CN103795713A - System applied to preventing and controlling telecommunication fraud and intersystem information interaction method - Google Patents

System applied to preventing and controlling telecommunication fraud and intersystem information interaction method Download PDF

Info

Publication number
CN103795713A
CN103795713A CN201410024872.1A CN201410024872A CN103795713A CN 103795713 A CN103795713 A CN 103795713A CN 201410024872 A CN201410024872 A CN 201410024872A CN 103795713 A CN103795713 A CN 103795713A
Authority
CN
China
Prior art keywords
control centre
cooperation end
cooperation
telecommunications
accused
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410024872.1A
Other languages
Chinese (zh)
Inventor
周乐
李辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN201410024872.1A priority Critical patent/CN103795713A/en
Publication of CN103795713A publication Critical patent/CN103795713A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a system applied to preventing and controlling fraud and an intersystem information interaction method. The system comprises a control center deployed in a public security department, a first cooperation end deployed in a telecommunication operation mechanism and a second cooperation end deployed in a financial mechanism. Moreover, the control center is provided with an interface device. The interface device is used for executing the following operation: maintaining a nationwide telecommunication mechanism configuration information table and a nationwide financial mechanism configuration information table, conducting interface registration and content management on all mechanisms of the telecommunication operation mechanism according to the nationwide telecommunication mechanism configuration information table, conducting interface registration and content management on all mechanisms of the financial mechanism according to the nationwide financial mechanism configuration information table, and conducting information interface with the first cooperation end or the second cooperation end deployed in a corresponding mechanism according to a registered interface service address. Through the interface device of the system, quick information interaction is realized, communication bottlenecks are eliminated, and all units are made to work in a cooperation mode to fight crime action.

Description

Be applicable to method for message interaction between the system of prevention and control telecommunications swindle and system
Technical field
The present invention relates to communication technical field, more in particular to method for message interaction between a kind of system that is applicable to prevention and control telecommunications swindle and system.
Background technology
Electronic Transfer function has brought unprecedented convenience with quick to people's life, has meanwhile also derived the new crime activity that utilizes relevant technological means.For example, common short message fraud in recent years, brings serious life harassing and wrecking or economic loss to the people, makes us having a horror of the pain sensation.For public security department, short message fraud has the feature that on-the-spot wide range, capital transfer are fast, crime evidence obtaining is difficult, desirable prevention method of committing crime is after swindle is by report, and very first time notice is accused of the bank of deposit of account, and bank's very first time freezes to stop loss to being accused of account.But for the modern commerce bank that payes attention to customer service, the monitoring of account, freeze, return and all belong to extremely sensitive business operation, relate to more otherwise fund and business risk, necessary careful operation, thereby according to banking standard, the administration of justice notice that enough judgement information must be provided and have legal validity.
At present, each main relevant unit (public security, bank, telecommunications ...) substantially all build the on national network information system of ripe computer, each internal system possesses the ability of accurately carrying out rapidly message retrieval completely, but between system, do not set up the available information interactive interface of safety, remain the result of utilizing the processing of manual delivery computer, for example can only in person show relevant judicial style and link up case Investigation requirements to bank by public security or judicial personnel, become serious information bottleneck.Also all can there is sluggishness in processing aspect in most of cases therefore, cannot tackle e-economy crime under the new situation at all, even occurs the situation of " seeing that helplessly money is transferred ".
Summary of the invention
The invention provides method for message interaction between a kind of system that is applicable to prevention and control telecommunications swindle and system; realize information interaction safely and fast by interface arrangement of the present invention; eliminate ditch bottleneck link; constituent parts can be worked in coordination with rapidly; carry out a series of protection people property safeties, the action of fighting crime.
According to one embodiment of the present invention, a kind of system that is applicable to prevention and control telecommunications swindle is provided, comprising: be deployed in public safety department control centre, be deployed in the first cooperation end of telecommunication operator and be deployed in the second cooperation end of financial institution:
Wherein, described control centre has the interface arrangement for carrying out following operation:
Safeguard the national Telecom Facilities configuration information table of described telecommunication operator and the national financial institution configuration information table of described financial institution,
According to described national Telecom Facilities configuration information table, each mechanism of described telecommunication operator is carried out interface registration and directory management and according to described national financial institution configuration information table, each mechanism of described financial institution carried out to interface registration and directory management
Cooperate with holding and carry out information interaction with first end or second that cooperate that is deployed in corresponding mechanism according to the interface service address of registration.
According to another embodiment of the invention, provide a kind of for method for message interaction between the system of prevention and control telecommunications swindle, comprising:
Dispose the first cooperation end at telecommunication operator, dispose the second cooperation end in financial institution, and public safety department dispose control centre, wherein, described control centre by carry out the interface arrangement of following operation cooperate with described first end and second cooperate hold communicate:
Safeguard the national Telecom Facilities configuration information table of described telecommunication operator and the national financial institution configuration information table of described financial institution,
According to described national Telecom Facilities configuration information table, each mechanism of described telecommunication operator is carried out interface registration and directory management and according to described national financial institution configuration information table, each mechanism of described financial institution carried out to interface registration and directory management
Cooperate with holding and carry out information interaction with first end or second that cooperate that is deployed in corresponding mechanism according to the interface service address of registration.
By adopting technical solution of the present invention, in the time finding merit, locate rapidly unit and the code under case information by being deployed in mechanism's allocation list (as national Telecom Facilities configuration information table and national financial institution configuration information table) of public security department, and retrieve the interface service address of this unit mapping.Realize information interaction safely and fast by interface arrangement, eliminate ditch bottleneck link, constituent parts can be worked in coordination with rapidly, carry out a series of protection people property safeties, the action of fighting crime.
Accompanying drawing explanation
Fig. 1 is according to the embodiment 1 of the system that is applicable to the swindle of prevention and control telecommunications of embodiment of the present invention;
Fig. 2 shows according to the mapping mechanism of the interface arrangement of embodiment of the present invention;
Fig. 3 is according to the embodiment 2 of the system that is applicable to the swindle of prevention and control telecommunications of embodiment of the present invention;
Fig. 4 is according to the embodiment 3 of the system that is applicable to the swindle of prevention and control telecommunications of embodiment of the present invention;
Fig. 5 is according to a kind of application scenarios of the system that is applicable to the swindle of prevention and control telecommunications of embodiment of the present invention;
Fig. 6 is according to the Technical Architecture of control centre in Fig. 5 illustrated embodiment and cooperation end;
Fig. 7 is according to the business model of the telecommunications swindle prevention and control scheme of embodiment of the present invention.
Embodiment
Be described in detail to various aspects of the present invention below in conjunction with the drawings and specific embodiments.It should be noted that, " first ", " second " only do to distinguish two objects that title is identical herein, must not do technical and jural restriction to this object.Well-known module, unit and connection each other thereof, link, communication or operation do not illustrate or do not elaborate.And described feature, framework or function can combinations by any way in one or more execution modes.It will be appreciated by those skilled in the art that following various execution modes are only for illustrating, but not for limiting the scope of the invention.Can also easily understand, the module in each execution mode described herein and shown in the drawings or unit or step can combine and design by various different configurations.
Telecommunications is swindled and cannot be carried out effective prevention and control in view of not setting up the problem of the available information interactive interface of safety between existing public security, bank, the each computer system of telecommunications, embodiment of the present invention provides a kind of system that is applicable to the swindle of prevention and control telecommunications, realize information interaction safely and fast by interface arrangement of the present invention, eliminate ditch bottleneck link, to telecommunications, prevention and control are unified in swindle.Below in conjunction with various embodiment, the system that is applicable to the swindle of prevention and control telecommunications of embodiment of the present invention is described.
[embodiment 1]
With reference to figure 1, show the embodiment 1 of the system that is applicable to the swindle of prevention and control telecommunications of embodiment of the present invention.Wherein, described system comprises: (be for example deployed in public safety department, public security system, police system etc., below be called for short " public security department ") control centre 100, (be for example deployed in telecommunication operator, China Telecom, UNICOM, movement etc.) the first cooperation end 200 and be deployed in the second cooperation end 300 of financial institution's each commercial banking institutions such as (for example) China Construction Bank, the Industrial and Commercial Bank of China, the Agricultural Bank of China;
Wherein, described control centre 100 has the interface arrangement for carrying out following operation:
Safeguard the national Telecom Facilities configuration information table (for example, telecom operation coding schedule as shown in Figure 2) of described telecommunication operator and the national financial institution configuration information table (for example, financial institution's coding schedule as shown in Figure 2) of described financial institution,
Each mechanism according to described national Telecom Facilities configuration information table to described telecommunication operator (carries out interface registration and directory management and according to described national financial institution configuration information table, each mechanism of described financial institution is carried out to interface registration and directory management
Cooperate with holding and 300 carry out information interaction with first end 200 or second that cooperate that is deployed in corresponding mechanism according to the interface service address of registration.For example, as shown in Figure 2, obtain institutional affiliation/branch according to the card number in the short message content of being accused of swindling/account inquiry financial institution coding schedule, the registered message interface of inquiry institutional affiliation/branch, obtain interface service address, according to described interface service address be deployed in corresponding mechanism second cooperate with holding and 300 carry out information interaction; Find the interface service address of corresponding branch company according to telephone number by telecom operation coding schedule, and 200 communicate with first end that cooperates that is deployed in this branch company by interface service address.
By above-mentioned known, provide the interface arrangement that public security system, telecommunication system and banking system can be interconnected according to the system that is applicable to the swindle of prevention and control telecommunications of embodiment of the present invention, thereby eliminated the ditch bottleneck link between these three systems.
[embodiment 2]
Fig. 3 shows the embodiment 2 of the system that is applicable to the swindle of prevention and control telecommunications of embodiment of the present invention.As shown in Figure 3, described system, except having the structure that embodiment 1 is identical, also comprises:
The first trigger 110, be deployed in described public safety department, be used for carrying out following operation: receive telecommunications swindle case (comprising short message fraud, phone swindle, the Internet instant messaging swindle etc.) information that described public safety department built-in system forwards, trigger prevention and control flow process, telecommunication operator and financial institute information that identification is relevant to this telecommunications swindle case, and adjusted corresponding described the first cooperation end 200 and the second cooperation end 300 to carry out co-operation by described control centre 100;
Wherein, described the first cooperation end 200 comprises:
The first validator 201, for carrying out following operation: receive the investigation request that described control centre 100 sends by described interface arrangement, and return to described control centre 100 telecom information that inquiry agency needs;
Described the second cooperation end 300 comprises:
The second validator 301, for carrying out following operation: receive the investigation request that described control centre 100 sends by described interface arrangement, and return to described control centre 100 Financial Information that inquiry agency needs.
Wherein, described control centre 100 determines whether to be accused of telecommunications swindle crime according to described the first cooperation end 200 or the second cooperation end 300 information of returning, and has adjusted described the first cooperation end 200 and the second cooperation end 300 to carry out co-operation by described interface arrangement in the situation that being defined as being.
Correspondingly, described the first cooperation end 200 also comprises:
The first block device 202, be used for carrying out following operation: receive the blocking-up request that described control centre 100 sends by described interface arrangement, the telecom number of telecommunications swindle crime is accused of in hang-up, and pushes warning message to being accused of to this appointment colony that telecommunications swindle crime is relevant.
Described the second cooperation end 300 also comprises:
The second block device 302, for carrying out following operation: receive the processing request that described control centre 100 sends by described interface arrangement, freeze or control the account of being accused of telecommunications swindle crime.
According to the present embodiment, in the time that public security department receives the warning of telecommunications swindle case, trigger prevention and control flow process, and the interface arrangement providing by embodiment of the present invention, public security system, telecommunication system and financial sector are linked, can block in time the circulation processing of case-involving account fund, loss is dropped to minimum, push warning message to relevant colony in time simultaneously, effectively prevented that the continuation of swindle crime from occurring.
[embodiment 3]
Fig. 4 shows the embodiment 3 of the system that is applicable to the swindle of prevention and control telecommunications of embodiment of the present invention.In the present embodiment, described system, except the structure described in comprising above-described embodiment 2, also has following structure.
Described the first cooperation end 200 further comprises:
The first locator 202, for receiving the Location Request that described control centre 100 sends by described interface arrangement, according to the communication signal of the telecom number of being accused of telecommunications swindle crime, this telecom number is positioned, and feed back oriented geographical location information to described control centre 100.
Described the second cooperation end 300 further comprises:
The second locator 302, for receiving the Location Request that described control centre 100 sends by described interface arrangement, according to the accounts information of being accused of telecommunications swindle crime, monitor the state of the account, and feed back the end message of account current operation to described control centre 100.
Thus, can accurately grasp suspect's geographical position, be convenient to public security department and effectively arrest.
In addition, in the present embodiment, described the second cooperation end 300 also comprises:
Trapper 304, the trapping request sending by described interface arrangement for receiving described control centre 100, carries out virtual financial business operation to the accounts information of being accused of telecommunications swindle crime.Operate by virtual financial business, in the situation that not losing victim's fund, suspect is be sure of undiscovered, so that public security department arrests it smoothly.
Further, described the second cooperation end 300 also comprises:
Retrieve device 305, described in generating on a time period, be accused of the fund association analysis report of the account of telecommunications swindle crime, and the content of this report is transmitted back to described control centre 100, and carry out deblocking of funds or rollback operation.Thus, on the one hand for judicial decision is produced evidence, on the other hand can be in time for victim recovers loss.
It should be noted that, the present invention does not limit to this, in other execution modes of the present invention, except disposing in public security department the first trigger 110, can also dispose the second trigger 110 ' at described telecommunication operator, be used for carrying out following operation: retrieve the keyword relevant with swindling crime or sentence formula by the fire compartment wall of telecommunication operator, trigger prevention and control flow process, telecommunication operator and financial institute information that identification is relevant to this telecommunications swindle case, and adjust corresponding described the first cooperation end and the second cooperation end to carry out co-operation by described control centre.Certainly, in another embodiment of the invention, can only dispose the one in the first trigger 110 and the second trigger 110 ', for example, only dispose described the second trigger 110 ' at described telecommunication operator.
From the angle of system, technical scheme of the present invention is described above, below emphasis message (or information) exchange method between the system based on technical solution of the present invention is described.
According to embodiment of the present invention, between a kind of system of swindling for prevention and control telecommunications, method for message interaction comprises:
Dispose the first cooperation end at telecommunication operator, dispose the second cooperation end in financial institution, and public safety department dispose control centre, wherein, described control centre by carry out the interface arrangement of following operation cooperate with described first end and second cooperate hold communicate:
Safeguard the national Telecom Facilities configuration information table of described telecommunication operator and the national financial institution configuration information table of described financial institution,
According to described national Telecom Facilities configuration information table, each mechanism of described telecommunication operator is carried out interface registration and directory management and according to described national financial institution configuration information table, each mechanism of described financial institution carried out to interface registration and directory management
Cooperate with holding and carry out information interaction with first end or second that cooperate that is deployed in corresponding mechanism according to the interface service address of registration.
According to another embodiment of the invention, described method also comprises:
Dispose the first trigger in described public safety department, the telecommunications swindle case information forwarding for receiving described public safety department built-in system, trigger prevention and control flow process, telecommunication operator and financial institute information that identification is relevant to this telecommunications swindle case, and adjusted corresponding described the first cooperation end and the second cooperation end to carry out co-operation by described control centre; And/or
Dispose the second trigger at described telecommunication operator, for retrieve the keyword relevant with swindling crime or sentence formula by the fire compartment wall of telecommunication operator, trigger prevention and control flow process, telecommunication operator and financial institute information that identification is relevant to this telecommunications swindle case, and adjusted corresponding described the first cooperation end and the second cooperation end to carry out co-operation by described control centre.
In described first cooperation end configuration the first validator, the investigation request sending by described interface arrangement for receiving described control centre, and return to described control centre the telecom information that inquiry agency needs.
In described second cooperation end configuration the second validator, the investigation request sending by described interface arrangement for receiving described control centre, and return to described control centre the Financial Information that inquiry agency needs.
Wherein, described control centre holds the information of returning to determine whether to be accused of telecommunications swindle crime according to described the first cooperation end or the second cooperation, and in the situation that being defined as being, has adjusted described the first cooperation end and the second cooperation to hold by described interface arrangement and carried out co-operation.
Correspondingly, described method also comprises:
At described first cooperation end configuration the first block device, for receiving the blocking-up request that described control centre sends by described interface arrangement, the telecom number of telecommunications swindle crime is accused of in hang-up, and pushes warning message to being accused of to this appointment colony that telecommunications swindle crime is relevant.
At described second cooperation end configuration the second block device, the processing request sending by described interface arrangement for receiving described control centre, freezes or controls the account of being accused of telecommunications and swindling crime.
According to other execution modes of the present invention, described method also comprises:
At described first cooperation end configuration the first locator, for receiving the Location Request that described control centre sends by described interface arrangement, according to the communication signal of the telecom number of being accused of telecommunications swindle crime, this telecom number is positioned, and feed back to described control centre the geographical location information of orienting.
At described second cooperation end configuration the second locator, for receiving the Location Request that described control centre sends by described interface arrangement, according to the accounts information of being accused of telecommunications swindle crime, monitor the state of the account, and feed back the end message of account current operation to described control centre.
At described the second cooperation end configuration trapper, the trapping request sending by described interface arrangement for receiving described control centre, carries out virtual financial business operation to the accounts information of being accused of telecommunications swindle crime.
Retrieve device in described the second cooperation end configuration, described in generating on a time period, be accused of the fund association analysis report of the account of telecommunications swindle crime, and the content of this report is transmitted back to described control centre, and carry out deblocking of funds or rollback operation.
Known by above-mentioned execution mode, in the time finding merit, locate rapidly unit and the code under case information by being deployed in mechanism's allocation list (as national Telecom Facilities configuration information table and national financial institution configuration information table) of public security department, and retrieve the interface service address of this unit mapping.Realize information interaction safely and fast by interface arrangement, eliminate ditch bottleneck link, constituent parts can be worked in coordination with rapidly, carry out a series of protection people property safeties, the action of fighting crime.
Below set forth on the whole technical solution of the present invention, as an example of short message fraud example, technical scheme of the present invention be elaborated below, thus, above-mentioned or following advantage of the present invention, feature for invention technician by more obvious, understandable.
As shown in Figure 5, according to embodiment of the present invention, the system architecture that is suitable for telecommunications swindle prevention and control is included in the control centre of public security department's deployment, (is for example deployed in each business bank's system, illustrated industrial and commercial bank, Construction Bank ...) bank end (i.e. the second cooperation is held) and (be for example deployed in each telecommunication operator, illustrated China Telecom, CHINAUNICOM and China Mobile) telecommunications end (first cooperation end), wherein, control centre is connected with bank's end and telecommunications end by Ethernet Private Line.Certainly, it will be appreciated by those skilled in the art that control centre can also be connected with bank's end and telecommunications end by other communication connection modes known in the art.
As shown in Figure 6, below the Technical Architecture of control centre, bank's end and telecommunications end is described.
The basic fundamental framework of control centre comprises underlying platform and message center two large divisions, as follows:
Underlying platform provides: the general basic function of system, interactive interface, flow engine, data mining.
Message center provides: interface registration, message is monitored, message adaptation, safety certification, transmission of messages.
Wherein, message is monitored and is supported to realize trigger, and interactive interface is supported control and monitor console.The concrete processing procedure of control centre is set forth during the flow process is below described.
The basic fundamental framework of telecommunications end comprises:
Safety certification, message conversion/adaptation, transmission of messages function.
Receive after the notice of public security department's transmission, first carry out safety certification, set up reliable news passage, the public security department's message request receiving is carried out to adaptation conversion, carry out the processing such as message retrieval, number are stopped using, location tracking at telecommunications built-in system, then return to result by message channel transmission response message to public security department.Support validator, block device, locator function by above function.The concrete processing procedure of telecommunications end is set forth during the flow process is below described.
The basic fundamental framework of bank's end comprises:
Safety certification, message conversion/adaptation, transmission of messages function.
Bank's end operation principle is with telecommunications end, and concrete processing procedure is set forth during the flow process is below described.
According to the system of embodiment of the present invention, the correlation module that control centre, bank's end and telecommunications end relate to, comprises control centre, trigger, validator, block device, retrieves device, locator, trapper.Below in conjunction with Fig. 7, each functional module is described
Trigger provides monitoring, recognition function, and associating each side starts investigation rapidly.For example, the first trigger triggers prevention and control flow process after receiving the reports of public security department's built-in system forwarding or the information of reporting a case to the security authorities, the local recognition function of identification associated mechanisms, and adjusted validator by control centre.
Validator, according to preliminary information, is used interface arrangement provided by the invention immediately to push the judicial document of electronics and Investigation requirements to corresponding mechanism.After the judicial document authentication of electronics is passed through, the Investigation requirements of cooperation institute system responses public security system, for example, the first validator is according to beaming back control centre by required telecom information, and required financial account information is beamed back control centre by the second validator.Data loading is entered to crime meta-model and carry out automatic analysis, within the shortest time, confirm suspicion of crime.Wherein, crime meta-model example is as follows:
Figure BDA0000459230870000091
Confirm that after suspicion of crime, public security officer submits processing scheme to, push the judicial document of electronics and processing requirements to cooperation institute.After determining employing blocking-up scheme, start block device work by control centre.
The processing of the second block device of bank's end comprises that the relevant financial institution of notice freezes or controls and be accused of account.
The processing of the first block device of telecommunications end comprises notifies relevant operator temporary suspension to be accused of number, and delinquency prevention one's share of expenses for a joint undertaking continues to utilize former communication channel, and to specifying colony to push safety warning note.
Public security department starts locator work by control centre after determining employing targeting scheme.According to guilty mind, crime one's share of expenses for a joint undertaking often can not go to outlet to withdraw the money in person, and mainly with ATM/POS, or the self-aided terminal formula of concealing such as Net silver is withdrawn the money or transferred accounts.And can frequently communicate by letter with target victim.Therefore, can monitor and be accused of the transaction channel of account and please locate the communication signal of being accused of number by the first location by the second locator, the geographical location information of suspect's activity is provided, support criminal investigation and arrest.
Public security department starts trapper work after determining employing trapping scheme.Greediness and the idea of leaving things to chance of utilizing crime one's share of expenses for a joint undertaking conventionally to have, switch to the special backstage of trapping by trapper by account, shows virtual detailed flowing water and the virtual account remaining sum of keeping accounts to crime part, presents the illusion that criminal offence is not exposed and gone smoothly.Withdraw the money or transfer accounts when operation when crime one's share of expenses for a joint undertaking, do not show that account freezes to wait service exception state, but show that the amount of money has produced but do not proceeded to, gulps down the conventional fault states such as card, communication abnormality, wrong account.In the time that suspect initiatively gets in touch with bank clerk, entrapment suspect implements to arrest to appointed place.
Retrieve device for application afterwards, Main Function: the one, the support of financial unit generates the fund association analysis report of being accused of account on a time period, for judicial decision is produced evidence; The 2nd, for the cheated fund being stopped loss in time, after formally winding up the case, require and victim's wish is processed fund rollback for the masses that are deceived according to judicial department, support is returned by former channel.
Below prevention and control flow process is described.
One, the incidence of criminal offenses stage: flip-flop operation content
1. receive the inner short message fraud case information forwarding of public security system by the monitoring interface of trigger.
2. sending alarm and reminding administrative staff to monitor terminal notes.
3. the crucial essential informations such as telephone number in note, account No., keyword are accused of in identification.
4. the basic legitimacy of automatic gauging data.
5. automatically in configuration file, retrieve phone, account institutional affiliation information.
By above-mentioned information with list form echo to control and monitor console human-computer interaction interface.
Two, investigate into a case the stage: validator action
7. public security officer carries out after swindle suspicion just sentences, submitting investigation to according to above information.
8. control centre, according to the mechanism information of allocation list, retrieves registered Map Interface (or interface service address), for example, pushes electronics judicial style to this mechanism (financial department, telecommunication department) and requires cooperating.
9. this mechanism completes after the confirmation and authentication to judicial electronic document, utilizes on request built-in system to retrieve after relevant information, and the encipher interface providing by this device returns to control centre of public security department.
10. after control centre of public security department is written into assessment models automatically by related data and complete automatic analysis, within the shortest time, confirm suspicion of crime.
Wherein, above flow process needs to provide branch, rollback and iteration according to practical application.
Three, handle a case the stage: block device action
After 11. confirmation suspicion, public security department selects prevention and control to process prediction scheme;
12. public security officers submit to after result, and system sends the judicial notice of electronics from trend associated mechanisms interface;
The blocking processing of 13. financial departments for example, for to freeze or to control (, only import but no export) to be accused of account in bank account system;
The blocking processing of 14. telecommunications ends is for to be accused of number at telecom operation system temporary suspension, and to specifying colony to push safety warning note.
Four, handle a case the stage: locator action
15. public security department's regioselectives are processed prediction scheme and submit result to, and system sends the judicial notice of electronics from trend associated mechanisms interface.
16. banks ends localization process are to monitor the transaction channel of being accused of account, and timing loopback account situation provides the end message of account current operation.
17. telecommunications end localization process, for to carry out communication signal location to being accused of number, provide the geographical location information of suspect's activity.
Five, handle a case the stage: trapper action
18. public security departments select trapping process prediction scheme and submit result to, and system sends the judicial notice of electronics from trend associated mechanisms interface.
The end trapping of 19. banks is treated to carries out particular service processing to being accused of account, is designated trapping state.
20. banking systems recognize account status, automatically account are connected to special backstage.
Six, deal with problems arising from an accident the stage: retrieve device action
21. banks hold according to judicial requirement, generate on a time period the fund association analysis report of being accused of account.
22. bank's ends are passed report text back public security organ control centre.
23. banks hold according to judicial department's result, call bank account system, process deblocking of funds and rollback operation.
In sum, embodiment of the present invention has proposed a kind of system that comprises that control centre and bank's end, telecommunications end module form.Set up the national mechanism configuration information table of the cooperation unit such as each finance, telecommunications, relevant unit has been carried out to interface registration and directory management.While finding merit, locate rapidly unit and the code under case information by being deployed in mechanism's allocation list of public security department, and retrieve the interface service address of this unit mapping.Realize information interaction safely and fast by the key service such as Interface integration and information communication, eliminate ditch bottleneck link, constituent parts can be worked in coordination with rapidly, carry out a series of protection people property safeties, the action of fighting crime.
Through the above description of the embodiments, those skilled in the art can be well understood to the present invention and can realize by the mode of software combined with hardware platform, can certainly all implement by hardware.Based on such understanding, what technical scheme of the present invention contributed to background technology can embody with the form of software product in whole or in part, this computer software product can be stored in storage medium, as ROM/RAM, magnetic disc, CD etc., comprise that some instructions (can be personal computers in order to make a computer equipment, server, or the network equipment etc.) carry out the method described in some part of each embodiment of the present invention or embodiment.
Ability technical staff should be appreciated that above disclosed only for embodiments of the present invention, certainly can not limit with this interest field of the present invention, and the equivalent variations of doing according to embodiment of the present invention, still belongs to the scope that the claims in the present invention contain.For example, the triggering that is designed to report a case to the security authorities of above-mentioned execution mode, can consider to increase keyword future and trigger and refer to that telecommunication department fire compartment wall retrieves while containing keyword/sentence formula of swindling suspicion of crime and trigger.In the time carrying out blocking-up operation, can be according to the inside supervisory system of bank, telecommunications, provide supervisor to authorize link; In practical application, consider to weigh the urgency level of case, avoid losing the prevention and control best opportunity.In addition, the hit rate of validator and recall precision be crucial, swindle model will fill part and carry out data analysis and excavation, and supports to upgrade according to up-to-date modus operandi; The setting of block device is the safety valve of avoiding swindle diffusion, accomplish in time with controlled.Consider the flexibility of processing, block device also can provide unlocking function.Thus, fail safe, practicality and the customer experience of further lifting device.

Claims (22)

1. a system that is applicable to prevention and control telecommunications swindle, is characterized in that, described system comprises: be deployed in public safety department control centre, be deployed in the first cooperation end of telecommunication operator and be deployed in the second cooperation end of financial institution;
Wherein, described control centre has the interface arrangement for carrying out following operation:
Safeguard the national Telecom Facilities configuration information table of described telecommunication operator and the national financial institution configuration information table of described financial institution,
According to described national Telecom Facilities configuration information table, each mechanism of described telecommunication operator is carried out interface registration and directory management and according to described national financial institution configuration information table, each mechanism of described financial institution carried out to interface registration and directory management
Cooperate with holding and carry out information interaction with first end or second that cooperate that is deployed in corresponding mechanism according to the interface service address of registration.
2. the system as claimed in claim 1, is characterized in that, described system also comprises:
The first trigger, be deployed in described public safety department, be used for carrying out following operation: receive the telecommunications swindle case information that described public safety department built-in system forwards, trigger prevention and control flow process, telecommunication operator and financial institute information that identification is relevant to this telecommunications swindle case, and adjusted corresponding described the first cooperation end and the second cooperation end to carry out co-operation by described control centre;
And/or
The second trigger, be deployed in described telecommunication operator, be used for carrying out following operation: retrieve the keyword relevant with swindling crime or sentence formula by the fire compartment wall of telecommunication operator, trigger prevention and control flow process, telecommunication operator and financial institute information that identification is relevant to this telecommunications swindle case, and adjusted corresponding described the first cooperation end and the second cooperation end to carry out co-operation by described control centre.
3. system as claimed in claim 2, is characterized in that, described the first cooperation end comprises:
The first validator, for carrying out following operation: receive the investigation request that described control centre sends by described interface arrangement, and return to described control centre the telecom information that inquiry agency needs.
4. system as claimed in claim 2, is characterized in that, described the second cooperation end comprises:
The second validator, for carrying out following operation: receive the investigation request that described control centre sends by described interface arrangement, and return to described control centre the Financial Information that inquiry agency needs.
5. the system as described in claim 3 or 4, is characterized in that, described control centre is used for carrying out following operation:
Hold the information of returning to determine whether to be accused of telecommunications swindle crime according to described the first cooperation end or the second cooperation, and in the situation that being defined as being, adjusted described the first cooperation end and the second cooperation to hold by described interface arrangement and carried out co-operation.
6. system as claimed in claim 5, is characterized in that, described the first cooperation end also comprises:
The first block device, for carrying out following operation: receive the blocking-up request that described control centre sends by described interface arrangement, hang up the telecom number of being accused of telecommunications swindle crime, and push warning message to being accused of to this appointment colony that telecommunications swindle crime is relevant.
7. system as claimed in claim 5, is characterized in that, described the second cooperation end also comprises:
The second block device, for carrying out following operation: receive the processing request that described control centre sends by described interface arrangement, freeze or control the account of being accused of telecommunications swindle crime.
8. system as claimed in claim 6, is characterized in that, described the first cooperation end also comprises:
The first locator, for receiving the Location Request that described control centre sends by described interface arrangement, according to the communication signal of the telecom number of being accused of telecommunications swindle crime, this telecom number is positioned, and feed back to described control centre the geographical location information of orienting.
9. system as claimed in claim 7, is characterized in that, described the second cooperation end also comprises:
The second locator, the Location Request sending by described interface arrangement for receiving described control centre, according to the accounts information of being accused of telecommunications swindle crime, monitors the state of the account, and feeds back the end message of account current operation to described control centre.
10. system as claimed in claim 9, is characterized in that, described the second cooperation end also comprises:
Trapper, the trapping request sending by described interface arrangement for receiving described control centre, carries out virtual financial business operation to the accounts information of being accused of telecommunications swindle crime.
11. systems as claimed in claim 10, is characterized in that, described the second cooperation end also comprises:
Retrieve device, described in generating on a time period, be accused of the fund association analysis report of the account of telecommunications swindle crime, and the content of this report is transmitted back to described control centre, and carry out deblocking of funds or rollback operation.
Method for message interaction between 12. 1 kinds of systems of swindling for prevention and control telecommunications, is characterized in that, described method comprises:
Dispose the first cooperation end at telecommunication operator, dispose the second cooperation end in financial institution, and public safety department dispose control centre, wherein, described control centre by carry out the interface arrangement of following operation cooperate with described first end and second cooperate hold communicate:
Safeguard the national Telecom Facilities configuration information table of described telecommunication operator and the national financial institution configuration information table of described financial institution,
According to described national Telecom Facilities configuration information table, each mechanism of described telecommunication operator is carried out interface registration and directory management and according to described national financial institution configuration information table, each mechanism of described financial institution carried out to interface registration and directory management
Cooperate with holding and carry out information interaction with first end or second that cooperate that is deployed in corresponding mechanism according to the interface service address of registration.
13. methods as claimed in claim 12, is characterized in that, described method also comprises:
Dispose the first trigger in described public safety department, the telecommunications swindle case information forwarding for receiving described public safety department built-in system, trigger prevention and control flow process, telecommunication operator and financial institute information that identification is relevant to this telecommunications swindle case, and adjusted corresponding described the first cooperation end and the second cooperation end to carry out co-operation by described control centre;
And/or
Dispose the second trigger at described telecommunication operator, for retrieve the keyword relevant with swindling crime or sentence formula by the fire compartment wall of telecommunication operator, trigger prevention and control flow process, telecommunication operator and financial institute information that identification is relevant to this telecommunications swindle case, and adjusted corresponding described the first cooperation end and the second cooperation end to carry out co-operation by described control centre.
14. methods as claimed in claim 13, is characterized in that, described method also comprises:
In described first cooperation end configuration the first validator, the investigation request sending by described interface arrangement for receiving described control centre, and return to described control centre the telecom information that inquiry agency needs.
15. methods as claimed in claim 13, is characterized in that, described method also comprises:
In described second cooperation end configuration the second validator, the investigation request sending by described interface arrangement for receiving described control centre, and return to described control centre the Financial Information that inquiry agency needs.
16. methods as described in claims 14 or 15, is characterized in that, described method also comprises:
Described control centre holds the information of returning to determine whether to be accused of telecommunications swindle crime according to described the first cooperation end or the second cooperation, and in the situation that being defined as being, has adjusted described the first cooperation end and the second cooperation to hold by described interface arrangement and carried out co-operation.
17. methods as claimed in claim 16, is characterized in that, described method also comprises:
At described first cooperation end configuration the first block device, for receiving the blocking-up request that described control centre sends by described interface arrangement, the telecom number of telecommunications swindle crime is accused of in hang-up, and pushes warning message to being accused of to this appointment colony that telecommunications swindle crime is relevant.
18. methods as claimed in claim 16, is characterized in that, described method also comprises:
At described second cooperation end configuration the second block device, the processing request sending by described interface arrangement for receiving described control centre, freezes or controls the account of being accused of telecommunications and swindling crime.
19. methods as claimed in claim 17, is characterized in that, described method also comprises:
At described first cooperation end configuration the first locator, for receiving the Location Request that described control centre sends by described interface arrangement, according to the communication signal of the telecom number of being accused of telecommunications swindle crime, this telecom number is positioned, and feed back to described control centre the geographical location information of orienting.
20. methods as claimed in claim 18, is characterized in that, described method also comprises:
At described second cooperation end configuration the second locator, for receiving the Location Request that described control centre sends by described interface arrangement, according to the accounts information of being accused of telecommunications swindle crime, monitor the state of the account, and feed back the end message of account current operation to described control centre.
21. methods as claimed in claim 20, is characterized in that, described method also comprises:
At described the second cooperation end configuration trapper, the trapping request sending by described interface arrangement for receiving described control centre, carries out virtual financial business operation to the accounts information of being accused of telecommunications swindle crime.
22. methods as claimed in claim 21, is characterized in that, described method comprises well:
Retrieve device in described the second cooperation end configuration, described in generating on a time period, be accused of the fund association analysis report of the account of telecommunications swindle crime, and the content of this report is transmitted back to described control centre, and carry out deblocking of funds or rollback operation.
CN201410024872.1A 2014-01-20 2014-01-20 System applied to preventing and controlling telecommunication fraud and intersystem information interaction method Pending CN103795713A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410024872.1A CN103795713A (en) 2014-01-20 2014-01-20 System applied to preventing and controlling telecommunication fraud and intersystem information interaction method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410024872.1A CN103795713A (en) 2014-01-20 2014-01-20 System applied to preventing and controlling telecommunication fraud and intersystem information interaction method

Publications (1)

Publication Number Publication Date
CN103795713A true CN103795713A (en) 2014-05-14

Family

ID=50670999

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410024872.1A Pending CN103795713A (en) 2014-01-20 2014-01-20 System applied to preventing and controlling telecommunication fraud and intersystem information interaction method

Country Status (1)

Country Link
CN (1) CN103795713A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106408282A (en) * 2016-08-25 2017-02-15 深圳怡化电脑股份有限公司 Transfer service processing method and system of self-service terminal
WO2021114895A1 (en) * 2019-12-13 2021-06-17 支付宝(杭州)信息技术有限公司 Network payment method, apparatus, device and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079779A (en) * 2007-07-13 2007-11-28 信息产业部电信传输研究所 Public secure protection system and public secure protection method
CN101714990A (en) * 2009-10-30 2010-05-26 清华大学 Network security safeguarding integrated system and control method thereof
CN101938460A (en) * 2010-06-22 2011-01-05 北京豪讯美通科技有限公司 Coordinated defense method of full process and full network safety coordinated defense system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101079779A (en) * 2007-07-13 2007-11-28 信息产业部电信传输研究所 Public secure protection system and public secure protection method
CN101714990A (en) * 2009-10-30 2010-05-26 清华大学 Network security safeguarding integrated system and control method thereof
CN101938460A (en) * 2010-06-22 2011-01-05 北京豪讯美通科技有限公司 Coordinated defense method of full process and full network safety coordinated defense system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106408282A (en) * 2016-08-25 2017-02-15 深圳怡化电脑股份有限公司 Transfer service processing method and system of self-service terminal
WO2021114895A1 (en) * 2019-12-13 2021-06-17 支付宝(杭州)信息技术有限公司 Network payment method, apparatus, device and system

Similar Documents

Publication Publication Date Title
US7379879B1 (en) Incident reporting system and method
US9654620B2 (en) System and method for call treatment using a third party database
US8380569B2 (en) Method and system for advanced warning alerts using advanced identification system for identifying fraud detection and reporting
US8660954B2 (en) Fraud and events integrated management method and system
CN105103183A (en) Active assailant protocol for emergency dispatch
AU2016213735A1 (en) Electronic transaction fraud prevention
US20080075235A1 (en) ATM emergency database system for response to duress transactions
US11250680B2 (en) Utilizing a high generation cellular network for identifying devices associated with unauthorized activities and notifying enterprise facilities
CN205507857U (en) Safe high -efficient express delivery system of asking for based on thing networking
CN112991046A (en) Electronic resource limit control method, device, equipment and storage medium
CN107454275B (en) A kind of processing method and its system of warning message
CN1719480A (en) Finance account safety system
CN103795713A (en) System applied to preventing and controlling telecommunication fraud and intersystem information interaction method
CN101354804A (en) Danger early warning protective system of financial client
CN101329785A (en) Safe payment method and system using bank cipher
CN113723694A (en) Police officer control method, device, equipment and storage medium
Boateng et al. A fraud prevention and secure cognitive SIM card registration model
CN107623915A (en) A kind of safety protecting method, mobile terminal and the device with store function
CN103456093A (en) Bank alarm system and method
CN109544025A (en) A kind of list generation method and system for coping with emergency
KR20010069530A (en) Alarm and arresting system by recognition of the emergency PIN
KR20130050004A (en) The method preventing the financial transaction used for the criminal act on wired and wireless network
KR102198333B1 (en) Application for preventing voice fishing, system and method for monitoring fishing including the same
CN112637437A (en) Accurate pushing system for real-time early warning of telecommunication network fraud
CN114386809A (en) Nuclear power plant network security threat early warning and disposal system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20140514