Method and system for protecting network behavior through user identification
A user identification and network technology, applied in the fields of computer networks, computer applications, and computer systems, can solve problems such as finding evidence, difficulty in safeguarding rights, loss of merchants, and loopholes in exchange of credits for calls, so as to solve network fraud and prevent economic losses. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] The present invention will be further described in detail below in conjunction with specific embodiments and drawings.
[0027] figure 1 Shown is an overview diagram of the system, in order to illustrate the position of the Internet security system in the entire system process, and a simple data interaction description. The system includes: a cloud server, which is used to store the information uploaded by the user terminal via the Internet, and provide it to the terminal in need for download; the user terminal, the user terminal performs security control, embedded code and API interface Integration; information analysis terminal, the information analysis terminal will collect all the information for behavior analysis, user habit analysis and in-depth mining, and carry out relevance analysis and in-depth analysis of all information to find all related characteristics and similar users Perform classification, sorting, and statistics; and perform related processing operation...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 