Identity theft detection method based on synthesis behavior of online user
A technology of user identity and detection method, applied in the field of online user identity theft detection, can solve the problems of non-continuous detection, insufficient personal data, lack of correction ability, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] (case)
[0041] The system structure diagram of the identity theft detection method based on the synthetic behavior of online users, such as figure 1 shown. The whole program is divided into three phases:
[0042] The first stage is the preprocessing stage of synthetic behavioral data, which is responsible for screening and filling historical data; (a conventional technology in the art)
[0043]The second stage is the establishment stage of the synthetic behavior model, which is responsible for the behavior data obtained in the first stage build synthetic behavior Generate models and estimate key parameters in them ;
[0044] The third stage is the online user identity theft detection stage, which is responsible for judging whether the online user identity has been stolen according to the model obtained in the second stage. (Belongs to conventional technology in this field)
[0045] The specific implementation steps of the first stage:
[0046] Step 1-1, determ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


