prevention identification software to the network base station through a wireless communication module, and synchronously displaying the calling number identified by the telephone fraud prevention identification software by the network base station; s2, fraud call reminding: after the network base station marks or the phone anti-fraud interception software marks the fraud phone number, when the marked fraud phone actively calls, the called number phone has a voice prompt, and when the number of times of marking the phone number reaches a threshold value and the marked fraud phone actively calls, the call is transferred; s3, setting a telephone number zone value: when the area value called by the active calling number reaches the threshold value, the phone fraud prevention identification software actively identifies the active calling number at the moment, the fraud phone number marking is not carried out, the network base station carries out manual auditing at the moment, and the audited result gives an instruction to the phone fraud prevention interception software through the wireless feedback module; s4, suspicious number mining analysis: extracting a large number of telephone numbers from the big data, mining and analyzing according to the calling feature model to generate suspicious numbers, marking by using a network base station, and recording the suspicious numbers on a case; s5, fraud telephone number handling: after the fraud phone numbers are screened out in S1-S5, the network base station will read the IP addresses of the phone numbers, at this time, the network base station is connected with the alarm center, the fraud phone numbers are handed over to the alarm center for processing, the telephone fraud prevention recognition software is connected with the network base station by constructing the network base station, the fraud of suspicious numbers is preliminarily prevented by utilizing the fraud-marked telephone numbers, voice prompt and call transfer, manual audit is carried out after the area value of active calling number calling reaches the threshold value in cooperation with the setting of the area value of the telephone numbers, the suspicious numbers are mined and analyzed, a large number of telephone numbers are extracted from big data, and meanwhile, the IP address of the fraud telephone number is read and connected with the alarm center, so that the purpose of deeply preventing the suspicious number fraud is achieved, the suspicious number is screened, classified and intercepted, and the effect of preventing telecommunication fraud is effectively improved.
Drawings
FIG. 1 is a flow chart of the method for screening, classifying, intercepting and anti-fraud of suspicious numbers according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an embodiment of the present invention provides a technical solution: a fraud prevention method for screening, classifying and intercepting suspicious numbers based on big data specifically comprises the following steps:
s1, constructing a network base station: establishing a network base station, accessing the telephone fraud prevention identification software to the network base station through a wireless communication module, and synchronously displaying the calling number identified by the telephone fraud prevention identification software by the network base station;
s2, fraud call reminding: after the network base station marks or the phone anti-fraud interception software marks the fraud phone number, when the marked fraud phone actively calls, the called number phone has a voice prompt, and when the number of times of marking the phone number reaches a threshold value and the marked fraud phone actively calls, the call is transferred;
s3, setting a telephone number zone value: when the area value called by the active calling number reaches the threshold value, the phone fraud prevention identification software actively identifies the active calling number at the moment, the fraud phone number marking is not carried out, the network base station carries out manual auditing at the moment, and the audited result gives an instruction to the phone fraud prevention interception software through the wireless feedback module;
s4, suspicious number mining analysis: extracting a large number of telephone numbers from the big data, mining and analyzing according to the calling feature model to generate suspicious numbers, marking by using a network base station, and recording the suspicious numbers on a case;
s5, fraud telephone number handling: after the fraud phone numbers are screened out in S1-S5, the network base station will read the IP addresses of the phone numbers, and at this time, the network base station is connected with the alarm center, and the fraud phone numbers are handed over to the alarm center for processing.
In the invention, the telephone anti-fraud recognition software in S1 can actively recognize the active call times which are more than 90 times/month telephone number, alarm telephone number and blacklist telephone number, and when any one of the active call times which are more than 90 times/month telephone number, alarm telephone number and blacklist telephone number appears, the active call times can be actively recognized.
In the present invention, when the voice prompt is performed in S2, the announcement is performed before the marked fraud phone actively calls through, and the threshold value for marking the phone number as call forwarding in S2 is 300 times/month.
In the present invention, the threshold reached by the area value of the active calling number call in S3 is three urban areas or two different provinces.
In the invention, the manually checked content in the S3 is that the checked telephone number is actively called, then the manually checked content is recorded in a case, and the manually checked content is recorded in the whole process.
In the present invention, the instruction to the phone anti-fraud interception software in S3 is marked as a fraud phone number or not marked as a fraud phone number.
In the present invention, when mining is performed according to the call feature model in S4, the call feature includes any one or a combination of the active call time, the number of times of the individual registered phone number, and the credit score of the phone number.
In the invention, when the network base station in S5 is connected to the alarm center, the connection includes any one or combination of wireless communication connection and active call connection.
And those not described in detail in this specification are well within the skill of those in the art.
In conclusion, the telephone fraud prevention recognition software is connected with the network base station by constructing the network base station, the fraud telephone number marking, voice prompt and call transfer are utilized to achieve preliminary suspicious number fraud prevention, manual audit is performed after the area value of the active calling number call reaches the threshold value in cooperation with the setting of the area value of the telephone number, the suspicious number mining analysis is performed in cooperation with the large data, a large number of telephone numbers are extracted, the IP addresses of the fraud telephone numbers are read and connected with the alarm center, the purpose of deeply preventing suspicious number fraud is achieved, the suspicious numbers are classified and intercepted, and the effect of preventing telecommunication fraud is effectively improved.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (8)
1. A fraud prevention method for screening, classifying and intercepting suspicious numbers based on big data is characterized in that: the method specifically comprises the following steps:
s1, constructing a network base station: establishing a network base station, accessing the telephone fraud prevention identification software to the network base station through a wireless communication module, and synchronously displaying the calling number identified by the telephone fraud prevention identification software by the network base station;
s2, fraud call reminding: after the network base station marks or the phone anti-fraud interception software marks the fraud phone number, when the marked fraud phone actively calls, the called number phone has a voice prompt, and when the number of times of marking the phone number reaches a threshold value and the marked fraud phone actively calls, the call is transferred;
s3, setting a telephone number zone value: when the area value called by the active calling number reaches the threshold value, the phone fraud prevention identification software actively identifies the active calling number at the moment, the fraud phone number marking is not carried out, the network base station carries out manual auditing at the moment, and the audited result gives an instruction to the phone fraud prevention interception software through the wireless feedback module;
s4, suspicious number mining analysis: extracting a large number of telephone numbers from the big data, mining and analyzing according to the calling feature model to generate suspicious numbers, marking by using a network base station, and recording the suspicious numbers on a case;
s5, fraud telephone number handling: after the fraud phone numbers are screened out in S1-S5, the network base station will read the IP addresses of the phone numbers, and at this time, the network base station is connected with the alarm center, and the fraud phone numbers are handed over to the alarm center for processing.
2. The fraud prevention method of big-data-based suspicious number screening classification and interception according to claim 1, wherein: the phone fraud prevention recognition software in S1 actively recognizes the active call times that are greater than 90 phone numbers per month, the alarm phone number, and the blacklist phone number, and actively recognizes any one of the active call times that are greater than 90 phone numbers per month, the alarm phone number, and the blacklist phone number when they occur.
3. The fraud prevention method of big-data-based suspicious number screening classification and interception according to claim 1, wherein: when the voice prompts in S2, the announcement is performed before the marked fraud phone actively calls through, and the threshold value of the phone number marked as call forwarding in S2 is 300 times/month.
4. The fraud prevention method of big-data-based suspicious number screening classification and interception according to claim 1, wherein: the area value of the active calling number call in S3 reaches a threshold of three urban areas or two different provinces.
5. The fraud prevention method of big-data-based suspicious number screening classification and interception according to claim 1, wherein: in the step S3, the manually checked content is that the phone number to be checked is actively called, then the manually checked content is recorded on a record, and the manually checked content is recorded in the whole process.
6. The fraud prevention method of big-data-based suspicious number screening classification and interception according to claim 1, wherein: the instruction to the phone anti-fraud interception software in said S3 is to mark as a fraud phone number or not as a fraud phone number.
7. The fraud prevention method of big-data-based suspicious number screening classification and interception according to claim 1, wherein: when mining is performed according to the call feature model in S4, the call feature includes any one or a combination of the active call duration, the number of times of the individual registered phone number, and the credit score of the phone number.
8. The fraud prevention method of big-data-based suspicious number screening classification and interception according to claim 1, wherein: when the network base station in S5 is connected to the alarm center, the connection may include any one or a combination of a wireless communication connection and an active call connection.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010278281.2A CN111541818A (en) | 2020-04-10 | 2020-04-10 | Fraud prevention method for screening, classifying and intercepting suspicious numbers based on big data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010278281.2A CN111541818A (en) | 2020-04-10 | 2020-04-10 | Fraud prevention method for screening, classifying and intercepting suspicious numbers based on big data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111541818A true CN111541818A (en) | 2020-08-14 |
Family
ID=71974894
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010278281.2A Pending CN111541818A (en) | 2020-04-10 | 2020-04-10 | Fraud prevention method for screening, classifying and intercepting suspicious numbers based on big data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111541818A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114338617A (en) * | 2021-12-23 | 2022-04-12 | 上海欣方智能系统有限公司 | Audio and video auditing method and illegal number identification method based on video call |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1297680A1 (en) * | 2000-05-22 | 2003-04-02 | MCI Worldcom, Inc. | Fraud detection based on call attempt velocity on terminating number |
CN104243727A (en) * | 2014-10-15 | 2014-12-24 | 上海欣方智能系统有限公司 | System and method for performing big data analysis confirmation and interception on phone scams |
CN104702800A (en) * | 2013-12-04 | 2015-06-10 | 中国移动通信集团公司 | Harassing number identifying method, device and system |
US20150281431A1 (en) * | 2010-09-07 | 2015-10-01 | Securus Technologies | Multi-party conversation analyzer & logger |
US20150288791A1 (en) * | 2014-04-03 | 2015-10-08 | Wavemarket, Inc. | Telephone fraud management system and method |
CN106534596A (en) * | 2016-10-31 | 2017-03-22 | 努比亚技术有限公司 | Anti-harassment call filtering method and filtering system thereof |
CN106970911A (en) * | 2017-03-28 | 2017-07-21 | 广州中国科学院软件应用技术研究所 | A kind of strick precaution telecommunication fraud system and method based on big data and machine learning |
CN108134998A (en) * | 2017-12-05 | 2018-06-08 | 南京南邮信息产业技术研究院有限公司 | Information fraud method for early warning and system based on mobile big data |
CN108156332A (en) * | 2017-12-26 | 2018-06-12 | 中国联合网络通信集团有限公司 | The acquisition methods and device of fraudulent call |
CN109429230A (en) * | 2017-08-28 | 2019-03-05 | 中国移动通信集团浙江有限公司 | A kind of communication swindle recognition methods and system |
CN110167030A (en) * | 2018-02-11 | 2019-08-23 | 中国移动通信集团广东有限公司 | Identify method, apparatus, electronic equipment and the storage medium of harassing call |
CN110581924A (en) * | 2018-06-07 | 2019-12-17 | 中国电信股份有限公司 | Method and system for prompting risk of fraud |
-
2020
- 2020-04-10 CN CN202010278281.2A patent/CN111541818A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1297680A1 (en) * | 2000-05-22 | 2003-04-02 | MCI Worldcom, Inc. | Fraud detection based on call attempt velocity on terminating number |
US20150281431A1 (en) * | 2010-09-07 | 2015-10-01 | Securus Technologies | Multi-party conversation analyzer & logger |
CN104702800A (en) * | 2013-12-04 | 2015-06-10 | 中国移动通信集团公司 | Harassing number identifying method, device and system |
US20150288791A1 (en) * | 2014-04-03 | 2015-10-08 | Wavemarket, Inc. | Telephone fraud management system and method |
CN104243727A (en) * | 2014-10-15 | 2014-12-24 | 上海欣方智能系统有限公司 | System and method for performing big data analysis confirmation and interception on phone scams |
CN106534596A (en) * | 2016-10-31 | 2017-03-22 | 努比亚技术有限公司 | Anti-harassment call filtering method and filtering system thereof |
CN106970911A (en) * | 2017-03-28 | 2017-07-21 | 广州中国科学院软件应用技术研究所 | A kind of strick precaution telecommunication fraud system and method based on big data and machine learning |
CN109429230A (en) * | 2017-08-28 | 2019-03-05 | 中国移动通信集团浙江有限公司 | A kind of communication swindle recognition methods and system |
CN108134998A (en) * | 2017-12-05 | 2018-06-08 | 南京南邮信息产业技术研究院有限公司 | Information fraud method for early warning and system based on mobile big data |
CN108156332A (en) * | 2017-12-26 | 2018-06-12 | 中国联合网络通信集团有限公司 | The acquisition methods and device of fraudulent call |
CN110167030A (en) * | 2018-02-11 | 2019-08-23 | 中国移动通信集团广东有限公司 | Identify method, apparatus, electronic equipment and the storage medium of harassing call |
CN110581924A (en) * | 2018-06-07 | 2019-12-17 | 中国电信股份有限公司 | Method and system for prompting risk of fraud |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114338617A (en) * | 2021-12-23 | 2022-04-12 | 上海欣方智能系统有限公司 | Audio and video auditing method and illegal number identification method based on video call |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109600752B (en) | Deep clustering fraud detection method and device | |
CN101350957B (en) | Method and equipment for shielding rubbish short message | |
CN103095889B (en) | Junk call intercepting system based on talk mode identification and operating method thereof | |
CN110072019A (en) | A kind of method and device shielding harassing call | |
CN113794805B (en) | A detection method and detection system for GOIP fraud calls | |
CN107770777B (en) | Method for identifying recorded fraud calls | |
CN107197463A (en) | A kind of detection method of telephone fraud, storage medium and electronic equipment | |
CN108243049B (en) | Telecommunication fraud identification method and device | |
CN113067947A (en) | Anti-fraud solution method and system based on intelligent outbound | |
CN112751835B (en) | Flow early warning method, system, equipment and storage medium | |
CN111131593B (en) | Crank call identification method and device | |
CN110611929A (en) | Abnormal user identification method and device | |
CN114169438A (en) | A telecommunication network fraud identification method, device, equipment and storage medium | |
CN101674557B (en) | Method and device for detecting whether missed calls are valid or not | |
CN110536302A (en) | Telecommunication fraud based reminding method and device | |
CN108810290B (en) | Method and system for identifying fraudulent calls | |
US20200045169A1 (en) | Communications network | |
CN111541818A (en) | Fraud prevention method for screening, classifying and intercepting suspicious numbers based on big data | |
CN114339639B (en) | Call identification method, device, storage medium and electronic equipment | |
CN114449106B (en) | Method, device, equipment and storage medium for identifying abnormal telephone number | |
CN115659217A (en) | Fraud recognition model training method and device, electronic equipment and storage medium | |
KR20170006158A (en) | System and method for detecting fraud usage of message | |
CN103167502A (en) | Method of punishing illegal calling based on over-the-air (OTA) technology | |
CN109819125A (en) | A kind of method and device limiting telecommunication fraud | |
CN108259688A (en) | VoIP platforms telephone fraud behavioral value method, apparatus and detecting system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200814 |