Protecting and tracking method for primary information of mobile terminal based on user behavior pattern

A mobile terminal, privacy protection technology, applied in the direction of digital data protection, protection of storage content to prevent loss, prevention of unauthorized use of memory, etc., to achieve ideal user experience, low energy consumption, and simple technology.

Inactive Publication Date: 2013-05-01
CHINA UNIV OF GEOSCIENCES (WUHAN)
View PDF5 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method has not yet been used i

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protecting and tracking method for primary information of mobile terminal based on user behavior pattern

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] Embodiment 1: The present invention provides a mobile terminal privacy protection and tracking method based on user behavior patterns. Now taking a user A as an example, the steps of the user mobile terminal privacy protection and tracking method are as follows: figure 1 Shown:

[0050] (1) Firstly, the user A behavior data collection and modeling stage is carried out, the user A behavior data collection and establishment module S301A, this module collects the user's behavior pattern, quantifies the user's behavior pattern, and generates these behavior data Statistical results, build user behavior pattern library;

[0051] Assuming that a sampling period is 24 hours, through self-learning of 30 sampling periods (that is, 30 days), the user behavior data collection and modeling stage is carried out. User behavior data collection takes three aspects of behavior patterns, such as the time of using the application Patterns, patterns of frequency of use of applications, pat...

Embodiment 2

[0082] Embodiment 2: The present invention provides a mobile terminal privacy protection and tracking method based on user behavior patterns. Now take a user B as an example, and the steps are as follows:

[0083] (1) Firstly, the user B behavior data collection and modeling stage is carried out, the user B behavior data collection and establishment module S301B, this module collects the user's behavior pattern, quantifies the user's behavior pattern, and generates these behavior data Statistical results, build user behavior pattern library;

[0084] Assuming that a sampling period is 24 hours, through self-study of 60 sampling periods (that is, 60 days), the user behavior data collection and modeling stage is carried out. User behavior data collection takes two aspects of behavior patterns, such as browsing behavior patterns, phone calls Behavioral patterns.

[0085] Usually, the user's browsing behavior in the mobile terminal has fixed characteristics, showing that he likes t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a protecting and tracking method for primary information of a mobile terminal based on a user behavior pattern. A behavior pattern characteristic database is established by behavior characteristics such as time and frequency of using application programs, log-in behaviors, browsing behaviors, call modes and the like, which are accumulated according to the mobile terminal using history of the user; and the identity of the user is identified and confirmed by utilizing the characteristics database, so that the security of privacy information of the user is ensured when the mobile terminal is lost, stolen and misused, and the position of the terminal can be tracked. According to the protecting and tracking method disclosed by the invention, a transparent and user-friendly control is realized by adopting a self-learning user behavior pattern, so that the high realizing cost caused by dependence of the user on password control and biological identification method is avoided. According to the method, a predetermined remote user can be noticed at the first time when the mobile terminal is lost or stolen, so that the primary information of the mobile terminal can be remotely protected. The protecting and tracking method is general, realized by software, and can be used for the devices such as various mobile terminals, the internet of things and the like.

Description

technical field [0001] The present invention relates to a mobile terminal privacy protection and tracking method based on user behavior patterns. Specifically, a behavior pattern feature library is established through the accumulated behavior characteristics of the user's history of using the mobile terminal, so that the identity of the user can be determined using the feature library. Identification and confirmation are carried out to ensure the security of user privacy information and other information in the case of the mobile terminal being stolen, lost, misused, or borrowed, and the location of the terminal can be tracked. The invention belongs to the field of computer information security. Background technique [0002] With the development of hardware technology, mobile terminals (such as smart phones, tablet computers, etc.) already have the storage and computing performance of traditional desktop computers, and can provide people with various powerful functions such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F12/14G06F12/16
Inventor 任伟余林琛唐善玉张思发
Owner CHINA UNIV OF GEOSCIENCES (WUHAN)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products