CN117151736A - Anti-email fraud management early warning method and system - Google Patents
Anti-email fraud management early warning method and system Download PDFInfo
- Publication number
- CN117151736A CN117151736A CN202311063748.1A CN202311063748A CN117151736A CN 117151736 A CN117151736 A CN 117151736A CN 202311063748 A CN202311063748 A CN 202311063748A CN 117151736 A CN117151736 A CN 117151736A
- Authority
- CN
- China
- Prior art keywords
- fraud
- data
- early warning
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 58
- 238000007726 management method Methods 0.000 claims abstract description 109
- 238000004364 calculation method Methods 0.000 claims abstract description 30
- 238000010276 construction Methods 0.000 claims description 14
- 230000008569 process Effects 0.000 claims description 13
- 230000006399 behavior Effects 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 10
- 230000003993 interaction Effects 0.000 claims description 7
- 238000003032 molecular docking Methods 0.000 claims description 7
- 238000007405 data analysis Methods 0.000 claims description 5
- 238000012544 monitoring process Methods 0.000 claims description 5
- 238000000605 extraction Methods 0.000 claims description 4
- 238000012790 confirmation Methods 0.000 claims description 3
- 238000012795 verification Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 abstract description 12
- 238000005516 engineering process Methods 0.000 abstract description 12
- 230000005611 electricity Effects 0.000 abstract description 2
- 238000004458 analytical method Methods 0.000 description 13
- 230000006870 function Effects 0.000 description 11
- 238000011161 development Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 6
- 238000004891 communication Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000013500 data storage Methods 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 238000005065 mining Methods 0.000 description 3
- 238000013475 authorization Methods 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 238000013480 data collection Methods 0.000 description 2
- 238000013523 data management Methods 0.000 description 2
- 238000013499 data model Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 2
- 239000000284 extract Substances 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000013526 transfer learning Methods 0.000 description 2
- 238000011144 upstream manufacturing Methods 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000004888 barrier function Effects 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 238000011840 criminal investigation Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000006073 displacement reaction Methods 0.000 description 1
- 238000010921 in-depth analysis Methods 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 238000013439 planning Methods 0.000 description 1
- 238000000746 purification Methods 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000009466 transformation Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4016—Transaction verification involving fraud or risk level assessment in transaction processing
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- General Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Computer Security & Cryptography (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
技术领域Technical field
本发明涉及电信技术领域,具体涉及一种反电诈管理预警方法及系统。The invention relates to the field of telecommunications technology, and specifically relates to an anti-email fraud management early warning method and system.
背景技术Background technique
随着通讯和网络的发展及普及,越来越多的交易通过互联网进行。互联网交易行为的大量应用也给了电信网络诈骗分子可乘之机,导致电信网络诈骗日益成为威胁公众财产和社会安定的一大危害。随着刑事打击和普法宣传力度的不断加大,电信网络诈骗得到了一定程度上的遏制。但是对于一些新型的电诈手段,还是没有办法能够及时高效的反馈至金融机构来保证用户的财产安全,整个流程冗杂导致电诈管控滞后,进而无法有效进行数据利用;最终使得金融机构对于电信欺诈的管理能力较为薄弱。因此,设计一种能够进行高效预判的反电诈的方案成为本领域技术人员亟待解决的技术问题。With the development and popularization of communications and networks, more and more transactions are conducted through the Internet. The extensive application of Internet transactions has also given telecom network fraudsters an opportunity to take advantage of it, causing telecom network fraud to increasingly become a major hazard that threatens public property and social stability. With the continuous intensification of criminal crackdowns and legal publicity, telecommunications network fraud has been curbed to a certain extent. However, for some new electronic fraud methods, there is still no way to feedback them to financial institutions in a timely and efficient manner to ensure the safety of users' property. The entire process is cumbersome, which leads to lag in electronic fraud management and control, which in turn makes it impossible to effectively utilize data; ultimately, financial institutions have to pay attention to telecommunications fraud. management capabilities are relatively weak. Therefore, designing an anti-email fraud scheme capable of efficient prediction has become an urgent technical problem to be solved by those skilled in the art.
发明内容Contents of the invention
针对所述缺陷,本发明实施例公开了一种反电诈管理预警方法,其能够在确保数据安全的前提下,实现安全管理数据与金融机构数据实时互传和互通,通过数据技术分析挖掘出涉诈账户、潜在涉诈账户和潜在受害人账户,并进行及时预警,降低出现电信诈骗的风险。In view of the above defects, embodiments of the present invention disclose an anti-email fraud management early warning method, which can realize real-time mutual transmission and interoperability of security management data and financial institution data on the premise of ensuring data security, and mine out data through data technology analysis. Fraud-related accounts, potential fraud-related accounts and potential victim accounts, and provide timely warnings to reduce the risk of telecommunications fraud.
本发明实施例第一方面公开了反电诈管理预警方法,包括:The first aspect of the embodiment of the present invention discloses an anti-email fraud management and early warning method, which includes:
接收安全管理反电诈内部系统传输的第一线索数据,其中,所述第一线索数据经过隐私计算得到;和/或,接收金融终端系统传输的第二线索数据,其中,所述第二线索数据经过隐私计算得到;Receive the first clue data transmitted by the security management anti-email fraud internal system, wherein the first clue data is obtained through privacy calculation; and/or receive the second clue data transmitted by the financial terminal system, wherein the second clue data The data is obtained through privacy calculation;
将所述第一线索数据和所述第二线索数据传输至预先构建的反电诈模型处来进行预警识别以得到相应的预警识别结果;Transmitting the first clue data and the second clue data to a pre-built anti-email fraud model for early warning identification to obtain corresponding early warning identification results;
将所述预警识别结果反馈至相应用户的智能终端处来进行预警提醒;或,将所述预警识别结果反馈至相应的安全管理系统处来进行预警提醒。The early warning identification result is fed back to the corresponding user's smart terminal for early warning reminder; or the early warning identification result is fed back to the corresponding safety management system for early warning reminder.
作为一种可选的实施方式,在本发明实施例第一方面中,所述反电诈模型通过如下步骤构建得到:As an optional implementation manner, in the first aspect of the embodiment of the present invention, the anti-email fraud model is constructed through the following steps:
接收安全管理反电诈内部系统传输的定性为电信诈骗行为的诈骗信息集;Receive fraud information sets that are classified as telecommunications fraud transmitted by the security management anti-telephone fraud internal system;
对所述诈骗信息集进行分析处理以得到多个反诈衍生指标;Analyze and process the fraud information set to obtain multiple anti-fraud derivative indicators;
基于多个所述反诈衍生指标构建反电诈模型。An anti-e-mail fraud model is constructed based on multiple anti-fraud derivative indicators.
作为一种可选的实施方式,在本发明实施例第一方面中,所述诈骗信息集包括用户信息数据和所述移动端信息数据,所述对所述诈骗信息集进行分析处理以得到多个反诈衍生指标,包括:As an optional implementation manner, in the first aspect of the embodiment of the present invention, the fraud information set includes user information data and the mobile terminal information data, and the fraud information set is analyzed and processed to obtain multiple Anti-fraud derivative indicators, including:
根据所述用户信息数据和所述移动端信息数据分别获取用户行为特征和设备特征;Obtain user behavior characteristics and device characteristics respectively according to the user information data and the mobile terminal information data;
根据所述用户行为特征和设备特征确定在电信诈骗案件发生前、电信诈骗案件发生中以及电信诈骗案件发生后的特征变化情况;并根据所述特征变化情况来生成多个反诈衍生指标。According to the user behavior characteristics and device characteristics, characteristics changes before, during, and after the telecommunications fraud case occur are determined; and multiple anti-fraud derivative indicators are generated based on the characteristic changes.
作为一种可选的实施方式,在本发明实施例第一方面中,所述反电诈模型包括涉案卡提取模型、第一潜在电诈账户模型、第二潜在电诈账户模型和潜在受害人模型中的一种或者多种。As an optional implementation, in the first aspect of the embodiment of the present invention, the anti-electronic fraud model includes a card extraction model involved in the case, a first potential electronic fraud account model, a second potential electronic fraud account model and a potential victim. One or more of the models.
作为一种可选的实施方式,在本发明实施例第一方面中,所述接收金融终端系统传输的第二线索数据,包括:As an optional implementation manner, in the first aspect of the embodiment of the present invention, receiving the second clue data transmitted by the financial terminal system includes:
接收金融终端系统处相应注册用户传输的第二线索数据;所述注册用户通过如下步骤注册确定:Receive the second clue data transmitted by the corresponding registered user at the financial terminal system; the registered user is registered and determined through the following steps:
接收待注册用户输入的用户信息组,所述用户信息组包括多个用户身份信息,所述用户身份信息包括手机号、身份证号以及银行卡号;Receive a user information group input by a user to be registered, where the user information group includes multiple user identity information, and the user identity information includes a mobile phone number, ID number, and bank card number;
对所述用户信息组中多个用户身份信息来进行信息验证以确定其是否符合注册条件,若符合,在确定注册完成以得到多个注册用户;Perform information verification on multiple user identity information in the user information group to determine whether they meet the registration conditions, and if so, determine that the registration is completed to obtain multiple registered users;
将多个注册用户中的其中一个注册用户确定为主用户,将主用户之外的其他用户确定为从用户,所述主用户用于接收与主用户或者从用户关联的预警推送信息。One registered user among the plurality of registered users is determined as the master user, and other users other than the master user are determined as slave users. The master user is used to receive early warning push information associated with the master user or the slave user.
作为一种可选的实施方式,在本发明实施例第一方面中,在所述确定注册完成之后,还包括:As an optional implementation manner, in the first aspect of the embodiment of the present invention, after determining that registration is completed, the method further includes:
接收用户输入的防护配置信息,并将所述防护配置信息与所述用户信息组进行关联。Receive protection configuration information input by the user, and associate the protection configuration information with the user information group.
本发明实施例第二方面公开一种反电诈管理预警系统,包括:The second aspect of the embodiment of the present invention discloses an anti-email fraud management early warning system, which includes:
安全管理内部反电诈系统,所述安全管理内部反电诈系统用于与安全管理内部所有系统对接以实现安全管理系统数据收集,并对与电诈行为关联的电诈数据信息进行隐私计算以将进行隐私计算之后的电诈数据信息通过网络专线传输至反电诈中台系统;Security management internal anti-email fraud system. The security management internal anti-email fraud system is used to interface with all systems within security management to collect security management system data, and perform privacy calculations on e-fraud data information associated with e-fraud behaviors. Transmit the electronic fraud data information after privacy calculation to the anti-electronic fraud center system through a dedicated network line;
反电诈中台系统,所述反电诈中台系统用于与安全管理内部反电诈系统以及金融终端系统进行数据对接交互,所述反电诈中台系统内还设置有反电诈模型用于对接收到的数据来进行识别处理;Anti-email fraud middle platform system. The anti-email fraud middle platform system is used for data docking and interaction with the security management internal anti-email fraud system and the financial terminal system. The anti-email fraud middle platform system is also equipped with an anti-email fraud model. Used to identify and process the received data;
金融终端系统,所述金融终端系统用于接收反电诈中台系统传输的中台数据信息,并与金融机构系统的身份认证模块对接,所述身份认证模块包括证书认证模块、人脸识别模块和指纹认证模块;所述金融终端系统的数量至少为一个。Financial terminal system. The financial terminal system is used to receive the middle-end data information transmitted by the anti-email fraud middle-end system and interface with the identity authentication module of the financial institution system. The identity authentication module includes a certificate authentication module and a face recognition module. and a fingerprint authentication module; the number of the financial terminal system is at least one.
作为一种可选的实施方式,在本发明实施例第二方面中,所述安全管理内部反电诈系统内设置有离线数据仓和实时数据仓;所述安全管理内部反电诈系统还设置有业务查询模块、数据分析模块、模型建设模块、电诈布控模块、监测预警模块和警企联动模块。As an optional implementation manner, in the second aspect of the embodiment of the present invention, the security management internal anti-email fraud system is provided with an offline data warehouse and a real-time data warehouse; the security management internal anti-email fraud system is also provided with There are business query module, data analysis module, model construction module, electronic fraud control module, monitoring and early warning module and police-enterprise linkage module.
本发明实施例第三方面公开一种电子设备,包括:存储有可执行程序代码的存储器;与所述存储器耦合的处理器;所述处理器调用所述存储器中存储的所述可执行程序代码,用于执行本发明实施例第一方面公开的反电诈管理预警方法。A third aspect of the embodiment of the present invention discloses an electronic device, including: a memory storing executable program code; a processor coupled to the memory; the processor calls the executable program code stored in the memory , used to execute the anti-email fraud management early warning method disclosed in the first aspect of the embodiment of the present invention.
本发明实施例第四方面公开一种计算机可读存储介质,其存储计算机程序,其中,所述计算机程序使得计算机执行本发明实施例第一方面公开的反电诈管理预警方法。The fourth aspect of the embodiment of the present invention discloses a computer-readable storage medium that stores a computer program, wherein the computer program causes the computer to execute the anti-email fraud management early warning method disclosed in the first aspect of the embodiment of the present invention.
与现有技术相比,本发明实施例具有以下有益效果:Compared with the prior art, the embodiments of the present invention have the following beneficial effects:
本发明实施例中反电诈管理预警方法,其能够在确保数据安全的前提下,实现安全管理数据与金融机构数据实时互传和互通,通过数据技术分析挖掘出涉诈账户、潜在涉诈账户和潜在受害人账户,并进行及时预警,降低出现电信诈骗的风险。The anti-email fraud management early warning method in the embodiment of the present invention can realize real-time mutual transmission and interoperability of security management data and financial institution data on the premise of ensuring data security, and unearth fraud-related accounts and potential fraud-related accounts through data technology analysis. and potential victim accounts, and provide timely warnings to reduce the risk of telecommunications fraud.
附图说明Description of the drawings
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings required in the embodiments will be briefly introduced below. Obviously, the drawings in the following description are only some embodiments of the present invention. Those of ordinary skill in the art can also obtain other drawings based on these drawings without exerting creative efforts.
图1是本发明实施例公开的反电诈管理预警方法的流程示意图;Figure 1 is a schematic flow chart of the anti-email fraud management and early warning method disclosed in the embodiment of the present invention;
图2是本发明实施例公开的用户注册的流程示意图;Figure 2 is a schematic flow chart of user registration disclosed in an embodiment of the present invention;
图3是本发明实施例公开的反电诈模型构建的流程示意图;Figure 3 is a schematic flow chart of the construction of the anti-email fraud model disclosed in the embodiment of the present invention;
图4是本发明实施例提供的一种反电诈管理预警系统的结构示意图;Figure 4 is a schematic structural diagram of an anti-email fraud management and early warning system provided by an embodiment of the present invention;
图5是本发明实施例提供的一种反电诈管理预警系统的交互示意图;Figure 5 is an interactive schematic diagram of an anti-email fraud management and early warning system provided by an embodiment of the present invention;
图6是本发明实施例提供的一种电子设备的结构示意图。Figure 6 is a schematic structural diagram of an electronic device provided by an embodiment of the present invention.
具体实施方式Detailed ways
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, of the embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts fall within the scope of protection of the present invention.
需要说明的是,本发明的说明书和权利要求书中的术语“第一”、“第二”、“第三”、“第四”等是用于区别不同的对象,而不是用于描述特定顺序。本发明实施例的术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,示例性地,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。It should be noted that the terms "first", "second", "third", "fourth", etc. in the description and claims of the present invention are used to distinguish different objects, rather than to describe specific objects. order. The terms "comprising" and "having" and any variations thereof in the embodiments of the present invention are intended to cover non-exclusive inclusion. For example, a process, method, system, product or equipment that includes a series of steps or units is not necessarily limited to Those steps or elements that are expressly listed may instead include other steps or elements that are not expressly listed or that are inherent to the process, method, product or apparatus.
随着通讯和网络的发展及普及,越来越多的交易通过互联网进行。互联网交易行为的大量应用也给了电信网络诈骗分子可乘之机,导致电信网络诈骗日益成为威胁公众财产和社会安定的一大危害。随着刑事打击和普法宣传力度的不断加大,电信网络诈骗得到了一定程度上的遏制。但是对于一些新型的电诈手段,还是没有办法能够及时高效的反馈至金融机构来保证用户的财产安全,整个流程冗杂导致电诈管控滞后,进而无法有效进行数据利用;最终使得金融机构对于电信欺诈的管理能力较为薄弱。基于此,本发明实施例公开了反电诈管理预警方法、系统、电子设备及存储介质,其能够在确保数据安全的前提下,实现安全管理数据与金融机构数据实时互传和互通,通过数据技术分析挖掘出涉诈账户、潜在涉诈账户和潜在受害人账户,并进行及时预警,降低出现电信诈骗的风险。With the development and popularization of communications and networks, more and more transactions are conducted through the Internet. The extensive application of Internet transactions has also given telecom network fraudsters an opportunity to take advantage of it, causing telecom network fraud to increasingly become a major hazard that threatens public property and social stability. With the continuous intensification of criminal crackdowns and legal publicity, telecommunications network fraud has been curbed to a certain extent. However, for some new electronic fraud methods, there is still no way to feedback them to financial institutions in a timely and efficient manner to ensure the safety of users' property. The entire process is cumbersome, which leads to lag in electronic fraud management and control, which in turn makes it impossible to effectively utilize data; ultimately, financial institutions have to pay attention to telecommunications fraud. management capabilities are relatively weak. Based on this, embodiments of the present invention disclose anti-email fraud management early warning methods, systems, electronic devices and storage media, which can realize real-time mutual transmission and interoperability of security management data and financial institution data on the premise of ensuring data security. Through data Technical analysis unearths fraud-related accounts, potential fraud-related accounts, and potential victim accounts, and provides timely warnings to reduce the risk of telecommunications fraud.
反电信网络欺诈法实施颁布后,明确安全管理和相关金融机构承担反电诈职责。但金融等机构对电信欺诈管理能力薄弱,技术系统建设不够完善。为解决以上问题,本专利基于安全管理合作项目经验,搭建全流程反电诈管理,包含不限制于数据存储,数据技术,数据传输,系统设备,终端管理。致力于协助安全管理实时管控电诈案件,识别潜在涉诈账户并进行管控。赋能金融机构,提高反电诈能力,从事前、事中、事后全流程阻断电诈犯罪发生。After the Anti-Telecommunications Network Fraud Law was implemented and promulgated, it was clarified that security management and relevant financial institutions should bear the responsibilities of anti-telecommunications fraud. However, financial institutions and other institutions have weak capabilities to manage telecommunications fraud and the construction of technical systems is not perfect. In order to solve the above problems, this patent is based on the experience of security management cooperation projects to build a full-process anti-email fraud management, including but not limited to data storage, data technology, data transmission, system equipment, and terminal management. Committed to assisting security management in real-time control of electronic fraud cases, identifying and controlling potential fraud accounts. Empower financial institutions to improve their anti-electronic fraud capabilities and block the occurrence of electronic fraud crimes before, during and after the event.
实施例一Embodiment 1
请参阅图1,图1是本发明实施例公开的反电诈管理预警方法的流程示意图。其中,本发明实施例所描述的方法的执行主体为由软件或/和硬件组成的执行主体,该执行主体可以通过有线或/和无线方式接收相关信息,并可以发送一定的指令。当然,其还可以具有一定的处理功能和存储功能。该执行主体可以控制多个设备,例如远程的物理服务器或云服务器以及相关软件,也可以是对某处安置的设备进行相关操作的本地主机或服务器以及相关软件等。在一些场景中,还可以控制多个存储设备,存储设备可以与设备放置于同一地方或不同地方。Please refer to FIG. 1 , which is a schematic flow chart of an anti-email fraud management and early warning method disclosed in an embodiment of the present invention. Among them, the execution subject of the method described in the embodiment of the present invention is an execution subject composed of software or/and hardware. The execution subject can receive relevant information through wired or/and wireless means, and can send certain instructions. Of course, it can also have certain processing functions and storage functions. The execution subject can control multiple devices, such as remote physical servers or cloud servers and related software, or it can be a local host or server and related software that performs related operations on devices installed somewhere. In some scenarios, multiple storage devices can also be controlled, and the storage devices can be placed in the same place as the device or in different places.
如图1所示,该基于反电诈管理预警方法包括以下步骤:As shown in Figure 1, the early warning method based on anti-email fraud management includes the following steps:
S101:接收安全管理反电诈内部系统传输的第一线索数据,其中,所述第一线索数据经过隐私计算得到;和/或,接收金融终端系统传输的第二线索数据,其中,所述第二线索数据经过隐私计算得到;S101: Receive the first clue data transmitted by the security management anti-email fraud internal system, wherein the first clue data is obtained through privacy calculation; and/or receive the second clue data transmitted by the financial terminal system, wherein the first clue data The second clue data is obtained through privacy calculation;
在本步骤主要是与安全管理反电诈内部系统以及金融终端系统进行信息交互,通过隐私计算的方式能够极大的保证信息的安全性,使得安全管理系统与金融机构之间的数据交互成为可能。This step mainly involves information interaction with the security management anti-email fraud internal system and the financial terminal system. The security of information can be greatly guaranteed through privacy computing, making data interaction between the security management system and financial institutions possible. .
在安全管理系统中存在有一些敏感数据,其不便于进行外泄,比如其内部存在有黑名单、灰名单、白灰名单(疑似受害人/账户)、新型违法犯罪灰名单(可疑账户、可疑人员)等,基于上述数据能够实现更加精准的风险匹配筛查,进而实现对后续用户的预警。There are some sensitive data in the security management system that are not easy to leak. For example, there are blacklists, graylists, white graylists (suspected victims/accounts), and new criminal graylists (suspicious accounts, suspicious persons). ), etc., based on the above data, more accurate risk matching screening can be achieved, thereby achieving early warning for subsequent users.
本发明实施例中提及的隐私计算是指在保护数据本身不对外泄露的前提下实现数据分析计算的一类信息技术,包含了数据科学、密码学、人工智能等众多技术体系的交叉融合。在隐私计算框架下,参与方的数据明文不出本地,在保护数据安全的同时,实现多方数据协同应用和联合计算,解决了又要用数据又要保护数据的矛盾。隐私计算的目标就是数据所有权和数据使用权的分离。满足了安全管理系统对于数据安全的要求。The privacy computing mentioned in the embodiment of the present invention refers to a type of information technology that implements data analysis and calculation on the premise of protecting the data itself from leakage, and includes the cross-fusion of many technical systems such as data science, cryptography, and artificial intelligence. Under the privacy computing framework, the data of participants does not leave the local area. While protecting data security, multi-party data collaborative application and joint calculation are realized, which solves the contradiction of using data and protecting data. The goal of privacy computing is the separation of data ownership and data usage rights. Meets the data security requirements of the security management system.
隐私计算主要是密码学为核心,其包括多方安全计算、差分隐私、同态加密;多方安全计算是以密码学为核心的隐私计算的代表,其主要逻辑是,在没有可靠的第三方的情况下,各方在一起计算之前先对自己的数据进行加密,每个参与方无法得知其他方输入的信息,只能得到计算结果。差分隐私是密码学中的一种手段,通过在查询结果中加入随机噪声的方法,确保公开的输出结果不会泄漏个体的数据集归属信息,使得攻击者无法通过公开发布的结果推断出个体样本的隐私信息,以此实现隐私保护。同态加密指的是先对数据进行基础的加密操作,然后直接使用加密后的数据做运算(一般的加密无法做到运算),并且,这样得出来的计算结果和用同一运算方法计算原数据所得到的结果是一致的,即先计算后解密等价于先解密后计算。这样,既可以保护原始数据不被知晓,还能让计算方在节省解密成本的同时,完成计算任务。Privacy computing is mainly cryptography as the core, which includes multi-party secure computing, differential privacy, and homomorphic encryption; multi-party secure computing is a representative of privacy computing with cryptography as the core. Its main logic is that in the absence of a reliable third party Under this method, all parties encrypt their own data before calculating together. Each participant cannot know the information input by other parties and can only get the calculation results. Differential privacy is a method in cryptography that adds random noise to query results to ensure that the public output results will not leak individual data set ownership information, making it impossible for attackers to infer individual samples through publicly released results. of private information to achieve privacy protection. Homomorphic encryption refers to first performing basic encryption operations on data, and then directly using the encrypted data to perform operations (general encryption cannot perform operations), and the calculation results obtained in this way are calculated using the same operation method as the original data. The results obtained are consistent, that is, calculating first and then decrypting is equivalent to decrypting first and then calculating. In this way, the original data can be protected from being known, and the computing party can complete the computing task while saving decryption costs.
可信执行环境是在硬件上实现数据保护,其核心思想是构建一个独立于操作系统而存在的可信的、隔离的机密空间,数据计算只能在这个安全环境内进行,通过依赖可信硬件来保障其安全。如果没有授权代码,则无法执行访问数据等操作。这相当于是将数据与外界隔离开来,这也是可信执行环境最本质的属性。可信执行环境提供的执行空间安全性更强,比安全芯片功能更丰富,并且不会对隐私区域内的算法逻辑语言有可计算性方面的限制。但由于这一技术是在硬件上实现,需要对该硬件有充分的信任,即对提供该硬件的厂商有较高的可信度要求。The trusted execution environment implements data protection on hardware. Its core idea is to build a trusted, isolated and confidential space that exists independently of the operating system. Data calculations can only be performed within this secure environment. By relying on trusted hardware to ensure its safety. Without the authorization code, operations such as accessing data cannot be performed. This is equivalent to isolating data from the outside world, which is also the most essential attribute of a trusted execution environment. The execution space provided by the trusted execution environment is more secure, has richer functions than the security chip, and does not impose computability restrictions on the algorithmic logic language in the privacy area. However, since this technology is implemented on hardware, it requires full trust in the hardware, that is, there are high credibility requirements for the manufacturers that provide the hardware.
由于需要涉及到多端的信息交互,所以在进行具体实施时,需要进行联邦学习,联邦学习的本质是分布式的机器学习,在保证数据隐私安全的基础上,实现共同建模,提升模型的效果。联邦学习不需要参与方把数据传输到中心模型上运算,而是在本地训练好一个小模型后,把训练后的模型和其他方训练好的模型传给系统平台做整合调试,以此达到优化目的。这种方法既实现数据不出本地,又完成了联合计算和建模的目的。联邦学习按数据的特点分成三种:1、横向联邦学习,使用与特征重合较多,而样本重合较少的数据集间联合计算的场景;2、纵向联邦学习,更适用于样本重合较多,而特征重合较少的数据集间联合计算的场景。3、联邦迁移学习,适用于数据集间样本和特征重合均较少的场景。在这样的场景中,不再对数据进行切分,而是利用迁移学习来弥补数据或标签的不足。通过上述方式使得既能够保证数据的安全性,也能够满足模型构建的需求。Since it involves multi-terminal information interaction, federated learning is required during specific implementation. The essence of federated learning is distributed machine learning. On the basis of ensuring data privacy and security, joint modeling is achieved and the effect of the model is improved. . Federated learning does not require participants to transfer data to the central model for calculation. Instead, after training a small model locally, the trained model and the models trained by other parties are passed to the system platform for integration and debugging to achieve optimization. Purpose. This method not only keeps the data local, but also achieves the purpose of joint calculation and modeling. Federated learning is divided into three types according to the characteristics of the data: 1. Horizontal federated learning, which uses joint calculation scenarios between data sets that have more overlap with features but less overlap with samples; 2. vertical federated learning, which is more suitable for scenarios with more overlap between samples , and the scenario of joint calculation between data sets with less feature overlap. 3. Federated transfer learning is suitable for scenarios where there is little overlap in samples and features between data sets. In such a scenario, the data is no longer segmented, but transfer learning is used to make up for the lack of data or labels. Through the above method, it is possible to ensure data security and meet the needs of model construction.
更为优选的,所述接收金融终端系统传输的第二线索数据,包括:More preferably, said receiving the second clue data transmitted by the financial terminal system includes:
接收金融终端系统处相应注册用户传输的第二线索数据;图2是本发明实施例公开的用户注册的流程示意图,如图2所示,所述注册用户通过如下步骤注册确定:Receive the second clue data transmitted by the corresponding registered user at the financial terminal system; Figure 2 is a schematic flow chart of user registration disclosed in an embodiment of the present invention. As shown in Figure 2, the registered user is registered and determined through the following steps:
S1011:接收待注册用户输入的用户信息组,所述用户信息组包括多个用户身份信息,所述用户身份信息包括手机号、身份证号以及银行卡号;S1011: Receive the user information group input by the user to be registered, the user information group includes multiple user identity information, and the user identity information includes mobile phone number, ID card number and bank card number;
S1012:对所述用户信息组中多个用户身份信息来进行信息验证以确定其是否符合注册条件,若符合,在确定注册完成以得到多个注册用户;S1012: Perform information verification on multiple user identity information in the user information group to determine whether they meet the registration conditions. If so, determine that the registration is completed to obtain multiple registered users;
S1013:将多个注册用户中的其中一个注册用户确定为主用户,将主用户之外的其他用户确定为从用户,所述主用户用于接收与主用户或者从用户关联的预警推送信息。S1013: Determine one of the multiple registered users as the master user, and determine other users other than the master user as slave users. The master user is used to receive early warning push information associated with the master user or the slave user.
也即是在进行注册实施的时候,可以提供以家庭为单位的反电诈服务注册,然后来进行后续的预警设置。That is to say, when implementing registration, we can provide family-based anti-email fraud service registration, and then carry out subsequent early warning settings.
互联网平台及运营商在获取市民授权的情况下基于自身的生态数据构建受骗侵查分析模型及时发现登记服务的市民受骗风险并实时将预警推送给行方平台。行方平台收到技术服务商预警后,将该信息推送给该号码的家庭成员家庭,成员看到信息后点击信息确认,并对当事人进行劝导。若家庭成员在2小时内都没有处理预警信息,由行方运营对当事人进行触达沟通。With the authorization of citizens, Internet platforms and operators build fraud and intrusion analysis models based on their own ecological data to promptly discover the risk of fraud for citizens who have registered for services and push early warnings to the banking platform in real time. After receiving the early warning from the technical service provider, the Xingfang platform will push the information to the family members of the number. After seeing the information, the members will click on the information to confirm and persuade the parties concerned. If family members do not respond to the warning information within 2 hours, the bank operation will contact and communicate with the parties.
因为方案的注册是面向个人的,但是由于个人一般都不认为自己会被骗,所以注册方主动进行注册的意愿不大;但是对于个人用户来说,其可能会担心父母或者伴侣一时被骗,所以为他人注册服务更加具有动力。特别是家里有老年人的,只要在注册之后,可以将其与子女用户进行关联,然后子女用户也能够及时收到针对老年人账户的预警信息,一方面能够提供注册使用人数,另一方面由于注册使用人数的增多,使得获得的数据更加完善,进而能够实现更好的预警。由于在注册的时候则关联有多种信息,使得金融机构能够更加方便的联系到与账户拥有方关联的其他家人,能够进一步提升交易的安全性。Because the registration of the plan is for individuals, but because individuals generally do not think that they will be cheated, registrants are less willing to take the initiative to register; however, for individual users, they may worry that their parents or partners will be cheated temporarily. So there is even more incentive to sign up for services for others. Especially if there are elderly people at home, as long as they are registered, they can be associated with their child users, and then the child users can also receive timely warning information for the elderly accounts. On the one hand, it can provide the number of registered users, and on the other hand, because The increase in the number of registered users will make the data obtained more complete, thus enabling better early warnings. Since a variety of information is associated during registration, financial institutions can more conveniently contact other family members associated with the account owner, which can further enhance the security of transactions.
更为优选的,在所述确定注册完成之后,还包括:More preferably, after the confirmation of registration is completed, it also includes:
接收用户输入的防护配置信息,并将所述防护配置信息与所述用户信息组进行关联。Receive protection configuration information input by the user, and associate the protection configuration information with the user information group.
也即是在进行防护配置的时候,可以对账户设置24小时延迟到账,也可以设置每日限额等来进行账户安全防护。That is to say, when configuring protection, you can set a 24-hour delay for account payment, or set daily limits for account security protection.
S102:将所述第一线索数据和所述第二线索数据传输至预先构建的反电诈模型处来进行预警识别以得到相应的预警识别结果;S102: Transmit the first clue data and the second clue data to the pre-built anti-email fraud model for early warning identification to obtain corresponding early warning identification results;
更为优选的,图3是本发明实施例公开的反电诈模型构建的流程示意图,如图3所示,所述反电诈模型通过如下步骤构建得到:More preferably, Figure 3 is a schematic flow chart of the construction of the anti-email fraud model disclosed in the embodiment of the present invention. As shown in Figure 3, the anti-email fraud model is constructed through the following steps:
S1021:接收安全管理反电诈内部系统传输的定性为电信诈骗行为的诈骗信息集;S1021: Receive the fraud information set that is classified as telecommunications fraud transmitted by the security management anti-telephone fraud internal system;
S1022:对所述诈骗信息集进行分析处理以得到多个反诈衍生指标;S1022: Analyze and process the fraud information set to obtain multiple anti-fraud derivative indicators;
S1023:基于多个所述反诈衍生指标构建反电诈模型。S1023: Construct an anti-email fraud model based on multiple anti-fraud derivative indicators.
更为优选的,所述诈骗信息集包括用户信息数据和所述移动端信息数据,所述对所述诈骗信息集进行分析处理以得到多个反诈衍生指标,包括:More preferably, the fraud information set includes user information data and the mobile terminal information data, and the fraud information set is analyzed and processed to obtain multiple anti-fraud derivative indicators, including:
根据所述用户信息数据和所述移动端信息数据分别获取用户行为特征和设备特征;Obtain user behavior characteristics and device characteristics respectively according to the user information data and the mobile terminal information data;
根据所述用户行为特征和设备特征确定在电信诈骗案件发生前、电信诈骗案件发生中以及电信诈骗案件发生后的特征变化情况;并根据所述特征变化情况来生成多个反诈衍生指标。According to the user behavior characteristics and device characteristics, characteristics changes before, during, and after the telecommunications fraud case occur are determined; and multiple anti-fraud derivative indicators are generated based on the characteristic changes.
更为优选的,所述反电诈模型包括涉案卡提取模型、第一潜在电诈账户模型、第二潜在电诈账户模型和潜在受害人模型中的一种或者多种。More preferably, the anti-electronic fraud model includes one or more of a card extraction model involved in the case, a first potential electronic fraud account model, a second potential electronic fraud account model, and a potential victim model.
在进行具体实施的时候,可以针对多个不同的反诈衍生指标来构建不同的识别模型,这样能够实现更加精准的定位,而并不非是宽泛意义上的反诈模型构建。这里的模型构建需要与安全管理系统进行深入的合作,深入了解安全管理反电诈业务,基于反电诈业务需求,完成需求分析、需求确认和需求设计等文档;在进行具体实施时需要与刑侦反电诈专家团队,对电诈不同案例进行分析,完成电诈相关的分析报告材料,通过对电诈案件中涉诈账户挖掘分析,提取出涉诈账户和潜在受害人交易行为、地址位移、登录操作和通信设备等维度的行为特征,分析电诈案件发生的事前、事中和事后的特征变化,搭建多个数据模型,输出账户涉黑风险的综合分值,对综合分值超过阈值的账户进行管控。技术管理包含对各种数据源进行综合分析,设计衍生指标,输出分析报告文档,与安全管理反电诈团队共同深入挖掘分析,通过大数据算法,完成涉案卡提纯模型、事前挖掘潜在电诈账户模型、事中挖掘潜在电诈账户模型和挖掘潜在受害人模型。During specific implementation, different identification models can be constructed for multiple different anti-fraud derivative indicators, which can achieve more precise positioning, rather than building an anti-fraud model in a broad sense. The model construction here requires in-depth cooperation with the security management system, an in-depth understanding of the anti-email fraud business of security management, and the completion of documents such as demand analysis, demand confirmation, and demand design based on the anti-email fraud business needs; during specific implementation, it is necessary to cooperate with the criminal investigation The anti-email fraud expert team analyzed different cases of e-fraud and completed analysis report materials related to e-fraud. Through the mining and analysis of fraud-related accounts in e-fraud cases, they extracted the transaction behavior, address displacement, and transaction behavior of fraud-related accounts and potential victims. Behavioral characteristics in dimensions such as login operations and communication equipment, analyze the changes in characteristics before, during and after the occurrence of electronic fraud cases, build multiple data models, output the comprehensive score of the account's black-related risk, and analyze the comprehensive score for those whose comprehensive score exceeds the threshold. Account management and control. Technical management includes comprehensive analysis of various data sources, designing derived indicators, outputting analysis report documents, in-depth analysis with the security management anti-email fraud team, and using big data algorithms to complete the card purification model involved and dig out potential e-fraud accounts in advance. model, a model for mining potential electronic fraud accounts and a model for mining potential victims during the event.
除了上述指标构建的方式之外,还可以进行画像的构建,然后基于特定的画像数据来进行准确的风险匹配;比如若是针对刷单人员,则可以确定刷单画像包括设备信息、消费信息、电商数据、操作行为、交易流水、资产信息、基本属性;若是针对信用卡代办人员,则可以确定贷款信用卡代办画像包括基本属性、借贷信息、征信记录、资产信息、设备信息、通讯信息、消费信息、逾期信息;基于上述信息来进行画像模型的构建以及后续的预警匹配。In addition to the above indicator construction methods, portraits can also be constructed, and then accurate risk matching can be performed based on specific portrait data; for example, if it is targeted at fraudsters, it can be determined that the fraud profile includes equipment information, consumption information, electricity business data, operating behavior, transaction flow, asset information, and basic attributes; if it is for credit card agents, it can be determined that the loan credit card agent portrait includes basic attributes, loan information, credit records, asset information, equipment information, communication information, and consumption information , overdue information; based on the above information, the construction of the portrait model and subsequent early warning matching are carried out.
S103:将所述预警识别结果反馈至相应用户的智能终端处来进行预警提醒;或,将所述预警识别结果反馈至相应的安全管理系统处来进行预警提醒。S103: Feed back the early warning identification result to the corresponding user's smart terminal for early warning reminder; or feed back the early warning identification result to the corresponding security management system for early warning reminder.
一般的,若针对的是个人用户或者是金融客户端,则可以直接推送相应的信息到对应的智能终端,就可以使得个人用户知晓其账户存在有风险。或者还有一种方式是针对于安全管理系统,通过对大数据进行搜集,能够准确识别到特定异常账户,也即是诈骗方的账户信息,然后将相应的账户信息发送至安全管理系统端来进行进一步的监控。Generally, if it is targeted at individual users or financial clients, the corresponding information can be pushed directly to the corresponding smart terminal, so that individual users can know that their accounts are at risk. Or another way is to target the security management system. By collecting big data, specific abnormal accounts can be accurately identified, that is, the account information of the fraudster, and then the corresponding account information is sent to the security management system for processing. Further monitoring.
本发明实施例的数据安全保障包括限定数据维度(基于计划需求,根据安全管理要求收集特定场景的数据,严格控制数据维度和内容,防止信息过度采集)、专网专用(通过专线对网络连接、专网专用、对外网络隔离、防止网络入侵和数据泄漏)、完善安全管理(建立数据安全管理机制备份容灾机制,严控数据访问权限,保障数据安全)、加密传输(通过数据加密传输,保证数据传输安全、防止数据窃取)等。The data security guarantee of the embodiment of the present invention includes limited data dimensions (based on planning needs, collecting data in specific scenarios according to security management requirements, strictly controlling data dimensions and content to prevent excessive collection of information), private network dedicated (connecting to the network through dedicated lines, Dedicated private network, isolation from external networks, preventing network intrusion and data leakage), improving security management (establishing a data security management mechanism, backup and disaster recovery mechanism, strictly controlling data access permissions, and ensuring data security), encrypted transmission (encrypted data transmission to ensure Data transmission security, preventing data theft), etc.
通过本发明实施例的方案打通安全管理和金融机构数据壁垒,综合各方电诈领域相关的技术分析,系统为载体,采用隐秘计算的方式,实现警企互联;提炼安全管理多年反电诈的经验,转化成专业的模型技术,赋能金融机构管控电诈;简化电诈管理流程,通过系统和专线的方式,达到自动挖掘潜在涉诈账户,自动管控处置电诈账户,进行潜在受害人预警等功能。实时监测并干预电诈犯罪活动,多层级阻断电诈犯罪行为的发生。Through the solution of the embodiment of the present invention, the data barriers between security management and financial institutions are opened, and the technical analysis related to the field of electronic fraud is integrated. The system is used as a carrier and the secret calculation method is used to realize the interconnection between police and enterprises; the security management anti-electronic fraud experience of many years is refined. Experience is transformed into professional model technology to empower financial institutions to control electronic fraud; simplify the electronic fraud management process, and use systems and dedicated lines to automatically discover potential fraud accounts, automatically control and handle electronic fraud accounts, and provide early warning to potential victims and other functions. Monitor and intervene in electronic fraud criminal activities in real time, and block the occurrence of electronic fraud crimes at multiple levels.
本发明实施例中反电诈管理预警方法,其能够在确保数据安全的前提下,实现安全管理数据与金融机构数据实时互传和互通,通过数据技术分析挖掘出涉诈账户、潜在涉诈账户和潜在受害人账户,并进行及时预警,降低出现电信诈骗的风险。The anti-email fraud management early warning method in the embodiment of the present invention can realize real-time mutual transmission and interoperability of security management data and financial institution data on the premise of ensuring data security, and unearth fraud-related accounts and potential fraud-related accounts through data technology analysis. and potential victim accounts, and provide timely warnings to reduce the risk of telecommunications fraud.
实施例二Embodiment 2
请参阅图4和图5,图4是本发明实施例公开的反电诈管理预警系统的结构示意图,图5是本发明实施例提供的一种反电诈管理预警系统的交互示意图。Please refer to Figures 4 and 5. Figure 4 is a schematic structural diagram of an anti-email fraud management and early warning system disclosed in an embodiment of the present invention. Figure 5 is an interactive schematic diagram of an anti-email fraud management and early warning system provided by an embodiment of the present invention.
如图4和图5所示,该反电诈管理预警系统可以包括:As shown in Figures 4 and 5, the anti-email fraud management early warning system can include:
安全管理内部反电诈系统,所述安全管理内部反电诈系统用于与安全管理内部所有系统对接以实现安全管理系统数据收集,并对与电诈行为关联的电诈数据信息进行隐私计算以将进行隐私计算之后的电诈数据信息通过网络专线传输至反电诈中台系统;Security management internal anti-email fraud system. The security management internal anti-email fraud system is used to interface with all systems within security management to collect security management system data, and perform privacy calculations on e-fraud data information associated with e-fraud behaviors. Transmit the electronic fraud data information after privacy calculation to the anti-electronic fraud center system through a dedicated network line;
反电诈中台系统,所述反电诈中台系统用于与安全管理内部反电诈系统以及金融终端系统进行数据对接交互,所述反电诈中台系统内还设置有反电诈模型用于对接收到的数据来进行识别处理;Anti-email fraud middle platform system. The anti-email fraud middle platform system is used for data docking and interaction with the security management internal anti-email fraud system and the financial terminal system. The anti-email fraud middle platform system is also equipped with an anti-email fraud model. Used to identify and process the received data;
金融终端系统,所述金融终端系统用于接收反电诈中台系统传输的中台数据信息,并与金融机构系统的身份认证模块对接,所述身份认证模块包括证书认证模块、人脸识别模块和指纹认证模块;所述金融终端系统的数量至少为一个。Financial terminal system. The financial terminal system is used to receive the middle-end data information transmitted by the anti-email fraud middle-end system and interface with the identity authentication module of the financial institution system. The identity authentication module includes a certificate authentication module and a face recognition module. and a fingerprint authentication module; the number of the financial terminal system is at least one.
更为优选的,所述安全管理内部反电诈系统内设置有离线数据仓和实时数据仓;所述安全管理内部反电诈系统还设置有业务查询模块、数据分析模块、模型建设模块、电诈布控模块、监测预警模块和警企联动模块。More preferably, the security management internal anti-email fraud system is provided with an offline data warehouse and a real-time data warehouse; the security management internal anti-email fraud system is also provided with a business query module, a data analysis module, a model construction module, and an e-mail fraud module. Fraud control module, monitoring and early warning module and police-enterprise linkage module.
本发明实施例的方案包含不限于数据分析、数据建模设计和部署、系统功能设计、数仓建设和处置策略。对所有安全管理数据源进行全面且系统化梳理,完成离线数仓和实时数仓建设,完成数据自动清洗清洗;支持接入国家大数据平台、安全管理内部系统和金融机构线下线索等数据。The solutions of the embodiments of the present invention include but are not limited to data analysis, data modeling design and deployment, system function design, data warehouse construction and disposal strategies. Comprehensively and systematically sort out all security management data sources, complete the construction of offline data warehouses and real-time data warehouses, and complete automatic data cleaning; support access to data such as national big data platforms, internal security management systems, and offline clues of financial institutions.
本发明实施例中提及的数据仓库是为了解决数据库负载有限、满足企业新增的分析需求而被设计出来的。如果数据想要从各个数据库迁移到统一数据仓库中,就需要经历抽取、转化、加载(ETL),最终变身成可以直接被业务人员分析的结构化/半结构化的数据。在数据仓库后面,企业常用BI分析数据,产生报表,辅助决策。数据仓库就是一个“为企业实现数据模型构建”的产品。数据仓库存储的是结构化和半结构化的数据,那非结构化的数据该由谁来储存呢?对,就是数据平台。数据平台是为了解决数据仓库不能处理非结构化数据和报表开发周期长的问题而产生的,它先是将企业所有格式的数据都抽取出来放到一起,形成一个大的数据集,再根据业务需求,单独提取其中的小数据集提供给数据应用。大数据平台是数据平台在大数据时代的概念衍生,其功能要远胜于数据平台。大数据平台是一个以处理海量数据存储、计算以及流数据实时计算等场景为主的技术堆栈,包括数据采集、数据存储、数据计算、数据应用和任务调度,最典型的是基于Hadoop生态构建的大数据平台。在非结构数据、实时数据和海量数据的计算和存储压力下,企业才选择从数据仓库转向大数据平台。The data warehouse mentioned in the embodiment of the present invention is designed to solve the limited load of the database and meet the new analysis needs of the enterprise. If data wants to be migrated from various databases to a unified data warehouse, it needs to undergo extraction, transformation, and loading (ETL), and finally transform into structured/semi-structured data that can be directly analyzed by business personnel. Behind the data warehouse, enterprises commonly use BI to analyze data, generate reports, and assist decision-making. Data warehouse is a product that "implements data model construction for enterprises". Data warehouse stores structured and semi-structured data, so who should store unstructured data? Yes, it is the data platform. The data platform was created to solve the problem that the data warehouse cannot handle unstructured data and the report development cycle is long. It first extracts all data formats of the enterprise and puts them together to form a large data set, and then based on business needs , extract small data sets separately and provide them to data applications. Big data platform is the conceptual derivative of data platform in the big data era, and its functions are far better than those of data platform. The big data platform is a technology stack that mainly handles scenarios such as massive data storage, calculation, and real-time calculation of streaming data. It includes data collection, data storage, data calculation, data application, and task scheduling. The most typical one is built based on the Hadoop ecosystem. Big data platform. Under the pressure of computing and storage of unstructured data, real-time data and massive data, companies choose to shift from data warehouses to big data platforms.
中台是相对于“前台和后台”来讲的。前台直接和用户打交道,包括用户直接交互的界面,比如手机app,还有服务端响应用户请求的业务逻辑,比如商品查询。后台虽然用户看不见摸不着,但是不可或缺,包括面向内部运营人员的管理系统、配置系统。后台为前台提供配置。数据仓库算产品,大数据平台算平台,数据中台算机制。相比数据仓库和大数据平台,数据中台离业务更近。数据中台的开发和建设既可以建立数据仓库基础上,也可以建立在大数据平台基础上,区别就在于企业的数据应用场景是否多元化。The middle stage is relative to the "front stage and back stage". The front desk deals directly with users, including interfaces for users to interact directly, such as mobile apps, and business logic for the server to respond to user requests, such as product inquiries. Although the backend is invisible to users, it is indispensable, including the management system and configuration system for internal operations personnel. The backend provides configuration for the frontend. The data warehouse counts as a product, the big data platform counts as a platform, and the data center counts as a mechanism. Compared with data warehouses and big data platforms, the data center is closer to the business. The development and construction of data middle platform can be based on either a data warehouse or a big data platform. The difference lies in whether the enterprise's data application scenarios are diversified.
本发明实施例搭建反电诈总控中台系统,实现数据管理和技术管理对接,完成所需的功能开发;实现上游安全管理内部系统的专线对接,数据隐秘计算传输;实现下游外部金融机构终端专线对接,数据隐秘计算传输,根据不同金融机构设置不同的业务权限。搭建安全管理内部反电诈系统,结合安全管理实际需求,实现数据管理和技术管理对接,完成所需的功能开发;作为上游系统,负责对接安全管理内部所有系统,实现数据归集;输出电诈相关的核心数据信息,通过隐秘计算传输数据至反电诈总控中台。搭建终端系统,负责接收反电诈总控中台数据信息,负责对接金融机构系统访问的证书认证,人脸识别,指纹认证等功能。通过后允许使用方使用反电诈总控平台部分功能。电诈管控,无论安全管理还是金融机构都需要承担起电诈账户的管理职责,对挖掘发现的潜在电信涉诈账户,以及潜在受害人及时进行金融性管理。通过实时数据的交互能够提升警企联动效率,减少诈骗对社会的危害。The embodiment of the present invention builds an anti-email fraud master control middle-end system to realize the docking of data management and technical management, and complete the required function development; realize the dedicated line docking of the upstream security management internal system, data secret calculation and transmission; realize the downstream external financial institution terminal Dedicated line connection, data secret calculation and transmission, and different business permissions set according to different financial institutions. Build an internal anti-email fraud system for security management, combine the actual needs of security management, realize the docking of data management and technical management, and complete the required functional development; as an upstream system, it is responsible for docking all internal systems of security management to achieve data collection; output e-mail fraud Relevant core data information is transmitted to the anti-email fraud master control center through secret calculations. Build a terminal system that is responsible for receiving data information from the central anti-email fraud control center, and is responsible for connecting certificate authentication, face recognition, fingerprint authentication and other functions for financial institution system access. After passing, the user is allowed to use some functions of the anti-email fraud control platform. In terms of electronic fraud control, both security management and financial institutions need to assume the responsibility of managing electronic fraud accounts and conduct timely financial management of discovered potential telecom fraud accounts and potential victims. Through the interaction of real-time data, the efficiency of police-enterprise linkage can be improved and the harm of fraud to society can be reduced.
本发明实施例中反电诈管理预警方法,其能够在确保数据安全的前提下,实现安全管理数据与金融机构数据实时互传和互通,通过数据技术分析挖掘出涉诈账户、潜在涉诈账户和潜在受害人账户,并进行及时预警,降低出现电信诈骗的风险。The anti-email fraud management early warning method in the embodiment of the present invention can realize real-time mutual transmission and interoperability of security management data and financial institution data on the premise of ensuring data security, and unearth fraud-related accounts and potential fraud-related accounts through data technology analysis. and potential victim accounts, and provide timely warnings to reduce the risk of telecommunications fraud.
实施例三Embodiment 3
请参阅图6,图6是本发明实施例公开的一种电子设备的结构示意图。电子设备可以是计算机以及服务器等,当然,在一定情况下,还可以是手机、平板电脑以及监控终端等智能设备,以及具有处理功能的图像采集装置。如图6所示,该电子设备可以包括:Please refer to FIG. 6 , which is a schematic structural diagram of an electronic device disclosed in an embodiment of the present invention. Electronic devices can be computers and servers. Of course, under certain circumstances, they can also be smart devices such as mobile phones, tablets, and monitoring terminals, as well as image acquisition devices with processing functions. As shown in Figure 6, the electronic device may include:
存储有可执行程序代码的存储器510;Memory 510 storing executable program code;
与存储器510耦合的处理器520;processor 520 coupled to memory 510;
其中,处理器520调用存储器510中存储的可执行程序代码,执行实施例一中的反电诈管理预警方法中的部分或全部步骤。The processor 520 calls the executable program code stored in the memory 510 to execute some or all of the steps in the anti-email fraud management early warning method in Embodiment 1.
本发明实施例公开一种计算机可读存储介质,其存储计算机程序,其中,该计算机程序使得计算机执行实施例一中的反电诈管理预警方法中的部分或全部步骤。An embodiment of the present invention discloses a computer-readable storage medium that stores a computer program, wherein the computer program causes the computer to execute some or all of the steps in the anti-email fraud management early warning method in Embodiment 1.
本发明实施例还公开一种计算机程序产品,其中,当计算机程序产品在计算机上运行时,使得计算机执行实施例一中的反电诈管理预警方法中的部分或全部步骤。An embodiment of the present invention also discloses a computer program product, wherein when the computer program product is run on a computer, the computer is caused to execute some or all of the steps in the anti-email fraud management early warning method in Embodiment 1.
本发明实施例还公开一种应用发布平台,其中,应用发布平台用于发布计算机程序产品,其中,当计算机程序产品在计算机上运行时,使得计算机执行实施例一中的反电诈管理预警方法中的部分或全部步骤。An embodiment of the present invention also discloses an application publishing platform, wherein the application publishing platform is used to publish computer program products, wherein when the computer program product is run on a computer, the computer is caused to execute the anti-email fraud management early warning method in Embodiment 1. some or all of the steps.
在本发明的各种实施例中,应理解,所述各过程的序号的大小并不意味着执行顺序的必然先后,各过程的执行顺序应以其功能和内在逻辑确定,而不应对本发明实施例的实施过程构成任何限定。In various embodiments of the present invention, it should be understood that the size of the sequence numbers of each process does not necessarily mean the order of execution. The execution order of each process should be determined by its function and internal logic, and should not be used in the present invention. The implementation of the examples does not constitute any limitations.
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物单元,即可位于一个地方,或者也可以分布到多个网络单元上。可根据实际的需要选择其中的部分或全部单元来实现本实施例方案的目的。The units described as separate components may or may not be physically separated, and the components shown as units may or may not be physical units, that is, they may be located in one place, or they may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of this embodiment.
另外,在本发明各实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。所述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。In addition, each functional unit in various embodiments of the present invention may be integrated into one processing unit, or each unit may exist physically alone, or two or more units may be integrated into one unit. The integrated unit can be implemented in the form of hardware or software functional units.
所述集成的单元若以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可获取的存储器中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或者部分,可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储器中,包括若干请求用以使得一台计算机设备(可以为个人计算机、服务器或者网络设备等,具体可以是计算机设备中的处理器)执行本发明的各个实施例所述方法的部分或全部步骤。If the integrated unit is implemented in the form of a software functional unit and sold or used as an independent product, it may be stored in a computer-accessible memory. Based on this understanding, the technical solution of the present invention is essentially, or the part that contributes to the existing technology, or all or part of the technical solution, can be embodied in the form of a software product, and the computer software product is stored in a memory , including several requests to cause a computer device (which can be a personal computer, a server or a network device, etc., specifically a processor in a computer device) to execute part or all of the steps of the method described in various embodiments of the present invention.
在本发明所提供的实施例中,应理解,“与A对应的B”表示B与A相关联,根据A可以确定B。但还应理解,根据A确定B并不意味着仅仅根据A确定B,还可以根据A和/或其他信息确定B。In the embodiments provided by the present invention, it should be understood that "B corresponding to A" means that B is associated with A, and B can be determined based on A. However, it should also be understood that determining B based on A does not mean determining B only based on A. B can also be determined based on A and/or other information.
本领域普通技术人员可以理解所述实施例的各种方法中的部分或全部步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质包括只读存储器(Read-Only Memory,ROM)、随机存储器(Random Access Memory,RAM)、可编程只读存储器(Programmable Read-only Memory,PROM)、可擦除可编程只读存储器(Erasable Programmable Read-Only Memory,EPROM)、一次可编程只读存储器(One-time Programmable Read-Only Memory,OTPROM)、电子抹除式可复写只读存储器(Electrically-Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(CompactDisc Read-Only Memory,CD-ROM)或其他光盘存储器、磁盘存储器、磁带存储器、或者能够用于携带或存储数据的计算机可读的任何其他介质。Those of ordinary skill in the art can understand that some or all of the steps in the various methods of the embodiments can be completed by instructing relevant hardware through a program. The program can be stored in a computer-readable storage medium, and the storage medium includes only Read-Only Memory (ROM), Random Access Memory (RAM), Programmable Read-only Memory (PROM), Erasable Programmable Read-Only Memory (EPROM), One-time Programmable Read-Only Memory (OTPROM), Electronically Erasable Programmable Read-Only Memory (EEPROM), Read-Only Disc ( CompactDisc Read-Only Memory (CD-ROM) or other optical disk storage, magnetic disk storage, magnetic tape storage, or any other computer-readable medium that can be used to carry or store data.
以上对本发明实施例公开的反电诈管理预警方法、系统、电子设备及存储介质进行了详细介绍,本文中应用了具体个例对本发明的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本发明的方法及其核心思想;同时,对于本领域的一般技术人员,依据本发明的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本发明的限制。The anti-email fraud management early warning method, system, electronic equipment and storage medium disclosed in the embodiments of the present invention have been introduced in detail. This article uses specific examples to illustrate the principles and implementation methods of the present invention. The description of the above embodiments is only It is used to help understand the method and its core idea of the present invention; at the same time, for those of ordinary skill in the field, there will be changes in the specific implementation and application scope according to the idea of the present invention. In summary, this The content of the description should not be construed as limiting the invention.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311063748.1A CN117151736A (en) | 2023-08-22 | 2023-08-22 | Anti-email fraud management early warning method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311063748.1A CN117151736A (en) | 2023-08-22 | 2023-08-22 | Anti-email fraud management early warning method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117151736A true CN117151736A (en) | 2023-12-01 |
Family
ID=88909214
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311063748.1A Pending CN117151736A (en) | 2023-08-22 | 2023-08-22 | Anti-email fraud management early warning method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117151736A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117614743A (en) * | 2024-01-22 | 2024-02-27 | 北京中科网芯科技有限公司 | Phishing early warning method and system thereof |
-
2023
- 2023-08-22 CN CN202311063748.1A patent/CN117151736A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117614743A (en) * | 2024-01-22 | 2024-02-27 | 北京中科网芯科技有限公司 | Phishing early warning method and system thereof |
CN117614743B (en) * | 2024-01-22 | 2024-04-12 | 北京中科网芯科技有限公司 | Phishing early warning method and system thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI764037B (en) | Interaction method and system across blockchain, computer equipment and storage medium | |
Yang et al. | Federated machine learning: Concept and applications | |
US11544394B2 (en) | Information processing apparatus and method for processing information | |
CN112132198B (en) | Data processing method, device and system and server | |
CN113015989A (en) | Block chain supervision | |
CN109410076A (en) | Agricultural product based on block chain technology, which are traced to the source, insures public service platform | |
CN114026823A (en) | Computer system for processing anonymous data and method of operation thereof | |
CN107480540B (en) | Data access control system and method | |
CN111291394B (en) | False information management method, false information management device and storage medium | |
CN112053274B (en) | Construction guide method and device for government block chain network | |
CN111461739A (en) | Bank mobile comprehensive service system and device suitable for second-level legal person | |
US11790638B2 (en) | Monitoring devices at enterprise locations using machine-learning models to protect enterprise-managed information and resources | |
CN117151736A (en) | Anti-email fraud management early warning method and system | |
Altalbe et al. | Assuring enhanced privacy violation detection model for social networks | |
CN117113425B (en) | A privacy compliance method for integrated data analysis of lakes and warehouses | |
JP6342094B1 (en) | Information processing system, information processing method, and program | |
Yang et al. | Research of federated learning application methods and social responsibility | |
US20220318389A1 (en) | Transforming dataflows into secure dataflows using trusted and isolated computing environments | |
CN115840965A (en) | Information security guarantee model training method and system | |
Canelón et al. | Unstructured data for cybersecurity and internal control | |
CN112328652B (en) | Method for mining toxic information based on mobile phone evidence obtaining electronic data | |
Hassan et al. | The internet of things privacy | |
Kachare | A Comparative Review Study on Cyber Crime in recent Aspects | |
Goniwada | Redefining Digital Identity In New Era | |
Deshmukh et al. | Applications of blockchain technology in privacy preserving and data security for real time (data) applications |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |