CN109190342A - The owner's auth method and community server of intelligence community - Google Patents
The owner's auth method and community server of intelligence community Download PDFInfo
- Publication number
- CN109190342A CN109190342A CN201810947822.9A CN201810947822A CN109190342A CN 109190342 A CN109190342 A CN 109190342A CN 201810947822 A CN201810947822 A CN 201810947822A CN 109190342 A CN109190342 A CN 109190342A
- Authority
- CN
- China
- Prior art keywords
- user
- community
- owner
- feature
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/316—User authentication by observing the pattern of computer usage, e.g. typical user behaviour
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/45—Structures or tools for the administration of authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/26—Government or public services
- G06Q50/265—Personal security, identity or safety
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Tourism & Hospitality (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Medical Informatics (AREA)
- Economics (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Social Psychology (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses the owner's auth method and community server of intelligence community, community server sends basic information and User reliability to mobile terminal;Community server is browsed according to user and is recorded, and extracts the various dimensions interaction feature of user;It excavates user behavior and is accustomed to feature;Random Forest model is established, is accustomed to feature using the user behavior of known community owner and known non-community owner, Random Forest model is trained, trained Random Forest model is obtained;It is accustomed to feature according to the user behavior that the setting period excavates user to be predicted, the user behavior habit feature of user to be predicted is input in trained Random Forest model, prediction is the classification results of community owner or non-community owner;Using the result of classification as the foundation of adjustment User reliability, the current credibility of user is changed;Community server receives the new access request of user, and community server pushes the corresponding enjoyable service content of user according to user's current credibility, to user.
Description
Technical field
The present invention relates to intelligence community technical fields, more particularly to owner's auth method of intelligence community and community
Server.
Background technique
What nowadays intelligence community was developed is like a raging fire, and the service majority that community server provides is provided to cell owner
, and many information is related to certain owner's privacy, if non-owner is available to being possible to that the equity of owner can be damaged.
But nowadays intelligence community is applied other than the information such as verifying property ownership certificate, can not realize this Authentication Questions well.
How to avoid uploading the complex operations such as itself house property sensitive information on verifying or line under the line of user, it is how real
How quick, the Hard Authentication of existing cell owner identity, recommend owner for residential property accurate information and think without being destined to
One of the technical issues of colleague for stealing Intra-cell information is current intelligence community urgent need to resolve.
Summary of the invention
In order to solve the deficiencies in the prior art, the present invention provides owner's auth methods of intelligence community and community to take
Business device;
As the first aspect of the present invention, owner's auth method of intelligence community is provided;
Owner's auth method of intelligence community, comprising:
Community server receives the registration request that mobile terminal is initiated;Verification result is fed back into mobile terminal, if tested
Card passes through, then community server and mobile terminal establish connection;Community server and mobile terminal are established after connection, community's clothes
Business device sends basic information and User reliability to mobile terminal by IPv6 network;
Community server is browsed according to user and is recorded, and extracts the various dimensions interaction feature of user;From various dimensions interaction feature
Middle excavation user behavior is accustomed to feature;Random Forest model is established, the use of known community owner and known non-community owner are utilized
Family behavioural habits feature, is trained Random Forest model, obtains trained Random Forest model;
According to the setting period, the user behavior habit feature of user to be predicted is excavated, by the user behavior of user to be predicted
Habit feature is input in trained Random Forest model, and prediction is the classification results of community owner or non-community owner;It will
Foundation of the result of classification as adjustment User reliability, changes the current credibility of user;
Community server receives the new access request of user, and community server is pushed away according to user's current credibility to user
Send the enjoyable service content of user corresponding to current credibility.
Further, the User reliability refers to that community server thinks that active user is the credible journey of community owner
Degree;Initial trusted degree is setting value.
Further, the basic information, comprising: property information query, existing community news information, existing community
Neighbouring Business Information or local second-hand article trading information.
Further, the various dimensions interaction feature, comprising: the ground of mobile terminal when login time, log duration, login
Reason position, the keyword of reading content, second-hand article trading number, active user make a speechs number, current use in community forum
Number of the family in community server concern good friend.
Further, the user behavior habit feature includes: the daily login frequency of user;User logs in flat daily
Equal duration;Change number in geographical location locating for mobile terminal in user one month when login service device;User's reading content
All keywords;Speech number of each week active user in community forum;Average daily active user is in community server
Pay close attention to number, the second-hand article trading number of user of good friend.
Further, described using the result of classification as the foundation of adjustment User reliability, change the current credible of user
The specific steps of degree are as follows:
If it is community owner, then the confidence value current to user carries out plus 1, if being non-community owner, to
The current confidence value in family subtracts 1.
Further, community server presets the one-to-one correspondence of User reliability Yu the enjoyable service content of user
Relationship.
Further, community server pushes use corresponding to current credibility to user according to user's current credibility
The specific steps of the enjoyable service content in family are as follows:
If user's current credibility is less than lowest confidence threshold value, community server issues refusal to mobile terminal and mentions
For the prompt of service;
If user's current credibility is more than or equal to lowest confidence threshold value, community server provides phase to mobile terminal
The enjoyable service content of the user answered.
As a second aspect of the invention, a kind of community server is provided;
A kind of community server, comprising: what memory, processor and storage were run on a memory and on a processor
Computer instruction when the computer instruction is run by processor, completes following steps:
Receive the registration request that mobile terminal is initiated;Verification result is fed back into mobile terminal, if the verification passes, then society
Area's server and mobile terminal establish connection and mobile terminal is established after connection, send base to mobile terminal by IPv6 network
This information and confidence value;
It is browsed and is recorded according to user, extract the various dimensions interaction feature of user;User is excavated from various dimensions interaction feature
Behavioural habits feature;Random Forest model is established, is accustomed to using the user behavior of known community owner and known non-community owner
Feature is trained Random Forest model, obtains trained Random Forest model;
According to the setting period, the user behavior habit feature of user to be predicted is excavated, by the user behavior of user to be predicted
Habit feature is input in trained Random Forest model, and prediction is the classification results of community owner or non-community owner;It will
Foundation of the result of classification as adjustment User reliability, changes the current credibility of user;
The new access request of user is received, community server is current credible to user's push according to user's current credibility
The corresponding enjoyable service content of user of degree.
Compared with prior art, the beneficial effects of the present invention are:
(1) without using traditional verification method (house property information, proof etc. of living), user is only needed to use intelligence community
Accurate authentication can be realized in application program.
(2) measure whether a user is cell owner using confidence level.User reliability is user by using wisdom
What the interactive information generated when community application program was measured.
(3) confidence level includes the numerical value of multiple dimensions, can distinguish different types of owner very well.
(4) permission is read in the information setting of intelligence community, invisible to user with a low credibility, to realize community's money
News protect the privacy of owner only to the visible method of owner.
Detailed description of the invention
The accompanying drawings constituting a part of this application is used to provide further understanding of the present application, and the application's shows
Meaning property embodiment and its explanation are not constituted an undue limitation on the present application for explaining the application.
Fig. 1 is a kind of system framework figure of owner's auth method of intelligence community under IPv6 network environment;
Fig. 2 is work overview flow chart of the invention;
Fig. 3 is the schematic diagram of various dimensions identity confidence level of the present invention.
Specific embodiment
It is noted that following detailed description is all illustrative, it is intended to provide further instruction to the application.Unless another
It indicates, all technical and scientific terms used herein has usual with the application person of an ordinary skill in the technical field
The identical meanings of understanding.
It should be noted that term used herein above is merely to describe specific embodiment, and be not intended to restricted root
According to the illustrative embodiments of the application.As used herein, unless the context clearly indicates otherwise, otherwise singular
Also it is intended to include plural form, additionally, it should be understood that, when in the present specification using term "comprising" and/or " packet
Include " when, indicate existing characteristics, step, operation, device, component and/or their combination.
IPv6 is the next-generation IP association for substituting current edition IP agreement (IPv4) of Internet Engineering Task group design
View, it can be very good to solve the present of nowadays shortage of ip address, and more pacify in security fields compared to present IPv4 network
Entirely, this has good protective effect for the information transmission security in intelligence community.
Based on the above status, for solve the problems, such as intelligence community authentication this, need a kind of without many and diverse operation of user
The method that authentication can be realized, this method are able to satisfy following basic demand: (1) this method under user's line without verifying
Or the sensitive informations such as house property information that oneself is uploaded on line, accurate authentication can be realized;(2) identity of user makes
It is distinguished with confidence level, a possibility that i.e. representative is cell owner with a high credibility is high, and vice versa;(3) confidence level of user
Can be adjusted according to user using the application of community server, user using in community server in application, generation
Interactive information is more, and the accuracy of subscriber authentication is higher;(4) confidence level of user is not a numerical value, but one
The array of various dimensions, is assessed by the numerical value to various dimensions, and a User reliability is finally calculated.
A kind of specific verification process of owner's auth method of intelligence community under IPv6 network environment are as follows:
1) user carries out user's registration using the IPv6 network of cell phone client access community.It only needs to carry out when registration
The verifying of elemental user information filled in system of real name cell-phone number.
2) after the completion of user's registration, the confidence level of user is minimum, when passing through cell phone client login community server at this time,
It can only see basic information visible to total user and basic service.
3) the secure encrypted transmission agreement that community server is provided by IPv6 network provides service property information to user
The services such as inquiry, local information, pass-along deal, while recording the various dimensions intersection record of user's access platform, such as time dimension
Spend (login time, online hours), interest dimension (reading information type), location dimension (geographical location when login) etc..
4) by the interbehavior between the user being collected into and community server, being extracted by data mining technology can be with table
The characteristic for showing user behavior habit, regularly divides these characteristics using the disaggregated model in machine learning
Class changes the confidence level of user using the result of classification as the foundation of adjustment User reliability.
In order to better understand the present invention, following present more detailed descriptions of the present invention:
Fig. 1 is a kind of system framework figure of owner's auth method of intelligence community under IPv6 network environment.User steps on
Intelligence community application program in record cell phone client is attached with community server by IPv6 network.Community server point
For service module and computing module.
Service module includes the application program for the various service classes that confidence level screening washer and community server provide.
Confidence level screening washer: if user's current credibility is less than believability threshold corresponding to new access request, society
Area's server issues refusal to mobile terminal and provides the prompt of service;
If user's current credibility be more than or equal to new access request corresponding to believability threshold, community server to
Mobile terminal provides corresponding information on services.
Computing module includes the extraction and analysis module of user behavior characteristics and the disaggregated model for authentication.
Service module provides user interactive data required for disaggregated model to computing module,
Computing module supports that service module is credible according to the user of feedback to the calculating that service module provides User reliability
Degree, different information on services is pushed to the user of different confidence levels.
Fig. 2 is work overview flow chart of the invention, as shown in Figure 2.This method comprises:
Step 110, user logs in application program of mobile phone, carries out user's registration.
Step 111, a lower confidence level can be obtained after user's registration.Confidence level can use community service with user
In device application and constantly update.
Step 112, it when user accesses intelligence community in application program of mobile phone, needs to send out to the server of community server
It send interaction request, when sending interaction request, is accompanied with the access time of user, the geographical location where when access, user's can
Reliability, the address of service to be requested of user.
Step 113, the confidence level and user that the confidence level screening module in community server can be current to user are intended to request
The confidence level of service requires to be compared.
Step 114, if User reliability is lower than the confidence level of service request, community server can refuse the visit of user
Ask request.
Step 115, if User reliability is higher than the confidence level of service request, community server can respond asking for user
It asks, the service that user requests is presented to the cell phone client of user.
Step 116, community server will record user in the interbehavior data using viability, such as when access
It is long, it is interacted with other users.
Step 117, interbehavior data are transferred in the computing module of community server, and computing module divides data
The operations such as analysis, classification, and the confidence level result after calculating is fed back into service module, service module is updated according to feedback information to be used
The confidence level at family.
Fig. 3 is the schematic diagram of various dimensions identity confidence level of the present invention;As shown in Figure 3.Multiple dimension packets of identity confidence level
It includes:
Time dimension, geography information dimension, interest dimension, emotion dimension, social dimension and transaction dimension.
Time dimension contains login time of the user using community server when, using duration, uses frequency in the period
Rate;Geography information dimension contains login place of the user using community server when;Interest dimension contains user and uses society
The information of browsing, such as property class information, local news class, community's circle of friends etc. are liked when area's server.
All kinds of cell owners and non-cell owner can be distinguished substantially by these three dimensions, cell office worker owner's
It is usually in cell that night, which logs in place, and logging in place daytime is usually that cell is outer and relatively fixed;The industry of cell liberal profession
The main time logged in cell is not fixed relatively, and logs in place outside cell and be not fixed relatively;The login of non-community user
Place is usually outside cell;Community user would generally pay close attention to property class information at the first time;Non- community user is usually indifferent to small
Area's property class information.Emotion dimension contains user using emotion when community server when browsing content and in wisdom platform
Deliver emotion when text;Social dimension contains Social behaviors of the user using intelligence community when, includes good friend's quantity, community
The behaviors such as the interaction of content.Real user and Virtual User can be distinguished that (Virtual User refers to third by the two dimensions
Side is the community users account for obtaining community information and Mass production, is usually controlled and is run by automated procedures, can be by regulation
Simulation is logged in specified geographic location, to influence the judgement of disaggregated model, is construed as community user).Real user
Emotion is relatively stable, and Social behaviors are normal, and so-called Social behaviors normally include that comment content is proper etc.;The usual feelings of Virtual User
Sense variation fluctuation is big, and without normal Social behaviors.Transaction dimension includes the trading activity that user occurs in community server, example
Such as cell pass-along deal, windward driving etc..The dimension influences the calculating of User reliability as added value.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field
For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair
Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.
Claims (8)
1. owner's auth method of intelligence community, characterized in that include:
Community server receives the registration request that mobile terminal is initiated;Verification result is fed back into mobile terminal, if verifying is logical
It crosses, then community server and mobile terminal establish connection;Community server and mobile terminal are established after connection, community server
Basic information and User reliability are sent to mobile terminal by IPv6 network;
Community server is browsed according to user and is recorded, and extracts the various dimensions interaction feature of user;It is dug from various dimensions interaction feature
It digs user behavior and is accustomed to feature;Random Forest model is established, user's row of known community owner and known non-community owner are utilized
To be accustomed to feature, Random Forest model is trained, trained Random Forest model is obtained;
According to the setting period, the user behavior habit feature of user to be predicted is excavated, the user behavior of user to be predicted is accustomed to
Feature is input in trained Random Forest model, and prediction is the classification results of community owner or non-community owner;It will classification
Result as adjustment User reliability foundation, change the current credibility of user;
Community server receives the new access request of user, and community server is worked as according to user's current credibility to user's push
The enjoyable service content of user corresponding to preceding confidence level.
2. owner's auth method of intelligence community as described in claim 1, characterized in that
The basic information, comprising: property information query, existing community news information, the neighbouring Business Information in existing community
Or local second-hand article trading information.
3. owner's auth method of intelligence community as described in claim 1, characterized in that
The various dimensions interaction feature, comprising: login time, log duration, the geographical location of mobile terminal when logging in, in reading
The keyword of appearance, second-hand article trading number, active user make a speech number, active user in community server in community forum
Pay close attention to the number of good friend.
4. owner's auth method of intelligence community as described in claim 1, characterized in that
The user behavior habit feature includes: the daily login frequency of user;The average duration that user logs in daily;User one
Change number in geographical location locating for mobile terminal in a month when login service device;All keywords of user's reading content;Often
Speech number of a week active user in community forum;Of the average daily active user in community server concern good friend
Number, the second-hand article trading number of user.
5. owner's auth method of intelligence community as described in claim 1, characterized in that
It is described using the result of classification as adjustment User reliability foundation, change the specific steps of the current credibility of user
Are as follows:
If it is community owner, then the confidence value current to user carries out adding 1, if being non-community owner, works as to user
Preceding confidence value subtracts 1.
6. owner's auth method of intelligence community as described in claim 1, characterized in that
Community server presets the one-to-one relationship of User reliability Yu the enjoyable service content of user.
7. owner's auth method of intelligence community as described in claim 1, characterized in that
Community server pushes the enjoyable service of user corresponding to current credibility according to user's current credibility, to user
The specific steps of content are as follows:
If user's current credibility is less than lowest confidence threshold value, community server issues refusal to mobile terminal and provides clothes
The prompt of business;
If user's current credibility is more than or equal to lowest confidence threshold value, community server provides corresponding to mobile terminal
The enjoyable service content of user.
8. a kind of community server, characterized in that include: memory, processor and storage on a memory and in processor
The computer instruction of upper operation when the computer instruction is run by processor, completes following steps:
Receive the registration request that mobile terminal is initiated;Verification result is fed back into mobile terminal, if the verification passes, then community takes
Business device and mobile terminal establish connection and mobile terminal is established after connection, send basic money to mobile terminal by IPv6 network
News and confidence value;
It is browsed and is recorded according to user, extract the various dimensions interaction feature of user;User behavior is excavated from various dimensions interaction feature
It is accustomed to feature;Random Forest model is established, is accustomed to feature using the user behavior of known community owner and known non-community owner,
Random Forest model is trained, trained Random Forest model is obtained;
According to the setting period, the user behavior habit feature of user to be predicted is excavated, the user behavior of user to be predicted is accustomed to
Feature is input in trained Random Forest model, and prediction is the classification results of community owner or non-community owner;It will classification
Result as adjustment User reliability foundation, change the current credibility of user;
The new access request of user is received, community server pushes current credibility institute according to user's current credibility, to user
The corresponding enjoyable service content of user.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810947822.9A CN109190342B (en) | 2018-08-20 | 2018-08-20 | Owner identity verification method of smart community and community server |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810947822.9A CN109190342B (en) | 2018-08-20 | 2018-08-20 | Owner identity verification method of smart community and community server |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109190342A true CN109190342A (en) | 2019-01-11 |
CN109190342B CN109190342B (en) | 2020-10-23 |
Family
ID=64918956
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810947822.9A Active CN109190342B (en) | 2018-08-20 | 2018-08-20 | Owner identity verification method of smart community and community server |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109190342B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112653878A (en) * | 2020-12-19 | 2021-04-13 | 李燕玲 | Smart community monitoring method based on big data technology |
Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1805449A (en) * | 2006-01-13 | 2006-07-19 | 南京邮电大学 | Trusted model based dynamic role access control method |
US20120079576A1 (en) * | 2009-09-29 | 2012-03-29 | Zhu Han | Authentication Method and Apparatus |
CN102681979A (en) * | 2012-05-15 | 2012-09-19 | 北京师范大学 | Content editing intelligent verifying method facing to open knowledge community |
CN103678965A (en) * | 2012-09-14 | 2014-03-26 | 百度在线网络技术(北京)有限公司 | Method and device for protecting safety of mobile equipment |
CN103944722A (en) * | 2014-04-17 | 2014-07-23 | 华北科技学院 | Identification method for user trusted behaviors under internet environment |
CN104202339A (en) * | 2014-09-24 | 2014-12-10 | 广西大学 | User behavior based cross-cloud authentication service method |
CN104426884A (en) * | 2013-09-03 | 2015-03-18 | 深圳市腾讯计算机系统有限公司 | Method for authenticating identity and device for authenticating identity |
CN105007282A (en) * | 2015-08-10 | 2015-10-28 | 济南大学 | Malicious software network behavior detection method specific to network service provider and system thereof |
CN204833358U (en) * | 2015-08-21 | 2015-12-02 | 华讯信息化科技股份有限公司 | System of wisdom community |
CN105590055A (en) * | 2014-10-23 | 2016-05-18 | 阿里巴巴集团控股有限公司 | Method and apparatus for identifying trustworthy user behavior in network interaction system |
CN105721467A (en) * | 2016-02-16 | 2016-06-29 | 上海交通大学 | Social network Sybil group detection method |
CN105913342A (en) * | 2016-04-08 | 2016-08-31 | 上海旭薇物联网科技有限公司 | Smart community system based on big data mining algorithm |
CN106022030A (en) * | 2016-06-30 | 2016-10-12 | 深圳卡通新技术有限公司 | Identity authentication system and method based on user habit behavior features |
CN106453630A (en) * | 2016-11-16 | 2017-02-22 | 四川省亚丁胡杨人力资源集团有限公司 | Service network platform of intelligent community |
CN106815257A (en) * | 2015-12-01 | 2017-06-09 | 阿里巴巴集团控股有限公司 | The computational methods and device of a kind of User reliability |
CN107169063A (en) * | 2017-05-03 | 2017-09-15 | 西安交通大学 | A kind of user property Forecasting Methodology and system based on social information |
CN107203602A (en) * | 2017-05-15 | 2017-09-26 | 竹间智能科技(上海)有限公司 | User model belief updating method and device based on chat memory |
CN107612922A (en) * | 2017-09-30 | 2018-01-19 | 北京梆梆安全科技有限公司 | User ID authentication method and device based on user operation habits and geographical position |
WO2018099276A1 (en) * | 2016-11-30 | 2018-06-07 | 阿里巴巴集团控股有限公司 | Identity authentication method and apparatus, and computing device |
CN108280749A (en) * | 2018-02-13 | 2018-07-13 | 口口相传(北京)网络技术有限公司 | The methods of exhibiting and device of service function entrance |
CN108399564A (en) * | 2017-02-08 | 2018-08-14 | 腾讯科技(深圳)有限公司 | Credit-graded approach and device |
-
2018
- 2018-08-20 CN CN201810947822.9A patent/CN109190342B/en active Active
Patent Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1805449A (en) * | 2006-01-13 | 2006-07-19 | 南京邮电大学 | Trusted model based dynamic role access control method |
US20120079576A1 (en) * | 2009-09-29 | 2012-03-29 | Zhu Han | Authentication Method and Apparatus |
CN102681979A (en) * | 2012-05-15 | 2012-09-19 | 北京师范大学 | Content editing intelligent verifying method facing to open knowledge community |
CN103678965A (en) * | 2012-09-14 | 2014-03-26 | 百度在线网络技术(北京)有限公司 | Method and device for protecting safety of mobile equipment |
CN104426884A (en) * | 2013-09-03 | 2015-03-18 | 深圳市腾讯计算机系统有限公司 | Method for authenticating identity and device for authenticating identity |
CN103944722A (en) * | 2014-04-17 | 2014-07-23 | 华北科技学院 | Identification method for user trusted behaviors under internet environment |
CN104202339A (en) * | 2014-09-24 | 2014-12-10 | 广西大学 | User behavior based cross-cloud authentication service method |
CN105590055A (en) * | 2014-10-23 | 2016-05-18 | 阿里巴巴集团控股有限公司 | Method and apparatus for identifying trustworthy user behavior in network interaction system |
CN105007282A (en) * | 2015-08-10 | 2015-10-28 | 济南大学 | Malicious software network behavior detection method specific to network service provider and system thereof |
CN204833358U (en) * | 2015-08-21 | 2015-12-02 | 华讯信息化科技股份有限公司 | System of wisdom community |
CN106815257A (en) * | 2015-12-01 | 2017-06-09 | 阿里巴巴集团控股有限公司 | The computational methods and device of a kind of User reliability |
CN105721467A (en) * | 2016-02-16 | 2016-06-29 | 上海交通大学 | Social network Sybil group detection method |
CN105913342A (en) * | 2016-04-08 | 2016-08-31 | 上海旭薇物联网科技有限公司 | Smart community system based on big data mining algorithm |
CN106022030A (en) * | 2016-06-30 | 2016-10-12 | 深圳卡通新技术有限公司 | Identity authentication system and method based on user habit behavior features |
CN106453630A (en) * | 2016-11-16 | 2017-02-22 | 四川省亚丁胡杨人力资源集团有限公司 | Service network platform of intelligent community |
WO2018099276A1 (en) * | 2016-11-30 | 2018-06-07 | 阿里巴巴集团控股有限公司 | Identity authentication method and apparatus, and computing device |
CN108399564A (en) * | 2017-02-08 | 2018-08-14 | 腾讯科技(深圳)有限公司 | Credit-graded approach and device |
CN107169063A (en) * | 2017-05-03 | 2017-09-15 | 西安交通大学 | A kind of user property Forecasting Methodology and system based on social information |
CN107203602A (en) * | 2017-05-15 | 2017-09-26 | 竹间智能科技(上海)有限公司 | User model belief updating method and device based on chat memory |
CN107612922A (en) * | 2017-09-30 | 2018-01-19 | 北京梆梆安全科技有限公司 | User ID authentication method and device based on user operation habits and geographical position |
CN108280749A (en) * | 2018-02-13 | 2018-07-13 | 口口相传(北京)网络技术有限公司 | The methods of exhibiting and device of service function entrance |
Non-Patent Citations (1)
Title |
---|
张磊,陈贞翔等: ""社交网络用户的人格分析与预测"", 《计算机学报》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112653878A (en) * | 2020-12-19 | 2021-04-13 | 李燕玲 | Smart community monitoring method based on big data technology |
CN112653878B (en) * | 2020-12-19 | 2021-10-12 | 安徽中电光达通信技术有限公司 | Smart community monitoring method based on big data technology |
Also Published As
Publication number | Publication date |
---|---|
CN109190342B (en) | 2020-10-23 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10129211B2 (en) | Methods and/or systems for an online and/or mobile privacy and/or security encryption technologies used in cloud computing with the combination of data mining and/or encryption of user's personal data and/or location data for marketing of internet posted promotions, social messaging or offers using multiple devices, browsers, operating systems, networks, fiber optic communications, multichannel platforms | |
CA2808720C (en) | Dynamic place visibility in geo-social networking system | |
CN103119565B (en) | Utilize distributed demographics information to determine the method and apparatus of impression | |
US10091324B2 (en) | Content feed for facilitating topic discovery in social networking environments | |
CN102741839B (en) | Based on the url filtering of user browser history | |
Chen et al. | Analyzing privacy designs of mobile social networking applications | |
US20170011113A1 (en) | System and Method for Identifying Users on a Network | |
US20220327174A1 (en) | Collecting and providing customized user generated contentacross networks based on domain | |
US20140279045A1 (en) | Cross-domain id synchronization in online advertisement | |
CN109687991A (en) | User behavior recognition method, apparatus, equipment and storage medium | |
US20120096002A1 (en) | Systems and methods for generating and managing a universal social graph database | |
CN107548547A (en) | The method for identifying the unauthorized access of the account of online service | |
JP2008545298A (en) | Building customer relationships using network access points | |
CN104054055A (en) | Identifying and tracking user activity when using networked devices based on associations between identifiers for physical devices or software applications | |
CN104798041A (en) | Improving user engagement in a social network using indications of acknowledgement | |
KR101713221B1 (en) | Method for providing contents of real estate | |
Sar et al. | Contextual integrity’s decision heuristic and the tracking by social network sites | |
Neufeld | Cross-device and cross-channel identity measurement issues and guidelines: How advertisers can maximize the impact of an identity-based brand campaign | |
CN103618639A (en) | Method, device and system for monitoring media data | |
Chougale et al. | Firebase-overview and usage | |
Carbunar et al. | A survey of privacy vulnerabilities and defenses in geosocial networks | |
CN109190342A (en) | The owner's auth method and community server of intelligence community | |
US20230074364A1 (en) | Privacy-preserving virtual email system | |
CN105025115A (en) | Method and device for generating dormitory IP (Internet Protocol) library | |
GB2602178A (en) | Computer-implemented method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |