CN106104555B - 用于保护外围设备的行为分析 - Google Patents
用于保护外围设备的行为分析 Download PDFInfo
- Publication number
- CN106104555B CN106104555B CN201580012986.7A CN201580012986A CN106104555B CN 106104555 B CN106104555 B CN 106104555B CN 201580012986 A CN201580012986 A CN 201580012986A CN 106104555 B CN106104555 B CN 106104555B
- Authority
- CN
- China
- Prior art keywords
- mobile computing
- computing device
- behavior
- peripheral equipment
- relevant
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
- G06N20/20—Ensemble learning
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N5/00—Computing arrangements using knowledge-based models
- G06N5/04—Inference or reasoning models
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
- G06F11/0736—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in functional embedded systems, i.e. in a data processing system designed as a combination of hardware and software dedicated to performing a certain function
- G06F11/0742—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in functional embedded systems, i.e. in a data processing system designed as a combination of hardware and software dedicated to performing a certain function in a data processing system embedded in a mobile device, e.g. mobile phones, handheld devices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0751—Error or fault detection not based on redundancy
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/3013—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is an embedded system, i.e. a combination of hardware and software dedicated to perform a certain function in mobile devices, printers, automotive or aircraft systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N20/00—Machine learning
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06N—COMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/128—Anti-malware arrangements, e.g. protection against SMS fraud or mobile malware
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0793—Remedial or corrective actions
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Computer Hardware Design (AREA)
- Mathematical Physics (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Quality & Reliability (AREA)
- Artificial Intelligence (AREA)
- Data Mining & Analysis (AREA)
- Evolutionary Computation (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Medical Informatics (AREA)
- Computational Linguistics (AREA)
- Debugging And Monitoring (AREA)
- Mobile Radio Communication Systems (AREA)
- Telephone Function (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US14/207,754 | 2014-03-13 | ||
| US14/207,754 US10176428B2 (en) | 2014-03-13 | 2014-03-13 | Behavioral analysis for securing peripheral devices |
| PCT/US2015/020228 WO2015138757A1 (en) | 2014-03-13 | 2015-03-12 | Behavioral analysis for securing peripheral devices |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN106104555A CN106104555A (zh) | 2016-11-09 |
| CN106104555B true CN106104555B (zh) | 2019-01-01 |
Family
ID=52774587
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201580012986.7A Active CN106104555B (zh) | 2014-03-13 | 2015-03-12 | 用于保护外围设备的行为分析 |
Country Status (6)
| Country | Link |
|---|---|
| US (1) | US10176428B2 (enExample) |
| EP (1) | EP3117361B1 (enExample) |
| JP (1) | JP2017516181A (enExample) |
| KR (1) | KR20160132394A (enExample) |
| CN (1) | CN106104555B (enExample) |
| WO (1) | WO2015138757A1 (enExample) |
Families Citing this family (60)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140136508A1 (en) | 2012-11-09 | 2014-05-15 | Palo Alto Research Center Incorporated | Computer-Implemented System And Method For Providing Website Navigation Recommendations |
| CN105100832A (zh) * | 2014-04-24 | 2015-11-25 | 海信集团有限公司 | 一种多媒体资源的推送方法及装置 |
| KR102277772B1 (ko) * | 2014-04-30 | 2021-07-14 | 삼성전자주식회사 | 모바일 기기에서 데이터를 통합 관리하는 장치 및 방법과, 그 모바일 기기 |
| WO2016041112A1 (zh) * | 2014-09-15 | 2016-03-24 | 华为技术有限公司 | 可穿戴式设备的通信方法、通信系统及相关设备 |
| US9774604B2 (en) | 2015-01-16 | 2017-09-26 | Zingbox, Ltd. | Private cloud control |
| US9680646B2 (en) * | 2015-02-05 | 2017-06-13 | Apple Inc. | Relay service for communication between controllers and accessories |
| US10212178B2 (en) | 2015-04-07 | 2019-02-19 | Zingbox, Ltd. | Packet analysis based IoT management |
| CN105243311B (zh) * | 2015-10-19 | 2017-02-22 | 广东欧珀移动通信有限公司 | 一种指纹信息的安全调用方法、装置及移动终端 |
| KR102465543B1 (ko) * | 2016-02-19 | 2022-11-10 | 삼성전자 주식회사 | 어플리케이션 및 컴포넌트를 제어하는 방법 및 전자장치 |
| US11080706B2 (en) * | 2016-03-07 | 2021-08-03 | International Business Machines Corporation | Blocking fraudulent transactions in an NFC device |
| US11436656B2 (en) | 2016-03-18 | 2022-09-06 | Palo Alto Research Center Incorporated | System and method for a real-time egocentric collaborative filter on large datasets |
| US10469511B2 (en) * | 2016-03-28 | 2019-11-05 | Cisco Technology, Inc. | User assistance coordination in anomaly detection |
| US11477302B2 (en) * | 2016-07-06 | 2022-10-18 | Palo Alto Research Center Incorporated | Computer-implemented system and method for distributed activity detection |
| US11093834B2 (en) | 2016-07-06 | 2021-08-17 | Palo Alto Research Center Incorporated | Computer-implemented system and method for predicting activity outcome based on user attention |
| US11030618B1 (en) | 2016-09-30 | 2021-06-08 | Winkk, Inc. | Authentication and personal data sharing for partner services using out-of-band optical mark recognition |
| US10819719B2 (en) * | 2016-10-11 | 2020-10-27 | General Electric Company | Systems and methods for protecting a physical asset against a threat |
| US10528725B2 (en) * | 2016-11-04 | 2020-01-07 | Microsoft Technology Licensing, Llc | IoT security service |
| US10380348B2 (en) | 2016-11-21 | 2019-08-13 | ZingBox, Inc. | IoT device risk assessment |
| CN106714225A (zh) * | 2016-12-29 | 2017-05-24 | 北京酷云互动科技有限公司 | 网络设备的识别方法及其系统、智能终端 |
| JP6986597B2 (ja) * | 2017-03-21 | 2021-12-22 | 株式会社Preferred Networks | サーバ装置、学習済モデル提供プログラム、学習済モデル提供方法及び学習済モデル提供システム |
| JP7280935B2 (ja) * | 2017-03-21 | 2023-05-24 | 株式会社Preferred Networks | サーバ装置、学習済モデル提供プログラム、学習済モデル提供方法及び学習済モデル提供システム |
| CN110431569A (zh) * | 2017-03-21 | 2019-11-08 | 首选网络株式会社 | 服务器装置、已学习模型提供程序、已学习模型提供方法以及已学习模型提供系统 |
| US20190014137A1 (en) * | 2017-07-10 | 2019-01-10 | ZingBox, Inc. | IoT DEVICE SECURITY |
| EP3662369B1 (en) * | 2017-08-03 | 2023-03-08 | Cyber Sepio Systems Ltd | System and method for securing a computer system from threats introduced by usb devices |
| IL254573A0 (en) | 2017-09-18 | 2017-11-30 | Cyber Sepio Systems Ltd | Install a method and computer software product for securing a local network from threats posed by foreign or hostile accessories |
| US10983602B2 (en) * | 2017-09-05 | 2021-04-20 | Microsoft Technology Licensing, Llc | Identifying an input device |
| US11070568B2 (en) | 2017-09-27 | 2021-07-20 | Palo Alto Networks, Inc. | IoT device management visualization |
| US20190104141A1 (en) * | 2017-10-02 | 2019-04-04 | Zuk Avraham | System and Method for Providing and Facilitating an Information Security Marketplace |
| US11082296B2 (en) | 2017-10-27 | 2021-08-03 | Palo Alto Networks, Inc. | IoT device grouping and labeling |
| US11627193B2 (en) * | 2017-12-07 | 2023-04-11 | Oracle International Corporation | Method and system for tracking application activity data from remote devices and generating a corrective action data structure for the remote devices |
| RU2677361C1 (ru) * | 2018-01-17 | 2019-01-16 | Общество с ограниченной ответственностью "Траст" | Способ и система децентрализованной идентификации вредоносных программ |
| US11777965B2 (en) | 2018-06-18 | 2023-10-03 | Palo Alto Networks, Inc. | Pattern match-based detection in IoT security |
| US10536814B1 (en) * | 2018-06-26 | 2020-01-14 | Passport Labs, Inc. | Method for determining presence of a mobile computing device in a vehicle |
| US11562304B2 (en) | 2018-07-13 | 2023-01-24 | Accenture Global Solutions Limited | Preventative diagnosis prediction and solution determination of future event using internet of things and artificial intelligence |
| WO2020051161A1 (en) | 2018-09-04 | 2020-03-12 | ZingBox, Inc. | Iot application learning |
| US10740656B2 (en) * | 2018-09-19 | 2020-08-11 | Hughes Network Systems, Llc | Machine learning clustering models for determining the condition of a communication system |
| WO2020081603A1 (en) | 2018-10-15 | 2020-04-23 | ZingBox, Inc. | Multi-dimensional periodicity detection of iot device behavior |
| US11451571B2 (en) | 2018-12-12 | 2022-09-20 | Palo Alto Networks, Inc. | IoT device risk assessment and scoring |
| US12107638B2 (en) * | 2018-12-13 | 2024-10-01 | Telefonaktiebolaget Lm Ericsson (Publ) | Parameter setting |
| US11200318B2 (en) * | 2018-12-28 | 2021-12-14 | Mcafee, Llc | Methods and apparatus to detect adversarial malware |
| US11689573B2 (en) | 2018-12-31 | 2023-06-27 | Palo Alto Networks, Inc. | Multi-layered policy management |
| WO2020159649A1 (en) * | 2019-02-01 | 2020-08-06 | Jaxon, Inc. | Automated labelers for machine learning algorithms |
| KR20210026619A (ko) * | 2019-08-30 | 2021-03-10 | 삼성전자주식회사 | 전자 장치 및 이의 동작 방법 |
| CN111024708B (zh) * | 2019-09-06 | 2022-02-22 | 腾讯科技(深圳)有限公司 | 产品缺陷检测数据处理方法、装置、系统和设备 |
| US11341238B2 (en) * | 2019-09-09 | 2022-05-24 | Aptiv Technologies Limited | Electronic device intrusion detection |
| US12335399B2 (en) | 2019-12-10 | 2025-06-17 | Winkk, Inc. | User as a password |
| US11574045B2 (en) | 2019-12-10 | 2023-02-07 | Winkk, Inc. | Automated ID proofing using a random multitude of real-time behavioral biometric samplings |
| US11553337B2 (en) | 2019-12-10 | 2023-01-10 | Winkk, Inc. | Method and apparatus for encryption key exchange with enhanced security through opti-encryption channel |
| US12341790B2 (en) * | 2019-12-10 | 2025-06-24 | Winkk, Inc. | Device behavior analytics |
| US11115799B1 (en) | 2020-06-01 | 2021-09-07 | Palo Alto Networks, Inc. | IoT device discovery and identification |
| US12302451B2 (en) | 2020-06-01 | 2025-05-13 | Palo Alto Networks, Inc. | IoT security policy on a firewall |
| US11843943B2 (en) | 2021-06-04 | 2023-12-12 | Winkk, Inc. | Dynamic key exchange for moving target |
| US11552975B1 (en) | 2021-10-26 | 2023-01-10 | Palo Alto Networks, Inc. | IoT device identification with packet flow behavior machine learning model |
| US20240385943A1 (en) * | 2021-10-29 | 2024-11-21 | Nec Corporation | Model analysis device, model analysis method, and recording medium |
| US12301600B2 (en) | 2022-01-18 | 2025-05-13 | Palo Alto Networks, Inc. | IoT device identification by machine learning with time series behavioral and statistical features |
| US12107742B2 (en) | 2022-08-31 | 2024-10-01 | Hughes Network Systems, Llc | Machine learning to enhance satellite terminal performance |
| US12445305B2 (en) | 2022-09-21 | 2025-10-14 | Winkk, Inc. | Authentication process |
| US12432229B2 (en) * | 2023-06-27 | 2025-09-30 | International Business Machines Corporation | Detection of malicious encryption based on machine learning |
| CN117651289B (zh) * | 2024-01-26 | 2024-04-05 | 中国人民解放军军事科学院系统工程研究院 | 一种用于无线电通信设备测试的数据处理方法及装置 |
| CN119011497B (zh) * | 2024-10-24 | 2025-01-07 | 珠海星云智联科技有限公司 | 外围器件互联扩展设备限速系统、设备以及集群 |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130097706A1 (en) * | 2011-09-16 | 2013-04-18 | Veracode, Inc. | Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security |
Family Cites Families (14)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20050177720A1 (en) | 2004-02-10 | 2005-08-11 | Seiichi Katano | Virus protection for multi-function peripherals |
| US8839418B2 (en) * | 2006-01-18 | 2014-09-16 | Microsoft Corporation | Finding phishing sites |
| WO2007117582A2 (en) * | 2006-04-06 | 2007-10-18 | Smobile Systems Inc. | Malware detection system and method for mobile platforms |
| DE102007052128A1 (de) | 2007-10-31 | 2009-05-14 | Concept04 Gmbh | Mobilfunkendgerät mit Filtereinrichtung und Netzwerkelement zur Konfiguration der Filtereinrichtung |
| US8595834B2 (en) | 2008-02-04 | 2013-11-26 | Samsung Electronics Co., Ltd | Detecting unauthorized use of computing devices based on behavioral patterns |
| US8484727B2 (en) * | 2008-11-26 | 2013-07-09 | Kaspersky Lab Zao | System and method for computer malware detection |
| US8875286B2 (en) | 2010-12-01 | 2014-10-28 | Cisco Technology, Inc. | Method and apparatus for detecting malicious software using machine learning techniques |
| US20120167218A1 (en) * | 2010-12-23 | 2012-06-28 | Rajesh Poornachandran | Signature-independent, system behavior-based malware detection |
| KR20120096983A (ko) * | 2011-02-24 | 2012-09-03 | 삼성전자주식회사 | 악성 프로그램 검출 방법 및 이를 구현하는 휴대 단말기 |
| US9213829B2 (en) | 2011-07-12 | 2015-12-15 | Hewlett-Packard Development Company, L.P. | Computing device including a port and a guest domain |
| US9202047B2 (en) * | 2012-05-14 | 2015-12-01 | Qualcomm Incorporated | System, apparatus, and method for adaptive observation of mobile device behavior |
| US20130304677A1 (en) * | 2012-05-14 | 2013-11-14 | Qualcomm Incorporated | Architecture for Client-Cloud Behavior Analyzer |
| US9747440B2 (en) * | 2012-08-15 | 2017-08-29 | Qualcomm Incorporated | On-line behavioral analysis engine in mobile device with multiple analyzer model providers |
| US8850589B2 (en) * | 2012-09-25 | 2014-09-30 | International Business Machines Corporation | Training classifiers for program analysis |
-
2014
- 2014-03-13 US US14/207,754 patent/US10176428B2/en active Active
-
2015
- 2015-03-12 CN CN201580012986.7A patent/CN106104555B/zh active Active
- 2015-03-12 WO PCT/US2015/020228 patent/WO2015138757A1/en not_active Ceased
- 2015-03-12 EP EP15713096.4A patent/EP3117361B1/en active Active
- 2015-03-12 JP JP2016556260A patent/JP2017516181A/ja active Pending
- 2015-03-12 KR KR1020167024893A patent/KR20160132394A/ko not_active Withdrawn
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130097706A1 (en) * | 2011-09-16 | 2013-04-18 | Veracode, Inc. | Automated behavioral and static analysis using an instrumented sandbox and machine learning classification for mobile security |
Non-Patent Citations (3)
| Title |
|---|
| A Machine Learning Approach to Android Malware Detection;Justin Sahs 等;《2012 European Intelligence and Security Informatics Conference》;20120824;全文 * |
| Cloaker:Hardware Supported Rootkit Concealment;Francis M.David等;《2008 IEEE Symposium on Security and Privacy》;20111031;全文 * |
| Mobile Device Profiling and Intrusion Detection Using Smart Batteries;Timothy K Buennemeyer等;《Proceedings of the 41st Hawaii International Conference on System Sciences》;20080131;全文 * |
Also Published As
| Publication number | Publication date |
|---|---|
| US10176428B2 (en) | 2019-01-08 |
| EP3117361A1 (en) | 2017-01-18 |
| US20150262067A1 (en) | 2015-09-17 |
| CN106104555A (zh) | 2016-11-09 |
| JP2017516181A (ja) | 2017-06-15 |
| KR20160132394A (ko) | 2016-11-18 |
| EP3117361B1 (en) | 2018-01-10 |
| WO2015138757A1 (en) | 2015-09-17 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106104555B (zh) | 用于保护外围设备的行为分析 | |
| CN106716382B (zh) | 用于移动装置行为的聚集多应用程序行为分析的方法和系统 | |
| CN104541293A (zh) | 用于客户端-云行为分析器的架构 | |
| Li et al. | Unobservable re-authentication for smartphones. | |
| US9703962B2 (en) | Methods and systems for behavioral analysis of mobile device behaviors based on user persona information | |
| JP6239808B1 (ja) | 効率的な連続認証に対して挙動分析を使用するための方法およびシステム | |
| CN107851154B (zh) | 存储器层次结构监测系统和方法 | |
| KR101789962B1 (ko) | 이동 디바이스에서 거동 분석 동작들을 수행함으로써 애플리케이션 상태들을 추론하기 위한 방법 및 시스템 | |
| CN109478218A (zh) | 用于分类执行会话的装置和方法 | |
| CN107567628A (zh) | 用于使用针对增强型决策树桩的因果分析来识别和响应非良性行为的方法和系统 | |
| WO2023055426A1 (en) | Techniques for input classification and responses using generative neural networks | |
| CN107209825A (zh) | 经由存储器监测的数据流跟踪 | |
| US20240144275A1 (en) | Real-time fraud detection using machine learning | |
| CN109074405A (zh) | 利用基于上下文的处理的数据动态管理 | |
| CN109791587A (zh) | 经由用户状态检测受危害设备 | |
| CN107408167A (zh) | 执行用户无缝认证 | |
| CN110535850B (zh) | 帐号登录的处理方法和装置、存储介质及电子装置 | |
| CN110516418A (zh) | 一种操作用户识别方法、装置及设备 | |
| Prabhu | Fog computing, deep learning and big data analytics-research directions | |
| CN109274639A (zh) | 开放平台异常数据访问的识别方法和装置 | |
| CA3202706A1 (en) | Method and apparatus for user recognition | |
| CN104346550B (zh) | 一种信息处理方法以及一种电子设备 | |
| CN112184241B (zh) | 一种身份认证的方法及装置 | |
| WO2025000099A1 (en) | Bio-origin validation engine with ownership rights management and certification apparatus, system and method | |
| US20260046284A1 (en) | Identification card based multi-factor authentication |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |