WO2022059172A1 - Chatting switching program, chatting processing program, information processing device, and chatting switching method - Google Patents

Chatting switching program, chatting processing program, information processing device, and chatting switching method Download PDF

Info

Publication number
WO2022059172A1
WO2022059172A1 PCT/JP2020/035493 JP2020035493W WO2022059172A1 WO 2022059172 A1 WO2022059172 A1 WO 2022059172A1 JP 2020035493 W JP2020035493 W JP 2020035493W WO 2022059172 A1 WO2022059172 A1 WO 2022059172A1
Authority
WO
WIPO (PCT)
Prior art keywords
transfer
procedure
avatar
conversation
chatbot
Prior art date
Application number
PCT/JP2020/035493
Other languages
French (fr)
Japanese (ja)
Inventor
賢二郎 西田
Original Assignee
富士通株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 富士通株式会社 filed Critical 富士通株式会社
Priority to JP2022550294A priority Critical patent/JPWO2022059172A1/ja
Priority to PCT/JP2020/035493 priority patent/WO2022059172A1/en
Publication of WO2022059172A1 publication Critical patent/WO2022059172A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance

Definitions

  • the present invention relates to a chat switching program, a chat processing program, an information processing device, and a chat switching method.
  • FIG. 13A is explanatory views showing an example of a Web transfer image.
  • the smartphone terminal of the transfer procedure person inputs the customer number in the customer number input field of the login screen on the Web screen, detects the PW input in the password input field, and then detects the login button operation (step S201). Notify the banking system of the login request.
  • the bank system presents a transfer destination input screen for inputting transfer destination information, for example, a bank name, a store number, an account number, a transfer amount, and the like (step S202).
  • transfer destination information for example, a bank name, a store number, an account number, a transfer amount, and the like.
  • the smartphone terminal After detecting the input of the bank name, store number, account number and transfer amount on the transfer destination input screen, the smartphone terminal notifies the bank system of the transfer destination information according to the button operation of the confirmation button (step S202A).
  • step S203 when the transfer destination information from the smartphone terminal is detected, it is determined whether or not the content of the transfer destination information is normal (step S203).
  • the bank system When the contents of the transfer destination information are normal, the bank system notifies the smartphone terminal of the transfer destination confirmation screen. In addition, the banking system notifies the smartphone terminal of an error message screen when the content of the transfer destination information is abnormal.
  • the smartphone terminal when the smartphone terminal confirms the contents of the transfer destination confirmation screen and then detects the button operation of the execute button on the transfer destination confirmation screen (step S204), the smartphone terminal notifies the bank system of the transfer request.
  • the bank system When the bank system receives the transfer request, it notifies the smartphone terminal of the customer authentication screen of the smartphone terminal.
  • the smartphone terminal detects the input operation of the transfer PW in the transfer password input field on the authentication screen (step S205), the smartphone terminal notifies the bank system of the transfer PW.
  • the bank system When the bank system receives the transfer PW from the smartphone terminal, the bank system executes customer authentication of the smartphone terminal by the transfer PW. Then, when the customer authentication of the smartphone terminal is completed, the bank system executes the transfer procedure based on the transfer destination information. Then, after the transfer procedure is completed, the banking system presents a transfer confirmation screen indicating the completion of the transfer to the smartphone terminal (step S206).
  • the transfer procedure person of the smartphone terminal can perform the transfer procedure by remote control without going to the bank store, etc., so that the work load of the window required for the transfer and the burden of the transfer procedure person can be reduced.
  • One aspect is to provide a chat switching program, etc. that can alert the procedure person to the possibility of fraudulent procedures.
  • the chat switching program on one side causes the computer to execute a process of accepting an instruction to start a conversation regarding the procedure between the first avatar and the associated chatbot. Further, the computer is made to execute a process of analyzing the possibility of fraud against the procedure based on the content received as a conversation with the chatbot or the timing of the reception. Further, when it is determined that there is a possibility of fraudulent activity against the procedure, the conversation with the chatbot associated with the first avatar is associated with the second avatar different from the first avatar. Have the computer perform a process to switch to a conversation with a chatbot or a conversation in a manned chat.
  • the possibility of fraud in the procedure can be aroused to the procedure person.
  • FIG. 1 is an explanatory diagram showing an example of a transfer chat system of this embodiment.
  • FIG. 2 is a block diagram showing an example of a server device.
  • FIG. 3 is an explanatory diagram showing an example of a fraudulent possibility DB.
  • FIG. 4 is an explanatory diagram showing an example of the message DB.
  • FIG. 5 is a flowchart showing an example of the processing operation of the server device related to the transfer chat processing.
  • FIG. 6 is an explanatory diagram showing an example of a chat transfer image in a normal state.
  • FIG. 7A is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • FIG. 7B is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • FIG. 7A is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • FIG. 7B is an explanatory diagram showing an example of a chat transfer
  • FIG. 8A is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • FIG. 8B is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • FIG. 9A is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • FIG. 9B is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • FIG. 10A is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • FIG. 10B is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • FIG. 10A is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • FIG. 10B is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • FIG. 11 is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (tool abuse).
  • FIG. 12 is an explanatory diagram showing an example of an information processing device that executes a chat switching program.
  • FIG. 13A is an explanatory diagram showing an example of a Web transfer image.
  • FIG. 13B is an explanatory diagram showing an example of a Web transfer image.
  • FIG. 1 is an explanatory diagram showing an example of the transfer chat system 1 of this embodiment.
  • the transfer chat system 1 shown in FIG. 1 includes a terminal device 2 of a transfer procedure person who is a customer, a server device 3, a bank system 4, and a network 5.
  • the terminal device 2 is a terminal device for a transfer procedure person such as a smartphone terminal, a tablet terminal, or a personal computer, which controls wired communication or wireless communication with the network 5.
  • the server device 3 is, for example, an information processing device that controls the entire bank transfer chat system 1.
  • the bank system 4 is a system on the bank side provided with a DB or the like that manages customer information of the bank. It is a communication network such as the Internet that connects the terminal device 2 and the server device 3 by communication.
  • the customer name that identifies the transfer procedure person who is the customer, the customer's account number, the customer's customer number, the customer's login PW, the MAC number of the operation terminal used by the customer at the time of transfer, the account balance, etc.
  • Manage customer information by associating the answers to additional questions.
  • the answer to the additional question is information for verifying the identity of the pet, such as the name of the pet that the customer has for the first time.
  • FIG. 2 is a block diagram showing an example of the server device 3.
  • the server device 3 shown in FIG. 2 has a communication device 11, a storage device 12, and a processor 13.
  • the communication device 11 is a device that controls communication with the network 5.
  • the storage device 12 is a device that stores various types of information.
  • the processor 13 controls the entire server device 3.
  • the storage device 12 has a rogue possibility DB 21 and a message DB 22.
  • the fraudulent possibility DB 21 is a DB that manages information for determining the fraudulent possibility of the transfer procedure according to the content used for the anomaly analysis.
  • the message DB 22 is a DB that manages the content of the message that calls attention or restraint to the transfer procedure person according to the result of the anomaly analysis.
  • the processor 13 reads a program stored in the storage device 12, and executes a process as a function based on the read program.
  • the processor 13 has a chatbot 31, a reception unit 32, an analysis unit 33, a switching unit 34, a display control unit 35, and a recording unit 36 as functions.
  • the chatbot 31 is an AI (Artificial Intelligence) chatbot that supports a customer's transfer procedure in a conversational manner with the terminal device 2.
  • the chatbot 31 has a first avatar 31A (see FIG. 8A) that appears at a normal timing and a second avatar 31B (see FIG. 8B) that appears at the timing of alerting.
  • the reception unit 32 receives an instruction to start a conversation regarding the transfer procedure between the first avatar 31A and the chatbot associated with the first avatar 31A.
  • the analysis unit 33 analyzes the possibility of fraudulent transfer procedure based on the content received as a conversation with the chatbot or the timing of reception.
  • the analysis unit 33 accesses the DB in the banking system 4 and collects customer information.
  • the analysis unit 33 refers to the customer information and the fraudulent possibility DB 21 and analyzes the fraudulent possibility of the transfer procedure.
  • the switching unit 34 determines that the transfer procedure may be fraudulent, the switching unit 34 switches from the first avatar 31A to the second avatar 31B and continues the conversation with the chatbot in association with the second avatar 31B. .. Further, when the switching unit 34 determines that the transfer procedure may be fraudulent, the switching unit 34 switches from the first avatar 31A to a conversation in a manned chat.
  • the display control unit 35 can distinguish between a conversation with a chatbot associated with the second avatar 31B or a conversation in a manned chat and a conversation with the chatbot associated with the first avatar 31A. It is controlled to be displayed on the display unit of the device 2 (see FIG. 9A).
  • the recording unit 36 receives a reply that the meta information may be generated in response to the inquiry information, the recording unit 36 generates the meta information and records the generated meta information. For example, as shown in FIG. 9B, when the recording unit 36 receives an answer of "yes" to the message "Is it okay to leave the information in the financial institution / police agency?", The transfer procedure is performed. Record the log as meta information in the DB of the financial institution or the National police Agency.
  • the recording unit 36 may store the transfer procedure log in the storage device 12 as meta information.
  • FIG. 3 is an explanatory diagram showing an example of the possibility of fraud DB21.
  • the fraudulent possibility DB 21 shown in FIG. 3 is a DB that manages fraudulent possibility information for detecting the fraudulent possibility of the transfer procedure from the input contents of the other party by the chatbot 31.
  • the fraud possibility information is information that manages the classification, the content, and the detailed content in association with each other.
  • the fraudulent possibility information includes fraudulent possibility information focusing on the state of the transfer procedure person, fraud possibility information focusing on the operation of the transfer procedure, and fraud possibility information focusing on the operation of the chatbot 31. ..
  • the information on the possibility of fraud focusing on the state of the transfer procedure person is the personal information of the transfer procedure person himself / herself.
  • the personal information of the transfer procedure person has the age and the account balance.
  • the analysis unit 33 pays attention to the age of the personal information, and calls attention to the possibility of fraudulent transfer procedure, for example, when the age group of the transfer procedure person is over 70s.
  • the analysis unit 33 pays attention to the account balance of the personal information and calls attention to the possibility of fraudulent transfer procedure when the account balance of the transfer procedure person himself / herself is high.
  • the fraudulent possibility information focusing on the operation of the transfer procedure includes the personal information of the transfer procedure person, the other party information of the transfer destination, the quality information, and the quantity information.
  • the self-information includes an IP address, a terminal information, and a location information.
  • the analysis unit 33 pays attention to the IP address of the transfer procedure person and calls attention to the possibility of fraudulent transfer procedure when the transfer operation is detected from a PC different from the usual one.
  • the analysis unit 33 pays attention to the terminal information of the transfer procedure person himself and calls attention to the possibility of fraudulent transfer procedure when the transfer operation is detected from the terminal device 2 different from the usual one.
  • the analysis unit 33 pays attention to the location information of the transfer procedure person himself and calls attention to the possibility of fraudulent transfer procedure when the transfer operation is detected from a place different from the normal living area.
  • the transfer destination information includes the transfer destination, the nationality of the account, the suspicious account, and the new transfer destination.
  • the analysis unit 33 pays attention to the transfer destination and detects the transfer request to the account in the caution list, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedure.
  • the analysis unit 33 calls attention to the possibility of fraudulent transfer procedures when it detects a transfer request to an overseas account by focusing on the nationality of the account.
  • the analysis unit 33 pays attention to the suspicious account and detects the transfer request to the dormant account
  • the analysis unit 33 calls attention to the possibility of fraudulent transfer procedure.
  • the analysis unit 33 pays attention to the new transfer destination and detects the transfer request to the new transfer destination, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedure.
  • Quality information includes suddenness, regulations / rules, and elderly people.
  • the analysis unit 33 calls attention to the possibility of fraudulent transfer procedures when it detects a sudden transfer request to the first transfer destination, paying attention to the suddenness.
  • the analysis unit 33 pays attention to the regulation / rule and calls attention to the possibility of fraudulent transfer procedure when the transfer amount is limited and the transfer request is detected.
  • the analysis unit 33 calls attention to the possibility of fraudulent transfer procedures when the elderly person pays attention to the transfer request and detects the transfer request.
  • the quantity information includes frequency, amount, and number of times.
  • the analysis unit 33 pays attention to the frequency and calls attention to the possibility of fraudulent transfer procedures when it detects multiple transfer requests to the same account within the same month.
  • the analysis unit 33 calls attention to the possibility of fraudulent transfer procedures when a transfer request for a large transfer amount is detected by paying attention to the amount.
  • the analysis unit 33 calls attention to the possibility of fraudulent transfer procedures when it detects a transfer request to a plurality of accounts in one day by paying attention to the number of times.
  • Abnormal information focusing on the operation of the chatbot 31 includes time information, input information, and question information. There are short time information, slow time information, and constant time information.
  • the analysis unit 33 pays attention to the shortness and detects various inputs of the transfer whose operation time is too short as compared with the normal operation, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedure.
  • the analysis unit 33 pays attention to the slowness and detects various inputs of the transfer whose operation time is too late as compared with the normal operation, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedure.
  • the analysis unit 33 pays attention to a certain amount and calls attention to the possibility of fraud in the transfer procedure when the operation time of each of the various input of the transfer is fixed and the transfer input is detected.
  • the input information includes the number of erroneous inputs and the number of corrections.
  • the analysis unit 33 pays attention to the number of erroneous inputs and detects a transfer request with many erroneous inputs, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedure.
  • the analysis unit 33 pays attention to the number of corrections and detects a transfer request having a large number of corrections, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedures.
  • the question information includes the number and the content of the question.
  • the analysis unit 33 pays attention to the number and detects the transfer request containing the inquiry of personal information, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedure.
  • the analysis unit 33 calls attention to the possibility of fraudulent transfer procedures when it detects a transfer request with a Japanese error by paying attention to the content of the question.
  • the analysis unit 33 refers to the fraudulent possibility DB 21 shown in FIG. 3 and identifies, for example, a transfer fraud targeting the elderly, an ID / PW misuse act, a cyber attack, etc. as the fraudulent possibility of the transfer procedure.
  • FIG. 4 is an explanatory diagram showing an example of the message DB 22.
  • the message DB 22 shown in FIG. 4 is a DB that manages a message addressed to a transfer procedure person indicating the content of the message after determining the possibility of fraud.
  • the content of the message includes a message for an additional question to the transfer procedure person, a message for notifying the transfer procedure person, a message for preventing the execution by the tool, and a message for restraining the malicious transfer procedure person.
  • Additional question messages include, for example, "Please select the transfer purpose", “Who told me to transfer?”, "Enter your child's name”, “Transfer destination”. Do you want to check your account information? ",” What is the name of your pet for the first time? “, Etc.
  • Messages that give notice to the transfer procedure person are, for example, "This transaction is suspected of being a transfer fraud.”, "The transfer destination account is an account that has not been used for more than ⁇ years.”, "The transfer destination account. The account is a message that calls attention such as "The account is an account on the caution list in financial transactions.” And "The transfer destination account is an overseas account.”
  • Messages that restrain malicious transfer procedures include, for example, "I will contact my family”, “I'm sorry from the side”, “I will cooperate with manned chat", “Financial institution / National police Agency” It is a message such as “I will leave the information in.” Or “I will shoot a video when the transfer is executed.”
  • the chatbot 31 Based on the analysis result of the anomaly of the analysis unit 33, the chatbot 31 extracts a message corresponding to the transfer fraud from the message DB 22 and extracts the extracted message as a possibility of fraud in the transfer procedure, for example, in the case of a transfer fraud targeting the elderly. Presented to the terminal device 2.
  • the chatbot 31 Based on the analysis result of the anomaly of the analysis unit 33, the chatbot 31 extracts from the message DB 22 a message corresponding to the misuse of the ID / PW, for example, in the case of the misuse of the ID / PW, as the possibility of fraudulent transfer procedure.
  • the extracted message is presented to the terminal device 2.
  • the chatbot 31 Based on the analysis result of the anomaly of the analysis unit 33, the chatbot 31 extracts a message corresponding to the cyber attack from the message DB 22 as a possibility of fraudulent transfer procedure, for example, in the case of a cyber attack, and transfers the extracted message to the terminal device 2.
  • a message corresponding to the cyber attack from the message DB 22 as a possibility of fraudulent transfer procedure, for example, in the case of a cyber attack, and transfers the extracted message to the terminal device 2.
  • FIG. 5 is a flowchart showing an example of the processing operation of the server device 3 related to the transfer chat processing.
  • the server device 3 determines whether or not a conversation start instruction with the first avatar 31A has been received from the terminal device 2 of the transfer procedure person (step S11).
  • the first avatar 31A is a character that supports the transfer procedure for the transfer procedure person.
  • step S11: Yes When the server device 3 receives the conversation start instruction with the first avatar 31A from the terminal device 2 (step S11: Yes), whether or not the server device 3 has detected the input content of the transfer procedure person for the conversation content of the first avatar 31A. (Step S12).
  • the server device 3 When the server device 3 detects the input content from the terminal device 2 (step S12: Yes), the server device 3 specifies the input content (step S13). When the server device 3 specifies the input content, the server device 3 refers to the fraudulent possibility DB 21 and anomaly analyzes the input content (step S14). The server device 3 determines whether or not the possibility of fraud in the transfer procedure has been detected based on the result of the anomaly analysis of the input contents (step S15). When the server device 3 detects the possibility of fraud (step S15: Yes), the server device 3 identifies the content of the possibility of fraud (step S16).
  • the contents of the possibility of fraud include, for example, transfer fraud targeting the elderly, fraudulent use of ID / PW, cyber attacks, and the like.
  • the server device 3 extracts a message according to the content of the identified fraudulent possibility from the message DB 22 (step S17), and chat-outputs the extracted message to the terminal device 2 of the transfer procedure person (step S18).
  • the transfer procedure person of the terminal device 2 can recognize the possibility of fraudulent transfer procedure by looking at the message. If the transfer procedure person is a well-meaning transfer procedure person, the transfer procedure person can be alerted. In addition, if the transfer procedure person is a malicious transfer procedure person, it is possible to check the transfer procedure person for fraudulent transfer procedures.
  • the server device 3 After chatting out a message to the terminal device 2, the server device 3 determines whether or not the response content corresponding to the message is detected from the terminal device 2 (step S19). When the server device 3 detects the response content from the terminal device 2 (step S19: Yes), the server device 3 specifies the response content (step S20).
  • the server device 3 refers to the fraudulent possibility DB 21 and anomaly analyzes the answer content (step S21). The server device 3 determines whether or not the possibility of fraud has been detected based on the anomaly analysis result of the answer content (step S22).
  • step S22 the server device 3 checks against the transfer procedure person of the terminal device 2 from the chat of the first avatar 31A to the manned chat or the second avatar 31B. Switch to chat (step S23). As a result, the transfer procedure person of the terminal device 2 can recognize the possibility of further fraudulent transfer procedure by switching to the manned chat or the second avatar 31B. If the transfer procedure person is a well-meaning transfer procedure person, further attention can be drawn. In addition, if the transfer procedure person is a malicious transfer procedure person, it is possible to further restrain the transfer procedure person.
  • the server device 3 executes a conversation with the transfer procedure person after switching to a manned chat or a chat of the second avatar 31B.
  • the transfer procedure person can call attention to the possibility of fraudulent transfer procedure.
  • the server device 3 executes a conversation with the transfer procedure person, and when it is determined that the transfer procedure of the transfer procedure person is normal, the server device 3 starts personal authentication from the terminal device 2 (step S24), and the process shown in FIG. End the operation.
  • step S22 when the server device 3 does not detect the possibility of fraud (step S22: No), it is determined that the transfer procedure of the transfer procedure person is normal, and the personal authentication from the terminal device 2 is started in step S24. Transition.
  • step S15 determines whether or not all the designated inputs have been completed (step S25). All designated inputs are, for example, inputs related to the transfer procedure such as the customer number, PW, the store number of the transfer destination, the account number of the transfer destination, and the transfer amount.
  • step S25: Yes the server device 3 determines that the transfer procedure of the transfer procedure person is normal, and proceeds to step S24 in order to start personal authentication from the terminal device 2.
  • step S12 the server device 3 proceeds to step S12 in order to determine whether or not the input contents for the conversation contents of the first avatar 31A have been detected. Further, when the server device 3 does not detect the input content for the conversation content of the first avatar 31A (step S12: No), it determines whether or not the input content for the conversation content of the first avatar 31A is detected. Therefore, the process proceeds to step S12.
  • step S11: Yes the server device 3 ends the processing operation shown in FIG.
  • step S19: No the server device 3 proceeds to step S19 in order to determine whether or not the response content has been detected from the terminal device 2.
  • the server device 3 When the server device 3 detects the input content for the conversation content of the first avatar 31A from the terminal device 2, it analyzes the anomaly from the input content and determines whether or not the possibility of fraudulent transfer procedure is detected based on the anomaly analysis result. To judge. When the server device 3 detects the possibility of fraudulent transfer procedure, the server device 3 presents a message according to the content of the fraudulent possibility to the terminal device 2. As a result, the customer can call attention to the possibility of fraudulent transfer procedure with the additional message of the first avatar 31A.
  • the server device 3 detects the answer content corresponding to the message, it analyzes the anomaly from the answer content and determines whether or not the possibility of fraudulent transfer procedure is detected based on the anomaly analysis result.
  • the server device 3 detects the possibility of fraudulent transfer procedure, the server device 3 switches from the first avatar 31A to the second avatar 31B or a manned chat. As a result, the customer can further call attention to the possibility of fraudulent transfer procedures by switching from the first avatar 31A to the second avatar 31B or manned chat.
  • FIG. 6 is an explanatory diagram showing an example of a chat transfer image in a normal state.
  • the chat transfer image shown in FIG. 6 is a chat transfer image between the terminal device 2 and the server device 3.
  • the procedure of the procedure is the transfer procedure
  • the operation time of the procedure is usually the same as the transfer destination of the procedure
  • the transfer amount of the procedure is the same as usual
  • the operation terminal of the procedure is also the same as usual. Same.
  • the server device 3 presents "Please select a target transaction" from the first avatar 31A to the terminal device 2 (step S41). Further, the server device 3 presents a selection button such as “transfer” or “remittance” to the terminal device 2 as a target transaction. When the server device 3 detects the button operation of the "transfer” selection button, it displays “transfer. Log in.” And “enter your customer number.” From the first avatar 31A. Presented in 2 (step S42).
  • the server device 3 When the server device 3 detects the input of the customer number from the terminal device 2, the server device 3 presents "Enter PW” from the first avatar 31A to the terminal device 2 (step S43). When the server device 3 detects the input of the PW from the terminal device 2, the server device 3 executes the anomaly analysis of the PW (step S44). When the PW is normal, the server device 3 presents "Enter the store number of the transfer destination" from the first avatar 31A to the terminal device 2 (step S45).
  • the server device 3 When the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, the server device 3 presents "Enter the account number of the transfer destination" from the first avatar 31A to the terminal device 2 (step S46). ). Further, when the server device 3 detects the input of the transfer destination account number from the terminal device 2, the server device 3 executes anomaly analysis of the transfer destination account number (step S47). When the transfer destination account number is normal, the server device 3 presents "Enter the transfer amount" from the first avatar 31A to the terminal device 2 (step S48).
  • the server device 3 When the server device 3 detects the input of the transfer amount from the terminal device 2, the server device 3 executes the anomaly analysis of the transfer amount (step S49).
  • the server device 3 presents the transfer content confirmation screen and confirmation button to the terminal device 2 from the first avatar 31A (step S50).
  • the server device 3 detects the button operation of the "Yes" confirmation button of the transfer contents from the terminal device 2, the first avatar 31A "authenticates the person. Please enter the name of your dog.”
  • the authentication screen is presented to the terminal device 2 (step S51). At this time, the authentication screen is a simple authentication method because the analysis result of the anomaly analysis of the transfer destination account number and the transfer amount is normal.
  • the server device 3 When the server device 3 detects the input of the dog's name from the terminal device 2, the server device 3 starts the transfer, and after the transfer is completed, presents "the transfer is completed" to the terminal device 2 (step S52). As a result, the server device 3 can complete the transfer procedure when the answer contents are normal while confirming the answer contents by the chat between the first avatar 31A and the terminal device 2 by the anomaly analysis.
  • FIGS. 7A and 7B are explanatory diagrams showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • the chat transfer image shown in FIGS. 7A and 7B is a chat transfer image between the terminal device 2 and the server device 3.
  • the procedure of the procedure is a transfer procedure
  • the operation time of the procedure is usually an account that has not been tired for 5 years or more
  • the transfer amount of the procedure is 500,000 yen
  • the operation of the procedure The terminal is the same as usual.
  • the server device 3 presents "Please select a target transaction" from the first avatar 31A to the terminal device 2 (step S41). Further, the server device 3 presents a selection button such as “transfer” or “remittance” to the terminal device 2 as a target transaction. When the server device 3 detects the button operation of the "transfer” selection button, it presents “transfer. Log in.” And “enter the customer number.” To the terminal device 2 (step). S42).
  • the server device 3 When the server device 3 detects the input of the customer number from the terminal device 2, it presents "Enter PW.” To the terminal device 2 (step S43). When the server device 3 detects the input of the PW from the terminal device 2, the server device 3 executes the anomaly analysis of the PW (step S44). When the PW is normal, the server device 3 presents "Enter the store number of the transfer destination" to the terminal device 2 (step S45).
  • the server device 3 When the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, it presents "Enter the account number of the transfer destination" to the terminal device 2 (step S46). Further, when the server device 3 detects the input of the transfer destination account number from the terminal device 2, the server device 3 executes an anomaly analysis for determining whether or not the transfer destination account number is a dormant account (step S47A). Based on the anomaly analysis result, if there is a possibility that the transfer destination account number is incorrect, the server device 3 will ask "The transfer destination account has not been used for 5 years or more. Do you want to proceed with the procedure?" The message and the confirmation button are presented to the terminal device 2 (step S47B). As a result, the server device 3 arouses the possibility of fraudulent transfer account to the transfer procedure person in good faith. Further, the server device 3 restrains the fraudulent transfer procedure against the malicious transfer procedure person.
  • step S48 when the server device 3 detects the button operation of the confirmation button of "Yes” from the terminal device 2, it presents "Please enter the transfer amount” to the terminal device 2 (step S48).
  • the server device 3 detects the input of the transfer amount from the terminal device 2, the server device 3 executes the anomaly analysis of the transfer amount (step S49A). Based on the anomaly analysis result, the server device 3 presents "Please select the transfer purpose this time” and the transfer purpose selection button to the terminal device 2 when there is a possibility that the transfer amount is fraudulent (step S49B).
  • the server device 3 arouses the possibility of fraudulent transfer procedure to the well-meaning transfer procedure person.
  • the server device 3 restrains the fraudulent transfer procedure against the malicious transfer procedure person.
  • the server device 3 When the server device 3 detects a button operation of a transfer purpose selection button such as "remittance / remittance to a child" from the terminal device 2, it presents "there is a possibility of transfer fraud" to the terminal device 2 ( Step S62). The server device 3 presents "I will contact the family, is that okay?" And a confirmation button to the terminal device 2 (step S63). As a result, the server device 3 arouses the possibility of fraudulent transfer procedure to the well-meaning transfer procedure person. The server device 3 restrains the fraudulent transfer procedure against the malicious transfer procedure person.
  • a transfer purpose selection button such as "remittance / remittance to a child” from the terminal device 2
  • the server device 3 detects the button operation of the "Yes” confirmation button from the terminal device 2, it "authenticates the person. Since the SMS was sent to the registered phone number, the transfer is executed from the SMS. Please do. ”To the terminal device 2 (step S64). Then, the customer of the terminal device 2 executes the transfer according to the button operation of the transfer button on the received SMS (step S65).
  • FIGS. 8A and 8B are explanatory diagrams showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • the chat transfer image shown in FIGS. 8A and 8B is a chat transfer image between the terminal device 2 and the server device 3.
  • the procedure of the procedure is a transfer
  • the operation time of the procedure is usually
  • the transfer destination of the procedure is a normal account
  • the transfer amount of the procedure is 500,000 yen
  • the operation terminal of the procedure is also different from usual. It is referred to as a terminal device 2.
  • the server device 3 presents "Please select a target transaction" to the terminal device 2 (step S41). Further, the server device 3 presents a selection button such as “transfer” or “remittance” to the terminal device 2 as a target transaction. When the server device 3 detects the button operation of the "transfer” selection button, it presents “transfer. Log in.” And “enter the customer number.” To the terminal device 2 (step). S42).
  • the server device 3 When the server device 3 detects the input of the customer number from the terminal device 2, it presents "Enter PW.” To the terminal device 2 (step S43). When the server device 3 detects the input of the PW from the terminal device 2, the server device 3 executes the anomaly analysis of the PW (step S71). Further, the server device 3 determines whether or not the terminal device 2 is different from the usual one by using, for example, the MAC number of the terminal device 2 and the MAC number of the usual terminal based on the anomaly analysis result.
  • the server device 3 determines that the transfer procedure may be fraudulent if the current terminal device 2 is a terminal device 2 different from the normal one. Then, the server device 3 presents "Please answer the following questions to confirm the identity of the operator" and "What is the name of the pet you have for the first time?" To the terminal device 2 ( Step S72). As a result, the server device 3 arouses the possibility of fraudulent transfer procedure by the terminal device 2 which is different from the usual one to the well-meaning transfer procedure person. The server device 3 restrains the fraudulent transfer procedure against the malicious transfer procedure person. Then, when the server device 3 detects the content of the reply from the terminal device 2, it presents "Please enter the store number of the transfer destination" to the terminal device 2 (step S45).
  • the server device 3 When the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, it presents "Enter the account number of the transfer destination" to the terminal device 2 (step S46). Further, in FIG. 8B, when the server device 3 detects the input of the transfer destination account number from the terminal device 2, it presents "Please input the transfer amount” to the terminal device 2 (step S48).
  • the server device 3 executes the anomaly analysis of the transfer amount (step S73). Based on the anomaly analysis result, if the transfer amount exceeds the upper limit and there is a possibility that the transfer amount is fraudulent, the server device 3 presses the "Please select the transfer purpose this time” and the transfer purpose selection button to the terminal device 2. (Step S74). As a result, the server device 3 arouses the possibility of fraudulent transfer procedure with a high transfer amount to the well-meaning transfer procedure person. The server device 3 restrains the fraudulent transfer procedure against the malicious transfer procedure person.
  • the server device 3 When the server device 3 detects the button operation of the transfer purpose selection button such as "remittance / remittance to the child" from the terminal device 2, the server device 3 executes the anomaly analysis of "remittance / remittance to the child” (step S75).
  • the server device 3 presents "there is a possibility of transfer fraud", "I will contact the family, is that okay?" And a confirmation button to the terminal device 2 (step S76).
  • the server device 3 arouses the possibility of fraudulent transfer procedure to the well-meaning transfer procedure person.
  • the server device 3 restrains the fraudulent transfer procedure against the malicious transfer procedure person.
  • the server device 3 detects the button operation of the "Yes” confirmation button from the terminal device 2, it "authenticates the person. Since the SMS was sent to the registered phone number, the transfer is executed from the SMS. Please present to the terminal device 2 (step S77. As a result, the customer of the terminal device 2 executes the transfer in response to the button operation of the transfer button on the received SMS (step S78).
  • FIGS. 9A and 9B are explanatory diagrams showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • the chat transfer image shown in FIGS. 9A and 9B is a chat transfer image between the terminal device 2 and the server device 3.
  • the procedure of the procedure is the transfer procedure
  • the operation time of the procedure is usually the account on the financial transaction caution list
  • the transfer amount of the procedure is 500,000 yen
  • the operation of the procedure The terminal is the same as usual.
  • the server device 3 presents "Please select a target transaction" from the first avatar 31A to the terminal device 2 (step S41). Further, the server device 3 presents a selection button such as “transfer” or “remittance” to the terminal device 2 as a target transaction. When the server device 3 detects the button operation of the "transfer” selection button, it presents “transfer. Log in.” And “enter the customer number.” To the terminal device 2 (step). S42).
  • the server device 3 When the server device 3 detects the input of the customer number from the terminal device 2, it presents "Enter PW.” To the terminal device 2 (step S43). When the server device 3 detects the input of the PW from the terminal device 2, the server device 3 executes the anomaly analysis of the PW (step S44). Further, when the PW is normal, the server device 3 presents "Enter the store number of the transfer destination" to the terminal device 2 (step S45).
  • the server device 3 When the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, it presents "Enter the account number of the transfer destination" to the terminal device 2 (step S46). When the server device 3 detects the input of the transfer destination account number from the terminal device 2, the server device 3 executes anomaly analysis of the transfer destination account number (step S81). As a result, the server device 3 determines that the transfer procedure may be fraudulent if the transfer destination account number is a new transfer destination and the account is on the financial attention list, based on the result of the anomaly analysis of the transfer destination account number. Judgment is made, and the first avatar 31A is switched to the second avatar 31B.
  • the server device 3 presents "Excuse me from the side” to the terminal device 2 from the second avatar 31B (step S82).
  • the server device 3 presents "The transfer account is an account on the financial attention list” and "Are you sure you want to proceed?" And the answer button from the second avatar 31B to the terminal device 2 (step S83). ..
  • the server device 3 further arouses the possibility of fraudulent transfer procedures to the financial attention list account to the well-meaning transfer procedure person.
  • the server device 3 further restrains the fraudulent transfer procedure against the malicious transfer procedure person.
  • the server device 3 presents "Enter the transfer amount” to the terminal device 2 from the second avatar 31B (step S48). ..
  • the server device 3 detects the input of the transfer amount from the terminal device 2, the server device 3 executes the anomaly analysis of the transfer amount (step S84). Based on the anomaly analysis result, the server device 3 presents "Please select the transfer purpose this time” and the transfer purpose selection button to the terminal device 2 when there is a possibility that the transfer amount is fraudulent (step S85).
  • the server device 3 arouses the possibility of fraudulent transfer procedures to the high-value financial attention list account to the well-meaning transfer procedure person. The server device 3 restrains the fraudulent transfer procedure against the malicious transfer procedure person.
  • the server device 3 When the server device 3 detects the button operation of the transfer purpose selection button such as "remittance / remittance to the child" from the terminal device 2, the server device 3 executes the anomaly analysis of "remittance / remittance to the child” (step S86).
  • the server device 3 presents "there is a possibility of transfer fraud" to the terminal device 2 (step S87).
  • the server device 3 presents "I will leave the information to the financial institution / National police Agency, is that okay?" And the answer button to the terminal device 2 (step S88).
  • the server device 3 detects the button operation of the answer button of "Yes” from the terminal device 2, it "authenticates the person.
  • the SMS is sent to the registered telephone number, so the transfer is executed from the SMS. Please do. ”To the terminal device 2 (step S89).
  • the customer of the terminal device 2 executes the transfer according to the button operation of the transfer button on the received SMS (step S79).
  • FIGS. 10A and 10B are explanatory diagrams showing an example of a chat transfer image at the time of abnormality (transfer fraud).
  • the chat transfer image shown in FIGS. 10A and 10B is a chat transfer image between the terminal device 2 and the server device 3.
  • the procedure of the procedure is the transfer procedure
  • the operation time of the procedure is usually the overseas account
  • the transfer amount of the procedure is 500,000 yen
  • the operation terminal of the procedure is also usual. Same.
  • the server device 3 presents "Please select a target transaction" from the first avatar 31A to the terminal device 2. Further, the server device 3 presents a selection button such as “transfer” or “remittance” to the terminal device 2 as a target transaction. When the server device 3 detects the button operation of the "transfer” selection button, it presents “transfer. Log in.” And “enter the customer number.” To the terminal device 2 (step). S42).
  • the server device 3 When the server device 3 detects the input of the customer number from the terminal device 2, it presents "Enter PW.” To the terminal device 2 (step S43). When the server device 3 detects the input of the PW from the terminal device 2, the server device 3 executes the anomaly analysis of the PW (step S44). Further, when the PW is normal, the server device 3 presents "Enter the store number of the transfer destination" to the terminal device 2 (step S45).
  • the server device 3 When the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, it presents "Enter the account number of the transfer destination" to the terminal device 2 (step S46). When the server device 3 detects the input of the transfer destination account number from the terminal device 2, the server device 3 executes anomaly analysis of the transfer destination account number (step S91). As a result, the server device 3 determines that if the transfer destination account number is a new transfer destination, the transfer procedure may be fraudulent, based on the result of the anomaly analysis of the transfer destination account number, and the first avatar 31A To the second avatar 31B. As a result, with the advent of the second avatar 31B, the server device 3 further arouses the possibility of fraudulent transfer procedures to the transfer account to the well-meaning transfer procedure person. The server device 3 further restrains the fraudulent transfer procedure against the malicious transfer procedure person.
  • the server device 3 presents "Excuse me from the side” to the terminal device 2 from the second avatar 31B (step S92).
  • the server device 3 presents "the transfer account is an overseas account” to the terminal device 2 from the second avatar 31B (step S93).
  • the server device 3 presents the answer button and "Are you sure you want to proceed with the procedure?" From the second avatar 31B to the terminal device 2 (step S94).
  • the server device 3 detects the button operation of the answer button of "Yes" in FIG. 10B, the server device 3 presents "Enter the transfer amount" to the terminal device 2 from the second avatar 31B (step S48). ..
  • the server device 3 When the server device 3 detects the input of the transfer amount from the terminal device 2, the server device 3 executes the anomaly analysis of the transfer amount (step S95). Based on the anomaly analysis result, the server device 3 presents "Who told me to make the transfer?" And a selection button to the terminal device 2 when there is a possibility that the transfer amount is fraudulent (step S96).
  • the selection button is, for example, a button such as "your own intention”, “police / bank clerk", or "other".
  • the server device 3 When the server device 3 detects the button operation of the "other" selection button, the server device 3 presents a free input field to the terminal device 2 (step S97). When the server device 3 detects the input to the free input field from the terminal device 2, it presents "Connect to the manned chat" to the terminal device 2, and then changes from the chat of the second avatar 31B to the manned chat. Switching (step S98). As a result, manned chat arouses the possibility of fraudulent transfer procedures to well-meaning transfer procedures. Manned chat restrains fraudulent transfer procedures against malicious transfer procedures.
  • the manned chat terminal presents "Please tell me the purpose of the transfer” and the free input field to the terminal device 2 from the manned chat terminal (step S98A).
  • the operator of the manned chat terminal detects the purpose of the transfer to the free input field, the operator determines whether or not the procedure is normal from the transfer purpose. If the procedure is determined to be normal, the manned chat terminal presents "Authenticate the person" to the terminal device 2.
  • the server device 3 activates the face authentication function (step S99), and if the face authentication is OK, the second avatar 31B sends "personal authentication was successful” and "thank you” to the terminal device 2. Present (step S100). Then, when the server device 3 detects the button operation of the answer button of "Yes” from the terminal device 2, it "authenticates the person. The SMS is sent to the registered telephone number, so the transfer is executed from the SMS. Please do. "Is presented to the terminal device 2. As a result, the customer of the terminal device 2 executes the transfer according to the button operation of the transfer button on the received SMS.
  • FIG. 11 is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (tool abuse).
  • the chat transfer image shown in FIG. 11 is a chat transfer image between the terminal device 2 and the server device 3.
  • the procedure of the procedure is a transfer
  • the operation time of the procedure is short or constant
  • the transfer destination of the procedure is usually 10,000 yen
  • the operation terminal of the procedure is the same as usual. And.
  • the server device 3 presents "Please select a target transaction" from the first avatar 31A to the terminal device 2 (step S41). Further, the server device 3 presents a selection button such as “transfer” or “remittance” to the terminal device 2 as a target transaction. When the server device 3 detects the button operation of the "transfer” selection button, it presents “transfer. Log in.” And “enter the customer number.” To the terminal device 2 (step). S42).
  • the server device 3 When the server device 3 detects the input of the customer number from the terminal device 2, it measures the time from the presentation of "Please enter the customer number" to the detection of the customer number input, for example, 2 seconds.
  • the server device 3 When the server device 3 detects the input of the customer number from the terminal device 2, it presents "Enter PW.” To the terminal device 2 (step S43). When the server device 3 detects the input of the PW from the terminal device 2, the server device 3 executes the anomaly analysis of the PW (step S44). Further, when the server device 3 detects the input of the PW from the terminal device 2, the server device 3 measures the time from the presentation of "Please input the PW.” To the detection of the PW input, for example, 2 seconds.
  • the server device 3 presents "Enter the store number of the transfer destination" to the terminal device 2 (step S45).
  • the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, the time from the presentation of "Please enter the store number of the transfer destination" to the detection of the store number input, for example, 2 seconds. To measure.
  • the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, it presents "Enter the account number of the transfer destination” to the terminal device 2 (step S46).
  • the server device 3 detects the input of the transfer destination account number from the terminal device 2, the time from the presentation of "Please enter the transfer destination account number" to the detection of the account number input, for example, 2 seconds. To measure. Further, the server device 3 executes anomaly analysis of the transfer destination account number (step S47), and determines that the transfer procedure is normal.
  • the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, it presents "Please input the transfer amount" to the terminal device 2 (step S48).
  • the server device 3 detects the input of the transfer amount from the terminal device 2, it measures the time from the presentation of "Enter the transfer amount” to the detection of the transfer amount input, for example, 2 seconds. Further, the server device 3 executes an anomaly analysis of the transfer amount and determines that the transfer procedure is normal.
  • the server device 3 determines that the operation is not a manual input operation but an unauthorized operation by a computer (step S101).
  • the server device 3 presents "Please select a human image from the following to confirm the operation by a human" and a plurality of selected images to the terminal device 2 (step S102).
  • step S103 When the server device 3 does not detect the input of the selected image from the terminal device 2 within the predetermined time (step S103), the server device 3 presents to the terminal device 2 "The processing is canceled because the time has been exceeded.” Cancel the transfer procedure (step S104).
  • the server device 3 detects an erroneous selection of the selected image from the terminal device 2, it presents "The processing is canceled because the selected image is incorrect" to the terminal device 2 and performs the transfer procedure. To cancel.
  • the operation time when the operation time is short, it may be determined that the operation is not a manual input operation but an illegal operation by a computer, and it may be determined that the transfer procedure may be illegal. In addition, if the operation time is too late, it may be determined that the transfer procedure may be fraudulent.
  • the server device 3 of this embodiment analyzes the possibility that the procedure is fraudulent based on the content received as a conversation with the chatbot of the first avatar 31A or the reception timing.
  • the server device 3 has a conversation with the chatbot associated with the first avatar 31A, a conversation with the chatbot associated with the second avatar 31B, or a manned person. Switch to a chat conversation.
  • the possibility of fraudulent transfer procedure can be aroused to the transfer procedure person.
  • the server device 3 identifiablely displays a conversation with a chatbot associated with the second avatar 31B or a conversation in a manned chat with a conversation with the chatbot associated with the first avatar 31A. Presented to the terminal device. As a result, the transfer procedure person of the terminal device 2 can visually recognize the conversation of the first avatar 31A and the conversation of the second avatar 31B or the conversation of the manned chat.
  • the server device 3 executes an additional inquiry by conversation with the chatbot associated with the second avatar 31B. As a result, the server device 3 makes an additional inquiry to the transfer procedure person to alert the well-meaning transfer procedure person to the fraudulent transfer procedure, and at the same time, perform the fraudulent transfer procedure to the malicious transfer procedure person. Can be restrained.
  • the server device 3 When the server device 3 receives a reply that the meta information may be generated for the additional inquiry, the server device 3 generates the meta information for the additional inquiry and sends the generated meta information to, for example, a financial institution or the National police Agency. Record. As a result, the server device 3 can check the fraudulent transfer procedure by recording the meta information such as the content of the conversation with the procedure person, for example.
  • the server device 3 has a content that may suppress fraud in a conversation with a chatbot associated with the second avatar 31B or a conversation in a manned chat. As a result, the server device 3 makes the content of the conversation with the transfer procedure person a content that may suppress the improperness, so that the transfer procedure person in good faith is alerted to the fraudulent transfer procedure and is malicious. It is possible to check fraudulent transfer procedures for transfer procedures.
  • the server device 3 analyzes the possibility that the procedure is fraudulent based on the content received as a conversation with the chatbot of the first avatar 31A or the reception timing.
  • the server device 3 executes an additional inquiry by conversation between the first avatar 31A and the chatbot associated with the first avatar 31A.
  • the server device 3 makes an additional inquiry to the procedure person of the terminal device 2, so that the well-meaning transfer procedure person is alerted to the fraudulent transfer procedure, and the server device 3 is fraudulent to the malicious transfer procedure person. You can check the transfer procedure.
  • the server device 3 Since the operation log remains in the server device 3 using the chatbot, it is possible to reliably detect the operation suspected of being a criminal act by log analysis. Further, the server device 3 presents a message to the transfer procedure person to stop / stay the operation with the chatbot for the possibility of fraud, for example, the operation suspected of being a criminal act. As a result, the possibility of fraudulent transfer procedures can be raised to the transfer procedure person. Then, it is possible to protect a well-meaning transfer procedure person from criminal acts such as transfer fraud, unauthorized use of ID / PW, and cyber attacks.
  • the server device 3 detects operations suspected of being a criminal act from the log of interactive exchanges performed by the chatbot, and additionally asks irregular questions to restrain the criminal act, thereby transferring in good faith. The outflow of the procedureer's assets can be prevented.
  • server device 3 it is possible to give notice to the customer by interactively asking the transaction suspected of being a transfer fraud.
  • the server device 3 if the transfer procedure person in good faith is not the person (ID / PW is stolen), it is possible to restrain the crime by asking a plurality of questions. As a result, the damage caused by transfer fraud is reduced. By interactively alerting, it is possible to narrow the scope of responsibility of the bank.
  • chat Because of chat, it is possible to detect discomfort during communication. Furthermore, because it is a chat, it is possible to check each action, so it is possible to detect a crisis in real time. Moreover, from the analysis results of the chatbot log, it is possible to additionally ask the user "irregular questions”. Moreover, cyber attacks can be suppressed by checking the intervals between operations.
  • the transfer procedure is illustrated as a procedure in this embodiment, it is not limited to the transfer procedure and can be applied to various procedures using a chatbot.
  • the transfer procedure is executed by a conversational chat between the chatbot in the server device 3 and the terminal device 2 of the transfer procedure person is illustrated.
  • the chatbot is not limited to the one executed by the server device 3, and may be executed in the cloud, and can be changed as appropriate.
  • each component of each part shown in the figure does not necessarily have to be physically configured as shown in the figure. That is, the specific form of distribution / integration of each part is not limited to the one shown in the figure, and all or part of them may be functionally or physically distributed / integrated in any unit according to various loads and usage conditions. Can be configured.
  • each device is such that all or any part of them is executed on the CPU (Central Processing Unit), DSP (Digital Signal Processor), FPGA (Field Programmable Gate Array), etc. Is also good. Further, the various processing functions may be executed in whole or in an arbitrary part on a program to be analyzed and executed by a CPU or the like, or on hardware by wired logic.
  • CPU Central Processing Unit
  • DSP Digital Signal Processor
  • FPGA Field Programmable Gate Array
  • the area for storing various information is, for example, ROM (Read Only Memory), DRAM (Synchronous Dynamic Random Access Memory), MRAM (Magnetoresistive Random Access Memory), NVRAM (Non-Volatile Random Access Memory), or other RAM (Random Access). Memory) may be used.
  • ROM Read Only Memory
  • DRAM Serial Dynamic Random Access Memory
  • MRAM Magneticoresistive Random Access Memory
  • NVRAM Non-Volatile Random Access Memory
  • RAM Random Access
  • FIG. 12 is an explanatory diagram showing an example of the information processing apparatus 100 that executes the chat switching program.
  • the information processing device 100 that executes the chat switching program shown in FIG. 19 includes a communication device 110, an input device 120, a display device 130, a ROM 140, a RAM 150, a processor 160, and a bus 170.
  • the communication device 110, the input device 120, the display device 130, the ROM 140, the RAM 150, and the processor 160 are connected via the bus 170.
  • the communication device 110 controls communication between the terminal device operated by the customer and the network connected to the terminal device.
  • the ROM 140 stores the reception program 140A, the analysis program 140B, and the switching program 140C as chat switching programs.
  • the chat switching program may be recorded on a computer-readable recording medium with a drive (not shown) instead of the ROM 140.
  • the recording medium may be, for example, a portable recording medium such as a CD-ROM, a DVD disk, or a USB memory, or a semiconductor memory such as a flash memory.
  • the processor 160 reads the reception program 140A from the ROM 140 and makes it function as the reception process 160A on the RAM 150. Further, the processor 160 reads the analysis program 140B from the ROM 140 and makes it function as the analysis process 160B on the RAM 150. Further, the processor 160 reads the switching program 140C from the ROM 140 and makes it function as the switching process 160C on the RAM 150.
  • the processor 160 receives an instruction to start a conversation regarding the procedure between the first avatar and the associated chatbot.
  • the processor 160 analyzes the possibility that the procedure is fraudulent based on the content received as a conversation with the chatbot or the timing of the reception.
  • the processor 160 changes the conversation of the chatbot associated with the first avatar to the conversation with the chatbot associated with the second avatar different from the first avatar. Or switch to a manned chat conversation.
  • the possibility of fraudulent procedure can be aroused to the procedure person.

Abstract

This information processing device comprises a reception unit, an analysis unit, and a switching unit. The reception unit receives an instruction to start a conversation pertaining to a procedure between a first avatar and a corresponding chatbot. The analysis unit analyzes the possibility of the illegality of the procedure on the basis of details received as the conversation with the chatbot or a reception timing. When it has been determined that there is the possibility of illegality of the procedure, the switching unit switches the conversation between the first avatar and the corresponding chatbot into a conversation between a second avatar, which is different from the first avatar, and a corresponding chatbot, or a conversation in manned chat. As a result, a person involved in the procedure can be alerted about the possibility of the illegality of the procedure.

Description

チャット切替プログラム、チャット処理プログラム、情報処理装置及びチャット切替方法Chat switching program, chat processing program, information processing device and chat switching method
 本発明は、チャット切替プログラム、チャット処理プログラム、情報処理装置及びチャット切替方法に関する。 The present invention relates to a chat switching program, a chat processing program, an information processing device, and a chat switching method.
 従来、銀行窓口やATM(Automatic Teller Machine)から振込手続が行っていたが、振込手続者が銀行やATMに赴かなくても、振込手続者のスマホ端末やパソコンから振込手続を可能にしたWeb振込システムが知られている。図13A及び図13Bは、Web振込イメージの一例を示す説明図である。図13Aにおいて振込手続者のスマホ端末は、Web画面上のログイン画面のお客様番号入力欄にお客様番号の入力、パスワード入力欄にPWの入力検出後、ログインのボタン操作を検出すると(ステップS201)、ログイン要求を銀行システムに通知する。更に、銀行システムは、振込先情報、例えば、銀行名、店番号、口座番号及び振込金額等を入力する振込先入力画面をスマホ端末に提示する(ステップS202)。スマホ端末は、振込先入力画面上の銀行名、店番号、口座番号及び振込金額の入力検出後、確定ボタンのボタン操作に応じて(ステップS202A)、振込先情報を銀行システムに通知する。 In the past, transfer procedures were performed from bank counters and ATMs (Automatic Teller Machines), but even if the transfer procedure person does not go to the bank or ATM, the transfer procedure can be performed from the transfer procedure person's smartphone terminal or personal computer. The transfer system is known. 13A and 13B are explanatory views showing an example of a Web transfer image. In FIG. 13A, when the smartphone terminal of the transfer procedure person inputs the customer number in the customer number input field of the login screen on the Web screen, detects the PW input in the password input field, and then detects the login button operation (step S201). Notify the banking system of the login request. Further, the bank system presents a transfer destination input screen for inputting transfer destination information, for example, a bank name, a store number, an account number, a transfer amount, and the like (step S202). After detecting the input of the bank name, store number, account number and transfer amount on the transfer destination input screen, the smartphone terminal notifies the bank system of the transfer destination information according to the button operation of the confirmation button (step S202A).
 銀行システムでは、スマホ端末からの振込先情報を検出した場合、振込先情報の内容が正常であるか否かを判定する(ステップS203)。銀行システムは、振込先情報の内容が正常の場合、振込先確認画面をスマホ端末に通知する。また、銀行システムは、振込先情報の内容が異常の場合、エラーメッセージ画面をスマホ端末に通知する。図13Bにおいてスマホ端末は、振込先確認画面の内容を確認した後、振込先確認画面上の実行ボタンのボタン操作を検出した場合(ステップS204)、振込要求を銀行システムに通知する。 In the banking system, when the transfer destination information from the smartphone terminal is detected, it is determined whether or not the content of the transfer destination information is normal (step S203). When the contents of the transfer destination information are normal, the bank system notifies the smartphone terminal of the transfer destination confirmation screen. In addition, the banking system notifies the smartphone terminal of an error message screen when the content of the transfer destination information is abnormal. In FIG. 13B, when the smartphone terminal confirms the contents of the transfer destination confirmation screen and then detects the button operation of the execute button on the transfer destination confirmation screen (step S204), the smartphone terminal notifies the bank system of the transfer request.
 銀行システムは、振込要求を受信した場合、スマホ端末の顧客の認証画面をスマホ端末に通知する。図13Bにおいてスマホ端末は、認証画面上の振込パスワード入力欄に振込PWの入力操作を検出した場合(ステップS205)、振込PWを銀行システムに通知する。 When the bank system receives the transfer request, it notifies the smartphone terminal of the customer authentication screen of the smartphone terminal. In FIG. 13B, when the smartphone terminal detects the input operation of the transfer PW in the transfer password input field on the authentication screen (step S205), the smartphone terminal notifies the bank system of the transfer PW.
 銀行システムは、スマホ端末からの振込PWを受信した場合、振込PWによるスマホ端末の顧客認証を実行する。そして、銀行システムは、スマホ端末の顧客認証が完了した場合、振込先情報に基づく、振込手続を実行する。そして、銀行システムは、振込手続が完了した後、振込完了を示す振込確定画面をスマホ端末に提示する(ステップS206)。 When the bank system receives the transfer PW from the smartphone terminal, the bank system executes customer authentication of the smartphone terminal by the transfer PW. Then, when the customer authentication of the smartphone terminal is completed, the bank system executes the transfer procedure based on the transfer destination information. Then, after the transfer procedure is completed, the banking system presents a transfer confirmation screen indicating the completion of the transfer to the smartphone terminal (step S206).
 その結果、スマホ端末の振込手続者は、銀行の店舗等に赴かなくても、遠隔操作で振込手続ができるため、振込に要する窓口の作業負担や振込手続者の負担を軽減できる。 As a result, the transfer procedure person of the smartphone terminal can perform the transfer procedure by remote control without going to the bank store, etc., so that the work load of the window required for the transfer and the burden of the transfer procedure person can be reduced.
特表2008-544339号公報Japanese Patent Publication No. 2008-544339 特表2010-515175号公報Special Table 2010-515175 Publication No.
 しかしながら、近年、例えば、振り込め詐欺やID/PWの不正利用等の不正手続が横行している中で、振込手続者のスマホ端末からの遠隔操作による振込手続に際しても不正の可能性を振込手続者に気付かせる仕組みが必要となる。 However, in recent years, for example, while fraudulent procedures such as transfer fraud and unauthorized use of ID / PW are rampant, the possibility of fraud is also raised in the transfer procedure by remote control from the smartphone terminal of the transfer procedure person. It is necessary to have a mechanism to make people aware of this.
 一つの側面では、手続に対する不正の可能性を手続者に喚起できるチャット切替プログラム等を提供することにある。 One aspect is to provide a chat switching program, etc. that can alert the procedure person to the possibility of fraudulent procedures.
 1つの側面のチャット切替プログラムは、第1のアバタと対応付けられたチャットボットとの手続に関する会話の開始指示を受け付ける処理をコンピュータに実行させる。更に、前記チャットボットとの会話として受け付けた内容又は受け付けたタイミングに基づいて、前記手続に対する不正の可能性を分析する処理をコンピュータに実行させる。更に、前記手続に対する不正の可能性があると判断された場合には、前記第1のアバタと対応付けられたチャットボットとの会話から、前記第1のアバタと異なる第2のアバタと対応付けられたチャットボットとの会話、又は有人チャットでの会話に切り替える処理をコンピュータに実行させる。 The chat switching program on one side causes the computer to execute a process of accepting an instruction to start a conversation regarding the procedure between the first avatar and the associated chatbot. Further, the computer is made to execute a process of analyzing the possibility of fraud against the procedure based on the content received as a conversation with the chatbot or the timing of the reception. Further, when it is determined that there is a possibility of fraudulent activity against the procedure, the conversation with the chatbot associated with the first avatar is associated with the second avatar different from the first avatar. Have the computer perform a process to switch to a conversation with a chatbot or a conversation in a manned chat.
 1つの側面によれば、手続に対する不正の可能性を手続者に喚起できる。 According to one aspect, the possibility of fraud in the procedure can be aroused to the procedure person.
図1は、本実施例の振込チャットシステムの一例を示す説明図である。FIG. 1 is an explanatory diagram showing an example of a transfer chat system of this embodiment. 図2は、サーバ装置の一例を示すブロック図である。FIG. 2 is a block diagram showing an example of a server device. 図3は、不正可能性DBの一例を示す説明図である。FIG. 3 is an explanatory diagram showing an example of a fraudulent possibility DB. 図4は、メッセージDBの一例を示す説明図である。FIG. 4 is an explanatory diagram showing an example of the message DB. 図5は、振込チャット処理に関わるサーバ装置の処理動作の一例を示すフローチャートである。FIG. 5 is a flowchart showing an example of the processing operation of the server device related to the transfer chat processing. 図6は、正常時のチャット振込イメージの一例を示す説明図である。FIG. 6 is an explanatory diagram showing an example of a chat transfer image in a normal state. 図7Aは、異常(振り込め詐欺)時のチャット振込イメージの一例を示す説明図である。FIG. 7A is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud). 図7Bは、異常(振り込め詐欺)時のチャット振込イメージの一例を示す説明図である。FIG. 7B is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud). 図8Aは、異常(振り込め詐欺)時のチャット振込イメージの一例を示す説明図である。FIG. 8A is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud). 図8Bは、異常(振り込め詐欺)時のチャット振込イメージの一例を示す説明図である。FIG. 8B is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud). 図9Aは、異常(振り込め詐欺)時のチャット振込イメージの一例を示す説明図である。FIG. 9A is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud). 図9Bは、異常(振り込め詐欺)時のチャット振込イメージの一例を示す説明図である。FIG. 9B is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud). 図10Aは、異常(振り込め詐欺)時のチャット振込イメージの一例を示す説明図である。FIG. 10A is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud). 図10Bは、異常(振り込め詐欺)時のチャット振込イメージの一例を示す説明図である。FIG. 10B is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (transfer fraud). 図11は、異常(ツール悪用)時のチャット振込イメージの一例を示す説明図である。FIG. 11 is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (tool abuse). 図12は、チャット切替プログラムを実行する情報処理装置の一例を示す説明図である。FIG. 12 is an explanatory diagram showing an example of an information processing device that executes a chat switching program. 図13Aは、Web振込イメージの一例を示す説明図である。FIG. 13A is an explanatory diagram showing an example of a Web transfer image. 図13Bは、Web振込イメージの一例を示す説明図である。FIG. 13B is an explanatory diagram showing an example of a Web transfer image.
 以下、図面に基づいて、本願の開示する振込チャットシステム等の実施例を詳細に説明する。尚、各実施例により、開示技術が限定されるものではない。また、以下に示す各実施例は、矛盾を起こさない範囲で適宜組み合わせても良い。 Hereinafter, examples of the transfer chat system and the like disclosed in the present application will be described in detail based on the drawings. The disclosed technology is not limited by each embodiment. In addition, the examples shown below may be appropriately combined as long as they do not cause a contradiction.
 図1は、本実施例の振込チャットシステム1の一例を示す説明図である。図1に示す振込チャットシステム1は、顧客である振込手続者の端末装置2と、サーバ装置3と、銀行システム4と、ネットワーク5とを有する。端末装置2は、ネットワーク5との有線通信又は無線通信を司る、例えば、スマホ端末、タブレット端末やパーソナルコンピュータ等の振込手続者の端末装置である。サーバ装置3は、例えば、銀行の振込チャットシステム1全体を制御する情報処理装置である。銀行システム4は、銀行の顧客情報を管理するDB等を備えた銀行側のシステムである。端末装置2とサーバ装置3との間を通信で接続する、例えば、インターネット等の通信網である。 FIG. 1 is an explanatory diagram showing an example of the transfer chat system 1 of this embodiment. The transfer chat system 1 shown in FIG. 1 includes a terminal device 2 of a transfer procedure person who is a customer, a server device 3, a bank system 4, and a network 5. The terminal device 2 is a terminal device for a transfer procedure person such as a smartphone terminal, a tablet terminal, or a personal computer, which controls wired communication or wireless communication with the network 5. The server device 3 is, for example, an information processing device that controls the entire bank transfer chat system 1. The bank system 4 is a system on the bank side provided with a DB or the like that manages customer information of the bank. It is a communication network such as the Internet that connects the terminal device 2 and the server device 3 by communication.
 銀行システム4のDBには、顧客である振込手続者を識別する顧客名、顧客の口座番号、顧客のお客様番号、顧客のログインPW、顧客が振込時に使用する操作端末のMAC番号、口座残高や追加質問の回答内容等を対応付けて顧客情報を管理する。尚、追加質問の回答内容とは、顧客が初めて飼ったペットの名前等の本人確認の情報である。 In the DB of the bank system 4, the customer name that identifies the transfer procedure person who is the customer, the customer's account number, the customer's customer number, the customer's login PW, the MAC number of the operation terminal used by the customer at the time of transfer, the account balance, etc. Manage customer information by associating the answers to additional questions. The answer to the additional question is information for verifying the identity of the pet, such as the name of the pet that the customer has for the first time.
 図2は、サーバ装置3の一例を示すブロック図である。図2に示すサーバ装置3は、通信装置11と、記憶装置12と、プロセッサ13とを有する。通信装置11は、ネットワーク5との間の通信を司る装置である。記憶装置12は、各種情報を記憶する装置である。プロセッサ13は、サーバ装置3全体を制御する。記憶装置12は、不正可能性DB21と、メッセージDB22とを有する。不正可能性DB21は、アノマリ分析に使用する内容に応じて振込手続の不正可能性を判断するための情報を管理するDBである。メッセージDB22は、アノマリ分析結果に応じて振込手続者に対して注意喚起又は牽制を促すメッセージ内容を管理するDBである。 FIG. 2 is a block diagram showing an example of the server device 3. The server device 3 shown in FIG. 2 has a communication device 11, a storage device 12, and a processor 13. The communication device 11 is a device that controls communication with the network 5. The storage device 12 is a device that stores various types of information. The processor 13 controls the entire server device 3. The storage device 12 has a rogue possibility DB 21 and a message DB 22. The fraudulent possibility DB 21 is a DB that manages information for determining the fraudulent possibility of the transfer procedure according to the content used for the anomaly analysis. The message DB 22 is a DB that manages the content of the message that calls attention or restraint to the transfer procedure person according to the result of the anomaly analysis.
 プロセッサ13は、記憶装置12に記憶中のプログラムを読み出し、読み出したプログラムに基づき、機能としてのプロセスを実行する。プロセッサ13は、機能として、チャットボット31と、受付部32と、分析部33と、切替部34と、表示制御部35と、記録部36とを有する。 The processor 13 reads a program stored in the storage device 12, and executes a process as a function based on the read program. The processor 13 has a chatbot 31, a reception unit 32, an analysis unit 33, a switching unit 34, a display control unit 35, and a recording unit 36 as functions.
 チャットボット31は、端末装置2との間で顧客の振込手続を会話形式でサポートするAI(Artificial Intelligence))チャットボットである。チャットボット31は、通常のタイミングで登場する第1のアバタ31A(図8A参照)と、注意喚起のタイミングで登場する第2のアバタ31B(図8B参照)とを有する。 The chatbot 31 is an AI (Artificial Intelligence) chatbot that supports a customer's transfer procedure in a conversational manner with the terminal device 2. The chatbot 31 has a first avatar 31A (see FIG. 8A) that appears at a normal timing and a second avatar 31B (see FIG. 8B) that appears at the timing of alerting.
 受付部32は、第1のアバタ31Aと対応づけられたチャットボットとの振込手続に関する会話の開始指示を受け付ける。分析部33は、チャットボットとの会話として受け付けた内容又は受け付けたタイミングに基づいて、振込手続の不正可能性を分析する。分析部33は、銀行システム4内のDBにアクセスして顧客情報を収集する。分析部33は、顧客情報及び不正可能性DB21を参照し、振込手続の不正可能性を分析する。 The reception unit 32 receives an instruction to start a conversation regarding the transfer procedure between the first avatar 31A and the chatbot associated with the first avatar 31A. The analysis unit 33 analyzes the possibility of fraudulent transfer procedure based on the content received as a conversation with the chatbot or the timing of reception. The analysis unit 33 accesses the DB in the banking system 4 and collects customer information. The analysis unit 33 refers to the customer information and the fraudulent possibility DB 21 and analyzes the fraudulent possibility of the transfer procedure.
 切替部34は、振込手続の不正可能性があると判断した場合、第1のアバタ31Aから第2のアバタ31Bに切り替えて、第2のアバタ31Bと対応付けてチャットボットとの会話を継続する。また、切替部34は、振込手続の不正可能性があると判断した場合、第1のアバタ31Aから有人チャットでの会話に切替える。 When the switching unit 34 determines that the transfer procedure may be fraudulent, the switching unit 34 switches from the first avatar 31A to the second avatar 31B and continues the conversation with the chatbot in association with the second avatar 31B. .. Further, when the switching unit 34 determines that the transfer procedure may be fraudulent, the switching unit 34 switches from the first avatar 31A to a conversation in a manned chat.
 表示制御部35は、第2のアバタ31Bと対応付けたチャットボットとの会話、又は有人チャットでの会話と、第1のアバタ31Aと対応づけられたチャットボットとの会話とを識別可能に端末装置2の表示部に表示するように制御する(図9A参照)。記録部36は、問い合わせ情報に対応して、メタ情報を生成してよいとの回答を受信した場合、メタ情報を生成し、生成したメタ情報を記録する。例えば、記録部36は、図9Bに示すように、「金融機関/警察庁に情報を残しますがよろしいでしょうか?」のメッセージに対して「はい」との回答を受け付けた場合、振込手続のログをメタ情報として金融機関若しくは警察庁のDBに記録する。尚、記録部36は、振込手続のログをメタ情報として記憶装置12に記憶しても良い。 The display control unit 35 can distinguish between a conversation with a chatbot associated with the second avatar 31B or a conversation in a manned chat and a conversation with the chatbot associated with the first avatar 31A. It is controlled to be displayed on the display unit of the device 2 (see FIG. 9A). When the recording unit 36 receives a reply that the meta information may be generated in response to the inquiry information, the recording unit 36 generates the meta information and records the generated meta information. For example, as shown in FIG. 9B, when the recording unit 36 receives an answer of "yes" to the message "Is it okay to leave the information in the financial institution / police agency?", The transfer procedure is performed. Record the log as meta information in the DB of the financial institution or the National Police Agency. The recording unit 36 may store the transfer procedure log in the storage device 12 as meta information.
 図3は、不正可能性DB21の一例を示す説明図である。図3に示す不正可能性DB21は、チャットボット31による相手先の入力内容から振込手続の不正可能性を検知するための不正可能性情報を管理するDBである。不正可能性情報は、区分と、内容と、詳細内容とを対応付けて管理する情報である。不正可能性情報には、振込手続者本人の状態に注目した不正可能性情報と、振込手続の操作に注目した不正可能性情報と、チャットボット31の操作に注目した不正可能性情報とを有する。 FIG. 3 is an explanatory diagram showing an example of the possibility of fraud DB21. The fraudulent possibility DB 21 shown in FIG. 3 is a DB that manages fraudulent possibility information for detecting the fraudulent possibility of the transfer procedure from the input contents of the other party by the chatbot 31. The fraud possibility information is information that manages the classification, the content, and the detailed content in association with each other. The fraudulent possibility information includes fraudulent possibility information focusing on the state of the transfer procedure person, fraud possibility information focusing on the operation of the transfer procedure, and fraud possibility information focusing on the operation of the chatbot 31. ..
 振込手続者本人の状態に注目した不正可能性情報としては、振込手続者本人の個人情報である。振込手続者本人の個人情報は、年齢と、口座残高とがある。分析部33は、個人情報の年齢に着目して、例えば、振込手続者本人の年齢層が70歳代を超える場合に振込手続の不正可能性の注意を喚起する。また、分析部33は、個人情報の口座残高に着目して振込手続者本人の口座残高が高額の場合の振込手続の不正可能性の注意を喚起する。 The information on the possibility of fraud focusing on the state of the transfer procedure person is the personal information of the transfer procedure person himself / herself. The personal information of the transfer procedure person has the age and the account balance. The analysis unit 33 pays attention to the age of the personal information, and calls attention to the possibility of fraudulent transfer procedure, for example, when the age group of the transfer procedure person is over 70s. In addition, the analysis unit 33 pays attention to the account balance of the personal information and calls attention to the possibility of fraudulent transfer procedure when the account balance of the transfer procedure person himself / herself is high.
 振込手続の操作に注目した不正可能性情報としては、振込手続者本人の自分情報と、振込先の相手情報と、質情報と、量情報とがある。自分情報には、IPアドレスと、端末情報と、位置情報とがある。分析部33は、振込手続者本人のIPアドレスに着目して普段と違うPCから振込操作を検出した場合に振込手続の不正可能性の注意を喚起する。分析部33は、振込手続者本人の端末情報に着目して普段と違う端末装置2から振込操作を検出した場合に振込手続の不正可能性の注意を喚起する。分析部33は、振込手続者本人の位置情報に着目して、通常の生活圏と違う場所から振込操作を検出した場合に振込手続の不正可能性の注意を喚起する。 The fraudulent possibility information focusing on the operation of the transfer procedure includes the personal information of the transfer procedure person, the other party information of the transfer destination, the quality information, and the quantity information. The self-information includes an IP address, a terminal information, and a location information. The analysis unit 33 pays attention to the IP address of the transfer procedure person and calls attention to the possibility of fraudulent transfer procedure when the transfer operation is detected from a PC different from the usual one. The analysis unit 33 pays attention to the terminal information of the transfer procedure person himself and calls attention to the possibility of fraudulent transfer procedure when the transfer operation is detected from the terminal device 2 different from the usual one. The analysis unit 33 pays attention to the location information of the transfer procedure person himself and calls attention to the possibility of fraudulent transfer procedure when the transfer operation is detected from a place different from the normal living area.
 振込先の相手情報には、振込先と、口座の国籍と、不審な口座と、新たな振込先とがある。分析部33は、振込先に着目して注意リストにある口座への振込依頼を検出した場合に振込手続の不正可能性の注意を喚起する。分析部33は、口座の国籍に着目して海外口座への振込依頼を検出した場合に振込手続の不正可能性の注意を喚起する。分析部33は、不審口座に着目して休眠口座への振込依頼を検出した場合に振込手続の不正可能性の注意を喚起する。分析部33は、新たな振込先に着目して新規の振込先への振込依頼を検出した場合に振込手続の不正可能性の注意を喚起する。 The transfer destination information includes the transfer destination, the nationality of the account, the suspicious account, and the new transfer destination. When the analysis unit 33 pays attention to the transfer destination and detects the transfer request to the account in the caution list, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedure. The analysis unit 33 calls attention to the possibility of fraudulent transfer procedures when it detects a transfer request to an overseas account by focusing on the nationality of the account. When the analysis unit 33 pays attention to the suspicious account and detects the transfer request to the dormant account, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedure. When the analysis unit 33 pays attention to the new transfer destination and detects the transfer request to the new transfer destination, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedure.
 質情報には、突発性と、規制・ルールと、高齢者とがある。分析部33は、突発性に着目して突然発生した初回の振込先への振込依頼を検出した場合に振込手続の不正可能性の注意を喚起する。分析部33は、規制・ルールに着目して振込金額が制限ギリギリの振込依頼を検出した場合に振込手続の不正可能性の注意を喚起する。分析部33は、高齢者に着目して高齢者による振込依頼を検出した場合に振込手続の不正可能性の注意を喚起する。 Quality information includes suddenness, regulations / rules, and elderly people. The analysis unit 33 calls attention to the possibility of fraudulent transfer procedures when it detects a sudden transfer request to the first transfer destination, paying attention to the suddenness. The analysis unit 33 pays attention to the regulation / rule and calls attention to the possibility of fraudulent transfer procedure when the transfer amount is limited and the transfer request is detected. The analysis unit 33 calls attention to the possibility of fraudulent transfer procedures when the elderly person pays attention to the transfer request and detects the transfer request.
 量情報には、頻度と、金額と、回数とがある。分析部33は、頻度に着目して同一月内に複数回の同一口座への振込依頼を検出した場合に振込手続の不正可能性の注意を喚起する。分析部33は、金額に着目して高額な振込金額の振込依頼を検出した場合に振込手続の不正可能性の注意を喚起する。分析部33は、回数に着目して1日に複数口座への振込依頼を検出した場合に振込手続の不正可能性の注意を喚起する。 The quantity information includes frequency, amount, and number of times. The analysis unit 33 pays attention to the frequency and calls attention to the possibility of fraudulent transfer procedures when it detects multiple transfer requests to the same account within the same month. The analysis unit 33 calls attention to the possibility of fraudulent transfer procedures when a transfer request for a large transfer amount is detected by paying attention to the amount. The analysis unit 33 calls attention to the possibility of fraudulent transfer procedures when it detects a transfer request to a plurality of accounts in one day by paying attention to the number of times.
 チャットボット31の操作に注目した異常情報としては、時間情報と、入力情報と、質問情報とがある。時間情報には、短いと、遅いと、一定とがある。分析部33は、短いに着目して操作時間が通常の操作に比較して短過ぎる振込の各種入力を検出した場合に振込手続の不正可能性の注意を喚起する。分析部33は、遅いに着目して操作時間が通常の操作に比較して遅すぎる振込の各種入力を検出した場合に振込手続の不正可能性の注意を喚起する。分析部33は、一定に着目して振込の各種入力の毎回の操作時間が一定の振込入力を検出した場合に振込手続の不正可能性の注意を喚起する。 Abnormal information focusing on the operation of the chatbot 31 includes time information, input information, and question information. There are short time information, slow time information, and constant time information. When the analysis unit 33 pays attention to the shortness and detects various inputs of the transfer whose operation time is too short as compared with the normal operation, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedure. When the analysis unit 33 pays attention to the slowness and detects various inputs of the transfer whose operation time is too late as compared with the normal operation, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedure. The analysis unit 33 pays attention to a certain amount and calls attention to the possibility of fraud in the transfer procedure when the operation time of each of the various input of the transfer is fixed and the transfer input is detected.
 入力情報には、誤入力数と、訂正数とがある。分析部33は、誤入力数に着目して誤入力が多い振込依頼を検出した場合に振込手続の不正可能性の注意を喚起する。分析部33は、訂正数に着目して訂正回数が多い振込依頼を検出した場合に振込手続の不正可能性の注意を喚起する。 The input information includes the number of erroneous inputs and the number of corrections. When the analysis unit 33 pays attention to the number of erroneous inputs and detects a transfer request with many erroneous inputs, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedure. When the analysis unit 33 pays attention to the number of corrections and detects a transfer request having a large number of corrections, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedures.
 質問情報には、数と、質問内容とがある。分析部33は、数に着目して個人情報の問い合わせが入っている振込依頼を検出した場合に振込手続の不正可能性の注意を喚起する。分析部33は、質問内容に着目して日本語間違いの振込依頼を検出した場合に振込手続の不正可能性の注意を喚起する。 The question information includes the number and the content of the question. When the analysis unit 33 pays attention to the number and detects the transfer request containing the inquiry of personal information, the analysis unit 33 calls attention to the possibility of fraudulent transfer procedure. The analysis unit 33 calls attention to the possibility of fraudulent transfer procedures when it detects a transfer request with a Japanese error by paying attention to the content of the question.
 分析部33は、図3に示す不正可能性DB21を参照して、振込手続の不正可能性として、例えば、高齢者を狙う振り込め詐欺、ID/PWの悪用行為、サイバー攻撃等を識別する。 The analysis unit 33 refers to the fraudulent possibility DB 21 shown in FIG. 3 and identifies, for example, a transfer fraud targeting the elderly, an ID / PW misuse act, a cyber attack, etc. as the fraudulent possibility of the transfer procedure.
 図4は、メッセージDB22の一例を示す説明図である。図4に示すメッセージDB22は、不正可能性判断後のメッセージ内容を示す振込手続者宛のメッセージを管理するDBである。メッセージ内容としては、振込手続者への追加質問のメッセージと、振込手続者に気付きを与えるメッセージと、ツールによる実行を阻止するメッセージと、悪意ある振込手続者を牽制するメッセージとがある。 FIG. 4 is an explanatory diagram showing an example of the message DB 22. The message DB 22 shown in FIG. 4 is a DB that manages a message addressed to a transfer procedure person indicating the content of the message after determining the possibility of fraud. The content of the message includes a message for an additional question to the transfer procedure person, a message for notifying the transfer procedure person, a message for preventing the execution by the tool, and a message for restraining the malicious transfer procedure person.
 追加質問のメッセージとしては、例えば、「振込目的を選択して下さい。」、「誰に言われて振込していますか。」、「お子様のお名前を入力して下さい。」、「振込先の口座情報をお調べしますか。」、「初めて飼ったペットの名前は何ですか。」等である。 Additional question messages include, for example, "Please select the transfer purpose", "Who told me to transfer?", "Enter your child's name", "Transfer destination". Do you want to check your account information? "," What is the name of your pet for the first time? ", Etc.
 振込手続者に気付きを与えるメッセージとしては、例えば、「当取引は振り込め詐欺の疑いがございます。」、「振込先の口座は○年以上、使われていない口座です。」、「振込先の口座は、金融取引で注意リストにある口座です。」及び「振込先の口座は海外の口座です。」等の注意を喚起するメッセージである。 Messages that give notice to the transfer procedure person are, for example, "This transaction is suspected of being a transfer fraud.", "The transfer destination account is an account that has not been used for more than ○ years.", "The transfer destination account. The account is a message that calls attention such as "The account is an account on the caution list in financial transactions." And "The transfer destination account is an overseas account."
 ツールによる実行を阻止するメッセージとしては、例えば、「人の画像を選択して下さい。」、「思い出(利用者)の画像を選択して下さい。」、「入力欄にあなたの生年月日を入力して下さい。」等のサイバー攻撃を抑制するためのメッセージである。 As messages to prevent execution by the tool, for example, "Please select an image of a person.", "Please select an image of a memory (user).", "Enter your date of birth in the input field." This is a message to suppress cyber attacks such as "Please enter."
 悪意ある振込手続者を牽制するメッセージとしては、例えば、「ご家族宛に連絡します。」、「横から失礼します。」、「有人チャットへ連携します。」、「金融機関/警察庁に情報を残します。」や「振込実行時に動画を撮影させて頂きます。」等のメッセージである。 Messages that restrain malicious transfer procedures include, for example, "I will contact my family", "I'm sorry from the side", "I will cooperate with manned chat", "Financial institution / National Police Agency" It is a message such as "I will leave the information in." Or "I will shoot a video when the transfer is executed."
 チャットボット31は、分析部33のアノマリ分析結果に基づき、振込手続の不正可能性として、例えば、高齢者を狙う振り込め詐欺の場合、振り込め詐欺対応のメッセージをメッセージDB22から抽出し、抽出したメッセージを端末装置2に提示する。 Based on the analysis result of the anomaly of the analysis unit 33, the chatbot 31 extracts a message corresponding to the transfer fraud from the message DB 22 and extracts the extracted message as a possibility of fraud in the transfer procedure, for example, in the case of a transfer fraud targeting the elderly. Presented to the terminal device 2.
 チャットボット31は、分析部33のアノマリ分析結果に基づき、振込手続の不正可能性として、例えば、ID/PWの悪用行為の場合、ID/PWの悪用行為対応のメッセージをメッセージDB22から抽出し、抽出したメッセージを端末装置2に提示する。 Based on the analysis result of the anomaly of the analysis unit 33, the chatbot 31 extracts from the message DB 22 a message corresponding to the misuse of the ID / PW, for example, in the case of the misuse of the ID / PW, as the possibility of fraudulent transfer procedure. The extracted message is presented to the terminal device 2.
 チャットボット31は、分析部33のアノマリ分析結果に基づき、振込手続の不正可能性として、例えば、サイバー攻撃の場合、サイバー攻撃対応のメッセージをメッセージDB22から抽出し、抽出したメッセージを端末装置2に提示する。 Based on the analysis result of the anomaly of the analysis unit 33, the chatbot 31 extracts a message corresponding to the cyber attack from the message DB 22 as a possibility of fraudulent transfer procedure, for example, in the case of a cyber attack, and transfers the extracted message to the terminal device 2. Present.
 次に本実施例の振込チャットシステム1の動作について説明する。図5は、振込チャット処理に関わるサーバ装置3の処理動作の一例を示すフローチャートである。図5においてサーバ装置3は、振込手続者の端末装置2から第1のアバタ31Aとの会話開始指示を受け付けたか否かを判定する(ステップS11)。尚、第1のアバタ31Aは、振込手続者に対して振込手続をサポートするキャラクタである。サーバ装置3は、端末装置2から第1のアバタ31Aとの会話開始指示を受け付けた場合(ステップS11:Yes)、第1のアバタ31Aの会話内容に対する振込手続者の入力内容を検出したか否かを判定する(ステップS12)。 Next, the operation of the transfer chat system 1 of this embodiment will be described. FIG. 5 is a flowchart showing an example of the processing operation of the server device 3 related to the transfer chat processing. In FIG. 5, the server device 3 determines whether or not a conversation start instruction with the first avatar 31A has been received from the terminal device 2 of the transfer procedure person (step S11). The first avatar 31A is a character that supports the transfer procedure for the transfer procedure person. When the server device 3 receives the conversation start instruction with the first avatar 31A from the terminal device 2 (step S11: Yes), whether or not the server device 3 has detected the input content of the transfer procedure person for the conversation content of the first avatar 31A. (Step S12).
 サーバ装置3は、端末装置2からの入力内容を検出した場合(ステップS12:Yes)、入力内容を特定する(ステップS13)。サーバ装置3は、入力内容を特定した場合、不正可能性DB21を参照して、入力内容をアノマリ分析する(ステップS14)。サーバ装置3は、入力内容のアノマリ分析結果に基づき、振込手続に対する不正可能性を検知したか否かを判定する(ステップS15)。サーバ装置3は、不正可能性を検知した場合(ステップS15:Yes)、不正可能性の内容を特定する(ステップS16)。尚、不正可能性の内容としては、例えば、高齢者を狙う振り込め詐欺、ID・PWの不正使用やサイバー攻撃等である。 When the server device 3 detects the input content from the terminal device 2 (step S12: Yes), the server device 3 specifies the input content (step S13). When the server device 3 specifies the input content, the server device 3 refers to the fraudulent possibility DB 21 and anomaly analyzes the input content (step S14). The server device 3 determines whether or not the possibility of fraud in the transfer procedure has been detected based on the result of the anomaly analysis of the input contents (step S15). When the server device 3 detects the possibility of fraud (step S15: Yes), the server device 3 identifies the content of the possibility of fraud (step S16). The contents of the possibility of fraud include, for example, transfer fraud targeting the elderly, fraudulent use of ID / PW, cyber attacks, and the like.
 サーバ装置3は、特定された不正可能性の内容に応じたメッセージをメッセージDB22から抽出し(ステップS17)、抽出したメッセージを振込手続者の端末装置2に対してチャット出力する(ステップS18)。その結果、端末装置2の振込手続者は、メッセージを見て振込手続の不正可能性を認識できる。振込手続者が善意の振込手続者の場合は、振込手続者に対して注意を喚起できる。また、振込手続者が悪意の振込手続者の場合は、振込手続者に対して不正の振込手続を牽制できる。 The server device 3 extracts a message according to the content of the identified fraudulent possibility from the message DB 22 (step S17), and chat-outputs the extracted message to the terminal device 2 of the transfer procedure person (step S18). As a result, the transfer procedure person of the terminal device 2 can recognize the possibility of fraudulent transfer procedure by looking at the message. If the transfer procedure person is a well-meaning transfer procedure person, the transfer procedure person can be alerted. In addition, if the transfer procedure person is a malicious transfer procedure person, it is possible to check the transfer procedure person for fraudulent transfer procedures.
 サーバ装置3は、端末装置2に対してメッセージをチャット出力した後、メッセージに応じた回答内容を端末装置2から検出したか否かを判定する(ステップS19)。サーバ装置3は、回答内容を端末装置2から検出した場合(ステップS19:Yes)、回答内容を特定する(ステップS20)。 After chatting out a message to the terminal device 2, the server device 3 determines whether or not the response content corresponding to the message is detected from the terminal device 2 (step S19). When the server device 3 detects the response content from the terminal device 2 (step S19: Yes), the server device 3 specifies the response content (step S20).
 サーバ装置3は、回答内容を特定した場合、不正可能性DB21を参照して、回答内容をアノマリ分析する(ステップS21)。サーバ装置3は、回答内容のアノマリ分析結果に基づき、不正可能性を検知したか否かを判定する(ステップS22)。 When the answer content is specified, the server device 3 refers to the fraudulent possibility DB 21 and anomaly analyzes the answer content (step S21). The server device 3 determines whether or not the possibility of fraud has been detected based on the anomaly analysis result of the answer content (step S22).
 サーバ装置3は、不正可能性を検知した場合(ステップS22:Yes)、端末装置2の振込手続者に対して牽制の上で、第1のアバタ31Aのチャットから有人チャット又は第2のアバタ31Bのチャットに切替える(ステップS23)。その結果、端末装置2の振込手続者は、有人チャット又は第2のアバタ31Bに切替えることで、更なる振込手続の不正可能性を認識できる。振込手続者が善意の振込手続者の場合は、更なる注意を喚起できる。また、振込手続者が悪意の振込手続者の場合は、更なる振込手続者への牽制を図ることができる。 When the server device 3 detects the possibility of fraud (step S22: Yes), the server device 3 checks against the transfer procedure person of the terminal device 2 from the chat of the first avatar 31A to the manned chat or the second avatar 31B. Switch to chat (step S23). As a result, the transfer procedure person of the terminal device 2 can recognize the possibility of further fraudulent transfer procedure by switching to the manned chat or the second avatar 31B. If the transfer procedure person is a well-meaning transfer procedure person, further attention can be drawn. In addition, if the transfer procedure person is a malicious transfer procedure person, it is possible to further restrain the transfer procedure person.
 サーバ装置3は、有人チャット又は第2のアバタ31Bのチャットに切替後、振込手続者との会話を実行する。第1のアバタ31Aから有人チャット又は第2のアバタ31Bに切り替えることで、振込手続者は、振込手続の不正可能性の注意を喚起できる。そして、サーバ装置3は、振込手続者との会話を実行し、振込手続者の振込手続が正常と判断した場合、端末装置2からの本人認証を開始し(ステップS24)、図5に示す処理動作を終了する。 The server device 3 executes a conversation with the transfer procedure person after switching to a manned chat or a chat of the second avatar 31B. By switching from the first avatar 31A to the manned chat or the second avatar 31B, the transfer procedure person can call attention to the possibility of fraudulent transfer procedure. Then, the server device 3 executes a conversation with the transfer procedure person, and when it is determined that the transfer procedure of the transfer procedure person is normal, the server device 3 starts personal authentication from the terminal device 2 (step S24), and the process shown in FIG. End the operation.
 また、サーバ装置3は、不正可能性を検知しなかった場合(ステップS22:No)、振込手続者の振込手続が正常と判断し、端末装置2からの本人認証を開始すべく、ステップS24に移行する。 Further, when the server device 3 does not detect the possibility of fraud (step S22: No), it is determined that the transfer procedure of the transfer procedure person is normal, and the personal authentication from the terminal device 2 is started in step S24. Transition.
 また、サーバ装置3は、不正可能性を検知しなかった場合(ステップS15:No)、全ての指定入力が完了したか否かを判定する(ステップS25)。尚、全ての指定入力とは、例えば、お客様番号、PW、振込先の店番号、振込先の口座番号や振込金額等の振込手続に関する入力である。サーバ装置3は、全ての指定入力が完了した場合(ステップS25:Yes)、振込手続者の振込手続が正常と判断し、端末装置2からの本人認証を開始すべく、ステップS24に移行する。 Further, when the server device 3 does not detect the possibility of fraud (step S15: No), it determines whether or not all the designated inputs have been completed (step S25). All designated inputs are, for example, inputs related to the transfer procedure such as the customer number, PW, the store number of the transfer destination, the account number of the transfer destination, and the transfer amount. When all the designated inputs are completed (step S25: Yes), the server device 3 determines that the transfer procedure of the transfer procedure person is normal, and proceeds to step S24 in order to start personal authentication from the terminal device 2.
 サーバ装置3は、全ての指定入力が完了しなかった場合(ステップS25:No)、第1のアバタ31Aの会話内容に対する入力内容を検出したか否かを判定すべく、ステップS12に移行する。また、サーバ装置3は、第1のアバタ31Aの会話内容に対する入力内容を検出しなかった場合(ステップS12:No)、第1のアバタ31Aの会話内容に対する入力内容を検出したか否かを判定すべく、ステップS12に移行する。 When all the designated inputs are not completed (step S25: No), the server device 3 proceeds to step S12 in order to determine whether or not the input contents for the conversation contents of the first avatar 31A have been detected. Further, when the server device 3 does not detect the input content for the conversation content of the first avatar 31A (step S12: No), it determines whether or not the input content for the conversation content of the first avatar 31A is detected. Therefore, the process proceeds to step S12.
 また、サーバ装置3は、端末装置2から第1のアバタ31Aとの会話開始指示を受け付けなかった場合(ステップS11:Yes)、図5に示す処理動作を終了する。サーバ装置3は、端末装置2から回答内容を検出しなかった場合(ステップS19:No)、端末装置2から回答内容を検出したか否かを判定すべく、ステップS19に移行する。 Further, when the server device 3 does not receive the conversation start instruction from the terminal device 2 to the first avatar 31A (step S11: Yes), the server device 3 ends the processing operation shown in FIG. When the server device 3 does not detect the response content from the terminal device 2 (step S19: No), the server device 3 proceeds to step S19 in order to determine whether or not the response content has been detected from the terminal device 2.
 サーバ装置3は、第1のアバタ31Aの会話内容に対する入力内容を端末装置2から検出した場合、入力内容からアノマリ分析し、アノマリ分析結果に基づき、振込手続の不正可能性を検知したか否かを判定する。サーバ装置3は、振込手続の不正可能性を検知した場合、不正可能性の内容に応じたメッセージを端末装置2に提示する。その結果、顧客は、第1のアバタ31Aの追加メッセージで振込手続の不正可能性の注意を喚起できる。 When the server device 3 detects the input content for the conversation content of the first avatar 31A from the terminal device 2, it analyzes the anomaly from the input content and determines whether or not the possibility of fraudulent transfer procedure is detected based on the anomaly analysis result. To judge. When the server device 3 detects the possibility of fraudulent transfer procedure, the server device 3 presents a message according to the content of the fraudulent possibility to the terminal device 2. As a result, the customer can call attention to the possibility of fraudulent transfer procedure with the additional message of the first avatar 31A.
 また、サーバ装置3は、メッセージに対応する回答内容を検出した場合、回答内容からアノマリ分析し、アノマリ分析結果に基づき、振込手続の不正可能性を検知したか否かを判定する。サーバ装置3は、振込手続の不正可能性を検知した場合に第1のアバタ31Aから第2のアバタ31B又は有人チャットに切替える。その結果、顧客は、第1のアバタ31Aから第2のアバタ31B又は有人チャットに切替えることで、振込手続の不正可能性の注意をより一層喚起できる。 Further, when the server device 3 detects the answer content corresponding to the message, it analyzes the anomaly from the answer content and determines whether or not the possibility of fraudulent transfer procedure is detected based on the anomaly analysis result. When the server device 3 detects the possibility of fraudulent transfer procedure, the server device 3 switches from the first avatar 31A to the second avatar 31B or a manned chat. As a result, the customer can further call attention to the possibility of fraudulent transfer procedures by switching from the first avatar 31A to the second avatar 31B or manned chat.
 図6は、正常時のチャット振込イメージの一例を示す説明図である。図6に示すチャット振込イメージは、端末装置2とサーバ装置3との間のチャット振込イメージである。尚、説明の便宜上、手続者の手続は振込手続、手続者の操作時間は通常、手続者の振込先はいつもと同じ、手続者の振込金額がいつもと同じ、手続者の操作端末もいつもと同じとする。 FIG. 6 is an explanatory diagram showing an example of a chat transfer image in a normal state. The chat transfer image shown in FIG. 6 is a chat transfer image between the terminal device 2 and the server device 3. For convenience of explanation, the procedure of the procedure is the transfer procedure, the operation time of the procedure is usually the same as the transfer destination of the procedure, the transfer amount of the procedure is the same as usual, and the operation terminal of the procedure is also the same as usual. Same.
 サーバ装置3は、第1のアバタ31Aから「対象のお取引を選択して下さい。」を端末装置2に提示する(ステップS41)。更に、サーバ装置3は、対象取引として、「振込」や「送金」等の選択ボタンを端末装置2に提示する。サーバ装置3は、「振込」の選択ボタンのボタン操作を検出した場合、第1のアバタ31Aから「振り込みですね。ログインします。」、更に「お客様番号を入力して下さい。」を端末装置2に提示する(ステップS42)。 The server device 3 presents "Please select a target transaction" from the first avatar 31A to the terminal device 2 (step S41). Further, the server device 3 presents a selection button such as "transfer" or "remittance" to the terminal device 2 as a target transaction. When the server device 3 detects the button operation of the "transfer" selection button, it displays "transfer. Log in." And "enter your customer number." From the first avatar 31A. Presented in 2 (step S42).
 サーバ装置3は、端末装置2からお客様番号の入力を検出した場合、第1のアバタ31Aから「PWを入力して下さい。」を端末装置2に提示する(ステップS43)。サーバ装置3は、端末装置2からPWの入力を検出した場合、PWのアノマリ分析を実行する(ステップS44)。サーバ装置3は、PWが正常の場合、第1のアバタ31Aから「振込先の店番号を入力して下さい。」を端末装置2に提示する(ステップS45)。 When the server device 3 detects the input of the customer number from the terminal device 2, the server device 3 presents "Enter PW" from the first avatar 31A to the terminal device 2 (step S43). When the server device 3 detects the input of the PW from the terminal device 2, the server device 3 executes the anomaly analysis of the PW (step S44). When the PW is normal, the server device 3 presents "Enter the store number of the transfer destination" from the first avatar 31A to the terminal device 2 (step S45).
 サーバ装置3は、端末装置2から振込先の店番号の入力を検出した場合、第1のアバタ31Aから「振込先の口座番号を入力して下さい。」を端末装置2に提示する(ステップS46)。更に、サーバ装置3は、端末装置2から振込先の口座番号の入力を検出した場合、振込先の口座番号のアノマリ分析を実行する(ステップS47)。サーバ装置3は、振込先の口座番号が正常の場合、第1のアバタ31Aから「お振込金額を入力して下さい。」を端末装置2に提示する(ステップS48)。 When the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, the server device 3 presents "Enter the account number of the transfer destination" from the first avatar 31A to the terminal device 2 (step S46). ). Further, when the server device 3 detects the input of the transfer destination account number from the terminal device 2, the server device 3 executes anomaly analysis of the transfer destination account number (step S47). When the transfer destination account number is normal, the server device 3 presents "Enter the transfer amount" from the first avatar 31A to the terminal device 2 (step S48).
 サーバ装置3は、端末装置2から振込金額の入力を検出した場合、振込金額のアノマリ分析を実行する(ステップS49)。サーバ装置3は、振込金額が正常の場合、第1のアバタ31Aから振込内容の確認画面及び確認ボタンを端末装置2に提示する(ステップS50)。サーバ装置3は、端末装置2から振込内容の「はい」の確認ボタンのボタン操作を検出した場合、第1のアバタ31Aから「本人認証します。愛犬のお名前を入力して下さい。」の認証画面を端末装置2に提示する(ステップS51)。この際、認証画面は、振込先の口座番号及び振込金額のアノマリ分析の分析結果が正常のため、簡易な認証方式とする。 When the server device 3 detects the input of the transfer amount from the terminal device 2, the server device 3 executes the anomaly analysis of the transfer amount (step S49). When the transfer amount is normal, the server device 3 presents the transfer content confirmation screen and confirmation button to the terminal device 2 from the first avatar 31A (step S50). When the server device 3 detects the button operation of the "Yes" confirmation button of the transfer contents from the terminal device 2, the first avatar 31A "authenticates the person. Please enter the name of your dog." The authentication screen is presented to the terminal device 2 (step S51). At this time, the authentication screen is a simple authentication method because the analysis result of the anomaly analysis of the transfer destination account number and the transfer amount is normal.
 サーバ装置3は、端末装置2から愛犬の名前の入力を検出した場合、振込を開始し、振込完了後に「振込完了しました。」を端末装置2に提示する(ステップS52)。その結果、サーバ装置3は、第1のアバタ31Aと端末装置2との間のチャットによる回答内容をアノマリ分析で確認しながら、回答内容が正常の場合に振込手続が完了できる。 When the server device 3 detects the input of the dog's name from the terminal device 2, the server device 3 starts the transfer, and after the transfer is completed, presents "the transfer is completed" to the terminal device 2 (step S52). As a result, the server device 3 can complete the transfer procedure when the answer contents are normal while confirming the answer contents by the chat between the first avatar 31A and the terminal device 2 by the anomaly analysis.
 図7A及び図7Bは、異常(振り込め詐欺)時のチャット振込イメージの一例を示す説明図である。図7A及び図7Bに示すチャット振込イメージは、端末装置2とサーバ装置3との間のチャット振込イメージである。尚、説明の便宜上、手続者の手続は振込手続、手続者の操作時間は通常、手続者の振込先は5年以上疲れていない口座、手続者の振込金額が50万円、手続者の操作端末もいつもと同じとする。 7A and 7B are explanatory diagrams showing an example of a chat transfer image at the time of abnormality (transfer fraud). The chat transfer image shown in FIGS. 7A and 7B is a chat transfer image between the terminal device 2 and the server device 3. For convenience of explanation, the procedure of the procedure is a transfer procedure, the operation time of the procedure is usually an account that has not been tired for 5 years or more, the transfer amount of the procedure is 500,000 yen, the operation of the procedure The terminal is the same as usual.
 図7Aにおいてサーバ装置3は、第1のアバタ31Aから「対象のお取引を選択して下さい。」を端末装置2に提示する(ステップS41)。更に、サーバ装置3は、対象取引として、「振込」や「送金」等の選択ボタンを端末装置2に提示する。サーバ装置3は、「振込」の選択ボタンのボタン操作を検出した場合、「振り込みですね。ログインします。」、更に「お客様番号を入力して下さい。」を端末装置2に提示する(ステップS42)。 In FIG. 7A, the server device 3 presents "Please select a target transaction" from the first avatar 31A to the terminal device 2 (step S41). Further, the server device 3 presents a selection button such as "transfer" or "remittance" to the terminal device 2 as a target transaction. When the server device 3 detects the button operation of the "transfer" selection button, it presents "transfer. Log in." And "enter the customer number." To the terminal device 2 (step). S42).
 サーバ装置3は、端末装置2からお客様番号の入力を検出した場合、「PWを入力して下さい。」を端末装置2に提示する(ステップS43)。サーバ装置3は、端末装置2からPWの入力を検出した場合、PWのアノマリ分析を実行する(ステップS44)。サーバ装置3は、PWが正常の場合、「振込先の店番号を入力して下さい。」を端末装置2に提示する(ステップS45)。 When the server device 3 detects the input of the customer number from the terminal device 2, it presents "Enter PW." To the terminal device 2 (step S43). When the server device 3 detects the input of the PW from the terminal device 2, the server device 3 executes the anomaly analysis of the PW (step S44). When the PW is normal, the server device 3 presents "Enter the store number of the transfer destination" to the terminal device 2 (step S45).
 サーバ装置3は、端末装置2から振込先の店番号の入力を検出した場合、「振込先の口座番号を入力して下さい。」を端末装置2に提示する(ステップS46)。更に、サーバ装置3は、端末装置2から振込先の口座番号の入力を検出した場合、振込先の口座番号が休眠口座であるか否かを判定するアノマリ分析を実行する(ステップS47A)。サーバ装置3は、アノマリ分析結果に基づき、振込先の口座番号の不正可能性がある場合、「振込先の口座は5年以上、使われていない口座です。お手続を進めますか?」のメッセージ及び確認ボタンを端末装置2に提示する(ステップS47B)。その結果、サーバ装置3は、善意の振込手続者に対して振込口座の不正可能性を喚起する。また、サーバ装置3は、悪意の振込手続者に対して不正の振込手続を牽制する。 When the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, it presents "Enter the account number of the transfer destination" to the terminal device 2 (step S46). Further, when the server device 3 detects the input of the transfer destination account number from the terminal device 2, the server device 3 executes an anomaly analysis for determining whether or not the transfer destination account number is a dormant account (step S47A). Based on the anomaly analysis result, if there is a possibility that the transfer destination account number is incorrect, the server device 3 will ask "The transfer destination account has not been used for 5 years or more. Do you want to proceed with the procedure?" The message and the confirmation button are presented to the terminal device 2 (step S47B). As a result, the server device 3 arouses the possibility of fraudulent transfer account to the transfer procedure person in good faith. Further, the server device 3 restrains the fraudulent transfer procedure against the malicious transfer procedure person.
 図7Bにおいてサーバ装置3は、端末装置2から「はい」の確認ボタンのボタン操作を検出した場合、「お振込金額を入力して下さい。」を端末装置2に提示する(ステップS48)。サーバ装置3は、端末装置2から振込金額の入力を検出した場合、振込金額のアノマリ分析を実行する(ステップS49A)。サーバ装置3は、アノマリ分析結果に基づき、振込金額の不正可能性がある場合、「今回の振込目的を選択して下さい。」及び振込目的選択ボタンを端末装置2に提示する(ステップS49B)。その結果、サーバ装置3は、善意の振込手続者に対して振込手続の不正可能性を喚起する。サーバ装置3は、悪意の振込手続者に対して不正の振込手続を牽制する。 In FIG. 7B, when the server device 3 detects the button operation of the confirmation button of "Yes" from the terminal device 2, it presents "Please enter the transfer amount" to the terminal device 2 (step S48). When the server device 3 detects the input of the transfer amount from the terminal device 2, the server device 3 executes the anomaly analysis of the transfer amount (step S49A). Based on the anomaly analysis result, the server device 3 presents "Please select the transfer purpose this time" and the transfer purpose selection button to the terminal device 2 when there is a possibility that the transfer amount is fraudulent (step S49B). As a result, the server device 3 arouses the possibility of fraudulent transfer procedure to the well-meaning transfer procedure person. The server device 3 restrains the fraudulent transfer procedure against the malicious transfer procedure person.
 サーバ装置3は、端末装置2から「子供への送金/仕送り」等の振込目的選択ボタンのボタン操作を検出した場合、「振り込め詐欺の可能性がございます。」を端末装置2に提示する(ステップS62)。サーバ装置3は、「ご家族宛にご連絡しますが、宜しいでしょうか?」及び確認ボタンを端末装置2に提示する(ステップS63)。その結果、サーバ装置3は、善意の振込手続者に対して振込手続の不正可能性を喚起する。サーバ装置3は、悪意の振込手続者に対して不正の振込手続を牽制する。 When the server device 3 detects a button operation of a transfer purpose selection button such as "remittance / remittance to a child" from the terminal device 2, it presents "there is a possibility of transfer fraud" to the terminal device 2 ( Step S62). The server device 3 presents "I will contact the family, is that okay?" And a confirmation button to the terminal device 2 (step S63). As a result, the server device 3 arouses the possibility of fraudulent transfer procedure to the well-meaning transfer procedure person. The server device 3 restrains the fraudulent transfer procedure against the malicious transfer procedure person.
 更に、サーバ装置3は、端末装置2から「はい」の確認ボタンのボタン操作を検出した場合、「本人認証します。ご登録済みの電話番号へSMSを送付しましたので、SMSより振込実行をして下さい。」を端末装置2に提示する(ステップS64)。そして、端末装置2の顧客は、受信したSMS上の振込ボタンのボタン操作に応じて振込を実行する(ステップS65)。 Furthermore, when the server device 3 detects the button operation of the "Yes" confirmation button from the terminal device 2, it "authenticates the person. Since the SMS was sent to the registered phone number, the transfer is executed from the SMS. Please do. ”To the terminal device 2 (step S64). Then, the customer of the terminal device 2 executes the transfer according to the button operation of the transfer button on the received SMS (step S65).
 図8A及び図8Bは、異常(振り込め詐欺)時のチャット振込イメージの一例を示す説明図である。図8A及び図8Bに示すチャット振込イメージは、端末装置2とサーバ装置3との間のチャット振込イメージである。尚、説明の便宜上、手続者の手続は振込、手続者の操作時間は通常、手続者の振込先は通常の口座、手続者の振込金額が50万円、手続者の操作端末もいつもと異なる端末装置2とする。 8A and 8B are explanatory diagrams showing an example of a chat transfer image at the time of abnormality (transfer fraud). The chat transfer image shown in FIGS. 8A and 8B is a chat transfer image between the terminal device 2 and the server device 3. For convenience of explanation, the procedure of the procedure is a transfer, the operation time of the procedure is usually, the transfer destination of the procedure is a normal account, the transfer amount of the procedure is 500,000 yen, and the operation terminal of the procedure is also different from usual. It is referred to as a terminal device 2.
 図8Aにおいてサーバ装置3は、「対象のお取引を選択して下さい。」を端末装置2に提示する(ステップS41)。更に、サーバ装置3は、対象取引として、「振込」や「送金」等の選択ボタンを端末装置2に提示する。サーバ装置3は、「振込」の選択ボタンのボタン操作を検出した場合、「振り込みですね。ログインします。」、更に「お客様番号を入力して下さい。」を端末装置2に提示する(ステップS42)。 In FIG. 8A, the server device 3 presents "Please select a target transaction" to the terminal device 2 (step S41). Further, the server device 3 presents a selection button such as "transfer" or "remittance" to the terminal device 2 as a target transaction. When the server device 3 detects the button operation of the "transfer" selection button, it presents "transfer. Log in." And "enter the customer number." To the terminal device 2 (step). S42).
 サーバ装置3は、端末装置2からお客様番号の入力を検出した場合、「PWを入力して下さい。」を端末装置2に提示する(ステップS43)。サーバ装置3は、端末装置2からPWの入力を検出した場合、PWのアノマリ分析を実行する(ステップS71)。更に、サーバ装置3は、アノマリ分析結果に基づき、例えば、端末装置2のMAC番号といつもの端末のMAC番号とを用いて、いつもと異なる端末装置2であるか否かを判定する。 When the server device 3 detects the input of the customer number from the terminal device 2, it presents "Enter PW." To the terminal device 2 (step S43). When the server device 3 detects the input of the PW from the terminal device 2, the server device 3 executes the anomaly analysis of the PW (step S71). Further, the server device 3 determines whether or not the terminal device 2 is different from the usual one by using, for example, the MAC number of the terminal device 2 and the MAC number of the usual terminal based on the anomaly analysis result.
 サーバ装置3は、現在の端末装置2が通常と異なる端末装置2の場合、振込手続が不正可能性ありと判断する。そして、サーバ装置3は、「操作者本人かどうかの確認のため、以下のご質問にお答えください。」及び「初めて飼ったペットのお名前は何でしょうか?」を端末装置2に提示する(ステップS72)。その結果、サーバ装置3は、善意の振込手続者に対して通常と異なる端末装置2による振込手続の不正可能性を喚起する。サーバ装置3は、悪意の振込手続者に対して不正の振込手続を牽制する。そして、サーバ装置3は、端末装置2からの回答内容を検出した場合、「振込先の店番号を入力して下さい。」を端末装置2に提示する(ステップS45)。 The server device 3 determines that the transfer procedure may be fraudulent if the current terminal device 2 is a terminal device 2 different from the normal one. Then, the server device 3 presents "Please answer the following questions to confirm the identity of the operator" and "What is the name of the pet you have for the first time?" To the terminal device 2 ( Step S72). As a result, the server device 3 arouses the possibility of fraudulent transfer procedure by the terminal device 2 which is different from the usual one to the well-meaning transfer procedure person. The server device 3 restrains the fraudulent transfer procedure against the malicious transfer procedure person. Then, when the server device 3 detects the content of the reply from the terminal device 2, it presents "Please enter the store number of the transfer destination" to the terminal device 2 (step S45).
 サーバ装置3は、端末装置2から振込先の店番号の入力を検出した場合、「振込先の口座番号を入力して下さい。」を端末装置2に提示する(ステップS46)。更に、図8Bにおいてサーバ装置3は、端末装置2から振込先の口座番号の入力を検出した場合、「お振込金額を入力して下さい。」を端末装置2に提示する(ステップS48)。サーバ装置3は、端末装置2から振込金額の入力を検出した場合、振込金額のアノマリ分析を実行する(ステップS73)。サーバ装置3は、アノマリ分析結果に基づき、振込金額が上限金額を超えて振込金額の不正可能性がある場合、「今回の振込目的を選択して下さい。」及び振込目的選択ボタンを端末装置2に提示する(ステップS74)。その結果、サーバ装置3は、善意の振込手続者に対して高額な振込金額による振込手続の不正可能性を喚起する。サーバ装置3は、悪意の振込手続者に対して不正の振込手続を牽制する。 When the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, it presents "Enter the account number of the transfer destination" to the terminal device 2 (step S46). Further, in FIG. 8B, when the server device 3 detects the input of the transfer destination account number from the terminal device 2, it presents "Please input the transfer amount" to the terminal device 2 (step S48). When the server device 3 detects the input of the transfer amount from the terminal device 2, the server device 3 executes the anomaly analysis of the transfer amount (step S73). Based on the anomaly analysis result, if the transfer amount exceeds the upper limit and there is a possibility that the transfer amount is fraudulent, the server device 3 presses the "Please select the transfer purpose this time" and the transfer purpose selection button to the terminal device 2. (Step S74). As a result, the server device 3 arouses the possibility of fraudulent transfer procedure with a high transfer amount to the well-meaning transfer procedure person. The server device 3 restrains the fraudulent transfer procedure against the malicious transfer procedure person.
 サーバ装置3は、端末装置2から「子供への送金/仕送り」等の振込目的選択ボタンのボタン操作を検出した場合、「子供への送金/仕送り」のアノマリ分析を実行する(ステップS75)。サーバ装置3は、「振り込め詐欺の可能性がございます。」、「ご家族宛にご連絡しますが、宜しいでしょうか?」及び確認ボタンを端末装置2に提示する(ステップS76)。その結果、サーバ装置3は、善意の振込手続者に対して振込手続の不正可能性を喚起する。サーバ装置3は、悪意の振込手続者に対して不正の振込手続を牽制する。 When the server device 3 detects the button operation of the transfer purpose selection button such as "remittance / remittance to the child" from the terminal device 2, the server device 3 executes the anomaly analysis of "remittance / remittance to the child" (step S75). The server device 3 presents "there is a possibility of transfer fraud", "I will contact the family, is that okay?" And a confirmation button to the terminal device 2 (step S76). As a result, the server device 3 arouses the possibility of fraudulent transfer procedure to the well-meaning transfer procedure person. The server device 3 restrains the fraudulent transfer procedure against the malicious transfer procedure person.
 更に、サーバ装置3は、端末装置2から「はい」の確認ボタンのボタン操作を検出した場合、「本人認証します。ご登録済みの電話番号へSMSを送付しましたので、SMSより振込実行をして下さい。」を端末装置2に提示する(ステップS77。その結果、端末装置2の顧客は、受信したSMS上の振込ボタンのボタン操作に応じて振込を実行する(ステップS78)。 Furthermore, when the server device 3 detects the button operation of the "Yes" confirmation button from the terminal device 2, it "authenticates the person. Since the SMS was sent to the registered phone number, the transfer is executed from the SMS. Please present to the terminal device 2 (step S77. As a result, the customer of the terminal device 2 executes the transfer in response to the button operation of the transfer button on the received SMS (step S78).
 図9A及び図9Bは、異常(振り込め詐欺)時のチャット振込イメージの一例を示す説明図である。図9A及び図9Bに示すチャット振込イメージは、端末装置2とサーバ装置3との間のチャット振込イメージである。尚、説明の便宜上、手続者の手続は振込手続、手続者の操作時間は通常、手続者の振込先は金融取引注意リストにある口座、手続者の振込金額が50万円、手続者の操作端末もいつもと同じとする。 FIGS. 9A and 9B are explanatory diagrams showing an example of a chat transfer image at the time of abnormality (transfer fraud). The chat transfer image shown in FIGS. 9A and 9B is a chat transfer image between the terminal device 2 and the server device 3. For convenience of explanation, the procedure of the procedure is the transfer procedure, the operation time of the procedure is usually the account on the financial transaction caution list, the transfer amount of the procedure is 500,000 yen, the operation of the procedure The terminal is the same as usual.
 図9Aにおいてサーバ装置3は、第1のアバタ31Aから「対象のお取引を選択して下さい。」を端末装置2に提示する(ステップS41)。更に、サーバ装置3は、対象取引として、「振込」や「送金」等の選択ボタンを端末装置2に提示する。サーバ装置3は、「振込」の選択ボタンのボタン操作を検出した場合、「振り込みですね。ログインします。」、更に「お客様番号を入力して下さい。」を端末装置2に提示する(ステップS42)。 In FIG. 9A, the server device 3 presents "Please select a target transaction" from the first avatar 31A to the terminal device 2 (step S41). Further, the server device 3 presents a selection button such as "transfer" or "remittance" to the terminal device 2 as a target transaction. When the server device 3 detects the button operation of the "transfer" selection button, it presents "transfer. Log in." And "enter the customer number." To the terminal device 2 (step). S42).
 サーバ装置3は、端末装置2からお客様番号の入力を検出した場合、「PWを入力して下さい。」を端末装置2に提示する(ステップS43)。サーバ装置3は、端末装置2からPWの入力を検出した場合、PWのアノマリ分析を実行する(ステップS44)。更に、サーバ装置3は、PWが正常の場合、「振込先の店番号を入力して下さい。」を端末装置2に提示する(ステップS45)。 When the server device 3 detects the input of the customer number from the terminal device 2, it presents "Enter PW." To the terminal device 2 (step S43). When the server device 3 detects the input of the PW from the terminal device 2, the server device 3 executes the anomaly analysis of the PW (step S44). Further, when the PW is normal, the server device 3 presents "Enter the store number of the transfer destination" to the terminal device 2 (step S45).
 サーバ装置3は、端末装置2から振込先の店番号の入力を検出した場合、「振込先の口座番号を入力して下さい。」を端末装置2に提示する(ステップS46)。サーバ装置3は、端末装置2から振込先の口座番号の入力を検出した場合、振込先の口座番号のアノマリ分析を実行する(ステップS81)。その結果、サーバ装置3は、振込先の口座番号のアノマリ分析結果に基づき、振込先の口座番号が新しい振込先であって、金融注意リストにある口座の場合、振込手続が不正可能性あると判断し、第1のアバタ31Aから第2のアバタ31Bに切り替える。 When the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, it presents "Enter the account number of the transfer destination" to the terminal device 2 (step S46). When the server device 3 detects the input of the transfer destination account number from the terminal device 2, the server device 3 executes anomaly analysis of the transfer destination account number (step S81). As a result, the server device 3 determines that the transfer procedure may be fraudulent if the transfer destination account number is a new transfer destination and the account is on the financial attention list, based on the result of the anomaly analysis of the transfer destination account number. Judgment is made, and the first avatar 31A is switched to the second avatar 31B.
 そして、サーバ装置3は、第2のアバタ31Bから「横から失礼します。」を端末装置2に提示する(ステップS82)。サーバ装置3は、第2のアバタ31Bから「振込口座は、金融注意リストにある口座です。」及び「本当にお手続を進めますか?」及び回答ボタンを端末装置2に提示する(ステップS83)。その結果、サーバ装置3は、第2のアバタ31Bの登場で、善意の振込手続者に対して金融注意リスト口座への振込手続の不正可能性をより一層喚起する。サーバ装置3は、悪意の振込手続者に対して不正の振込手続をより一層牽制する。図9Bにおいてサーバ装置3は、「はい」の回答ボタンのボタン操作を検出した場合、第2のアバタ31Bから「お振込金額を入力して下さい。」を端末装置2に提示する(ステップS48)。サーバ装置3は、端末装置2から振込金額の入力を検出した場合、振込金額のアノマリ分析を実行する(ステップS84)。サーバ装置3は、アノマリ分析結果に基づき、振込金額の不正可能性がある場合、「今回の振込目的を選択して下さい。」及び振込目的選択ボタンを端末装置2に提示する(ステップS85)。その結果、サーバ装置3は、善意の振込手続者に対して高額金融注意リスト口座への振込手続の不正可能性を喚起する。サーバ装置3は、悪意の振込手続者に対して不正の振込手続を牽制する。 Then, the server device 3 presents "Excuse me from the side" to the terminal device 2 from the second avatar 31B (step S82). The server device 3 presents "The transfer account is an account on the financial attention list" and "Are you sure you want to proceed?" And the answer button from the second avatar 31B to the terminal device 2 (step S83). .. As a result, with the advent of the second Avata 31B, the server device 3 further arouses the possibility of fraudulent transfer procedures to the financial attention list account to the well-meaning transfer procedure person. The server device 3 further restrains the fraudulent transfer procedure against the malicious transfer procedure person. When the server device 3 detects the button operation of the answer button of "Yes" in FIG. 9B, the server device 3 presents "Enter the transfer amount" to the terminal device 2 from the second avatar 31B (step S48). .. When the server device 3 detects the input of the transfer amount from the terminal device 2, the server device 3 executes the anomaly analysis of the transfer amount (step S84). Based on the anomaly analysis result, the server device 3 presents "Please select the transfer purpose this time" and the transfer purpose selection button to the terminal device 2 when there is a possibility that the transfer amount is fraudulent (step S85). As a result, the server device 3 arouses the possibility of fraudulent transfer procedures to the high-value financial attention list account to the well-meaning transfer procedure person. The server device 3 restrains the fraudulent transfer procedure against the malicious transfer procedure person.
 サーバ装置3は、端末装置2から「子供への送金/仕送り」等の振込目的選択ボタンのボタン操作を検出した場合、「子供への送金/仕送り」のアノマリ分析を実行する(ステップS86)。サーバ装置3は、「振り込め詐欺の可能性がございます。」を端末装置2に提示する(ステップS87)。サーバ装置3は、「金融機関/警察庁に情報を残しますが、宜しいでしょうか?」及び回答ボタンを端末装置2に提示する(ステップS88)。 When the server device 3 detects the button operation of the transfer purpose selection button such as "remittance / remittance to the child" from the terminal device 2, the server device 3 executes the anomaly analysis of "remittance / remittance to the child" (step S86). The server device 3 presents "there is a possibility of transfer fraud" to the terminal device 2 (step S87). The server device 3 presents "I will leave the information to the financial institution / National Police Agency, is that okay?" And the answer button to the terminal device 2 (step S88).
 更に、サーバ装置3は、端末装置2から「はい」の回答ボタンのボタン操作を検出した場合、「本人認証します。ご登録済みの電話番号へSMSを送付しましたので、SMSより振込実行をして下さい。」を端末装置2に提示する(ステップS89)。その結果、端末装置2の顧客は、受信したSMS上の振込ボタンのボタン操作に応じて振込を実行する(ステップS79)。 Furthermore, when the server device 3 detects the button operation of the answer button of "Yes" from the terminal device 2, it "authenticates the person. The SMS is sent to the registered telephone number, so the transfer is executed from the SMS. Please do. ”To the terminal device 2 (step S89). As a result, the customer of the terminal device 2 executes the transfer according to the button operation of the transfer button on the received SMS (step S79).
 図10A及び図10Bは、異常(振り込め詐欺)時のチャット振込イメージの一例を示す説明図である。図10A及び図10Bに示すチャット振込イメージは、端末装置2とサーバ装置3との間のチャット振込イメージである。尚、説明の便宜上、手続者の手続は振込手続、手続者の操作時間は通常、手続者の振込先は海外の口座、手続者の振込金額が50万円、手続者の操作端末もいつもと同じとする。 FIGS. 10A and 10B are explanatory diagrams showing an example of a chat transfer image at the time of abnormality (transfer fraud). The chat transfer image shown in FIGS. 10A and 10B is a chat transfer image between the terminal device 2 and the server device 3. For convenience of explanation, the procedure of the procedure is the transfer procedure, the operation time of the procedure is usually the overseas account, the transfer amount of the procedure is 500,000 yen, and the operation terminal of the procedure is also usual. Same.
 図10Aにおいてサーバ装置3は、第1のアバタ31Aから「対象のお取引を選択して下さい。」を端末装置2に提示する。更に、サーバ装置3は、対象取引として、「振込」や「送金」等の選択ボタンを端末装置2に提示する。サーバ装置3は、「振込」の選択ボタンのボタン操作を検出した場合、「振り込みですね。ログインします。」、更に「お客様番号を入力して下さい。」を端末装置2に提示する(ステップS42)。 In FIG. 10A, the server device 3 presents "Please select a target transaction" from the first avatar 31A to the terminal device 2. Further, the server device 3 presents a selection button such as "transfer" or "remittance" to the terminal device 2 as a target transaction. When the server device 3 detects the button operation of the "transfer" selection button, it presents "transfer. Log in." And "enter the customer number." To the terminal device 2 (step). S42).
 サーバ装置3は、端末装置2からお客様番号の入力を検出した場合、「PWを入力して下さい。」を端末装置2に提示する(ステップS43)。サーバ装置3は、端末装置2からPWの入力を検出した場合、PWのアノマリ分析を実行する(ステップS44)。更に、サーバ装置3は、PWが正常の場合、「振込先の店番号を入力して下さい。」を端末装置2に提示する(ステップS45)。 When the server device 3 detects the input of the customer number from the terminal device 2, it presents "Enter PW." To the terminal device 2 (step S43). When the server device 3 detects the input of the PW from the terminal device 2, the server device 3 executes the anomaly analysis of the PW (step S44). Further, when the PW is normal, the server device 3 presents "Enter the store number of the transfer destination" to the terminal device 2 (step S45).
 サーバ装置3は、端末装置2から振込先の店番号の入力を検出した場合、「振込先の口座番号を入力して下さい。」を端末装置2に提示する(ステップS46)。サーバ装置3は、端末装置2から振込先の口座番号の入力を検出した場合、振込先の口座番号のアノマリ分析を実行する(ステップS91)。その結果、サーバ装置3は、振込先の口座番号のアノマリ分析結果に基づき、振込先の口座番号が新しい振込先の場合、本振込手続の不正可能性があると判断し、第1のアバタ31Aから第2のアバタ31Bに切り替える。その結果、サーバ装置3は、第2のアバタ31Bの登場で、善意の振込手続者に対して振込口座への振込手続の不正可能性をより一層喚起する。サーバ装置3は、悪意の振込手続者に対して不正の振込手続をより一層牽制する。 When the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, it presents "Enter the account number of the transfer destination" to the terminal device 2 (step S46). When the server device 3 detects the input of the transfer destination account number from the terminal device 2, the server device 3 executes anomaly analysis of the transfer destination account number (step S91). As a result, the server device 3 determines that if the transfer destination account number is a new transfer destination, the transfer procedure may be fraudulent, based on the result of the anomaly analysis of the transfer destination account number, and the first avatar 31A To the second avatar 31B. As a result, with the advent of the second avatar 31B, the server device 3 further arouses the possibility of fraudulent transfer procedures to the transfer account to the well-meaning transfer procedure person. The server device 3 further restrains the fraudulent transfer procedure against the malicious transfer procedure person.
 そして、サーバ装置3は、第2のアバタ31Bから「横から失礼します。」を端末装置2に提示する(ステップS92)。サーバ装置3は、第2のアバタ31Bから「振込口座は、海外の口座です。」を端末装置2に提示する(ステップS93)。サーバ装置3は、第2のアバタ31Bから「本当にお手続を進めますか?」及び回答ボタンを端末装置2に提示する(ステップS94)。図10Bにおいてサーバ装置3は、「はい」の回答ボタンのボタン操作を検出した場合、第2のアバタ31Bから「お振込金額を入力して下さい。」を端末装置2に提示する(ステップS48)。サーバ装置3は、端末装置2から振込金額の入力を検出した場合、振込金額のアノマリ分析を実行する(ステップS95)。サーバ装置3は、アノマリ分析結果に基づき、振込金額の不正可能性がある場合、「誰に言われて振込をしていますか?」及び選択ボタンを端末装置2に提示する(ステップS96)。尚、選択ボタンは、例えば、「ご自身の意思」、「警察/銀行員」や「その他」等のボタンである。 Then, the server device 3 presents "Excuse me from the side" to the terminal device 2 from the second avatar 31B (step S92). The server device 3 presents "the transfer account is an overseas account" to the terminal device 2 from the second avatar 31B (step S93). The server device 3 presents the answer button and "Are you sure you want to proceed with the procedure?" From the second avatar 31B to the terminal device 2 (step S94). When the server device 3 detects the button operation of the answer button of "Yes" in FIG. 10B, the server device 3 presents "Enter the transfer amount" to the terminal device 2 from the second avatar 31B (step S48). .. When the server device 3 detects the input of the transfer amount from the terminal device 2, the server device 3 executes the anomaly analysis of the transfer amount (step S95). Based on the anomaly analysis result, the server device 3 presents "Who told me to make the transfer?" And a selection button to the terminal device 2 when there is a possibility that the transfer amount is fraudulent (step S96). The selection button is, for example, a button such as "your own intention", "police / bank clerk", or "other".
 サーバ装置3は、「その他」の選択ボタンのボタン操作を検出した場合、自由入力欄を端末装置2に提示する(ステップS97)。サーバ装置3は、端末装置2から自由入力欄への入力を検出した場合、「有人チャットへお繋ぎします。」を端末装置2に提示した後、第2のアバタ31Bのチャットから有人チャットに切替える(ステップS98)。その結果、有人チャットは、善意の振込手続者に対して振込手続の不正可能性を喚起する。有人チャットは、悪意の振込手続者に対して不正の振込手続を牽制する。 When the server device 3 detects the button operation of the "other" selection button, the server device 3 presents a free input field to the terminal device 2 (step S97). When the server device 3 detects the input to the free input field from the terminal device 2, it presents "Connect to the manned chat" to the terminal device 2, and then changes from the chat of the second avatar 31B to the manned chat. Switching (step S98). As a result, manned chat arouses the possibility of fraudulent transfer procedures to well-meaning transfer procedures. Manned chat restrains fraudulent transfer procedures against malicious transfer procedures.
 有人チャット端末は、有人チャット端末から「振込の目的を教えて下さい。」及び自由入力欄を端末装置2に提示する(ステップS98A)。有人チャット端末のオペレータは、自由入力欄への振込の目的を検出した場合、振込目的から手続が正常であるか否かを判断する。有人チャット端末は、手続が正常と判断された場合、「本人認証を行います。」を端末装置2に提示する。 The manned chat terminal presents "Please tell me the purpose of the transfer" and the free input field to the terminal device 2 from the manned chat terminal (step S98A). When the operator of the manned chat terminal detects the purpose of the transfer to the free input field, the operator determines whether or not the procedure is normal from the transfer purpose. If the procedure is determined to be normal, the manned chat terminal presents "Authenticate the person" to the terminal device 2.
 サーバ装置3は、顔認証機能を起動し(ステップS99)、顔認証がOKの場合、第2のアバタ31Bから「本人認証が出来ました。」及び「ありがとうございました。」を端末装置2に提示する(ステップS100)。そして、サーバ装置3は、端末装置2から「はい」の回答ボタンのボタン操作を検出した場合、「本人認証します。ご登録済みの電話番号へSMSを送付しましたので、SMSより振込実行をして下さい。」を端末装置2に提示する。その結果、端末装置2の顧客は、受信したSMS上の振込ボタンのボタン操作に応じて振込を実行する。 The server device 3 activates the face authentication function (step S99), and if the face authentication is OK, the second avatar 31B sends "personal authentication was successful" and "thank you" to the terminal device 2. Present (step S100). Then, when the server device 3 detects the button operation of the answer button of "Yes" from the terminal device 2, it "authenticates the person. The SMS is sent to the registered telephone number, so the transfer is executed from the SMS. Please do. "Is presented to the terminal device 2. As a result, the customer of the terminal device 2 executes the transfer according to the button operation of the transfer button on the received SMS.
 図11は、異常(ツール悪用)時のチャット振込イメージの一例を示す説明図である。図11に示すチャット振込イメージは、端末装置2とサーバ装置3との間のチャット振込イメージである。尚、説明の便宜上、手続者の手続は振込、手続者の操作時間は短い若しくは一定、手続者の振込先は通常、手続者の振込金額が1万円、手続者の操作端末もいつもと同じとする。 FIG. 11 is an explanatory diagram showing an example of a chat transfer image at the time of abnormality (tool abuse). The chat transfer image shown in FIG. 11 is a chat transfer image between the terminal device 2 and the server device 3. For convenience of explanation, the procedure of the procedure is a transfer, the operation time of the procedure is short or constant, the transfer destination of the procedure is usually 10,000 yen, and the operation terminal of the procedure is the same as usual. And.
 図11においてサーバ装置3は、第1のアバタ31Aから「対象のお取引を選択して下さい。」を端末装置2に提示する(ステップS41)。更に、サーバ装置3は、対象取引として、「振込」や「送金」等の選択ボタンを端末装置2に提示する。サーバ装置3は、「振込」の選択ボタンのボタン操作を検出した場合、「振り込みですね。ログインします。」、更に「お客様番号を入力して下さい。」を端末装置2に提示する(ステップS42)。 In FIG. 11, the server device 3 presents "Please select a target transaction" from the first avatar 31A to the terminal device 2 (step S41). Further, the server device 3 presents a selection button such as "transfer" or "remittance" to the terminal device 2 as a target transaction. When the server device 3 detects the button operation of the "transfer" selection button, it presents "transfer. Log in." And "enter the customer number." To the terminal device 2 (step). S42).
 サーバ装置3は、端末装置2からお客様番号の入力を検出した場合、「お客様番号を入力して下さい。」の提示からお客様番号入力を検出するまでの時間、例えば2秒を計測する。 When the server device 3 detects the input of the customer number from the terminal device 2, it measures the time from the presentation of "Please enter the customer number" to the detection of the customer number input, for example, 2 seconds.
 サーバ装置3は、端末装置2からお客様番号の入力を検出した場合、「PWを入力して下さい。」を端末装置2に提示する(ステップS43)。サーバ装置3は、端末装置2からPWの入力を検出した場合、PWのアノマリ分析を実行する(ステップS44)。更に、サーバ装置3は、端末装置2からのPWの入力を検出した場合、「PWを入力して下さい。」の提示からPW入力を検出するまでの時間、例えば2秒を計測する。 When the server device 3 detects the input of the customer number from the terminal device 2, it presents "Enter PW." To the terminal device 2 (step S43). When the server device 3 detects the input of the PW from the terminal device 2, the server device 3 executes the anomaly analysis of the PW (step S44). Further, when the server device 3 detects the input of the PW from the terminal device 2, the server device 3 measures the time from the presentation of "Please input the PW." To the detection of the PW input, for example, 2 seconds.
 更に、サーバ装置3は、PWが正常の場合、「振込先の店番号を入力して下さい。」を端末装置2に提示する(ステップS45)。サーバ装置3は、端末装置2から振込先の店番号の入力を検出した場合、「振込先の店番号を入力して下さい。」の提示から店番号入力を検出するまでの時間、例えば2秒を計測する。 Further, when the PW is normal, the server device 3 presents "Enter the store number of the transfer destination" to the terminal device 2 (step S45). When the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, the time from the presentation of "Please enter the store number of the transfer destination" to the detection of the store number input, for example, 2 seconds. To measure.
 更に、サーバ装置3は、端末装置2から振込先の店番号の入力を検出した場合、「振込先の口座番号を入力して下さい。」を端末装置2に提示する(ステップS46)。サーバ装置3は、端末装置2から振込先の口座番号の入力を検出した場合、「振込先の口座番号を入力して下さい。」の提示から口座番号入力を検出するまでの時間、例えば2秒を計測する。更に、サーバ装置3は、振込先の口座番号のアノマリ分析を実行し(ステップS47)、振込手続が正常と判断する。 Further, when the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, it presents "Enter the account number of the transfer destination" to the terminal device 2 (step S46). When the server device 3 detects the input of the transfer destination account number from the terminal device 2, the time from the presentation of "Please enter the transfer destination account number" to the detection of the account number input, for example, 2 seconds. To measure. Further, the server device 3 executes anomaly analysis of the transfer destination account number (step S47), and determines that the transfer procedure is normal.
 更に、サーバ装置3は、端末装置2から振込先の店番号の入力を検出した場合、「お振込金額を入力して下さい。」を端末装置2に提示する(ステップS48)。サーバ装置3は、端末装置2から振込金額の入力を検出した場合、「お振込金額を入力して下さい。」の提示から振込金額入力を検出するまでの時間、例えば2秒を計測する。更に、サーバ装置3は、振込金額のアノマリ分析を実行し、振込手続が正常と判断する。 Further, when the server device 3 detects the input of the store number of the transfer destination from the terminal device 2, it presents "Please input the transfer amount" to the terminal device 2 (step S48). When the server device 3 detects the input of the transfer amount from the terminal device 2, it measures the time from the presentation of "Enter the transfer amount" to the detection of the transfer amount input, for example, 2 seconds. Further, the server device 3 executes an anomaly analysis of the transfer amount and determines that the transfer procedure is normal.
 更に、サーバ装置3は、メッセージ提示からメッセージ回答の入力検出までのメッセージ毎の計測時間が2秒間、一定期間の場合、人手による入力操作でなく、コンピュータによる不正操作と判断する(ステップS101)。サーバ装置3は、「人による操作の確認のため、以下から人の画像を選択して下さい。」及び複数の選択画像を端末装置2に提示する(ステップS102)。 Further, if the measurement time for each message from the message presentation to the detection of the input of the message reply is 2 seconds for a certain period, the server device 3 determines that the operation is not a manual input operation but an unauthorized operation by a computer (step S101). The server device 3 presents "Please select a human image from the following to confirm the operation by a human" and a plurality of selected images to the terminal device 2 (step S102).
 サーバ装置3は、端末装置2からの選択画像の入力を所定時間内に検出しなかった場合(ステップS103)、「時間を超過したため、処理を中止します。」を端末装置2に提示し、振込手続を中止する(ステップS104)。 When the server device 3 does not detect the input of the selected image from the terminal device 2 within the predetermined time (step S103), the server device 3 presents to the terminal device 2 "The processing is canceled because the time has been exceeded." Cancel the transfer procedure (step S104).
 また、サーバ装置3は、端末装置2からの誤った選択画像の選択を検出した場合も、「選択画像が間違っているため、処理を中止します。」を端末装置2に提示し、振込手続を中止する。 Further, even when the server device 3 detects an erroneous selection of the selected image from the terminal device 2, it presents "The processing is canceled because the selected image is incorrect" to the terminal device 2 and performs the transfer procedure. To cancel.
 尚、図11に示す例では、操作時間が一定期間の場合に振込手続の不正可能性があと判断する場合を例示したが、一定額を毎日別口座に振り込むような状態を検出した場合も、振込手続の不正可能性があると判断しても良く、適宜変更可能である。 In the example shown in FIG. 11, the case where it is determined that the transfer procedure may be fraudulent when the operation time is a certain period is illustrated, but it is also possible to detect a state where a certain amount is transferred to another account every day. It may be judged that the transfer procedure may be fraudulent, and it can be changed as appropriate.
 また、操作時間が短時間の場合に人手による入力操作ではなく、コンピュータによる不正操作と判断し、振込手続の不正可能性があると判断しても良い。また、操作時間が遅すぎる場合に振込手続の不正可能性があると判断して良い。 Further, when the operation time is short, it may be determined that the operation is not a manual input operation but an illegal operation by a computer, and it may be determined that the transfer procedure may be illegal. In addition, if the operation time is too late, it may be determined that the transfer procedure may be fraudulent.
 本実施例のサーバ装置3は、第1のアバタ31Aのチャットボットとの会話として受け付けた内容又は受け付けたタイミングに基づいて、手続が不正の可能性を分析する。サーバ装置3は、手続が不正と判断された場合には、第1のアバタ31Aと対応付けられたチャットボットの会話から、第2のアバタ31Bと対応付けられたチャットボットとの会話、又は有人チャットでの会話に切り替える。その結果、第1のアバタ31Aの会話から第2のアバタ31B又は有人チャットの会話に切替わることで、振込手続に対する不正の可能性を振込手続者に喚起できる。 The server device 3 of this embodiment analyzes the possibility that the procedure is fraudulent based on the content received as a conversation with the chatbot of the first avatar 31A or the reception timing. When the procedure is determined to be fraudulent, the server device 3 has a conversation with the chatbot associated with the first avatar 31A, a conversation with the chatbot associated with the second avatar 31B, or a manned person. Switch to a chat conversation. As a result, by switching from the conversation of the first avatar 31A to the conversation of the second avatar 31B or the manned chat, the possibility of fraudulent transfer procedure can be aroused to the transfer procedure person.
 サーバ装置3は、第2のアバタ31Bと対応付けられたチャットボットとの会話又は有人チャットでの会話と、第1のアバタ31Aと対応付けられたチャットボットとの会話とを識別可能に表示するように端末装置に提示する。その結果、端末装置2の振込手続者は、第1のアバタ31Aの会話と、第2のアバタ31Bの会話又は有人チャットの会話とを視認できる。 The server device 3 identifiablely displays a conversation with a chatbot associated with the second avatar 31B or a conversation in a manned chat with a conversation with the chatbot associated with the first avatar 31A. Presented to the terminal device. As a result, the transfer procedure person of the terminal device 2 can visually recognize the conversation of the first avatar 31A and the conversation of the second avatar 31B or the conversation of the manned chat.
 サーバ装置3は、振込手続が不正と判断された場合には、第2のアバタ31Bと対応付けられたチャットボットとの会話による追加対問合せを実行する。その結果、サーバ装置3は、振込手続者に追加問合せを行うことで、善意の振込手続者に不正の振込手続への注意を喚起させると共に、悪意の振込手続者に対して不正の振込手続を牽制できる。 When the transfer procedure is determined to be fraudulent, the server device 3 executes an additional inquiry by conversation with the chatbot associated with the second avatar 31B. As a result, the server device 3 makes an additional inquiry to the transfer procedure person to alert the well-meaning transfer procedure person to the fraudulent transfer procedure, and at the same time, perform the fraudulent transfer procedure to the malicious transfer procedure person. Can be restrained.
 サーバ装置3は、追加問合せに対してメタ情報を生成しても良いとの回答を受信した場合に、追加問合せに対するメタ情報を生成し、生成したメタ情報を、例えば、金融機関や警察庁に記録する。その結果、サーバ装置3は、例えば、手続者との会話内容等のメタ情報を記録に残すことで、不正の振込手続を牽制できる。 When the server device 3 receives a reply that the meta information may be generated for the additional inquiry, the server device 3 generates the meta information for the additional inquiry and sends the generated meta information to, for example, a financial institution or the National Police Agency. Record. As a result, the server device 3 can check the fraudulent transfer procedure by recording the meta information such as the content of the conversation with the procedure person, for example.
 サーバ装置3は、第2のアバタ31Bと対応付けられたチャットボットとの会話又は有人チャットでの会話は、不正の抑制可能性がある内容である。その結果、サーバ装置3は、振込手続者との会話内容を不性の抑制可能性がある内容とすることで、善意の振込手続者に不正の振込手続への注意を喚起させると共に、悪意の振込手続者に対して不正の振込手続を牽制できる。 The server device 3 has a content that may suppress fraud in a conversation with a chatbot associated with the second avatar 31B or a conversation in a manned chat. As a result, the server device 3 makes the content of the conversation with the transfer procedure person a content that may suppress the improperness, so that the transfer procedure person in good faith is alerted to the fraudulent transfer procedure and is malicious. It is possible to check fraudulent transfer procedures for transfer procedures.
 サーバ装置3は、第1のアバタ31Aのチャットボットとの会話として受け付けた内容又は受け付けたタイミングに基づいて、手続が不正の可能性を分析する。サーバ装置3は、手続が不正と判断された場合には、第1のアバタ31Aと対応付けられたチャットボットとの会話による追加問合せを実行する。その結果、サーバ装置3は、端末装置2の手続者に追加問合せを行うことで、善意の振込手続者に不正の振込手続への注意を喚起させると共に、悪意の振込手続者に対して不正の振込手続を牽制できる。 The server device 3 analyzes the possibility that the procedure is fraudulent based on the content received as a conversation with the chatbot of the first avatar 31A or the reception timing. When the procedure is determined to be fraudulent, the server device 3 executes an additional inquiry by conversation between the first avatar 31A and the chatbot associated with the first avatar 31A. As a result, the server device 3 makes an additional inquiry to the procedure person of the terminal device 2, so that the well-meaning transfer procedure person is alerted to the fraudulent transfer procedure, and the server device 3 is fraudulent to the malicious transfer procedure person. You can check the transfer procedure.
 サーバ装置3では、チャットボットを使用して操作ログが残るため、ログ分析により、確実に犯罪行為の疑いがある操作を検知可能とする。更に、サーバ装置3では、不正の可能性、例えば、犯罪行為の疑いがある操作に対して、チャットボットで操作を止める/留まらせるメッセージを振込手続者に提示する。その結果、振込手続に対する不正の可能性を振込手続者に喚起できる。そして、振り込め詐欺、ID/PWの不正利用やサイバー攻撃等の犯罪行為から善意の振込手続者を守ることができる。 Since the operation log remains in the server device 3 using the chatbot, it is possible to reliably detect the operation suspected of being a criminal act by log analysis. Further, the server device 3 presents a message to the transfer procedure person to stop / stay the operation with the chatbot for the possibility of fraud, for example, the operation suspected of being a criminal act. As a result, the possibility of fraudulent transfer procedures can be raised to the transfer procedure person. Then, it is possible to protect a well-meaning transfer procedure person from criminal acts such as transfer fraud, unauthorized use of ID / PW, and cyber attacks.
 サーバ装置3では、チャットボットで行われるインタラクティブなやり取りのログから、犯罪行為の疑いがある操作を検知し、犯罪行為を牽制するような不規則な問い掛けを追加で実施することで、善意の振込手続者の資産の流出を未然に防止できる。 The server device 3 detects operations suspected of being a criminal act from the log of interactive exchanges performed by the chatbot, and additionally asks irregular questions to restrain the criminal act, thereby transferring in good faith. The outflow of the procedureer's assets can be prevented.
 サーバ装置3では、振り込め詐欺の疑いがある取引に対してインタラクティブに問い掛けすることで、お客様に気付きを与えることが可能である。 With the server device 3, it is possible to give notice to the customer by interactively asking the transaction suspected of being a transfer fraud.
 サーバ装置3では、善意の振込手続者が本人ではない(ID/PWを盗まれた)場合、複数の質問をすることで、犯罪を牽制させることが可能である。その結果、振り込め詐欺の被害が少なくなる。インタラクティブに注意喚起することで、銀行の責任範囲を狭めることが可能である。 In the server device 3, if the transfer procedure person in good faith is not the person (ID / PW is stolen), it is possible to restrain the crime by asking a plurality of questions. As a result, the damage caused by transfer fraud is reduced. By interactively alerting, it is possible to narrow the scope of responsibility of the bank.
 チャットのため、コミュニケーションをしている中での違和感を検知できる。更に、チャットのため、アクションの都度チェックが可能なため、危機をリアルタイムで検知できる。しかも、チャットボットログの分析結果から、ユーザーへ「不規則な問い掛け」を追加で実施できる。しかも、オペレーション間の間隔をチェックすることでサイバー攻撃を抑制できる。 Because of chat, it is possible to detect discomfort during communication. Furthermore, because it is a chat, it is possible to check each action, so it is possible to detect a crisis in real time. Moreover, from the analysis results of the chatbot log, it is possible to additionally ask the user "irregular questions". Moreover, cyber attacks can be suppressed by checking the intervals between operations.
 尚、本実施例では、手続として振込手続を例示したが、振込手続に限定されるものではなく、チャットボットを利用した各種手続に適用可能である。 Although the transfer procedure is illustrated as a procedure in this embodiment, it is not limited to the transfer procedure and can be applied to various procedures using a chatbot.
 本実施例では、サーバ装置3内のチャットボットと振込手続者の端末装置2との間で会話形式のチャットで振込手続を実行する場合を例示した。しかしながら、チャットボットは、サーバ装置3で実行するものに限定されるものではなく、クラウドで実行しても良く、適宜変更可能である。 In this embodiment, a case where the transfer procedure is executed by a conversational chat between the chatbot in the server device 3 and the terminal device 2 of the transfer procedure person is illustrated. However, the chatbot is not limited to the one executed by the server device 3, and may be executed in the cloud, and can be changed as appropriate.
 また、図示した各部の各構成要素は、必ずしも物理的に図示の如く構成されていることを要しない。すなわち、各部の分散・統合の具体的形態は図示のものに限られず、その全部又は一部を、各種の負荷や使用状況等に応じて、任意の単位で機能的又は物理的に分散・統合して構成することができる。 Further, each component of each part shown in the figure does not necessarily have to be physically configured as shown in the figure. That is, the specific form of distribution / integration of each part is not limited to the one shown in the figure, and all or part of them may be functionally or physically distributed / integrated in any unit according to various loads and usage conditions. Can be configured.
 更に、各装置で行われる各種処理機能は、CPU(Central Processing Unit)、DSP(Digital Signal Processor)やFPGA(Field Programmable Gate Array)等上で、その全部又は任意の一部を実行するようにしても良い。また、各種処理機能は、CPU等で解析実行するプログラム上、又はワイヤードロジックによるハードウェア上で、その全部又は任意の一部を実行するようにしても良い。 Furthermore, the various processing functions performed by each device are such that all or any part of them is executed on the CPU (Central Processing Unit), DSP (Digital Signal Processor), FPGA (Field Programmable Gate Array), etc. Is also good. Further, the various processing functions may be executed in whole or in an arbitrary part on a program to be analyzed and executed by a CPU or the like, or on hardware by wired logic.
 各種情報を記憶する領域は、例えば、ROM(Read Only Memory)や、SDRAM(Synchronous Dynamic Random Access Memory)、MRAM(Magnetoresistive Random Access Memory)やNVRAM(Non-Volatile Random Access Memory)等のRAM(Random Access Memory)で構成しても良い。 The area for storing various information is, for example, ROM (Read Only Memory), DRAM (Synchronous Dynamic Random Access Memory), MRAM (Magnetoresistive Random Access Memory), NVRAM (Non-Volatile Random Access Memory), or other RAM (Random Access). Memory) may be used.
 ところで、本実施例で説明した各種の処理は、予め用意されたプログラムをコンピュータ内のCPU等のプロセッサで実行させることによって実現できる。そこで、以下では、上記実施例と同様の機能を有するプログラムを実行する情報処理装置100の一例を説明する。図12は、チャット切替プログラムを実行する情報処理装置100の一例を示す説明図である。 By the way, various processes described in this embodiment can be realized by executing a program prepared in advance by a processor such as a CPU in the computer. Therefore, in the following, an example of the information processing apparatus 100 that executes a program having the same function as that of the above embodiment will be described. FIG. 12 is an explanatory diagram showing an example of the information processing apparatus 100 that executes the chat switching program.
 図19に示すチャット切替プログラムを実行する情報処理装置100は、通信装置110と、入力装置120と、表示装置130と、ROM140と、RAM150と、プロセッサ160と、バス170とを有する。通信装置110、入力装置120、表示装置130、ROM140、RAM150及びプロセッサ160は、バス170を介して接続される。通信装置110は、顧客が操作する端末装置と接続するネットワークとの通信を司る。 The information processing device 100 that executes the chat switching program shown in FIG. 19 includes a communication device 110, an input device 120, a display device 130, a ROM 140, a RAM 150, a processor 160, and a bus 170. The communication device 110, the input device 120, the display device 130, the ROM 140, the RAM 150, and the processor 160 are connected via the bus 170. The communication device 110 controls communication between the terminal device operated by the customer and the network connected to the terminal device.
 そして、ROM140には、上記実施例と同様の機能を発揮するチャット切替示プログラムが予め記憶されている。ROM140は、チャット切替プログラムとして受付プログラム140A、分析プログラム140B及び切替プログラム140Cが記憶されている。尚、ROM140ではなく、図示せぬドライブでコンピュータ読取可能な記録媒体にチャット切替プログラムが記録されていても良い。また、記録媒体としては、例えば、CD-ROM、DVDディスク、USBメモリ等の可搬型記録媒体、フラッシュメモリ等の半導体メモリ等でも良い。 Then, in the ROM 140, a chat switching display program that exhibits the same function as that of the above embodiment is stored in advance. The ROM 140 stores the reception program 140A, the analysis program 140B, and the switching program 140C as chat switching programs. The chat switching program may be recorded on a computer-readable recording medium with a drive (not shown) instead of the ROM 140. The recording medium may be, for example, a portable recording medium such as a CD-ROM, a DVD disk, or a USB memory, or a semiconductor memory such as a flash memory.
 そして、プロセッサ160は、受付プログラム140AをROM140から読み出し、RAM150上で受付プロセス160Aとして機能させる。更に、プロセッサ160は、分析プログラム140BをROM140から読み出し、RAM150上で分析プロセス160Bとして機能させる。更に、プロセッサ160は、切替プログラム140CをROM140から読み出し、RAM150上で切替プロセス160Cとして機能させる。 Then, the processor 160 reads the reception program 140A from the ROM 140 and makes it function as the reception process 160A on the RAM 150. Further, the processor 160 reads the analysis program 140B from the ROM 140 and makes it function as the analysis process 160B on the RAM 150. Further, the processor 160 reads the switching program 140C from the ROM 140 and makes it function as the switching process 160C on the RAM 150.
 プロセッサ160は、第1のアバタと対応付けられたチャットボットとの手続に関する会話の開始指示を受け付ける。プロセッサ160は、チャットボットとの会話として受け付けた内容又は受け付けたタイミングに基づいて、手続が不正の可能性を分析する。プロセッサ160は、手続が不正と判断された場合には、第1のアバタと対応付けられたチャットボットの会話から、第1のアバタと異なる第2のアバタと対応付けられたチャットボットとの会話、又は有人チャットでの会話に切り替える。その結果、第1のアバタの会話から第2のアバタ又は有人チャットの会話に切替わることで、手続に対する不正の可能性を手続者に喚起できる。 The processor 160 receives an instruction to start a conversation regarding the procedure between the first avatar and the associated chatbot. The processor 160 analyzes the possibility that the procedure is fraudulent based on the content received as a conversation with the chatbot or the timing of the reception. When the procedure is determined to be fraudulent, the processor 160 changes the conversation of the chatbot associated with the first avatar to the conversation with the chatbot associated with the second avatar different from the first avatar. Or switch to a manned chat conversation. As a result, by switching from the conversation of the first avatar to the conversation of the second avatar or manned chat, the possibility of fraudulent procedure can be aroused to the procedure person.
 1 振込チャットシステム
 2 端末装置
 3 サーバ装置
 31 チャットボット
 31A 第1のアバタ
 31B 第2のアバタ
 32 受付部
 33 分析部
 34 切替部
1 Transfer chat system 2 Terminal device 3 Server device 31 Chatbot 31A 1st avatar 31B 2nd avatar 32 Reception section 33 Analysis section 34 Switching section

Claims (9)

  1.  第1のアバタと対応付けられたチャットボットとの手続に関する会話の開始指示を受け付け、
     前記チャットボットとの会話として受け付けた内容又は受け付けたタイミングに基づいて、前記手続に対する不正の可能性を分析し、
     前記手続に対する不正の可能性があると判断された場合には、前記第1のアバタと対応付けられたチャットボットとの会話から、前記第1のアバタと異なる第2のアバタと対応付けられたチャットボットとの会話、又は有人チャットでの会話に切り替える、
     処理をコンピュータに実行させることを特徴とするチャット切替プログラム。
    Accepting instructions to start a conversation about the procedure between the first avatar and the associated chatbot,
    Based on the content accepted as a conversation with the chatbot or the timing of acceptance, the possibility of fraud against the procedure is analyzed.
    When it was determined that there was a possibility of fraudulent activity against the procedure, the conversation with the chatbot associated with the first avatar was associated with a second avatar different from the first avatar. Switch to a chatbot conversation or a manned chat conversation,
    A chat switching program characterized by having a computer execute processing.
  2.  前記第2のアバタと対応付けられたチャットボットとの会話又は前記有人チャットでの会話と、前記第1のアバタと対応付けられたチャットボットとの会話とを識別可能に表示するように端末装置に提示する
     処理を前記コンピュータに実行させることを特徴とする請求項1に記載のチャット切替プログラム。
    A terminal device for identifiablely displaying a conversation with a chatbot associated with the second avatar or a conversation with the chatbot associated with the first avatar and a conversation with the chatbot associated with the first avatar. The chat switching program according to claim 1, wherein the computer executes the process presented in 1.
  3.  前記手続に対する不正の可能性があると判断された場合には、前記第2のアバタと対応付けられたチャットボットとの会話で追加の問合せを実行する
     処理を前記コンピュータに実行させることを特徴とする請求項1に記載のチャット切替プログラム。
    When it is determined that there is a possibility of fraudulent activity against the procedure, the computer is made to execute a process of executing an additional inquiry in a conversation between the second avatar and the chatbot associated with the second avatar. The chat switching program according to claim 1.
  4.  前記手続に対する不正の可能性があると判断された場合には、前記第2のアバタと対応付けられたチャットボットとの会話で追加の問合せを実行する
     処理を前記コンピュータに実行させることを特徴とする請求項2に記載のチャット切替プログラム。
    When it is determined that there is a possibility of fraudulent activity against the procedure, the computer is made to execute a process of executing an additional inquiry in a conversation between the second avatar and the chatbot associated with the second avatar. The chat switching program according to claim 2.
  5.  前記追加の問合せに対してメタ情報を生成しても良いとの回答を受信した場合に、前記追加の問合せに対する前記メタ情報を生成し、生成した前記メタ情報を記録する
     処理を前記コンピュータに実行させることを特徴とする請求項4に記載のチャット切替プログラム。
    When a reply that meta information may be generated for the additional query is received, the computer executes a process of generating the meta information for the additional query and recording the generated meta information. The chat switching program according to claim 4, wherein the chat is switched.
  6.  前記第2のアバタと対応付けられたチャットボットとの会話又は前記有人チャットでの会話は、前記手続に対する不正の抑制可能性がある内容であることを特徴とする請求項1~5の何れか一つに記載のチャット切替プログラム。 Any of claims 1 to 5, wherein the conversation with the chatbot associated with the second avatar or the conversation in the manned chat has a content that may suppress fraud against the procedure. The chat switching program described in one.
  7.  第1のアバタと対応付けられたチャットボットとの手続に関する会話の開始指示を受け付け、
     前記チャットボットとの会話として受け付けた内容又は受け付けたタイミングに基づいて、前記手続に対する不正の可能性を分析し、
     前記手続に対する不正の可能性があると判断された場合には、前記第1のアバタと対応付けられたチャットボットとの会話で追加の問合せを実行する
     処理をコンピュータに実行させることを特徴とするチャット処理プログラム。
    Accepting instructions to start a conversation about the procedure between the first avatar and the associated chatbot,
    Based on the content accepted as a conversation with the chatbot or the timing of acceptance, the possibility of fraud against the procedure is analyzed.
    When it is determined that there is a possibility of fraudulent activity against the procedure, the computer is made to execute a process of executing an additional inquiry in a conversation between the first avatar and the chatbot associated with the first avatar. Chat processing program.
  8.  第1のアバタと対応付けられたチャットボットとの手続に関する会話の開始指示を受け付ける受付部と、
     前記チャットボットとの会話として受け付けた内容又は受け付けたタイミングに基づいて、前記手続に対する不正の可能性を分析する分析部と、
     前記手続に対する不正の可能性があると判断された場合には、前記第1のアバタと対応付けられたチャットボットとの会話から、前記第1のアバタと異なる第2のアバタと対応付けられたチャットボットとの会話、又は有人チャットでの会話に切り替える切替部と、
     を有することを特徴とする情報処理装置。
    A reception unit that accepts instructions to start a conversation regarding the procedure between the first avatar and the associated chatbot,
    An analysis unit that analyzes the possibility of fraud against the procedure based on the content or timing of the conversation with the chatbot.
    When it was determined that there was a possibility of fraudulent activity against the procedure, the conversation with the chatbot associated with the first avatar was associated with a second avatar different from the first avatar. A switching unit that switches to a conversation with a chatbot or a conversation with a manned chat,
    An information processing device characterized by having.
  9.  コンピュータが、
     第1のアバタと対応付けられたチャットボットとの手続に関する会話の開始指示を受け付け、
     前記チャットボットとの会話として受け付けた内容又は受け付けたタイミングに基づいて、前記手続に対する不正の可能性を分析し、
     前記手続に対する不正の可能性があると判断された場合には、前記第1のアバタと対応付けられたチャットボットとの会話から、前記第1のアバタと異なる第2のアバタと対応付けられたチャットボットとの会話、又は有人チャットでの会話に切り替える、
     処理を実行することを特徴とするチャット切替方法。
    The computer
    Accepting instructions to start a conversation about the procedure between the first avatar and the associated chatbot,
    Based on the content accepted as a conversation with the chatbot or the timing of acceptance, the possibility of fraud against the procedure is analyzed.
    When it was determined that there was a possibility of fraudulent activity against the procedure, the conversation with the chatbot associated with the first avatar was associated with a second avatar different from the first avatar. Switch to a chatbot conversation or a manned chat conversation,
    A chat switching method characterized by executing processing.
PCT/JP2020/035493 2020-09-18 2020-09-18 Chatting switching program, chatting processing program, information processing device, and chatting switching method WO2022059172A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
JP2022550294A JPWO2022059172A1 (en) 2020-09-18 2020-09-18
PCT/JP2020/035493 WO2022059172A1 (en) 2020-09-18 2020-09-18 Chatting switching program, chatting processing program, information processing device, and chatting switching method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/JP2020/035493 WO2022059172A1 (en) 2020-09-18 2020-09-18 Chatting switching program, chatting processing program, information processing device, and chatting switching method

Publications (1)

Publication Number Publication Date
WO2022059172A1 true WO2022059172A1 (en) 2022-03-24

Family

ID=80776045

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2020/035493 WO2022059172A1 (en) 2020-09-18 2020-09-18 Chatting switching program, chatting processing program, information processing device, and chatting switching method

Country Status (2)

Country Link
JP (1) JPWO2022059172A1 (en)
WO (1) WO2022059172A1 (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007148983A (en) * 2005-11-30 2007-06-14 Oki Electric Ind Co Ltd Account transaction system and account transaction method
JP2011108068A (en) * 2009-11-19 2011-06-02 Japan Research Institute Ltd Transfer system, transfer control method and transfer control program
JP2012134647A (en) * 2010-12-20 2012-07-12 Hitachi Ltd Call connection control device, telephone terminal, and telephone network
US20190394333A1 (en) * 2018-06-21 2019-12-26 Wells Fargo Bank, N.A. Voice captcha and real-time monitoring for contact centers
US20200099633A1 (en) * 2018-09-20 2020-03-26 The Toronto-Dominion Bank Chat bot conversation manager
JP2020095346A (en) * 2018-12-10 2020-06-18 楽天株式会社 Information processing apparatus and information processing method
JP2020170123A (en) * 2019-04-05 2020-10-15 日立オムロンターミナルソリューションズ株式会社 Voice interactive system and voice interactive device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2007148983A (en) * 2005-11-30 2007-06-14 Oki Electric Ind Co Ltd Account transaction system and account transaction method
JP2011108068A (en) * 2009-11-19 2011-06-02 Japan Research Institute Ltd Transfer system, transfer control method and transfer control program
JP2012134647A (en) * 2010-12-20 2012-07-12 Hitachi Ltd Call connection control device, telephone terminal, and telephone network
US20190394333A1 (en) * 2018-06-21 2019-12-26 Wells Fargo Bank, N.A. Voice captcha and real-time monitoring for contact centers
US20200099633A1 (en) * 2018-09-20 2020-03-26 The Toronto-Dominion Bank Chat bot conversation manager
JP2020095346A (en) * 2018-12-10 2020-06-18 楽天株式会社 Information processing apparatus and information processing method
JP2020170123A (en) * 2019-04-05 2020-10-15 日立オムロンターミナルソリューションズ株式会社 Voice interactive system and voice interactive device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ANONYMOUS: "Remote customer service with letterpress printing, virtual characters and AI", TOPPAN PRINTING CO., LTD., 10 October 2019 (2019-10-10), pages 1 - 3, XP055917474, Retrieved from the Internet <URL:https://www.toppan.co.jp/news/2019/10/sto3as0000002qkd-att/ToppanPRT_20191010_m.pdf> [retrieved on 20220503] *

Also Published As

Publication number Publication date
JPWO2022059172A1 (en) 2022-03-24

Similar Documents

Publication Publication Date Title
WO2018014789A1 (en) Method and device for controlling service operation risk
JP4951364B2 (en) Suspicious behavior monitoring method and apparatus
EP3623976B1 (en) Toggling biometric authentication
CN106797417B (en) Contact center anti-fraud monitoring, detection and prevention scheme
JP2014524622A (en) Transaction payment method and system
JP2007328381A (en) Authentication system and method in internet banking
TW202029692A (en) Risk transaction processing method and apparatus, and device
US20230044612A1 (en) Transaction Terminal Fraud Processing
CN105989485B (en) Service management method and device
US20210406909A1 (en) Authorizing transactions using negative pin messages
JP2007226682A (en) Abnormal transaction prevention system and prevention method
US20090037547A1 (en) Safety information transmission device
KR20140065818A (en) System and method for verifying safety of account
JP2015111329A (en) Network service providing system, network service providing method, and program
KR102615211B1 (en) System for account transfer authentication
US20110317824A1 (en) Anti-hacking system through telephone authentication
JP2009245273A (en) Individual identification system and method
CN107610368A (en) A kind of information processing method, server and automatic teller machine
WO2022059172A1 (en) Chatting switching program, chatting processing program, information processing device, and chatting switching method
JP2006039841A (en) Processing device preventing spying through face detection, processing system, automatic teller, processing method, and program
JP4844530B2 (en) Transaction monitoring system
CN104184730B (en) Access processing method and device, electronic equipment
CN112365267A (en) Operation behavior-based crawler-resisting method and device
JP6517480B2 (en) Customer service management system, customer terminal, server device, customer service management method, and customer service method
JP2006244475A (en) Controller for transaction system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20954157

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2022550294

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20954157

Country of ref document: EP

Kind code of ref document: A1