WO2017104861A1 - Procédé pour empêcher un hameçonnage vocal sur la base de l'internet des objets et appareil associé - Google Patents

Procédé pour empêcher un hameçonnage vocal sur la base de l'internet des objets et appareil associé Download PDF

Info

Publication number
WO2017104861A1
WO2017104861A1 PCT/KR2015/013835 KR2015013835W WO2017104861A1 WO 2017104861 A1 WO2017104861 A1 WO 2017104861A1 KR 2015013835 W KR2015013835 W KR 2015013835W WO 2017104861 A1 WO2017104861 A1 WO 2017104861A1
Authority
WO
WIPO (PCT)
Prior art keywords
voice
call
voice phishing
phishing
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/KR2015/013835
Other languages
English (en)
Korean (ko)
Inventor
김용진
김기대
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Modacom Co Ltd
Original Assignee
Modacom Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Modacom Co Ltd filed Critical Modacom Co Ltd
Priority to PCT/KR2015/013835 priority Critical patent/WO2017104861A1/fr
Publication of WO2017104861A1 publication Critical patent/WO2017104861A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/436Arrangements for screening incoming calls, i.e. evaluating the characteristics of a call before deciding whether to answer it

Definitions

  • the present embodiment relates to a method for preventing voice phishing based on the Internet of Things, an IoT gateway management server, and a system therefor.
  • the present invention determines voice phishing based on an Internet of Things (IoT) service to prevent voice phishing described above, and proposes a technique for preventing the damage of voice phishing in the case of voice phishing.
  • IoT Internet of Things
  • the present embodiment collects call-related information based on the Internet of Things (IoT), determines whether or not the voice call is voice phishing connected to the wired telephone using the call-related information, and when the voice call is determined to be voice phishing
  • An object of the present invention is to provide a method for preventing voice phishing based on the Internet of things that transmits a voice phishing notification message to a terminal that interworks with the device.
  • an IoT gateway when a call connection request signal for a telephone is received, an IoT gateway connects a voice call to the telephone and collects outgoing call information corresponding to the call connection request signal; And determining whether or not the voice call is voice phishing using the outgoing call information, and when the voice call is determined to be voice phishing, transmits a voice phishing notification message to a terminal interworking with the IoT gateway. It provides a voice phishing prevention system based on the IoT, characterized in that it comprises a.
  • the call-related information acquisition unit for obtaining outgoing call information for the voice call connected to the phone from the IoT gateway;
  • a voice phishing determination unit which determines whether the voice call is voice phishing by comparing the outgoing call information with a pre-stored voice phishing list;
  • An IoT group inquiry unit for querying at least one or more terminals included in the IoT group interoperating with the IoT gateway when it is determined that the voice call is voice phishing;
  • a voice phishing notification processing unit configured to transmit a voice phishing notification message to the at least one terminal.
  • the call-related information acquisition process of obtaining the outgoing call information for the voice call connected to the phone from the IoT gateway;
  • a voice phishing judgment process of determining whether the voice call is voice phishing by comparing the outgoing call information with a pre-stored voice phishing list; If it is determined that the voice call is voice phishing, an IoT group inquiry step of querying at least one or more terminals included in the IoT group linked with the IoT gateway;
  • a voice phishing notification process of transmitting a voice phishing notification message to the at least one terminal.
  • the IoT gateway management server has an effect of determining a voice phishing call made to a phone based on an Internet of Things (IoT).
  • IoT Internet of Things
  • the IoT gateway management server has an effect of accurately determining voice phishing by determining whether or not voice phishing is performed based on outgoing call information of a voice call or frequency of use of voice patterns.
  • the IoT gateway management server transmits a voice phishing notification message to a terminal interworking with the IoT gateway to perform voice phishing warning control, thereby effectively notifying voice users of voice phishing.
  • FIG. 1 is a diagram schematically showing a system for preventing voice phishing based on the Internet of Things according to the present embodiment.
  • FIG. 2 is a block diagram schematically illustrating the IoT gateway management server according to the present embodiment.
  • FIG. 3 is a flowchart illustrating a method of preventing voice phishing based on the Internet of Things according to the present embodiment.
  • FIG. 4 is a flowchart illustrating an operation of determining voice phishing based on the Internet of Things according to the present embodiment.
  • the present invention was carried out as part of the R & D project of the Ministry of Science, ICT and Future Planning and Information Communication Technology Promotion Center. [13-911-04-006, Development of Social M2M Service]
  • FIG. 1 is a diagram schematically showing a system for preventing voice phishing based on the Internet of Things according to the present embodiment.
  • Voice phishing prevention system 100 based on the Internet of Things (IoT) according to the present embodiment includes a phone 102, an IoT gateway 110, an IoT gateway management server 120, and an IoT Information storage server 130, voice phishing information storage server 140, a push notification server (Push Server 150) and the terminal 160.
  • the voice phishing prevention system 100 shown in FIG. 1 is according to one embodiment, and not all blocks shown in FIG. 1 are essential components, and in other embodiments, some blocks included in the voice phishing prevention system 100 are described. This can be added, changed or deleted.
  • the telephone 102 refers to a voice communication terminal that performs a voice call.
  • the telephone 102 is preferably a wired telephone connected by wire in connection with a public switched telephone network (PSTN) network, but is not necessarily limited thereto, and may be an internet telephone capable of making a voice call in connection with an internet network.
  • PSTN public switched telephone network
  • the phone 102 performs a voice call according to the connection control of the IoT gateway 110.
  • the IoT gateway 110 first receives the call connection request signal, and the phone 102 receives the IoT.
  • the connection control (telephone exchange) of the gateway 110 a voice call corresponding to the call connection request signal is performed.
  • the IoT gateway 110 interworks with the phone 102 to collect various data related to a voice call.
  • the IoT gateway 110 may be connected to the phone 102 in a one-to-one (1: 1) structure, but is not necessarily limited thereto.
  • the IoT gateway 110 may be connected to a speaker, a monitor, a terminal, and the like, which are located around the phone 102. (1: N, N is two or more natural numbers) may be connected to the structure.
  • the IoT gateway 110 receives a call connection request signal for the telephone number of the telephone 102, that is, the telephone 102 from an external communication network (for example, a PSTN), and then makes a voice call to the telephone 102. Connect it.
  • an external communication network for example, a PSTN
  • the IoT gateway 110 connects the voice call to the phone 102 and collects call related information about outgoing call information on the call connection request signal or frequency of use of the voice pattern on the voice call, and collects the collected call.
  • the relevant information is transmitted to the IoT gateway management server 120.
  • the call-related information may be information including basically outgoing call information and additionally using frequency information.
  • the outgoing call information collected by the IoT gateway 110 may be an outgoing call number of the caller who has requested a call connection to the phone 102.
  • the use frequency information of the voice pattern collected by the IoT gateway 110 means information on the use frequency of the preset voice pattern in the voice call content for a predetermined time after connecting the voice call to the phone (102). do.
  • the method of confirming the preset speech pattern may be one of speech recognition modeling, corpus analysis, speech wave frequency analysis, and the like, which generally determine the frequency of the speech pattern.
  • the IoT gateway 110 is connected based on a voice phishing warning control signal including a notification broadcast, a notification text, a VoIP call connection, a PPT method connection, etc., to warn voice phishing from the IoT gateway management server 120.
  • Voice phishing alert notification is performed using the speaker, monitor, and terminal.
  • the IoT gateway management server 120 determines a voice phishing for a voice call connected to the phone 102 based on the IoT, and refers to an apparatus for preventing voice phishing. In other words, the IoT gateway management server 120 determines whether the voice call connected to the phone 102 is voice phishing using the call related information, and when the voice call is determined to be voice phishing, the IoT gateway 110 is connected to the IoT gateway 110. The voice phishing notification message is transmitted to the terminal 160 to interwork.
  • the IoT gateway management server 120 determines whether a voice call is voice phishing based on the call-related information collected from the IoT gateway 110. Here, the IoT gateway management server 120 determines whether the voice call is voice phishing using the outgoing call information or frequency of use of the voice pattern included in the call related information.
  • the IoT gateway management server 120 compares the voice phishing list previously stored in the voice phishing information storage server 140 with the outgoing call information, and the same information as the outgoing call information exists in the voice phishing list. If so, it is determined that the voice call is voice phishing.
  • IoT gateway management server 120 compares the voice pattern use frequency and the preset reference frequency of the use frequency information, if the voice pattern use frequency exceeds the reference frequency, It is determined that the voice call is voice phishing.
  • the IoT gateway management server 120 inquires the terminal 160 included in the IoT group interoperating with the IoT gateway 110 in the IoT information storage server 130. Then, the terminal 160 information is sent to the push notification server 150. The IoT gateway management server 120 transmits the terminal 160 information to the push notification server 150 to transmit the voice phishing notification message to the terminal 160.
  • the terminal 160 included in the IoT group may be one, but may also be a plurality of terminals 162, 164, and 166.
  • the IoT gateway management server 120 may transmit a voice phishing notification message to the terminal 160 in association with the push notification server 150.
  • the voice phishing notification message may be a message having a plurality of steps based on the probability of being voice phishing.
  • the voice phishing notification message may be a message of three levels, such as 'suspicious', 'warning', 'danger' divided by the degree of matching the outgoing call information or the frequency of use of the voice pattern.
  • the IoT gateway management server 120 may transmit the retrieved terminal 160 information to the push notification server 150 and transmit a voice phishing notification message to the IoT gateway 110.
  • the IoT gateway management server 120 obtains a voice phishing warning control signal corresponding to the voice phishing notification message from the terminal 160 and connects the speaker, monitor, and terminal connected to the IoT gateway 110 according to the voice phishing warning control signal.
  • Voice phishing alert notification such as notification broadcast, notification text, VoIP call connection, and PPT connection is performed.
  • the IoT information storage server 130 stores the information on the IoT group interworking with the IoT gateway 110, and transmits the IoT group information to the IoT gateway management server at the request of the IoT gateway management server 120. Provided by 120. For example, when the IoT gateway 110 is installed in a home of an elderly parent, the IoT information storage server 130 may be connected to an IoT group including a terminal of a child who is pre-subscribed to interwork with the IoT gateway 110. Save the information.
  • the voice phishing information storage server 140 stores a voice phishing list including a plurality of confirmed voice phishing phone information.
  • the voice phishing information storage server 140 provides the voice phishing list to the IoT gateway management server 120 at the request of the IoT gateway management server 120.
  • the voice phishing information storage server 140 manages the voice phishing list by obtaining voice phishing phone information as a server that is managed and operated by an external institution server.
  • the voice phishing information storage server 140 is a server that is managed and operated by the National police Agency, the Financial Supervisory Service.
  • the push notification server 150 refers to a server that provides a push notification service.
  • the push notification server 150 receives the information and voice phishing notification message of the terminal 160 included in the IoT group from the IoT gateway management server 120, and voice-phishes to the terminal 160 using a push notification service. Send a notification message.
  • the terminal 160 is a terminal subscribed to the IoT service, and refers to a terminal included in the IoT group interoperating with the IoT gateway 110. If it is determined that the voice call connected to the phone 102 is voice phishing, the terminal 160 receives a voice phishing notification message.
  • the terminal 160 performs voice phishing warning control to the IoT gateway 110 based on the voice phishing notification message so that the user who uses the phone 102 can recognize that the voice phishing voice call is a voice phishing voice call.
  • the voice phishing warning control transmits a preset notification broadcast or notification text to the IoT gateway management server 120, or performs a voice over internet protocol (VoIP) call connection or a PPT (push to talk) connection.
  • VoIP voice over internet protocol
  • PPT push to talk
  • FIG. 2 is a block diagram schematically illustrating the IoT gateway management server according to the present embodiment.
  • the IoT gateway management server 120 based on the Internet of Things (IoT) according to the present embodiment includes a call-related information acquisition unit 210, a voice phishing determination unit 220, and an IoT group inquiry unit 230. And a voice phishing notification processor 240.
  • the IoT gateway management server 120 shown in FIG. 2 is according to an embodiment, and not all blocks shown in FIG. 2 are essential components, and in another embodiment, the IoT gateway management server 120 is included in the IoT gateway management server 120. Some blocks may be added, changed or deleted.
  • the call related information obtaining unit 210 obtains call related information about the voice call connected to the phone 102 from the IoT gateway 110.
  • the call related information includes outgoing call information or frequency of use of voice patterns.
  • the outgoing call information refers to the caller's outgoing phone number of the caller who has requested a call connection to the phone 102
  • the use frequency information of the voice pattern refers to a call from the voice call content for a predetermined time after connecting the voice call to the phone 102. Means information on the frequency of use of the set voice pattern.
  • the voice phishing determination unit 220 determines whether a voice call is voice phishing based on the call related information. The voice phishing determination unit 220 determines whether the voice call is voice phishing using the outgoing call information included in the call related information or the use frequency information of the preset voice pattern.
  • the voice phishing determination unit 220 includes a first determination unit 222 and a second determination unit 224, the first determination unit 222 determines whether or not voice phishing of the voice call based on the outgoing call information The second determination unit 224 determines whether or not the voice call is phishing based on the frequency of use of the voice pattern.
  • the first determination unit 222 compares the voice phishing list previously stored in the voice phishing information storage server 140 with the outgoing call information, and when the same information as the outgoing call information is present in the voice phishing list, the voice call is voice phishing. I think that. For example, when the outgoing call information is '02 -123-4567 ', the first determination unit 222 checks whether the same information as '02 -123-4567' is present in the voice phishing list to determine whether or not the voice call is made. Determines whether voice phishing
  • the second determination unit 224 compares the voice pattern use frequency of the use frequency information with a preset reference frequency, and determines that the voice call is voice phishing when the voice pattern use frequency exceeds the reference frequency. For example, if the preset voice pattern is 'bank, police, remittance, or withdrawal' and the preset reference frequency is three times, the second judging unit 224 three times for each of 'bank, police, remittance, and withdrawal'. It is determined whether a voice call is voice phishing by checking whether a voice pattern having a frequency exceeding a frequency exists.
  • the IoT gateway management server 120 may transmit a voice phishing notification message having a plurality of steps according to a degree in which the use frequency of the use frequency information exceeds a preset reference frequency. For example, the IoT gateway management server 120 may generate a voice phishing notification message having one of 'suspicious', 'warning', and 'danger' according to the frequency of use of the voice pattern exceeded. Can transmit a voice phishing notification message having a plurality of steps according to a degree in which the use frequency of the use frequency information exceeds a preset reference frequency. For example, the IoT gateway management server 120 may generate a voice phishing notification message having one of 'suspicious', 'warning', and 'danger' according to the frequency of use of the voice pattern exceeded. Can transmit
  • the voice phishing determination unit 220 determines that the voice call is not voice phishing based on the outgoing call information by the first determination unit 222, and based on the frequency of use of the voice pattern by the second determination unit 224. It is preferable to determine whether or not the voice call is voice phishing, but is not necessarily limited thereto. Even if the voice call is determined to be voice phishing based on the outgoing call information by the first determination unit 222, a more accurate judgment or voice is made. In order to analyze the type of phishing, the second determining unit 224 may further determine whether or not voice phishing is performed.
  • the IoT group inquiry unit 230 interworks with the IoT gateway 110 in association with the IoT information storage server 130. Inquires about at least one terminal 160 included in the group.
  • the voice phishing notification processor 240 transmits the terminal 160 information queried by the IoT group inquiry unit 230 to the push notification server 150.
  • the voice phishing notification processor 240 supports the voice phishing notification message to be transmitted to the terminal 160 based on the push notification service in association with the push notification server 150.
  • the voice phishing notification processing unit 240 transmits the IoT group terminal 160 information and the voice phishing notification message, which are inquired by the push notification server 150, and simultaneously transmits the voice phishing notification message to the IoT gateway 110. It may be.
  • FIG. 3 is a flowchart illustrating a method of preventing voice phishing based on the Internet of Things according to the present embodiment.
  • the IoT gateway 110 receives a call connection request signal from an external communication network (S310), and connects a voice call to the phone 102 (S320).
  • the IoT gateway management server 120 obtains call related information corresponding to the voice call from the IoT gateway 110 (S330).
  • the call related information includes outgoing call information or frequency of use of voice patterns.
  • the IoT gateway management server 120 determines whether the voice call is phishing based on the call related information (S340). The IoT gateway management server 120 determines whether the voice call is voice phishing using the outgoing call information included in the call related information or the use frequency information of the preset voice pattern.
  • the IoT gateway management server 120 compares the voice phishing list previously stored in the voice phishing information storage server 140 with the outgoing call information, and the same information as the outgoing call information exists in the voice phishing list. If so, it is determined that the voice call is voice phishing.
  • IoT gateway management server 120 compares the voice pattern use frequency and the preset reference frequency of the use frequency information, if the voice pattern use frequency exceeds the reference frequency, It is determined that the voice call is voice phishing.
  • step S340 If it is determined in step S340 that the voice call is voice phishing (S350), the IoT gateway management server 120 inquires the terminal 160 included in the IoT group interworking with the IoT gateway 110. (S360).
  • the IoT gateway management server 120 transmits the information on the terminal 160 included in the IoT group and the voice phishing notification message to the push notification server 150 (S370).
  • the push notification server 150 transmits the voice phishing notification message to the terminal 160 corresponding to the terminal 160 information based on the push notification service (S372).
  • the terminal 160 receives the voice phishing notification message from the push notification server 150, and performs voice phishing warning control based on the voice phishing notification message (S380).
  • the voice phishing warning control transmits a preset notification broadcast or notification text to the IoT gateway 110, or controls to perform a voice over internet protocol (VoIP) call connection or a push to talk (PPT) method. it means.
  • VoIP voice over internet protocol
  • PPT push to talk
  • steps S310 to S380 are described as being sequentially executed. However, this is merely illustrative of the technical idea of the present embodiment, and those of ordinary skill in the art to which the present embodiment pertains will be described. 3 may be modified and modified in various manners by changing the order described in FIG. 3 or executing one or more steps of steps S310 to S380 in parallel without departing from the essential characteristics, and thus, FIG. It is not limited.
  • FIG. 4 is a flowchart illustrating an operation of determining voice phishing based on the Internet of Things according to the present embodiment.
  • the IoT gateway management server 120 obtains call related information including outgoing call information or frequency of use of a voice pattern corresponding to the voice call from the IoT gateway 110 (S410).
  • the IoT gateway management server 120 compares the outgoing call information with a pre-stored voice phishing list (S420).
  • step S420 when there is information matching the outgoing call information in the stored voice phishing list, the IoT gateway management server 120 determines that the voice call corresponding to the outgoing call information is voice phishing.
  • the voice phishing notification message is transmitted to the terminal 160 included in the Internet group by using the push notification server 150 (S440). If there is information matching the outgoing call information in the voice phishing list in step S420, the IoT gateway management server 120 is described as performing step S440, but is not limited thereto, and the voice call is voiced in step S420. Even if it is determined to be phishing, steps S430 to S440 may be additionally performed to analyze the exact judgment or the type of voice phishing.
  • step S420 when there is no information matching the outgoing call information in the previously stored voice phishing list or there is some matching information, the IoT gateway management server 120 uses the frequency of use of the frequency pattern information. And compare the preset reference frequency with (S430).
  • step S430 when the frequency of use of the frequency information exceeds a preset reference frequency, the IoT gateway management server 120 determines that the voice call is voice phishing and includes the voice phishing notification message in the IoT group.
  • the push notification server 150 is transmitted to the terminal 160 (S440).
  • IoT gateway management server 120 determines that the voice call is not voice phishing and terminates the process for preventing voice phishing. .
  • steps S410 to S440 are sequentially described.
  • this is merely illustrative of the technical idea of the present embodiment, and a person having ordinary knowledge in the technical field to which the present embodiment belongs may use the present embodiment.
  • 4 may be modified and modified in various ways, such as by changing the order described in FIG. 4 or executing one or more steps of steps S410 to S440 in parallel without departing from the essential characteristics thereof. It is not limited.
  • IoT gateway 120 IoT gateway management server
  • IoT information storage server 140 voice phishing information storage server
  • related information acquisition unit 220 voice phishing determination unit
  • IoT group inquiry unit 230 IoT group inquiry unit 240: voice phishing notification processing unit

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Telephonic Communication Services (AREA)

Abstract

L'invention concerne un procédé pour empêcher un hameçonnage vocal sur la base de l'Internet des objets (IoT) et un appareil associé. La présente invention concerne un procédé pour empêcher un hameçonnage vocal sur la base de l'IoT et un appareil associé, le procédé consistant : à collecter des informations associées à un appel sur la base de l'IoT ; à déterminer si un appel vocal connecté à un téléphone filaire est un hameçonnage vocal ou non par utilisation des informations associées à un appel ; si l'appel vocal est déterminé comme étant un hameçonnage vocal, à transmettre un message de notification de hameçonnage vocal aux terminaux reliés à l'IoT.
PCT/KR2015/013835 2015-12-16 2015-12-16 Procédé pour empêcher un hameçonnage vocal sur la base de l'internet des objets et appareil associé Ceased WO2017104861A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/KR2015/013835 WO2017104861A1 (fr) 2015-12-16 2015-12-16 Procédé pour empêcher un hameçonnage vocal sur la base de l'internet des objets et appareil associé

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/KR2015/013835 WO2017104861A1 (fr) 2015-12-16 2015-12-16 Procédé pour empêcher un hameçonnage vocal sur la base de l'internet des objets et appareil associé

Publications (1)

Publication Number Publication Date
WO2017104861A1 true WO2017104861A1 (fr) 2017-06-22

Family

ID=59056904

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2015/013835 Ceased WO2017104861A1 (fr) 2015-12-16 2015-12-16 Procédé pour empêcher un hameçonnage vocal sur la base de l'internet des objets et appareil associé

Country Status (1)

Country Link
WO (1) WO2017104861A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830999A (zh) * 2019-10-18 2020-02-21 国家计算机网络与信息安全管理中心 一种呼叫处置策略的加密方法
CN112669187A (zh) * 2020-12-31 2021-04-16 深圳云天励飞技术股份有限公司 身份识别方法、装置、电子设备及相关产品

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100126044A (ko) * 2009-05-22 2010-12-01 (주)아이피웍스 전화망에서의 국제호에 대한 보이스 피싱 안내방송 서비스
KR20110048825A (ko) * 2009-11-03 2011-05-12 김대환 금융사기 방지 시스템 및 방법
KR20140023714A (ko) * 2012-08-17 2014-02-27 (주)케이믹글로벌 보이스피싱 방지장치, 사용자 단말장치 및 보이스피싱 방지방법
KR20140059068A (ko) * 2012-11-07 2014-05-15 주식회사 네이블커뮤니케이션즈 보이스 피싱 방지 방법 및 이를 수행하는 보이스 피싱 방지 서버
KR20140070880A (ko) * 2012-11-28 2014-06-11 한국전자통신연구원 인터넷 전화에서 보이스피싱을 차단하는 방법 및 그 시스템

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100126044A (ko) * 2009-05-22 2010-12-01 (주)아이피웍스 전화망에서의 국제호에 대한 보이스 피싱 안내방송 서비스
KR20110048825A (ko) * 2009-11-03 2011-05-12 김대환 금융사기 방지 시스템 및 방법
KR20140023714A (ko) * 2012-08-17 2014-02-27 (주)케이믹글로벌 보이스피싱 방지장치, 사용자 단말장치 및 보이스피싱 방지방법
KR20140059068A (ko) * 2012-11-07 2014-05-15 주식회사 네이블커뮤니케이션즈 보이스 피싱 방지 방법 및 이를 수행하는 보이스 피싱 방지 서버
KR20140070880A (ko) * 2012-11-28 2014-06-11 한국전자통신연구원 인터넷 전화에서 보이스피싱을 차단하는 방법 및 그 시스템

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110830999A (zh) * 2019-10-18 2020-02-21 国家计算机网络与信息安全管理中心 一种呼叫处置策略的加密方法
CN110830999B (zh) * 2019-10-18 2023-04-07 国家计算机网络与信息安全管理中心 一种呼叫处置策略的加密方法
CN112669187A (zh) * 2020-12-31 2021-04-16 深圳云天励飞技术股份有限公司 身份识别方法、装置、电子设备及相关产品
WO2022142903A1 (fr) * 2020-12-31 2022-07-07 深圳云天励飞技术股份有限公司 Procédé et appareil de reconnaissance d'identité, dispositif électronique et produit associé
CN112669187B (zh) * 2020-12-31 2024-04-02 深圳云天励飞技术股份有限公司 身份识别方法、装置、电子设备及相关产品

Similar Documents

Publication Publication Date Title
CN105279808A (zh) 一种签到方法、装置和签到服务器
WO2017061698A1 (fr) Système de portier téléphonique intelligent et procédé d'appel pour celui-ci
CN105721511B (zh) 一种移动终端的身份验证方法
CN114221993A (zh) 移动式GoIP设备监测方法、装置、存储介质及电子设备
WO2025192952A1 (fr) Appareil anti-hameçonnage et son procédé de fonctionnement
WO2017104861A1 (fr) Procédé pour empêcher un hameçonnage vocal sur la base de l'internet des objets et appareil associé
US7889718B2 (en) Determining physical location of network devices
US20070274299A1 (en) Methods, computer programs, and apparatus for providing emergency number compliant VoIP devices
CN110213675A (zh) 一种基于物联网的双模对讲机及系统
WO2017078358A1 (fr) Système et procédé de communication de sécurité utilisant la biométrie
WO2012148088A2 (fr) Système de communication pour établir sélectivement une connexion à un réseau de données ou de communication téléphonique suivant les besoins à l'aide de base de données selon qu'une fonction d'envoi/réception de données par paquets est incluse ou non dans un terminal récepteur, et son procédé d'exploitation
WO2022065850A1 (fr) Système et procédé de configuration d'eec pour la fourniture de services et la découverte d'un ou plusieurs eas
WO2013042891A1 (fr) Service d'appel d'urgence et système de sécurité de services bancaires en ligne/hors ligne utilisant une authentification de téléphone intelligent et procédé associé
WO2014175583A1 (fr) Procédé et appareil d'inspection de message malveillant
CN106998399A (zh) 一种实现专网和公网通信的多网多载波式系统
CN108423505A (zh) 电梯救援用智能终端及电梯系统及智能救援方法
WO2021107382A1 (fr) Système de détection d'incendie
WO2015034174A1 (fr) Système permettant de commuter et de générer une sonnerie entrante commandée par un émetteur, et procédé associé
WO2011040667A1 (fr) Procédé et système de communication par attribution et enregistrement de comptes dynamiques
CN204374714U (zh) 一种社区老年人平安监控系统
CN104144397A (zh) 一种取消被设定为呼叫转移号码的方法及核心网设备
CN101163171B (zh) 一种基于接入网实现上行业务接口保护的方法
CN204481917U (zh) 一种无人值班变电站电话通道自动检测系统
WO2018155809A1 (fr) Système et procédé de détection de voyage vers un pays où une maladie infectieuse s'est produite, sur la base d'informations d'itinérance à l'étranger
CN206878936U (zh) 一种防止短时间内重复呼入的电话通信系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15910784

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 10/10/2018)

122 Ep: pct application non-entry in european phase

Ref document number: 15910784

Country of ref document: EP

Kind code of ref document: A1