Security management and control system and security management and control method for online behaviors combining artificial intelligence and big data

A technology of artificial intelligence and security control, applied in the field of security control system of online behavior, can solve problems such as difficulties, insufficient accuracy of classifier, difficulty of security control, etc., and achieve the effect of dynamic perception

Inactive Publication Date: 2019-03-08
ANHUI JIYUAN SOFTWARE CO LTD +1
View PDF3 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, based on the behavior data of network users, it is very difficult to accurately predict the user's category by relying on the existing technology. On the one hand, the classifier of the traditional classification method is often not accurate enough; The solution is no longer able to quickly and effectively process these behavioral data, which brings great difficulty to the security control of online behaviors

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security management and control system and security management and control method for online behaviors combining artificial intelligence and big data
  • Security management and control system and security management and control method for online behaviors combining artificial intelligence and big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The present invention will be further described below in conjunction with accompanying drawing:

[0027] Such as figure 1 The security management and control system for the online behavior of the fusion of artificial intelligence and big data shown in this embodiment includes:

[0028] (1) Establish a back-end database module to establish a database of biometric attributes such as faces and fingerprints under real identities and behavioral rules under normal operations;

[0029] (2) Data acquisition module, the user acquires network user identity and behavior data information.

[0030] (3) An identity authentication module, which is used to perform real-name management, unified identity authentication and trust assessment on the user.

[0031] (4) Behavior identification module, used to compare the user's online behavior data with predefined illegal data.

[0032] (5) Behavior auditing module, used to record and count the online behaviors of the users, and provide ne...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a security management and control system and a security management and control method for online behaviors combining artificial intelligence and big data. The method comprisesthe following steps: (1) establishing a back-end database, comprising user biometrics and behavior rule attribute data; (2) acquiring network user identities and behavior data information; (3) authenticating the user identities; (4) identifying the user's behaviors; (5) auditing operations of the user's behaviors; and (6) performing risk prevention and control on the security of the user's behaviors. The security management and control system and a security management and control method for online behaviors combining artificial intelligence and big data can make up for the limitation of the traditional technology on the processing of massive behavior data, accurately predict the behavior categories of the network users, quickly analyze and detect the behaviors of the online users, comprehensively and stereoscopically monitor the behaviors of the users in the network space, effectively implement the dynamic awareness of online behavioral security, realize dynamic quantitative assessment of security risks, and achieve hierarchical warning.

Description

technical field [0001] The invention relates to the technical field of security authentication, in particular to a security control system and method for online behaviors that integrate artificial intelligence and big data. Background technique [0002] With the development of network and information technology, the network is gradually changing the way of human life and work, and has had a huge and far-reaching impact on all walks of life in society. Ensuring the information security of the network and more effectively detecting and defending against the security problems faced by the network have become the focus of attention of all parties. [0003] In addition, with the rapid development of Internet technology, we have now entered the era of information explosion. Massive information is presented at the same time, social networks are emerging, and a large amount of unstructured behavioral data such as audio, text, video, and pictures appears. Detailed measurement is pos...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L12/26G06F16/53G06F16/583G06Q50/26
CPCG06Q50/26H04L41/0631H04L43/08H04L63/0861
Inventor 万涛李玉范叶平马冬杨德胜魏永郭瑞祥尚守卫李翔宇张地操李节刘小明汤晓君赵林孙奉林郭政汪鹏周盼张锐钱婧张子珩
Owner ANHUI JIYUAN SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products