TWI403146B - Method and system for establishing network crime by telephone number and authorization code and source identification code - Google Patents

Method and system for establishing network crime by telephone number and authorization code and source identification code Download PDF

Info

Publication number
TWI403146B
TWI403146B TW98102511A TW98102511A TWI403146B TW I403146 B TWI403146 B TW I403146B TW 98102511 A TW98102511 A TW 98102511A TW 98102511 A TW98102511 A TW 98102511A TW I403146 B TWI403146 B TW I403146B
Authority
TW
Taiwan
Prior art keywords
detection
internet
network
authorization code
website
Prior art date
Application number
TW98102511A
Other languages
Chinese (zh)
Other versions
TW201029425A (en
Inventor
Chung Yu Lin
Original Assignee
Chung Yu Lin
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chung Yu Lin filed Critical Chung Yu Lin
Priority to TW98102511A priority Critical patent/TWI403146B/en
Publication of TW201029425A publication Critical patent/TW201029425A/en
Application granted granted Critical
Publication of TWI403146B publication Critical patent/TWI403146B/en

Links

Description

以電話號碼及授權碼及來源識別碼作為建置網路犯罪偵防之方法及其系統Method and system for constructing cyber crime detection using telephone number and authorization code and source identification code

本發明係屬於網路犯罪之偵察技術領域,其具有主動偵察網路犯罪者之來源,並可加以記錄分析後,做為提供給治安單位進行打擊網路犯罪之資料,進而創造更安全之網路使用環境,及協助推升網路中各種應用服務之發展效益。The invention belongs to the field of reconnaissance technology of cybercrime, and has the source of actively detecting cybercriminals, and can be recorded and analyzed, and then provides information for cybercrime to the security unit to create a safer network. Road use environment and help promote the development benefits of various application services in the network.

現代人使用網際網路(World Wide Web)來接發電子郵件(Email)、瀏覽網站(Web site)、進行網路購物之金融交易及與他人做網路語音通訊(VoIP),或是使用經由公共交換電話網路PSTN(Public Switched Telephone Network)之固網電話,以及使用經由GSM系統(Global System for Mobile Communications)、TDMA系統(Time Division Multiple Access)、CDMA系統(Code Division Multiple Access)、PDC系統(Personal Digital Cellular)等之行動電話,來完成接發電子郵件、瀏覽網站及與他人通訊連繫等行為,均是日常生活中非常普遍的現象,而在每日大量頻繁之使用下卻也不斷衍生出例如:垃圾電子郵件塞爆電子郵件信箱、駭客破壞網站、電話網路詐騙財物等犯罪的行為,為阻止這些妨礙網路發展之網路犯罪,乃有許多因應之 發明被揭露如:中華民國發明專利第I295136號、I221380號,核准公告編號第494334號、公開編號第200536338號(公開日2005年11月1日)、第200726171號(公開日2007年7月1日)及第200814703號(公開日2008年3月16日)等,由前述各發明所應用之技術中可知其手段雖有不同,但解決的方法均係運用網路身份認證及驗證之方式來阻絕網路犯罪者進入,以達成網路使用者在上網進行各項網路活動時,能避免遭受網路犯罪者之侵害。Modern people use the Internet (World Wide Web) to send and receive e-mails (Email), browse websites (Web sites), conduct financial transactions for online shopping, and make voice over internet communication (VoIP) with others, or use Fixed telephone telephone network PSTN (Public Switched Telephone Network) fixed-line telephone, and use of GSM system (Global System for Mobile Communications), TDMA system (Time Division Multiple Access), CDMA system (Code Division Multiple Access), PDC system Mobile phones such as (Personal Digital Cellular), which are used to send and receive e-mails, browse websites, and communicate with others, are very common phenomena in daily life, but they are constantly used in frequent daily use. Derived crimes such as junk e-mail e-mail, hacking websites, phone network fraud, etc. In order to prevent these cybercrimes that hinder the development of the Internet, there are many responses. The invention is disclosed as follows: Republic of China invention patent No. I295136, I221380, approval number 494334, public number No. 200536338 (publication date November 1, 2005), and 200726171 (publication day July 1, 2007) Japanese and Japanese No. 200814703 (publication date: March 16, 2008), etc., the techniques applied by the foregoing inventions are different, but the methods are solved by using network identity authentication and verification. Prevent cybercriminals from entering, so that Internet users can avoid being attacked by cybercriminals when they conduct various online activities on the Internet.

然而,上述揭露各發明所能達成之功效,其僅具有消極性阻止網路犯罪者對某些持定之網站,或特定之網路金融交易進行其犯罪行為的功能,並無法做到主動積極偵察網路犯罪者之身份來源,進而提供給治安單位來快速將其繩之以法的目的,換言之,在網路犯罪案件至今仍層出不窮的情形下,如何消除各種網路犯罪者的侵害,並提供一個更安全的網路使用環境,以確保眾多網路使用者能在上各種網路來進行各項網路服務時,可完全免於恐懼與擔憂之顧慮,乃成為一必須解決與迫切的課題。However, the above discloses the effects that each invention can achieve, which only has the negligence to prevent cybercriminals from performing criminal acts on certain fixed websites or specific online financial transactions, and cannot actively proactively detect The source of identity of cybercriminals, which is then provided to the security units to quickly bring them to justice, in other words, how to eliminate the cybercriminals’ infringements and provide cybercrime cases A safer network environment to ensure that many network users can completely avoid fears and worries when they use various networks to perform various network services. It is a must-solve and urgent issue. .

另,本案發明人曾於2004年4月30日提出中華民國第93112373號「以數個特定電話號碼依序排列組合成之數字串列冠上識別碼作為搜尋網際網路特定電腦 IP位址之系統」發明專利申請,並於2006年9月21日核准公告後取得發明第I262407號專利證書在案,其主要係應用〝電話號碼〞容易記憶、使用方便及具備單一專屬性之特點(因〝電話號碼〞係屬於有價的資源,任何一個個人或法人公司要取得其各自專屬之〝電話號碼〞,並非在無條件之下就可隨意獲得,其均必須付費申請後,才能經電信公司的釋出分配而擁有,因此,從各個國家特許設立的電信公司付費取得之個人或公司〝電話號碼〞,在冠上〝區域碼〞後即具有在該國所管轄區域內之單一專屬性,而不會在該國中發生與他人相重複之缺失,若再冠上各國的〝國別碼〞後,則又成為具有全球單一專屬性,而不虞在全球中會發生與他人有相重複之缺失),再以電話號碼擁有者自行主動任意設定之〝識別碼〞,而結合形成一個「電話號碼及識別碼」之特殊模式,來做為搜尋比對其所對應之特定網域名稱、或電子郵件IP位址、或特定語音通訊電腦主機IP位址,以達成阻絕他人在未被告知網路使用者之電話號碼及其識別碼的情形下,而無法隨意地與任一網路使用者進行電子郵件之相互傳送、或進行網路語音通訊、或破壞他人網站之目的;由於發明人在前述發明專利申請後,已按依該系統設立了「www.2uDG.com」來實際加以實施運作至今,其完全達成所預期的功效,因此,乃 以該「電話號碼及識別碼」之模式概念,再研發出對網路犯罪具有主動積極進行偵防犯罪功能之本發明。In addition, the inventor of the case filed the Republic of China No. 93112373 on April 30, 2004. "The number of specific serial numbers is sequentially combined to form a digital serial number with the identification code as a search for a specific computer on the Internet. The IP address system "invention patent application, and after the approval of the announcement on September 21, 2006, obtained the invention patent No. I262407, which is mainly applied to the telephone number, easy to remember, easy to use and has a single special property. Characteristics (Because the phone number is a valuable resource, any individual or legal person company must obtain its own unique phone number, which is not freely available without any conditions, and must be paid for after the application. The company’s release and distribution are owned by the company. Therefore, the individual or company/phone number paid for from the telecommunications company licensed by each country has a single attribute in the area under the jurisdiction of the country. Without the duplication of repetition in the country, if it is crowned with the country’s national code, it will become a global monopoly, and it will not overlap with others in the world. Missing), and then the phone number owner voluntarily set the identification code 〞, and combined to form a special model of "phone number and identification code" , as a search for a specific domain name, or an email IP address, or a specific voice communication computer host IP address, in order to reach a phone number that prevents others from being notified to the network user and In the case of an identification code, it is not possible to arbitrarily transmit e-mail to any Internet user, or perform voice communication over the Internet, or destroy the website of another person; since the inventor has pressed the aforementioned invention patent application, According to the system, "www.2uDG.com" was established to actually implement the operation so far, and it fully achieved the expected effect. Therefore, Based on the concept of the "telephone number and identification code", the present invention has been developed to actively detect crimes against cybercrime.

緣是,本發明之主要目的在提供一種「以電話號碼及授權碼及來源識別碼作為建置網路犯罪偵防之方法」,其步驟包含:a.導引每一網路使用者利用上網裝置至一犯罪偵防網站,將其專屬之〝電話號碼〞及其自行指定對應於該電話號碼之〝授權碼〞,以及該上網裝置之〝來源識別碼〞,分別輸入於該犯罪偵防網站之輸入界面動態網頁中的「電話號碼」、「授權碼」及「來源識別碼」等欄位內;b.犯罪偵防網站將來自界面動態網頁中,該每一網路使用者輸入專屬之「電話號碼」及「授權碼」,登錄儲存於該犯罪偵防網站之比對資料庫內;c.網路使用者利用上網裝置輸入撥打網路接收者之〝電話號碼〞及〝授權碼〞後,該上網裝置在當次網路上所具有之〝來源識別碼〞,會同步與該〝電話號碼及授權碼〞一起被傳送至犯罪偵防網站中,並立即啟動該犯罪偵防網站之偵測搜尋程式,而將該〝電話號碼〞及〝授權碼〞與登錄儲存於比對資料庫中的每一筆「電話號碼」及「授權碼」資料進行比對;及 d.在無比對出網路使用者輸入撥打之〝電話號碼〞、及〝授權碼〞與登錄儲存於比對資料庫中該網路接收者之「電話號碼」及「授權碼」均完全相同時,該犯罪偵防網站的偵測搜尋程式會發出〝比對不符合〞之指令,並經由上網裝置告知網路使用者〝請重新輸入電話號碼及授權碼〞,且同步主動將該網路使用者上網裝置之〝來源識別碼〞資料傳送至網路犯罪偵防電腦,進而提供做為犯罪偵防所需之統計分析資料。The main purpose of the present invention is to provide a method for "detecting cybercrime using a telephone number and an authorization code and a source identification code", the steps of which include: a. guiding each network user to use the Internet The device is sent to the crime detection website, and the exclusive telephone number and its own authorization code corresponding to the telephone number and the source identification code of the Internet device are respectively input into the crime detection website. In the "Web Phone Number", "Authorization Code" and "Source Identification Code" fields in the dynamic webpage of the input interface; b. The crime detection website will be from the interface dynamic webpage, and each of the network users input the exclusive "Phone number" and "authorization code" are stored in the comparison database of the crime detection website; c. The network user uses the Internet device to input the telephone number and authorization code of the network recipient. After that, the Internet device has the source identification code on the current network, and is transmitted to the crime detection website together with the phone number and the authorization code, and immediately starts the crime. Anti-search website detection program, and the "phone number" and "authorization code" and stored in the login than the sum of each of the "telephone number" and "authorization code" data in the database for comparison; and d. The phone number and the authorization code stored on the Internet user are the same as the “phone number” and “authorization code” stored in the comparison database. At that time, the detection and detection program of the crime detection website will issue a command to compare the non-compliance, and inform the network user via the Internet device to re-enter the phone number and authorization code, and synchronize the network actively. The source identification code and data of the user's Internet device are transmitted to the cyber crime detection computer, thereby providing statistical analysis data required for crime detection and prevention.

藉由該統計分析後之來源識別碼資料,可快速反查得知該網路使用者在網路上所屬確切之位置,並能即時地將其提供給相關之管轄治安單位,來立即對其進行主動之網路犯罪偵查與排除,進而免除其他網路使用者在網路使用中發生被侵害詐騙等情事,同時達成創造高度安全之網路使用環境。Through the statistical analysis of the source identification code data, the network user can be quickly checked for the exact location on the network, and can be immediately provided to the relevant jurisdictional security unit for immediate Active cybercrime detection and elimination, thereby eliminating the scams and other scams of other Internet users in the use of the Internet, while achieving a highly secure network environment.

本發明之另一目的在提供一種「以電話號碼及授權碼及來源識別碼作為建置網路犯罪偵防之系統」,其包括:一犯罪偵防網站、一輸入界面動態網頁、一偵測搜尋程式及一比對資料庫;其中,該偵防網站之網站伺服器係鏈結於全球資訊網(World Wide Web)或網際網路(Internet)上,且其輸出與輸入各種網路之資料均符合全球資訊網及網際網路之各種通訊協定;該輸入界面動態網頁,為設於犯罪偵防網站之網頁首頁(Home page) 或首頁以下之其中一網頁(Web page),係以可應用於全球資訊網(World Wide Web)或網際網路(Internet)之軟體語言所寫成,其頁面中設有一可供輸入「電話號碼」、「授權碼」及「來源識別碼」之空白欄位;該偵測搜尋程式,係由可應用於全球資訊網(World Wide Web)之軟體語言所寫成,具有對來自輸入界面動態網頁啟動要求(request)命令後執行搜尋比對之功能;該比對資料庫,係設置於該犯罪偵防網站之網站伺服器內,且內部登錄儲存有每一網路使用者之〝電話號碼〞,與對應於該每一網路使用者電話號碼之〝授權碼〞。Another object of the present invention is to provide a system for establishing a network crime detection system by using a telephone number and an authorization code and a source identification code, which includes: a crime detection website, an input interface dynamic webpage, and a detection. Search program and a comparison database; wherein the website of the detection website is linked to the World Wide Web or the Internet, and the output and input of various network materials All conform to the various communication protocols of the World Wide Web and the Internet; the input interface dynamic webpage is the home page of the crime detection website. Or one of the following pages (Web pages) is written in a software language that can be applied to the World Wide Web or the Internet. There is a page for entering a "phone number". , "Authorization Code" and "Source Identification Code" blank fields; the detection search program is written by a software language that can be applied to the World Wide Web, with dynamic web page activation requirements from the input interface. (request) command to perform the function of searching for comparison; the comparison database is set in the website server of the crime detection website, and the internal login stores the phone number of each network user, and Corresponding to the authorization code of the phone number of each network user.

藉由上述系統中各犯罪偵防網站於全球資訊網(World Wide Web)或網際網路(Internet)之相互連結,可形成一主動式網路犯罪偵之網路,並能提供給各國之管轄治安單位,作為立即主動網路犯罪之偵查與排除,進而免除所有網路使用者在全球網路使用中不會發生被侵害詐騙等情事,並形成一完全安全之網路使用環境。Through the interconnection of various crime detection websites in the above system on the World Wide Web or the Internet, a proactive cybercrime network can be formed and provided to the jurisdiction of each country. The security unit, as the detection and elimination of immediate active cybercrime, eliminates all network users from being attacked and scammed in the global network, and forms a completely secure network environment.

請參閱第一圖及第二圖所示,係本發明「以電話號碼及授權碼及來源識別碼作為建置網路犯罪偵防之方法」,其步驟包含:a.導引每一網路使用者U利用上網裝置D至一犯罪 偵防網站10,將其專屬之〝電話號碼〞及其自行指定對應於該電話號碼之〝授權碼〞,以及該上網裝置D之〝來源識別碼〞,分別輸入於該犯罪偵防網站之輸入界面動態網頁20中的「電話號碼」21、「授權碼」22及「來源識別碼」23等欄位內;b.犯罪偵防網站10將來自界面動態網頁20中,該每一網路使用者U輸入專屬之「電話號碼」21及「授權碼」22,登錄儲存於該犯罪偵防網站10之比對資料庫40內;c.網路使用者U利用上網裝置D輸入撥打網路接收者R之〝電話號碼〞及〝授權碼〞後,該上網裝置D在當次網路上所具有之〝來源識別碼〞23,會同步與該〝電話號碼及授權碼〞一起被傳送至犯罪偵防網站10中,並立即啟動該犯罪偵防網站10之偵測搜尋程式30,而將該〝電話號碼〞及〝授權碼〞與登錄儲存於比對資料庫40中的每一筆「電話號碼」及「授權碼」資料進行比對;及d.在無比對出網路使用者U輸入撥打之〝電話號碼〞、及〝授權碼〞與登錄儲存於比對資料庫40中該網路接收者R之「電話號碼」及「授權碼」均完全相同時,該犯罪偵防網站10的偵測搜尋程式30會發出〝比對不符合〞之指令,並經由上網裝置D告知網路使用者U 〝請重新輸入電話號碼及授權碼〞,且同步主動將該網路使用者U上網裝置D之〝來源識別碼〞23資料傳送至網路犯罪偵防電腦50,進而提供做為犯罪偵防所需之統計分析資料。Please refer to the first figure and the second figure, which is a method for constructing a cyber crime detection using a telephone number and an authorization code and a source identification code. The steps include: a. guiding each network User U uses Internet device D to commit a crime The detection website 10, the exclusive telephone number 〞 and its own authorization code corresponding to the telephone number, and the source identification code of the Internet device D are respectively input into the crime detection website. In the interface dynamic webpage 20, the "telephone number" 21, the "authorization code" 22 and the "source identification code" 23 are in the field; b. the crime detection website 10 will be from the interface dynamic webpage 20, and each network is used. U enters the exclusive "telephone number" 21 and "authorization code" 22, and logs in the comparison database 40 stored in the crime detection website 10; c. the network user U uses the Internet device D input to dial the network to receive After the phone number 〞 and 〝 authorization code of the R, the 〝 source identifier 〞23 of the IPTV device D on the current network will be transmitted to the crime detection together with the 〝 phone number and the authorization code 同步. In the anti-site 10, the detection search program 30 of the crime detection website 10 is immediately activated, and the "phone number" stored in the comparison database 40 is stored and registered. And "authorization code" data to compare And d. enter the phone number 拨打, and 〝 authorization code in the unrivaled network user U and log in to the "phone number" and "authorization" of the network recipient R stored in the comparison database 40. When the codes are all the same, the detection search program 30 of the crime detection website 10 issues a command to compare the non-compliance, and informs the network user U via the Internet device D. 重新Please re-enter the phone number and authorization code, and synchronously send the data of the network user U Internet device D to the cyber crime detection computer 50, and then provide it as a crime detection and defense center. Statistical analysis data required.

其中,該步驟d更包括一步驟d′:在有比對出網路使用者U撥打之〝電話號碼〞及〝授權碼〞與網路接收者R之「電話號碼」及「授權碼」均完全相同時,該犯罪偵防網站10的偵測搜尋程式30會發出〝比對符合〞之比對結果,並立即與網路接收者R完成接通。The step d further includes a step d': after the telephone number and/or authorization code dialed by the network user U, the "telephone number" and the "authorization code" of the network receiver R are both When they are identical, the detection search program 30 of the crime detection website 10 will issue a comparison result and immediately complete the connection with the network receiver R.

上述步驟a中若網路使用者U不願至犯罪偵防網站10,將其所擁有電話門號之〝電話號碼〞,以及其自行指定對應於該電話號碼之〝授權碼〞輸入於界面動態網頁20中,來進行登錄儲存於該犯罪偵防網站10之比對資料庫40內,即表示該網路使用者U選擇自動放棄使用本發明網路犯罪偵防之功能。In the above step a, if the network user U does not want to go to the crime detection website 10, the phone number of the phone number that he owns, and the authorization code corresponding to the phone number that he or she specifies, are input into the interface dynamics. In the webpage 20, the login is stored in the comparison database 40 of the crime detection website 10, that is, the network user U selects to automatically waive the function of using the cybercrime detection of the present invention.

另在上述步驟a、步驟c及步驟d中之來源識別碼23可為該上網裝置D之固定IP或浮動IP或該上網裝置D所屬局端設備之網路位址編號;且該上網裝置D則可為網際網路電話,或行動電話,或公共交換電話網路之固網電話,或固定式簡訊收發器,或可攜式簡訊收發器。The source identification code 23 in the step a, the step c, and the step d may be a fixed IP address or a floating IP address of the network device D or a network address number of the central office device of the network device D; and the network device D It can be an Internet telephony, or a mobile phone, or a fixed-line telephone of a public switched telephone network, or a stationary short message transceiver, or a portable short message transceiver.

又該步驟a中網路使用者專屬之電話號碼係可為 個人電話號碼,或是公司法人電話號碼;且其〝電話號碼〞21可為「國別碼-區域碼-本地電話號碼」之串列模式,或「國別碼-行動電話號碼」之串列模式;而該〝授權碼〞22係可由任何在電腦中可鍵入的文字、數字、符號或其兩者以上之組合所組成者;此外,該上網裝置D之〝來源識別碼〞23若因網路使用者U不知而未給予輸入至輸入界面動態網頁20中的「來源識別碼」23欄位內時,該犯罪偵防網站10之偵測搜尋程式20會主動自行偵測得知。In addition, the telephone number unique to the network user in the step a can be Personal phone number, or company corporate phone number; and the other phone number 〞21 can be a serial mode of "country code - area code - local phone number", or a series of "country code - mobile phone number" Mode; and the authorization code 22 can be composed of any combination of characters, numbers, symbols, or a combination of two or more in the computer; in addition, the source identifier of the Internet device D is 23 When the user U does not know and does not input the "Source Identification Code" 23 field in the input interface dynamic webpage 20, the detection search program 20 of the crime detection website 10 will actively detect and detect it.

再者,上述步驟d中對「來源識別碼」23之統計分析,是以其在特定之單位時間內,所累計次數逾犯罪偵防網站10所訂定之次數而進行。Furthermore, the statistical analysis of the "source identification code" 23 in the above step d is performed in such a manner that the cumulative number of times exceeds the number of times determined by the crime detection website 10 in a specific unit time.

因此,當網路犯罪者在無法得知網路使用者U之〝電話號碼〞及〝授權碼〞的情形下,利用上網裝置D欲嘗試撥打任一網路接收者R之〝電話號碼及授權碼〞時,其所使用當次上網裝置D的〝來源識別碼〞23,便會由犯罪偵防網站10中的偵測搜尋程式30主動偵測得知,並同步與該〝電話號碼及授權碼〞一起被傳送至犯罪偵防網站10中,且藉由偵測搜尋程式30進入比對資料庫40中進行比對後,在無比對出網路犯罪者撥打之〝電話號碼及授權碼〞與網路接收者R之〝電話號碼及授權碼〞相同時,該犯罪偵防網站10的偵測搜尋程式 30便會發出〝比對不符合〞之指令,並主動傳送出「來源識別碼」23資料至網路犯罪偵防電腦50中,來進行記錄統計與分析,若網路犯罪者在特定之單位時間內,重覆撥打累計之次數逾犯罪偵防網站10所規定之次數時,即可判定是屬於某一網路犯罪者所為,而逕行通報治安單位來將其逮捕繩之以法。Therefore, when the cybercriminal is unable to know the telephone number and the authorization code of the network user U, the Internet device D is used to attempt to dial the telephone number and authorization of any network receiver R. At the time of palletizing, the 〝 source identification code 〞23 of the current Internet access device D is actively detected by the detection search program 30 in the crime detection website 10, and synchronized with the 〝 phone number and authorization. The pallets are transmitted to the crime detection website 10, and after the comparison search program 30 enters the comparison database 40 for comparison, the telephone numbers and authorization codes dialed by the cybercriminal are displayed. The detection search program of the crime detection website 10 is the same as the telephone number and authorization code of the network receiver R. 30 will issue a 〝 对 不 不 , , , , , , 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动 主动During the time, if the number of repeated calls exceeds the number specified by the crime detection website 10, it can be determined that it belongs to a cybercriminal, and the security unit is reported to bring the arrest to justice.

續如第一圖、第三圖及第四圖所示,本發明「以電話號碼及授權碼及來源識別碼作為建置網路犯罪偵防之方法」之系統,係包含:一犯罪偵防網站10,其網站伺服器11係鏈結於全球資訊網W(World Wide Web)或網際網路I(Internet)上,且其輸出與輸入各種網路之資料均符合全球資訊網W及網際網路I之各種通訊協定;一輸入界面動態網頁20,為設於犯罪偵防網站之網頁首頁(Home page)或首頁以下之其中一網頁(Web page),係以可應用於全球資訊網W(World Wide Web)或網際網路I(Internet)之軟體語言所寫成,其頁面中設有一可供輸入「電話號碼」21、「授權碼」22及「來源識別碼」23之空白欄位;一偵測搜尋程式30,係由可應用於全球資訊網W(World Wide Web)之軟體語言所寫成,具有對來自輸入界面動態網頁20啟動要求(request)命令後執行搜尋 比對之功能;及一比對資料庫40,係設置於該犯罪偵防網站10之網站伺服器11內,且內部登錄儲存有每一網路使用者U之〝電話號碼〞,與對應於該每一網路使用者U電話號碼之〝授權碼〞。As shown in the first, third and fourth figures, the system of the present invention "using a telephone number and an authorization code and a source identification code as a method for detecting a cyber crime detection" includes: a crime detection and defense Website 10, its web server 11 is linked to World Wide Web (World Wide Web) or Internet I (Internet), and its output and input into various networks are in line with the World Wide Web and the Internet. Various communication protocols of the road I; an input interface dynamic webpage 20, which is located on the home page of the crime detection website or one of the pages below the homepage (Web page), is applicable to the global information network W ( World Wide Web) or Internet I (Internet) software language, the page has a blank field for entering "phone number" 21, "authorization code" 22 and "source identification code" 23; The detection search program 30 is written by a software language that can be applied to the World Wide Web (WWW), and has a search command from the input interface dynamic web page 20 to perform a search. The comparison function; and a comparison database 40 is disposed in the website server 11 of the crime detection website 10, and the internal login stores the telephone number of each network user U, corresponding to The authorization code of the U phone number of each network user.

其中,該比對資料庫40更包括設置連結於全球資訊網W(World Wide Web)或網際網路I(Internet)上的每一犯罪偵防網站60伺服器內之比對資料庫61(如第三圖所示),且該比對資料庫內61部均登錄儲存有每一網路使用者U之電話號碼,與對應於該每一網路使用者電話號碼之授權碼者。The comparison database 40 further includes a comparison database 61 disposed in each of the crime detection websites 60 connected to the World Wide Web or the Internet I (such as the World Wide Web) (eg, The third figure shows that the 61 parts of the comparison database are registered with the telephone number of each network user U and the authorization code corresponding to the telephone number of each network user.

另,該比對資料庫40亦更包括設置連結上網際網路W之任一登錄儲存有每一網路使用者之電話號碼,與對應於該每一網路使用者電話號碼之授權碼之比對資料庫70者(如第四圖所示)。In addition, the comparison database 40 further includes a phone number of each network user stored in any of the linked Internet addresses, and an authorization code corresponding to the phone number of each network user. Compare the database 70 (as shown in the fourth figure).

10‧‧‧犯罪偵防網站10‧‧‧Criminal Detection Website

11‧‧‧網站伺服器11‧‧‧Web server

20‧‧‧界面動態網頁20‧‧‧Interface dynamic webpage

21‧‧‧電話號碼21‧‧‧ phone number

22‧‧‧授權碼22‧‧‧Authorization code

23‧‧‧來源識別碼23‧‧‧Source identification code

30‧‧‧偵測搜尋程式30‧‧‧Detection search program

40、70‧‧‧比對資料庫40, 70‧‧‧ comparison database

50‧‧‧網路犯罪偵防電腦50‧‧‧Internet crime detection computer

60‧‧‧犯罪偵防網站60‧‧‧Criminal Detection Website

61‧‧‧伺服器內之比對資料庫61‧‧‧Comparative database in the server

D‧‧‧上網裝置D‧‧‧Internet device

I‧‧‧網際網路I‧‧‧Internet

R‧‧‧網路接收者之R‧‧‧Network recipients

U‧‧‧網路使用者U‧‧‧Internet users

W‧‧‧全球資訊網W‧‧‧World Information Network

第一圖:係本發明方法中之系統方塊示意圖之一。First Figure: One of the block diagrams of the system in the method of the present invention.

第二圖:係本發明方法之步驟流程圖。Second Figure: Flowchart of the steps of the method of the present invention.

第三圖:係本發明方法中之系統方塊示意圖之二。The third figure is the second schematic diagram of the system block in the method of the present invention.

第四圖:係本發明方法中之系統方塊示意圖之三。The fourth figure is the third schematic diagram of the system block in the method of the present invention.

10‧‧‧犯罪偵防網站10‧‧‧Criminal Detection Website

11‧‧‧網站伺服器11‧‧‧Web server

20‧‧‧界面動態網頁20‧‧‧Interface dynamic webpage

21‧‧‧電話號碼21‧‧‧ phone number

22‧‧‧授權碼22‧‧‧Authorization code

23‧‧‧來源識別碼23‧‧‧Source identification code

30‧‧‧偵測搜尋程式30‧‧‧Detection search program

40‧‧‧比對資料庫40‧‧‧Comparative database

50‧‧‧網路犯罪偵防電腦50‧‧‧Internet crime detection computer

D‧‧‧上網裝置D‧‧‧Internet device

I‧‧‧網際網路I‧‧‧Internet

R‧‧‧網路接收者之R‧‧‧Network recipients

U‧‧‧網路使用者U‧‧‧Internet users

W‧‧‧全球資訊網W‧‧‧World Information Network

Claims (19)

一種「以電話號碼及授權碼及來源識別碼作為建置網路犯罪偵防之方法」,其步驟包含:a.導引每一網路使用者利用上網裝置至一犯罪偵防網站,將其專屬之〝電話號碼〞及其自行指定對應於該電話號碼之〝授權碼〞,以及該上網裝置之〝來源識別碼〞,分別輸入於該犯罪偵防網站之輸入界面動態網頁中的「電話號碼」、「授權碼」及「來源識別碼」等欄位內;b.犯罪偵防網站將來自界面動態網頁中,該每一網路使用者輸入專屬之「電話號碼」及「授權碼」,登錄儲存於該犯罪偵防網站之比對資料庫內;c.網路使用者利用上網裝置輸入撥打網路接收者之〝電話號碼〞及〝授權碼〞後,該上網裝置在當次網路上所具有之〝來源識別碼〞,會同步與該〝電話號碼及授權碼〞一起被傳送至犯罪偵防網站中,並立即啟動該犯罪偵防網站之偵測搜尋程式,而將該〝電話號碼〞及〝授權碼〞與登錄儲存於比對資料庫中的每一筆「電話號碼」及「授權碼」資料進行比對;及d.在無比對出網路使用者輸入撥打之〝電話號碼〞、及〝授權碼〞與登錄儲存於比對資料庫中該網路接收者之「電話號碼」及「授權碼」均完全相同時,該犯罪偵防網站的偵測搜尋程式會發出〝比對不符合〞之指令,且同步主動將該網路使用者上網裝置之〝來源識別碼〞資料傳送至網路犯罪偵防電腦,進而提供做為犯罪偵防所需之統計分析資料。 A method of using a telephone number and an authorization code and a source identification code as a means of detecting cybercrime detection, the steps of which include: a. guiding each network user to use an internet device to a crime detection website to The exclusive phone number and its own authorization code corresponding to the phone number and the source identification code of the Internet device are respectively input into the phone number of the input interface dynamic webpage of the crime detection website. , "Authorization Code" and "Source Identification Code", etc.; b. The crime detection website will be from the interface dynamic webpage, and each of the Internet users will input the exclusive "telephone number" and "authorization code". The login is stored in the comparison database of the crime detection website; c. the network user inputs the telephone number and the authorization code of the network recipient by using the Internet device, and the network device is on the current network. The source identification code will be transmitted to the crime detection website together with the phone number and authorization code, and the detection and search program of the crime detection website will be launched immediately. 〝 Phone number 〝 and 〝 authorization code 〞 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一 每一The detection code of the crime detection website will be issued when the phone number and the authorization code are the same as the "phone number" and "authorization code" stored in the comparison database. The 〝 comparison does not comply with the 〞 command, and synchronously sends the 〝 source identification code 〞 data of the network user's Internet device to the cyber crime detection computer, thereby providing statistical analysis data required for crime detection and prevention. 如申請專利範圍第1項所述之方法,其中,步驟a、步驟 c及步驟d中之來源識別碼可為該上網裝置之固定IP。 The method of claim 1, wherein the step a and the step The source identification code in c and step d may be a fixed IP of the internet device. 如申請專利範圍第1項所述之方法,其中,步驟a、步驟c及步驟d中之來源識別碼可為該上網裝置之浮動IP。 The method of claim 1, wherein the source identification code in step a, step c and step d is a floating IP of the internet device. 如申請專利範圍第1項所述之方法,其中,步驟a、步驟c及步驟d中之來源識別碼可為該上網裝置所屬局端設備之網路位址編號。 The method of claim 1, wherein the source identification code in step a, step c, and step d is a network address number of the central office device to which the network device belongs. 如申請專利範圍第1項所述之方法,其中,步驟a、步驟c及步驟d中該上網裝置可為網際網路電話。 The method of claim 1, wherein the internet access device in step a, step c, and step d is an internet phone. 如申請專利範圍第1項所述之方法,其中,步驟a、步驟c及步驟d中之上網裝置可為行動電話。 The method of claim 1, wherein the internet device in step a, step c and step d can be a mobile phone. 如申請專利範圍第1項所述之方法,其中,步驟a、步驟c及步驟d中之上網裝置可為公共交換電話網路之固網電話。 The method of claim 1, wherein the access device in step a, step c and step d is a fixed line telephone of a public switched telephone network. 如申請專利範圍第1項所述之方法,其中,步驟a、步驟c及步驟d中之上網裝置可為固定式或可攜式之簡訊收發器。 The method of claim 1, wherein the internet access device in step a, step c, and step d is a fixed or portable short message transceiver. 如申請專利範圍第1項所述之方法,其中,步驟a中網路使用者專屬之電話號碼可為個人電話號碼或公司法人電話號碼。 The method of claim 1, wherein the telephone number exclusive to the network user in step a can be a personal telephone number or a corporate legal person telephone number. 如申請專利範圍第1項所述之方法,其中,步驟a中之〝電話號碼〞可為「國別碼-區域碼-本地電話號碼」之串列模式者。 The method of claim 1, wherein the phone number in step a can be a serial mode of "country code - area code - local phone number". 如申請專利範圍第1項所述之方法,其中,步驟a.中之〝電話號碼〞可為「國別碼-行動電話號碼」之串列模式者。 The method of claim 1, wherein the telephone number in step a. is a serial mode of "country code - mobile phone number". 如申請專利範圍第1項所述之方法,其中,步驟a中之〝授權碼〞可由任何在電腦中可鍵入的文字、數字、符 號或其兩者以上之組合所組成者。 The method of claim 1, wherein the authorization code in step a can be any text, number, or character that can be typed in the computer. The number or combination of two or more. 如申請專利範圍第1項所述之方法,其中,步驟a中該上網裝置之〝來源識別碼〞若因網路使用者不知而未給予輸入至輸入界面動態網頁中的「來源識別碼」欄位內時,該犯罪偵防網站之偵測搜尋程式會主動偵測得知。 The method of claim 1, wherein the source identifier of the Internet device in step a is not input to the "Source Identification Code" column in the dynamic webpage of the input interface if the network user does not know The detection and detection program of the crime detection website will detect it when it is inside. 如申請專利範圍第1項所述之方法,其中,步驟d.中對「來源識別碼」之統計分析,是以其在特定之單位時間內,所累計次數逾犯罪偵防網站所訂定之次數而進行。 For example, in the method of claim 1, wherein the statistical analysis of the "source identifier" in step d. is that the cumulative number of times in the specified unit time exceeds the number of times set by the crime detection website. And proceed. 如申請專利範圍第1項所述之方法,其中,該步驟d.更包括一步驟d′:在有比對出網路使用者撥打之〝電話號碼〞及〝授權碼〞與網路接收者之「電話號碼」及「授權碼」均完全相同時,該犯罪偵防網站的偵測搜尋程式會發出〝比對符合〞之比對結果,並立即與網路接收者完成接通。 The method of claim 1, wherein the step d. further comprises a step d': after comparing the phone number dialed by the network user, the authorization code, and the network receiver When the "telephone number" and "authorization code" are identical, the detection and detection program of the crime detection website will issue a comparison result and immediately complete the connection with the network receiver. 一種依據申請專利範圍第1項所述之以電話號碼及授權碼及來源識別碼作為建置網路犯罪偵防之方法的系統,係包含:一犯罪偵防網站,其網站伺服器係鏈結於全球資訊網(World Wide Web)或網際網路(Internet)上,且其輸出與輸入各種網路之資料均符合全球資訊網及網際網路之各種通訊協定;一輸入界面動態網頁,為設於犯罪偵防網站之網頁首頁(Home page)或首頁以下之其中一網頁(Web page),係以可應用於全球資訊網(World Wide Web)或網際網路(Internet)之軟體語言所寫成,其頁面中設有一可供輸入「電話號碼」、「授權碼」及「來源識別碼」之空白欄位; 一偵測搜尋程式,係由可應用於全球資訊網(World Wide Web)之軟體語言所寫成,具有對來自輸入界面動態網頁啟動要求(request)命令後執行搜尋比對之功能;及一比對資料庫,係設置於該犯罪偵防網站之網站伺服器內,且內部登錄儲存有每一網路使用者之〝電話號碼〞,與對應於該每一網路使用者電話號碼之〝授權碼〞。 A system for constructing a cybercrime detection method by using a telephone number and an authorization code and a source identification code according to the first aspect of the patent application scope includes: a crime detection website, and a website server chain thereof On the World Wide Web or the Internet, the data of its output and input to various networks conforms to various communication protocols of the World Wide Web and the Internet; The Home page or one of the following pages on the Crime Detection and Prevention website is written in a software language that can be applied to the World Wide Web or the Internet. There is a blank field on the page for entering "telephone number", "authorization code" and "source identification code"; A detection search program is written by a software language that can be applied to the World Wide Web (World Wide Web), and has a function of performing a search comparison after a dynamic web page request request from the input interface; and a comparison The database is set in the website server of the crime detection website, and the internal login stores the phone number of each network user, and the authorization code corresponding to the phone number of each network user. Hey. 如申請專利範圍第16項所述之系統,其中,該比對資料庫更包括設置連結於全球資訊網(World Wide Web)或網際網路(Internet)上的每一犯罪偵防網站伺服器內之比對資料庫,且該比對資料庫內部均登錄儲存有每一網路使用者之電話號碼,與對應於該每一網路使用者電話號碼之授權碼者。 The system of claim 16, wherein the comparison database further comprises setting up each crime detection website server connected to the World Wide Web or the Internet. The comparison database, and the comparison database internally stores the telephone number of each network user and the authorization code corresponding to the telephone number of each network user. 如申請專利範圍第16或17項所述之系統,其中,該偵測搜尋程式係可搜尋連結上網際網路之任一犯罪偵防網站伺服器內的比對資料庫者。 The system of claim 16 or 17, wherein the detection search program searches for a comparison database in any of the crime detection website servers connected to the Internet. 如申請專利範圍第16項所述之系統,其中,該偵測搜尋程式係可搜尋連結上網際網路之任一登錄儲存有每一網路使用者之電話號碼,與對應於該每一網路使用者電話號碼之授權碼之比對資料庫者。 The system of claim 16, wherein the detection search program searches for a phone number of each network user stored in any of the linked Internet addresses, and corresponds to each network. The comparison of the authorization codes of the road user's telephone number to the database.
TW98102511A 2009-01-21 2009-01-21 Method and system for establishing network crime by telephone number and authorization code and source identification code TWI403146B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW98102511A TWI403146B (en) 2009-01-21 2009-01-21 Method and system for establishing network crime by telephone number and authorization code and source identification code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW98102511A TWI403146B (en) 2009-01-21 2009-01-21 Method and system for establishing network crime by telephone number and authorization code and source identification code

Publications (2)

Publication Number Publication Date
TW201029425A TW201029425A (en) 2010-08-01
TWI403146B true TWI403146B (en) 2013-07-21

Family

ID=44854020

Family Applications (1)

Application Number Title Priority Date Filing Date
TW98102511A TWI403146B (en) 2009-01-21 2009-01-21 Method and system for establishing network crime by telephone number and authorization code and source identification code

Country Status (1)

Country Link
TW (1) TWI403146B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI465950B (en) 2012-08-21 2014-12-21 Ind Tech Res Inst Method and system for discovering suspicious account groups

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200701733A (en) * 2005-06-22 2007-01-01 Softstar Entertainment Inc Method and system using machine code to lock data
TW200823807A (en) * 2006-11-20 2008-06-01 Chung-Yu Lin Anti-fraudulent method for financial service system using telephone number and identification code
CN101335794A (en) * 2007-06-27 2008-12-31 田种楠 Network telephone connecting system and network telephone connecting method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW200701733A (en) * 2005-06-22 2007-01-01 Softstar Entertainment Inc Method and system using machine code to lock data
TW200823807A (en) * 2006-11-20 2008-06-01 Chung-Yu Lin Anti-fraudulent method for financial service system using telephone number and identification code
CN101335794A (en) * 2007-06-27 2008-12-31 田种楠 Network telephone connecting system and network telephone connecting method

Also Published As

Publication number Publication date
TW201029425A (en) 2010-08-01

Similar Documents

Publication Publication Date Title
Schrittwieser et al. Guess who is texting you? evaluating the security of smartphone messaging applications
CN101345788B (en) Identity affirmation method and system through telephone call-back
CN103916244B (en) Verification method and device
US8365267B2 (en) Single use web based passwords for network login
US9210557B2 (en) SMS-initiated mobile registration
US8549594B2 (en) Method of identity authentication and fraudulent phone call verification that utilizes an identification code of a communication device and a dynamic password
CA2557143C (en) Trust inheritance in network authentication
US9544317B2 (en) Identification of potential fraudulent website activity
TW201014315A (en) User identity authentication method, system thereof and identifying code generating maintenance subsystem
WO2014154144A1 (en) Social communication system
JP2015099470A (en) System, method, and server for authentication, and program
US20130326020A1 (en) Preventing personal information from being posted to an internet
US8532271B2 (en) Cybercrime detecting and preventing method and system established by telephone number code, authorization codes and source identification code
CN104750723A (en) File sharing method, system, browser and server
TWI403146B (en) Method and system for establishing network crime by telephone number and authorization code and source identification code
JP2013013019A (en) Caller information presentation device
Gupta et al. Abusing phone numbers and cross-application features for crafting targeted attacks
US20080306905A1 (en) Electronic directory system
CN104917755A (en) Login method based on mobile communication terminal and short message
CN107493302A (en) A kind of user information acquiring method and device
TW201112720A (en) Method of communication device recognition code and dynamic code for network identification and telephone fraud certification
Ranjan et al. Apriori Viterbi model for prior detection of socio-technical attacks in a social network
CN105933881A (en) Phone number alias producing method and system, and phone number alias processing method and system
US8107936B2 (en) Connecting a phone call to a mobile telecommunication device based on the time of day that the communication is initiated
CN107071029A (en) A kind of adding method, server, the first user equipment and second user equipment