CN109190342A - The owner's auth method and community server of intelligence community - Google Patents

The owner's auth method and community server of intelligence community Download PDF

Info

Publication number
CN109190342A
CN109190342A CN201810947822.9A CN201810947822A CN109190342A CN 109190342 A CN109190342 A CN 109190342A CN 201810947822 A CN201810947822 A CN 201810947822A CN 109190342 A CN109190342 A CN 109190342A
Authority
CN
China
Prior art keywords
user
community
owner
feature
mobile terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810947822.9A
Other languages
Chinese (zh)
Other versions
CN109190342B (en
Inventor
陈贞翔
纪科
曹栋
庞颖
杨波
荆山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
University of Jinan
CERNET Corp
Original Assignee
University of Jinan
CERNET Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by University of Jinan, CERNET Corp filed Critical University of Jinan
Priority to CN201810947822.9A priority Critical patent/CN109190342B/en
Publication of CN109190342A publication Critical patent/CN109190342A/en
Application granted granted Critical
Publication of CN109190342B publication Critical patent/CN109190342B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/316User authentication by observing the pattern of computer usage, e.g. typical user behaviour
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Medical Informatics (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Social Psychology (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses the owner's auth method and community server of intelligence community, community server sends basic information and User reliability to mobile terminal;Community server is browsed according to user and is recorded, and extracts the various dimensions interaction feature of user;It excavates user behavior and is accustomed to feature;Random Forest model is established, is accustomed to feature using the user behavior of known community owner and known non-community owner, Random Forest model is trained, trained Random Forest model is obtained;It is accustomed to feature according to the user behavior that the setting period excavates user to be predicted, the user behavior habit feature of user to be predicted is input in trained Random Forest model, prediction is the classification results of community owner or non-community owner;Using the result of classification as the foundation of adjustment User reliability, the current credibility of user is changed;Community server receives the new access request of user, and community server pushes the corresponding enjoyable service content of user according to user's current credibility, to user.

Description

The owner's auth method and community server of intelligence community
Technical field
The present invention relates to intelligence community technical fields, more particularly to owner's auth method of intelligence community and community Server.
Background technique
What nowadays intelligence community was developed is like a raging fire, and the service majority that community server provides is provided to cell owner , and many information is related to certain owner's privacy, if non-owner is available to being possible to that the equity of owner can be damaged. But nowadays intelligence community is applied other than the information such as verifying property ownership certificate, can not realize this Authentication Questions well.
How to avoid uploading the complex operations such as itself house property sensitive information on verifying or line under the line of user, it is how real How quick, the Hard Authentication of existing cell owner identity, recommend owner for residential property accurate information and think without being destined to One of the technical issues of colleague for stealing Intra-cell information is current intelligence community urgent need to resolve.
Summary of the invention
In order to solve the deficiencies in the prior art, the present invention provides owner's auth methods of intelligence community and community to take Business device;
As the first aspect of the present invention, owner's auth method of intelligence community is provided;
Owner's auth method of intelligence community, comprising:
Community server receives the registration request that mobile terminal is initiated;Verification result is fed back into mobile terminal, if tested Card passes through, then community server and mobile terminal establish connection;Community server and mobile terminal are established after connection, community's clothes Business device sends basic information and User reliability to mobile terminal by IPv6 network;
Community server is browsed according to user and is recorded, and extracts the various dimensions interaction feature of user;From various dimensions interaction feature Middle excavation user behavior is accustomed to feature;Random Forest model is established, the use of known community owner and known non-community owner are utilized Family behavioural habits feature, is trained Random Forest model, obtains trained Random Forest model;
According to the setting period, the user behavior habit feature of user to be predicted is excavated, by the user behavior of user to be predicted Habit feature is input in trained Random Forest model, and prediction is the classification results of community owner or non-community owner;It will Foundation of the result of classification as adjustment User reliability, changes the current credibility of user;
Community server receives the new access request of user, and community server is pushed away according to user's current credibility to user Send the enjoyable service content of user corresponding to current credibility.
Further, the User reliability refers to that community server thinks that active user is the credible journey of community owner Degree;Initial trusted degree is setting value.
Further, the basic information, comprising: property information query, existing community news information, existing community Neighbouring Business Information or local second-hand article trading information.
Further, the various dimensions interaction feature, comprising: the ground of mobile terminal when login time, log duration, login Reason position, the keyword of reading content, second-hand article trading number, active user make a speechs number, current use in community forum Number of the family in community server concern good friend.
Further, the user behavior habit feature includes: the daily login frequency of user;User logs in flat daily Equal duration;Change number in geographical location locating for mobile terminal in user one month when login service device;User's reading content All keywords;Speech number of each week active user in community forum;Average daily active user is in community server Pay close attention to number, the second-hand article trading number of user of good friend.
Further, described using the result of classification as the foundation of adjustment User reliability, change the current credible of user The specific steps of degree are as follows:
If it is community owner, then the confidence value current to user carries out plus 1, if being non-community owner, to The current confidence value in family subtracts 1.
Further, community server presets the one-to-one correspondence of User reliability Yu the enjoyable service content of user Relationship.
Further, community server pushes use corresponding to current credibility to user according to user's current credibility The specific steps of the enjoyable service content in family are as follows:
If user's current credibility is less than lowest confidence threshold value, community server issues refusal to mobile terminal and mentions For the prompt of service;
If user's current credibility is more than or equal to lowest confidence threshold value, community server provides phase to mobile terminal The enjoyable service content of the user answered.
As a second aspect of the invention, a kind of community server is provided;
A kind of community server, comprising: what memory, processor and storage were run on a memory and on a processor Computer instruction when the computer instruction is run by processor, completes following steps:
Receive the registration request that mobile terminal is initiated;Verification result is fed back into mobile terminal, if the verification passes, then society Area's server and mobile terminal establish connection and mobile terminal is established after connection, send base to mobile terminal by IPv6 network This information and confidence value;
It is browsed and is recorded according to user, extract the various dimensions interaction feature of user;User is excavated from various dimensions interaction feature Behavioural habits feature;Random Forest model is established, is accustomed to using the user behavior of known community owner and known non-community owner Feature is trained Random Forest model, obtains trained Random Forest model;
According to the setting period, the user behavior habit feature of user to be predicted is excavated, by the user behavior of user to be predicted Habit feature is input in trained Random Forest model, and prediction is the classification results of community owner or non-community owner;It will Foundation of the result of classification as adjustment User reliability, changes the current credibility of user;
The new access request of user is received, community server is current credible to user's push according to user's current credibility The corresponding enjoyable service content of user of degree.
Compared with prior art, the beneficial effects of the present invention are:
(1) without using traditional verification method (house property information, proof etc. of living), user is only needed to use intelligence community Accurate authentication can be realized in application program.
(2) measure whether a user is cell owner using confidence level.User reliability is user by using wisdom What the interactive information generated when community application program was measured.
(3) confidence level includes the numerical value of multiple dimensions, can distinguish different types of owner very well.
(4) permission is read in the information setting of intelligence community, invisible to user with a low credibility, to realize community's money News protect the privacy of owner only to the visible method of owner.
Detailed description of the invention
The accompanying drawings constituting a part of this application is used to provide further understanding of the present application, and the application's shows Meaning property embodiment and its explanation are not constituted an undue limitation on the present application for explaining the application.
Fig. 1 is a kind of system framework figure of owner's auth method of intelligence community under IPv6 network environment;
Fig. 2 is work overview flow chart of the invention;
Fig. 3 is the schematic diagram of various dimensions identity confidence level of the present invention.
Specific embodiment
It is noted that following detailed description is all illustrative, it is intended to provide further instruction to the application.Unless another It indicates, all technical and scientific terms used herein has usual with the application person of an ordinary skill in the technical field The identical meanings of understanding.
It should be noted that term used herein above is merely to describe specific embodiment, and be not intended to restricted root According to the illustrative embodiments of the application.As used herein, unless the context clearly indicates otherwise, otherwise singular Also it is intended to include plural form, additionally, it should be understood that, when in the present specification using term "comprising" and/or " packet Include " when, indicate existing characteristics, step, operation, device, component and/or their combination.
IPv6 is the next-generation IP association for substituting current edition IP agreement (IPv4) of Internet Engineering Task group design View, it can be very good to solve the present of nowadays shortage of ip address, and more pacify in security fields compared to present IPv4 network Entirely, this has good protective effect for the information transmission security in intelligence community.
Based on the above status, for solve the problems, such as intelligence community authentication this, need a kind of without many and diverse operation of user The method that authentication can be realized, this method are able to satisfy following basic demand: (1) this method under user's line without verifying Or the sensitive informations such as house property information that oneself is uploaded on line, accurate authentication can be realized;(2) identity of user makes It is distinguished with confidence level, a possibility that i.e. representative is cell owner with a high credibility is high, and vice versa;(3) confidence level of user Can be adjusted according to user using the application of community server, user using in community server in application, generation Interactive information is more, and the accuracy of subscriber authentication is higher;(4) confidence level of user is not a numerical value, but one The array of various dimensions, is assessed by the numerical value to various dimensions, and a User reliability is finally calculated.
A kind of specific verification process of owner's auth method of intelligence community under IPv6 network environment are as follows:
1) user carries out user's registration using the IPv6 network of cell phone client access community.It only needs to carry out when registration The verifying of elemental user information filled in system of real name cell-phone number.
2) after the completion of user's registration, the confidence level of user is minimum, when passing through cell phone client login community server at this time, It can only see basic information visible to total user and basic service.
3) the secure encrypted transmission agreement that community server is provided by IPv6 network provides service property information to user The services such as inquiry, local information, pass-along deal, while recording the various dimensions intersection record of user's access platform, such as time dimension Spend (login time, online hours), interest dimension (reading information type), location dimension (geographical location when login) etc..
4) by the interbehavior between the user being collected into and community server, being extracted by data mining technology can be with table The characteristic for showing user behavior habit, regularly divides these characteristics using the disaggregated model in machine learning Class changes the confidence level of user using the result of classification as the foundation of adjustment User reliability.
In order to better understand the present invention, following present more detailed descriptions of the present invention:
Fig. 1 is a kind of system framework figure of owner's auth method of intelligence community under IPv6 network environment.User steps on Intelligence community application program in record cell phone client is attached with community server by IPv6 network.Community server point For service module and computing module.
Service module includes the application program for the various service classes that confidence level screening washer and community server provide.
Confidence level screening washer: if user's current credibility is less than believability threshold corresponding to new access request, society Area's server issues refusal to mobile terminal and provides the prompt of service;
If user's current credibility be more than or equal to new access request corresponding to believability threshold, community server to Mobile terminal provides corresponding information on services.
Computing module includes the extraction and analysis module of user behavior characteristics and the disaggregated model for authentication.
Service module provides user interactive data required for disaggregated model to computing module,
Computing module supports that service module is credible according to the user of feedback to the calculating that service module provides User reliability Degree, different information on services is pushed to the user of different confidence levels.
Fig. 2 is work overview flow chart of the invention, as shown in Figure 2.This method comprises:
Step 110, user logs in application program of mobile phone, carries out user's registration.
Step 111, a lower confidence level can be obtained after user's registration.Confidence level can use community service with user In device application and constantly update.
Step 112, it when user accesses intelligence community in application program of mobile phone, needs to send out to the server of community server It send interaction request, when sending interaction request, is accompanied with the access time of user, the geographical location where when access, user's can Reliability, the address of service to be requested of user.
Step 113, the confidence level and user that the confidence level screening module in community server can be current to user are intended to request The confidence level of service requires to be compared.
Step 114, if User reliability is lower than the confidence level of service request, community server can refuse the visit of user Ask request.
Step 115, if User reliability is higher than the confidence level of service request, community server can respond asking for user It asks, the service that user requests is presented to the cell phone client of user.
Step 116, community server will record user in the interbehavior data using viability, such as when access It is long, it is interacted with other users.
Step 117, interbehavior data are transferred in the computing module of community server, and computing module divides data The operations such as analysis, classification, and the confidence level result after calculating is fed back into service module, service module is updated according to feedback information to be used The confidence level at family.
Fig. 3 is the schematic diagram of various dimensions identity confidence level of the present invention;As shown in Figure 3.Multiple dimension packets of identity confidence level It includes:
Time dimension, geography information dimension, interest dimension, emotion dimension, social dimension and transaction dimension.
Time dimension contains login time of the user using community server when, using duration, uses frequency in the period Rate;Geography information dimension contains login place of the user using community server when;Interest dimension contains user and uses society The information of browsing, such as property class information, local news class, community's circle of friends etc. are liked when area's server.
All kinds of cell owners and non-cell owner can be distinguished substantially by these three dimensions, cell office worker owner's It is usually in cell that night, which logs in place, and logging in place daytime is usually that cell is outer and relatively fixed;The industry of cell liberal profession The main time logged in cell is not fixed relatively, and logs in place outside cell and be not fixed relatively;The login of non-community user Place is usually outside cell;Community user would generally pay close attention to property class information at the first time;Non- community user is usually indifferent to small Area's property class information.Emotion dimension contains user using emotion when community server when browsing content and in wisdom platform Deliver emotion when text;Social dimension contains Social behaviors of the user using intelligence community when, includes good friend's quantity, community The behaviors such as the interaction of content.Real user and Virtual User can be distinguished that (Virtual User refers to third by the two dimensions Side is the community users account for obtaining community information and Mass production, is usually controlled and is run by automated procedures, can be by regulation Simulation is logged in specified geographic location, to influence the judgement of disaggregated model, is construed as community user).Real user Emotion is relatively stable, and Social behaviors are normal, and so-called Social behaviors normally include that comment content is proper etc.;The usual feelings of Virtual User Sense variation fluctuation is big, and without normal Social behaviors.Transaction dimension includes the trading activity that user occurs in community server, example Such as cell pass-along deal, windward driving etc..The dimension influences the calculating of User reliability as added value.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.

Claims (8)

1. owner's auth method of intelligence community, characterized in that include:
Community server receives the registration request that mobile terminal is initiated;Verification result is fed back into mobile terminal, if verifying is logical It crosses, then community server and mobile terminal establish connection;Community server and mobile terminal are established after connection, community server Basic information and User reliability are sent to mobile terminal by IPv6 network;
Community server is browsed according to user and is recorded, and extracts the various dimensions interaction feature of user;It is dug from various dimensions interaction feature It digs user behavior and is accustomed to feature;Random Forest model is established, user's row of known community owner and known non-community owner are utilized To be accustomed to feature, Random Forest model is trained, trained Random Forest model is obtained;
According to the setting period, the user behavior habit feature of user to be predicted is excavated, the user behavior of user to be predicted is accustomed to Feature is input in trained Random Forest model, and prediction is the classification results of community owner or non-community owner;It will classification Result as adjustment User reliability foundation, change the current credibility of user;
Community server receives the new access request of user, and community server is worked as according to user's current credibility to user's push The enjoyable service content of user corresponding to preceding confidence level.
2. owner's auth method of intelligence community as described in claim 1, characterized in that
The basic information, comprising: property information query, existing community news information, the neighbouring Business Information in existing community Or local second-hand article trading information.
3. owner's auth method of intelligence community as described in claim 1, characterized in that
The various dimensions interaction feature, comprising: login time, log duration, the geographical location of mobile terminal when logging in, in reading The keyword of appearance, second-hand article trading number, active user make a speech number, active user in community server in community forum Pay close attention to the number of good friend.
4. owner's auth method of intelligence community as described in claim 1, characterized in that
The user behavior habit feature includes: the daily login frequency of user;The average duration that user logs in daily;User one Change number in geographical location locating for mobile terminal in a month when login service device;All keywords of user's reading content;Often Speech number of a week active user in community forum;Of the average daily active user in community server concern good friend Number, the second-hand article trading number of user.
5. owner's auth method of intelligence community as described in claim 1, characterized in that
It is described using the result of classification as adjustment User reliability foundation, change the specific steps of the current credibility of user Are as follows:
If it is community owner, then the confidence value current to user carries out adding 1, if being non-community owner, works as to user Preceding confidence value subtracts 1.
6. owner's auth method of intelligence community as described in claim 1, characterized in that
Community server presets the one-to-one relationship of User reliability Yu the enjoyable service content of user.
7. owner's auth method of intelligence community as described in claim 1, characterized in that
Community server pushes the enjoyable service of user corresponding to current credibility according to user's current credibility, to user The specific steps of content are as follows:
If user's current credibility is less than lowest confidence threshold value, community server issues refusal to mobile terminal and provides clothes The prompt of business;
If user's current credibility is more than or equal to lowest confidence threshold value, community server provides corresponding to mobile terminal The enjoyable service content of user.
8. a kind of community server, characterized in that include: memory, processor and storage on a memory and in processor The computer instruction of upper operation when the computer instruction is run by processor, completes following steps:
Receive the registration request that mobile terminal is initiated;Verification result is fed back into mobile terminal, if the verification passes, then community takes Business device and mobile terminal establish connection and mobile terminal is established after connection, send basic money to mobile terminal by IPv6 network News and confidence value;
It is browsed and is recorded according to user, extract the various dimensions interaction feature of user;User behavior is excavated from various dimensions interaction feature It is accustomed to feature;Random Forest model is established, is accustomed to feature using the user behavior of known community owner and known non-community owner, Random Forest model is trained, trained Random Forest model is obtained;
According to the setting period, the user behavior habit feature of user to be predicted is excavated, the user behavior of user to be predicted is accustomed to Feature is input in trained Random Forest model, and prediction is the classification results of community owner or non-community owner;It will classification Result as adjustment User reliability foundation, change the current credibility of user;
The new access request of user is received, community server pushes current credibility institute according to user's current credibility, to user The corresponding enjoyable service content of user.
CN201810947822.9A 2018-08-20 2018-08-20 Owner identity verification method of smart community and community server Active CN109190342B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810947822.9A CN109190342B (en) 2018-08-20 2018-08-20 Owner identity verification method of smart community and community server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810947822.9A CN109190342B (en) 2018-08-20 2018-08-20 Owner identity verification method of smart community and community server

Publications (2)

Publication Number Publication Date
CN109190342A true CN109190342A (en) 2019-01-11
CN109190342B CN109190342B (en) 2020-10-23

Family

ID=64918956

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810947822.9A Active CN109190342B (en) 2018-08-20 2018-08-20 Owner identity verification method of smart community and community server

Country Status (1)

Country Link
CN (1) CN109190342B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112653878A (en) * 2020-12-19 2021-04-13 李燕玲 Smart community monitoring method based on big data technology

Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1805449A (en) * 2006-01-13 2006-07-19 南京邮电大学 Trusted model based dynamic role access control method
US20120079576A1 (en) * 2009-09-29 2012-03-29 Zhu Han Authentication Method and Apparatus
CN102681979A (en) * 2012-05-15 2012-09-19 北京师范大学 Content editing intelligent verifying method facing to open knowledge community
CN103678965A (en) * 2012-09-14 2014-03-26 百度在线网络技术(北京)有限公司 Method and device for protecting safety of mobile equipment
CN103944722A (en) * 2014-04-17 2014-07-23 华北科技学院 Identification method for user trusted behaviors under internet environment
CN104202339A (en) * 2014-09-24 2014-12-10 广西大学 User behavior based cross-cloud authentication service method
CN104426884A (en) * 2013-09-03 2015-03-18 深圳市腾讯计算机系统有限公司 Method for authenticating identity and device for authenticating identity
CN105007282A (en) * 2015-08-10 2015-10-28 济南大学 Malicious software network behavior detection method specific to network service provider and system thereof
CN204833358U (en) * 2015-08-21 2015-12-02 华讯信息化科技股份有限公司 System of wisdom community
CN105590055A (en) * 2014-10-23 2016-05-18 阿里巴巴集团控股有限公司 Method and apparatus for identifying trustworthy user behavior in network interaction system
CN105721467A (en) * 2016-02-16 2016-06-29 上海交通大学 Social network Sybil group detection method
CN105913342A (en) * 2016-04-08 2016-08-31 上海旭薇物联网科技有限公司 Smart community system based on big data mining algorithm
CN106022030A (en) * 2016-06-30 2016-10-12 深圳卡通新技术有限公司 Identity authentication system and method based on user habit behavior features
CN106453630A (en) * 2016-11-16 2017-02-22 四川省亚丁胡杨人力资源集团有限公司 Service network platform of intelligent community
CN106815257A (en) * 2015-12-01 2017-06-09 阿里巴巴集团控股有限公司 The computational methods and device of a kind of User reliability
CN107169063A (en) * 2017-05-03 2017-09-15 西安交通大学 A kind of user property Forecasting Methodology and system based on social information
CN107203602A (en) * 2017-05-15 2017-09-26 竹间智能科技(上海)有限公司 User model belief updating method and device based on chat memory
CN107612922A (en) * 2017-09-30 2018-01-19 北京梆梆安全科技有限公司 User ID authentication method and device based on user operation habits and geographical position
WO2018099276A1 (en) * 2016-11-30 2018-06-07 阿里巴巴集团控股有限公司 Identity authentication method and apparatus, and computing device
CN108280749A (en) * 2018-02-13 2018-07-13 口口相传(北京)网络技术有限公司 The methods of exhibiting and device of service function entrance
CN108399564A (en) * 2017-02-08 2018-08-14 腾讯科技(深圳)有限公司 Credit-graded approach and device

Patent Citations (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1805449A (en) * 2006-01-13 2006-07-19 南京邮电大学 Trusted model based dynamic role access control method
US20120079576A1 (en) * 2009-09-29 2012-03-29 Zhu Han Authentication Method and Apparatus
CN102681979A (en) * 2012-05-15 2012-09-19 北京师范大学 Content editing intelligent verifying method facing to open knowledge community
CN103678965A (en) * 2012-09-14 2014-03-26 百度在线网络技术(北京)有限公司 Method and device for protecting safety of mobile equipment
CN104426884A (en) * 2013-09-03 2015-03-18 深圳市腾讯计算机系统有限公司 Method for authenticating identity and device for authenticating identity
CN103944722A (en) * 2014-04-17 2014-07-23 华北科技学院 Identification method for user trusted behaviors under internet environment
CN104202339A (en) * 2014-09-24 2014-12-10 广西大学 User behavior based cross-cloud authentication service method
CN105590055A (en) * 2014-10-23 2016-05-18 阿里巴巴集团控股有限公司 Method and apparatus for identifying trustworthy user behavior in network interaction system
CN105007282A (en) * 2015-08-10 2015-10-28 济南大学 Malicious software network behavior detection method specific to network service provider and system thereof
CN204833358U (en) * 2015-08-21 2015-12-02 华讯信息化科技股份有限公司 System of wisdom community
CN106815257A (en) * 2015-12-01 2017-06-09 阿里巴巴集团控股有限公司 The computational methods and device of a kind of User reliability
CN105721467A (en) * 2016-02-16 2016-06-29 上海交通大学 Social network Sybil group detection method
CN105913342A (en) * 2016-04-08 2016-08-31 上海旭薇物联网科技有限公司 Smart community system based on big data mining algorithm
CN106022030A (en) * 2016-06-30 2016-10-12 深圳卡通新技术有限公司 Identity authentication system and method based on user habit behavior features
CN106453630A (en) * 2016-11-16 2017-02-22 四川省亚丁胡杨人力资源集团有限公司 Service network platform of intelligent community
WO2018099276A1 (en) * 2016-11-30 2018-06-07 阿里巴巴集团控股有限公司 Identity authentication method and apparatus, and computing device
CN108399564A (en) * 2017-02-08 2018-08-14 腾讯科技(深圳)有限公司 Credit-graded approach and device
CN107169063A (en) * 2017-05-03 2017-09-15 西安交通大学 A kind of user property Forecasting Methodology and system based on social information
CN107203602A (en) * 2017-05-15 2017-09-26 竹间智能科技(上海)有限公司 User model belief updating method and device based on chat memory
CN107612922A (en) * 2017-09-30 2018-01-19 北京梆梆安全科技有限公司 User ID authentication method and device based on user operation habits and geographical position
CN108280749A (en) * 2018-02-13 2018-07-13 口口相传(北京)网络技术有限公司 The methods of exhibiting and device of service function entrance

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张磊,陈贞翔等: ""社交网络用户的人格分析与预测"", 《计算机学报》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112653878A (en) * 2020-12-19 2021-04-13 李燕玲 Smart community monitoring method based on big data technology
CN112653878B (en) * 2020-12-19 2021-10-12 安徽中电光达通信技术有限公司 Smart community monitoring method based on big data technology

Also Published As

Publication number Publication date
CN109190342B (en) 2020-10-23

Similar Documents

Publication Publication Date Title
US10129211B2 (en) Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms
CA2808720C (en) Dynamic place visibility in geo-social networking system
CN103119565B (en) Utilize distributed demographics information to determine the method and apparatus of impression
US10091324B2 (en) Content feed for facilitating topic discovery in social networking environments
CN102741839B (en) Based on the url filtering of user browser history
Chen et al. Analyzing privacy designs of mobile social networking applications
US20170011113A1 (en) System and Method for Identifying Users on a Network
US20220327174A1 (en) Collecting and providing customized user generated contentacross networks based on domain
US20140279045A1 (en) Cross-domain id synchronization in online advertisement
CN109687991A (en) User behavior recognition method, apparatus, equipment and storage medium
US20120096002A1 (en) Systems and methods for generating and managing a universal social graph database
CN107548547A (en) The method for identifying the unauthorized access of the account of online service
JP2008545298A (en) Building customer relationships using network access points
CN104054055A (en) Identifying and tracking user activity when using networked devices based on associations between identifiers for physical devices or software applications
CN104798041A (en) Improving user engagement in a social network using indications of acknowledgement
KR101713221B1 (en) Method for providing contents of real estate
Sar et al. Contextual integrity’s decision heuristic and the tracking by social network sites
Neufeld Cross-device and cross-channel identity measurement issues and guidelines: How advertisers can maximize the impact of an identity-based brand campaign
CN103618639A (en) Method, device and system for monitoring media data
Chougale et al. Firebase-overview and usage
Carbunar et al. A survey of privacy vulnerabilities and defenses in geosocial networks
CN109190342A (en) The owner's auth method and community server of intelligence community
US20230074364A1 (en) Privacy-preserving virtual email system
CN105025115A (en) Method and device for generating dormitory IP (Internet Protocol) library
GB2602178A (en) Computer-implemented method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant