Information security capability evaluation method and system based on mobile-terminal behaviors

A technology of information security and mobile terminals, applied in the field of information security capability evaluation methods and systems based on mobile terminal behavior, can solve problems such as difficult to answer correctly, difficult information security capability evaluation, etc., to increase objective judgment, involve a wide range, Strong real-time effects

Inactive Publication Date: 2018-11-06
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1
View PDF13 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can assess the information security ability of individuals to a certain extent, but it is difficult to ensure that they can perform the specific behaviors corresponding to the correct answers in the test questions in daily life.
[0010] In summary, the existing evaluation methods are difficult to better evaluate information security capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security capability evaluation method and system based on mobile-terminal behaviors
  • Information security capability evaluation method and system based on mobile-terminal behaviors
  • Information security capability evaluation method and system based on mobile-terminal behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0058] Such as figure 1 as shown, figure 1 A method for evaluating information security capabilities based on mobile terminal behavior provided by the present invention may include the following steps:

[0059] Collect behavior data when the mobile terminal is used by the user;

[0060] The behavior data is input into the pre-built informa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an information security capability evaluation method and system based on mobile-terminal behaviors. User information security capability is evaluated accordingto behavior data of a mobile terminal in user use, thus the problems of singularity and insufficient evaluation comprehensiveness of existing information security capability evaluation methods are solved, importance of the objective behaviors on body analysis is emphatically considered, and an information security capability evaluation result is enabled to be more realistic and reliable.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security capability evaluation, and in particular to a method and system for evaluating information security capability based on mobile terminal behavior. Background technique [0002] Information security capability is an indispensable basic capability in the rapid development of science and technology. The mobile Internet is the product of the combination of communication network and Internet, which has the characteristics of wireless and portable. Mobile terminals are devices that use the mobile Internet, so mobile terminals are open source and open. As the most popular device among the masses, mobile terminal devices can reflect the user's information security capabilities to a large extent. In recent years, security incidents such as stolen funds and privacy leaks have occurred frequently, seriously threatening the safety of people's lives and property. In order...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06N7/02
CPCG06N7/02
Inventor 杨鹏黄元飞陈亮高强张晓娜罗森林潘丽敏李蕊胡雅娴
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products