Doing “anti-fraud” for the iPhone: The story behind Apple’s cooperation with Tencent’s mobile phone housekeeper

At the WWDC conference a month ago, Apple announced the opening of the Caller ID interface for the first time and demonstrated the interception of harassing phone calls through Tencent's mobile butler recognition. Tencent Product Deputy Director Wu Zhigang and his team immediately conveyed this good news to colleagues who watched the live broadcast day and night. At this time, they also dared to determine that Apple eventually chose to cooperate with them.

starting point

The problem of telecommunications fraud has been a long time ago, but it is more common in China and Southeast Asia. Wu Zhigang told Lei Fengwang (search for "Lei Feng Net" public number concerned) that, at home, the earliest method of telecommunication fraud was SMS. As domestic security software gradually increased the interception rate of fraud messages, SMS fraud practitioners began to put "Transfer to the telephone, and gradually from the "wide cast" model to "accurate to the people" model, also has its own industrial chain.

After fraudulent gangs get the real information of users through the channels in the industry chain, they can be more targeted to “cheat” and more easily obtain the trust of each other. According to Tencent's "Quarterly Report on Counterfeit Big Data for Telecommunications Networks" in the first quarter of 2016, the number of people receiving fraudulent information in China reached 438 million in 2015, which is equivalent to 1 in 3 people in the country receiving fraudulent information.

The iPhone user has indeed been "stretched" in the threat of telecommunications fraud. Apple's decision to open the call recognition interface is also considered to be a way to please Chinese users.

As early as March 2015, Apple and Tencent began to communicate on how to prevent phone harassment.

Promote

In addition to Tencent mobile phone butler, Apple also found several domestic Internet security companies. While conducting in-depth understanding, several tests were performed back and forth between several software. The test items mainly focused on the recognition rate and accuracy of the incoming call number.

Although Apple did not directly notify Wu Zhigang and his team of test results, it would not disclose the data differences related to testing. However, through some of his own test monitoring methods, Wu Zhigang can be sure that in several performance tests, they all scored ahead.

The intelligent identification system in Tencent's mobile phone housekeeper is based on analysis of behavior patterns of big data. Many fraudsters will also use third-party anti-harassment apps as test objects. After sending text messages and telecommunications will not be intercepted, they will be implemented in large quantities. However, Tencent mobile phone owners can quickly identify and harass SMS messages and telephones to join the harassment feature database. In addition to basic user reports and user error correction, Tencent cooperated with telecom operators, banks, public security agencies, and other relevant agencies and agencies to collect shared data and formed the "Eye Eye Intelligent Counter-Phone Fraud Box . "

In order to focus on the use and research of big data in anti-telecom network fraud, Tencent established a joint anti-fraud laboratory last year. In addition to the "Eagle Eye Smart Counterfeit Phone Fraud Box," the laboratory also established an anti-telecom network fraud expert think tank and the Tencent Security Cloud Library. At the same time, the laboratories brought together industry chain partners and established an anti-fraud cooperation platform, the “Guardian Program,” to jointly combat cyber fraud.

perfect

Unlike Android systems, Apple has stricter control over system interfaces and permissions. Cooperation with Apple is both an opportunity and a challenge for Tencent's mobile phone stewards. At the technical process level, there are many differences between the mechanisms of the two platforms. Wu Zhigang said

"The underlying technologies provided on Apple's platform may even be completely different. We will customize a corresponding service flow based on Apple's capacity support and try to remain the same at the user experience level."

Apple also has strict control over the licensing of related resources. On the Android system, as long as the user authorized, you can do a cloud query, but Apple's solution is to build all the identification numbers into a library, and then put it locally, using a database to make inquiries.

Due to local database capacity limitations, although popular scam calls can be identified, for some of the low-heat long numbers, the recognition ability is lower than the cloud query.

For this situation, Wu Zhigang and his team have their own views.

"The Android system and Apple have their own characteristics, and Apple is gradually looking for better solutions, and the two sides have reached a consensus to resolve the main issues first, and the secondary ones to further improve."