Identity credibility evaluation method based on analytic hierarchy process and grey correlation analysis

A grey relational analysis and analytic hierarchy process technology, applied in character and pattern recognition, instruments, computer parts, etc., can solve problems such as easy misjudgment and few factors of identity information, and achieve accurate and highly logical evaluation results. and flexibility, the conclusion is more convincing

Pending Publication Date: 2019-10-08
SHANGHAI JIAO TONG UNIV
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the above-mentioned defects of the prior art, the technical problem to be solved by the present invention is to solve the defect that the traditional identity analysis method adopts few identity information factors, which is easy to cause misjudgment, or the method adopting more identity information factors is more subjective.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity credibility evaluation method based on analytic hierarchy process and grey correlation analysis
  • Identity credibility evaluation method based on analytic hierarchy process and grey correlation analysis
  • Identity credibility evaluation method based on analytic hierarchy process and grey correlation analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]The following describes several preferred embodiments of the present invention with reference to the accompanying drawings, so as to make the technical content clearer and easier to understand. The present invention can be embodied in many different forms of embodiments, and the protection scope of the present invention is not limited to the embodiments mentioned herein.

[0051] In the drawings, components with the same structure are denoted by the same numerals, and components with similar structures or functions are denoted by similar numerals. The size and thickness of each component shown in the drawings are shown arbitrarily, and the present invention does not limit the size and thickness of each component. In order to make the illustration clearer, the thickness of parts is appropriately exaggerated in some places in the drawings.

[0052] The present invention provides a user identity credible evaluation method based on AHP and gray relational analysis. The iden...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an identity credibility evaluation method based on an analytic hierarchy process and grey correlation analysis, and relates to the field of computer network security. The identity credibility evaluation method includes the steps: collecting multi-dimensional authority information data of the user through an authority identity authentication provider; and clustering the information of the same attribute, matching the key information filled by the user with data in an authoritative information database, carrying out similarity calculation and scoring, and carrying out multi-level association decision analysis by using an analytic hierarchy process and grey association analysis to obtain credible evaluation of the user identity. According to the identity credibility evaluation method, factors such as the user individual identification class, the medical class, the communication class and the judicial class are comprehensively considered, and a multi-level user identity credibility evaluation model is constructed, and comprehensive evaluation on user identity credibility is achieved, and high logicality and flexibility are achieved, and the evaluation result ismore accurate and objective.

Description

technical field [0001] The invention relates to the field of computer network security, in particular to an identity credible evaluation method based on analytic hierarchy process and gray relational analysis. Background technique [0002] With the rapid development of the Internet and social media, the number of Internet users in my country continues to rise, and the identity information of Internet users is becoming increasingly complex. In various network applications, it is necessary to evaluate the credibility of user identity information, so as to provide different services. With the development of e-commerce, online payment and other fields, the dependence of my country's economic activities on the Internet has increased, and the network activities involving funds and property have intensified, and their needs have become more urgent. Therefore, having a method that can combine multiple attributes to safely and reliably evaluate user identity is crucial to the growin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/62
CPCG06F18/23G06F18/22G06F18/2431Y02P90/30
Inventor 邹福泰谭越梁晓实龚子超李林森
Owner SHANGHAI JIAO TONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products