Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Method for Constructing Sensitive Information Templates in Network Content Security Management

A technology for sensitive information and security management, applied in the field of network content security, can solve the problems of slow filter template generation, unsatisfactory effect, easy to fall into local optimum, etc., to improve the accuracy and generation speed, ensure no degradation, The effect of improving accuracy

Inactive Publication Date: 2016-09-14
中国人民解放军61660部队
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, there are very few studies on introducing genetic algorithms into sensitive information template generation, and they mainly focus on feature selection and the practical application of applying genetic algorithms to generate templates. Construct the initial user template and carry out adaptive learning of the user template based on the genetic algorithm, but the existing problem is that the effect of the system filtering in the early stage is not satisfactory; in addition, Liu Yuguo et al. of Shandong University proposed a sensitive information based on the genetic algorithm The filtering method, which comprehensively utilizes the filtering template and the document characteristic calculation method, improves the accuracy of sensitive information filtering to a certain extent, but there are problems such as slow generation of filtering templates and easy to fall into local optimum

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Constructing Sensitive Information Templates in Network Content Security Management
  • A Method for Constructing Sensitive Information Templates in Network Content Security Management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The invention provides a method for constructing sensitive information templates in network content security management. The method adopts a genetic algorithm, divides coding blocks according to semantics, performs crossover and mutation operations with coding blocks as units, and reduces semantic variation caused by crossover and mutation. If the problem is too large, it can effectively improve the accuracy of keyword expression in the sensitive information template.

[0029] The method for constructing the sensitive information template of the present invention will be described in detail below.

[0030] Step 1: Select a training text set of a class of sensitive information, the training text set includes information text vectors and multiple training texts; convert each training text into a binary code string and use it as a chromosome individual to form the initial population S of the genetic algorithm 0 .

[0031] Sensitive information categories include political...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a sensitive information template construction method in network content safety management. According to the method, the generation speed of a template can be increased, and the accuracy of the sensitive information template in the semantic expression aspect of text messages can be improved. The genetic algorithm is adopted in the method for carrying out template construction, according to the set portioning length K, each individual chromosome coding string in a current population is partitioned from left to right according to the code bit, and interlace operation and mutation operation are carried out on each chromosome with a partition as the unit.

Description

technical field [0001] The invention belongs to the field of network content security, in particular to a sensitive information template construction method in network content security management. Background technique [0002] With the continuous expansion of the scale of the network, the network is playing an increasingly important role in social life. It has not only become a medium for people to chat and make friends and entertainment, but also has become the main channel for people to obtain information, especially new types of communication such as Weibo and WeChat. The development of the form is mature, and the Internet is increasingly becoming an important platform for people to freely communicate and express their wishes. However, the convenience and casualness of network information dissemination has become increasingly prominent. There are not only a lot of progressive, healthy and beneficial information on the network, but also a lot of vulgar, gray, violent and f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06N3/12H04L29/06
Inventor 高岩王文彬王小康
Owner 中国人民解放军61660部队
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products