An information security detection method, device, electronic equipment and storage medium

A detection method and security technology, applied in the computer field, can solve the problems of low efficiency of transaction information security detection, difficulty in updating and iterating of expert rules, lag and other problems, and achieve the effect of improving detection efficiency and accuracy.

Active Publication Date: 2021-07-27
TENCENT TECH (SHENZHEN) CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the actual effect of this solution is very dependent on the business experience of experts, and the rules summarized by different business experts will be quite different, the effect is unstable, and it requires a lot of manpower and material resources
In addition, there is a lag in data analysis after the event based on expert experience; at the same time, business experts need a long period of analysis to draw a relatively reliable conclusion, and the efficiency of transaction information security detection is low; expert rules are not easy to update and iterate , the effect of prevention and control gradually deteriorates after deployment for a period of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An information security detection method, device, electronic equipment and storage medium
  • An information security detection method, device, electronic equipment and storage medium
  • An information security detection method, device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.

[0057] Embodiments of the present application provide an information security detection method, device, electronic equipment, and storage medium. Specifically, the information security detection device may be integrated into an electronic device, and the electronic device may be a terminal, a server, or other equipment.

[0058] It can be understood that the information security detection method in this embodiment may be executed on the terminal, may also be executed on the server, and may also...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses an information security detection method, device, electronic equipment, and storage medium; the method relates to protection in the field of computer security, can obtain target transaction information, and perform characteristic analysis on the transaction information in each dimension of the target transaction information Statistical analysis and processing to obtain characteristic information of the target transaction information; through the abnormality recognition model, the abnormality score of the target transaction information is obtained based on the characteristic information, the abnormality recognition model includes at least one recognition sub-model, and each recognition sub-model corresponds to at least one abnormality recognition rule; When the abnormal score is greater than the preset first threshold, an abnormal rule set is obtained, and the abnormal rule set includes at least one abnormal rule; when the target transaction information matches the abnormal rule, it is determined that the target transaction information is an abnormal transaction. The application can combine the prediction results of the abnormality recognition model and the abnormality rule set to detect the security of the transaction information, which improves the detection efficiency and accuracy of the transaction information.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to an information security detection method, device, electronic equipment and storage medium. Background technique [0002] With the development of Internet technology, the number of online transactions has increased dramatically. Followed by the increasingly rampant transaction fraud, which poses a huge challenge to the security detection of transaction information. [0003] In the current related technologies, it is generally based on the experience of business experts to analyze data or understand the transaction anti-fraud scenario, and summarize the corresponding fraud rules and apply them to the transaction anti-fraud scenario to detect the security of transaction information. However, the actual effect of this solution is very dependent on the business experience of experts, and the rules summarized by different business experts will be quite different, the effec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/40G06F16/906G06N20/10G06N20/20G06N3/08
CPCG06N3/08G06Q20/4016G06F16/906G06N20/10G06N20/20
Inventor 张观侣李超
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products