CN109819125A - A kind of method and device limiting telecommunication fraud - Google Patents

A kind of method and device limiting telecommunication fraud Download PDF

Info

Publication number
CN109819125A
CN109819125A CN201711158270.5A CN201711158270A CN109819125A CN 109819125 A CN109819125 A CN 109819125A CN 201711158270 A CN201711158270 A CN 201711158270A CN 109819125 A CN109819125 A CN 109819125A
Authority
CN
China
Prior art keywords
information
swindle
suspicious
fraud
call
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201711158270.5A
Other languages
Chinese (zh)
Inventor
李恺
王巍
于思亮
孙立波
黄小兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN201711158270.5A priority Critical patent/CN109819125A/en
Publication of CN109819125A publication Critical patent/CN109819125A/en
Withdrawn legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of method and devices for limiting telecommunication fraud, are related to telecommunication fraud technical field, and method includes: fraud analysis system by carrying out screening to the communication information on communication network, obtain the suspicious swindle communication information;The fraud analysis system carries out matching treatment using the swindle keyword being previously obtained, to the suspicious swindle communication information, and the suspicious swindle communication information that will match to is determined as really swindling the communication information;The fraud analysis system stops the propagation of the true swindle communication information in a communication network.

Description

A kind of method and device limiting telecommunication fraud
Technical field
The present invention relates to telecommunication fraud technical field, in particular to a kind of method and device for limiting telecommunication fraud.
Background technique
In recent years, crime active day benefit wildness is swindled by the communication information of representative of fraudulent call, believed in view of Current communications The sternness of breath swindle situation and the complication of fraud tactics, the single risk prevention instruments established on single data resource are difficult to have Effect solves the problems, such as telecommunication fraud.
Summary of the invention
The technical issues of scheme provided according to embodiments of the present invention solves is that single data resource cannot be solved effectively Certainly telecommunication fraud.
A kind of method of the limitation telecommunication fraud provided according to embodiments of the present invention, comprising:
Fraud analysis system obtains the suspicious swindle communication information by carrying out screening to the communication information on communication network;
The fraud analysis system is using the swindle keyword being previously obtained, to the suspicious swindle communication information progress With processing, and the suspicious swindle communication information that will match to is determined as really swindling the communication information;
The fraud analysis system stops the propagation of the true swindle communication information in a communication network.
Preferably, the fraud analysis system obtains suspicious swindleness by carrying out screening to the communication information on communication network Deceiving the communication information includes:
The fraud analysis system obtains the relaying of call-information by analyzing the call-information on communication network Point coding and IP address;
The fraud analysis system is by the relaying point coding and IP address of obtained call-information and preconfigured relaying Point coding and IP address carry out matching treatment;
If the relaying point coding and IP address of obtained call-information are matched with preconfigured relaying point coding and IP address Failure, then the fraud analysis system is using the call-information as suspicious swindle call-information.
Preferably, the fraud analysis system obtains suspicious swindleness by carrying out screening to the communication information on communication network Deceiving the communication information includes:
The fraud analysis system obtains the feature of short message by analyzing the short message on communication network Finger print information;
The fraud analysis system refers to the middle characteristic fingerprint information of obtained short message with preset swindle feature Line sample database carries out matching treatment;
If the middle characteristic fingerprint information of obtained short message and preset swindle characteristic fingerprint sample database successful match, Then the fraud analysis system is using the short message as suspicious fraud text message information.
Preferably, the fraud analysis system is using the swindle keyword being previously obtained, to the suspicious swindle communication letter Breath carry out matching treatment, and the suspicious swindle communication information that will match to be determined as really swindling the communication information include:
The fraud analysis system carries out recording processing by the call to the suspicious swindle call-information, is recorded File;
Obtained calling record file is converted call text file by the fraud analysis system, and is obtained using preparatory The swindle keyword arrived carries out matching treatment to the call text file;
If the swindle keyword and the call text file successful match, fraud analysis system is by the suspicious swindleness Call-information is deceived to be determined as really swindling call-information.
Preferably, the fraud analysis system is using the swindle keyword being previously obtained, to the suspicious swindle communication letter Breath carry out matching treatment, and the suspicious swindle communication information that will match to be determined as really swindling the communication information include:
The fraud analysis system will carry out the suspicious fraud text message information using the swindle keyword being previously obtained Matching treatment;
If the swindle keyword being previously obtained and the call text file successful match, the fraud analysis system will The suspicious fraud text message information is determined as true fraud text message information.
A kind of device of the limitation telecommunication fraud provided according to embodiments of the present invention, comprising:
Module is obtained, for obtaining the suspicious swindle communication information by carrying out screening to the communication information on communication network;
Determining module, for being matched to the suspicious swindle communication information using the swindle keyword being previously obtained Processing, and the suspicious swindle communication information that will match to is determined as really swindling the communication information;
Processing module is swindled, for stopping the propagation of the true swindle communication information in a communication network.
Preferably, the acquisition module includes:
Speaking analysis unit, for obtaining in call-information by analyzing the call-information on communication network After point coding and IP address;
It converses matching unit, for by the relaying point coding and IP address of obtained call-information and preconfigured relaying Point coding and IP address carry out matching treatment;
Call acquiring unit, for when the relaying point coding and IP address of obtained call-information and preconfigured relaying It fails to match for point coding and IP address, then using the call-information as suspicious swindle call-information.
Preferably, the acquisition module includes:
Short message analytical unit, for obtaining the spy of short message by analyzing the short message on communication network Levy finger print information;
Short message matching unit, for referring to the middle characteristic fingerprint information of obtained short message with preset swindle feature Line sample database carries out matching treatment;
Short message acquiring unit refers to for the middle characteristic fingerprint information when obtained short message with preset swindle feature This storehouse matching of grain pattern success, then using the short message as suspicious fraud text message information.
A kind of equipment of the limitation telecommunication fraud provided according to embodiments of the present invention, the equipment include: processor, and With the memory of processor coupling;The limitation telecommunication fraud that can be run on the processor is stored on the memory Program, the program of the limitation telecommunication fraud when being executed by the processor realization includes:
By carrying out screening to the communication information on communication network, the suspicious swindle communication information is obtained;
Using the swindle keyword being previously obtained, matching treatment is carried out to the suspicious swindle communication information, and will matching To the suspicious swindle communication information be determined as really swindling the communication information;
Stop the propagation of the true swindle communication information in a communication network.
A kind of computer storage medium provided according to embodiments of the present invention stores the program of restricted telecommunication fraud, institute The program for stating limitation telecommunication fraud, which is realized when being executed by processor, includes:
By carrying out screening to the communication information on communication network, the suspicious swindle communication information is obtained;
Using the swindle keyword being previously obtained, matching treatment is carried out to the suspicious swindle communication information, and will matching To the suspicious swindle communication information be determined as really swindling the communication information;
Stop the propagation of the true swindle communication information in a communication network.
The scheme provided according to embodiments of the present invention, by integrating multi-source data, using the swindle electricity of Behavior-based control feature Analysis detection is talked about, short message is analyzed and detects a variety of methods and dimension, detects to telecommunication fraud, realizes that swindle event is closed Connection, discovery telecommunication fraud behavior in real time or quasi real time, effectively contain telecommunication fraud sprawling, for ensure people's property safety and Social stability provides reliable technological means and supports.
Detailed description of the invention
Fig. 1 is a kind of method flow diagram for limiting telecommunication fraud provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic device for limiting telecommunication fraud provided in an embodiment of the present invention;
Fig. 3 is the anti-swindle system construction drawing of telecommunications provided in an embodiment of the present invention;
Fig. 4 is fraudulent call calling behavioural analysis strategy schematic diagram provided in an embodiment of the present invention;
Fig. 5 is that anti-fraudulent call system recording file provided in an embodiment of the present invention turns text keyword filtering process figure;
Fig. 6 is anti-fraud text message broad sense digital supervision flow chart provided in an embodiment of the present invention;
Fig. 7 is anti-fraud text message characteristic fingerprint monitoring process flow diagram provided in an embodiment of the present invention.
Specific embodiment
Below in conjunction with attached drawing to a preferred embodiment of the present invention will be described in detail, it should be understood that described below is excellent Select embodiment only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention.
Fig. 1 is a kind of method flow diagram for limiting telecommunication fraud provided in an embodiment of the present invention, as shown in Figure 1, comprising:
Step S101: fraud analysis system obtains suspicious swindle by carrying out screening to the communication information on communication network The communication information;
Step S102: the fraud analysis system communicates the suspicious swindle using the swindle keyword being previously obtained Information carries out matching treatment, and the suspicious swindle communication information that will match to is determined as really swindling the communication information;
Step S103: the fraud analysis system stops the propagation of the true swindle communication information in a communication network.
Wherein, the fraud analysis system obtains suspicious swindle by carrying out screening to the communication information on communication network The communication information includes: the fraud analysis system by analyzing the call-information on communication network, obtains call-information Relaying point coding and IP address;The fraud analysis system is by the relaying point coding and IP address of obtained call-information and in advance The relaying point coding and IP address of configuration carry out matching treatment;If the relaying point coding and IP address of obtained call-information and in advance It fails to match for the relaying point coding and IP address of configuration, then the fraud analysis system is logical as suspicious swindle using the call-information Talk about information.
Wherein, the fraud analysis system obtains suspicious swindle by carrying out screening to the communication information on communication network The communication information includes: the fraud analysis system by analyzing the short message on communication network, obtains short message Characteristic fingerprint information;The fraud analysis system is by the middle characteristic fingerprint information of obtained short message and preset swindle Characteristic fingerprint sample database carries out matching treatment;If the middle characteristic fingerprint information of obtained short message and preset swindle feature The success of sample fingerprint storehouse matching, then the fraud analysis system is using the short message as suspicious fraud text message information.
Wherein, the fraud analysis system is using the swindle keyword being previously obtained, to the suspicious swindle communication information Matching treatment is carried out, and the suspicious swindle communication information that will match to is determined as really swindling the communication information including: the swindle Analysis system carries out recording processing by the call to the suspicious swindle call-information, obtains recording file;The swindle point Obtained calling record file is converted call text file by analysis system, and using the swindle keyword being previously obtained to institute It states call text file and carries out matching treatment;It is described if the swindle keyword and the call text file successful match Fraud analysis system is determined as the suspicious swindle call-information really to swindle call-information.
Wherein, the fraud analysis system is using the swindle keyword being previously obtained, to the suspicious swindle communication information Matching treatment is carried out, and the suspicious swindle communication information that will match to is determined as really swindling the communication information including: the swindle Analysis system will carry out matching treatment to the suspicious fraud text message information using the swindle keyword being previously obtained;If preparatory The swindle keyword that arrives and the call text file successful match, then the fraud analysis system is by the suspicious fraud text message Information is determined as true fraud text message information.
Fig. 2 is a kind of schematic device for limiting telecommunication fraud provided in an embodiment of the present invention, as shown in Figure 2, comprising: obtain Modulus block 201, for obtaining the suspicious swindle communication information by carrying out screening to the communication information on communication network;Determine mould Block 202 carries out matching treatment, and general to the suspicious swindle communication information for the swindle keyword that utilization is previously obtained The suspicious swindle communication information being fitted on is determined as really swindling the communication information;Processing module 203 is swindled, it is described true for stopping Swindle the propagation of the communication information in a communication network.
Wherein, the acquisition module 201 includes: speaking analysis unit, for by the call-information on communication network It is analyzed, obtains the relaying point coding and IP address of call-information;It converses matching unit, for by obtained call-information It relays point coding and IP address and preconfigured relaying point coding and IP address carries out matching treatment;Call acquiring unit, for working as It fails to match for the relaying point coding and IP address of obtained call-information and preconfigured relaying point coding and IP address, then by institute Call-information is stated as suspicious swindle call-information.
Wherein, the acquisition module 201 includes: short message analytical unit, for by the short message on communication network It is analyzed, obtains the characteristic fingerprint information of short message;Short message matching unit, for by the middle spy of obtained short message It levies finger print information and preset swindle characteristic fingerprint sample database carries out matching treatment;Short message acquiring unit, for when obtained The middle characteristic fingerprint information of short message and preset swindle characteristic fingerprint sample database successful match, then make the short message For suspicious fraud text message information.
The embodiment of the invention provides it is a kind of limit telecommunication fraud equipment, the equipment includes: processor, and with institute State the memory of processor coupling;The journey for the limitation telecommunication fraud that can be run on the processor is stored on the memory The program of sequence, the limitation telecommunication fraud realizes to include: when being executed by the processor
By carrying out screening to the communication information on communication network, the suspicious swindle communication information is obtained;
Using the swindle keyword being previously obtained, matching treatment is carried out to the suspicious swindle communication information, and will matching To the suspicious swindle communication information be determined as really swindling the communication information;
Stop the propagation of the true swindle communication information in a communication network.
The embodiment of the invention provides a kind of computer storage mediums, store the program of restricted telecommunication fraud, the limit It is realized when the program of telecommunication fraud processed is executed by processor and includes:
By carrying out screening to the communication information on communication network, the suspicious swindle communication information is obtained;
Using the swindle keyword being previously obtained, matching treatment is carried out to the suspicious swindle communication information, and will matching To the suspicious swindle communication information be determined as really swindling the communication information;
Stop the propagation of the true swindle communication information in a communication network.
Fig. 3 is the anti-swindle system construction drawing of telecommunications provided in an embodiment of the present invention, as shown in Figure 3, comprising: in short message The heart, fraud text message analysis detection system, core network signalling monitoring, fraudulent call analysis detection system, core net Boss, core net MGW (Media Gate Way, Media Gateway);The short message service center connect with fraud text message analysis detection system communication, institute It states core network signalling monitoring to connect with fraudulent call analysis detection system communication, the core net Boss and fraudulent call analysis inspection Examining system communication connection, the core net MGW are connected with fraudulent call analysis detection system communication.
The fraudulent call analysis detection system calls behavior to user by full dose ticket and carries out policy monitor, for The government and enterprises user for renting relaying, can identify interim after point coding and IP address in ticket, and dedicated monitoring strategies are arranged;To acceptance of the bid Doubtful caller, system converses to it record after change into text and carry out keyword monitoring, by the high suspicious number of middle target Manual examination and verification are sent, for the swindle number of manual examination and verification confirmation, fraudulent call analysis detection system queries go out the used number All cell phone apparatus strings number, and number can more be swindled in anti-swindle system discovery according to cell phone apparatus string number.Mobile phone string Number i.e. IMEI, IMEI is the abbreviation of mobile device international identity code, is made of 15 bit digitals, is corresponded with every mobile phone, should Sets of numbers is that the whole world is unique.And this information can be recorded in message registration each time, therefore for determining Number is swindled, system can be by its cell phone apparatus string typing blacklist, if finding identical mobile phone in system ticket again String number, so that it may find its new calling number.
Fraudulent call analysis detection system can intercept fraudulent call by core net Boss network management interface.
Fraud text message analysis detection system can excavate fraud text message according to the swindle calling number of confirmation, and fraud text message is recorded Enter fraud text message characteristic fingerprint sample database and do fingerprint monitoring, and the numeric string that can will contain in short message, address link extracts It does generalized character numeral sample to be monitored, finds more swindle numbers.Anti- fraud text message analysis detection system can be to swindleness simultaneously Deceive the called transmission reminding short message of number.
Fig. 4 is fraudulent call calling behavioural analysis strategy schematic diagram provided in an embodiment of the present invention, as shown in figure 4, this hair Bright swindle telecommunication call behavior monitoring strategy, analyzes the user that the special time period number of calls reaches thresholding, and called number Code dispersion is higher, is distributed in different geographical number section, and analysis strategy rents relaying for the government and enterprises user that fraudulent call takes place frequently, Since calling number is uncertain, the identification condition for relaying Original Point Code and source IP ticket source can be increased
Government and enterprises relay ticket identification process:
1, government and enterprises user is created in systems;
2, relaying point coding, IP, the number section group that regional and calling number allows are distributed for each government and enterprises user;
3, when calling behavioural analysis, the point coding in ticket, IP information, if in the government and enterprises user point of system configuration are extracted It is then government and enterprises' call within the scope of code, IP;
4, special monitoring strategies are set for government and enterprises' call, to calling behavior, calling number feature is not (in number of permission In segment limit, the illegal number of changing);
5, network analysis goes out government and enterprises' relaying violation message registration, is matched to corresponding government and enterprises user according to point coding, IP and is directed to Each government and enterprises user counts illegal talk times, illegal call accounting information.
Fig. 5 is that anti-fraudulent call system recording file provided in an embodiment of the present invention turns text keyword filtering process figure, As shown in figure 5, fraudulent call keyword group is arranged in system, it, should if recording turns containing suspicious keyword in the content of text Calling number is high suspicious fraudulent call, send whether manual examination and verification are added blacklist.
Fig. 6 is anti-fraud text message broad sense digital supervision flow chart provided in an embodiment of the present invention, as shown in fig. 6, swindle is short The content change of letter is varied, but usually requires from fraud text message swindle purpose analysis, short message content comprising connection electricity The important informations such as words, account No., harmful address link;And due to many reasons such as cost and replacement difficulty, these information phases It is fixed to comparing, is the characteristic information in fraud text message with obvious characteristic and comparison fixation.
Broad sense digital supervision using in short message content telephone number or Bank Account Number digital information as fraud text message know Other breach, as core identification element, is effectively found by the telephone number information for including in fraud text message and shields swindleness Deceive all kinds of mutation of short message.
The number such as telephone number, account included in fraud text message is not simple Arabic numerals, rubbish at present Short message sends user in order to avoid intercepted, and often interted wherein various " numbers ": Arabic numerals, Chinese are simple Body number, traditional font number, homophonic number, the number of tape symbol, " number " of these forms of expression multiplicity is called broad sense by we Number.
Anti- fraud text message analysis detection system intialization broad sense digital library and spcial character library, can configure includes Arabic number Word, Simplified Chinese digital (such as one, two, three), traditional font digital (such as one, two, three), homophonic number, the number of tape symbol are (1., ), the number (such as 1,1,4) that is indicated with full-shape or upper subscript.First the broad sense number in short message content is replaced after receiving short message Arabic numerals are changed to, are then analyzed again.
Swindler is interference monitoring, adds the characters such as *, space in short message content sometimes.These are showed shape by we The character of formula multiplicity is known as spcial character.Spcial character library is configurable, including *, space character etc..It first will be short after receiving short message Believe the spcial character removal in content, then analyzes again.
Broad sense digital extraction process:
1, original short message: with regard to poor 200,000? generation cyclopentadienyl Wulihe helps the flat rare quasi- existing apartment of your polishing 150 to buy now vertical to subtract 20 Ten thousand!T6 hard-cover hotel apartment 20,000 supports 50,000, guarantees 10% income;It gets and has just earned 13 9 88*88 connection 6666;
2, pretreatment (replacement of broad sense number and spcial character filtering): just poor 20 all ages cyclopentadienyl Wulihe helps your polishing 150 flat The golden rare quasi- existing apartment in corridor buys the vertical 200,000 T6 hard-cover hotel apartments 20,000 that subtract to 50,000 now, guarantees 10% income, gets and just earn 1398888 6666;
3, minimum length (number of characters) judgement (>=3) of single consecutive numbers field: 20 (invalid), 150 (effective), 20 (nothings Effect), 6 (invalid), 2 (invalid), 5 (invalid), 10 (invalid), 1398888 (effective), 6666 (effective);
4, the minimum range (number of characters) of two consecutive numbers fields judges (≤4): 150 (effective), and 13988886666 (close And);
5, effective feature vector length range (number of characters) judgement (7~16): the broad sense number feature vector of extraction: 13988886666。
Fig. 7 is anti-fraud text message characteristic fingerprint monitoring process flow diagram provided in an embodiment of the present invention, as shown in fig. 7, being System supports most 1,000,000 fraud text message samples of typing, each calling number is sent in real time short message content and sample content into Row characteristic fingerprint similarity compares, and configurable features fingerprint monitoring strategies: similarity threshold (such as similarity up to 80%), specified Meet the item number thresholding (having sent ten short messages for meeting similarity in such as one hour) of similarity in duration.When some calling number The short message of transmission meets characteristic fingerprint strategy, then the number is hit.
Real-time characteristic fingerprint monitors process:
1, swindle sample short message processing: system supports million fraud text message samples of typing, and every sample preprocessing (is gone Except spcial character), fragment calculates Hash hashed value, and is synchronized to Installed System Memory by the sequence of fragment hashed value
2, characteristic fingerprint real time monitoring is handled: the short message that system in real time sends user is pressed at the same steps of sample fragment Reason compares piecewise after carrying out the sequence of fragment hash value and calculates similarity.
3, same caller characteristic fingerprint monitoring strategies are handled: the single calling number of system-computed reaches fingerprint in specific duration The short message item number of similarity such as reaches configured threshold (such as 1 hour 10 similarity is 80% or more), then digs the calling number It excavates and.
Specific step is as follows for the anti-swindle system of the embodiment of the present invention:
101, fraudulent call analysis detection system reads full dose ticket from core network signalling monitoring system in real time;
102, fraudulent call analysis detection system analyzes full dose ticket by the monitoring strategies of setting, rents government and enterprises By point coding, special monitoring strategies are arranged in IP range, and converse the suspicious caller for reaching tactful thresholding and take out for relaying call Sample recording, saves recording file;
103, recording file is converted text by fraudulent call analysis detection system, and to text by setting keyword into Row monitoring, send manual examination and verification to the sample containing keyword.
104, to the swindle number of manual examination and verification confirmation, the support of fraudulent call analysis detection system, which inquires, used the swindleness The cell phone apparatus string imei of number is deceived, and more used the doubtful number of the mobile phone by the discovery of equipment string number
105, fraudulent call analysis detection system can pass through and core net Boss network management interface shuts down call function.
106, to the swindle number of manual examination and verification confirmation, fraud text message analysis system is supported to analyze its short message content and is called Victim, to find new swindle case scene and swindle partner.
107, fraud text message analysis detection system is automatically added to characteristic fingerprint sample database from the fraud text message that will confirm that, and from Broad sense numeral sample is extracted in fraud text message and address link sample is automatically added to broad sense numeral sample library
108, fraud text message analysis detection system is according to the swindle characteristic fingerprint sample and broad sense numeral sample of system configuration It is analyzed in real time with monitoring strategies, it is found that these numbers are sent swindle electricity by more swindle numbers and victim again simultaneously Words analysis detection system is analyzed.
109, fraud text message analysis detection system supports the called number to swindle number to send making prompting short message, and will It swindles number and blacklist is added, intercept the short message of its transmission.
The scheme provided according to embodiments of the present invention, swindle monitoring system creation call, message monitoring strategy, sms center Decide whether to intercept short message by system response, send reminding short message, core net intercepts fraudulent call by blacklist, in real time Or discovery telecommunication fraud behavior quasi real time, contain the sprawling of telecommunication fraud, effectively to ensure that people's property safety and society are steady Surely reliable technological means is provided to support.
Although describing the invention in detail above, but the invention is not restricted to this, those skilled in the art of the present technique It can be carry out various modifications with principle according to the present invention.Therefore, all to be modified according to made by the principle of the invention, all it should be understood as Fall into protection scope of the present invention.

Claims (10)

1. a kind of method for limiting telecommunication fraud, comprising:
Fraud analysis system obtains the suspicious swindle communication information by carrying out screening to the communication information on communication network;
The fraud analysis system carries out at matching the suspicious swindle communication information using the swindle keyword being previously obtained Reason, and the suspicious swindle communication information that will match to is determined as really swindling the communication information;
The fraud analysis system stops the propagation of the true swindle communication information in a communication network.
2. according to the method described in claim 1, the fraud analysis system is by carrying out the communication information on communication network Screening, obtaining the suspicious swindle communication information includes:
The fraud analysis system obtains the relaying point coding of call-information by analyzing the call-information on communication network And IP address;
The fraud analysis system is by the relaying point coding and IP address of obtained call-information and preconfigured relaying point coding Matching treatment is carried out with IP address;
If it fails to match for the relaying point coding and IP address of obtained call-information and preconfigured relaying point coding and IP address, Then the fraud analysis system is using the call-information as suspicious swindle call-information.
3. according to the method described in claim 1, the fraud analysis system is by carrying out the communication information on communication network Screening, obtaining the suspicious swindle communication information includes:
The fraud analysis system obtains the characteristic fingerprint of short message by analyzing the short message on communication network Information;
The fraud analysis system is by the middle characteristic fingerprint information of obtained short message and preset swindle characteristic fingerprint sample This library carries out matching treatment;
If the middle characteristic fingerprint information of obtained short message and preset swindle characteristic fingerprint sample database successful match, institute Fraud analysis system is stated using the short message as suspicious fraud text message information.
4. according to the method described in claim 2, the fraud analysis system utilizes the swindle keyword being previously obtained, to described The suspicious swindle communication information carries out matching treatment, and the suspicious swindle communication information that will match to is determined as really swindling communication letter Breath includes:
The fraud analysis system carries out recording processing by the call to the suspicious swindle call-information, obtains recording text Part;
Obtained calling record file converts call text file by the fraud analysis system, and using being previously obtained It swindles keyword and matching treatment is carried out to the call text file;
If the swindle keyword and the call text file successful match, the fraud analysis system is by the suspicious swindleness Call-information is deceived to be determined as really swindling call-information.
5. according to the method described in claim 3, the fraud analysis system utilizes the swindle keyword being previously obtained, to described The suspicious swindle communication information carries out matching treatment, and the suspicious swindle communication information that will match to is determined as really swindling communication letter Breath includes:
The fraud analysis system will match the suspicious fraud text message information using the swindle keyword being previously obtained Processing;
If the swindle keyword being previously obtained and the call text file successful match, the fraud analysis system will be described Suspicious fraud text message information is determined as true fraud text message information.
6. a kind of device for limiting telecommunication fraud, comprising:
Module is obtained, for obtaining the suspicious swindle communication information by carrying out screening to the communication information on communication network;
Determining module, for carrying out matching treatment to the suspicious swindle communication information using the swindle keyword being previously obtained, And the suspicious swindle communication information that will match to is determined as really swindling the communication information;
Processing module is swindled, for stopping the propagation of the true swindle communication information in a communication network.
7. device according to claim 6, the acquisition module include:
Speaking analysis unit, for obtaining the relay point of call-information by analyzing the call-information on communication network Code and IP address;
It converses matching unit, for by the relaying point coding and IP address of obtained call-information and preconfigured relaying point coding Matching treatment is carried out with IP address;
Call acquiring unit, for when the relaying point coding and IP address of obtained call-information and preconfigured relaying point coding It fails to match with IP address, then using the call-information as suspicious swindle call-information.
8. device according to claim 6, the acquisition module include:
Short message analytical unit, for by analyzing the short message on communication network, the feature for obtaining short message to refer to Line information;
Short message matching unit, for by the middle characteristic fingerprint information of obtained short message and preset swindle characteristic fingerprint sample This library carries out matching treatment;
Short message acquiring unit, for when obtained short message middle characteristic fingerprint information and preset swindle characteristic fingerprint sample This storehouse matching success, then using the short message as suspicious fraud text message information.
9. a kind of equipment for limiting telecommunication fraud, the equipment includes: processor, and the storage with processor coupling Device;The program for the limitation telecommunication fraud that can be run on the processor, the limitation telecommunications swindleness are stored on the memory It is realized when the program deceived is executed by the processor and includes:
By carrying out screening to the communication information on communication network, the suspicious swindle communication information is obtained;
Using the swindle keyword being previously obtained, matching treatment is carried out to the suspicious swindle communication information, and will match to The suspicious swindle communication information is determined as really swindling the communication information;
Stop the propagation of the true swindle communication information in a communication network.
10. a kind of computer storage medium, stores the program of restricted telecommunication fraud, the program of the limitation telecommunication fraud is located Reason device is realized when executing
By carrying out screening to the communication information on communication network, the suspicious swindle communication information is obtained;
Using the swindle keyword being previously obtained, matching treatment is carried out to the suspicious swindle communication information, and will match to The suspicious swindle communication information is determined as really swindling the communication information;
Stop the propagation of the true swindle communication information in a communication network.
CN201711158270.5A 2017-11-20 2017-11-20 A kind of method and device limiting telecommunication fraud Withdrawn CN109819125A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711158270.5A CN109819125A (en) 2017-11-20 2017-11-20 A kind of method and device limiting telecommunication fraud

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711158270.5A CN109819125A (en) 2017-11-20 2017-11-20 A kind of method and device limiting telecommunication fraud

Publications (1)

Publication Number Publication Date
CN109819125A true CN109819125A (en) 2019-05-28

Family

ID=66598546

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711158270.5A Withdrawn CN109819125A (en) 2017-11-20 2017-11-20 A kind of method and device limiting telecommunication fraud

Country Status (1)

Country Link
CN (1) CN109819125A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110896541A (en) * 2019-12-25 2020-03-20 大连市共进科技有限公司 Method, device, system and base station for sucking user terminal into private network
CN111741472A (en) * 2020-08-07 2020-10-02 北京微智信业科技有限公司 GoIP fraud telephone identification method, system, medium and equipment
CN111885270A (en) * 2020-07-09 2020-11-03 恒安嘉新(北京)科技股份公司 Abnormal communication detection method, device, equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080085730A1 (en) * 2006-10-10 2008-04-10 Sybase 365, Inc. System and Method for Message Monitoring and Identification
CN102761872A (en) * 2012-08-01 2012-10-31 成都四方信息技术有限公司 Spam message intercepting method
CN103476011A (en) * 2013-08-30 2013-12-25 广东明创软件科技有限公司 Method and system for prompting user short message credibility
CN103607705A (en) * 2013-12-04 2014-02-26 北京网秦天下科技有限公司 Junk message filtering method and engine
CN103634450A (en) * 2012-08-23 2014-03-12 中国电信股份有限公司 False caller number identification method, apparatus and system
CN103731832A (en) * 2013-12-26 2014-04-16 黄伟 System and method for preventing phone and short message frauds
CN104079475A (en) * 2014-06-27 2014-10-01 北京奇虎科技有限公司 Message processing method and system
CN106376002A (en) * 2015-07-20 2017-02-01 中兴通讯股份有限公司 Management method and device, and junk short message monitoring system
CN106550155A (en) * 2016-11-25 2017-03-29 上海欣方智能系统有限公司 Suspicious number is carried out swindling the method and system that sample screens classification and interception

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080085730A1 (en) * 2006-10-10 2008-04-10 Sybase 365, Inc. System and Method for Message Monitoring and Identification
CN102761872A (en) * 2012-08-01 2012-10-31 成都四方信息技术有限公司 Spam message intercepting method
CN103634450A (en) * 2012-08-23 2014-03-12 中国电信股份有限公司 False caller number identification method, apparatus and system
CN103476011A (en) * 2013-08-30 2013-12-25 广东明创软件科技有限公司 Method and system for prompting user short message credibility
CN103607705A (en) * 2013-12-04 2014-02-26 北京网秦天下科技有限公司 Junk message filtering method and engine
CN103731832A (en) * 2013-12-26 2014-04-16 黄伟 System and method for preventing phone and short message frauds
CN104079475A (en) * 2014-06-27 2014-10-01 北京奇虎科技有限公司 Message processing method and system
CN106376002A (en) * 2015-07-20 2017-02-01 中兴通讯股份有限公司 Management method and device, and junk short message monitoring system
CN106550155A (en) * 2016-11-25 2017-03-29 上海欣方智能系统有限公司 Suspicious number is carried out swindling the method and system that sample screens classification and interception

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110896541A (en) * 2019-12-25 2020-03-20 大连市共进科技有限公司 Method, device, system and base station for sucking user terminal into private network
CN110896541B (en) * 2019-12-25 2023-04-18 大连市共进科技有限公司 Method, device, system and base station for sucking user terminal into private network
CN111885270A (en) * 2020-07-09 2020-11-03 恒安嘉新(北京)科技股份公司 Abnormal communication detection method, device, equipment and storage medium
CN111741472A (en) * 2020-08-07 2020-10-02 北京微智信业科技有限公司 GoIP fraud telephone identification method, system, medium and equipment

Similar Documents

Publication Publication Date Title
CN106791220B (en) Method and system for preventing telephone fraud
CN108924333B (en) Fraud telephone identification method, device and system
CN109600752B (en) Deep clustering fraud detection method and device
CN103428183B (en) Method and device for identifying malicious website
EP2657880A1 (en) Systems and methods for combined physical and cyber data security
CN107770777B (en) Method for identifying recorded fraud calls
CN109819125A (en) A kind of method and device limiting telecommunication fraud
CN112416730A (en) User internet behavior analysis method and device, electronic equipment and storage medium
CN104639770A (en) Telephone reporting method, device and system based on mobile terminal
CN110611929A (en) Abnormal user identification method and device
CN108092970A (en) A kind of wireless network maintaining method and its equipment, storage medium, terminal
Tang et al. Clues in tweets: Twitter-guided discovery and analysis of SMS spam
CN109639742A (en) A kind of information spy system
CN114339767B (en) Signaling detection method and device, electronic equipment and storage medium
CN114169438A (en) Telecommunication network fraud identification method, device, equipment and storage medium
US10699022B1 (en) Interception of unauthorized communications in an controlled-environment facility
KR101306074B1 (en) Method and system to prevent phishing
CN114338171A (en) Black product attack detection method and device
CN106888439B (en) Information processing system and information processing method thereof
CN109104429B (en) Detection method for phishing information
CN115442159B (en) Household routing-based risk management and control method, system and storage medium
CN107995616A (en) The processing method and device of user behavior data
CN108183906B (en) Time bank management method, server, terminal, storage medium and electronic device
CN106713594A (en) Method and apparatus for intercepting unwanted call or text message in wearable device
CN110958236A (en) Dynamic authorization method of operation and maintenance auditing system based on risk factor insight

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190528