User website interaction behavior credibility judgment method based on virtual fingerprints

A technology of credibility and behavior, applied in the field of information security, can solve problems such as psychological factors that cannot be directly observed or measured, and achieve the effect of solving network security problems

Inactive Publication Date: 2021-06-18
CHONGQING UNIV
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the process of human-web interaction, psychological factors are mostly impossible to be directly observed or measured

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User website interaction behavior credibility judgment method based on virtual fingerprints
  • User website interaction behavior credibility judgment method based on virtual fingerprints
  • User website interaction behavior credibility judgment method based on virtual fingerprints

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be further described in detail below in conjunction with the accompanying drawings.

[0032] Such as figure 1 As shown, the present invention discloses a method for judging the credibility of user website interaction behavior based on virtual fingerprints, including:

[0033] S1. Acquiring the log file of the target user;

[0034] In the present invention, log data of user operations can be collected from the website, including time stamp, user ID, event type, current page, stay time, UA, URL, etc.

[0035] S2. Extracting interactive behavior features based on the target user log file as the virtual fingerprint of the target user;

[0036] In the present invention, interactive behavior features are constructed from log files without using any additional methods. In addition, the interaction behavior mode in the present invention involves many aspects of the interaction process, and is not limited to one behavior. The unique interactive beh...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user website interaction behavior credibility judgment method based on virtual fingerprints. The method comprises the steps of obtaining a target user log file; based on the target user log file, extracting an interaction behavior feature as a virtual fingerprint of the target user; and inputting the virtual fingerprint of the target user into the trained judgment model to obtain a target user interaction behavior credibility judgment result. According to the method, the idea that the interactive behavior mode is unique for the user and can serve as the virtual fingerprint is provided, the virtual fingerprint is created by utilizing the interactive behavior characteristics related to the psychological mode of the user, and then credibility judgment can be effectively carried out on the interactive behavior when the user browses the webpage, so that the network security problem can be solved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for judging the credibility of interactive behaviors of user websites based on virtual fingerprints. Background technique [0002] According to global statistics, as of June 2019, Internet users have reached 3.8 billion, more than 50% of the world's total population. In order to ensure the orderliness of online activities, a user needs to register an account with personal information to represent his or her Internet identity; this registered identity is similar to an ID card. However, unlike real life where only one ID card is allowed, a person can register several online accounts. As the rate of online identity theft continues to rise, researchers say users are increasingly fearful, especially when it comes to financial loss and reputational damage. [0003] "Trusted interaction" in human-computer interaction refers to the interaction between ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06G06N20/20G06N5/00
CPCH04L63/1425G06N20/20G06N5/01
Inventor 易茜李嘉佳易树平熊世权张一弓
Owner CHONGQING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products