CN109819125A - A kind of method and device limiting telecommunication fraud - Google Patents
A kind of method and device limiting telecommunication fraud Download PDFInfo
- Publication number
- CN109819125A CN109819125A CN201711158270.5A CN201711158270A CN109819125A CN 109819125 A CN109819125 A CN 109819125A CN 201711158270 A CN201711158270 A CN 201711158270A CN 109819125 A CN109819125 A CN 109819125A
- Authority
- CN
- China
- Prior art keywords
- information
- swindle
- suspicious
- fraud
- call
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a kind of method and devices for limiting telecommunication fraud, are related to telecommunication fraud technical field, and method includes: fraud analysis system by carrying out screening to the communication information on communication network, obtain the suspicious swindle communication information;The fraud analysis system carries out matching treatment using the swindle keyword being previously obtained, to the suspicious swindle communication information, and the suspicious swindle communication information that will match to is determined as really swindling the communication information;The fraud analysis system stops the propagation of the true swindle communication information in a communication network.
Description
Technical field
The present invention relates to telecommunication fraud technical field, in particular to a kind of method and device for limiting telecommunication fraud.
Background technique
In recent years, crime active day benefit wildness is swindled by the communication information of representative of fraudulent call, believed in view of Current communications
The sternness of breath swindle situation and the complication of fraud tactics, the single risk prevention instruments established on single data resource are difficult to have
Effect solves the problems, such as telecommunication fraud.
Summary of the invention
The technical issues of scheme provided according to embodiments of the present invention solves is that single data resource cannot be solved effectively
Certainly telecommunication fraud.
A kind of method of the limitation telecommunication fraud provided according to embodiments of the present invention, comprising:
Fraud analysis system obtains the suspicious swindle communication information by carrying out screening to the communication information on communication network;
The fraud analysis system is using the swindle keyword being previously obtained, to the suspicious swindle communication information progress
With processing, and the suspicious swindle communication information that will match to is determined as really swindling the communication information;
The fraud analysis system stops the propagation of the true swindle communication information in a communication network.
Preferably, the fraud analysis system obtains suspicious swindleness by carrying out screening to the communication information on communication network
Deceiving the communication information includes:
The fraud analysis system obtains the relaying of call-information by analyzing the call-information on communication network
Point coding and IP address;
The fraud analysis system is by the relaying point coding and IP address of obtained call-information and preconfigured relaying
Point coding and IP address carry out matching treatment;
If the relaying point coding and IP address of obtained call-information are matched with preconfigured relaying point coding and IP address
Failure, then the fraud analysis system is using the call-information as suspicious swindle call-information.
Preferably, the fraud analysis system obtains suspicious swindleness by carrying out screening to the communication information on communication network
Deceiving the communication information includes:
The fraud analysis system obtains the feature of short message by analyzing the short message on communication network
Finger print information;
The fraud analysis system refers to the middle characteristic fingerprint information of obtained short message with preset swindle feature
Line sample database carries out matching treatment;
If the middle characteristic fingerprint information of obtained short message and preset swindle characteristic fingerprint sample database successful match,
Then the fraud analysis system is using the short message as suspicious fraud text message information.
Preferably, the fraud analysis system is using the swindle keyword being previously obtained, to the suspicious swindle communication letter
Breath carry out matching treatment, and the suspicious swindle communication information that will match to be determined as really swindling the communication information include:
The fraud analysis system carries out recording processing by the call to the suspicious swindle call-information, is recorded
File;
Obtained calling record file is converted call text file by the fraud analysis system, and is obtained using preparatory
The swindle keyword arrived carries out matching treatment to the call text file;
If the swindle keyword and the call text file successful match, fraud analysis system is by the suspicious swindleness
Call-information is deceived to be determined as really swindling call-information.
Preferably, the fraud analysis system is using the swindle keyword being previously obtained, to the suspicious swindle communication letter
Breath carry out matching treatment, and the suspicious swindle communication information that will match to be determined as really swindling the communication information include:
The fraud analysis system will carry out the suspicious fraud text message information using the swindle keyword being previously obtained
Matching treatment;
If the swindle keyword being previously obtained and the call text file successful match, the fraud analysis system will
The suspicious fraud text message information is determined as true fraud text message information.
A kind of device of the limitation telecommunication fraud provided according to embodiments of the present invention, comprising:
Module is obtained, for obtaining the suspicious swindle communication information by carrying out screening to the communication information on communication network;
Determining module, for being matched to the suspicious swindle communication information using the swindle keyword being previously obtained
Processing, and the suspicious swindle communication information that will match to is determined as really swindling the communication information;
Processing module is swindled, for stopping the propagation of the true swindle communication information in a communication network.
Preferably, the acquisition module includes:
Speaking analysis unit, for obtaining in call-information by analyzing the call-information on communication network
After point coding and IP address;
It converses matching unit, for by the relaying point coding and IP address of obtained call-information and preconfigured relaying
Point coding and IP address carry out matching treatment;
Call acquiring unit, for when the relaying point coding and IP address of obtained call-information and preconfigured relaying
It fails to match for point coding and IP address, then using the call-information as suspicious swindle call-information.
Preferably, the acquisition module includes:
Short message analytical unit, for obtaining the spy of short message by analyzing the short message on communication network
Levy finger print information;
Short message matching unit, for referring to the middle characteristic fingerprint information of obtained short message with preset swindle feature
Line sample database carries out matching treatment;
Short message acquiring unit refers to for the middle characteristic fingerprint information when obtained short message with preset swindle feature
This storehouse matching of grain pattern success, then using the short message as suspicious fraud text message information.
A kind of equipment of the limitation telecommunication fraud provided according to embodiments of the present invention, the equipment include: processor, and
With the memory of processor coupling;The limitation telecommunication fraud that can be run on the processor is stored on the memory
Program, the program of the limitation telecommunication fraud when being executed by the processor realization includes:
By carrying out screening to the communication information on communication network, the suspicious swindle communication information is obtained;
Using the swindle keyword being previously obtained, matching treatment is carried out to the suspicious swindle communication information, and will matching
To the suspicious swindle communication information be determined as really swindling the communication information;
Stop the propagation of the true swindle communication information in a communication network.
A kind of computer storage medium provided according to embodiments of the present invention stores the program of restricted telecommunication fraud, institute
The program for stating limitation telecommunication fraud, which is realized when being executed by processor, includes:
By carrying out screening to the communication information on communication network, the suspicious swindle communication information is obtained;
Using the swindle keyword being previously obtained, matching treatment is carried out to the suspicious swindle communication information, and will matching
To the suspicious swindle communication information be determined as really swindling the communication information;
Stop the propagation of the true swindle communication information in a communication network.
The scheme provided according to embodiments of the present invention, by integrating multi-source data, using the swindle electricity of Behavior-based control feature
Analysis detection is talked about, short message is analyzed and detects a variety of methods and dimension, detects to telecommunication fraud, realizes that swindle event is closed
Connection, discovery telecommunication fraud behavior in real time or quasi real time, effectively contain telecommunication fraud sprawling, for ensure people's property safety and
Social stability provides reliable technological means and supports.
Detailed description of the invention
Fig. 1 is a kind of method flow diagram for limiting telecommunication fraud provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic device for limiting telecommunication fraud provided in an embodiment of the present invention;
Fig. 3 is the anti-swindle system construction drawing of telecommunications provided in an embodiment of the present invention;
Fig. 4 is fraudulent call calling behavioural analysis strategy schematic diagram provided in an embodiment of the present invention;
Fig. 5 is that anti-fraudulent call system recording file provided in an embodiment of the present invention turns text keyword filtering process figure;
Fig. 6 is anti-fraud text message broad sense digital supervision flow chart provided in an embodiment of the present invention;
Fig. 7 is anti-fraud text message characteristic fingerprint monitoring process flow diagram provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with attached drawing to a preferred embodiment of the present invention will be described in detail, it should be understood that described below is excellent
Select embodiment only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention.
Fig. 1 is a kind of method flow diagram for limiting telecommunication fraud provided in an embodiment of the present invention, as shown in Figure 1, comprising:
Step S101: fraud analysis system obtains suspicious swindle by carrying out screening to the communication information on communication network
The communication information;
Step S102: the fraud analysis system communicates the suspicious swindle using the swindle keyword being previously obtained
Information carries out matching treatment, and the suspicious swindle communication information that will match to is determined as really swindling the communication information;
Step S103: the fraud analysis system stops the propagation of the true swindle communication information in a communication network.
Wherein, the fraud analysis system obtains suspicious swindle by carrying out screening to the communication information on communication network
The communication information includes: the fraud analysis system by analyzing the call-information on communication network, obtains call-information
Relaying point coding and IP address;The fraud analysis system is by the relaying point coding and IP address of obtained call-information and in advance
The relaying point coding and IP address of configuration carry out matching treatment;If the relaying point coding and IP address of obtained call-information and in advance
It fails to match for the relaying point coding and IP address of configuration, then the fraud analysis system is logical as suspicious swindle using the call-information
Talk about information.
Wherein, the fraud analysis system obtains suspicious swindle by carrying out screening to the communication information on communication network
The communication information includes: the fraud analysis system by analyzing the short message on communication network, obtains short message
Characteristic fingerprint information;The fraud analysis system is by the middle characteristic fingerprint information of obtained short message and preset swindle
Characteristic fingerprint sample database carries out matching treatment;If the middle characteristic fingerprint information of obtained short message and preset swindle feature
The success of sample fingerprint storehouse matching, then the fraud analysis system is using the short message as suspicious fraud text message information.
Wherein, the fraud analysis system is using the swindle keyword being previously obtained, to the suspicious swindle communication information
Matching treatment is carried out, and the suspicious swindle communication information that will match to is determined as really swindling the communication information including: the swindle
Analysis system carries out recording processing by the call to the suspicious swindle call-information, obtains recording file;The swindle point
Obtained calling record file is converted call text file by analysis system, and using the swindle keyword being previously obtained to institute
It states call text file and carries out matching treatment;It is described if the swindle keyword and the call text file successful match
Fraud analysis system is determined as the suspicious swindle call-information really to swindle call-information.
Wherein, the fraud analysis system is using the swindle keyword being previously obtained, to the suspicious swindle communication information
Matching treatment is carried out, and the suspicious swindle communication information that will match to is determined as really swindling the communication information including: the swindle
Analysis system will carry out matching treatment to the suspicious fraud text message information using the swindle keyword being previously obtained;If preparatory
The swindle keyword that arrives and the call text file successful match, then the fraud analysis system is by the suspicious fraud text message
Information is determined as true fraud text message information.
Fig. 2 is a kind of schematic device for limiting telecommunication fraud provided in an embodiment of the present invention, as shown in Figure 2, comprising: obtain
Modulus block 201, for obtaining the suspicious swindle communication information by carrying out screening to the communication information on communication network;Determine mould
Block 202 carries out matching treatment, and general to the suspicious swindle communication information for the swindle keyword that utilization is previously obtained
The suspicious swindle communication information being fitted on is determined as really swindling the communication information;Processing module 203 is swindled, it is described true for stopping
Swindle the propagation of the communication information in a communication network.
Wherein, the acquisition module 201 includes: speaking analysis unit, for by the call-information on communication network
It is analyzed, obtains the relaying point coding and IP address of call-information;It converses matching unit, for by obtained call-information
It relays point coding and IP address and preconfigured relaying point coding and IP address carries out matching treatment;Call acquiring unit, for working as
It fails to match for the relaying point coding and IP address of obtained call-information and preconfigured relaying point coding and IP address, then by institute
Call-information is stated as suspicious swindle call-information.
Wherein, the acquisition module 201 includes: short message analytical unit, for by the short message on communication network
It is analyzed, obtains the characteristic fingerprint information of short message;Short message matching unit, for by the middle spy of obtained short message
It levies finger print information and preset swindle characteristic fingerprint sample database carries out matching treatment;Short message acquiring unit, for when obtained
The middle characteristic fingerprint information of short message and preset swindle characteristic fingerprint sample database successful match, then make the short message
For suspicious fraud text message information.
The embodiment of the invention provides it is a kind of limit telecommunication fraud equipment, the equipment includes: processor, and with institute
State the memory of processor coupling;The journey for the limitation telecommunication fraud that can be run on the processor is stored on the memory
The program of sequence, the limitation telecommunication fraud realizes to include: when being executed by the processor
By carrying out screening to the communication information on communication network, the suspicious swindle communication information is obtained;
Using the swindle keyword being previously obtained, matching treatment is carried out to the suspicious swindle communication information, and will matching
To the suspicious swindle communication information be determined as really swindling the communication information;
Stop the propagation of the true swindle communication information in a communication network.
The embodiment of the invention provides a kind of computer storage mediums, store the program of restricted telecommunication fraud, the limit
It is realized when the program of telecommunication fraud processed is executed by processor and includes:
By carrying out screening to the communication information on communication network, the suspicious swindle communication information is obtained;
Using the swindle keyword being previously obtained, matching treatment is carried out to the suspicious swindle communication information, and will matching
To the suspicious swindle communication information be determined as really swindling the communication information;
Stop the propagation of the true swindle communication information in a communication network.
Fig. 3 is the anti-swindle system construction drawing of telecommunications provided in an embodiment of the present invention, as shown in Figure 3, comprising: in short message
The heart, fraud text message analysis detection system, core network signalling monitoring, fraudulent call analysis detection system, core net Boss, core net
MGW (Media Gate Way, Media Gateway);The short message service center connect with fraud text message analysis detection system communication, institute
It states core network signalling monitoring to connect with fraudulent call analysis detection system communication, the core net Boss and fraudulent call analysis inspection
Examining system communication connection, the core net MGW are connected with fraudulent call analysis detection system communication.
The fraudulent call analysis detection system calls behavior to user by full dose ticket and carries out policy monitor, for
The government and enterprises user for renting relaying, can identify interim after point coding and IP address in ticket, and dedicated monitoring strategies are arranged;To acceptance of the bid
Doubtful caller, system converses to it record after change into text and carry out keyword monitoring, by the high suspicious number of middle target
Manual examination and verification are sent, for the swindle number of manual examination and verification confirmation, fraudulent call analysis detection system queries go out the used number
All cell phone apparatus strings number, and number can more be swindled in anti-swindle system discovery according to cell phone apparatus string number.Mobile phone string
Number i.e. IMEI, IMEI is the abbreviation of mobile device international identity code, is made of 15 bit digitals, is corresponded with every mobile phone, should
Sets of numbers is that the whole world is unique.And this information can be recorded in message registration each time, therefore for determining
Number is swindled, system can be by its cell phone apparatus string typing blacklist, if finding identical mobile phone in system ticket again
String number, so that it may find its new calling number.
Fraudulent call analysis detection system can intercept fraudulent call by core net Boss network management interface.
Fraud text message analysis detection system can excavate fraud text message according to the swindle calling number of confirmation, and fraud text message is recorded
Enter fraud text message characteristic fingerprint sample database and do fingerprint monitoring, and the numeric string that can will contain in short message, address link extracts
It does generalized character numeral sample to be monitored, finds more swindle numbers.Anti- fraud text message analysis detection system can be to swindleness simultaneously
Deceive the called transmission reminding short message of number.
Fig. 4 is fraudulent call calling behavioural analysis strategy schematic diagram provided in an embodiment of the present invention, as shown in figure 4, this hair
Bright swindle telecommunication call behavior monitoring strategy, analyzes the user that the special time period number of calls reaches thresholding, and called number
Code dispersion is higher, is distributed in different geographical number section, and analysis strategy rents relaying for the government and enterprises user that fraudulent call takes place frequently,
Since calling number is uncertain, the identification condition for relaying Original Point Code and source IP ticket source can be increased
Government and enterprises relay ticket identification process:
1, government and enterprises user is created in systems;
2, relaying point coding, IP, the number section group that regional and calling number allows are distributed for each government and enterprises user;
3, when calling behavioural analysis, the point coding in ticket, IP information, if in the government and enterprises user point of system configuration are extracted
It is then government and enterprises' call within the scope of code, IP;
4, special monitoring strategies are set for government and enterprises' call, to calling behavior, calling number feature is not (in number of permission
In segment limit, the illegal number of changing);
5, network analysis goes out government and enterprises' relaying violation message registration, is matched to corresponding government and enterprises user according to point coding, IP and is directed to
Each government and enterprises user counts illegal talk times, illegal call accounting information.
Fig. 5 is that anti-fraudulent call system recording file provided in an embodiment of the present invention turns text keyword filtering process figure,
As shown in figure 5, fraudulent call keyword group is arranged in system, it, should if recording turns containing suspicious keyword in the content of text
Calling number is high suspicious fraudulent call, send whether manual examination and verification are added blacklist.
Fig. 6 is anti-fraud text message broad sense digital supervision flow chart provided in an embodiment of the present invention, as shown in fig. 6, swindle is short
The content change of letter is varied, but usually requires from fraud text message swindle purpose analysis, short message content comprising connection electricity
The important informations such as words, account No., harmful address link;And due to many reasons such as cost and replacement difficulty, these information phases
It is fixed to comparing, is the characteristic information in fraud text message with obvious characteristic and comparison fixation.
Broad sense digital supervision using in short message content telephone number or Bank Account Number digital information as fraud text message know
Other breach, as core identification element, is effectively found by the telephone number information for including in fraud text message and shields swindleness
Deceive all kinds of mutation of short message.
The number such as telephone number, account included in fraud text message is not simple Arabic numerals, rubbish at present
Short message sends user in order to avoid intercepted, and often interted wherein various " numbers ": Arabic numerals, Chinese are simple
Body number, traditional font number, homophonic number, the number of tape symbol, " number " of these forms of expression multiplicity is called broad sense by we
Number.
Anti- fraud text message analysis detection system intialization broad sense digital library and spcial character library, can configure includes Arabic number
Word, Simplified Chinese digital (such as one, two, three), traditional font digital (such as one, two, three), homophonic number, the number of tape symbol are (1.,
), the number (such as 1,1,4) that is indicated with full-shape or upper subscript.First the broad sense number in short message content is replaced after receiving short message
Arabic numerals are changed to, are then analyzed again.
Swindler is interference monitoring, adds the characters such as *, space in short message content sometimes.These are showed shape by we
The character of formula multiplicity is known as spcial character.Spcial character library is configurable, including *, space character etc..It first will be short after receiving short message
Believe the spcial character removal in content, then analyzes again.
Broad sense digital extraction process:
1, original short message: with regard to poor 200,000? generation cyclopentadienyl Wulihe helps the flat rare quasi- existing apartment of your polishing 150 to buy now vertical to subtract 20
Ten thousand!T6 hard-cover hotel apartment 20,000 supports 50,000, guarantees 10% income;It gets and has just earned 13 9 88*88 connection 6666;
2, pretreatment (replacement of broad sense number and spcial character filtering): just poor 20 all ages cyclopentadienyl Wulihe helps your polishing 150 flat
The golden rare quasi- existing apartment in corridor buys the vertical 200,000 T6 hard-cover hotel apartments 20,000 that subtract to 50,000 now, guarantees 10% income, gets and just earn
1398888 6666;
3, minimum length (number of characters) judgement (>=3) of single consecutive numbers field: 20 (invalid), 150 (effective), 20 (nothings
Effect), 6 (invalid), 2 (invalid), 5 (invalid), 10 (invalid), 1398888 (effective), 6666 (effective);
4, the minimum range (number of characters) of two consecutive numbers fields judges (≤4): 150 (effective), and 13988886666 (close
And);
5, effective feature vector length range (number of characters) judgement (7~16): the broad sense number feature vector of extraction:
13988886666。
Fig. 7 is anti-fraud text message characteristic fingerprint monitoring process flow diagram provided in an embodiment of the present invention, as shown in fig. 7, being
System supports most 1,000,000 fraud text message samples of typing, each calling number is sent in real time short message content and sample content into
Row characteristic fingerprint similarity compares, and configurable features fingerprint monitoring strategies: similarity threshold (such as similarity up to 80%), specified
Meet the item number thresholding (having sent ten short messages for meeting similarity in such as one hour) of similarity in duration.When some calling number
The short message of transmission meets characteristic fingerprint strategy, then the number is hit.
Real-time characteristic fingerprint monitors process:
1, swindle sample short message processing: system supports million fraud text message samples of typing, and every sample preprocessing (is gone
Except spcial character), fragment calculates Hash hashed value, and is synchronized to Installed System Memory by the sequence of fragment hashed value
2, characteristic fingerprint real time monitoring is handled: the short message that system in real time sends user is pressed at the same steps of sample fragment
Reason compares piecewise after carrying out the sequence of fragment hash value and calculates similarity.
3, same caller characteristic fingerprint monitoring strategies are handled: the single calling number of system-computed reaches fingerprint in specific duration
The short message item number of similarity such as reaches configured threshold (such as 1 hour 10 similarity is 80% or more), then digs the calling number
It excavates and.
Specific step is as follows for the anti-swindle system of the embodiment of the present invention:
101, fraudulent call analysis detection system reads full dose ticket from core network signalling monitoring system in real time;
102, fraudulent call analysis detection system analyzes full dose ticket by the monitoring strategies of setting, rents government and enterprises
By point coding, special monitoring strategies are arranged in IP range, and converse the suspicious caller for reaching tactful thresholding and take out for relaying call
Sample recording, saves recording file;
103, recording file is converted text by fraudulent call analysis detection system, and to text by setting keyword into
Row monitoring, send manual examination and verification to the sample containing keyword.
104, to the swindle number of manual examination and verification confirmation, the support of fraudulent call analysis detection system, which inquires, used the swindleness
The cell phone apparatus string imei of number is deceived, and more used the doubtful number of the mobile phone by the discovery of equipment string number
105, fraudulent call analysis detection system can pass through and core net Boss network management interface shuts down call function.
106, to the swindle number of manual examination and verification confirmation, fraud text message analysis system is supported to analyze its short message content and is called
Victim, to find new swindle case scene and swindle partner.
107, fraud text message analysis detection system is automatically added to characteristic fingerprint sample database from the fraud text message that will confirm that, and from
Broad sense numeral sample is extracted in fraud text message and address link sample is automatically added to broad sense numeral sample library
108, fraud text message analysis detection system is according to the swindle characteristic fingerprint sample and broad sense numeral sample of system configuration
It is analyzed in real time with monitoring strategies, it is found that these numbers are sent swindle electricity by more swindle numbers and victim again simultaneously
Words analysis detection system is analyzed.
109, fraud text message analysis detection system supports the called number to swindle number to send making prompting short message, and will
It swindles number and blacklist is added, intercept the short message of its transmission.
The scheme provided according to embodiments of the present invention, swindle monitoring system creation call, message monitoring strategy, sms center
Decide whether to intercept short message by system response, send reminding short message, core net intercepts fraudulent call by blacklist, in real time
Or discovery telecommunication fraud behavior quasi real time, contain the sprawling of telecommunication fraud, effectively to ensure that people's property safety and society are steady
Surely reliable technological means is provided to support.
Although describing the invention in detail above, but the invention is not restricted to this, those skilled in the art of the present technique
It can be carry out various modifications with principle according to the present invention.Therefore, all to be modified according to made by the principle of the invention, all it should be understood as
Fall into protection scope of the present invention.
Claims (10)
1. a kind of method for limiting telecommunication fraud, comprising:
Fraud analysis system obtains the suspicious swindle communication information by carrying out screening to the communication information on communication network;
The fraud analysis system carries out at matching the suspicious swindle communication information using the swindle keyword being previously obtained
Reason, and the suspicious swindle communication information that will match to is determined as really swindling the communication information;
The fraud analysis system stops the propagation of the true swindle communication information in a communication network.
2. according to the method described in claim 1, the fraud analysis system is by carrying out the communication information on communication network
Screening, obtaining the suspicious swindle communication information includes:
The fraud analysis system obtains the relaying point coding of call-information by analyzing the call-information on communication network
And IP address;
The fraud analysis system is by the relaying point coding and IP address of obtained call-information and preconfigured relaying point coding
Matching treatment is carried out with IP address;
If it fails to match for the relaying point coding and IP address of obtained call-information and preconfigured relaying point coding and IP address,
Then the fraud analysis system is using the call-information as suspicious swindle call-information.
3. according to the method described in claim 1, the fraud analysis system is by carrying out the communication information on communication network
Screening, obtaining the suspicious swindle communication information includes:
The fraud analysis system obtains the characteristic fingerprint of short message by analyzing the short message on communication network
Information;
The fraud analysis system is by the middle characteristic fingerprint information of obtained short message and preset swindle characteristic fingerprint sample
This library carries out matching treatment;
If the middle characteristic fingerprint information of obtained short message and preset swindle characteristic fingerprint sample database successful match, institute
Fraud analysis system is stated using the short message as suspicious fraud text message information.
4. according to the method described in claim 2, the fraud analysis system utilizes the swindle keyword being previously obtained, to described
The suspicious swindle communication information carries out matching treatment, and the suspicious swindle communication information that will match to is determined as really swindling communication letter
Breath includes:
The fraud analysis system carries out recording processing by the call to the suspicious swindle call-information, obtains recording text
Part;
Obtained calling record file converts call text file by the fraud analysis system, and using being previously obtained
It swindles keyword and matching treatment is carried out to the call text file;
If the swindle keyword and the call text file successful match, the fraud analysis system is by the suspicious swindleness
Call-information is deceived to be determined as really swindling call-information.
5. according to the method described in claim 3, the fraud analysis system utilizes the swindle keyword being previously obtained, to described
The suspicious swindle communication information carries out matching treatment, and the suspicious swindle communication information that will match to is determined as really swindling communication letter
Breath includes:
The fraud analysis system will match the suspicious fraud text message information using the swindle keyword being previously obtained
Processing;
If the swindle keyword being previously obtained and the call text file successful match, the fraud analysis system will be described
Suspicious fraud text message information is determined as true fraud text message information.
6. a kind of device for limiting telecommunication fraud, comprising:
Module is obtained, for obtaining the suspicious swindle communication information by carrying out screening to the communication information on communication network;
Determining module, for carrying out matching treatment to the suspicious swindle communication information using the swindle keyword being previously obtained,
And the suspicious swindle communication information that will match to is determined as really swindling the communication information;
Processing module is swindled, for stopping the propagation of the true swindle communication information in a communication network.
7. device according to claim 6, the acquisition module include:
Speaking analysis unit, for obtaining the relay point of call-information by analyzing the call-information on communication network
Code and IP address;
It converses matching unit, for by the relaying point coding and IP address of obtained call-information and preconfigured relaying point coding
Matching treatment is carried out with IP address;
Call acquiring unit, for when the relaying point coding and IP address of obtained call-information and preconfigured relaying point coding
It fails to match with IP address, then using the call-information as suspicious swindle call-information.
8. device according to claim 6, the acquisition module include:
Short message analytical unit, for by analyzing the short message on communication network, the feature for obtaining short message to refer to
Line information;
Short message matching unit, for by the middle characteristic fingerprint information of obtained short message and preset swindle characteristic fingerprint sample
This library carries out matching treatment;
Short message acquiring unit, for when obtained short message middle characteristic fingerprint information and preset swindle characteristic fingerprint sample
This storehouse matching success, then using the short message as suspicious fraud text message information.
9. a kind of equipment for limiting telecommunication fraud, the equipment includes: processor, and the storage with processor coupling
Device;The program for the limitation telecommunication fraud that can be run on the processor, the limitation telecommunications swindleness are stored on the memory
It is realized when the program deceived is executed by the processor and includes:
By carrying out screening to the communication information on communication network, the suspicious swindle communication information is obtained;
Using the swindle keyword being previously obtained, matching treatment is carried out to the suspicious swindle communication information, and will match to
The suspicious swindle communication information is determined as really swindling the communication information;
Stop the propagation of the true swindle communication information in a communication network.
10. a kind of computer storage medium, stores the program of restricted telecommunication fraud, the program of the limitation telecommunication fraud is located
Reason device is realized when executing
By carrying out screening to the communication information on communication network, the suspicious swindle communication information is obtained;
Using the swindle keyword being previously obtained, matching treatment is carried out to the suspicious swindle communication information, and will match to
The suspicious swindle communication information is determined as really swindling the communication information;
Stop the propagation of the true swindle communication information in a communication network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711158270.5A CN109819125A (en) | 2017-11-20 | 2017-11-20 | A kind of method and device limiting telecommunication fraud |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711158270.5A CN109819125A (en) | 2017-11-20 | 2017-11-20 | A kind of method and device limiting telecommunication fraud |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109819125A true CN109819125A (en) | 2019-05-28 |
Family
ID=66598546
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711158270.5A Withdrawn CN109819125A (en) | 2017-11-20 | 2017-11-20 | A kind of method and device limiting telecommunication fraud |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109819125A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110896541A (en) * | 2019-12-25 | 2020-03-20 | 大连市共进科技有限公司 | Method, device, system and base station for sucking user terminal into private network |
CN111741472A (en) * | 2020-08-07 | 2020-10-02 | 北京微智信业科技有限公司 | GoIP fraud telephone identification method, system, medium and equipment |
CN111885270A (en) * | 2020-07-09 | 2020-11-03 | 恒安嘉新(北京)科技股份公司 | Abnormal communication detection method, device, equipment and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080085730A1 (en) * | 2006-10-10 | 2008-04-10 | Sybase 365, Inc. | System and Method for Message Monitoring and Identification |
CN102761872A (en) * | 2012-08-01 | 2012-10-31 | 成都四方信息技术有限公司 | Spam message intercepting method |
CN103476011A (en) * | 2013-08-30 | 2013-12-25 | 广东明创软件科技有限公司 | Method and system for prompting user short message credibility |
CN103607705A (en) * | 2013-12-04 | 2014-02-26 | 北京网秦天下科技有限公司 | Junk message filtering method and engine |
CN103634450A (en) * | 2012-08-23 | 2014-03-12 | 中国电信股份有限公司 | False caller number identification method, apparatus and system |
CN103731832A (en) * | 2013-12-26 | 2014-04-16 | 黄伟 | System and method for preventing phone and short message frauds |
CN104079475A (en) * | 2014-06-27 | 2014-10-01 | 北京奇虎科技有限公司 | Message processing method and system |
CN106376002A (en) * | 2015-07-20 | 2017-02-01 | 中兴通讯股份有限公司 | Management method and device, and junk short message monitoring system |
CN106550155A (en) * | 2016-11-25 | 2017-03-29 | 上海欣方智能系统有限公司 | Suspicious number is carried out swindling the method and system that sample screens classification and interception |
-
2017
- 2017-11-20 CN CN201711158270.5A patent/CN109819125A/en not_active Withdrawn
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080085730A1 (en) * | 2006-10-10 | 2008-04-10 | Sybase 365, Inc. | System and Method for Message Monitoring and Identification |
CN102761872A (en) * | 2012-08-01 | 2012-10-31 | 成都四方信息技术有限公司 | Spam message intercepting method |
CN103634450A (en) * | 2012-08-23 | 2014-03-12 | 中国电信股份有限公司 | False caller number identification method, apparatus and system |
CN103476011A (en) * | 2013-08-30 | 2013-12-25 | 广东明创软件科技有限公司 | Method and system for prompting user short message credibility |
CN103607705A (en) * | 2013-12-04 | 2014-02-26 | 北京网秦天下科技有限公司 | Junk message filtering method and engine |
CN103731832A (en) * | 2013-12-26 | 2014-04-16 | 黄伟 | System and method for preventing phone and short message frauds |
CN104079475A (en) * | 2014-06-27 | 2014-10-01 | 北京奇虎科技有限公司 | Message processing method and system |
CN106376002A (en) * | 2015-07-20 | 2017-02-01 | 中兴通讯股份有限公司 | Management method and device, and junk short message monitoring system |
CN106550155A (en) * | 2016-11-25 | 2017-03-29 | 上海欣方智能系统有限公司 | Suspicious number is carried out swindling the method and system that sample screens classification and interception |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110896541A (en) * | 2019-12-25 | 2020-03-20 | 大连市共进科技有限公司 | Method, device, system and base station for sucking user terminal into private network |
CN110896541B (en) * | 2019-12-25 | 2023-04-18 | 大连市共进科技有限公司 | Method, device, system and base station for sucking user terminal into private network |
CN111885270A (en) * | 2020-07-09 | 2020-11-03 | 恒安嘉新(北京)科技股份公司 | Abnormal communication detection method, device, equipment and storage medium |
CN111741472A (en) * | 2020-08-07 | 2020-10-02 | 北京微智信业科技有限公司 | GoIP fraud telephone identification method, system, medium and equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106791220B (en) | Method and system for preventing telephone fraud | |
CN108924333B (en) | Fraud telephone identification method, device and system | |
CN109600752B (en) | Deep clustering fraud detection method and device | |
CN103428183B (en) | Method and device for identifying malicious website | |
EP2657880A1 (en) | Systems and methods for combined physical and cyber data security | |
CN107770777B (en) | Method for identifying recorded fraud calls | |
CN109819125A (en) | A kind of method and device limiting telecommunication fraud | |
CN112416730A (en) | User internet behavior analysis method and device, electronic equipment and storage medium | |
CN104639770A (en) | Telephone reporting method, device and system based on mobile terminal | |
CN110611929A (en) | Abnormal user identification method and device | |
CN108092970A (en) | A kind of wireless network maintaining method and its equipment, storage medium, terminal | |
Tang et al. | Clues in tweets: Twitter-guided discovery and analysis of SMS spam | |
CN109639742A (en) | A kind of information spy system | |
CN114339767B (en) | Signaling detection method and device, electronic equipment and storage medium | |
CN114169438A (en) | Telecommunication network fraud identification method, device, equipment and storage medium | |
US10699022B1 (en) | Interception of unauthorized communications in an controlled-environment facility | |
KR101306074B1 (en) | Method and system to prevent phishing | |
CN114338171A (en) | Black product attack detection method and device | |
CN106888439B (en) | Information processing system and information processing method thereof | |
CN109104429B (en) | Detection method for phishing information | |
CN115442159B (en) | Household routing-based risk management and control method, system and storage medium | |
CN107995616A (en) | The processing method and device of user behavior data | |
CN108183906B (en) | Time bank management method, server, terminal, storage medium and electronic device | |
CN106713594A (en) | Method and apparatus for intercepting unwanted call or text message in wearable device | |
CN110958236A (en) | Dynamic authorization method of operation and maintenance auditing system based on risk factor insight |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190528 |