METHOD FOR ASSISTING A USER OF A TERMINAL IN DECIDING TO APPROVE A COMMUNICATION, OR NOT, CORRESPONDING DECISION-MAKING ASSIST SYSTEM AND COMPUTER PROGRAM
20250048112 ยท 2025-02-06
Inventors
Cpc classification
International classification
Abstract
A decision-making assist method for a user of a first terminal receiving a communication request originating from a second terminal, the user of the second terminal being unknown to the user of the first terminal. The method includes determining a trust score of the user of the second terminal and a trust deviation, the trust deviation providing information on a reliability of the trust score. The trust score and the trust deviation are determined from a list including at least one user of a third terminal to which the second terminal has already transmitted a communication request, the at least one user of the third terminal belonging to at least one user community.
Claims
1. A decision-making assist method for a user of a first terminal receiving a communication request originating from a second terminal, the user of the second terminal still not having transmitted any communication request to the user of the first terminal, the method comprising: determining a trust score of the user of the second terminal and a trust deviation, the trust deviation providing information on a reliability of the trust score, the trust score and the trust deviation being determined from a list comprising at least one user (3.sub.1, 3.sub.4, 3.sub.7) of a third terminal to which the second terminal has already transmitted a communication request, the at least one user (3.sub.1, 3.sub.4, 3.sub.7) of the third terminal belonging to at least one user community (C.sub.1, C.sub.2, C.sub.4).
2. The decision-making assist method according to claim 1, wherein the list comprises three users (3.sub.1, 3.sub.4, 3.sub.7) of respectively three terminals to which the second terminal has already transmitted a communication request.
3. The decision-making assist method according to claim 1, wherein the determination of the trust score and of the trust deviation comprises selecting at least one pair ([3.sub.1, 3.sub.4], [3.sub.1, 3.sub.7], [3.sub.4, 3.sub.7]) of users in the list.
4. The decision-making assist method according to claim 3, wherein the determination of the trust score comprises, for each pair ([3.sub.1, 3.sub.4], [3.sub.1, 3.sub.7], [3.sub.4, 3.sub.7]) of users, computing a minimum intercommunity distance (D[3.sub.1, 3.sub.4], D[3.sub.1, 3.sub.7], D[3.sub.4, 3.sub.7]), the minimum intercommunity distance being determined from community sets (C.sub.1, C.sub.2, C.sub.4) to which the users of the pair belong, the trust score corresponding to an average of the minimum intercommunity distances (D[3.sub.1, 3.sub.4], D[3.sub.1, 3.sub.7], D[3.sub.4, 3.sub.7]) of the pairs ([3.sub.1, 3.sub.4], [3.sub.1, 3.sub.7], [3.sub.4, 3.sub.7]).
5. The decision-making assist method according to claim 4, wherein the minimum intercommunity distance of a pair is zero when the users of the pair have one community in common.
6. The decision-making assist method according to claim 4, wherein the minimum intercommunity distance of a pair is at least equal to 1 when the users of the pair have no community in common.
7. The decision-making assist method according to claim 4, wherein the trust deviation corresponds to a standard deviation of the minimum intercommunity distances (D[3.sub.1, 3.sub.4], D[3.sub.1, 3.sub.7], D[3.sub.4, 3.sub.7]) of the pairs ([3.sub.1, 3.sub.4], [3.sub.1, 3.sub.7], [3.sub.4, 3.sub.7]).
8. The decision-making assist method according to claim 2, wherein the trust score corresponds to a cardinality of a union of user communities to which the three users of the list belong.
9. The decision-making assist method according to claim 8, wherein the trust deviation corresponds to the trust score from which is subtracted an average of the cardinalities of unions of the user communities to which the three users of the list belong.
10. A decision-making assist system for a user of a first terminal receiving a communication request originating from a second terminal, the user of the second terminal still not having transmitted any communication request to the user of the first terminal, the decision-making assist system comprising a computing device and a communication base, the computing device and the communication base being able to determine a trust score of the user of the second terminal and a trust deviation, the trust deviation providing information on a reliability of the trust score, the trust score and the trust deviation being determined from a list comprising at least one user (3.sub.1, 3.sub.4, 3.sub.7) of a third terminal to which the second terminal has already transmitted a communication request, the at least one user (3.sub.1, 3.sub.4, 3.sub.7) of the third terminal belonging to at least one user community (C.sub.1, C.sub.2, C.sub.4).
11. The decision-making assist system according to claim 10, wherein the computing device is adapted to transmit the trust score and the trust deviation to the first terminal.
12. The decision-making assist system according to claim 11, wherein the system comprises an application server, the application server being able to process the trust score and the trust deviation and to send the result of the processing to the first terminal.
13. A processing circuit comprising a processor and a memory, the memory storing program code instructions of a computer program to execute the decision-making assist method according to claim 1, when the computer program is executed by the processor.
14. A non-transitory computer-readable recording medium on which a computer program is recorded comprising program code instructions for execution of the decision-making assist method according to claim 1, when the computer program is executed by a processor.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
[0047] The terminal 10 of the user 1 is adapted to transmit a communication request Req.sub.com to the terminal 20 in order to establish communication with the user 2.
[0048] The terminal 10 is herein a smart terminal, or smartphone in English, adapted to implement software applications. Thus, the terminal 10 comprises an interface module 101 and an emitter client application. The interface module 101 enables the user 1 to transmit a command for sending a communication request Req.sub.com to the terminal 20. Typically, the interface module 101 is a keyboard of the terminal 10. Alternatively, the interface module 101 could be a voice command. The emitter client application is adapted to generate and transmit to the communication network R the communication request Req.sub.com from the send command originating from the interface module 101 of the terminal 10.
[0049] As illustrated in
[0050]
[0051] As illustrated in
[0052] The decision-making assist system 30 further comprises: [0053] a computing device 301; [0054] a communication base 302.
[0055] The computing device 301 is adapted to compute the trust score Sconf and the trust deviation Deltaconf from information stored in the communication base 302. More particularly, the communication base 302 stores a history H of communication requests between different user terminals of the communication network.
[0056] The history H also lists the communication requests having been transmitted by the terminal 10 of the user 1. The user 1 is referenced starting from the identifier ID_1. No transaction is validated for this user 1, since the latter is not known to the different users 3.sub.1 to 3.sub.15. Thus, it is possible to establish a list h of users to whom the user 1 has transmitted beforehand a communication request via his/her terminal 10.
[0057]
[0058] In this
[0074] The dotted lines between the user 1 and the user 3.sub.1, the user 3.sub.4 and the user 3.sub.7 represent NOK transactions, i.e. communications that has not been approved by the respective users 3.sub.1, 3.sub.4, 3.sub.7.
[0075]
[0091] It should be noted that, at this level, the user 1 does not belong to any community.
[0092]
[0093] The different communities C.sub.1 to C.sub.4 may be perceived as a community graph including nodes and arcs linking said nodes. Such a community graph, referenced G.sub.C, is illustrated in
[0094] From the community graph G.sub.C, it is possible to construct a matrix M for storing the minimum distance between the different communities. In particular, such a matrix M is illustrated in
[0095]
[0096] As illustrated in
[0097] The terminal 20 of the user 2 is adapted to receive the data Data associated with the determination of the trust score and of the trust deviation Deltaconf. In particular, such a terminal 20 is illustrated in
[0100] The receiver client application is adapted to receive and process the data Data.
[0101] The interface module 201 is adapted to render the result of this processing to the user 2 on a dedicated interface of the terminal 20 or of another terminal.
[0102] Depending on the type of the terminal 20, the processing made on the data Data will not be the same.
[0103] The decision-making assist method illustrated in
DETAILED DESCRIPTION OF CERTAIN ILLUSTRATIVE EMBODIMENTS
[0104] In a first method, the computing device 301 uses the information contained in the history H of
[0105] Each of these users 3.sub.1, 3.sub.4, 3.sub.7 belongs to one community.
[0106] From the table T of
[0110] From the users of the list h, pairs of contact users [3.sub.1, 3.sub.4], [3.sub.1, 3.sub.7] and [3.sub.4, 3.sub.7] are formed.
[0111] In each of the pairs of users, at least one minimum intercommunity distance D with D=Min (M(C.sub.m, C.sub.n)) is determined where m and n are integers herein comprised between 1 and 4. This minimum intercommunity distance is obtained by comparing the communities to which the users of the pair belong using the matrix M of
[0112] Thus, in the pair [3.sub.1, 3.sub.4], a first distance is determined between the community C.sub.1 of the user 3.sub.1 and the community C.sub.1 of the user 3.sub.4 and a second distance between the community C.sub.1 of the user 3.sub.1 and the community C.sub.2 of the user 3.sub.4. In accordance with
[0113] Said otherwise, D[3.sub.1, 3.sub.4]=Min (M(C.sub.1, C.sub.1), M(C.sub.1, C.sub.2))=Min (0, 1)=0.
[0114] In the same manner, for the pair [3.sub.1, 3.sub.7], D[3.sub.1, 3.sub.7]=Min (M(C.sub.1, C.sub.2), M(C.sub.1, C.sub.4))=Min (1, 1)=1.
[0115] For the pair [3.sub.4, 3.sub.7], D[3.sub.4, 3.sub.7]=Min (M(C.sub.1, C.sub.2), M(C.sub.1, C.sub.4), M(C.sub.2, C.sub.2), M(C.sub.2, C.sub.4))=Min (1, 1, 0, 1)=0.
[0116] The trust score Sconf corresponds to the average of the minimum intercommunity distances of the different pairs of users. Said otherwise, Sconf=Average (D[3.sub.1, 3.sub.4], D[3.sub.1, 3.sub.7], D[3.sub.4, 3.sub.7])=Average (0, 1, 0)=0.33.
[0117] The trust deviation Deltaconf corresponds to the standard deviation of the minimum intercommunity distances of the different pairs of users. Thus, Deltaconf=Standard deviation (D[3.sub.1, 3.sub.4], D[3.sub.1, 3.sub.7], D[3.sub.4, 3.sub.7]).
[0118] The deviations are herein determined with respect to the average 0.33. The standard deviation corresponds to the root mean square of these deviations, thereby
namely 0.47.
[0119] In a second method for determining the trust score Sconf and the trust deviation Deltaconf, the computing device 301 uses the information contained in the history H of
[0120] Each of these users 3.sub.1, 3.sub.4, 3.sub.7 belongs to one community.
[0121] From the extended table T of
[0125] From the users of the list h, pairs of users [3.sub.1, 3.sub.4], [3.sub.1, 3.sub.7] and [3.sub.4, 3.sub.7] are formed.
[0126] In each of the pairs of users, at least one minimum intercommunity distance D with D=Min (M (C.sub.m, C.sub.n)) is determined where m and n are integers herein comprised between 1 and 4. This minimum intercommunity distance is obtained by comparing the communities to which the users of the pair in the table T of
[0127] For the pair of users [3.sub.1, 3.sub.4], the community C.sub.1 is common to the users 3.sub.1 and 3.sub.4. Henceforth, the minimum intercommunity distance D[3.sub.1, 3.sub.4] is zero.
[0128] For the pair of users [3.sub.4, 3.sub.7], the community C.sub.2 is common to the users 3.sub.4 and 3.sub.7. Henceforth, the minimum intercommunity distance D[3.sub.4, 3.sub.7] is zero.
[0129] For the pair of users [3.sub.1, 3.sub.7], there is no common community at a neighborhood level k=0. However, the community C.sub.1 is at a neighborhood level k=1 for the user 3.sub.7. Henceforth, the minimum intercommunity distance D[3.sub.1, 3.sub.7] is equal to 1.
[0130] The trust score Sconf corresponds to the average of the minimum intercommunity distances of the different pairs of users. Said otherwise, Sconf=Average (D[3.sub.1, 3.sub.4], D[3.sub.1, 3.sub.7], D[3.sub.4, 3.sub.7])=Average (0, 1, 0)=0.33.
[0131] The trust deviation Deltaconf corresponds to the standard deviation of the minimum intercommunity distances of the different pairs of contact users. Thus, Deltaconf=Standard deviation (D[3.sub.1, 3.sub.4], D[3.sub.1, 3.sub.7], D[3.sub.4, 3.sub.7]).
[0132] The deviations are herein determined with respect to the average 0.33. The standard deviation is the root mean square of these deviations, thereby
namely 0.47.
[0133] In a third method, the computing device 301 uses the information contained in the history H of
[0134] Each of these users 3.sub.1, 3.sub.4, 3.sub.7 belongs to one community.
[0135] Thus, from the table T of
[0139] From the users of the list h, pairs of users [3.sub.1, 3.sub.4], [3.sub.1, 3.sub.7] and [3.sub.4, 3.sub.7] are formed.
[0140] The trust score Sconf herein corresponds to the cardinality of the union of the communities of the users.
[0141] Said otherwise, Sconf=| 3.sub.13.sub.43.sub.7|=|[C.sub.1][C.sub.1, C.sub.2][C.sub.2, C.sub.4]|=|[C.sub.1, C.sub.2, C.sub.4]|. The cardinality of the union of the communities of the users is therefore herein equal to 3.
[0142] The trust deviation Deltaconf corresponds to the trust score Sconf from which is subtracted an average of cardinalities of the unions of the communities of the users.
[0143] Said otherwise, Deltaconf=| 3.sub.13.sub.43.sub.7|average (|3.sub.13.sub.4|, |3.sub.13.sub.7|, |3.sub.43.sub.7|)=|[C.sub.1, C.sub.2, C.sub.4]|average (|[C.sub.1, C.sub.2]|, |[C.sub.1, C.sub.2, C.sub.4]|, [C.sub.1, C.sub.2, C.sub.4]|)=3average (2, 3, 3)=0.33.
[0144] As already indicated, the receiver client application of
[0145] If the trust score determined by the computing device 301 is higher than the first threshold, this indicates that the user 2 is an abusive user using phishing, scam or spam type practices. In this kind of practice, the abusive user has a tendency to contact a very broad selection of users, which causes a divergence with respect to the normal (high average).
[0146] If the trust score determined by the computing device 301 is lower than the first threshold, the trust deviation Deltaconf is then compared with the second threshold. A new entering user logically has a tendency to contact legitimate users, well-established, having a strong social bond probability. By legitimate user, it should be understood a member known to the service which, by its conventional use, has a tendency to contact or be contacted by other users. Thus, a honest user 1 will orient his/her strategy of initial contact before several legitimate users, which will limit the deviations between the contacted users. The trust deviation Deltaconf will then be low. Conversely, an abusive user 1 will have an erratic strategy of initial contact by contacting both legitimate users and non-legitimate users, which will increase the deviations between the contacted users. The trust deviation Deltaconf will then be high and such a user 1 should be dismissed.
[0147] Upon completion of this processing, the receiver client application provides a decision-making assistance to the interface module 201 in the form of a piece of information InformationClient. This information indicates to the user 2 whether he/she can or cannot approve the communication request Req.sub.com originating from the user 1.
[0148] The user 2 indicates his/her choice (ChoiceConfirmation in
[0149] It should be noted that the supervision device S updates the communication base 302 depending on the decision of the user 2.
[0150] The decision-making assist device 30 used in the method of
[0151] The method of
[0152] The application server is able to process the trust score Sconf and the trust deviation Deltaconf and to provide a decision-making assistance to the receiver client application by the transmission of these data Data to this application. The receiver client application adapts the client information to the interface module 201. The client information indicates to the user 2 whether he/she can, or cannot, approve the communication request Req.sub.com originating from the user 1. The user 2 indicates his/her choice (ChoiceConfirmation in
[0153] Thus, the decision-making assistance may be applied to different cases of use.
[0154] A first case of use of the development relate to mobile banking/SMShing. The users of mobile banking applications are often victims of scam attempts intended to divert all or part of the funds towards one or more fraudulent account(s) in a more or less tricky way. Fraud or scam attempts are numerous and various but often replicate a classical scenario: a fraudster/scammer buys a temporary SIM card and proceeds, for a limited time, with a phishing campaign. He/She sends SMSs (or calls) to a large number of users randomly designated from client lists originating from data leaks from a merchant website (for example) or exchange/buy lists of phone numbers of potential targets. The content of the message (winning in a game, having an acquaintance in distress, etc.) incites the victim user to initiate a transaction towards an account that he/she believes legitimate but actually associated with the fraudster. The account will be used to collect a portion of the funds of the fraud campaign and will then be closed after having been emptied. The numerous victims targeted by this campaign do not know each other and have no strong social bonds with each other. In addition, these victims are installed in the system (present on sold or exchanged lists). The probability that x victims randomly selected by the algorithm among N (on the lists) could have a computable (and short) community social distance is low, and even almost zero. Hence, the abusive behavior of the fraudster can be qualified and quantified rapidly (from a few transactions) and could be presented to the victims as of the first exchanges upon reception of the call or of the SMS (standing for Short Message System in English), or upon sending of the transaction.
[0155] A second case of use relates to communication/canvassing.
[0156] During a phone canvassing campaign, companies use several call numbers that are renewed very often. Some applications of the prior art offer to the canvassing victims to identify and qualify the canvassing type (commercial, malicious) in a collaborative manner and offers a solution for sharing this information via the application. Several hours/days might pass before the service becomes fully effective (enough reports) and leave time to the companies to modify their call number. Based on the same principle as described for the first case, the canvassers exploit lists of numbers to call, the victims present on these lists a priori have no bonds with each other and therefore a low (and even almost zero) probability, the average social distance is very long (with infinite distances).
[0157] A third case of application relates to scam e-mail/spam management. When a user of an electronic mail service receives an incoming communication (an e-mail) from an unknown emitter, the development allows computing an a priori abusive use of the emitter of the e-mail, such as scam or spam emitters. The computing device 301 could then exploit this score in order to classify the e-mails, and even discard them, in an optimized manner: the emitters having a high score will a priori be spam emitters, the emitters having an average score will be corporate/institution emitters, and the emitters having low scores will be individuals. The receiver user could then contact the computing device 301 in order to consult these different e-mails, putting forward the e-mails of legitimate users, and filtering spams and scam e-mails.
[0158] The solution proposed by the development is also applicable to any context implementing transaction, incoming or outgoing, for which it is possible to establish a social relationship between the actors of the system: mobile payments, bank transfers, communication (e-mails, phone calls, sms, CDR (standing for Call Detail Record in English), etc.).
[0159] The development allows displaying, in real-time, the trust level of each incoming transaction at the terminal 20.
[0160] The proposed development is complementary of the solutions described in the prior art and enhances their effectiveness.
[0161] Thus, the proposed solution is based on the use of a software module for controlling and securing the transaction.
[0162] In a particular embodiment, the development is based on a practice based on scoring an average social distance between the contacts of an emitter user of a communication request, to extract therefrom a trust score assessing his/her virtuous integration/use of the communication service. This trust score is a criterion assessing, for each transaction emitter, his/her predisposition to disseminate personal/relevant/generic information or on the contrary information that is detrimental towards his/her interlocutors.
[0163] On the basis of a software module that allows constructing sets of users identified as having a transactional social proximity calculated on the basis of the past exchanges, all users, and their past transactions, form a network, each node of which is a user, and the past transactional data allow creating a relationship between the nodes of the network.
[0164] The proposed system assigns one or more membership communit(y/ies) to each user.
[0165] For each user, the system stores his/her computed set of membership communities and keeps him/her up-to-date through an automated procedure applied on a regular basis (once a day/month/week).
[0166] To this information, it should be added the trust deviation computed by the method of the development. In one embodiment, this trust deviation is computed from minimum intercommunity distances. In another embodiment, the trust deviation is determined from a cardinality of a union of user communities.