Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Information security capability evaluation system and method based on mobile terminal behaviors

A mobile terminal and information security technology, applied in the field of information security, can solve problems such as low efficiency and incapable terminal evaluation, and achieve the effects of fast processing, accurate processing, and accurate collection

Inactive Publication Date: 2021-07-09
张恒
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The evaluation system in the prior art cannot accurately and quickly evaluate the terminal, which leads to the problem of low efficiency in the evaluation process. Therefore, an information security capability evaluation system and method based on mobile terminal behavior is now provided to solve this technical problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security capability evaluation system and method based on mobile terminal behaviors
  • Information security capability evaluation system and method based on mobile terminal behaviors
  • Information security capability evaluation system and method based on mobile terminal behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] see figure 1 , in Embodiment 1 of the present invention, a structural diagram of an information security capability evaluation system based on mobile terminal behavior provided by the embodiment of the present invention, including: a data collection device 1 and a data evaluation device 2 connected to the data collection device 1 in communication ; Specifically, the data acquisition device 1 and the data evaluation device 2 can be connected through a wired connection or a wireless connection, which uses an existing communication protocol for connection.

[0050] The data collection device 1 is used to collect behavior data of the mobile terminal, perform semantic recognition on the acquired behavior data, classify and mark the behavior data according to the semantic recognition result, and send the classified and marked behavior data to the data evaluation device 2;

[0051] The data evaluation device 2 is used to evaluate the classified and marked behavior data through...

Embodiment 2

[0074] see Figure 4 The embodiment of the present invention also provides a method for evaluating information security capabilities based on mobile terminal behavior, including the following steps:

[0075] S101: collecting behavior data of the mobile terminal;

[0076] S102: Perform semantic recognition on the acquired behavior data;

[0077] S103: Classify and mark the behavior data according to the semantic recognition result;

[0078] S104: Evaluate the classified and marked behavior data through a preset evaluation model to obtain safety level data.

[0079] see Figure 5 , the S104 step, also includes the following steps:

[0080] S1041, acquiring a set of historical behavior data samples of the mobile terminal;

[0081] S1042. Determine the weight of the historical behavior data sample, and establish an unsafe behavior evaluation rule for evaluating the safety of the behavior data according to the weight of the historical behavior data sample;

[0082] S1043. Con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is suitable for the technical field of information security, and provides an information security capability evaluation system and method based on mobile terminal behaviors. The system comprises a data acquisition device and a data evaluation device in communication connection with the data acquisition device, the data acquisition device is used for acquiring behavior data of the mobile terminal, performing semantic recognition on the acquired behavior data, classifying and marking the behavior data according to a semantic recognition result, and sending the classified and marked behavior data to the data evaluation device; and the data evaluation device is used for evaluating the classified and marked behavior data through a preset evaluation model to obtain security level data. According to the method, the behavior data can be quickly and accurately processed.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a mobile terminal behavior-based information security capability evaluation system and method. Background technique [0002] As the most popular device among the masses, mobile terminal devices can reflect the user's information security capabilities to a large extent. In recent years, security incidents such as fund theft and privacy leaks frequently occur on mobile terminal equipment, so it is necessary to evaluate the security of mobile terminal equipment. [0003] The evaluation system in the prior art cannot accurately and quickly evaluate the terminal, which leads to the problem of low efficiency in the evaluation process. Therefore, an information security capability evaluation system and method based on mobile terminal behavior is now provided to solve this technical problem. Contents of the invention [0004] The object of the present invention is to prov...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06K9/62
CPCG06F21/577G06F18/24
Inventor 张恒李斌
Owner 张恒
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products