Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity theft detection method based on synthesis behavior of online user

A technology of user identity and detection method, applied in the field of online user identity theft detection, can solve the problems of non-continuous detection, insufficient personal data, lack of correction ability, etc.

Active Publication Date: 2018-09-04
TONGJI UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when these technologies are applied to real-time online services, there are still some defects: (1) These detections are intrusive detections, which require users to perform additional operations; (2) These detections are not persistent, once they are broken Lack of follow-up correction
[0005] An important challenge in modeling online user synthetic behavior is the insufficiency of personal data
Due to various conditions, the available behavior records of each user are often not enough to construct a credible model, which greatly affects the performance of the model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity theft detection method based on synthesis behavior of online user
  • Identity theft detection method based on synthesis behavior of online user
  • Identity theft detection method based on synthesis behavior of online user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] (case)

[0041] The system structure diagram of the identity theft detection method based on the synthetic behavior of online users, such as figure 1 shown. The whole program is divided into three phases:

[0042] The first stage is the preprocessing stage of synthetic behavioral data, which is responsible for screening and filling historical data; (a conventional technology in the art)

[0043]The second stage is the establishment stage of the synthetic behavior model, which is responsible for the behavior data obtained in the first stage build synthetic behavior Generate models and estimate key parameters in them ;

[0044] The third stage is the online user identity theft detection stage, which is responsible for judging whether the online user identity has been stolen according to the model obtained in the second stage. (Belongs to conventional technology in this field)

[0045] The specific implementation steps of the first stage:

[0046] Step 1-1, determ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an online user identity theft detection method based on synthesis behavior modeling. The method is characterized by comprising firstly filling insufficient behavior data basedon projection association of a synthesis behavior of the online user; then based on the features of a synthesis behavior forming mechanism and meanwhile through considering the projection space association of the synthesis behavior, designing a generation model of the online user synthesis behavior and eliciting key parameters of the model; and at last quickly and accurately judging whether the new behavior is abnormal according to the acquired model, thus achieving the identity theft detection in real time. According to the identity theft detection method based on the synthesis behavior of the online user designed by the invention, the disadvantages of the traditional identity recognition system are solved, and the new thought and analysis method are provided for solving the security problem of the information age. The method provided by the invention overcomes the disadvantages of the prior art, is used for detecting the abnormal index of the synthesis behavior of the online user inreal time, and can effectively detect the possible online identity theft behavior.

Description

technical field [0001] The invention relates to a method for detecting online user identity theft. Background technique [0002] With the rapid development of the Internet, more and more affairs can be processed online, which brings a lot of convenience to people's life. However, this also raises many potential risks. An online account acts as a user's identity credential in the online world. Online identity theft is a classic cybercrime, in fact, compromised accounts are often the source of other cybercrimes like extortion, fraud and spam. Therefore, online identity theft detection is crucial to keep users safe in the online world. [0003] Traditional identity theft detection methods are usually based on access control, such as setting login passwords, physical tokens. But users need to pay extra effort to manage many passwords and tokens. In recent years, with the development of biometric authentication technology, people have entered the secret-free era. However, w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/142H04L41/145H04L63/1425
Inventor 王成杨波
Owner TONGJI UNIV