Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

210 results about "Blacklisting" patented technology

Blacklisting is the action of a group or authority, compiling a blacklist (or black list) of people, countries or other entities to be avoided or distrusted as not being acceptable to those making the list. A blacklist can list people to be discriminated against, refused employment, or censored. As a verb, blacklist can mean to put an individual or entity on such a list.

Method for quickly confirming real name identity in important place and human image and identity comparison safety inspection system

The invention belongs to a method for quickly confirming a real name identity in an important place and a human image and identity comparison safety inspection system. The method comprises the steps that (1) human image acquisition equipment acquires a human face image or a video steam of passing people or a migrant in real time, and analyzes feature information from the human image and personal information, such as the height and the age; (2) certificate reading assorted equipment reads information, such as an identity card picture and the height, of passing people or the migrant according to a service specification in real time; (3) a management host unit performs on-site or real-time on-line comparison on the face picture or the video stream acquired by the human image acquisition equipment and the certificate information read by the certificate reading assorted equipment, and supports a manual blacklist introduction or on-line blacklist downloading and updating function; and (4) traveling control equipment is controlled according to a comparison result. According to the method and the human image and identity comparison safety inspection system, first-line policemen or workers in important fields can quickly identify and confirm the real identity of passing people or the migrant on site according to a police human image identification comparison service requirement on the basis of an advanced face identification core technology in the industry at present, and an unthinkable massive picture library comparison requirement in the past is met on site.
Owner:BAOJI TRAFFIC INFORMATION ENG INST

Abnormal login identification method and system, storage medium and electronic equipment

ActiveCN108092975AEnsure safetyAccurate and effective identification and defenseTransmissionThird partyIp address
The invention provides an abnormal login identification method and system, a storage medium and electronic equipment. The method includes the following steps: receiving and extracting characteristic attributes carried in a real-time login request; judging whether an account of the real-time login request tries to log in to multiple third-party websites within a preset time and fails more than a preset number of times, and if yes, identifying the login as an abnormal login; traversing a blacklist library according to the extracted characteristic attributes, and assigning a first risk value based on a traversal result; assigning a second risk value according to the matching degree between an IP address of the real-time login request and a common IP attribution of a UID of the real-time loginrequest; comparing the number of login failures and the number of preset times of each characteristic attribute within the preset time, and assigning a third risk value according to a comparison result; and performing weighted calculation on the first, second and third risk values to obtain a risk reference value of the real-time login request, and identifying the login as the abnormal login whenthe risk reference value exceeds a risk threshold. According to the scheme of the invention, by combining the external anti-scanning identification and the internal multidimensional identification, abnormal login behaviors can be intercepted to a maximum extent.
Owner:SHANGHAI CTRIP COMMERCE CO LTD

Risk scoring model construction method, device, storage medium and terminal

The present invention provides a risk scoring model construction method. The construction method includes the following steps that: a blacklist sample library and a whitelist sample library are constructed according to preset account data, wherein the blacklist sample library includes abnormal accounts, and the whitelist sample library includes normal accounts; cluster training is performed on theabnormal accounts in the blacklist sample library and the normal accounts in the whitelist sample library on the basis of a gradient boosting decision tree (GBDT) algorithm, and abnormal account classification features are screened out; the abnormal account classification features are trained on the basis of a random forest (RF) algorithm, and a contribution degree corresponding to each abnormalaccount classification feature is obtained; and a risk scoring model is constructed according to the abnormal account classification features and the contribution degrees corresponding to the abnormalaccount classification features, and the risk scoring model is used for identifying the abnormal accounts. The risk scoring model constructed by the method of the invention improves the timeliness ofclearing the abnormal accounts, reduces noise interferences caused by the abnormal accounts, and improves the calculation precision of many indicators of APPs.
Owner:CHINA PING AN LIFE INSURANCE CO LTD

Network ticket buying abnormal behavior recognition method and system and equipment

The invention provides a network ticket buying abnormal behavior recognition method and system and equipment. The method comprises the steps that user IP, Cookie and access proxy environment Agent hashing in network ticket buying behavior records are adopted as global unique encoding character string IP+Cookie+Agent, and a unique user identifier is formed; network ticket buying behavior attributes in historic network ticket buying behavior records and real-time network ticket buying behavior records of the user identifier are extracted; the user IP with the abnormal behavior attribute in the network ticket buying behavior attribute is recognized, and the user IP with the abnormal behavior attribute is stored into a blacklist to be isolated. According to the network ticket buying abnormal behavior recognition method and system and equipment, various thresholds of ticket resale can be determined and recognized, and the data judgment basis is provided for determination of ticket resale. Behavior characteristics of users are recorded in real time, and the real-time basis can be provided for real-time interception of ticket resale; the blacklist can be built, the ticket resale can be intercepted in advance on the basis of the blacklist, and resource distribution is more reasonable and fairer.
Owner:BEIJING HONGMA MEDIA CULTURE DEV

Industrial control information safety monitoring system adopting black and white lists for analysis

InactiveCN110868425AEnhancing fine-grained analysisImprove accuracyTransmissionMonitoring systemWhitelist
The invention relates to the field of industrial control system information safety, in particular to an industrial control information safety monitoring system adopting a black list and a white list for analysis, which comprises the following steps of: (1) collecting an initial sample library; (2) blacklist rule formation and alarm generation; (3) white list rule formation and alarm generation; (4) intelligently generating a communication white list; (5) protocol rule formation and alarm generation; and (6) performing visual alarm and report display. The beneficial effects of the invention arethat the system carries out the credible monitoring of assets in the industrial control network, carries out the credible monitoring of communication in the industrial control network, carries out the deep analysis of a plurality of industrial protocols, carries out the visual display of a topological structure of the industrial control network, and carries out the report statistics of a threat form in the industrial control network; the method is beneficial to realization of abnormal monitoring in the network, is beneficial to realization of quick positioning and troubleshooting of problem assets and problem communication behaviors, is beneficial to avoiding human operation errors, improves the accuracy of a white list, reduces missing reports and false reports, and constructs a monitoring system easy to operate and capable of quickly positioning problems.
Owner:上海三零卫士信息安全有限公司

Blacklist sharing method and device, computer device and storage medium

The invention relates to the field of block storage areas, in particular to a blacklist sharing method and device, a computer device and a storage medium. The method comprises: obtaining a blacklist obtaining request sent by a query terminal, the blacklist obtaining request carrying a query identifier, and verifying the access permission of the query terminal according to the query identifier; obtaining a first encrypted blacklist corresponding to the blacklist obtaining request from a block chain storing the blacklist when the access permission of the query terminal passes verification; identifying uploading party information corresponding to the first encryption blacklist, generating an authorization verification request according to the uploading party information, and sending the authorization verification request to a query terminal; receiving an authorization certificate returned by the query terminal according to the authorization verification request, and decrypting the obtained first encryption blacklist according to the authorization certificate to obtain a query blacklist; and sending the query blacklist to a query terminal. By adopting the method, safe circulation of blacklist data among multiple enterprises can be effectively realized.
Owner:ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products