Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Personal identification information recognition system and method in high-performance IP network

A technology for identifying information and identifying systems, applied in the fields of network information and security and network personal privacy protection, which can solve the problems of large computing costs and achieve the effects of large coverage area, good scalability, and good compatibility

Active Publication Date: 2018-06-22
BEIJING INSTITUTE OF TECHNOLOGYGY +1
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to improve the accuracy of personal identification information identification; it does not need to obtain higher authority of the system or install additional software and hardware, improve compatibility and scalability; comprehensively collect various types of personal identification information, and propose an efficient and feasible algorithm, To overcome the problem of high computational overhead of massive data in high-performance networks, a system and method for identifying personal identification information in high-performance IP networks are proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Personal identification information recognition system and method in high-performance IP network
  • Personal identification information recognition system and method in high-performance IP network
  • Personal identification information recognition system and method in high-performance IP network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] This embodiment elaborates in detail the overall system structure diagram of a system for identifying personal identification information in an operator network according to the present invention. From figure 1 It can be seen that the network traffic is first input into the system in PCAP format; secondly, the data packet is associated with the user (object) in the authentication system by using the time stamp and IP address; thirdly, the system uses regular expressions in the feature extraction process to classify The HOST field and the GET field of the HTTP packet are extracted, and are stored as a record after extracting features according to the method in step 2 (see embodiment 2 for details); then, the same records of the system statistics (statistics) are aggregated, and the same records The frequency of occurrence is FREQUENCY; finally a dataset {USER,DOMAIN,KEY,VALUE,FREQUENCY} with five-dimensional fields is obtained. The system here uses MAC addresses to repr...

Embodiment 2

[0074] This embodiment describes in detail the feature extraction process of a system for identifying personal identification information in an operator network according to the present invention. The feature extraction location map represents an HTTP packet header field in actual network traffic. According to the prompt in step 2, the method extracts the string "mcgi.v.qq.com" in the HOST field and writes it into the DOMAIN field of the data set, and extracts 13 strings such as "app_id", "imsi" and "imei" and writes it into the data KEY field, and write 13 strings such as "248", "460023918121329" and "868129022933673" into the corresponding VALUE field of the data set, and finally write 13 records in the data set, see the feature extraction result table below for details.

[0075] Feature Extraction Location Diagram

[0076]

[0077] Feature extraction result table

[0078] DOMAIN

Embodiment 3

[0080] This embodiment explains in detail the process of establishing a user behavior tree in the calculation process of a personal identification information identification system in an operator network according to the present invention. From figure 2 It can be seen that according to the user's behavior of accessing network resources, the user behavior tree is constructed using the five-dimensional data obtained in the previous process. The five fields of the five-dimensional data can more accurately represent the user's behavior of accessing network resources. When the user or object USER accesses the network resource DOMAIN, FREQUENCY times of VALUE are transmitted at the location KEY. According to user access behavior, the method aggregates users who access the same network resources to build a user behavior tree. The user behavior tree is fixed at 4 layers, and DOMAIN-KEY is also the root of the user behavior tree; the second layer is the USER layer, which represents U...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a personal identification information recognition system and method in a high-performance IP network, and belongs to the technical field of network information security and network personal privacy protection. The personal identification information recognition system comprises a feature extraction module, a data filtering and shaping module, an algorithm execution moduleand an optimization module; no manual intervention is needed; the personal identification information recognition method comprises the following steps: step 1, inputting the traffic collected by the IP network to the personal identification information recognition system in a PCAP format; step 2, extracting network feature fields to obtain a five-dimensional data group; step 3: filtering and shaping the five-dimensional data group; step 4: establishing a user behavior tree model, calculating functions VF and UVF, performing twice detection, and outputting a PII-DK and PII-VALUE lists; step 5:performing check and diffusion by an optimization module; and step 6: outputting the PII-DK list. The system and method proposed by the invention have good compatibility and expandability.

Description

technical field [0001] The invention relates to a system and method for identifying personal identification information in a high-performance IP network, and belongs to the technical field of network information and security and network personal privacy protection. Background technique [0002] First of all, the development of the mobile Internet has gradually changed people's lifestyles. People can obtain various convenient and efficient network services anytime and anywhere through a wide variety of application programs on the Internet. At the same time, in order to provide these network services with high quality, application service providers (ASPs) usually directly or indirectly collect various types of user data to the cloud through applications. Especially by using various sensors embedded in mobile terminals, such as GPS, camera, and accelerometer, mobile applications (APPs) will generate more types of user personally identifiable information (PII). Using personal ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26H04L29/06
CPCH04L41/14H04L43/026H04L63/0236
Inventor 刘翼嵩天
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products