CN114020985A - Fraud countercheck interception method, system and storage medium - Google Patents

Fraud countercheck interception method, system and storage medium Download PDF

Info

Publication number
CN114020985A
CN114020985A CN202111324540.1A CN202111324540A CN114020985A CN 114020985 A CN114020985 A CN 114020985A CN 202111324540 A CN202111324540 A CN 202111324540A CN 114020985 A CN114020985 A CN 114020985A
Authority
CN
China
Prior art keywords
fraud
account
confirmed
social
interception
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111324540.1A
Other languages
Chinese (zh)
Other versions
CN114020985B (en
Inventor
马庆贺
朱富康
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Secxun Technology Co ltd
Original Assignee
Shenzhen Secxun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Secxun Technology Co ltd filed Critical Shenzhen Secxun Technology Co ltd
Priority to CN202111324540.1A priority Critical patent/CN114020985B/en
Publication of CN114020985A publication Critical patent/CN114020985A/en
Application granted granted Critical
Publication of CN114020985B publication Critical patent/CN114020985B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9536Search customisation based on social or collaborative filtering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Development Economics (AREA)
  • Computing Systems (AREA)
  • Educational Administration (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a fraud countercheck interception method, a system and a storage medium, wherein the method comprises the following steps: acquiring a fraud-related social account number and a fraud-related level; and through an API (application programming interface) provided by a social software service provider, the confirmed fraud account is forbidden, a fraud warning plug-in is added aiming at the fraud account to be confirmed, and fraud warning is carried out on the social account communicated with the fraud account to be confirmed through the fraud warning plug-in. According to the method, the confirmed fraud account can be directly forbidden through the API provided by the social software service provider, so that fraud molecules are prevented from continuing to fraud through the fraud account; and adding fraud warning plug-ins to the fraud account to be confirmed through the API, so as to prevent the occurrence of fraud events, reduce the occurrence of fraud events at a high probability, and solve the problems that the prior art can only acquire the network social number of a fraud, cannot prevent the occurrence of fraud events, and even cannot reduce the loss of a scammed person.

Description

Fraud countercheck interception method, system and storage medium
Technical Field
The invention relates to the technical field of fraud prevention, in particular to a fraud prevention interception method, a fraud prevention interception system and a storage medium.
Background
Fraud is the act of deceiving public and private properties with a large amount of money by fictional facts or a method of concealing the truth for the purpose of illegal possession. Since this behavior is performed in a calm or even "pleasant" atmosphere without the use of violence at all, the victim is generally less conscious and more easily cheated. The current fraud modes are various, such as sending short messages, compiling false information and setting a fraud; and for example, pretending to be recruited to perform non-contact fraud through network social software, and the like.
The invention patent application with application publication number CN111865925A discloses a network traffic based fraud group identification method, controller and medium, whose description paragraphs [0063] to [0076] describe as follows regarding the countermeasure:
as an example, step S13 includes:
s131, acquiring fraud website management authority through an automatic infiltration script;
step S132, inserting a preset counter code into the fraud website file;
step S133, triggering the counter code according to a website login instruction of a fraud website manager;
step S134, obtaining the fraud account data based on the counter code.
In the step S134, the fraudulent account data may be encrypted and transmitted back to the analysis server for analysis in step S135.
If the fraud account data cannot be successfully acquired through the steps S131 to S134, the following steps are continued:
step S136, acquiring account passwords of fraud website managers through disguised links;
step S137, logging in a fraud website from a background based on the account number and the password of the fraud website manager;
s138, deploying a reverse code;
step S139, triggering the counter code according to a website login instruction of a fraud website manager;
step S140, obtaining fraud account data based on the counter code.
After step S140, step S141 of encrypting the fraud account data back to the analysis server may be further performed.
The fraudster virtual identity information in the fraudster account data can be a QQ account, a Taobao account, a Baidu account, a Yiyi account, a weibo account and the like.
That is, the countermeasures disclosed in CN111865925A are intended to obtain the social networking numbers of the fraudsters, and cannot prevent the occurrence of fraud events, or even reduce the loss of the fraudsters.
It can be seen that the prior art is still in need of improvement and development.
Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, the present invention provides a fraud countercheck intercepting method, system and storage medium, which aims to solve the problems that the prior art can only obtain the network social number of a fraudster, cannot prevent the occurrence of fraud events, and cannot even reduce the loss of the fraudster.
The technical scheme of the invention is as follows:
a fraud countering interception method, comprising:
acquiring a fraud-related social account according to the user reporting data and the Internet data crawled by using a crawler technology, judging a fraud-related level of the acquired fraud-related social account, and dividing the fraud-related social account into: the confirmed fraud account and the fraud account to be confirmed;
and through an API (application programming interface) provided by a social software service provider, the confirmed fraud account is forbidden, a fraud warning plug-in is added aiming at the fraud account to be confirmed, and fraud warning is carried out on the social account communicated with the fraud account to be confirmed through the fraud warning plug-in.
The effect of above-mentioned scheme lies in: different from the existing countercheck method, the method can directly block the confirmed fraud account through the API provided by the social software service provider so as to prevent the fraud molecules from continuing to fraud through the fraud account; and adding fraud warning plug-ins to the fraud account to be confirmed through the API, so as to prevent the occurrence of fraud events, reduce the occurrence of fraud events at a high probability, and solve the problems that the prior art can only acquire the network social number of a fraud, cannot prevent the occurrence of fraud events, and even cannot reduce the loss of a scammed person.
In a further preferred aspect, the fraud early warning to the social account communicating with the fraud account to be confirmed by the fraud warning plug-in specifically comprises:
when detecting that the account number to be confirmed and the social account number have account transfer transaction for the first time or bank card information is sent, preventing the transaction from occurring or preventing the bank card information from being sent to the account number to be confirmed;
when detecting that the account number to be confirmed and the social account number perform transfer transaction for the second time or send bank card information, sending an early warning task to a fraud countercheck worker, and confirming whether the fraud countercheck worker is a fraud event to a suspected victim;
if so, preventing the transaction from occurring or preventing the bank card information from being sent to the fraud account number to be confirmed, marking the fraud account number to be confirmed as a confirmed fraud account number and carrying out sealing; and if not, marking the fraud account number to be confirmed as a suspected normal account number, and allowing the transaction to continue or allowing a bank card signal to be sent to the suspected normal account number.
The effect of above-mentioned scheme lies in: the account number to be confirmed is not determined as a fraud account number, the transaction can be fraud or normal transaction, when the transaction is first conducted or bank card information appears, the transaction is prevented from occurring or the bank card information is successfully sent, a suspected victim can be warned, when the suspected victim conducts the transaction again or the bank card information appears, whether the suspected victim is a fraud event or not can be confirmed manually, on one hand, when whether the suspected victim is the fraud event or not is not confirmed, the suspected victim is warned through technology, and if the suspected victim realizes the fraud event by himself, the workload of fraud countermakers is reduced and the fraud event is prevented from occurring; on the other hand, when the suspected victim insists on the transaction or sends the bank card information, the condition can be confirmed manually to accurately judge whether the transaction is a fraud event, if the transaction is confirmed to be the fraud event, the fraud event can be prevented from occurring and being continued to be deceived by blocking the fraud account, and if the transaction is confirmed to be a normal event, the completion of the event is not influenced by the method and the system.
In a further preferred scheme, the fraud account to be confirmed is divided into: the account number to be confirmed with high risk, the account number to be confirmed with medium risk and the account number to be confirmed with low risk; before the confirming of the suspected victim as a fraud event by the fraud counter-controller, the method further comprises: the computer end searches identity information of a suspected victim according to the data matching of the suspected victim social account, the risk level of the fraud account to be confirmed, the suspected victim social account and the fraud type, and respectively generates a high-risk fraud interception task, a medium-risk fraud interception task and a low-risk fraud interception task according to the identity information of the suspected victim and the risk level of the fraud account to be confirmed; the identity information includes: family name, gender, contact details, age, occupation, and whether or not they are fraudulently experienced.
The effect of above-mentioned scheme lies in: the occurrence of fraud events is basically irregular in time and position, and more fraud events are likely to occur in the same region in the same time period, when fraud events occur intensively or fraud countermakers cannot confirm and intercept the fraud events in time due to other conditions, under the condition of first transaction warning, the risk level is marked, so that the fraud countermakers preferentially contact suspected victims easy to cheat (people in different age groups are different in cheating degree, and people in different professions are also different in cheating degree), and the occurrence probability and loss of fraud events can be further reduced.
In a further preferred approach, said confirmation by the fraud counterfeiter to the suspected victim whether or not it is a fraudulent event is specifically: the method comprises the steps that a mobile phone end receives and displays an interception task list, receives an instruction of a fraud counter worker for receiving a current highest-risk interception task, and locks a selected interception task; when the fraud interception task is not picked up after the preset time, sending an early warning short message to warn suspected victims, sending task incompletion information to a computer terminal, and temporarily forbidding the fraud account to be confirmed by the computer terminal.
The effect of above-mentioned scheme lies in: when the tasks are too many or the fraud countermeasures have other tasks and are not picked up by people, on one hand, the suspected victim is warned through the early warning short message to ensure that the suspected victim can receive the early warning, and the occurrence probability and loss of fraud events are reduced; on the other hand, the computer end temporarily forbids the fraud account numbers to be confirmed so as to reduce or even avoid the property loss of suspected victims as much as possible.
In a further preferred scheme, the steps of blocking the confirmed fraud account and adding a fraud warning plug-in for the fraud account to be confirmed through an API interface provided by a social software service provider, and fraud warning to the social account in communication with the fraud account to be confirmed through the fraud warning plug-in further comprise: and receiving the type of the social account related to fraud, the type related to fraud, the number and the reason for countermeasures input by anti-fraud personnel in batches, and matching and calling an API (application programming interface) provided by the social software service provider according to the type of the social account related to fraud.
The effect of above-mentioned scheme lies in: the method for reverse control of the social account number by means of forbidding or adding fraud warning plug-ins and the like cannot be applied unscrupulously, and normal social contact of social users is easily influenced by false control, so that the method adopts a batch uploading mode after manual auditing, on one hand, the reverse control efficiency is improved, on the other hand, the reverse control accuracy is improved, and the false control probability is reduced.
In a further preferred embodiment, the step of obtaining a fraud-related social account according to the user reporting data and the internet data crawled by using a crawler technology, and determining a fraud-related level of the obtained fraud-related social account further includes: acquiring a fraud-related website and judging a fraud-related level of the acquired fraud-related website, wherein the fraud-related level comprises: the confirmed fraud websites and the fraud websites to be confirmed;
the steps of acquiring the fraud-related websites and judging the fraud-related level of the acquired fraud-related websites further comprise: and logging out the domain name resolution of the confirmed fraud websites through an API (application programming interface) provided by a server operator, and adding a fraud interception plug-in aiming at the fraud websites to be confirmed, wherein the fraud interception plug-in is used for locking a page when detecting that a user inputs bank card information until a fraud counter man manually issues a lock releasing instruction.
The effect of above-mentioned scheme lies in: in various fraud types, such as single-swiping fraud, loan fraud, impersonation common law fraud, sent fake wanted and other fraud types, a suspect sends a relevant website to a victim, and the victim basically performs website access by clicking. If the relevant case-related websites are countermarked, when the victim clicks and visits the relevant websites, the victim is prompted to be unable to visit or the websites are suspected to be reported for many times and are sealed, or the page is temporarily locked when the user inputs sensitive information such as a bank card and the like, so that the victim is prevented from browsing the relevant webpages, the victim can be warned, the possibility of being cheated is reduced, or whether the fraud is a fraud event is confirmed manually, on one hand, the countermarking efficiency is improved, on the other hand, the countermarking accuracy is improved, and the false sealing probability is reduced.
In a further preferred embodiment, the step of obtaining a fraud-related social account according to the user reporting data and the internet data crawled by using a crawler technology, and determining a fraud-related level of the obtained fraud-related social account further includes: acquiring a fraud-related mobile phone number and judging a fraud-related level of the acquired fraud-related mobile phone number, wherein the fraud-related level comprises: the confirmed fraud number and the fraud number to be confirmed;
the steps of acquiring the fraud-related mobile phone number and judging the fraud-related level of the acquired fraud-related mobile phone number further comprise: and locking the confirmed fraud numbers through an API (application program interface) provided by a communication operator, marking the fraud numbers to be confirmed as early warning numbers and sending the early warning numbers to a mobile phone end, and warning suspected victims through the mobile phone end.
The effect of above-mentioned scheme lies in: telecommunication fraud is cheated by calling and sending short messages at the earliest time, and then is developed into network number change, and with the popularization of the mobile internet, the proportion of crime made by using a network social tool rapidly rises; but the fraud modes of calling and sending short messages still occupy a larger proportion, the invention directly locks the confirmed fraud numbers through the API interface provided by the communication operator, and can prevent fraud molecules from continuously using the fraud numbers to cheat; and the marked fraud numbers to be confirmed are displayed through the mobile phone terminal, so that the suspects with fraud suspects can be prevented from carrying out fraud by using the fraud numbers to be confirmed to a certain extent, and the occurrence probability and loss of fraud events are reduced.
In a further preferred embodiment, the step of obtaining a fraud-related social account according to the user reporting data and the internet data crawled by using a crawler technology, and determining a fraud-related level of the obtained fraud-related social account further includes: obtaining false APP information, wherein the false APP information comprises: name, profile, download link, and fraud type;
the step of obtaining false APP information further comprises: and sending the false APP information to a mobile phone end, monitoring the mobile phone of the user through the mobile phone end, and warning the user when the mobile phone of the user downloads the suspected false APP application program.
The effect of above-mentioned scheme lies in: telecommunication network fraud cases implemented by fraud groups by using false APPs account for about 15% of all fraud cases, the false APPs become indispensable key links in the whole crime chain, and thus a huge technical development gray industry chain is generated, and a large number of illegal criminals participate in the technical development gray industry chain. Related technology developers are definite in work division and plan in groups, various fraud functions of the APP are customized around the specific requirements of telecommunication network fraud groups, some of the APP functions are responsible for writing program codes, some of the APP functions are responsible for purchasing domain names and leasing servers, and some of the APP functions are responsible for packaging and distributing. Through the operation of each link layer by layer, the false APP is sold to fraud groups. Subsequently, the fraud party packages the illegal objects and APP functional characteristics into a very confusing 'regular' application platform, and lures the victim to click a link or scan a two-dimensional code to download the APP, thereby implementing fraud. According to the method and the device, the mobile phone of the user is monitored through the mobile phone terminal, data comparison is carried out when the user downloads the APP, and when the suspected false APP application program is detected, the early warning information is sent to the user, so that the false APP fraud event is reduced, and the application range of fraud countercheck interception is enlarged.
A system for enabling a fraud countercheck interception method, comprising a memory for storing a fraud countercheck interception program and a processor for running the fraud countercheck interception program to enable the fraud countercheck interception method as described above.
A storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of a fraud anti-reverse interception method as described above. The storage medium comprises all technical characteristics of the fraud countercheck interception method, so that all technical effects of the fraud countercheck interception method are achieved, and further description is omitted.
Compared with the prior art, the fraud countercheck intercepting method provided by the invention comprises the following steps: acquiring a fraud-related social account according to the user reporting data and the Internet data crawled by using a crawler technology, and judging the fraud-related level of the acquired fraud-related social account; and through an API (application programming interface) provided by a social software service provider, the confirmed fraud account is forbidden, a fraud warning plug-in is added aiming at the fraud account to be confirmed, and fraud warning is carried out on the social account communicated with the fraud account to be confirmed through the fraud warning plug-in. According to the method, the confirmed fraud account can be directly forbidden through the API provided by the social software service provider, so that fraud molecules are prevented from continuing to fraud through the fraud account; and adding fraud warning plug-ins to the fraud account to be confirmed through the API, so as to prevent the occurrence of fraud events, reduce the occurrence of fraud events at a high probability, and solve the problems that the prior art can only acquire the network social number of a fraud, cannot prevent the occurrence of fraud events, and even cannot reduce the loss of a scammed person.
Drawings
FIG. 1 is a flow chart of a fraud countermeasure interception method in a preferred embodiment of the present invention.
Detailed Description
The present invention provides a fraud countercheck intercepting method, system and storage medium, and in order to make the objects, technical schemes and effects of the present invention clearer and clearer, the present invention will be further described in detail below by referring to the attached drawings and examples. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The invention provides a fraud countercheck intercepting method, as shown in fig. 1, comprising:
s100, obtaining a fraud-related social account according to the user reporting data and the Internet data crawled by using a crawler technology, judging the fraud-related level of the obtained fraud-related social account, and dividing the fraud-related social account into: the confirmed fraud account and the fraud account to be confirmed.
Preferably, the method also receives the ecological data shared by the Internet companies and the joint anti-fraud laboratory warning situations of various regions so as to obtain the social account related to fraud; therefore, in a further preferred embodiment of the invention, the anti-fraud big data is acquired by combining the modes of user reporting, ecological data shared by internet companies, joint anti-fraud laboratory alarms in various regions, internet crawler technologies and the like, and by collecting and organizing various illegal websites, phishing websites, case-involved APPs, communication tools, VOS servers and other fraud-involved channels and means, the fraud-involved data and information data input by victims per se are acquired by utilizing the network technology to the websites, APP backgrounds and VOS servers of different fraud types.
In specific implementation, the fraud account to be confirmed is divided into: a high risk account to be confirmed, a medium risk account to be confirmed, and a low risk account to be confirmed.
S200, the confirmed fraud account is forbidden through an API (application programming interface) provided by a social software service provider, a fraud warning plug-in is added aiming at the fraud account to be confirmed, and fraud warning is carried out on the social account communicated with the fraud account to be confirmed through the fraud warning plug-in.
An API (application Program interface), i.e. an application Program interface, is a set of definitions, programs and protocols, and realizes mutual communication between computer software through the API interface, one main function of the API is to provide a general function set, and programmers can develop application programs by calling API functions, thereby reducing programming tasks. The API is also a middleware at the same time and provides data sharing for various platforms; by utilizing the characteristics of the API, fraud countermeasures (such as policemen and auxiliary policemen using fraud countermeasures systems) can directly block the confirmed fraud account without being checked layer by layer inside the social software service provider, so that the countermeasures efficiency of the fraud account is improved; similarly, the present invention also utilizes the characteristics, so that the fraud countermeasures can directly add fraud warning inserts to the fraud account to be confirmed, so as to prompt the suspected fraud molecules of the user opposite party in communication with the fraud account to be confirmed.
In a further preferred embodiment of the present invention, the fraud early warning to the social account communicating with the fraud account to be confirmed by the fraud warning plug-in specifically comprises:
and when detecting that the account number to be confirmed and the social account number have the transfer transaction for the first time or bank card information is sent, preventing the transaction from occurring or preventing the bank card information from being sent to the account number to be confirmed. For example, the account a is a fraud account to be confirmed, the fraud warning plug-in added in the invention monitors the behavior of the account a at any time, and when the account a is monitored to send information to other accounts (such as the account B), the suspected fraud-related information of the account a is displayed on the communication page, so that the probability of being cheated by the social user can be reduced; inevitably, part of users do not pay enough attention to the prompt information, and still can transact with the account A or send the related information of the bank card to the account A, at the moment, the invention can improve the vigilance of the users by preventing the transaction and the related information from being successfully sent, and further reduces the cheating probability of social users.
And when detecting that the account number to be confirmed and the social account number perform transfer transaction for the second time or send bank card information, sending an early warning task to a fraud countercheck worker, and confirming whether the fraud countercheck worker is a fraud event to a suspected victim. Under the conditions of fraud warning and first transaction prevention, the account B still initiates transaction or sends related information of a bank card, and is possibly a non-fraud event, but because the account A is suspected to be fraud, the invention adopts a fraud counter to manually confirm the condition, so that normal transaction and the occurrence probability of fraud events are ensured, and the fraud probability of social users is further reduced.
Specifically, the process for the fraud counter-operator to manually confirm the situation is as follows: if so, preventing the transaction from occurring or preventing the bank card information from being sent to the fraud account number to be confirmed, marking the fraud account number to be confirmed as a confirmed fraud account number and carrying out sealing; and if not, marking the fraud account number to be confirmed as a suspected normal account number, and allowing the transaction to continue or allowing a bank card signal to be sent to the suspected normal account number.
Further, before said confirming by the fraud counterfeiter whether the fraud event is a fraud event to the suspected victim: the computer end searches identity information of a suspected victim according to the data matching of the suspected victim social account, the risk level of the fraud account to be confirmed, the suspected victim social account and the fraud type, and respectively generates a high-risk fraud interception task, a medium-risk fraud interception task and a low-risk fraud interception task according to the identity information of the suspected victim and the risk level of the fraud account to be confirmed; the identity information includes: family name, gender, contact details, age, occupation, and whether or not they are fraudulently experienced. People of different ages and professions are different in fraud possibility, and in fraud modes, fraud countermeasures are different, fraud risk confirmation is carried out according to the ages and professions, high-risk fraud intercepting tasks can be processed firstly under the condition that anti-fraud artificial resources are in shortage, and fraud intercepting effects can be guaranteed.
In practice, the confirmation of whether the fraud event is a fraud event to the suspected victim by the fraud countermeasures is: the method comprises the steps that a mobile phone end receives and displays an interception task list, receives an instruction of a fraud counter worker for receiving a current highest-risk interception task, and locks a selected interception task; when the fraud interception task is not picked up after the preset time, sending an early warning short message to warn suspected victims, sending task incompletion information to a computer terminal, and temporarily forbidding the fraud account to be confirmed by the computer terminal.
For the interception task, the priority of the high-risk interception task is higher than that of the medium-risk interception task undoubtedly, and the priority of the medium-risk interception task is higher than that of the low-risk interception task; in the invention, when the early warning counterman receives the interception task, if the high risk interception task exists, the early warning counterman cannot receive the middle risk interception task and the low risk interception task, if the high risk interception task does not exist but the middle risk interception task exists, the early warning counterman can receive the middle risk interception task but cannot receive the low risk interception task, and under the condition of anti-fraud artificial resource shortage, the fraud interception task with higher risk is processed at first, so that the fraud interception effect can be ensured; meanwhile, for the task which is not picked up by people within a certain time, the invention prompts the user by sending the warning short message, and temporarily forbids the fraud account number to be confirmed through the computer terminal, thereby preventing the fraud event.
Preferably, S100 further comprises: and receiving the type of the social account related to fraud, the type related to fraud, the number and the reason for countermeasures input by anti-fraud personnel in batches, and matching and calling an API (application programming interface) provided by the social software service provider according to the type of the social account related to fraud. The method for reverse control of the social account number by means of forbidding or adding fraud warning plug-ins and the like cannot be applied unscrupulously, and normal social contact of social users is easily influenced by false control, so that the method adopts a batch uploading mode after manual auditing, on one hand, the reverse control efficiency is improved, on the other hand, the reverse control accuracy is improved, and the false control probability is reduced. Similarly, the invention can also be applied to the control of the fraud-related websites, and the control of the fraud-related websites and the control of the fraud-related social accounts can be centralized on the same page input and batch control, and the text invention is not repeated.
In specific implementation, the fraud-related social account types and the fraud-related types are indispensable options for selecting input modes, so that the information input efficiency can be improved, the numbers are indispensable items for filling the input modes, the countermeasures reason is unnecessary items, and the countermeasures can be subsequently supplemented, so that the countermeasures efficiency of fraud channels is improved, and the countermeasures can not be abused.
According to another aspect of the present invention, the S100 further includes: acquiring a fraud-related website and judging a fraud-related level of the acquired fraud-related website, wherein the fraud-related level comprises: the confirmed fraud websites and the fraud websites to be confirmed; this step is followed by: and logging out the domain name resolution of the confirmed fraud websites through an API (application programming interface) provided by a server operator, and adding a fraud interception plug-in aiming at the fraud websites to be confirmed, wherein the fraud interception plug-in is used for locking a page when detecting that a user inputs bank card information until a fraud counter man manually issues a lock releasing instruction.
In various fraud types, such as single-swiping fraud, loan fraud, impersonation common law fraud, sent fake wanted and other fraud types, a suspect sends a relevant website to a victim, and the victim basically performs website access by clicking. If the relevant case-related websites are countermarked, when the victim clicks and visits the relevant websites, the victim is prompted to be unable to visit or the websites are suspected to be reported for many times and are sealed, or the page is temporarily locked when the user inputs sensitive information such as a bank card and the like, so that the victim is prevented from browsing the relevant webpages, the victim can be warned, the possibility of being cheated is reduced, or whether the fraud is a fraud event is confirmed manually, on one hand, the countermarking efficiency is improved, on the other hand, the countermarking accuracy is improved, and the false sealing probability is reduced.
According to still another aspect of the present invention, the S100 further includes: acquiring a fraud-related mobile phone number and judging a fraud-related level of the acquired fraud-related mobile phone number, wherein the fraud-related level comprises: the confirmed fraud number and the fraud number to be confirmed; this step is followed by: and locking the confirmed fraud numbers through an API (application program interface) provided by a communication operator, marking the fraud numbers to be confirmed as early warning numbers and sending the early warning numbers to a mobile phone end, and warning suspected victims through the mobile phone end. Telecommunication fraud is cheated by calling and sending short messages at the earliest time, and then is developed into network number change, and with the popularization of the mobile internet, the proportion of crime made by using a network social tool rapidly rises; but the fraud modes of calling and sending short messages still occupy a larger proportion, the invention directly locks the confirmed fraud numbers through the API interface provided by the communication operator, and can prevent fraud molecules from continuously using the fraud numbers to cheat; and the marked fraud numbers to be confirmed are displayed through the mobile phone terminal, so that the suspects with fraud suspects can be prevented from carrying out fraud by using the fraud numbers to be confirmed to a certain extent, and the occurrence probability and loss of fraud events are reduced.
According to yet another aspect of the present invention, the S100 further includes: obtaining false APP information, wherein the false APP information comprises: name, profile, download link, and fraud type; this step is followed by: and sending the false APP information to a mobile phone end, monitoring the mobile phone of the user through the mobile phone end, and warning the user when the mobile phone of the user downloads the suspected false APP application program.
Telecommunication network fraud cases implemented by fraud groups by using false APPs account for about 15% of all fraud cases, the false APPs become indispensable key links in the whole crime chain, and thus a huge technical development gray industry chain is generated, and a large number of illegal criminals participate in the technical development gray industry chain. Related technology developers are definite in work division and plan in groups, various fraud functions of the APP are customized around the specific requirements of telecommunication network fraud groups, some of the APP functions are responsible for writing program codes, some of the APP functions are responsible for purchasing domain names and leasing servers, and some of the APP functions are responsible for packaging and distributing. Through the operation of each link layer by layer, the false APP is sold to fraud groups. Subsequently, the fraud party packages the illegal objects and APP functional characteristics into a very confusing 'regular' application platform, and lures the victim to click a link or scan a two-dimensional code to download the APP, thereby implementing fraud. According to the method and the device, the mobile phone of the user is monitored through the mobile phone terminal, data comparison is carried out when the user downloads the APP, and when the suspected false APP application program is detected, the early warning information is sent to the user, so that the false APP fraud event is reduced, and the application range of fraud countercheck interception is enlarged.
A system for enabling a fraud countercheck interception method, comprising a memory for storing a fraud countercheck interception program and a processor for running the fraud countercheck interception program to enable the fraud countercheck interception method as described above.
A storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of a fraud anti-reverse interception method as described above. The storage medium comprises all technical characteristics of the fraud countercheck interception method, so that all technical effects of the fraud countercheck interception method are achieved, and further description is omitted.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, databases, or other media used in embodiments provided herein may include non-volatile and/or volatile memory. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), synchronous Link (SyNchlinNk) DRAM (SLDRAM), Rambus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The algorithms or displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. In addition, embodiments of the present invention are not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the embodiments of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the invention and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, any of the claimed embodiments may be used in any combination.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names. The steps in the above embodiments should not be construed as limiting the order of execution unless specified otherwise.

Claims (10)

1. A fraud countercheck interception method is characterized by comprising the following steps:
acquiring a fraud-related social account according to the user reporting data and the Internet data crawled by using a crawler technology, judging a fraud-related level of the acquired fraud-related social account, and dividing the fraud-related social account into: the confirmed fraud account and the fraud account to be confirmed;
and through an API (application programming interface) provided by a social software service provider, the confirmed fraud account is forbidden, a fraud warning plug-in is added aiming at the fraud account to be confirmed, and fraud warning is carried out on the social account communicated with the fraud account to be confirmed through the fraud warning plug-in.
2. The fraud countercheck interception method according to claim 1, wherein said fraud early warning to social accounts in communication with said fraud account to be confirmed by means of a fraud warning plug-in specifically comprises:
when detecting that the account number to be confirmed and the social account number have account transfer transaction for the first time or bank card information is sent, preventing the transaction from occurring or preventing the bank card information from being sent to the account number to be confirmed;
when detecting that the account number to be confirmed and the social account number perform transfer transaction for the second time or send bank card information, sending an early warning task to a fraud countercheck worker, and confirming whether the fraud countercheck worker is a fraud event to a suspected victim;
if so, preventing the transaction from occurring or preventing the bank card information from being sent to the fraud account number to be confirmed, marking the fraud account number to be confirmed as a confirmed fraud account number and carrying out sealing; and if not, marking the fraud account number to be confirmed as a suspected normal account number, and allowing the transaction to continue or allowing a bank card signal to be sent to the suspected normal account number.
3. The fraud countercheck interception method according to claim 2, wherein said fraud account to be confirmed is divided into: the account number to be confirmed with high risk, the account number to be confirmed with medium risk and the account number to be confirmed with low risk; before the confirming of the suspected victim as a fraud event by the fraud counter-controller, the method further comprises: the computer end searches identity information of a suspected victim according to the data matching of the suspected victim social account, the risk level of the fraud account to be confirmed, the suspected victim social account and the fraud type, and respectively generates a high-risk fraud interception task, a medium-risk fraud interception task and a low-risk fraud interception task according to the identity information of the suspected victim and the risk level of the fraud account to be confirmed; the identity information includes: family name, gender, contact details, age, occupation, and whether or not they are fraudulently experienced.
4. The fraud countercheck interception method according to claim 3, wherein said confirmation by a fraud counterman to a suspected victim is specifically: the method comprises the steps that a mobile phone end receives and displays an interception task list, receives an instruction of a fraud counter worker for receiving a current highest-risk interception task, and locks a selected interception task; when the fraud interception task is not picked up after the preset time, sending an early warning short message to warn suspected victims, sending task incompletion information to a computer terminal, and temporarily forbidding the fraud account to be confirmed by the computer terminal.
5. The fraud countercheck interception method according to claim 4, wherein said steps of blocking said confirmed fraud account and adding a fraud warning plug-in for said fraud account to be confirmed through an API interface provided by a social software facilitator, and fraud warning to social accounts in communication with said fraud account to be confirmed through a fraud warning plug-in further comprise before: and receiving the type of the social account related to fraud, the type related to fraud, the number and the reason for countermeasures input by anti-fraud personnel in batches, and matching and calling an API (application programming interface) provided by the social software service provider according to the type of the social account related to fraud.
6. The fraud countercheck interception method according to claim 5, wherein said steps of acquiring a fraud-related social account according to the user reporting data and the internet data crawled by using crawler technology, and determining a fraud-related level of the acquired fraud-related social account further comprise: acquiring a fraud-related website and judging a fraud-related level of the acquired fraud-related website, wherein the fraud-related level comprises: the confirmed fraud websites and the fraud websites to be confirmed;
the steps of acquiring the fraud-related websites and judging the fraud-related level of the acquired fraud-related websites further comprise: and logging out the domain name resolution of the confirmed fraud websites through an API (application programming interface) provided by a server operator, and adding a fraud interception plug-in aiming at the fraud websites to be confirmed, wherein the fraud interception plug-in is used for locking a page when detecting that a user inputs bank card information until a fraud counter man manually issues a lock releasing instruction.
7. The fraud countercheck interception method according to claim 6, wherein said steps of acquiring a fraud-related social account according to the user reporting data and the internet data crawled by using crawler technology, and determining a fraud-related level of the acquired fraud-related social account further comprise: acquiring a fraud-related mobile phone number and judging a fraud-related level of the acquired fraud-related mobile phone number, wherein the fraud-related level comprises: the confirmed fraud number and the fraud number to be confirmed;
the steps of acquiring the fraud-related mobile phone number and judging the fraud-related level of the acquired fraud-related mobile phone number further comprise: and locking the confirmed fraud numbers through an API (application program interface) provided by a communication operator, marking the fraud numbers to be confirmed as early warning numbers and sending the early warning numbers to a mobile phone end, and warning suspected victims through the mobile phone end.
8. The fraud countercheck interception method according to claim 7, wherein said steps of acquiring a fraud-related social account according to the user reporting data and the internet data crawled by using crawler technology, and determining a fraud-related level of the acquired fraud-related social account further comprise: obtaining false APP information, wherein the false APP information comprises: name, profile, download link, and fraud type;
the step of obtaining false APP information further comprises: and sending the false APP information to a mobile phone end, monitoring the mobile phone of the user through the mobile phone end, and warning the user when the mobile phone of the user downloads the suspected false APP application program.
9. A system for implementing a fraud countercheck interception method, comprising a memory for storing a fraud countercheck interception program and a processor for running said fraud countercheck interception program to implement the fraud countercheck interception method according to any one of claims 1 to 8.
10. A storage medium having stored thereon a computer program, wherein the computer program, when executed by a processor, implements the steps of the fraud countermeasure interception method recited in any one of claims 1 to 8.
CN202111324540.1A 2021-11-10 2021-11-10 Fraud countercheck interception method, system and storage medium Active CN114020985B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111324540.1A CN114020985B (en) 2021-11-10 2021-11-10 Fraud countercheck interception method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111324540.1A CN114020985B (en) 2021-11-10 2021-11-10 Fraud countercheck interception method, system and storage medium

Publications (2)

Publication Number Publication Date
CN114020985A true CN114020985A (en) 2022-02-08
CN114020985B CN114020985B (en) 2022-10-14

Family

ID=80062882

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111324540.1A Active CN114020985B (en) 2021-11-10 2021-11-10 Fraud countercheck interception method, system and storage medium

Country Status (1)

Country Link
CN (1) CN114020985B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170161745A1 (en) * 2015-12-03 2017-06-08 Mastercard International Incorporated Payment account fraud detection using social media heat maps
CN107066616A (en) * 2017-05-09 2017-08-18 北京京东金融科技控股有限公司 Method, device and electronic equipment for account processing
CN107682187A (en) * 2017-09-29 2018-02-09 中科聚信信息技术(北京)有限公司 A kind of anti-fraud method based on social network analysis model
CN107767138A (en) * 2017-10-20 2018-03-06 杭州呯嘭智能技术有限公司 On-line payment is counter to cheat method and system
CN107784575A (en) * 2016-08-29 2018-03-09 腾讯科技(深圳)有限公司 Risk class determines method, transfer operation reminding method, apparatus and system
CN110245875A (en) * 2019-06-21 2019-09-17 深圳前海微众银行股份有限公司 Risk of fraud appraisal procedure, device, equipment and storage medium
CN111278014A (en) * 2019-12-31 2020-06-12 中移(杭州)信息技术有限公司 Fraud prevention system, method, server and storage medium
CN111865925A (en) * 2020-06-24 2020-10-30 国家计算机网络与信息安全管理中心 Network traffic based fraud group identification method, controller and medium
CN113067820A (en) * 2021-03-19 2021-07-02 深圳市安络科技有限公司 Method, device and equipment for early warning abnormal webpage and/or APP
CN113098870A (en) * 2021-04-01 2021-07-09 恒安嘉新(北京)科技股份公司 Phishing detection method and device, electronic equipment and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170161745A1 (en) * 2015-12-03 2017-06-08 Mastercard International Incorporated Payment account fraud detection using social media heat maps
CN107784575A (en) * 2016-08-29 2018-03-09 腾讯科技(深圳)有限公司 Risk class determines method, transfer operation reminding method, apparatus and system
CN107066616A (en) * 2017-05-09 2017-08-18 北京京东金融科技控股有限公司 Method, device and electronic equipment for account processing
CN107682187A (en) * 2017-09-29 2018-02-09 中科聚信信息技术(北京)有限公司 A kind of anti-fraud method based on social network analysis model
CN107767138A (en) * 2017-10-20 2018-03-06 杭州呯嘭智能技术有限公司 On-line payment is counter to cheat method and system
CN110245875A (en) * 2019-06-21 2019-09-17 深圳前海微众银行股份有限公司 Risk of fraud appraisal procedure, device, equipment and storage medium
CN111278014A (en) * 2019-12-31 2020-06-12 中移(杭州)信息技术有限公司 Fraud prevention system, method, server and storage medium
CN111865925A (en) * 2020-06-24 2020-10-30 国家计算机网络与信息安全管理中心 Network traffic based fraud group identification method, controller and medium
CN113067820A (en) * 2021-03-19 2021-07-02 深圳市安络科技有限公司 Method, device and equipment for early warning abnormal webpage and/or APP
CN113098870A (en) * 2021-04-01 2021-07-09 恒安嘉新(北京)科技股份公司 Phishing detection method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114020985B (en) 2022-10-14

Similar Documents

Publication Publication Date Title
CN101375546B (en) System and method for fraud monitoring, detection, and tiered user authentication
CN110300096B (en) Self-checking method, device and equipment based on local certificate and storage medium
CN111614624B (en) Risk detection method, device, system and storage medium
US10373135B2 (en) System and method for performing secure online banking transactions
CN108600162B (en) User authentication method and device, computing equipment and computer storage medium
CN111311285A (en) Method, device, equipment and storage medium for preventing user from illegally logging in
CN111709055A (en) User information acquisition method and device, electronic equipment and storage medium
WO2020233070A1 (en) Payment risk verification method and apparatus, computer device, and storage medium
CN113111359A (en) Big data resource sharing method and resource sharing system based on information security
Zharova The protect mobile user data in Russia
CN114422139A (en) API gateway request security verification method and device, electronic equipment and computer readable medium
EP3547243A1 (en) Methods and apparatuses for fraud handling
CN114020985B (en) Fraud countercheck interception method, system and storage medium
KR20150059882A (en) System and method for analyzing malicious application of smart-phone and service system and service method for blocking malicious application of smart-phone
CN116862236A (en) Risk scene assessment method, system, terminal equipment and storage medium
US10652276B1 (en) System and method for distinguishing authentic and malicious electronic messages
CN113326540B (en) Micro-service calling authority control method, device, server, system and medium
KR102304237B1 (en) compliance management system through automatic diagnosis of infrastructure asset threat and method therefor
CN113129017B (en) Information sharing method, device and equipment
CN111507594B (en) Data processing method and device
US20210067554A1 (en) Real-time notifications on data breach detected in a computerized environment
Singh et al. Attacks on Vulnerable Web Applications
Kazemi et al. Analysis of Scalability and Risks in Cloud Computing
CN113379577A (en) Transaction auditing method, device and equipment
Mishra et al. Cyber security in cloud platforms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant