Method, device, computer equipment, and storage medium for preventing and controlling cybercrime

A prevention and control and model technology, applied in the fields of devices, computer equipment and storage media, and crime prevention and control methods, can solve problems such as low efficiency, lack of pertinence, and poor prevention and control effects, so as to improve analysis efficiency and optimize prevention and control effects. , the effect of eliminating information silos

Active Publication Date: 2021-08-27
ZHEJIANG POLICE COLLEGE
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At present, the existing prevention and control methods are guided and publicized by macro policies such as policy orientation, telecommunications and financial supervision, and security publicity. However, this method lacks pertinence and uses unified publicity strategies such as electronic screens, brochures, and SMS notifications. , most of these publicity strategies are prevention and control information generated by manually summarizing existing cases. Due to manual summarization, the efficiency is low, and in the later prevention and control process, the unified publicity method cannot attract people's attention. Poor prevention and control effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device, computer equipment, and storage medium for preventing and controlling cybercrime
  • Method, device, computer equipment, and storage medium for preventing and controlling cybercrime
  • Method, device, computer equipment, and storage medium for preventing and controlling cybercrime

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0064] It should be understood that when used in this specification and the appended claims, the terms "comprising" and "comprises" indicate the presence of described features, integers, steps, operations, elements and / or components, but do not exclude one or Presence or addition of multiple other features, integers, steps, operations, elements, components and / or collections thereof.

[0065] It should also be understood that the terminology used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a method, device, computer equipment and storage medium for the prevention and control of network-related crimes. The method includes obtaining criminal case information that needs to be analyzed to obtain initial data; inputting the initial data into a case classification model for case classification processing to obtain Classification result; judge whether the classification result is a new network-related crime case; if the classification result is a new network-related crime case, input the initial data into the element extraction model to extract key elements to obtain key information; generate a knowledge map based on the key information ; Generate prevention and control information based on the knowledge graph, and push the prevention and control information to the corresponding terminal. The invention realizes automatic and precise analysis of public security data, and after extracting key information, generates targeted prevention and control information, and pushes them to corresponding terminals in a targeted manner, so as to improve the overall analysis efficiency and optimize the prevention and control effect.

Description

technical field [0001] The present invention relates to a crime prevention and control method, and more specifically refers to a network-related crime prevention and control method, device, computer equipment and storage medium. Background technique [0002] New types of cyber-related crimes permeate every corner of the daily life of the general public, and bring great harm to the property safety of the people. Therefore, the national government currently proposes various crackdown and punishment measures for new-type cyber-related crimes, such as the release of "Telecommunications Network Fraud The Opinions further clarified the standards of conviction and sentencing for handling telecommunication and network fraud cases, unified the law enforcement and judicial standards, and required the formation of a high-pressure situation to severely crack down on telecommunication and network fraud crimes; Increase the sentencing range; propose to issue judicial interpretations or am...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/9535G06F40/295G06F40/30G06F16/36G06F16/35G06K9/62G06N3/04G06N3/08H04L29/08G06Q50/26
CPCG06F16/9535G06F40/295G06F40/30G06F16/367G06F16/355G06N3/084G06Q50/26H04L67/55G06N3/045G06F18/2415
Inventor 丁伟杰李海军傅团结陈立力李保敏沈旭晨郑滋椀
Owner ZHEJIANG POLICE COLLEGE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products