CN115982438B - Illegal induction interception processing method, system and storage medium - Google Patents

Illegal induction interception processing method, system and storage medium Download PDF

Info

Publication number
CN115982438B
CN115982438B CN202211547277.7A CN202211547277A CN115982438B CN 115982438 B CN115982438 B CN 115982438B CN 202211547277 A CN202211547277 A CN 202211547277A CN 115982438 B CN115982438 B CN 115982438B
Authority
CN
China
Prior art keywords
interception
emergency contact
illegal
emergency
contact information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211547277.7A
Other languages
Chinese (zh)
Other versions
CN115982438A (en
Inventor
高磊
李有为
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Secxun Technology Co ltd
Original Assignee
Shenzhen Secxun Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Secxun Technology Co ltd filed Critical Shenzhen Secxun Technology Co ltd
Priority to CN202211547277.7A priority Critical patent/CN115982438B/en
Publication of CN115982438A publication Critical patent/CN115982438A/en
Application granted granted Critical
Publication of CN115982438B publication Critical patent/CN115982438B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses an illegal induction interception processing method, a system and a storage medium, wherein the method utilizes the characteristics that the crowded effect and easily deceptive crowd are easily influenced by other people, so that corresponding protected residents can be effectively intercepted and protected when being illegally induced; the method can timely and effectively generate emergency contact information by pre-storing the format interception message, and is matched with one-key forwarding and automatic forwarding, so that the interception timeliness is greatly improved; under the condition that the emergency contact person fails to forward by one key in time, the method not only can automatically forward but also can inform corresponding interception specialists so as to ensure that the emergency contact person can prompt a protected resident quickly, and greatly improves the interception effectiveness; meanwhile, the invention also carries out language recognition on the format interception messages among a plurality of emergency contacts through the server side so as to prevent the psychological phenomenon that the protected residents are excessively stimulated or excessively strengthened and cause extremely impatience or reverse, and further improves the interception effectiveness.

Description

Illegal induction interception processing method, system and storage medium
Technical Field
The invention relates to the technical field of anti-illegal induction activities, in particular to an illegal induction interception processing method, an illegal induction interception processing system and a storage medium.
Background
The method aims at illegal possession, uses imaginary facts or a method of hiding true looks, cheats the behavior of taking out the public and private property with larger money amount is common from ancient times, and along with the progress of the times, the means of illegally inducing activity molecules are more and more advanced, and the problems of difficult investigation and evidence collection, informatization of modes, grouping of forms, extensive targets, rapid funds transfer, huge social hazard and the like are accompanied; therefore, after the case occurs, the method can prevent illegal induction of the occupational activity from occurring.
The invention patent application with the application number of 2021114160025 discloses a processing method, a system and a storage medium for illegally inducing an occupancy activity of a telecommunication, wherein the processing method comprises the following steps: generating an exclusive two-dimensional code corresponding to propaganda early warning personnel one by one, wherein the exclusive two-dimensional code comprises information: propaganda and early warning personnel name, affiliated work units and identity registration flow instructions; receiving an instruction of code scanning registration of a user, and receiving basic information filled in by the registered user, wherein the basic information comprises: sex, mobile phone number, occupation, age group and anti-illegal induction unit; according to professional information and age group information filled by the user, matching illegal induction occupation modes which are easy to be received by the user, and carrying out directional anti-illegal induction propaganda according to the matched illegal induction occupation modes. The part of content aims at carrying out propaganda and early warning of anti-illegal induction activities on vulnerable people and vulnerable types in daily life through propaganda and early warning personnel so as to improve the anti-illegal induction consciousness of residents.
In addition, the patent application of the invention also provides a further scheme: selecting a daemon and/or receiving a daemon registration and establishing a daemon alliance by taking communities, enterprises, schools, hospitals, communities, villages and/or responsibility areas as units; aiming at effectively protecting groups such as community residents, enterprise staff, school students and the like through the close-range anti-illegal induction propaganda of the voluntary daemon/the selective daemon, the novel patterns of group prevention and group treatment and civil anti-illegal induction are constructed.
It will be appreciated that even the further solutions provided by the above-mentioned patent application of the invention only make it possible to raise as much as possible the awareness of the anti-illegitimate inductions of the resident, without any immediate and efficient interception of the victim when he is about to be illegally inducted.
The invention patent application with the application number of 2021113245401 discloses a countering interception method, which comprises the following steps: acquiring an illegal induced social account number and a grade; sealing and banning the confirmed illegal induction account through an API interface provided by a social software service provider, adding an alarm plug-in for the account to be confirmed, and carrying out early warning on the account to be confirmed through the alarm plug-in; when the fact that the account number to be confirmed and the social account number are subjected to transfer transaction for the second time or bank card information is sent is detected, an early warning task is sent to an illegal induction counterman, and the illegal induction counterman is used for carrying out transaction interception, so that the occurrence of illegal induction events is reduced. The patent application aims at reducing the occurrence of the illegal induction event to a certain extent by warning the occurrence of the illegal induction event of the plug-in tissue, but cannot further reduce or even avoid the occurrence of the illegal induction event in the current illegal induction event mode and channel diversity.
It can be seen that the prior art is still in need of improvement and development.
Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, the present invention aims to provide an illegal induction interception processing method, system and storage medium, which aims to solve the problem that the interception efficiency is lower for illegal induction events of the current mode and channel diversity in the existing mode of anti-illegal induction activities.
The technical scheme of the invention is as follows:
an illegally induced interception processing method, comprising:
the server receives and stores the contact information of the protected resident uploaded by the interception specialist and at least two emergency contacts corresponding to the protected resident;
the server side receives format interception messages uploaded by two emergency contacts and used for intercepting the protected resident transactions, carries out language identification and language category division, judges whether two or more format interception messages respectively belong to different language categories required by the overrun effect limiting clause or not, if yes, passes through, and if not, returns at least one format interception message to be modified until all format interception messages respectively belong to different language categories required by the overrun effect limiting clause;
The server receives illegal induction data pushed by at least one data manufacturer, generates an interception task according to the illegal induction data, and sends the interception task to the interception end; meanwhile, generating a plurality of emergency contact information according to the illegal induction data and the format interception messages corresponding to the emergency contacts, and sending the plurality of emergency contact information to a plurality of contact terminals in a one-to-one correspondence manner;
if the contact person terminal receives an operation instruction for forwarding the emergency contact information by one key of the emergency contact person within a preset time, the emergency contact information is sent to a resident terminal, and a result is reported to a server terminal; if the contact person end does not receive an operation instruction for forwarding the emergency contact information by one key of the emergency contact person within a preset time, the emergency contact information is automatically sent to the resident end, and a result is reported to the interception end.
The effect of above-mentioned scheme lies in: the invention uses the secondary effect (secondary effect means that the individual is influenced by the group, suspects and changes the own views, judgment and behaviors, and changes towards the direction consistent with most people of the group), and the easily deceived group is easily influenced by other people, and stores the information of the corresponding interception specialist and emergency contact person in the server in advance, so that the corresponding protected resident can be effectively intercepted and protected when being illegally induced; on the basis, emergency contact information can be timely and effectively generated in a mode of intercepting information in a pre-stored format, and the intercepting timeliness is greatly improved by combining one-key forwarding and automatic forwarding; the server side can be reported to record and record after one-key forwarding, more importantly, under the condition that the emergency contact cannot be forwarded by one-key in time, the corresponding interception special person can be notified, and the interception special person can be notified of the corresponding emergency contact in time, so that the emergency contact can prompt a protected resident quickly, and the interception effectiveness is greatly improved; meanwhile, the invention also carries out language recognition on format interception messages among a plurality of emergency contacts through the server side so as to prevent the psychological phenomenon (namely overrun effect) that the protected residents are excessively stimulated or excessively strengthened and extremely impatient or reverse is caused by the uniform speaking of the format interception messages, and further improves the interception effectiveness.
In a further preferred scheme, the illegal induction data comprise illegal induction activity types, and if the contact side receives an operation instruction for forwarding the emergency contact information by one key of the emergency contact within a preset time, the emergency contact information is sent to the resident side, and a result is reported to the server side; if the contact person end does not receive the operation instruction of forwarding the emergency contact information by one key of the emergency contact person within the preset time, the step of automatically sending the emergency contact information to the resident end and reporting the result to the interception end further comprises the following steps: and the server receives the reporting result or detects that the interception end receives the reporting result and then sends a real illegal induction event case corresponding to the illegal induction activity type to the resident end.
The effect of above-mentioned scheme lies in: the real case has convincing property, and can also enable the victim to know the illegally induced result more clearly, but the priority of the real case cannot be higher than the urgent contact information with higher interception efficiency, so the invention sets the time of the real illegally induced event case to forward the urgent contact information by one key at the contact end and report the result, or automatically forward the urgent contact information at the contact end and report the result to the interception end, thereby ensuring that the victim can receive the dissuasion from the urgent contact at the first time.
In a further preferred embodiment, the illegal induction interception processing method further includes: and displaying the quantity of illegal induced activities successfully intercepted by each interception specialist and the total amount of money related to the illegal induced activities at the interception end.
The effect of above-mentioned scheme lies in: according to the successful effect after the effort, people feel the satisfied of the pleasure and wish after the difficulty of achieving the successful situation through the effort of the people, the invention displays the quantity of the illegal induced activities successfully intercepted by each interception specialist and the total amount of money related to the illegal induced activities on the interception end, so that the interception specialist can be stimulated to continuously initiate challenges to higher values, and the enthusiasm of the interception specialist for intercepting the illegal induced activities is improved, but the enthusiasm is continuously lost in the daily work.
In a further preferred scheme, if the contact side receives an operation instruction for forwarding the emergency contact information by one key of the emergency contact within a preset time, the emergency contact information is sent to the resident side, and a result is reported to the server side; if the contact person end does not receive an operation instruction for forwarding the emergency contact information by one key of the emergency contact person within a preset time, the emergency contact information is automatically sent to the resident end, and the step of reporting the result to the interception end further comprises the following steps: the server side receives the interception result reported by the interception side, if the interception fails, the server side receives the transaction screenshot uploaded by the interception side, identifies the content, judges whether the failure reason is that the interception specialist does not get contact with the victim within the preset time, and if so, accumulates the total number of interception failures and the total amount of money involved under the reason.
The effect of above-mentioned scheme lies in: from the failed effect after the effort, people often feel frustrated after the accumulated times of failed experience are too many after extremely great efforts are still unsuccessful, and do not want to continue the efforts; according to the method, only the total interception failure times and the total involved amount of money, which are caused by the fact that the interception special personnel cannot timely contact with the victim, are counted, so that the enthusiasm of the interception special personnel is prevented from being frustrated due to excessive striking, and the interception special personnel is urged to timely contact with the victim after receiving an interception task, so that the interception timeliness is improved as much as possible.
In a further preferred scheme, the server receives illegal induction data pushed by at least one data manufacturer, generates an interception task according to the illegal induction data, and sends the interception task to an interception end; meanwhile, a plurality of emergency contact information is generated according to the illegal induction data and the format interception messages corresponding to the emergency contacts, and the emergency contact information is sent to a plurality of contact terminals in a one-to-one correspondence mode, specifically, the steps are as follows: the server receives illegal induction data pushed by a data manufacturer, then carries out data matching, judges whether an interception task aiming at the same protected resident exists or not, if so, carries out data merging and simultaneously promotes the critical grade of the corresponding interception task, if not, generates the interception task according to the illegal induction data, and sends the interception task to an interception end; and generating a plurality of emergency contact information according to the illegal induction data and the format interception message corresponding to the emergency contact, and sending the plurality of emergency contact information to a plurality of contact terminals in a one-to-one correspondence manner.
The effect of above-mentioned scheme lies in: in order to achieve comprehensiveness of data, the server side is preferably connected with a plurality of data factories in a butt joint mode, in the case that the data matching is not performed and the interception task is directly generated, repeated interception is likely to be caused, the model and algorithm in an illegal induction event judging system used by the data factories are not completely consistent, the result is also not completely the same, if the plurality of data factories judge that the same protected resident is likely to be illegally induced, the certainty of the event can be further confirmed, the urgency of interception personnel can be enhanced by improving the urgency level of the interception task, and when the interception task is more, the interception personnel can determine which event is more urgent according to the urgency level and then conduct targeted interception.
In a further preferred embodiment, the illegal induction interception processing method further includes: the server side generates a return visit task according to the pre-stored protected resident address information and illegal induction data, and sends the generated return visit task to the return visit side.
The effect of above-mentioned scheme lies in: the return visit is to confirm and record the interception result of the illegal induction event, on one hand, the confirmation of the final result can be carried out, on the other hand, the record of the interception result is matched with the illegal induction data, the emergency contact information and other data, so that the whole illegal induction event can be completely combed by the system, a data manufacturer can more deeply understand various illegal induction activities, an illegal induction recognition model and an algorithm are improved, meanwhile, interception specialists can more understand the interception effect of various language types on the illegal induction event, and the emergency contact person is guided to modify format interception information so as to further improve the interception effectiveness.
In a further preferred scheme, the selecting of the protected resident address information is sequentially as follows according to priority: and the address list is stored in the information data warehouse after being split step by step according to administrative level.
The effect of above-mentioned scheme lies in: the invention selects the address information of the protected residents and splits the address information step by step and stores the address information in the information data warehouse, so that the server side can send the generated interception task and return visit task to the corresponding interception side and return visit side in time after generating the interception task and return visit task.
A system for implementing an illegally induced interception processing method, comprising a memory for storing a model handler for data analysis and a processor for running the model handler for data analysis to implement the illegally induced interception processing method as described above.
A storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of an illegally induced interception processing method as described above. The storage medium includes all technical features of the above-mentioned illegal induction interception processing method, so that all technical effects of the above-mentioned illegal induction interception processing method are also provided, and will not be repeated here.
Compared with the prior art, the illegal induction interception processing method provided by the invention has the advantages that the characteristics that the public effect and the easily deceptive crowd are easily influenced by other people are utilized, and the information of the corresponding interception specialist and emergency contact person is stored in the server side in advance, so that the corresponding protected resident can be effectively intercepted and protected when being illegally induced; on the basis, emergency contact information can be timely and effectively generated in a mode of intercepting information in a pre-stored format, and the intercepting timeliness is greatly improved by combining one-key forwarding and automatic forwarding; the server side can be reported to record and record after one-key forwarding, more importantly, under the condition that the emergency contact cannot be forwarded by one-key in time, the corresponding interception special person can be notified, and the interception special person can be notified of the corresponding emergency contact in time, so that the emergency contact can prompt a protected resident quickly, and the interception effectiveness is greatly improved; meanwhile, the invention also carries out language recognition on format interception messages among a plurality of emergency contacts through the server side so as to prevent the psychological phenomenon (namely overrun effect) that the protected residents are excessively stimulated or excessively strengthened and extremely impatient or reverse is caused by the uniform speaking of the format interception messages, and further improves the interception effectiveness.
Drawings
FIG. 1 is a flowchart of an illegal induction interception processing method according to a preferred embodiment of the present invention.
Detailed Description
The invention provides an illegal induction interception processing method, a system and a storage medium, which are used for making the purposes, the technical scheme and the effects of the invention clearer and more definite, and the invention is further described in detail below by referring to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The invention provides an illegal induction interception processing method, which is shown in figure 1 and comprises the following steps:
and S100, the server receives and stores the contact information of the protected residents uploaded by the interception personnel and at least two emergency contacts corresponding to the protected residents.
From the crowd effect (BandwagonEffect), also known as the band flower effect, means that when an individual is affected (guided or exerted by pressure) by a population, it suspects and changes its own perspective, judgment and behavior, changing toward a direction consistent with the majority of the population; that is to say: individuals are suspected of being affected by the population, change their own views, judge, act, etc., to stay in line with others, known as "random flow". According to the prior case study and image analysis of the vulnerable group, the majority of the vulnerable group is a person with unstable intention, so that it is not easy to know that the person is more easily influenced by the crowding effect, so that according to the characteristics of the crowding effect, the invention pre-stores the contact mode of the protected resident uploaded by the interception special personnel corresponding to the area where the protected resident is located and the contact mode of at least two emergency contacts corresponding to the protected resident (the interception special personnel uploads the information from the interception end thereof, and the interception special personnel is responsible for performing illegal induction interception protection) at the server end, so that the interception special personnel and the at least two emergency contacts form a 'crowding effect' which influences the final decision of the protected resident as much as possible, and the property transaction of the impending and ongoing property of the protected resident is effectively protected.
And S200, the server side receives format interception messages uploaded by the emergency contact person and used for intercepting the protected resident transaction, carries out language identification and language category division, judges whether two or more format interception messages respectively belong to different language categories required by the overrun effect limiting clause or not, if yes, passes through, and if not, returns at least one format interception message to be modified until all format interception messages respectively belong to different language categories required by the overrun effect limiting clause.
The original meaning of the language (the difference of different degrees in non-loving aspects, also called size division and fire) is the sound form of a specific sentence under the control of a certain specific thought emotion, and the invention refers to the emotion color of words used when emergency contacts dissuade protected residents; the language category is category division based on language expression, and preferably includes: the teaching, gentle and discouraging and logical analysis are, of course, merely illustrative and are not intended to limit the scope of the invention.
The format interception message may specifically include: dissuading text common to the names of the protected residents and to all classes of illegally induced activities (again for example only); the role of the format intercept message is two: firstly, the interception efficiency of illegal induced activities is improved as much as possible, and based on the existing illegal induced activities, the time effect is a great influence factor for preventing the property loss of victims and reducing the loss as much as possible, so the interception efficiency and success probability of illegal induced activities are improved to a great extent by setting the format interception message; the second, overrun effect is that the stimulus is too much, too strong or the action time is too long, so that psychological phenomenon of extremely impatience or reverse is caused (when a mark tween hearing a pastoral talker, the pastoral talker is felt to speak well and intend to donate money, after 10 minutes, the pastoral talker is not finished, he is impatient and decides to donate only a little change, after 10 minutes, the pastoral talker is not finished, he decides not to donate, when the pastoral talker ends to begin to donate, the mark tween is too angry, not only donated, but also steals 2 yuan money from a dish, and the effect of overrun effect on final decision of a person is large; it will be appreciated that if the message is not formatted to be intercepted, but rather only details of the illegitimate inducement activity are sent to the emergency contact, then there are two choices that the emergency contact can make: 1. regardless of the details, the protected resident is immediately contacted, but under the condition that the details are not known, the dissuading persuasion of the emergency contact is greatly reduced; 2. after knowing the details, the protected residents are contacted, so that more or less time is delayed, and illegal induction activities are likely to be finished due to missing of the optimal discouraging period; and whatever the choice, the discouraging way between emergency contacts may be the teaching interception, and the same interception way will certainly cause excessive irritation to the protected residents and cause the countervailing mind of the other party. Therefore, the invention greatly improves the interception timeliness and effectiveness of illegal induction activities through the arrangement of format interception information, language identification, language category division and overrun effect limiting clauses.
S300, the server receives illegal induction data pushed by at least one data manufacturer, generates an interception task according to the illegal induction data, and sends the interception task to the interception end; and generating a plurality of emergency contact information according to the illegal induction data and the format interception messages corresponding to the emergency contacts, and sending the emergency contact information to a plurality of contact terminals in a one-to-one correspondence manner.
The generation and transmission of intercept tasks is not a major inventive aspect of the present invention in the preferred embodiments and is not described in detail herein; generating a plurality of emergency contact information according to the illegal induction data and the format interception messages corresponding to the emergency contacts means that the server side fuses the content in the illegal induction data and part or all of the format interception messages to generate information which is applicable to the corresponding emergency contacts and is special for the illegal induction event of the intercepted protected residents, such as: the illegal induction data comprise victim identity information (corresponding to protected resident identity information), illegal induction activity categories (which belong to public known content and are not described in the invention), channels of the victim under illegal induction and the like; the emergency contact information contains dissuading words that are common to the protected resident's title and to all illegally induced activity categories as described above; the fusion may then produce a composition comprising the following sequence: (1) Emergency contacts refer to victims, 2, content containing victims' illegitimate inducement channels (e.g. how do you do not on a website.
The above arrangement is performed because: first, familiar designations can increase the level of trust that a victim has in the information received; secondly, the content containing the illegal induction channel of the victim can lead the victim to trust that the emergency contact is truly clear of what he/she does, so that the trust degree of the victim on the received information is further improved; thirdly, dissuading contents of different mood categories from a plurality of emergency contacts can not cause adverse psychological stress of victims due to overrun effect, but also make victims cautiously treat property transactions to be carried out due to crowding effect; fourthly, the final conclusion is given instead of the early conclusion, so that the victim can be effectively helped to clearly know the fact is the same, and meanwhile, the victim is prevented from neglecting other important contents because the victim trusts that the victim cannot be illegally induced; compared with the prior art, the method and the device greatly improve the interception timeliness and effectiveness of illegal induction events.
S400, if the contact person terminal receives an operation instruction for forwarding the emergency contact information by one key of the emergency contact person within a preset time, the emergency contact information is sent to the resident terminal, and a result is reported to the server terminal; if the contact person end does not receive an operation instruction for forwarding the emergency contact information by one key of the emergency contact person within a preset time, the emergency contact information is automatically sent to the resident end, and a result is reported to the interception end.
There are two possibilities for emergency contacts when they receive emergency contact information: firstly, information is found timely, the emergency contact person can complete information transmission by clicking a button, the victim is guaranteed to receive the emergency contact information for the first time, the efficiency is extremely high in the case, the result is only required to be reported to a server side for recording, and what is done by the interception special person who has already intercepted is not required (the emergency contact person usually contacts the victim spontaneously through other modes such as telephone); secondly, information cannot be found timely, in this case, the automatic forwarding set by the invention can be guaranteed to be sent to a victim from a mobile phone (or electronic equipment such as a computer) of the emergency contact person, and the emergency contact person can be guaranteed to receive the emergency contact information at the first time, but in addition, the emergency contact person can not directly contact the victim, so that the invention also sets that the result after the automatic forwarding is reported to an interception end, and the interception specialist can contact the emergency contact person in a telephone mode according to the reporting result to inform event details so that the emergency contact person can further intercept illegal induction events.
It should be noted that, each technical feature in the above scheme provided by the invention is tightly and inseparably, the application of the secondary effect and the setting of the format interception message are the basis for solving the problem of lower interception efficiency of the existing anti-illegal induction activity mode, the application of the overrun effect (including the recognition of the language, the classification of the language and the setting of the limitation term of the overrun effect) is the premise of ensuring that the secondary effect cannot play a role, the generation of the emergency contact information and the one-key forwarding are the basis for ensuring the use effect of the format interception message (if the emergency contact information cannot be generated and forwarded in time, the format interception message is similar to a dummy), and the automatic forwarding and the result reporting when the one-key forwarding cannot be performed in time are the necessary supplements for the failure of the one-key forwarding scheme under special conditions; the above forms a complete technical solution which forms fundamental technical means and differences from the prior art.
In a further preferred embodiment of the present invention, the illegitimate induction data includes an illegitimate induction activity type, and the S400 further includes: and the server receives the reporting result or detects that the interception end receives the reporting result and then sends a real illegal induction event case corresponding to the illegal induction activity type to the resident end.
The real case has convincing property, and can also enable the victim to know the illegally induced result more clearly, but the priority of the real case cannot be higher than the urgent contact information with higher interception efficiency, so the invention sets the time of the real illegally induced event case to forward the urgent contact information by one key at the contact end and report the result, or automatically forward the urgent contact information at the contact end and report the result to the interception end, thereby ensuring that the victim can receive the dissuasion from the urgent contact at the first time.
According to another aspect of the present invention, the illegal induction interception processing method further includes: and displaying the quantity of illegal induced activities successfully intercepted by each interception specialist and the total amount of money related to the illegal induced activities at the interception end. The success and failure effect refers to success effect and failure effect after effort, which are discovered in the study by the gelsemis, and the study shows that the interests of students are not only obtained by success from easy work, but are also achieved by self effort and difficulty overcome so as to achieve success, and the success effect after effort is that the success effect after effort is satisfied. According to the method, the quantity of illegal induced activities successfully intercepted by each interception specialist and the total amount of money related to the illegal induced activities are displayed at the interception end, so that the interception specialist can be stimulated to continuously initiate challenges to higher values, the enthusiasm of the interception specialist for intercepting illegal induced activity events is improved, and the enthusiasm is not continuously lost in daily work.
In addition, the step S400 further includes: the server side receives the interception result reported by the interception side, if the interception fails, the server side receives the transaction screenshot uploaded by the interception side, identifies the content, judges whether the failure reason is that the interception specialist does not get contact with the victim within the preset time, and if so, accumulates the total number of interception failures and the total amount of money involved under the reason. Another aspect of success or failure effects is the failure after effort effect, which is concluded as: people often feel frustrated after a great effort and still fail and the number of failed experiences is excessive, and do not want to continue the effort; therefore, in the case where the interception specialist has made the best effort to illegally induce event interception but still fails, the cause of the failure should not be attributed to the interception specialist; according to the invention, only the total number of interception failures and the total amount of involved money (namely, interception failures caused by other reasons are excluded from the statistical category) caused by the fact that the interception failure reasons are the interception failures caused by the fact that the interception specialist fails to timely contact with the victim are counted, so that on one hand, the enthusiasm of the interception specialist is prevented from being frustrated, and on the other hand, the interception specialist is urged to timely contact with the victim after receiving the interception task, so that the interception timeliness is improved as much as possible (part of the interception failures caused by the fact that the interception specialist fails to timely contact with the victim are caused by the fact that the interception specialist fails to make the best effort, and the counted total number of failures and the total amount of involved money remind the interception specialist of the timeliness in the interception task.
According to another aspect of the present invention, the S400 is specifically: the server receives illegal induction data pushed by a data manufacturer, then carries out data matching, judges whether an interception task aiming at the same protected resident exists or not, if so, carries out data merging and simultaneously promotes the critical grade of the corresponding interception task, if not, generates the interception task according to the illegal induction data, and sends the interception task to an interception end; and generating a plurality of emergency contact information according to the illegal induction data and the format interception message corresponding to the emergency contact, and sending the plurality of emergency contact information to a plurality of contact terminals in a one-to-one correspondence manner. In order to achieve comprehensiveness of data, the server side is preferably connected with a plurality of data factories in a butt joint mode, in the case that the data matching is not performed and the interception task is directly generated, repeated interception is likely to be caused, the model and algorithm in an illegal induction event judging system used by the data factories are not completely consistent, the result is also not completely the same, if the plurality of data factories judge that the same protected resident is likely to be illegally induced, the certainty of the event can be further confirmed, the urgency of interception personnel can be enhanced by improving the urgency level of the interception task, and when the interception task is more, the interception personnel can determine which event is more urgent according to the urgency level and then conduct targeted interception.
Preferably, the illegal induction interception processing method further comprises the steps of: the server side generates a return visit task according to the pre-stored protected resident address information and illegal induction data, and sends the generated return visit task to the return visit side. The return visit is to confirm and record the interception result of the illegal induction event, on one hand, the confirmation of the final result can be carried out, on the other hand, the record of the interception result is matched with the illegal induction data, the emergency contact information and other data, so that the whole illegal induction event can be completely combed by the system, a data manufacturer can more deeply understand various illegal induction activities, an illegal induction recognition model and an algorithm are improved, meanwhile, interception specialists can more understand the interception effect of various language types on the illegal induction event, and the emergency contact person is guided to modify format interception information so as to further improve the interception effectiveness; therefore, technical characteristics such as return visit and emergency contact information are effectively fused in the invention.
Specifically, the selection of the protected resident address information is sequentially as follows according to the priority: and the address list is stored in the information data warehouse after being split step by step according to administrative level. The invention selects the address information of the protected residents and splits the address information step by step and stores the address information in the information data warehouse, so that the server side can send the generated interception task and return visit task to the corresponding interception side and return visit side in time after generating the interception task and return visit task.
The invention also provides a system for realizing the illegal induction interception processing method, which comprises a memory and a processor, wherein the memory is used for storing a model processing program for data analysis, and the processor is used for running the model processing program for data analysis to realize the illegal induction interception processing method.
The present invention also provides a storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the illegally induced interception processing method as described above. The storage medium includes all technical features of the above-mentioned illegal induction interception processing method, so that all technical effects of the above-mentioned illegal induction interception processing method are also provided, and will not be repeated here.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (SynchliNk) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The algorithms or displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general-purpose systems may also be used with the teachings herein. The required structure for a construction of such a system is apparent from the description above. In addition, embodiments of the present invention are not directed to any particular programming language. It will be appreciated that the teachings of the present invention described herein may be implemented in a variety of programming languages, and the above description of specific languages is provided for disclosure of enablement and best mode of the present invention.
In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the above description of exemplary embodiments of the invention, various features of the embodiments of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be construed as reflecting the intention that: i.e., the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the apparatus of the embodiments may be adaptively changed and disposed in one or more apparatuses different from the embodiments. The modules or units or components of the embodiments may be combined into one module or unit or component and, furthermore, they may be divided into a plurality of sub-modules or sub-units or sub-components. Any combination of all features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or units of any method or apparatus so disclosed, may be used in combination, except insofar as at least some of such features and/or processes or units are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, any of the claimed embodiments can be used in any combination.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the words first, second, third, etc. do not denote any order. These words may be interpreted as names. The steps in the above embodiments should not be construed as limiting the order of execution unless specifically stated.

Claims (9)

1. An illegally induced interception processing method is characterized by comprising the following steps:
the server receives and stores the contact information of the protected resident uploaded by the interception specialist and at least two emergency contacts corresponding to the protected resident so as to intercept the upcoming or ongoing property transaction by the interception specialist and the at least two emergency contacts by utilizing the characteristics of the crowding effect;
The server side receives format interception messages uploaded by two emergency contacts and used for intercepting the protected resident transactions, carries out language identification and language category division, judges whether two or more format interception messages respectively belong to different language categories required by the overrun effect limiting clause or not, if yes, passes through, and if not, returns at least one format interception message to be modified until all format interception messages respectively belong to different language categories required by the overrun effect limiting clause;
the language refers to emotion colors carried by words used when emergency contacts dissuade protected residents, and the language category refers to category division based on language expression modes, and comprises the following steps: the teaching type, gentle and discouraging type and logic analysis type;
the server receives illegal induction data pushed by at least one data manufacturer, generates an interception task according to the illegal induction data, and sends the interception task to the interception end; meanwhile, generating a plurality of emergency contact information according to the illegal induction data and the format interception messages corresponding to the emergency contacts, and sending the plurality of emergency contact information to a plurality of contact terminals in a one-to-one correspondence manner;
If the contact person terminal receives an operation instruction for forwarding the emergency contact information by one key of the emergency contact person within a preset time, the emergency contact information is sent to a resident terminal, and a result is reported to a server terminal; if the contact person end does not receive an operation instruction for forwarding the emergency contact information by one key of the emergency contact person within a preset time, the emergency contact information is automatically sent to the resident end, and a result is reported to the interception end.
2. The method for intercepting and processing illegal induction according to claim 1, wherein the illegal induction data includes an illegal induction activity type, and if the contact terminal receives an operation instruction for forwarding the emergency contact information by one key of the emergency contact within a preset time, the emergency contact information is sent to a resident terminal, and a result is reported to a server terminal; if the contact person end does not receive the operation instruction of forwarding the emergency contact information by one key of the emergency contact person within the preset time, the step of automatically sending the emergency contact information to the resident end and reporting the result to the interception end further comprises the following steps: and the server receives the reporting result or detects that the interception end receives the reporting result and then sends a real illegal induction event case corresponding to the illegal induction activity type to the resident end.
3. The illegally induced interception processing method according to claim 1, further comprising: and displaying the quantity of illegal induced activities successfully intercepted by each interception specialist and the total amount of money related to the illegal induced activities at the interception end.
4. The method for intercepting and handling illegal induction according to claim 1, wherein if the contact terminal receives an operation instruction for forwarding the emergency contact information by one key of the emergency contact within a preset time, the emergency contact information is sent to a resident terminal, and a result is reported to a server terminal; if the contact person end does not receive an operation instruction for forwarding the emergency contact information by one key of the emergency contact person within a preset time, the emergency contact information is automatically sent to the resident end, and the step of reporting the result to the interception end further comprises the following steps: the server side receives the interception result reported by the interception side, if the interception fails, the server side receives the transaction screenshot uploaded by the interception side, identifies the content, judges whether the failure reason is that the interception specialist does not get contact with the victim within the preset time, and if so, accumulates the total number of interception failures and the total amount of money involved under the reason.
5. The method for illegally inducing interception according to claim 1, wherein the server receives illegally inducing data pushed by at least one data manufacturer, generates an interception task according to the illegally inducing data, and sends the interception task to the interception end; meanwhile, a plurality of emergency contact information is generated according to the illegal induction data and the format interception messages corresponding to the emergency contacts, and the emergency contact information is sent to a plurality of contact terminals in a one-to-one correspondence mode, specifically, the steps are as follows: the server receives illegal induction data pushed by a data manufacturer, then carries out data matching, judges whether an interception task aiming at the same protected resident exists or not, if so, carries out data merging and simultaneously promotes the critical grade of the corresponding interception task, if not, generates the interception task according to the illegal induction data, and sends the interception task to an interception end; and generating a plurality of emergency contact information according to the illegal induction data and the format interception message corresponding to the emergency contact, and sending the plurality of emergency contact information to a plurality of contact terminals in a one-to-one correspondence manner.
6. The illegally induced interception processing method according to claim 1, further comprising: the server side generates a return visit task according to the pre-stored protected resident address information and illegal induction data, and sends the generated return visit task to the return visit side.
7. The illegal induction interception processing method according to claim 6, wherein the selection of the protected resident address information is sequentially as follows according to priority: and the address list is stored in the information data warehouse after being split step by step according to administrative level.
8. A system for implementing an illegally induced interception processing method, comprising a memory for storing an illegally induced interception processing program, and a processor for running the illegally induced interception processing program to implement the illegally induced interception processing method according to any one of claims 1 to 7.
9. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the illegally induced interception processing method according to any one of claims 1 to 7.
CN202211547277.7A 2022-12-05 2022-12-05 Illegal induction interception processing method, system and storage medium Active CN115982438B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211547277.7A CN115982438B (en) 2022-12-05 2022-12-05 Illegal induction interception processing method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211547277.7A CN115982438B (en) 2022-12-05 2022-12-05 Illegal induction interception processing method, system and storage medium

Publications (2)

Publication Number Publication Date
CN115982438A CN115982438A (en) 2023-04-18
CN115982438B true CN115982438B (en) 2023-10-20

Family

ID=85967173

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211547277.7A Active CN115982438B (en) 2022-12-05 2022-12-05 Illegal induction interception processing method, system and storage medium

Country Status (1)

Country Link
CN (1) CN115982438B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103037311A (en) * 2012-12-24 2013-04-10 东莞市全方位信息科技有限公司 Mass texting for help and rescue method based on social network
JP2013114270A (en) * 2011-11-24 2013-06-10 Ibis Inc Web application system for supporting service achieving both personal information protection and emergency support
CN111294465A (en) * 2018-11-22 2020-06-16 奇酷互联网络科技(深圳)有限公司 Fraud prevention method, mobile terminal and storage device
CN112887985A (en) * 2021-02-23 2021-06-01 深圳市安络科技有限公司 Method, device and equipment for early warning telecommunication fraud
CN115102789A (en) * 2022-08-24 2022-09-23 南京博晟宇网络科技有限公司 Anti-communication network fraud studying, judging, early-warning and intercepting comprehensive platform

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9203648B2 (en) * 2004-05-02 2015-12-01 Thomson Reuters Global Resources Online fraud solution

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2013114270A (en) * 2011-11-24 2013-06-10 Ibis Inc Web application system for supporting service achieving both personal information protection and emergency support
CN103037311A (en) * 2012-12-24 2013-04-10 东莞市全方位信息科技有限公司 Mass texting for help and rescue method based on social network
CN111294465A (en) * 2018-11-22 2020-06-16 奇酷互联网络科技(深圳)有限公司 Fraud prevention method, mobile terminal and storage device
CN112887985A (en) * 2021-02-23 2021-06-01 深圳市安络科技有限公司 Method, device and equipment for early warning telecommunication fraud
CN115102789A (en) * 2022-08-24 2022-09-23 南京博晟宇网络科技有限公司 Anti-communication network fraud studying, judging, early-warning and intercepting comprehensive platform

Also Published As

Publication number Publication date
CN115982438A (en) 2023-04-18

Similar Documents

Publication Publication Date Title
Cronstedt Prevention, preparedness, response, recovery-an outdated concept?
Cross Denying victim status to online fraud victims: the challenges of being a ‘non-ideal victim’
Brinkerhoff Digital diasporas and governance in semi‐authoritarian states: the case of the Egyptian Copts
Cross et al. “If U don’t pay they will share the pics”: exploring Sextortion in the context of romance fraud
Gomez Dumbing down democracy: Trends in internet regulation, surveillance and control in Asia
Cross Online fraud
Cross Reflections on the reporting of fraud in Australia
Hamsi et al. Cybercrime over internet love scams in Malaysia: a discussion on the theoretical perspectives, connecting factors and keys to the problem
Harris et al. Digital coercive control and spatiality: rural, regional, and remote women's experience
Schrempf Nokia Siemens networks: Just doing business–or supporting an oppressive regime?
CN115982438B (en) Illegal induction interception processing method, system and storage medium
Singh et al. Cyberbullying and a mobile game app? An initial perspective on an alternative solution
Topping et al. The ‘usual suspects’? Young people’s experiences of police stop and search powers in Northern Ireland
Oosterwyk et al. Mobile bullying in South Africa-Exploring its nature, influencing factors and implications
Vincenti et al. Clues to the power of attorney-based elder financial abuse within the family system
Cross Meeting the challenges of fraud in a digital world
Miller et al. PREVENTION OF PHISHING ATTACKS: A THREE-PILLARED APPROACH.
Vasquez The financial crimes management of account takeover fraud
Hutchings Australasian Consumer Fraud Taskforce: Results of the 2010 and 2011 online consumer fraud surveys
Pratama et al. Exposing generational and gender gap in phishing awareness among young adults: A survey experiment
Mears et al. Community information flows to reduce inter-communal violence in Burma
Hamilton Future-Proofing US Law for War Crimes Investigations in the Digital Era
Rodriguez Fraud Prevention for Seniors
Go IS SOCIAL MEDIA A REFORM ADVOCATE?: AN ANALYSIS USING THE RIGHTS-BASED APPROACH
Qabalin et al. Credit Cards Theft Using Social Engineering over WhatsApp: A Survey Study

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant