KR101779696B1 - Method and apparatus for detecting voice phishing - Google Patents
Method and apparatus for detecting voice phishing Download PDFInfo
- Publication number
- KR101779696B1 KR101779696B1 KR1020160016353A KR20160016353A KR101779696B1 KR 101779696 B1 KR101779696 B1 KR 101779696B1 KR 1020160016353 A KR1020160016353 A KR 1020160016353A KR 20160016353 A KR20160016353 A KR 20160016353A KR 101779696 B1 KR101779696 B1 KR 101779696B1
- Authority
- KR
- South Korea
- Prior art keywords
- voice
- portable terminal
- phishing detection
- voice phishing
- party
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000001514 detection method Methods 0.000 claims abstract description 217
- 230000004044 response Effects 0.000 claims description 11
- 238000009434 installation Methods 0.000 claims description 9
- 230000006870 function Effects 0.000 description 19
- 230000008451 emotion Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 5
- 230000000903 blocking effect Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 125000002066 L-histidyl group Chemical group [H]N1C([H])=NC(C([H])([H])[C@](C(=O)[*])([H])N([H])[H])=C1[H] 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000010295 mobile communication Methods 0.000 description 2
- 230000002265 prevention Effects 0.000 description 2
- 238000010276 construction Methods 0.000 description 1
- 230000002996 emotional effect Effects 0.000 description 1
- 230000005281 excited state Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- G—PHYSICS
- G10—MUSICAL INSTRUMENTS; ACOUSTICS
- G10L—SPEECH ANALYSIS TECHNIQUES OR SPEECH SYNTHESIS; SPEECH RECOGNITION; SPEECH OR VOICE PROCESSING TECHNIQUES; SPEECH OR AUDIO CODING OR DECODING
- G10L25/00—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00
- G10L25/48—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use
- G10L25/51—Speech or voice analysis techniques not restricted to a single one of groups G10L15/00 - G10L21/00 specially adapted for particular use for comparison or discrimination
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/16—Communication-related supplementary services, e.g. call-transfer or call-hold
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M2203/00—Aspects of automatic or semi-automatic exchanges
- H04M2203/60—Aspects of automatic or semi-automatic exchanges related to security aspects in telephonic communication systems
- H04M2203/6027—Fraud preventions
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- Human Computer Interaction (AREA)
- Health & Medical Sciences (AREA)
- Acoustics & Sound (AREA)
- Multimedia (AREA)
- Computer Security & Cryptography (AREA)
- Computational Linguistics (AREA)
- Telephone Function (AREA)
- Telephonic Communication Services (AREA)
Abstract
A voice phishing detection method and system are disclosed. The method of detecting a voice phishing according to an embodiment of the present invention includes the steps of detecting occurrence of a call event at a portable terminal, recording a voice of a counterpart through a counterpart voice recording function provided by the operating system as the occurrence of the call event is detected And transmitting the voice of the other party to the voice phishing detection server connected through the network to request voice phishing detection. The voice phishing detection server detects the voice phishing between the white voice database, Generating a voice phishing detection result through comparison and transmitting the voice phishing detection result to the portable terminal; and performing control on the portable terminal based on the voice phishing detection result in the portable terminal.
Description
The present invention relates to a voice phishing detection method and system capable of effectively detecting and blocking voice phishing based on a voice of the other party.
Phishing starts with the fact that the security of the general user is not very conscious. Voice phishing on the phone is a user's suspicion when the attacker, who is the sender, says that he is a famous phone company, such as a bank or post office. This type of attack is a method of deceiving users from outside regardless of the internal security level of the institution.
The process by which an attacker deceives a user is very simple. In other words, it is all the process of deceiving a user to make a call, pretend to be an organization, and introduce it. Your phone displays the phone number of the source, but you do not know if it really is the phone number of the agency.
As such, the above-mentioned voice phishing is an attack method that is easy to think and easy to access because the attack cost is low, but it is hard to find a proper countermeasure against voice phishing. As a result, voice phishing has become increasingly common even today as security technology has developed.
Especially, in order to increase the success rate of the cheating, the attacker can obtain the telephone records of the other party, the credit card details, various bill, information related to the project through various routes and utilize them for pretexting. At this time, a panopticon occurs between the victim and the attacker, and the victim is easily deceived because the attacker does not doubt about the action requesting information.
The present invention provides a voice phishing detection method and system capable of detecting voice phishing through comparison between a voice of a partner recorded in a portable terminal and data constructed in a white voice database in response to occurrence of a call event.
The present invention also provides a voice phishing detection method capable of detecting voice phishing through comparison between data constructed in a black voice database and a voice of the other party, when data coinciding with the voice of the other party in voice phishing detection does not exist in the white voice database, System.
The present invention provides a voice phishing detection method and system in which a user can record a voice of his / her acquaintance using his / her portable terminal and register the voice in a white voice database.
In addition, the present invention provides a voice phishing detection method and system that can detect whether a malicious app is installed or a malicious app install request through inspection of a portable terminal when voice phishing is detected based on a peer voice.
According to another aspect of the present invention, there is provided a voice phishing detection method comprising the steps of: detecting a call event occurring in a portable terminal; detecting, by the occurrence of the call event, The method comprising the steps of: recording a voice of the other party through a function; transmitting voice of the other party to the voice phishing detection server connected through a network to request voice phishing detection; Generating a voice phishing detection result through comparison between the stored white voice database and the counterpart voice, and transmitting the voice phishing detection result to the portable terminal; and performing control on the portable terminal based on the voice phishing detection result in the portable terminal .
According to an embodiment of the present invention, the step of detecting the occurrence of the call event may detect the state of the portable terminal and the state of the portable terminal and detect the incoming call using a manifest file in the Android operating system of the portable terminal, have.
According to an embodiment of the present invention, the voice phishing detection method may further include the steps of: executing the malicious application checking module in the portable terminal when the voice phishing detection result indicating that the corresponding call is voice phishing is received; Checking whether there is a malicious application in the portable terminal or an application installation request from the outside through execution of the application; displaying the result of the check on the portable terminal or analyzing the malicious application installed in the portable terminal, And requesting a phishing detection server.
According to an embodiment of the present invention, the voice phishing detection method may further include the step of providing a recording button for recording the other party's voice as the occurrence of the call event is detected, , ≪ / RTI >
According to an embodiment of the present invention, the voice phishing detection method may further include the steps of: providing a white voice registration button for voice registration as the call event is generated; The method comprising the steps of: recording the counterpart voice; requesting the voice phishing detection server to transmit the unique information of the portable terminal and the recorded counterpart voice to request a white voice registration; The detection server may further include storing the voice of the other party received from the portable terminal and the unique information of the portable terminal in the white voice database.
According to an embodiment of the present invention, the voice phishing detection server further includes a black voice database storing a black voice corresponding to voice phishing, and the step of generating and transmitting the voice phishing detection result to the portable terminal comprises: Is not present in the white voice database, the voice phishing detection result may be generated based on whether or not the partner voice exists in the black voice database.
According to an embodiment of the present invention, the voice phishing detection method may further include the steps of: providing a black voice registration button when the call event is generated; The method of claim 1, further comprising the steps of: recording a partner voice and transmitting the voice to the voice phishing detection server to request a black voice registration; In the step of FIG.
According to an embodiment of the present invention, the voice phishing detection method further comprises the steps of: extracting meaningful word data from the recognized partner's voice after recognizing the partner's voice generated during the call if the detection result is not voice phishing; Comparing the extracted word data with a previously stored voice phishing identification keyword to detect voice phishing and controlling the corresponding call.
According to an embodiment of the present invention, the voice phishing detection method may include the steps of: providing a button for registering the recorded voice of the other party to the voice phishing detection server after the detected call is terminated, As shown in FIG.
In order to solve the above-mentioned problem, in a voice phishing detection system according to an embodiment of the present invention, when a call event is detected, a voice of the other party is recorded through a partner voice recording function provided by the operating system of the portable terminal, A portable terminal for transmitting voice over a network to request voice phasing detection, receiving a detection result corresponding to a voice phishing detection request through the network, and controlling the corresponding call based on the detection result, And a voice phishing detection server for transmitting the voice phishing detection result to the portable terminal through a comparison between the white voice database stored in the white voice database and the voice of the other party.
According to the embodiment of the present invention, the portable terminal can detect the status of the portable terminal and the incoming call using the manifest file in the Android operating system of the portable terminal set by the intent filter operating.
According to the embodiment of the present invention, when the voice phishing detection result indicating that the corresponding call is voice phishing is received, the portable terminal checks whether there is a malicious app in the portable terminal or whether there is an app install request from the outside, An analysis module for displaying a result of checking or processing of the malicious application checking module on the portable terminal or analyzing malicious apps installed on the portable terminal to the voice phishing detection server, . ≪ / RTI >
According to the embodiment of the present invention, the portable terminal provides a recording button for recording the partner's voice after the occurrence of the call event, and executes the partner's voice recording function according to the operation of the recording button, After recording the voice, it can be transmitted to the voice phishing detection server.
According to the embodiment of the present invention, the portable terminal provides a white voice registration button for voice registration upon the occurrence of the call event, The voice phishing detection server transmits the specific information of the portable terminal and the recorded voice of the other party to the voice phishing detection server to request white voice registration, And stores the matching voice in the white voice database.
According to an embodiment of the present invention, the voice phishing detection system further includes a black voice database in which black voice corresponding to voice phishing is stored, and the voice phishing detection server, when the opposite voice does not exist in the white voice database The voice phishing detection result may be generated based on whether or not the other party's voice exists in the black voice database.
According to the embodiment of the present invention, the portable terminal provides a black voice registration button when the call event is generated, and records the voice of the other party through execution of the partner voice recording function in response to the operation of the black voice registration button And transmits the black voice registration request to the voice phishing detection server to request black voice registration, and the voice phishing detection server can store the partner voice transmitted from the portable terminal in the black voice database according to the black voice registration request.
According to an embodiment of the present invention, a recording time may be set in the peer voice recording function.
According to an embodiment of the present invention, when the voice phishing detection result is not voice phishing, the portable terminal recognizes a partner voice generated during a call, extracts meaningful word data from the recognized partner voice, Data and a pre-stored voice phishing identification keyword to detect voice phishing and control the corresponding call.
According to the embodiment of the present invention, the portable terminal provides a button for registering the recorded voice of the other party to the voice phishing detection server and registering it as white voice or black voice after the detected call is terminated, The voice of the other party can be transmitted.
According to the embodiments of the present invention, the voice of the acquaintances is registered in the white voice database of the voice phishing detection server during the call with the acquaintances, and the comparison is made between voice recorded in the conversation and voice registered in the white voice database. By detecting phishing, you can increase your voice phishing detection rate.
1 is a network configuration diagram illustrating a voice phishing detection system according to an embodiment of the present invention.
2 is a block diagram illustrating a voice phishing detection device in accordance with an embodiment of the present invention.
3A and 3B are flowcharts illustrating a voice phishing detection method according to an embodiment of the present invention.
Hereinafter, specific embodiments of the present invention will be described with reference to the drawings. The following detailed description is provided to provide a comprehensive understanding of the methods, apparatus, and / or systems described herein. However, this is merely an example and the present invention is not limited thereto.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings. In the following description, well-known functions or constructions are not described in detail since they would obscure the invention in unnecessary detail. The following terms are defined in consideration of the functions of the present invention, and may be changed according to the intention or custom of the user, the operator, and the like. Therefore, the definition should be based on the contents throughout this specification. The terms used in the detailed description are intended only to describe embodiments of the invention and should in no way be limiting.
1 is a network configuration diagram illustrating a voice phishing detection system according to an embodiment of the present invention.
As shown in FIG. 1, the voice phishing interception system may include a
The
The
The voice
In addition, the voice
Meanwhile, when a voice phishing detection result is received from the voice
In an embodiment of the present invention, the voice phishing identification keyword includes, but is not limited to, an account, a loan, a payment, an accident, and the like.
In addition, the voice
In an embodiment of the present invention, the information stored in the voice
Meanwhile, when the voice phishing detection result of voice phishing is received from the voice
Meanwhile, in the embodiment of the present invention, the
2 is a block diagram illustrating a voice
2, the voice
The
In addition, the
The other party's
In addition, the
On the other hand, when a voice phishing detection result is received from the voice
The
In addition, the
Here, the detection
The
Also, the
Meanwhile, the
The
The voice
Also, the voice
The
The
In addition, the address book of the
The voice phishing identification keyword and the list of voice phishing telephone numbers stored in the
The voice
The emotion
The
The
As the voice phishing character is detected, the voice
The voice
In addition, the voice
Meanwhile, the voice
Meanwhile, the voice
The voice
The operation of the voice phishing detection system having the above configuration will be described with reference to FIGS. 3A and 3B.
3A and 3B are flowcharts illustrating an operation process of the voice
As shown in FIGS. 3A and 3B, when a call event is detected through the event module (step 302), the voice
If it is determined in
On the other hand, if it is determined in
Then, the voice
Then, the voice
The voice
If it is determined in
Then, the voice
On the other hand, if it is determined in
As a result of the determination in
Thereafter, the voice
If it is determined in
The
Meanwhile, in the above-described embodiment of the present invention, if the other party's telephone number does not exist in the voice phishing telephone list, the other party's voice is recorded through the other party's voice recording function and then transmitted to the voice
In addition, the voice
The method of operation of the voice
It will be understood by those of ordinary skill in the art that the foregoing description of the embodiments is for illustrative purposes and that those skilled in the art can easily modify the invention without departing from the spirit or essential characteristics thereof. It is therefore to be understood that the above-described embodiments are illustrative in all aspects and not restrictive. For example, each component described as a single entity may be distributed and implemented, and components described as being distributed may also be implemented in a combined form.
It is intended that the present invention covers the modifications and variations of this invention provided they come within the scope of the appended claims and their equivalents. .
110: Portable terminal
120: Voice phishing detection server
130: Network
140: white voice database
150: Black voice database
160: Database for detection
200: Voice phishing detection device
210:
220:
230:
240:
250: Voice phishing detection unit
260: Update section
270: Memory
280: emotion state sensing unit
290:
Claims (19)
Recording a voice of the other party through a partner voice recording function provided by an operating system in the portable terminal as the occurrence of the call event is detected;
Transmitting the recorded voice of the other party to a voice phishing detection server connected through a network to request voice phishing detection;
Generating a voice phishing detection result through comparison between a white voice database in which the voice phishing detection server stores the white voice and the opposite voice according to the request and transmitting the voice phishing detection result to the portable terminal;
And performing control on the portable terminal based on the voice phishing detection result in the portable terminal,
The step of performing control on the portable terminal includes:
Executing a malicious app checking module in the portable terminal when the voice phishing detection result indicating that the call is voice phishing from the voice phishing detection server is received,
Checking whether a malicious application exists in the portable terminal or an application installation request from the outside through execution of the malicious application checking module;
Displaying the check result on the portable terminal or requesting the voice phishing detection server to analyze the malicious apps installed on the portable terminal.
Wherein the step of detecting occurrence of the call event comprises:
Detecting a state of the portable terminal and a voice phishing detection method using the manifest file in the Android operating system of the portable terminal set by the intent filter operating upon recognizing the incoming call.
In the voice phishing detection method,
Further comprising the step of providing a recording button for recording the opposite party's voice as the occurrence of the call event is detected,
And recording the voice of the other party according to an operation of the record button.
In the voice phishing detection method,
Providing a white voice registration button for voice registration as the call event is generated;
Recording the voice of the other party through execution of the function in accordance with the operation of the white voice registration button;
Transmitting unique information of the portable terminal and the recorded voice of the other party to the voice phishing detection server to request white voice registration;
Further comprising the step of matching the partner's voice received from the portable terminal at the voice phishing detection server with the unique information of the portable terminal according to a request for the white voice registration and storing the matching voice in the white voice database.
The voice phishing detection server comprises:
And a black voice database in which black voice corresponding to voice phishing is stored,
Generating the voice phishing detection result and transmitting the voice phishing detection result to the portable terminal,
And if the counterpart voice is not present in the white voice database, generating the voice phishing detection result based on whether the counterpart voice exists in a black voice database.
In the voice phishing detection method,
Providing a black voice registration button upon the occurrence of the call event;
Recording the counterpart voice through execution of the counterpart voice recording function in response to the operation of the black voice registration button and transmitting the voice to the voice phishing detection server to request black voice registration;
And storing the voice of the other party received from the portable terminal in the black voice database in response to the black voice registration request at the voice phishing detection server.
In the voice phishing detection method,
If the detection result is not voice phishing, extracting meaningful word data from the recognized partner voice after recognizing the partner voice generated during the call;
Comparing the extracted word data with a previously stored voice phishing identification keyword to detect voice phishing and controlling the corresponding call.
In the voice phishing detection method,
Further comprising the step of providing a button for registering the recorded voice of the other party to the voice phishing detection server and registering the recorded voice as white voice or black voice after the detected call is terminated.
A white voice database storing a white voice,
And a voice phishing detection server for transmitting the voice phishing detection result to the portable terminal through comparison between white voice stored in the white voice database and the counterpart voice,
The portable terminal includes:
An execution module for executing a malicious application checking module for checking whether a malicious application exists in the portable terminal or an application installation request from the outside when the voice phishing detection result indicating that the corresponding call is voice phishing is received, ,
And displaying an analysis result of the malicious apps checking module on the portable terminal or analyzing malicious apps installed on the portable terminal by the voice phishing detection server.
The portable terminal includes:
A voice phishing detection system for detecting a status of the portable terminal and an intent filter operating on recognizing an incoming call using a manifest file in the Android operating system of the portable terminal.
The portable terminal includes:
And a recording button for recording the other party's voice after the occurrence of the call event is detected. According to the operation of the recording button, the partner's voice recording function is executed to record the partner's voice, Transmitting voice phishing detection system.
The portable terminal includes:
A white voice registration button for voice registration according to the occurrence of the call event, and recording the other party's voice through execution of the partner voice recording function in accordance with the operation of the white voice registration button, And transmits the recorded voice of the other party to the voice phishing detection server to request white voice registration,
Wherein the voice phishing detection server matches the voice of the other party received from the portable terminal with the unique information of the portable terminal according to the white voice registration request and stores the matching voice in the white voice database.
The voice phishing detection system comprises:
And a black voice database in which black voice corresponding to voice phishing is stored,
The voice phishing detection server comprises:
Wherein the voice phishing detection result is generated based on whether or not the partner voice exists in the black voice database when the partner voice is not present in the white voice database.
The portable terminal includes:
A black voice registration button is provided in response to the call event, and the voice of the other party is recorded through execution of the partner voice recording function in response to the operation of the black voice registration button, and then transmitted to the voice phishing detection server, Requesting voice registration,
Wherein the voice phishing detection server stores the peer voice transmitted from the portable terminal in the black voice database according to the black voice registration request.
Wherein the peer voice recording function has a recording time set.
The portable terminal includes:
If the result of the voice phishing detection is not voice phishing, recognizing a partner voice generated during a call, extracting meaningful word data from the recognized partner voice, comparing the extracted word data with a previously stored voice phishing identification keyword, And detecting phishing to control said call.
The portable terminal includes:
A button for transmitting the recorded voice of the other party to the voice phishing detection server and registering the voice of the other party as white voice or black voice after the detected call is terminated and transmitting the recorded voice of the other party according to the operation of the button Voice phishing detection system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160016353A KR101779696B1 (en) | 2016-02-12 | 2016-02-12 | Method and apparatus for detecting voice phishing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020160016353A KR101779696B1 (en) | 2016-02-12 | 2016-02-12 | Method and apparatus for detecting voice phishing |
Publications (2)
Publication Number | Publication Date |
---|---|
KR20170094967A KR20170094967A (en) | 2017-08-22 |
KR101779696B1 true KR101779696B1 (en) | 2017-09-19 |
Family
ID=59757904
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020160016353A KR101779696B1 (en) | 2016-02-12 | 2016-02-12 | Method and apparatus for detecting voice phishing |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101779696B1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11769492B2 (en) | 2018-04-06 | 2023-09-26 | Samsung Electronics Co., Ltd. | Voice conversation analysis method and apparatus using artificial intelligence |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102198333B1 (en) * | 2019-06-13 | 2021-02-08 | 류장수 | Application for preventing voice fishing, system and method for monitoring fishing including the same |
KR102105059B1 (en) * | 2019-06-27 | 2020-04-27 | (주)에스에스알 | Method and Server for Preventing Voice Phishing and computer program for the same |
KR102503027B1 (en) * | 2020-10-27 | 2023-02-23 | 임성중 | Voice phishing preventing mehtod and voice phishing preventing apparatus |
KR102558383B1 (en) * | 2022-02-24 | 2023-07-24 | (주)메티스 | Application for preventing voice phishing and preventing system for for preventing voice phishing therewith |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007096963A (en) * | 2005-09-29 | 2007-04-12 | Saxa Inc | Telephone apparatus |
-
2016
- 2016-02-12 KR KR1020160016353A patent/KR101779696B1/en active IP Right Grant
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2007096963A (en) * | 2005-09-29 | 2007-04-12 | Saxa Inc | Telephone apparatus |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11769492B2 (en) | 2018-04-06 | 2023-09-26 | Samsung Electronics Co., Ltd. | Voice conversation analysis method and apparatus using artificial intelligence |
Also Published As
Publication number | Publication date |
---|---|
KR20170094967A (en) | 2017-08-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101779696B1 (en) | Method and apparatus for detecting voice phishing | |
US9585006B2 (en) | Express mobile device access provisioning methods, systems, and apparatus | |
KR101431596B1 (en) | Apparatus and method for preventing voice phishing and user terminal for the same | |
US12010265B2 (en) | Dynamically providing safe phone numbers for responding to inbound communications | |
CN106464502B (en) | Method and system for authentication of a communication device | |
WO2019178817A1 (en) | Product sales volume extraction and reporting method, payment method, and terminal apparatus | |
US20210406909A1 (en) | Authorizing transactions using negative pin messages | |
JP2015111329A (en) | Network service providing system, network service providing method, and program | |
CN107230060A (en) | The method and apparatus that a kind of account is reported the loss | |
US20240028858A1 (en) | System and method for generating a dynamic machine readable code | |
US11093945B1 (en) | Electronic commerce fraud mitigation in a wireless communication network | |
KR20150003506A (en) | Method and system for cutting malicious message in mobile phone, and mobile phone implementing the same | |
KR101749939B1 (en) | Electronic payment certification server based on payment image matched with phone number, electronic payment system, electronic payment method and electronic payment application | |
CN106980778A (en) | Information authentication method, device and terminal device | |
CN113015097A (en) | Method, device and equipment for preventing telecommunication fraud | |
KR102156905B1 (en) | method for verifying user of messenger account for preventing messenger phishing | |
Rao et al. | Suspicious Call Detection and Mitigation Using Conversational AI | |
KR101060122B1 (en) | Method and device for processing spam message | |
US20240195904A1 (en) | Nlp-based call monitoring method for preventing voice phishing and apparatus therefor | |
KR20230102552A (en) | Phishing Detection System Using Voice Call and Text Trap Server | |
KR20210020743A (en) | method for verifying user of messenger account for preventing messenger phishing | |
KR20240037647A (en) | System and method for application verification | |
KR101078669B1 (en) | Event management system and method of portable terminal based on location information | |
KR20140142182A (en) | Method for determining illegal use of card in cash card use security system and computer-readable recording medium storing the same | |
US20140229378A1 (en) | Systems and methods for authentication notification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A201 | Request for examination | ||
E902 | Notification of reason for refusal | ||
E701 | Decision to grant or registration of patent right | ||
GRNT | Written decision to grant |