TWI507009B - System and method of smartphone for preventing fraud - Google Patents
System and method of smartphone for preventing fraud Download PDFInfo
- Publication number
- TWI507009B TWI507009B TW101106438A TW101106438A TWI507009B TW I507009 B TWI507009 B TW I507009B TW 101106438 A TW101106438 A TW 101106438A TW 101106438 A TW101106438 A TW 101106438A TW I507009 B TWI507009 B TW I507009B
- Authority
- TW
- Taiwan
- Prior art keywords
- fraud
- data
- module
- database
- incoming call
- Prior art date
Links
Landscapes
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Description
本發明係與防止詐騙有關,特別是指一種內建於智慧型手機中,藉以偵測來電訊息防止自身受騙的系統及其方法。 The present invention relates to fraud prevention, and more particularly to a system and method thereof that is built into a smart phone to detect incoming call messages and prevent themselves from being deceived.
近年來,拜網際網路科技快速發展所賜,使得人們可透過網路的搜尋及服務,而可輕易地取得各項欲查詢的資訊與服務;然而,卻有許多的不法份子亦利用網路的便利性,在未經核可的情況下,非法地駭入私人或公司的網路資料庫中,不當地截取各項資料,如個人的資料或各項機密資訊等,而所截取到的不法資料,卻經常在有心人的操作下,成為詐騙犯罪的工具;是以,雖然網路科技的確帶給人們快速取得資訊的服務優勢,但同時也提供了不法份子搜集被害人個人資料行詐騙取財的另一管道。 In recent years, thanks to the rapid development of Internet technology, people can easily obtain various information and services through online search and service. However, many unscrupulous users also use the Internet. Convenience, illegally breaking into a private or company's online database without approval, and improperly intercepting various information, such as personal information or confidential information, etc. Illegal materials, but often used as a tool for fraudulent crimes under the operation of the people; therefore, although Internet technology does give people the advantage of quick access to information, it also provides illegal elements to collect victims’ personal data for fraudulent gains. Another pipe.
據上,目前的電話詐騙集團就是以非法管道取得的個人資料,來對被害人施以詐騙犯罪,惟詐騙的行為,從早期以家用電話通知被害人中獎或退稅等詐騙方式,到目前以手機傳送簡訊,再以各種名目要求被害人轉帳匯款不定的金額至特定的帳號中,可知電話詐騙集團的犯案不僅日益猖獗,且詐騙手法亦不斷地推陳出新,再加上手機的普及,電話詐騙集團以手機做為詐騙犯罪旳 工具,更使得民眾防不勝防。 According to the above, the current telephone fraud group is to use the personal data obtained through illegal channels to sue the victim, but the fraudulent behavior, from the early use of home phone notification to the victim to win or refund the tax, etc., to the current mobile phone to send newsletters In a variety of names, the victim is required to transfer the amount of the remittance to a specific account number. It can be seen that the fraud of the telephone fraud group is not only increasingly rampant, but also the fraudulent methods are constantly being updated. Together with the popularity of mobile phones, the telephone fraud group uses mobile phones as a mobile phone. Fraud crime Tools make the people more difficult to defend.
然而,為了防止民眾不斷地被詐騙,一美國專利第7,447,302號係揭露一種藉由驗證電話號碼以防止被詐騙的系統,然而,此種系統必需搭配網際網路取得驗證電話號碼之PIN Code,方能確認來電號碼為合法而非詐騙電話,惟在實施時,需一邊接收來電一邊上網取得所需驗證的PIN Code,因而造成來電接聽及/或驗證的不便,而致防止詐騙的效果不彰。 However, in order to prevent people from being continually defrauded, U.S. Patent No. 7,447,302 discloses a system for verifying a telephone number to prevent fraud, however, such a system must be paired with the Internet to obtain a PIN Code for verifying a telephone number. It can be confirmed that the caller number is legal rather than fraudulent. However, when implementing the call, it is necessary to receive the incoming call and obtain the required PIN code on the Internet, thus causing inconvenience of answering and/or verifying the call, and the effect of preventing fraud is not good.
有鑑於此,於手機上增設一種無需驗證,且可快速偵測或辨識詐騙電話的系統及其方法,以改善習用技術效果不佳等問題。 In view of this, a system and a method for quickly detecting or recognizing fraudulent telephones without authentication are provided on the mobile phone to improve problems such as poor performance of the conventional technology.
本發明係在解決目前電話詐騙集團行手機詐騙時,民眾無法防範而易受到詐騙,終致損失財物及身心受創等問題。 The invention solves the problems of the current telephone fraud group mobile phone fraud, the public can not be prevented and vulnerable to fraud, resulting in loss of property and physical and mental damage.
因此,本發明係提供一種智慧型手機之防詐騙系統及其方法,係包括:一無線通訊模組,係用於接收一來電訊息;一手機資料庫,其內儲存有多筆詐騙者之來電號碼、聲紋及詐騙類別之關鍵語等資料;及一辨識模組,係電性連接於該無線通訊模組及該手機資料庫之間,令來電時,該辨識模組亦可接收來電訊息,並與該手機資料庫中之資料行辨識比對。 Therefore, the present invention provides a smart phone anti-fraud system and method thereof, including: a wireless communication module for receiving an incoming call message; and a mobile phone database storing a plurality of fraudster calls And the identification module is electrically connected between the wireless communication module and the mobile phone database. When the incoming call is made, the identification module can also receive the incoming call message. And compare with the data line identification in the mobile phone database.
上述來電訊息係包括來電號碼及談話內容等。 The above call message includes the caller number and the content of the conversation.
上述辨識模組係利用該無線通訊模組以無線上網的方式至特定網站下載APP軟體並內建於其中,而該APP軟體係可擷取來電訊息,再與該手機資料庫中之資料行辨識比對。而該APP軟體與該 手機資料庫中之資料行辨識比對時,該APP軟體係可偵測ATM提款機的位置並發出警告。 The above identification module uses the wireless communication module to download and install the APP software to a specific website by means of wireless Internet access, and the APP soft system can capture the incoming call message and identify with the data line in the mobile phone database. Comparison. And the APP software and the When the data line in the mobile phone database is compared, the APP soft system can detect the location of the ATM and issue a warning.
上述智慧型手機之防詐騙系統更包括一雲端伺服器,而該雲端伺服器中包含一雲端資料庫,該雲端資料庫中內存有一詐騙類別關鍵字庫資料、一詐騙的來電號碼資料、一ATM位址資料、一詐騙者之聲紋資料、一地理資訊資料及一最新的詐騙新聞、案例及新方法暨統計報表資料;令該無線通訊模組可透過網路連接下載該雲端資料庫中的資料,藉以更新該手機資料庫中各項的資料。而該雲端伺服器更包括一聲紋比對模組、一關鍵字比對模組、一詐騙統計分析模組、一提款機位置比對模組、一案件暨新聞更新宣導模組、一資料推播更新模組及一發話地理資訊模組。 The smart phone anti-fraud system further includes a cloud server, and the cloud server includes a cloud database, wherein the cloud database has a fraudulent category keyword database, a fraudulent caller number data, and an ATM. Address information, a scammer's voiceprint data, a geographic information material and a latest scam news, case and new method and statistical report data; enable the wireless communication module to download the cloud database through the network connection Information to update the data in the mobile phone database. The cloud server further includes a voiceprint comparison module, a keyword comparison module, a fraud statistical analysis module, a cash dispenser position comparison module, a case and news update promotion module, A data push update module and a voice geographic information module.
再者,本發明亦提供一種智慧型手機之防詐騙方法,其至少包括下列步驟:a、接獲來電;b、擷取來電訊息;c、辨識來電號碼;d、辨識詐騙類別之關鍵語;e、辨識來電者的聲紋;以及f、辨識來電的發話處。 Furthermore, the present invention also provides an anti-fraud method for a smart phone, which at least includes the following steps: a, receiving an incoming call; b, capturing a call message; c, identifying a caller number; d, identifying a key word of the fraud category; e. Identify the caller's voiceprint; and f. Identify the caller's call.
上述步驟c、d、e及f中,若遇有不安全的訊息時,該步驟c、d、e及f之後各包括一步驟,該步驟係為通報司法機關查詢及通報。 In the above steps c, d, e and f, if there is an unsafe message, the steps c, d, e and f each include a step, which is to notify the judicial authorities of the inquiry and notification.
上述步驟c之前,更包括一步驟,而該步驟為:連接一雲端伺服器。而該雲端伺服器連接之步驟中係下載該雲端伺服器中最新的詐騙新聞、案例及新方法暨統計報表等資料。 Before the step c above, a step is further included, and the step is: connecting a cloud server. In the step of connecting the cloud server, the latest fraud news, cases, new methods and statistical reports in the cloud server are downloaded.
本發明的具體特點及功效在於: The specific features and effects of the present invention are as follows:
一、由於本發明詐騙比對資料中係包含有詐騙者或詐騙集團的電話號碼,令來電未接聽前,即可得知來電者係為詐騙者或詐騙集團,使受話者能立即判斷而拒接,因而能完全阻絕與詐騙者或詐騙集團接觸而有受騙的機率發生。 1. Since the fraudulent comparison data of the present invention contains the telephone number of the fraudster or the fraudulent group, the caller is known as a fraudster or a fraud group before the call is answered, so that the callee can immediately judge and refuse In order to completely block the contact with the fraudster or the fraud group, the probability of being deceived occurs.
二、詐騙比對資料中更包含有詐騙者的聲紋及詐騙類別的關鍵語等資料,令來電時,可藉由談話內容的辨識即可得知是否為詐騙者或詐騙集團,進而警示受話者來電者可能是來自詐騙者或詐騙集團,使受話者有心理準備的情況下,而能做出適當的防備,因而可有效地避免民眾受到詐騙。 Second, the fraud comparison data contains more information such as the voiceprint of the scammer and the key words of the scam category. When the call is made, the identity of the conversation can be used to know whether it is a fraudster or a fraud group, and then alert the call. The caller may be from a scammer or a fraud group, so that the callee is mentally prepared and can make appropriate defenses, thus effectively preventing the public from being defrauded.
三、詐騙比對資料係可藉由無線上網的方式,隨時自雲端伺服器中下載更新最新的詐騙比對資料,令詐騙的辨識比對可更為精準,藉以降低民眾被詐騙的機率。 Third, the fraud comparison data can be downloaded from the cloud server at any time by means of wireless Internet access to update the latest fraud comparison data, so that the identification of fraud can be more accurate, in order to reduce the probability of people being defrauded.
四、隨時可提供最新的詐騙新聞、詐騙方式及詐騙的統計分析運算等資訊,令民眾防詐騙的能力與能詐騙集團日益精進的詐騙手段同步成長,而使詐騙集團的詐騙伎倆無所遁形。 Fourth, at any time, it can provide the latest information on fraudulent news, fraudulent methods and statistical analysis of fraud, so that the ability of people to prevent fraud and the fraudulent means of fraudulent groups can grow simultaneously, and the fraudulent tricks of fraud groups are invisible. .
(10)‧‧‧無線通訊模組 (10)‧‧‧Wireless communication module
(20)‧‧‧手機資料庫 (20) ‧‧‧Mobile database
(30)‧‧‧辨識模組 (30)‧‧‧ Identification Module
(40)‧‧‧雲端伺服器 (40) ‧‧‧Cloud Server
(41)‧‧‧雲端資料庫 (41) ‧‧‧Cloud Database
第一圖:係本發明之系統第一較佳實施例之示意圖。 First Figure: A schematic view of a first preferred embodiment of the system of the present invention.
第二圖:係本發明之系統第一較佳實施例中手機資料庫之示意圖。 Second: is a schematic diagram of a mobile phone database in a first preferred embodiment of the system of the present invention.
第三圖:係本發明之系統之第一較佳實施例之辨識方塊圖。 Third Figure: An identification block diagram of a first preferred embodiment of the system of the present invention.
第四圖:係本發明中有關來電號碼辨識預警系統之示意圖。 The fourth figure is a schematic diagram of the caller number identification early warning system in the present invention.
第五圖:係本發明中有關提款機偵測與斷話系統之示意圖。 Fig. 5 is a schematic view showing the system for detecting and disconnecting cash dispensers in the present invention.
第六圖:係本發明之系統之第二較佳實施例之示意圖。 Figure 6 is a schematic illustration of a second preferred embodiment of the system of the present invention.
第七圖:係本發明中提供新的詐騙方式與新聞等訊息之示意圖。 Figure 7: A schematic diagram of new fraudulent methods and news, etc., provided in the present invention.
第八圖:係本發明中有關詐騙個案分析報告之示意圖。 The eighth figure is a schematic diagram of the analysis report on fraud cases in the present invention.
第九圖:係本發明中有關詐編統計分析報告之示意圖。 The ninth diagram is a schematic diagram of the statistical analysis report on fraud in the present invention.
第十圖:係本發明中有關電信公司暨拍賣網站詐欺統計報告之示意圖。 The tenth figure is a schematic diagram of the statistical report on the fraud of the telecommunications company and the auction website in the present invention.
第十一圖:係本發明中有關詐欺電話號碼分類排名分析報告之示意圖。 Figure 11 is a schematic diagram of the analysis report on the classification of fraudulent telephone numbers in the present invention.
第十二圖:係本發明中有關通報檢舉之示意圖。 Twelfth Diagram: A schematic diagram of a notification report in the present invention.
第十三圖:係本發明中有關向服務機關詐騙檢詢之示意圖。 Thirteenth Diagram: A schematic diagram of a fraudulent inquiry to a service agency in the present invention.
第十四圖:係本發明之方法之第一較佳實施例之步驟流程圖之一。 Figure 14 is a flow chart showing the steps of the first preferred embodiment of the method of the present invention.
第十五圖:係本發明之方法之第一較佳實施例之步驟流程圖之二。 Figure 15 is a second flow chart of the first preferred embodiment of the method of the present invention.
第十六圖:係本發明之方法之第二較佳實施例之步驟流程圖。 Figure 16 is a flow chart showing the steps of a second preferred embodiment of the method of the present invention.
一無線通訊模組(10),係用來接收一來電訊息;而該來電訊 息中係包括來電號碼及談話內容,其中該談話內容係包括來電號碼、聲紋及詐騙類別之關鍵語等訊息。 a wireless communication module (10) for receiving an incoming call message; and the incoming call message The information includes the caller number and the content of the conversation, wherein the conversation includes messages such as the caller number, the voiceprint, and the key words of the fraud category.
一手機資料庫(20),其內儲存有多筆詐騙者之來電號碼、聲紋及詐騙類別之關鍵語等資料(如第二圖所示)。 A mobile phone database (20) stores information such as caller numbers, voiceprints, and key words of the fraud category (as shown in the second figure).
一辨識模組(30),其係利用該無線通訊模組(10)以無線上網(如WiFi)等方式至特定網站(如Android Market)下載一APP軟體並內建於其中,以令該辨識模組(30)可循該APP軟體的指令而具有辨識比對的功能,且該辨識模組(30)係電性連接於該無線通訊模組(10)及該手機資料庫(20)之間;以令來電時,該辨識模組(30)依可利用該APP軟體擷取來電訊息,再與該手機資料庫(20)中之資料行辨識比對;再者,該APP軟體中係建制有一關鍵字辨識與警告、一來電號碼辦識預警、一來電聲紋辦識比對、一提款機偵測與斷話、一提供詐騙方式與新聞、一詐騙統計分析報告及一線上警告或自動離線等辨識比對功能(如第六圖所示)。 An identification module (30), which uses the wireless communication module (10) to download an APP software to a specific website (such as Android Market) by means of wireless Internet access (such as WiFi) and built therein to make the identification The module (30) can have the function of identifying and matching according to the instruction of the APP software, and the identification module (30) is electrically connected to the wireless communication module (10) and the mobile phone database (20). In order to make an incoming call, the identification module (30) can use the APP software to retrieve the incoming call message, and then compare with the data line in the mobile phone database (20); in addition, the APP software is in the middle The system has a keyword identification and warning, a caller number for early warning, a caller voice comparison, a cash machine detection and disconnection, a fraud method and news, a fraud statistical analysis report and an online warning Or the automatic comparison and other identification functions (as shown in the sixth figure).
請參閱第三圖所示,本實施例於接獲來電時,該辨識模組(30)利用該APP軟體擷取來電訊息,並利用該來電號碼辦識預警功能先比對來電號碼是否與該手機資料庫(20)中內存詐騙者的電話號碼相同,若相符,該辨識模組(30)即會利用該APP軟體上的該來電號碼辦識預警功能發出辨識預警(如第四圖所示),告知民眾此來電號碼為列管號碼,是否要拒接此一來電;若不相符時,係讓智慧型手機保持通話狀態讓民眾可接聽來電;然而,當談話內容中出現詐騙類別之關鍵語時,該辨識模組(30)中該APP軟體中的該關鍵字辨識與警告功能係會顯示出辨識警告並自動斷話,若談話內容中無出現詐騙類別之關鍵語時,該智慧型手機則無任何警示訊息出現,且讓智慧型手機保持於通話正常的狀態下,而 不干擾來電的接聽;更甚者,該詐騙類別之關鍵語更包含銀行帳號、密碼或金額等,當該辨識模組(30)之該關鍵字辨識與警告功能於來電訊息中偵測到前述的關鍵語時,該APP軟體中之該提款機偵測與斷話功能,若偵測判斷該來電訊息的位置在ATM提款機附近(如第五圖所示),則會發出警告,告知此來電可能具有高度風險性並警告民眾不要匯款,或自動斷話不讓民眾繼續受騙;接下,該辨識模組(30)中之該來電聲紋辦識比對功能係會再辨識來電者的聲紋及來電的發話處;其中若該聲紋與該手機資料庫(20)中聲紋資料比對相符,該APP軟體則發出警告並且自動斷話,但當不相符時,則繼續接聽來電;再者,當偵測來電發話處不在本地端,該APP軟體係會發出警示更甚著自動斷話,防止民眾受騙;例如,該辨識模組(30)中的該APP軟體在擷取來電訊息,並行偵測及辨識後國碼或區域碼非本地的國碼或區域碼時,係會發出警示是否拒接、或自動斷話(如第四圖所示);惟當辨識來電的發話處在本地端,則不會干擾而維持正常的通話;再者,該APP軟體係可隨時提供並顯示新的詐騙方式與新聞、一詐騙統計分析報告等資訊給使智慧型手機使用者。 Referring to the third figure, in the embodiment, when the incoming call is received, the identification module (30) uses the APP software to retrieve the incoming call message, and uses the caller number to perform the early warning function to compare the caller number with the caller number. The phone scammer's phone number is the same in the mobile phone database (20). If the phone number is the same, the identification module (30) will use the caller number on the APP software to perform the early warning function to issue an identification warning (as shown in the fourth figure). ), tell the public that the caller number is the management number, whether to reject the call; if it does not match, let the smart phone keep the call state so that the public can answer the call; however, when the content of the scam is the key In the language, the keyword recognition and warning function in the APP software of the identification module (30) displays an identification warning and automatically breaks the message. If there is no key word in the scam category in the conversation content, the smart type There is no warning message on the mobile phone, and the smart phone is kept in the normal state of the call. It does not interfere with the answering of the incoming call; moreover, the key words of the fraud category further include the bank account number, password or amount, etc., when the keyword recognition and warning function of the identification module (30) detects the foregoing in the incoming call message. Key words, the ATM detection and disconnection function in the APP software, if the location of the incoming call message is detected and detected near the ATM (as shown in the fifth figure), a warning will be issued. Informing this call may be highly risky and warn people not to send money, or automatically disconnect the call to prevent the public from continuing to be deceived; next, the caller's voice recognition function in the identification module (30) will recognize the call again. The voiceprint of the person and the caller's call; if the voiceprint matches the voiceprint data in the mobile phone database (20), the APP software issues a warning and automatically breaks the call, but when it does not match, it continues Answering the call; in addition, when detecting that the caller is not at the local end, the APP soft system will issue a warning and even automatically disconnect the call to prevent the public from being deceived; for example, the APP software in the identification module (30) is 撷Take call message, parallel detection and identification When the country code or area code is not the local country code or area code, the system will issue a warning whether to reject or automatically disconnect (as shown in the fourth picture); but when the caller is identified at the local end, it will not Interfering with maintaining normal calls; in addition, the APP soft system can provide and display new fraudulent methods and news, a fraud statistics analysis report and other information to the smartphone users at any time.
如第六圖所示,係本發明一種智慧型手機之防詐騙系統之第二較佳實施例,本實施例係包括該無線通訊模組(10)、該手機資料庫(20)、該辨識模組(30)及一雲端伺服器(40),其中該無線通訊模組(10)、該手機資料庫(20)及該辨識模組(30)之作用及功效係與該第一較佳實施例相同而不再贅述;而且在本實施例中,係可利用該無線通訊模組(10)以無線上網(如WiFi)的方式與該雲端伺服器(40)連接,而該雲端伺服器(40)中包含有一雲端資料庫(41),而該雲端資料庫(41)中內存有一詐騙類別關鍵字庫資料、 一詐騙者來電號碼資料、一ATM位址資料、一詐騙者之聲紋資料、一地理資訊系統資料及一最新的詐騙新聞、案例及新方法暨統計報表資料等等;而該雲端資料庫(41)中的資料係可透過網路連接隨時做資料之更新,意即民眾使用智慧型手機即可隨時至該雲端資料庫(41)中下載最新詐騙資料,使民眾不會因資料過久未更新,而被新的詐騙者詐騙。 As shown in the sixth figure, a second preferred embodiment of the smart phone anti-fraud system of the present invention includes the wireless communication module (10), the mobile phone database (20), and the identification. The module (30) and a cloud server (40), wherein the wireless communication module (10), the mobile phone database (20) and the identification module (30) function and function are the first preferred The embodiment is the same and will not be described again; and in this embodiment, the wireless communication module (10) can be connected to the cloud server (40) by means of wireless Internet access (such as WiFi), and the cloud server (40) includes a cloud database (41), and the cloud database (41) has a fraud category keyword database, a scammer caller number information, an ATM address information, a scammer voiceprint data, a GIS information and a latest scam news, cases and new methods and statistical report data, etc.; and the cloud database ( The data in 41) can be updated at any time through the Internet connection, which means that the public can use the smart phone to download the latest fraud information from the cloud database (41) at any time, so that the public will not update the data for a long time. And being scammed by new scammers.
是以,在本實施例中,係可藉由該無線通訊模組(10)直接與該雲端伺服器(40)之該雲端資料庫(41)連接,並由該無線通訊模組(10)下載該雲端伺服器(40)中之該雲端資料庫(41)內的資料至該智慧型手機中,再由該辨識模組(30)中的該APP軟體擷取資料後進行辨識比對,而辨識比對的方式係與第一較佳實施例相同外,該雲端伺服器(40)中之該雲端資料庫(41)係可提供最新的詐騙方式與新聞(如第七圖所示)、及詐騙統計分析報告(如第八圖至第十一圖所示,係提供個案分析報告、統計分析報告、電信公司暨拍賣網站詐欺統計報告及詐欺電話號碼分類排名分析報告)等資料,供民眾可藉由該APP軟體顯示該等資訊,讓民眾瞭解詐騙集團不斷推陳出新的詐騙手段,並可培養及提高民眾防止受騙的意識,藉以降低民眾受騙的機率;再者,當本實施例於辨識時,若於談話內容中發現聲紋或來電號碼屬於不安全之訊息時,係會將此一訊息收納於一待分析之可疑案件資料庫(圖中未示)中,待日後再進一步透過網路連結交付相關單位進行分析鑑定,且同時該等不安全之訊息係會透過該APP軟體顯示,藉以告知民眾此訊息屬可疑的來電,應小心防範以免受騙。 Therefore, in this embodiment, the wireless communication module (10) can be directly connected to the cloud database (41) of the cloud server (40), and the wireless communication module (10) Downloading the data in the cloud database (41) in the cloud server (40) to the smart phone, and then extracting the data from the APP software in the identification module (30) for identification comparison. The method for identifying the comparison is the same as the first preferred embodiment, and the cloud database (41) in the cloud server (40) can provide the latest fraud mode and news (as shown in the seventh figure). And fraud statistics analysis report (as shown in the eighth to eleventh figures, providing case analysis reports, statistical analysis reports, telecommunication companies and auction website fraud statistics reports and fraudulent telephone number classification ranking analysis reports), etc. The public can display the information through the APP software, let the public understand the fraudulent group's continuous fraudulent means, and cultivate and improve the public's awareness of preventing deception, so as to reduce the probability of people being deceived. Moreover, when this embodiment is identified When found in the conversation When the voiceprint or caller number is an unsafe message, the message will be stored in a suspicious case database (not shown) to be analyzed, and then further submitted to the relevant unit for analysis and identification through the network link. At the same time, the unsafe messages will be displayed through the APP software to inform the public that the message is suspicious, and should be guarded against fraud.
再請參閱第六圖所示,該雲端伺服器(40)更包括一聲紋比對模組、一關鍵字比對模組、一詐騙統計分析模組、一提款機位置 比對模組、一案件暨新聞更新宣導模組、一資料推播更新模組及一發話地理資訊模組等;而當接獲來電且利用該無線通訊模組(10)與該雲端伺服器(40)無線上網連接時,該APP軟體係可選擇由該雲端伺服器(40)進行詐騙資料比對、或由該APP軟體內建的功能進行比對,惟由該APP軟體以內建的功能進行比對的方式已於上述內容中揭示而不再贅述;而當由該雲端伺服器(40)進行比對時,可藉由前述模組將來電訊息與該雲端資料庫(41)中的資料進行辨識比對,再由該無線通訊模組(10)回傳至該辨識模組(30)中,經該APP軟體擷取該辨識比對結果,再由該APP軟體中之該線上警告或自動離線功能提出警告或離線等運作;而該雲端資料庫(41)中係包含有一詐騙者的來電號碼資料、一詐騙者的聲紋資料、一詐騙類別之關鍵語資料、一ATM地址資料、一發話地理位置資料、一最新的詐騙新聞案例資料、一新方法暨統計報表資料及一電信業者及/或協力廠商自建資料庫,其中該電信業者及/或協力廠商自建資料庫中亦包含自建之詐騙者的來電號碼資料、詐騙者的聲紋資料、詐騙類別之關鍵語資料、ATM地址資料、發話地理位置資料、最新的詐騙新聞案例資料、新方法暨統計報表資料等等;故藉由該無線通訊模組(10)可下載該雲端資料庫(41)中的資料外,該無線通訊模組(10)亦可下載該雲端資料庫(41)中電信業者及/或協力廠商自建資料庫內的資料至該智慧型手機中。 Referring to the sixth figure, the cloud server (40) further includes a voiceprint comparison module, a keyword comparison module, a fraud statistical analysis module, and a cash dispenser position. Comparing module, a case and news update promotion module, a data push update module, and a call geographic information module; and receiving an incoming call and utilizing the wireless communication module (10) and the cloud servo (40) When the wireless network is connected, the APP soft system may select the fraudulent data comparison by the cloud server (40) or compare the functions built by the APP software, but the APP software is built in. The manner in which the functions are compared is disclosed in the above content and will not be described again; when the comparison is performed by the cloud server (40), the incoming call message and the cloud database (41) can be used by the foregoing module. The data in the identification is compared, and then the wireless communication module (10) is transmitted back to the identification module (30), and the identification result is obtained by the APP software, and then the application is in the APP software. The online warning or automatic offline function provides warning or offline operation; and the cloud database (41) contains a scammer's caller number data, a scammer's voiceprint data, a scam category key words, an ATM Address information, a geographical location, a latest fraud News case information, a new method and statistical report data, and a self-built database of telecom operators and/or third-party manufacturers. The telecom operator and/or third-party self-built database also contains the caller number information of the self-built fraudster. , the voice data of the fraudster, the key words of the fraud category, the ATM address data, the geographic location information, the latest fraud news case data, the new method and the statistical report data, etc.; therefore, the wireless communication module (10) The data in the cloud database (41) can be downloaded, and the wireless communication module (10) can also download the data in the self-built database of the carrier and/or the third-party database in the cloud database (41). In the smart phone.
請參閱第十二圖及第十三圖所示,當該APP軟體對來電訊息發出或顯示警示、或拒接、或自動斷話後,該APP軟體係可向司法機關通報檢舉外,對可疑的來電亦可透過該APP軟體向相關的服務機關查詢。 Please refer to the twelfth and thirteenth pictures. When the APP software issues or displays a warning, or rejects, or automatically disconnects the incoming call message, the APP soft system can notify the judicial authority of the report and is suspicious. Calls can also be queried to the relevant service agencies through the APP software.
請參閱第十四圖所示,係本發明一較佳實施例之方法之步驟 流程圖,如圖所示,本發明一種智慧型手機之防詐騙方法之第一較佳實施例,其至少包括下列步驟:a、接獲來電;b、擷取來電訊息;c、辨識來電號碼;d、辨識詐騙類別之關鍵語;e、辨識來電者的聲紋;以及f、辨識來電的發話處。 Please refer to FIG. 14 for the steps of the method of a preferred embodiment of the present invention. Flowchart, as shown in the figure, a first preferred embodiment of the smart phone anti-fraud method of the present invention includes at least the following steps: a, receiving an incoming call; b, capturing a call message; c, identifying the caller number ;d, identify the key words of the fraud category; e, identify the caller's voiceprint; and f, identify the caller's call.
其中在該步驟b及該步驟c中,該辨識模組(30)係於通話前或後,擷取來電訊息,並先比對來電號碼是否與該手機資料庫(20)中內存詐騙集團的電話號碼相同,若相符,該辨識模組(30)即會發出辨識預警,告知民眾應拒接電話,若不相符時,係讓智慧型手機保持通話狀態讓民眾可接聽來電。 In the step b and the step c, the identification module (30) is used to capture the incoming call message before or after the call, and first compares whether the incoming call number is related to the memory fraud group in the mobile phone database (20). If the phone number is the same, if the match is made, the identification module (30) will issue an identification warning to inform the public that the call should be rejected. If it does not match, the smart phone is kept in a call state so that the public can answer the call.
而在該步驟d中,若談話內容中出現詐騙類別之關鍵語時,該辨識模組(30)係會發出辨識警告並自動斷話,若談話內容中無出現詐騙類別之關鍵語時,該智慧型手機則無任何警示訊息出現,且讓智慧型手機保持於通話正常的狀態下,而不干擾來電的接聽;再者,該詐騙類別之關鍵語更包含銀行帳號、密碼或金額等,當該辨識模組(30)於來電的訊息中辨識到前述的關鍵語時,則會被判定民眾在ATM提款機附近,則會發出警示,告知此來電是詐騙電話不要匯款,或自動斷話不讓民眾匯款受騙。 In the step d, if the key words of the fraud category appear in the conversation content, the identification module (30) issues an identification warning and automatically breaks the message. If there is no key word in the conversation category, the The smart phone does not have any warning message, and the smart phone is kept in the normal state of the call without disturbing the incoming call; in addition, the key words of the fraud category include the bank account number, password or amount, etc. When the identification module (30) recognizes the key words in the incoming call message, it will be determined that the public is near the ATM, and a warning will be sent to inform the call that the call is not to send money, or to automatically disconnect. Do not let people remit money to be deceived.
又在該步驟e及該步驟f中,該辨識模組(30)係會再辨識來電者的聲紋及來電的發話處;其中若該聲紋與該手機資料庫(20)中聲紋資料比對相符,則發出警告並且自動斷話,但當不相符時,則可繼續通話;再者,當偵測來電發話處不在本地端,該辨識模 組(30)係會發出警示更甚著自動斷話,防止民眾受騙;例如國碼或區域碼非本地的國碼或區域碼時,該辨識模組(30)則在偵測及辨識下發出警示或自動斷話;惟當辨識來電的發話處在本地端,則不會干擾而維持正常的通話。 In the step e and the step f, the identification module (30) further recognizes the caller's voiceprint and the caller's call; wherein the voiceprint and the voiceprint data in the mobile phone database (20) If the comparison matches, the warning will be issued and the call will be automatically disconnected, but when it does not match, the call can be continued; in addition, when the caller is detected not at the local end, the identification mode The group (30) will issue a warning to even more automatic disconnection to prevent people from being deceived; for example, when the country code or area code is not a local country code or area code, the identification module (30) is issued under detection and identification. Warning or automatic disconnection; only when the caller's call is recognized at the local end, it will not interfere and maintain a normal call.
又如第十五圖所示,於該步驟c、d、e及f中,若遇有不安全的訊息時,該步驟c、d、e及f之後各包括一步驟c-1、一步驟d-1、一步驟e-1及一步驟f-1,且該步驟c-1、該步驟d-1、該步驟e-1及該步驟f-1係為向司法機關通報檢舉外,亦對可疑的來電向相關的服務機關查詢。 As shown in the fifteenth figure, in the steps c, d, e, and f, if there is an unsafe message, the steps c, d, e, and f each include a step c-1, a step D-1, a step e-1 and a step f-1, and the step c-1, the step d-1, the step e-1 and the step f-1 are for reporting to the judicial authority, Inquire about the suspicious incoming call to the relevant service agency.
請參閱第十六圖所示,係本發明一種智慧型手機之防詐騙方法之第二較佳實施例,其至少包括下列步驟:g、接獲來電;h、擷取來電訊息;i、連接該雲端伺服器(40)j、辨識來電號碼;k、辨識詐騙類別之關鍵語;l、辨識來電者的聲紋;以及m、辨識來電的發話處。 Referring to FIG. 16 , a second preferred embodiment of the smart phone anti-fraud method of the present invention includes at least the following steps: g, receiving an incoming call; h, capturing a call message; i, connecting The cloud server (40) j, identifying the caller number; k, identifying the key words of the fraud category; l, identifying the caller's voiceprint; and m, identifying the caller's call.
在本實施例,該步驟j、k、l及m中所述的方法係與第一較佳實施例的步驟方法同,惟其差異之處在於:該步驟j、k、l及m辨識比對的資料係為該雲端伺服器(40)之雲端資料庫(41)中預存詐騙者的來電號碼、聲紋及詐騙類別之關鍵語等資料,惟辨識方法均相同,且當遇有不安全的訊息時,亦相同會發出警示或使智慧型手機自動斷線,故不贅述;再者,於該步驟i與該雲端伺服器(40)連接時,係可藉由該無線通訊模組(10)將該雲端伺服器(40) 中最新的詐騙新聞、案件及新方法暨統計報表等資料,下載傳送回手機中供民眾讀取,藉以讓民眾瞭解詐騙集團不斷推陳出新的詐騙手段,進而培養及提高民眾防止受騙的意識,期降低民眾受騙的機率。 In this embodiment, the methods described in the steps j, k, l, and m are the same as the steps of the first preferred embodiment, except that the steps j, k, l, and m are compared. The data is the key words of the caller number, voiceprint and fraud category pre-stored in the cloud database (41) of the cloud server (40), but the identification methods are the same, and when there is unsafe In the case of a message, the same will be issued or the smart phone will be automatically disconnected, so it will not be described; in addition, when the step i is connected to the cloud server (40), the wireless communication module (10) can be used. ) the cloud server (40) The latest scam news, cases, new methods and statistical reports, etc., are downloaded and sent back to the mobile phone for the public to read, so that the public can understand the fraudulent group's continuous fraudulent means, and then cultivate and improve the public's awareness of preventing deception, and reduce it. The probability of people being cheated.
惟,以上所述者,僅為本發明之較佳實施例而已,並非用以侷限本發明之技術特徵,舉凡利用本發明相關之技術手段、創設原理之再發明,仍屬本發明的發明範疇,因此本發明圖式及說明書所述之陳並非用以限定本發明之範圍,任何熟習此技藝者,在不脫離本發明之精神與範圍下所作之均等變化與修飾,皆應涵蓋於本發明之申請專利範圍,方為合理。 However, the above description is only a preferred embodiment of the present invention, and is not intended to limit the technical features of the present invention. It is still within the scope of the invention to utilize the technical means and the reinvention of the inventive principle. Therefore, the present invention is not intended to limit the scope of the present invention, and any equivalent changes and modifications may be made without departing from the spirit and scope of the invention. It is reasonable to apply for a patent.
(10)‧‧‧無線通訊模組 (10)‧‧‧Wireless communication module
(20)‧‧‧手機資料庫 (20) ‧‧‧Mobile database
(30)‧‧‧辨識模組 (30)‧‧‧ Identification Module
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW101106438A TWI507009B (en) | 2012-02-24 | 2012-02-24 | System and method of smartphone for preventing fraud |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW101106438A TWI507009B (en) | 2012-02-24 | 2012-02-24 | System and method of smartphone for preventing fraud |
Publications (2)
Publication Number | Publication Date |
---|---|
TW201336289A TW201336289A (en) | 2013-09-01 |
TWI507009B true TWI507009B (en) | 2015-11-01 |
Family
ID=49627528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW101106438A TWI507009B (en) | 2012-02-24 | 2012-02-24 | System and method of smartphone for preventing fraud |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI507009B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9900431B1 (en) | 2017-08-04 | 2018-02-20 | At&T Intellectual Property I, L.P. | Communications handler for screening incoming calls |
TWI665617B (en) * | 2018-12-03 | 2019-07-11 | 慕尼黑點子數位行銷有限公司 | Online reporting method and system |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104010065A (en) * | 2014-04-30 | 2014-08-27 | 小米科技有限责任公司 | Telephone processing method and device |
CN104602242A (en) * | 2015-01-22 | 2015-05-06 | 北京瑞思明科技有限公司 | Method and device for preventing voice phishing |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200704133A (en) * | 2005-03-31 | 2007-01-16 | Qualcomm Inc | Location-based emergency announcements |
TW200726192A (en) * | 2005-12-30 | 2007-07-01 | E Ten Information Sys Co Ltd | Communication device and server with telephone disturbance-proof functions and method thereof |
TWM331255U (en) * | 2007-08-02 | 2008-04-21 | ju-chang Zhuo | Display unit of calling telephone number |
TW200919359A (en) * | 2007-10-25 | 2009-05-01 | Mach Intelligence Technology Consulting Co Ltd | A network system and method for preventing and punishing fraud criminal on phone |
TW201203996A (en) * | 2010-07-12 | 2012-01-16 | Sheng-Feng Cheng | Communication device caller ID determination module and method using network searching means |
-
2012
- 2012-02-24 TW TW101106438A patent/TWI507009B/en active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW200704133A (en) * | 2005-03-31 | 2007-01-16 | Qualcomm Inc | Location-based emergency announcements |
TW200726192A (en) * | 2005-12-30 | 2007-07-01 | E Ten Information Sys Co Ltd | Communication device and server with telephone disturbance-proof functions and method thereof |
TWM331255U (en) * | 2007-08-02 | 2008-04-21 | ju-chang Zhuo | Display unit of calling telephone number |
TW200919359A (en) * | 2007-10-25 | 2009-05-01 | Mach Intelligence Technology Consulting Co Ltd | A network system and method for preventing and punishing fraud criminal on phone |
TW201203996A (en) * | 2010-07-12 | 2012-01-16 | Sheng-Feng Cheng | Communication device caller ID determination module and method using network searching means |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9900431B1 (en) | 2017-08-04 | 2018-02-20 | At&T Intellectual Property I, L.P. | Communications handler for screening incoming calls |
US10165115B1 (en) | 2017-08-04 | 2018-12-25 | At&T Intellectual Property I, L.P. | Communications handler for screening incoming calls |
TWI665617B (en) * | 2018-12-03 | 2019-07-11 | 慕尼黑點子數位行銷有限公司 | Online reporting method and system |
Also Published As
Publication number | Publication date |
---|---|
TW201336289A (en) | 2013-09-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104349324B (en) | Mobile terminal number intelligent protection system and method | |
US10447838B2 (en) | Telephone fraud management system and method | |
US20120287823A1 (en) | Verification method and system for screening internet caller id spoofs and malicious phone calls | |
US7895154B2 (en) | Communication reputation | |
CN103415004B (en) | A kind of method and device detecting junk short message | |
KR101431596B1 (en) | Apparatus and method for preventing voice phishing and user terminal for the same | |
TWI507009B (en) | System and method of smartphone for preventing fraud | |
WO2017035945A1 (en) | Method, device and system for marking conversation caller | |
CN108259680A (en) | Fraudulent call recognition methods, device and the server for identifying fraudulent call | |
KR101306074B1 (en) | Method and system to prevent phishing | |
CN102752406A (en) | Risk number abnormality recognition system and method | |
CN105228156B (en) | A kind of method for processing communication messages, apparatus and system | |
CN104869264A (en) | Method of monitoring swindle telephone and joining telephone conference and device of monitoring swindle telephone and joining telephone conference | |
KR101033870B1 (en) | Method and device for processing spam call | |
CN104754583A (en) | Electronic device having cheat-proof caller identification function and method therefor | |
KR101793958B1 (en) | Method for Preventing Voice Phishing by using Qualified Caller Information | |
CN115396900A (en) | Telecommunication early warning monitoring system based on big data | |
CN114641003A (en) | Fraud prevention system and method | |
KR101478835B1 (en) | The system to prevent voice phishing and its method | |
TWM448095U (en) | Anti-fraud device for smart phone | |
CN108834149B (en) | Processing method, processing equipment and system | |
KR101583253B1 (en) | Subscriber service system and method using smart-phone Application | |
KR102156905B1 (en) | method for verifying user of messenger account for preventing messenger phishing | |
KR102128601B1 (en) | method for precaution financial fraud | |
CN202696666U (en) | Abnormity recognition system for risk numbers |