Supercharge Your Innovation With Domain-Expert AI Agents!

User behavior encryption method based on computer big data

An encryption method and big data technology, applied in computer security devices, computing, digital data authentication, etc., can solve problems such as poor practicability, difficulty in continuous optimization of encryption methods, and unsatisfactory accuracy, achieving fast processing speed and avoiding errors. Encrypted and accurate results

Inactive Publication Date: 2021-12-14
XINXIANG UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a user behavior encryption method based on computer big data, collect user behavior data, and judge whether the user is the user himself based on the big data of the mobile terminal owner's usual usage habits, and if not, send The mobile terminal locks and encrypts in time to avoid information leakage. This encryption method can continuously monitor the user's behavior. The optimization unit constantly improves its own program, which solves the problems of poor practicability and unsatisfactory accuracy of existing mobile encryption methods, and the difficulty of continuous optimization of encryption methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User behavior encryption method based on computer big data
  • User behavior encryption method based on computer big data
  • User behavior encryption method based on computer big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0030] see Figure 1-2 As shown, the present invention is a user behavior encryption method based on computer big data, comprising the following steps:

[0031]Step 1: Collect the user’s daily behavior data through the user behavior data collection module 1, eliminate the uncertain factors of the data through the data preprocessing module 2, eliminate abnormal data, and make the accuracy of the data reach the best, and use the data classification module 3 to classi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user behavior encryption method based on computer big data, and relates to the technical field of information encryption. The method comprises the following steps: 1, collecting daily behavior data of a user through a user behavior data collection module, eliminating uncertain factors of the data through a data preprocessing module, eliminating abnormal data, classifying the daily behavior data of the user through a data classification module, storing the classified data in a big data module through a controller then, and establishing a user behavior evaluation model. The behavior data of the user is collected, whether the user is the user himself or herself is judged based on the big data of the use habits of the owner of the mobile terminal, and if not, the mobile terminal is locked and encrypted in time, so that information leakage is avoided. According to the encryption method, the behaviors of the user can be continuously monitored, and the screen is locked in time, so that the information security is greatly improved.

Description

technical field [0001] The invention belongs to the technical field of information encryption, and in particular relates to a user behavior encryption method based on computer big data. Background technique [0002] Big data refers to a collection of data that cannot be captured, managed, and processed by conventional software tools within a certain period of time. It is a massive, high-growth rate that requires a new processing model to have stronger decision-making power, insight and discovery, and process optimization capabilities. And diversified information assets, big data has the characteristics of 5V, that is, large volume, high speed, variety, low value density and authenticity. With the advent of the cloud era, big data has also attracted more and more attention. Big data requires special Technologies to efficiently process large amounts of data that tolerate elapsed time, technologies applicable to big data, including massively parallel processing databases, data ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/37H04W12/02G06F11/34G06F21/31H04W4/14H04L12/58
CPCH04W12/02G06F11/3438G06F21/316H04W4/14H04L51/42
Inventor 赵芳
Owner XINXIANG UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More