User behavior mode digging system and user behavior mode digging method

A technology of pattern mining and behavior, applied in special data processing applications, instruments, electrical digital data processing, etc., to achieve the effect of improving recognition rate, strengthening protection, and convenient configuration

Active Publication Date: 2013-03-27
TONGJI UNIV
View PDF4 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

None of the existing prevention technologies and means can prevent criminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User behavior mode digging system and user behavior mode digging method
  • User behavior mode digging system and user behavior mode digging method
  • User behavior mode digging system and user behavior mode digging method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings in the form of embodiments.

[0029] Such as figure 1 The architecture diagram of the user behavior pattern mining system is shown. The entire user behavior pattern mining system is deployed on the server side, accepts the user browsing log information submitted by the client, mines the user behavior pattern map, and generates a user behavior certificate for release to the client. terminal download.

[0030] User web page log processing module: In order to facilitate the maintenance and management of a large number of web page records formed by users accessing the Internet, the web page log information is stored in XML files. Therefore, when it is necessary to process and mine these web page log information, it is necessary to parse the XML file through data preprocessing to obtain these web page log information. At the same time, all the acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a user behavior mode digging system and a user behavior mode digging method. The whole user behavior mode digging system is deployed at a server and is used for receiving user log browsing information submitted by a client, recording access logs that a user browses web pages and accomplishing corresponding data preprocessing according to recent web page access log information of the user, extracting main access behaviors, establishing an initial behavior mode graph, storing the user behavior mode and issuing the user behavior mode as a user behavior certificate so as to be downloaded by the client. The method has transportability, is convenient to configure and needs no support of third-party software. By utilizing the system, the real user identity recognition rate is improved, and under the condition that the reliability of a user password is reduced and a user account password is stolen by lawbreakers, the personal property security and benefits of vast network users are enhanced, and the web application security is guaranteed.

Description

technical field [0001] The invention relates to a behavior pattern mining method and system for individual web user browsing behaviors. Background technique [0002] With the vigorous development of the Internet and e-commerce, online payment methods such as online banking and Alipay have gradually become the first choice for people to shop online. However, while the online payment method brings people convenient and quick experience, it also brings many hidden dangers to network security, which provides opportunities for lawbreakers. As people pay more and more attention to the security of web applications, it is very difficult to attack web applications purely from a technical point of view, such as cross-site scripting attacks. However, due to the general lack of computer expertise of web users, network fraud belonging to the category of social engineering, that is, the method of defrauding web users' online banking account passwords through phishing websites, can be suc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30
Inventor 蒋昌俊陈闳中闫春钢丁志军于汪洋葛雍龙
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products