Network-related crime prevention and control method and device, computer equipment and storage medium

A prevention and control and model technology, applied in the fields of computer equipment and storage media, devices, and crime prevention and control methods, can solve problems such as low efficiency, poor prevention and control effect, and lack of pertinence, so as to improve analysis efficiency and optimize prevention and control effects. , the effect of eliminating information silos

Active Publication Date: 2020-12-11
ZHEJIANG POLICE COLLEGE
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the existing prevention and control methods are guided and publicized by macro policies such as policy orientation, telecommunications and financial supervision, and security publicity. However, this method lacks pertinence and uses unified publicity strategies such as electronic screens, brochures, and SMS notifications. , most of these publicity strategies are prevention and control information generated by manually summarizing existing cases. Due to manual summarization, the efficiency is low, and in the later prevention and control process, the unified publicity method cannot attract people's attention. Poor prevention and control effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network-related crime prevention and control method and device, computer equipment and storage medium
  • Network-related crime prevention and control method and device, computer equipment and storage medium
  • Network-related crime prevention and control method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0064] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0065] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network-related crime prevention and control method and device, computer equipment and a storage medium, and the method comprises the steps: obtaining crime case informationneeding to be analyzed, so as to obtain initial data; inputting the initial data into a case classification model for case classification processing to obtain a classification result; judging whetherthe classification result is a network-related novel crime case or not; if the classification result is a network-related novel crime case, inputting the initial data into an element extraction modelfor key element extraction to obtain key information; generating a knowledge graph according to the key information; and generating prevention and control information according to the knowledge graph, and pushing the prevention and control information to a corresponding terminal. According to the invention, automatic and accurate analysis of the public security data is realized, and after the keyinformation is extracted, the targeted prevention and control information is generated and pushed to the corresponding terminal in a targeted manner, so that the whole analysis efficiency is improvedand the prevention and control effect is optimized.

Description

technical field [0001] The present invention relates to a crime prevention and control method, and more specifically refers to a network-related crime prevention and control method, device, computer equipment and storage medium. Background technique [0002] New types of cyber-related crimes permeate every corner of the daily life of the general public, and bring great harm to the property safety of the people. Therefore, the national government currently proposes various crackdown and punishment measures for new-type cyber-related crimes, such as the release of "Telecommunications Network Fraud The Opinions further clarified the standards of conviction and sentencing for handling telecommunication and network fraud cases, unified the law enforcement and judicial standards, and required the formation of a high-pressure situation to severely crack down on telecommunication and network fraud crimes; Increase the sentencing range; propose to issue judicial interpretations or am...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/9535G06F40/295G06F40/30G06F16/36G06F16/35G06K9/62G06N3/04G06N3/08H04L29/08G06Q50/26
CPCG06F16/9535G06F40/295G06F40/30G06F16/367G06F16/355G06N3/084G06Q50/26H04L67/55G06N3/045G06F18/2415
Inventor 丁伟杰李海军傅团结陈立力李保敏沈旭晨郑滋椀
Owner ZHEJIANG POLICE COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products