Method and a system for detecting telephone numbers used by SIM boxes for soliciting telephone calls
10681221 ยท 2020-06-09
Assignee
Inventors
- Xavier Lesage (Neuilly sur Seine, FR)
- Christophe Scholer (Villeurbanne, FR)
- Philippe Orsini (Toulon, FR)
- Alexandre Marchal (Lyons, FR)
- Lilian Perron (Lyons, FR)
Cpc classification
H04M15/751
ELECTRICITY
H04M3/2281
ELECTRICITY
H04M15/00
ELECTRICITY
International classification
Abstract
The invention relates to a method (100) of detecting a soliciting telephone number that is being used fraudulently for soliciting calls to target numbers. The method (100) comprises a plurality of iterations of a detection stage (104) comprising the following steps: sending (106) a telephone call to at least one target number; receiving (108) at least one message; detecting (110) at least one soliciting number from said received message; and detecting a new target number in said received message; the method being characterized in that it includes a new iteration of the detection stage (104) using said new target number when said target number is a new number. The invention also provides a system for performing such a method (100).
Claims
1. A method (100) of detecting at least one telephone number referred to as a soliciting number, that is being used for soliciting telephone calls to at least one telephone number, referred to as a target number, said method (100) comprising a detection stage (104) comprising the following steps: sending (106) a telephone call by means of at least one robot (204) using at least one test telephone number, the telephone call being sent to at least one previously-detected target number; receiving (108) at least one message at said test number; and for at least one received message: detecting (110) a telephone number contained in said telephone message and storing (112) said number as a target number when said number is a new number; and/or storing (112) the telephone number that sent said message as a soliciting number when said number is a new number; said method (100) including at least one new iteration of said detection stage (104) using at least one new target number detected during said detection step.
2. A method (100) according to claim 1, characterized in that it further comprises a preliminary step (102) of preparing a target list (216) comprising at least one target number.
3. A method (100) according to claim 2, characterized in that the preliminary step (102) of preparing a target list (216) comprises reading at least one telephone number in a list of premium rate numbers.
4. A method (100) according to claim 1, characterized in that, for at least one target number, the step (106) of sending at least one telephone call comprises sending a voice call.
5. A method (100) according to claim 1, characterized in that, for at least one target number, the step (106) of sending at least one telephone call comprises sending a message of SMS, SMS+, or MMS type.
6. A method (100) according to claim 1, characterized in that, when the received message is a written message, the detection step (110) comprises analyzing to syntax of said message in order to identify a numerical or possibly an alphanumerical string corresponding to a telephone number.
7. A method (100) according to claim 1, characterized in that when the received message is a sound message, the detection step (110) comprises frequency analysis of the signal constituting said message in order to identify a numerical or possibly an alphanumerical string corresponding to a telephone number.
8. A method (100) according to claim 1, characterized in that it includes an iteration of the detection stage (104) making use solely of one or more new target numbers detected during an earlier iteration of said detection stage (104).
9. A method (100) according to claim 1, characterized in that it includes an iteration of the detection stage (104) using at least one target number that has previously been used in a preceding iteration.
10. A method (100) according to claim 1, characterized in that it includes a step (114) of deactivating at least one SIM card (212.sub.1-212.sub.m) associated with a soliciting number.
11. A system (200) for detecting a telephone number, referred to as a soliciting number, that is being used for soliciting a telephone call to at least one telephone number, referred to as a target number, said system (200) comprising: at least one call robot (204.sub.1-204.sub.n) for making test calls to one or more soliciting numbers using one or more test numbers; and at least one server (202) configured to perform or trigger all of the steps of the method (100) according to claim 1.
12. A system (200) according to claim 11, characterized in that the server (202) is situated remotely from one or more call robots (204.sub.1-204.sub.n).
Description
DESCRIPTION OF THE FIGURES AND OF IMPLEMENTATIONS AND EMBODIMENTS
(1) Other advantages and characteristics appear on reading the following detailed description of non-limiting examples, and the accompanying drawings, in which:
(2)
(3)
(4) Naturally, the implementations and embodiments that are described below are not limiting in any way. In particular, variants of the invention may be devised comprising only a selection of the characteristics described below in isolation from other described characteristics, providing the characteristics that are selected suffice to impart a technical advantage or to distinguish the invention from the state of the prior art. This selection comprises at least one preferably functional characteristic without structural details, or with only a portion of its structural details if that portion alone suffices to confer a technical advantage or to distinguish the invention relative to the state of the prior art.
(5) In particular, all of the variants, implementations, and embodiments described can be combined with one another if there is no technical reason for preventing such combination.
(6) In the figures, elements that are common to more than one of the figures are given the same references.
(7)
(8) The method 100, shown in
(9) By way of example, and in non-limiting manner, a target number may be a premium rate telephone number, or a telephone number in another mobile telephone network. A target number may be identified in a list of premium rate telephone numbers.
(10) A target number may be a telephone number that has previously been reported by a user who has been the victim of unexpected and high billing.
(11) A target number may be identified by one or more robots carrying out a calling campaign to random numbers, and by analyzing the cost of each call.
(12) Once the list has been prepared, the method 100 comprises at least two iterations of a stage 104 of detecting soliciting numbers that are being used fraudulently, e.g. in SIM boxes, to solicit telephone calls to target numbers, by the means of unsolicited messages that they send to users.
(13) The detection stage 104 comprises a step 106 during which a robot sends a telephone call to a target number. A telephone number, referred to as a test number, is used for sending this test call. The test call may be a message, of SMS or MMS type, that is sent to the target number. Alternatively, the test call may be a voice call that may be answered or unanswered, with or without any sound signal being sent.
(14) The step 106 may be performed for each target number, using the same test number or with different test numbers.
(15) Sending a test call causes unsolicited messages to be received during a step 108 inviting a telephone call to be made in the form of a voice call or a message to a target number specified in said message.
(16) During the step 110, each received message is analyzed in order: to identify a soliciting telephone number: this number is the number used for sending the message; and to identify a target number: this number is included in the body of the message. This is the number for which a request is being made explicitly to send a voice call or to send a message. This number is generally the subject of special pricing, such as a premium rate service or a foreign telephone number, for example.
(17) When the received message is a written message, identifying the target number comprises analyzing the text of the message in order to identify a numerical or an alphanumerical string corresponding to a telephone number.
(18) When the received message is a sound message, identifying the target number comprises frequency analysis of the message in order to identify a numerical or an alphanumerical string corresponding to a telephone number.
(19) During a step 112, the target number detected in the unsolicited message received in step 108 and identified during step 110 is stored as a target number for a new iteration of the detection stage 104, in particular when the target number is a new number.
(20) This step 112 can store each new target number detected during the step 110 in the target list prepared during the preliminary step 102. Alternatively, this step 112 may store each new target number detected during the step 110 in a new list, which is used as a target list during a future iteration of the detection stage 104.
(21) The step 112 also stores the soliciting number in a list, referred to as a soliciting list, in particular when the soliciting number is detected as being a new number.
(22) The detection stage 104 is repeated at least one more time, either with the initial target list updated with the new target numbers identified during the step 110, or else with a new target list prepared during the step 112.
(23) The detection stage 104 may be repeated as many times as necessary and/or desired, e.g. until no new target number is detected.
(24) After the detection stage 104, the method 100 comprises a step 114 of disconnecting SIM cards associated with each soliciting number detected during the step 110 and stored during the step 112.
(25)
(26) The system 200 as shown in
(27) The robots 204 are in communication with a SIM card server 206 that may be located on a site that is remote from the robots 204, or on the same site(s) as the robots 204. The SIM card server 206 may be in communication with each of the robots 204 via an Internet type communication network, e.g. via a VPN.
(28) The robots 204 are arranged to send test calls, such as test calls or test messages to one or more target numbers 208.sub.1-208.sub.k that are subject to specific pricing.
(29) In return, unsolicited messages are sent to the call robots 204.sub.1-204.sub.n by a SIM card server 210, also referred to as a SIM box, making fraudulent use of soliciting numbers associated with SIM cards 212.sub.1-212.sub.m.
(30) The server 202 includes software and/or hardware modules configured to perform the stage of preparing a list of target numbers.
(31) In particular, the server 202 has a module 214 configured to consult directories of premium rate numbers, a directory of numbers that have been reported as fraudulent by users, etc., in order to prepare a target list 216 of target numbers.
(32) The server 202 includes an analysis module 218 for analyzing each message received by the call robots 204.sub.1-204.sub.n in order to detect and store a soliciting number corresponding to the telephone number that sent the message. The soliciting number is stored as a soliciting number in a list 220 if it is a new number that is not already included in the list 220. The soliciting number corresponds to a telephone number, e.g. associated with a SIM card 212 used in the SIM box 210.
(33) The server 202 includes an analysis module 222 for analyzing the content of each message received by the call robots 204.sub.1-204.sub.n in order to detect a target number within the body of such a message and then store it, the target number corresponding to the telephone number for which the message is soliciting a telephone call. The target number is stored as being a target number in the target list 216, providing it is a new number that is not already included in the list 216. The target number corresponds to a telephone number, e.g. associated with a SIM card 208.sub.i, that is the subject of specific pricing.
(34) The server 202 also includes a module 224 for monitoring and controlling the call robots 204 in order to make test calls via a mobile telephone network 226.
(35) The server 202 also has storage means 228 for storing various kinds of data, such as the lists 216 and 220.
(36) Naturally, the invention is not limited to the above-described examples.