CN113067945A - Method, device and equipment for dissuading fraud calls - Google Patents

Method, device and equipment for dissuading fraud calls Download PDF

Info

Publication number
CN113067945A
CN113067945A CN202110269304.8A CN202110269304A CN113067945A CN 113067945 A CN113067945 A CN 113067945A CN 202110269304 A CN202110269304 A CN 202110269304A CN 113067945 A CN113067945 A CN 113067945A
Authority
CN
China
Prior art keywords
fraud
user
information
discouraging
relative
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110269304.8A
Other languages
Chinese (zh)
Inventor
肖坚炜
廖敏
谢朝霞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Anluo Technology Co ltd
Original Assignee
Shenzhen Anluo Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Anluo Technology Co ltd filed Critical Shenzhen Anluo Technology Co ltd
Priority to CN202110269304.8A priority Critical patent/CN113067945A/en
Publication of CN113067945A publication Critical patent/CN113067945A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Signal Processing (AREA)
  • Alarm Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method, a device and equipment for discouraging fraud calls, wherein the method comprises the following steps: acquiring and storing the relative information input by the user; when detecting that the relatives receive the fraud calls, sending fraud information to the user terminal; and acquiring the dissuading operation of the user and marking the dissuading state. According to the embodiment of the invention, the user can input the own relatives telephone, and when the relatives receive the fraud telephone, the relatives are directly dissuaded by the user, so that the dissuading success rate and credibility are increased, loss is stopped in time, and property safety is improved.

Description

Method, device and equipment for dissuading fraud calls
Technical Field
The invention relates to the technical field of information security, in particular to a method, a device and equipment for discouraging fraud calls.
Background
Phishing generally refers to a fraudulent means of deceiving others about a property in various forms on a network for some purpose. The main behaviors and links of crimes occur on the Internet, and the behaviors of large public and private properties are cheated by fictional facts or a method of hiding true facts.
In the prior art, in order to prevent the masses from being cheated, after the masses receive fraud calls, the fraud reminding short messages are sent, so that the dissuading efficiency is low, and the loss of the masses cannot be effectively recovered.
Accordingly, the prior art is yet to be improved and developed.
Disclosure of Invention
In view of the above-mentioned shortcomings of the prior art, the present invention aims to provide a method, a device and a facility for discouraging fraudulent calls, and aims to solve the technical problem of low discouraging efficiency of fraudulent calls in the prior art.
The technical scheme of the invention is as follows:
a method of discouraging fraudulent calls, the method comprising:
acquiring and storing the relative information input by the user;
when detecting that the relatives receive the fraud calls, sending fraud information to the user terminal;
and acquiring the dissuading operation of the user and marking the dissuading state.
Further, the obtaining and storing of the relative information entered by the user includes:
and acquiring and storing the relative name and the contact information of the user through the fraud telephone monitoring platform.
Further preferably, the obtaining and storing, by the fraud phone monitoring platform, the name of the relative of the user and the contact information of the relative includes:
and reading and storing the relative name and the contact way of the user from the address book of the user terminal through the fraud phone monitoring platform.
Further preferably, the obtaining and storing, by the fraud phone monitoring platform, the name of the relative of the user and the contact information of the relative includes:
and acquiring and storing the name of the relative and the contact information of the relative input by the user through the fraud telephone monitoring platform.
Preferably, the sending fraud information to the user terminal when detecting that the relatives receive the fraud phone comprises:
when the fraud phone monitoring platform detects that the relatives receive the fraud phone, the fraud type is identified, and fraud information generated by the fraud type and the fraud content is sent to the user terminal.
Further, the obtaining of the dissuading operation of the user, marking the dissuading state, includes:
and when the communication record of the contact way corresponding to the user and the relatives is detected, judging that the user completes the dissuading operation, and marking the dissuading state as dissuaded.
Further, when it is detected that the relatives receive the fraud phone, the method sends the fraud information to the user terminal, further comprising:
and when detecting that the relatives receive the fraud calls, identifying the fraud types and sending the fraud types and fraud information generated by the fraud contents to the relatives.
Another embodiment of the present invention provides an apparatus for discouraging fraudulent calls, the apparatus comprising:
the system comprises a relative information input module, a relative information storage module and a relative information output module, wherein the relative information input module is used for acquiring and storing relative information input by a user;
the fraud information sending module is used for sending fraud information to the user terminal when detecting that the relatives receive the fraud calls;
and the persuasion marking module is used for acquiring persuasion operation of the user and marking the persuasion state.
Another embodiment of the present invention provides an apparatus to discourage fraudulent telephones, the apparatus comprising at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the above-described method of discouraging fraudulent calls.
Another embodiment of the present invention also provides a non-transitory computer-readable storage medium storing computer-executable instructions that, when executed by one or more processors, may cause the one or more processors to perform the above-described method of discouraging fraudulent calls.
Has the advantages that: according to the embodiment of the invention, the user can input the own relatives telephone, and when the relatives receive the fraud telephone, the relatives are directly dissuaded by the user, so that the dissuading success rate and credibility are increased, loss is stopped in time, and property safety is improved.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is a flow chart of a preferred embodiment of a method of discouraging fraudulent calls of the present invention;
FIG. 2 is a functional block diagram of a preferred embodiment of an apparatus for discouraging fraudulent calls of the present invention;
FIG. 3 is a hardware structure diagram of a preferred embodiment of the device for discouraging fraudulent calls.
Detailed Description
In order to make the objects, technical solutions and effects of the present invention clearer and clearer, the present invention is described in further detail below. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Embodiments of the present invention will be described below with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a flow chart of a preferred embodiment of a method for discouraging fraud calls according to the present invention. As shown in fig. 1, it includes the steps of:
s100, acquiring and storing the relative information input by the user;
step S200, when detecting that the relatives receive the fraud calls, sending fraud information to the user terminal;
and step S300, obtaining the dissuading operation of the user and marking the dissuading state.
In specific implementation, the embodiment of the invention monitors the fraud telephone through the fraud telephone monitoring platform, and simultaneously, by acquiring and storing the relative information recorded by the user on the fraud telephone monitoring platform, if the fact that the relative receives the fraud telephone is detected, if the user is bound with the relative information, the fraud information is sent to the user terminal. If one relative is bound with a plurality of users, the fraud telephone monitoring platform sends fraud information to the bound user terminals.
The user receiving the fraud information can carry out fraud dissuasion on relatives in dissuasion modes such as calling and micro-communication voice communication, and the fraud phone monitoring platform marks dissuasion states according to whether the user carries out dissuasion operations or not. Wherein the relatives include but are not limited to the relatives of the father, mother, spouse, children, etc. of the user.
The fraud telephone monitoring platform can be a fraud telephone monitoring APP or a fraud telephone monitoring applet, and the fraud telephone monitoring platform can be used for monitoring fraud data by calling a fraud big data platform.
The user inputs the telephones of father, mother, spouse and child at the terminal, when the relatives are cheated, the relatives are dissuaded directly by the user, and the dissuading success rate and credibility are increased and the loss is stopped in time under the condition that dissuading is not required by police.
Further, acquiring and storing the relative information input by the user, including:
and acquiring and storing the relative name and the contact information of the user through the fraud telephone monitoring platform.
In specific implementation, a user registers personal information in the fraud telephone monitoring platform in advance, wherein the personal information comprises contact ways such as a personal mobile phone number and the like. If the fraud phone monitoring APP is installed, the user can log in through a user name and an account number, and if the fraud phone applet is installed, the user can log in through a micro signal. And after the user logs in, entering a family information entry interface, and acquiring and storing the family name and the contact way of the family of the user through the family information entry interface. Wherein the relative name comprises the name of the relative and the name of the user to the relative. The contact information of the relatives includes but is not limited to the mobile phone numbers, the fixed phone numbers, the micro signals, the QQ numbers and the like of the relatives. The user may select one or more contact ways of the user. For example, when a relative of a user has a mobile phone number, a fixed phone number, a micro signal and a QQ number of the relative at the same time, the user may store only the mobile phone number of the relative, or the user may store the mobile phone number, the fixed phone number, the micro signal and the QQ number of hair at the same time in the fraud phone monitoring platform.
Further, the method for obtaining and storing the names of the relatives and the contact information of the relatives of the user through the fraud phone monitoring platform comprises the following steps:
and reading and storing the relative name and the contact way of the user from the address book of the user terminal through the fraud phone monitoring platform.
In specific implementation, the relatives information entry interface of the fraud telephone monitoring platform supports the pulling of the relatives names and the relatives contact ways of the users stored by the users from the communication record. For example, when the user wants to enter information of the mother, the contact address named as the mother can be directly read from the address book.
Further, the method for obtaining and storing the names of the relatives and the contact information of the relatives of the user through the fraud phone monitoring platform comprises the following steps:
and acquiring and storing the name of the relative and the contact information of the relative input by the user through the fraud telephone monitoring platform.
During specific implementation, a user can input the name and the contact information of the user in the family information entry interface, and after the input content of the user is detected, the user can store the input content in real time.
Further, when detecting that the relatives receive the fraud phone, sending fraud information to the user terminal, comprising:
when the fraud phone monitoring platform detects that the relatives receive the fraud phone, the fraud type is identified, and fraud information generated by the fraud type and the fraud content is sent to the user terminal.
In specific implementation, when the fraud phone monitoring platform detects that relatives receive fraud phones, the fraud phones are identified through background big data fraud types, the fraud types include but are not limited to faking social security, medical security, bank, telecommunication and other workers, faking public inspection, postal workers, fraud by medium and large prizes, faking acquaintance and the like, fraud information is generated according to the identified fraud types and fraud contents, and the fraud information is sent to the user terminal in a short message and/or micro message mode.
Further, acquiring an obstruction operation of a user, marking an obstruction state, includes:
and when the communication record of the contact way corresponding to the user and the relatives is detected, judging that the user completes the dissuading operation, and marking the dissuading state as dissuaded.
In specific implementation, if the fact that the user contacts with the family telephone or the mobile phone is detected, the fact that the user performs the dissuading operation is judged, and at the moment, the dissuading state is marked as dissuaded.
Further, when detecting that the relatives receive the fraud call, the fraud information is sent to the user terminal, further comprising:
and when detecting that the relatives receive the fraud calls, identifying the fraud types and sending the fraud types and fraud information generated by the fraud contents to the relatives.
When the method is specifically implemented, the user dissuades relatives, and the generated fraud information is sent to the relatives terminal in the form of short messages, so that dissuading is performed in multiple ways, the success rate and the reliability of dissuading are improved, the property loss of people is further avoided, and the property safety is improved.
According to the method embodiment, the invention provides a method for discouraging fraud calls, which comprises the steps of obtaining and storing the relative information input by the user; when detecting that the relatives receive the fraud calls, sending fraud information to the user terminal; and acquiring the dissuading operation of the user and marking the dissuading state. According to the embodiment of the invention, the user can input the own relatives telephone, and when the relatives receive the fraud telephone, the relatives are directly dissuaded by the user, so that the dissuading success rate and credibility are increased, loss is stopped in time, and property safety is improved.
It should be noted that, a certain order does not necessarily exist between the above steps, and those skilled in the art can understand, according to the description of the embodiments of the present invention, that in different embodiments, the above steps may have different execution orders, that is, may be executed in parallel, may also be executed interchangeably, and the like.
Another embodiment of the present invention provides an apparatus for discouraging fraudulent calls, as shown in fig. 2, the apparatus 1 comprising:
the system comprises a relative information input module 11, a relative information storage module and a relative information output module, wherein the relative information input module is used for acquiring and storing relative information input by a user;
a fraud information sending module 12 for sending fraud information to the user terminal when detecting that the relatives receive the fraud call;
and an obstruction marking module 13 for obtaining the obstruction operation of the user and marking the obstruction state.
The specific implementation is shown in the method embodiment, and is not described herein again.
Another embodiment of the present invention provides an apparatus for discouraging fraudulent calls, as shown in fig. 3, the apparatus 10 comprising:
one or more processors 110 and a memory 120, where one processor 110 is illustrated in fig. 3, the processor 110 and the memory 120 may be connected by a bus or other means, and the connection by the bus is illustrated in fig. 3.
Processor 110 is operative to implement various control logic of apparatus 10, which may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA), a single chip, an ARM (Acorn RISC machine) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination of these components. Also, the processor 110 may be any conventional processor, microprocessor, or state machine. Processor 110 may also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration.
The memory 120, which is a non-volatile computer-readable storage medium, may be used for storing non-volatile software programs, non-volatile computer-executable programs, and modules, such as program instructions corresponding to the method for discouraging fraudulent calls in the embodiments of the present invention. The processor 110 executes various functional applications and data processing of the device 10 by executing the non-volatile software programs, instructions and units stored in the memory 120, namely, implements the method of discouraging fraudulent calls in the above-described method embodiments.
The memory 120 may include a storage program area and a storage data area, wherein the storage program area may store an application program required for operating the device, at least one function; the storage data area may store data created according to the use of the device 10, and the like. Further, the memory 120 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other non-volatile solid state storage device. In some embodiments, memory 120 optionally includes memory located remotely from processor 110, which may be connected to device 10 via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
One or more units are stored in the memory 120, and when executed by the one or more processors 110, perform the method of discouraging fraudulent calls in any of the above-described method embodiments, e.g., performing the above-described method steps S100 to S300 in fig. 1.
Embodiments of the present invention provide a non-transitory computer-readable storage medium storing computer-executable instructions for execution by one or more processors, for example, to perform method steps S100-S300 of fig. 1 described above.
By way of example, non-volatile storage media can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as Synchronous RAM (SRAM), dynamic RAM, (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), Synchl ink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The disclosed memory components or memory of the operating environment described herein are intended to comprise one or more of these and/or any other suitable types of memory.
Another embodiment of the present invention provides a computer program product comprising a computer program stored on a non-volatile computer-readable storage medium, the computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method of discouraging fraud calls of the above-described method embodiments. For example, the method steps S100 to S300 in fig. 1 described above are performed.
The above-described embodiments are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that the embodiments may be implemented by software plus a general hardware platform, and may also be implemented by hardware. Based on such understanding, the above technical solutions essentially or contributing to the related art can be embodied in the form of a software product, which can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes several instructions for enabling a computer device (which can be a personal computer, a server, or a network device, etc.) to execute the methods of the various embodiments or some parts of the embodiments.
Conditional language such as "can," "might," or "may" is generally intended to convey that a particular embodiment can include (yet other embodiments do not include) particular features, elements, and/or operations, among others, unless specifically stated otherwise or otherwise understood within the context as used. Thus, such conditional language is also generally intended to imply that features, elements, and/or operations are in any way required for one or more embodiments or that one or more embodiments must include logic for deciding, with or without input or prompting, whether such features, elements, and/or operations are included or are to be performed in any particular embodiment.
What has been described herein in the specification and drawings includes examples of methods and apparatus that can provide dissuasion from fraudulent telephones. It will, of course, not be possible to describe every conceivable combination of components and/or methodologies for purposes of describing the various features of the disclosure, but it can be appreciated that many further combinations and permutations of the disclosed features are possible. It is therefore evident that various modifications can be made to the disclosure without departing from the scope or spirit thereof. In addition, or in the alternative, other embodiments of the disclosure may be apparent from consideration of the specification and drawings and from practice of the disclosure as presented herein. It is intended that the examples set forth in this specification and the drawings be considered in all respects as illustrative and not restrictive. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims (10)

1. A method of discouraging fraudulent calls, the method comprising:
acquiring and storing the relative information input by the user;
when detecting that the relatives receive the fraud calls, sending fraud information to the user terminal;
and acquiring the dissuading operation of the user and marking the dissuading state.
2. The method of discouraging fraud telephones as defined in claim 1, wherein said obtaining and storing user-entered familiarity information comprises:
and acquiring and storing the relative name and the contact information of the user through the fraud telephone monitoring platform.
3. The method of discouraging fraud telephones as recited in claim 2, wherein said obtaining and storing, by the fraud telephone monitoring platform, the user's affiliate name and affiliate's contact details comprises:
and reading and storing the relative name and the contact way of the user from the address book of the user terminal through the fraud phone monitoring platform.
4. The method of discouraging fraud telephones as recited in claim 2, wherein said obtaining and storing, by the fraud telephone monitoring platform, the user's affiliate name and affiliate's contact details comprises:
and acquiring and storing the name of the relative and the contact information of the relative input by the user through the fraud telephone monitoring platform.
5. A method of discouraging fraud telephones as claimed in claim 3 or 4, wherein said sending fraud information to the user terminal upon detecting that a fraud telephone is received by a relative, comprises:
when the fraud phone monitoring platform detects that the relatives receive the fraud phone, the fraud type is identified, and fraud information generated by the fraud type and the fraud content is sent to the user terminal.
6. The method of discouraging fraud telephones as defined in claim 5, wherein said obtaining a user's discouraging operation, marking a discouraging status, comprises:
and when the communication record of the contact way corresponding to the user and the relatives is detected, judging that the user completes the dissuading operation, and marking the dissuading state as dissuaded.
7. The method of discouraging fraud telephones as defined in claim 6, wherein the sending of fraud information to the user terminal upon detection of receipt of a fraud telephone by a relative, further comprises:
and when detecting that the relatives receive the fraud calls, identifying the fraud types and sending the fraud types and fraud information generated by the fraud contents to the relatives.
8. An apparatus for discouraging fraudulent calls, the apparatus comprising:
the system comprises a relative information input module, a relative information storage module and a relative information output module, wherein the relative information input module is used for acquiring and storing relative information input by a user;
the fraud information sending module is used for sending fraud information to the user terminal when detecting that the relatives receive the fraud calls;
and the persuasion marking module is used for acquiring persuasion operation of the user and marking the persuasion state.
9. An apparatus to discourage fraudulent telephones, said apparatus comprising at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of discouraging fraud telephones of any of claims 1-7.
10. A non-transitory computer-readable storage medium, wherein the non-transitory computer-readable storage medium stores computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the method of discouraging fraud telephones of any of claims 1-7.
CN202110269304.8A 2021-03-12 2021-03-12 Method, device and equipment for dissuading fraud calls Pending CN113067945A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110269304.8A CN113067945A (en) 2021-03-12 2021-03-12 Method, device and equipment for dissuading fraud calls

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110269304.8A CN113067945A (en) 2021-03-12 2021-03-12 Method, device and equipment for dissuading fraud calls

Publications (1)

Publication Number Publication Date
CN113067945A true CN113067945A (en) 2021-07-02

Family

ID=76560163

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110269304.8A Pending CN113067945A (en) 2021-03-12 2021-03-12 Method, device and equipment for dissuading fraud calls

Country Status (1)

Country Link
CN (1) CN113067945A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104602242A (en) * 2015-01-22 2015-05-06 北京瑞思明科技有限公司 Method and device for preventing voice phishing
CN106970911A (en) * 2017-03-28 2017-07-21 广州中国科学院软件应用技术研究所 A kind of strick precaution telecommunication fraud system and method based on big data and machine learning
CN107580121A (en) * 2017-08-30 2018-01-12 珠海市魅族科技有限公司 Long-range guard method and device, terminal and storage medium
CN107580043A (en) * 2017-08-30 2018-01-12 珠海市魅族科技有限公司 Long-range control method and remote control
CN107734469A (en) * 2017-09-18 2018-02-23 咪咕动漫有限公司 A kind of fraudulent call based reminding method, device and computer-readable recording medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104602242A (en) * 2015-01-22 2015-05-06 北京瑞思明科技有限公司 Method and device for preventing voice phishing
CN106970911A (en) * 2017-03-28 2017-07-21 广州中国科学院软件应用技术研究所 A kind of strick precaution telecommunication fraud system and method based on big data and machine learning
CN107580121A (en) * 2017-08-30 2018-01-12 珠海市魅族科技有限公司 Long-range guard method and device, terminal and storage medium
CN107580043A (en) * 2017-08-30 2018-01-12 珠海市魅族科技有限公司 Long-range control method and remote control
CN107734469A (en) * 2017-09-18 2018-02-23 咪咕动漫有限公司 A kind of fraudulent call based reminding method, device and computer-readable recording medium

Similar Documents

Publication Publication Date Title
US9763100B2 (en) Instant messaging message processing method and device and storage medium
TWI449394B (en) User authentication, verification and code generation system maintenance subsystem
US9887996B1 (en) Bidirectional authentication
US9602662B2 (en) Verifying telephone caller origin
CN104125547A (en) Short message processing method and device
CN108055238A (en) A kind of account verification method and system
ES2817936T3 (en) Methods and systems for verifying users by phone numbers
US20230179705A1 (en) Dynamically providing safe phone numbers for responding to inbound communications
KR101779696B1 (en) Method and apparatus for detecting voice phishing
US20140120885A1 (en) System and method for handling undesired phone calls
EP3966814A1 (en) Combination of real-time analytics and automation
CN108900525B (en) Processing method and device for verification code request
JP2020053967A (en) Systems and methods for detecting communication fraud attempts
CN113067945A (en) Method, device and equipment for dissuading fraud calls
CN112615967A (en) Method, device and equipment for prompting fraud call
JP7338847B2 (en) Anti-SMS Fraud System, Anti-SMS Method, and Anti-SMS Fraud Program
US10567929B2 (en) System and method for facilitating communications between inmates and non-inmates
CN108449518A (en) Insurance contract pays a return visit method and apparatus
CN113015097A (en) Method, device and equipment for preventing telecommunication fraud
CN106330882B (en) Security verification method and security verification device
CN111988473A (en) Voice communication call control method and device based on intelligent contract
Tressler COVID-19 Contact Tracing Text Message Scams
EP3982620A1 (en) Communication terminal, information processing device, information processing system, information processing method, and program
KR102611390B1 (en) Phishing Detection System Using Voice Call and Text Trap Server
CN111490964B (en) Security authentication method, device and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210702

RJ01 Rejection of invention patent application after publication