Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile social network user identity falseness identification method based on behavioral modeling

A user identity and user technology, which is applied in the field of mobile social network user identity identification, can solve the problem that the identification method is easy to be stolen and so on.

Active Publication Date: 2018-07-10
TONGJI UNIV
View PDF4 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to protect user security, traditional identification methods are easily stolen under the increasing network attacks, so the simple system of user name and password can no longer meet the actual needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile social network user identity falseness identification method based on behavioral modeling
  • Mobile social network user identity falseness identification method based on behavioral modeling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] (case)

[0023] System structure diagram of mobile Internet user identification method based on behavior modeling, such as figure 1 shown. The whole program is divided into three phases:

[0024] In the first stage, a user offline model is established for historical data, which is responsible for the collection and processing of user historical data, and generates the distribution rules of user behavior characteristics of corresponding dimensions; (a conventional technology in the field)

[0025] The second stage is the online collection behavior record generation current feature stage, which is responsible for the collection and processing of the user's current data, and calculates the distribution law of the behavior characteristics of the corresponding dimension; (a conventional technology in the field)

[0026] The third stage is the user identity verification stage, which is responsible for passing the many Dimension Fusion Give a judgment on the identity of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mobile social network user identity falseness identification method based on behavioral modeling to judge user legitimacy by judging consistence of user behaviors. The mobilesocial network user identity falseness identification method based on behavioral modeling benefits from rich information data provided by the current mobile social network, and mass user social data including position, moving mode, social relationship, user-generated content, shopping records and the like is acquired. Multivariate data is taken as a study object, and features of the information are extracted. The user behaviors are modeled in the three following dimensions with mixed kernel density estimation, LDA text modeling and other methods: (1) geographical location, (2) user-generated text and (3) social relationship, blocking rate, interrupt rate and precision ratio of detection are calculated by simulating a user identity theft test, system performance is evaluated on the basis, problems of the traditional identification system are solved, and a new idea and a new analytical method are provided for solving security problems in the information age.

Description

technical field [0001] The invention relates to a method for identifying a counterfeit identity of a mobile social network user. Background technique [0002] With the popularization of Internet applications, information security issues are becoming more and more prominent. Attackers will try to steal user accounts, steal personal privacy information, and even maliciously attack servers. In order to protect user security, traditional identification methods are extremely vulnerable to being stolen under the increasing network attacks, so the simple system of user name and password can no longer meet the actual needs. [0003] Today, as Internet intelligence has become a development trend, users' identity-sensitive information will be widely collected and used. How to protect users' information security has become an urgent problem to be solved. In contrast, using the user's habitual behavior characteristics as the basis for identification has the advantages of uniqueness, no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/31G06Q50/00
CPCG06F21/31G06Q50/01
Inventor 王成洛婧杨波
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products