A mobile social network user identity counterfeiting method based on behavior modeling

A user identity and user technology, which is applied in the field of mobile social network user identity identification, can solve the problem that the identification method is easy to be stolen and so on.

Active Publication Date: 2021-04-30
TONGJI UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to protect user security, traditional identification methods are easily stolen under the increasing network attacks, so the simple system of user name and password can no longer meet the actual needs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A mobile social network user identity counterfeiting method based on behavior modeling
  • A mobile social network user identity counterfeiting method based on behavior modeling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] (case)

[0027] System structure diagram of mobile Internet user identification method based on behavior modeling, such as figure 1 shown. The whole program is divided into three phases:

[0028] In the first stage, a user offline model is established for historical data, which is responsible for the collection and processing of user historical data, and generates the distribution rules of user behavior characteristics of corresponding dimensions; (a conventional technology in the field)

[0029] The second stage is the online collection behavior record generation current feature stage, which is responsible for the collection and processing of the user's current data, and calculates the distribution law of the behavior characteristics of the corresponding dimension; (a conventional technology in the field)

[0030] The third stage is the user identity verification stage, which is responsible for passing the many Dimension Fusion Give a judgment on the identity of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention studies a method for identifying counterfeit mobile social network user identities based on behavior modeling. In this way, the consistency of user behavior is judged, so as to judge the legitimacy of the user. Behavioral modeling-based mobile social network user identification method, thanks to the rich information and data provided by the current mobile social network, we have obtained a large amount of user social data, including location, mobile mode, social relationship, user-generated content and shopping records Wait. Taking multivariate data as the research object, the characteristics of these information are extracted. Using methods such as hybrid kernel density estimation and LDA text modeling to realize the modeling of user behavior in the following three dimensions: (1) geographic location (2) user-generated text (3) social relationship, calculated by simulating user identity theft experiments The interception rate, disturbance rate and precision rate of the detection can be used to evaluate the system performance, solve the disadvantages of the traditional identification system, and provide new ideas and analysis methods for solving security problems in the information age.

Description

technical field [0001] The invention relates to a method for identifying a counterfeit identity of a mobile social network user. Background technique [0002] With the popularization of Internet applications, information security issues are becoming more and more prominent. Attackers will try to steal user accounts, steal personal privacy information, and even maliciously attack servers. In order to protect user security, traditional identification methods are extremely vulnerable to being stolen under the increasing network attacks, so the simple system of user name and password can no longer meet the actual needs. [0003] Today, as Internet intelligence has become a development trend, users' identity-sensitive information will be widely collected and used. How to protect users' information security has become an urgent problem to be solved. In contrast, using the user's habitual behavior characteristics as the basis for identification has the advantages of uniqueness, no...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/31G06Q50/00
CPCG06F21/31G06Q50/01
Inventor 王成洛婧杨波
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products