Personal identification information recognition system and method in high-performance IP network
A technology for identifying information and identifying systems, applied in the fields of network information and security and network personal privacy protection, which can solve the problems of large computing costs and achieve the effects of large coverage area, good scalability, and good compatibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0068] This embodiment elaborates in detail the overall system structure diagram of a system for identifying personal identification information in an operator network according to the present invention. From figure 1 It can be seen that the network traffic is first input into the system in PCAP format; secondly, the data packet is associated with the user (object) in the authentication system by using the time stamp and IP address; thirdly, the system uses regular expressions in the feature extraction process to classify The HOST field and the GET field of the HTTP packet are extracted, and are stored as a record after extracting features according to the method in step 2 (see embodiment 2 for details); then, the same records of the system statistics (statistics) are aggregated, and the same records The frequency of occurrence is FREQUENCY; finally a dataset {USER,DOMAIN,KEY,VALUE,FREQUENCY} with five-dimensional fields is obtained. The system here uses MAC addresses to repr...
Embodiment 2
[0074] This embodiment describes in detail the feature extraction process of a system for identifying personal identification information in an operator network according to the present invention. The feature extraction location map represents an HTTP packet header field in actual network traffic. According to the prompt in step 2, the method extracts the string "mcgi.v.qq.com" in the HOST field and writes it into the DOMAIN field of the data set, and extracts 13 strings such as "app_id", "imsi" and "imei" and writes it into the data KEY field, and write 13 strings such as "248", "460023918121329" and "868129022933673" into the corresponding VALUE field of the data set, and finally write 13 records in the data set, see the feature extraction result table below for details.
[0075] Feature Extraction Location Diagram
[0076]
[0077] Feature extraction result table
[0078] DOMAIN
Embodiment 3
[0080] This embodiment explains in detail the process of establishing a user behavior tree in the calculation process of a personal identification information identification system in an operator network according to the present invention. From figure 2 It can be seen that according to the user's behavior of accessing network resources, the user behavior tree is constructed using the five-dimensional data obtained in the previous process. The five fields of the five-dimensional data can more accurately represent the user's behavior of accessing network resources. When the user or object USER accesses the network resource DOMAIN, FREQUENCY times of VALUE are transmitted at the location KEY. According to user access behavior, the method aggregates users who access the same network resources to build a user behavior tree. The user behavior tree is fixed at 4 layers, and DOMAIN-KEY is also the root of the user behavior tree; the second layer is the USER layer, which represents U...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com