Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for protecting network behavior through user identification

A user identification and network technology, applied in the fields of computer networks, computer applications, and computer systems, can solve problems such as finding evidence, difficulty in safeguarding rights, loss of merchants, and loopholes in exchange of credits for calls, so as to solve network fraud and prevent economic losses. Effect

Inactive Publication Date: 2016-01-20
姜兵
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, on this virtual network, there are not only unlimited business opportunities, but also various traps lurking, and these traps are very hidden, so that online consumers are unaware and hard to guard against.
When there is a problem with Internet transactions, it is very difficult to find evidence and protect rights. Every year, the state invests huge manpower, material and financial resources, but with little effect. According to reliable data, as of the end of June 2012, the number of Chinese Internet users reached 538 million. Among them, the number of online shopping users has reached 210 million, the Internet penetration rate has increased to 39.9%, and the scale of online shopping scammers has reached 61.69 million. It is conservatively estimated that the annual losses caused by phishing or fraudulent websites to netizens are not less than 30.8 billion yuan
[0004] However, in addition to consumers being deceived by various types of websites and networks, large, medium and small enterprises are also constantly facing consumers using various network technology means (such as fraud, intrusion, stealing, etc.) Seeking profits has brought great losses to the business, and even the business has closed down
At the same time, hackers at home and abroad are always using network technology to carry out fraudulent acts against Internet companies and gain violence from them.
It is reported that at around 22:30 on the evening of October 30, 2012, a large-scale e-commerce company launched a major loophole in the activity of exchanging phone charges with points, which brought a loss of nearly 200 million yuan to the e-commerce company.
[0005] All current security products are aimed at personal computers and mobile phones to prevent computers or mobile phones from being implanted with Trojan horses and viruses, but there is no effective solution to Internet security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting network behavior through user identification
  • Method and system for protecting network behavior through user identification
  • Method and system for protecting network behavior through user identification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described in detail below in conjunction with specific embodiments and drawings.

[0027] figure 1 Shown is an overview diagram of the system, in order to illustrate the position of the Internet security system in the entire system process, and a simple data interaction description. The system includes: a cloud server, which is used to store the information uploaded by the user terminal via the Internet, and provide it to the terminal in need for download; the user terminal, the user terminal performs security control, embedded code and API interface Integration; information analysis terminal, the information analysis terminal will collect all the information for behavior analysis, user habit analysis and in-depth mining, and carry out relevance analysis and in-depth analysis of all information to find all related characteristics and similar users Perform classification, sorting, and statistics; and perform related processing operation...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system of protecting network behavior through user recognition. The method includes a first step of integrating security controls, embedded codes and an API port of a client end, a second step of collecting information by means of the integrated the security controls, the embedded codes and the API port and transmitting the collected information to a Cloud server, a third step of carrying out correlation analysis and deep analysis on all the collected information, finding out users having correlation properties and similarity to carry out classification, sorting and statistics, and a fourth step of carrying out correlation processing operations on the users who are similar or the same according to setting of merchants. By means of information collecting of user computers, mobile phone equipment, browsers and the like, the network behavior of the users correlates with computer equipment and the mobile phone equipment after the analysis and exploration, and therefore the aims of network identity recognition and user behavior limit are achieved and the problem that network deceptive behaviors happen is further solved.

Description

Technical field [0001] The present invention relates to the technical fields of computer systems, computer networks, and computer application programs, and more specifically to Internet security systems and Internet fraud prevention systems. Background technique [0002] With the rapid development of the Internet, Internet business activities such as online shopping, online shop, online banking, and online marketing have gradually increased. The Internet has become a relatively important tool for shopping, investment and financial management, and activities in consumers' lives. [0003] However, just on this virtual network, there are not only unlimited business opportunities, but also traps of this kind and other lurking, and these traps are very hidden, leaving online consumers unconscious and unpredictable. When there are problems with Internet transactions, it is also very difficult to find evidence and safeguard rights. The state invests huge manpower, material resources and f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 姜兵
Owner 姜兵