Personal harmful call detection method and device based on streaming data graph and readable medium

A technology of call detection and streaming data, which is applied in monitoring/monitoring/test arrangement, automatic exchange, telephone communication, etc. It can solve the problem of low accuracy of fraudulent gangs, failure to achieve expected results, and inability to accurately analyze fraudulent gangs, etc. problem, achieve real-time and accuracy improvement, and increase the effect of analysis success rate

Active Publication Date: 2020-05-08
ZHUHAI GAOLING INFORMATION TECH COLTD
View PDF12 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above-mentioned methods all rely on post-processing analysis. Although they have a certain effect on the prevention of telecom fraud, they cannot achieve the expected effect.
In addition, the existing methods are not very accurate in detecting fraudulent gangs, and cannot timely and accurately analyze the location of fraudulent gangs and their members from massive data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal harmful call detection method and device based on streaming data graph and readable medium
  • Personal harmful call detection method and device based on streaming data graph and readable medium
  • Personal harmful call detection method and device based on streaming data graph and readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] This part will describe the specific embodiment of the present invention in detail, and the preferred embodiment of the present invention is shown in the accompanying drawings. Each technical feature and overall technical solution of the invention, but it should not be understood as a limitation on the protection scope of the present invention.

[0022] In the description of the present invention, several means one or more, and multiple means two or more. Greater than, less than, exceeding, etc. are understood as not including the original number, and above, below, within, etc. are understood as including the original number. If the description of the first and second is only for the purpose of distinguishing the technical features, it cannot be understood as indicating or implying the relative importance or implicitly indicating the number of the indicated technical features or implicitly indicating the order of the indicated technical features relation.

[0023] In t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a personal harmful call detection method and device based on a streaming data graph and a readable medium, and the method comprises the steps: collecting CDR data of a pluralityof users, decomposing the CDR data to obtain communication data, storing the communication data in a graph database, and obtaining a communication graph; communication node statistics and related attributes and representations of the sub-graphs are extracted from the communication graph based on the depth graph; preprocessing the related attributes and the representations, training the related attributes and the representations as machine learning model parameters to obtain a first analysis result, and classifying suspicious call groups in the first analysis result; storing the suspicious call group into a graphic database, and carrying out secondary analysis to obtain the number of the harmful call. The method is advantageous in that real-time performance and accuracy are improved to a large extent, current and historical graph characteristics and record traceability of the call can be checked in real time, manual confirmation is carried out in the mode of repeatedly listening to thecall, and the analysis success rate is increased.

Description

technical field [0001] The invention belongs to network science and telecommunication network data analysis, and in particular relates to a personal harmful call detection method, device and readable medium based on flow data graph. Background technique [0002] With the popularity of wireless communication technology, mobile phones have become an essential way for people to make long-distance calls, bringing great convenience to life. However, everything has two sides. While wireless communication technology provides convenience for life, it is also easy to be used by criminals to commit crimes. Telecom fraud is a new type of fraud derived from the popularization of mobile communications. Fraud methods have caused huge losses to life and economy, and how to effectively detect harmful calls is imminent. [0003] At present, the widely used harmful call detection technology mostly discovers the potential trend of telecom fraud by analyzing the calling user's behavior. This...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04M3/22
CPCH04M3/2281
Inventor 刘立峰赵旭霞王麟东吴翔杨鹏飞金潇康刘树新
Owner ZHUHAI GAOLING INFORMATION TECH COLTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products