CN106534164B - Effective virtual identity depicting method based on cyberspace user identifier - Google Patents

Effective virtual identity depicting method based on cyberspace user identifier Download PDF

Info

Publication number
CN106534164B
CN106534164B CN201611101931.6A CN201611101931A CN106534164B CN 106534164 B CN106534164 B CN 106534164B CN 201611101931 A CN201611101931 A CN 201611101931A CN 106534164 B CN106534164 B CN 106534164B
Authority
CN
China
Prior art keywords
computer software
user
virtual
group
virtual account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611101931.6A
Other languages
Chinese (zh)
Other versions
CN106534164A (en
Inventor
彭如香
杨涛
李兰凤
何治乐
王永剑
凡友荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Third Research Institute of the Ministry of Public Security
Original Assignee
Third Research Institute of the Ministry of Public Security
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Third Research Institute of the Ministry of Public Security filed Critical Third Research Institute of the Ministry of Public Security
Priority to CN201611101931.6A priority Critical patent/CN106534164B/en
Publication of CN106534164A publication Critical patent/CN106534164A/en
Application granted granted Critical
Publication of CN106534164B publication Critical patent/CN106534164B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present invention relates to a kind of effective virtual identity depicting method based on cyberspace user identifier, network virtual account is extracted from the http post data of onrelevant first, and virtual account is associated using the uniqueness of ad network's user identifier, then by virtual account relating parser, the building of virtual identity portrait prototype is realized;Improved Jaccard similarity factor computational algorithm is finally used, the high prototype of similarity is merged, further perfect portrait model.Using effective virtual identity depicting method of the invention based on cyberspace user identifier, aim to overcome that the disadvantage for identifying the inaccuracy of user by IP in the prior art, it is proposed a kind of effective virtual identity depicting method, with the extensive scope of application and very big application value, it realizes the effective of cyberspace virtual identity to portray comprehensively, provides effective means for network security management work.

Description

Effective virtual identity depicting method based on cyberspace user identifier
Technical field
The present invention relates to cyberspace identity management methods, more particularly to effectively virtual identity portray field, in particular to A kind of effective virtual identity depicting method based on cyberspace user identifier.
Background technique
With Internet technology make rapid progress, various Internet applications are come into being, by internet carry out communication exchange, Commodity transaction etc. has become a part of people's life;The convenience and high efficiency of Internet application, so that people's lives Broadly it is dissolved into internet environment.It just can be used however, these applications are most of without real-name authentication, a people is permissible Multiple identical types or different types of virtual account are registered, this is unfavorable for the management of cyberspace safety.Currently, general utilize The IP address of client identifies user, is associated user's virtual identity, but the introducing of dynamic IP addressing, and this method is It is no longer valid.
Summary of the invention
In order to overcome above-described the problems of the prior art, a kind of overcome is set forth below and identifies user's by IP The shortcomings that inaccuracy, proposes a kind of effectively effective virtual identity depicting method based on cyberspace user identifier.
Effective virtual identity depicting method based on cyberspace user identifier, is mainly characterized by, the method The following steps are included:
(1) computer software intercepts and stores the full dose data of certain a period of time in certain local area network, and in the section In time aperiodically on different computers through test account logging in network, webpage is accessed;
(2) computer software described in extracts domain-name information, corresponding User ID mark in the full dose data The message information and cookie information of knowledge, and store the message information of the correspondence User ID mark;
(3) message information for the correspondence User ID mark that the computer software described in obtains it carries out lattice Formulaization processing;
(4) computer software described in extracts and handles the message containing virtual account number field mark in cookie, To obtain Message processing data, and the Message processing data are stored in the memory module;
(5) computer software described in is obtained according to cookie information to be merged associated group and stores;
(6) computer software described in obtains big diagram data according to the merging associated group;
(7) computer software described in calculates the similarity of user's virtual identity prototype acquired in it, completes empty Quasi- identity portrait.
Preferably, in the step (1) specifically:
The computer software intercepts the full dose data of a certain local area network a period of time, in a manner of redis The storage full dose data, and the computer software within this time by multiple and different test accounts not Regularly on a different computer logging in network, access webpage.
Preferably, the step (2) specifically:
The computer software extracts the domain-name information for including in the full dose data, corresponding User ID mark Message information and cookie information, and the message information of the correspondence User ID mark will be stored with UTF-8 format.
Preferably, the step (4) specifically:
The computer software extracts the message containing virtual account number field mark in cookie, and according to when Between, source IP, purpose domain name, purpose website, virtual account, ad network's type, the classification of ad network's value obtain corresponding message Data are handled, and corresponding data memory format conversion is carried out to the Message processing data, by the report after the conversion Text processing data are stored in the part MongoDB in the computer software.
Preferably, the step (5) specifically:
The computer software obtains initial association group according to ad network identical in different cookie account, And merge the initial association according to occurring different ad network's accounts in same time, same IP, identical cookie Group to obtain the merging associated group, and stores the merging associated group.
Preferably, the step (6) specifically:
(6.1) computer software described in obtains initial big diagram data according to the merging associated group;
(6.2) degree of association between the virtual account in the initial big diagram data is arranged the computer software described in It is 0.5;
It (6.3) whether include the same time in merging associated group described in the computer software judgement described in, same The identical virtual account of IP, if the identical virtual account comprising same time, same IP in the merging associated group, Then continue step (6.4);Otherwise, continue step (6.5);
(6.4) computer software described in by the same time, the identical virtual account of same IP the degree of association more New is 1, and the virtual account that the degree of association is 1 is formed different user groups, the computer software record The secondary user group updates and continues the step (6.5);
(6.5) whether the computer software described in includes that two and two or more are identical between judging different user groups Virtual account, if there is the then described computer software merge the tool there are two and more than two identical virtual accounts User group, and the user group after merging is updated to the big diagram data, and record the big diagram data described in this time more Newly;Otherwise continue the step (6.2) until the user group and big diagram data no longer update;
(6.6) computer software described in obtains the big diagram data.
Preferably, the step (7) specifically:
The computer software is calculated between the virtual account for including in same user group by Jaccard coefficient Similarity, wherein the variable inputted is the vector set of virtual account in the user group, and set corresponding threshold value, work as calculating When resulting similarity is greater than this threshold value, the virtual account with the similarity is merged, forms new prototype, and update and arrive In the user group.
More preferably, the value when threshold value tends towards stability for the average length of the user group, wherein described The average length of user group is user group number in the virtual account number for including and the big diagram data in the user group Ratio.
Effective virtual identity depicting method using this kind based on cyberspace user identifier, since it is with ad network User identifier is breach, string and out associated virtual identity, and then by the association analysis rule of setting, consolidation goes out identity category Property (virtual account), and updated by continuous iteration, improve identity characteristic and portray model, and pass through ad network's user identifier The virtual identity of onrelevant is bound into association virtual identity;And association binding is divided into ad network virtual Identity Association and is tied up Virtual identity association binding between fixed, ad network overcomes the disadvantage for identifying the inaccuracy of user by IP in the prior art, mentions A kind of effective virtual identity depicting method out completes the association cluster of virtual identity, realizes effective quarter of cyberspace identity It draws, provides effective means for network security management work.
Detailed description of the invention
Fig. 1 is the cyberspace identity of effective virtual identity depicting method of the invention based on cyberspace user identifier Correlation model.
Fig. 2 is that stream is bound in the association of the effective virtual identity depicting method of base of the invention based on cyberspace user identifier Cheng Tu.
Fig. 3 is the association analysis algorithm of effective virtual identity depicting method of the invention based on cyberspace user identifier Process.
Fig. 4 is the Message processing data of effective virtual identity depicting method of the invention based on cyberspace user identifier Form schematic diagram.
Specific embodiment
Technical solution in order to better illustrate the present invention, spy lift following specific embodiments to further illustrate.
Effective virtual identity depicting method based on cyberspace user identifier, is mainly characterized by, the method The following steps are included:
(1) computer software intercepts and stores the full dose data of certain a period of time in certain local area network, and in the section In time aperiodically on different computers through test account logging in network, webpage is accessed, specifically:
The computer software intercepts the full dose data of a certain local area network a period of time, in a manner of redis The storage full dose data, and the computer software within this time by multiple and different test accounts not Regularly on a different computer logging in network, access webpage;
(2) computer software described in extracts domain-name information, corresponding User ID mark in the full dose data The message information and cookie information of knowledge, and the message information of the correspondence User ID mark is stored, specifically:
The computer software extracts the domain-name information for including in the full dose data, corresponding User ID mark Message information and cookie information, and the message information of the correspondence User ID mark will be stored with UTF-8 format;
(3) message information for the correspondence User ID mark that the computer software described in obtains it carries out lattice Formulaization processing;
(4) computer software described in extracts and handles the message containing virtual account number field mark in cookie, To obtain Message processing data, and the Message processing data are stored in the memory module, specifically:
The computer software extracts the message containing virtual account number field mark in cookie, and according to when Between, source IP, purpose domain name, purpose website, virtual account, ad network's type, the classification of ad network's value obtain corresponding message Data are handled, and corresponding data memory format conversion is carried out to the Message processing data, by the report after the conversion Text processing data are stored in the part MongoDB in the computer software;
(5) computer software described in is obtained according to cookie information to be merged associated group and stores, specifically:
The computer software obtains initial association group according to ad network identical in different cookie account, And merge the initial association according to occurring different ad network's accounts in same time, same IP, identical cookie Group to obtain the merging associated group, and stores the merging associated group;
(6) computer software described in obtains big diagram data, specific steps according to the merging associated group are as follows:
(6.1) computer software described in obtains initial big diagram data according to the merging associated group;
(6.2) degree of association between the virtual account in the initial big diagram data is arranged the computer software described in It is 0.5;
It (6.3) whether include the same time in merging associated group described in the computer software judgement described in, same The identical virtual account of IP, if the identical virtual account comprising same time, same IP in the merging associated group, Then continue step (6.4);Otherwise, continue step (6.5);
(6.4) computer software described in by the same time, the identical virtual account of same IP the degree of association more New is 1, and the virtual account that the degree of association is 1 is formed different user groups, the computer software record The secondary user group updates and continues the step (6.5);
(6.5) whether the computer software described in includes that two and two or more are identical between judging different user groups Virtual account, if there is the then described computer software merge the tool there are two and more than two identical virtual accounts User group, and the user group after merging is updated to the big diagram data, and record the big diagram data described in this time more Newly;Otherwise continue the step (6.2) until the user group and big diagram data no longer update;
(6.6) computer software described in obtains the big diagram data;
(7) computer software described in calculates the similarity of user's virtual identity prototype acquired in it, completes empty Quasi- identity portrait, specifically:
The computer software is calculated between the virtual account for including in same user group by Jaccard coefficient Similarity, wherein the variable inputted is the vector set of virtual account in the user group, and set corresponding threshold value, work as calculating When resulting similarity is greater than this threshold value, the virtual account with the similarity is merged, forms new prototype, and update and arrive In the user group.
In a kind of more preferably embodiment, the threshold value in the step (7) is that the average length of the user group becomes Value in stablize when, wherein the average length of the user group be the virtual account number that includes in the user group with The ratio of user group number in the big diagram data.
In a specific embodiment, using ad network's user identifier as breach, string and out associated virtual identity, so Afterwards by the association analysis rule of setting, consolidation goes out identity attribute (virtual account), and is updated by continuous iteration, improves body Part Characterizations model.It is virtual that the virtual identity of onrelevant is bound association by ad network's user identifier by association binding Identity;Association binding is divided into ad network virtual identity association binding between virtual Identity Association binding, ad network.
Referring to Fig. 1, virtual Identity Association binding rule is virtual in different cookie informations in ad network Identity, if same ad network's user identifier in cookie information is identical, then it is assumed that these virtual identities are to be associated with virtual body Part, and referred to as initial association group.
On the basis of the virtual Identity Association binding in ad network is established in virtual identity binding between ad network, with for the moment Between in the cookie information that grabs in same IP address comprising different ad network's user identifiers, then can be by these ad networks The corresponding initial association group of user identifier merges, and is formed and merges associated group.
Next, being associated analysis by following rule:
The degree of association between virtual account in initial setting up associated group is denoted as 0.5;
The degree of association between virtual account that same time same IP is obtained in associated group is denoted as 1, all mutual passes The virtual account that connection degree is 1 forms different user groups.
In different user groups, there are the identical virtual accounts of two or more, are determined as same user group, and merge these Group.
Use above-mentioned rule to big diagram data into update repeatedly, until being unsatisfactory for condition.So far available user Group (degree of association between virtual account is 1) and remaining associated group (degree of association between virtual account is 0.5).User Different virtual identities can be identified as same portrait in each user group in group, to construct virtual identity portrait.
Finally, completing virtual identity portrait recombination by Jaccard similarity algorithm.
In a specific embodiment, it should be realized based on user identifier in computer software and cyberspace effectively empty Quasi- identity depicting method has following steps:
(1) the full dose data of a certain local area network a period of time are intercepted, and aperiodically in difference within this time With certain test account logging in network in system, webpage is accessed, test account can be used for the verifying to result.Test account Selection, is denoted as virtual account A, virtual account B, virtual account C, virtual account D etc.
(2) the full dose data being truncated to are stored in a manner of redis;
(3) extracted from data the message information comprising domain-name information as shown in Figure 4 and corresponding User ID mark and Cookie information, and with UTF-8 format stored messages.
(4) message of extraction is formatted processing, the format after handling is as shown in the table;
(5) message containing virtual account number field mark in cookie information is extracted.For these messages, according to the time, Source IP, purpose domain name, purpose website, virtual account, ad network's type, ad network's value obtain corresponding data, and carry out Corresponding data memory format conversion.
(6) referring to Fig. 2, by formatted data storage to MongoDB, building merges associated group, according to different Cookie is because there is identical ad network's account to produce initial association group, because going out in the identical cookie of same time same IP Existing different ad network's account can merge initial association group, constitute and merge associated group, and store to it;
(7) merge the big figure of associated group building referring to Fig. 3, extracting, and big figure is carried out perfect, be arranged virtual in associated group The degree of association between account is 0.5;The degree of association between virtual account that time same in associated group same IP is obtained is more New is 1, and the virtual account that the mutual degree of association is 1 forms different user groups, if 0.5 using the virtual account as single Only virtual account is back in big diagram data;In different user groups, if there are two and more than two identical virtual account and Value then merges user group, while result being updated into big diagram data;This process is iterated, until scheming greatly Until data no longer change substantially, and result is saved, each record is a prototype of user's portrait.
(8) for the user's virtual identity user group generated, calculating similarity is carried out using Jaccard coefficient, wherein defeated The variable entered is the vector set of virtual account, and sets corresponding threshold value, when similarity is greater than this threshold value, by two use Family group merges, and forms new user group;The value of threshold value can use value when user group average length tends towards stability herein, Wherein user group average length is the ratio of virtual the account sum and user group number in all user groups, when threshold value is 0.5, User group average length is 9.13, has been tended towards stability;User group average length is formed by all user groups when tending towards stability, i.e., For independent irredundant user group, virtual identity portrait is completed.
Effective virtual identity depicting method using this kind based on cyberspace user identifier, since it is with ad network User identifier is breach, string and out associated virtual identity, and then by the association analysis rule of setting, consolidation goes out identity category Property (virtual account), and updated by continuous iteration, improve identity characteristic and portray model, and pass through ad network's user identifier The virtual identity of onrelevant is bound into association virtual identity;And association binding is divided into ad network virtual Identity Association and is tied up Virtual identity association binding between fixed, ad network overcomes the disadvantage for identifying the inaccuracy of user by IP in the prior art, mentions A kind of effective virtual identity depicting method out completes the association cluster of virtual identity, realizes effective quarter of cyberspace identity It draws, provides effective means for network security management work.
In this description, the present invention is described with reference to its specific embodiment.But it is clear that can still make Various modifications and alterations are without departing from the spirit and scope of the invention.Therefore, the description and the appended drawings should be considered as illustrative And not restrictive.

Claims (6)

1. a kind of effective virtual identity depicting method based on cyberspace user identifier, which is characterized in that the method packet Include following steps:
(1) computer software intercepts and stores the full dose data of certain a period of time in certain local area network, and in this time Inside aperiodically on different computers through test account logging in network, webpage is accessed;
(2) computer software described in extracts domain-name information in the full dose data, corresponding User ID identifies Message information and cookie information, and store the message information of the correspondence User ID mark;
(3) message information for the correspondence User ID mark that the computer software described in obtains it is formatted Processing;
(4) computer software described in extracts and handles the message containing virtual account number field mark in cookie, to obtain Message processing data are taken, and the Message processing data are stored in memory module, specifically:
The computer software extracts the message containing virtual account number field mark in cookie, and according to time, source IP, purpose domain name, purpose website, virtual account, ad network's type, the classification of ad network's value obtain corresponding Message processing number According to, and corresponding data memory format conversion is carried out to the Message processing data, by the Message processing after the conversion Data are stored in the part MongoDB in the computer software;
(5) computer software described in is obtained according to cookie information to be merged associated group and stores, specifically:
The computer software obtains initial association group, and root according to ad network identical in different cookie account Merge the initial association group according to occurring different ad network's accounts in same time, same IP, identical cookie, with The merging associated group is obtained, and stores the merging associated group;
(6) computer software described in obtains big diagram data according to the merging associated group;
(7) computer software described in calculates the similarity of user's virtual identity prototype acquired in it, completes virtual body Part portrait.
2. effective virtual identity depicting method according to claim 1 based on cyberspace user identifier, feature exist In in the step (1) specifically:
The computer software intercepts the full dose data of a certain local area network a period of time, is stored in a manner of redis The full dose data, and the computer software is irregular by multiple and different test accounts within this time Logging in network on a different computer, access webpage.
3. effective virtual identity depicting method according to claim 1 based on cyberspace user identifier, feature exist In the step (2) specifically:
The computer software extracts the report of the domain-name information for including in the full dose data, corresponding User ID mark Literary information and cookie information, and will be with the message information of the UTF-8 format storage correspondence User ID mark.
4. effective virtual identity depicting method according to claim 1 based on cyberspace user identifier, feature exist In the step (6) specifically:
(6.1) computer software described in obtains initial big diagram data according to the merging associated group;
(6.2) computer software described in sets the degree of association between the virtual account in the initial big diagram data to 0.5;
It (6.3) whether include same time, same IP in merging associated group described in the computer software judgement described in Identical virtual account, if the identical virtual account comprising same time, same IP in the merging associated group, after Continuous step (6.4);Otherwise, continue step (6.5);
(6.4) degree of association of same time, the identical virtual account of same IP are updated to by the computer software described in 1, and the virtual account that the degree of association is 1 is formed into different user groups, the computer software records this time User group updates and continues the step (6.5);
(6.5) whether the computer software described in includes two and more than two identical void between judging different user groups Quasi- account, if there is the then described computer software merge the tool there are two and more than two identical virtual accounts use Family group, and the user group after merging is updated to the big diagram data, and record the update of this big diagram data;It is no Then continue the step (6.2) until the user group and big diagram data no longer update;
(6.6) computer software described in obtains the big diagram data.
5. effective virtual identity depicting method according to claim 1 based on cyberspace user identifier, feature exist In the step (7) specifically:
The computer software calculates the phase between the virtual account for including in same user group by Jaccard coefficient Like degree, wherein the variable inputted is the vector set of virtual account in the user group, and corresponding threshold value is set, obtained by calculating Similarity when being greater than this threshold value, will merge with the virtual account of the similarity, form new prototype, and update to described User group in.
6. effective virtual identity depicting method according to claim 5 based on cyberspace user identifier, feature exist In the threshold value is the value when average length of the user group tends towards stability, wherein the user group is averaged Length is the ratio of user group number in the virtual account number for including and the big diagram data in the user group.
CN201611101931.6A 2016-12-05 2016-12-05 Effective virtual identity depicting method based on cyberspace user identifier Active CN106534164B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611101931.6A CN106534164B (en) 2016-12-05 2016-12-05 Effective virtual identity depicting method based on cyberspace user identifier

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611101931.6A CN106534164B (en) 2016-12-05 2016-12-05 Effective virtual identity depicting method based on cyberspace user identifier

Publications (2)

Publication Number Publication Date
CN106534164A CN106534164A (en) 2017-03-22
CN106534164B true CN106534164B (en) 2019-09-03

Family

ID=58354823

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611101931.6A Active CN106534164B (en) 2016-12-05 2016-12-05 Effective virtual identity depicting method based on cyberspace user identifier

Country Status (1)

Country Link
CN (1) CN106534164B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107515915B (en) * 2017-08-18 2020-02-18 晶赞广告(上海)有限公司 User identification association method based on user behavior data
CN107404408B (en) * 2017-08-30 2020-05-22 北京邮电大学 Virtual identity association identification method and device
CN108876434B (en) * 2018-05-24 2022-08-16 北京五八信息技术有限公司 User portrait construction method and device, computing device and readable storage medium
CN109389501A (en) * 2018-09-29 2019-02-26 智器云南京信息科技有限公司 A kind of calculating equipment, computing system
CN109766383A (en) * 2019-01-08 2019-05-17 重庆市千将软件有限公司 Big data visualizes ticket analysis system
CN109905873B (en) * 2019-02-25 2021-08-31 国家计算机网络与信息安全管理中心 Network account correlation method based on characteristic identification information
CN111143627B (en) * 2019-12-27 2023-08-15 北京百度网讯科技有限公司 User identity data determination method, device, equipment and medium
CN111858560B (en) * 2020-07-24 2023-11-21 厦门至恒融兴信息技术有限公司 Financial data automatic testing and monitoring system based on data warehouse
CN113489622B (en) * 2021-06-30 2022-05-13 国家计算机网络与信息安全管理中心 Method, system, equipment and storage medium for extracting network equipment fingerprint

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102831114A (en) * 2011-06-14 2012-12-19 北京思博途信息技术有限公司 Method and device for realizing statistical analysis on user access condition of Internet
CN103368917A (en) * 2012-04-01 2013-10-23 阿里巴巴集团控股有限公司 Method and system for risk control of network virtual users
CN104199848A (en) * 2014-08-08 2014-12-10 亿赞普(北京)科技有限公司 Relevance method and device for user data under different domains
CN105447147A (en) * 2015-11-26 2016-03-30 晶赞广告(上海)有限公司 Data processing method and apparatus
CN105630918A (en) * 2015-12-22 2016-06-01 青岛海贝易通信息技术有限公司 Whole-network user tag fusion and user identification unifying method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100100445A1 (en) * 2007-10-05 2010-04-22 Admob, Inc. System and method for targeting the delivery of inventoried content over mobile networks to uniquely identified users

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102831114A (en) * 2011-06-14 2012-12-19 北京思博途信息技术有限公司 Method and device for realizing statistical analysis on user access condition of Internet
CN103368917A (en) * 2012-04-01 2013-10-23 阿里巴巴集团控股有限公司 Method and system for risk control of network virtual users
CN104199848A (en) * 2014-08-08 2014-12-10 亿赞普(北京)科技有限公司 Relevance method and device for user data under different domains
CN105447147A (en) * 2015-11-26 2016-03-30 晶赞广告(上海)有限公司 Data processing method and apparatus
CN105630918A (en) * 2015-12-22 2016-06-01 青岛海贝易通信息技术有限公司 Whole-network user tag fusion and user identification unifying method

Also Published As

Publication number Publication date
CN106534164A (en) 2017-03-22

Similar Documents

Publication Publication Date Title
CN106534164B (en) Effective virtual identity depicting method based on cyberspace user identifier
CN107193894B (en) Data processing method, individual identification method and related device
CN106060067B (en) Malice domain name detection method based on Passive DNS iteration cluster
US8955143B1 (en) Use of decoy data in a data store
CN106326438B (en) A kind of correlating method of personal information
CN107423632A (en) Customizable sensitive data desensitization method and system
CN107357790B (en) Abnormal message detection method, device and system
CN105491018B (en) A kind of network data security analysis method based on DPI technology
JP2014502753A (en) Web page information detection method and system
CN103036910B (en) A kind of user's web access Behavior-Based control method and device
CN103745014A (en) False and true mapping method and system of social network users
CN106528391A (en) Recording method of operating log by management platform on SSR
CN105530251A (en) Method and device for identifying phishing website
WO2023093638A1 (en) Abnormal data identification method and apparatus, and device and storage medium
CN105701224A (en) Security information customized service system based on big data
CN110119396B (en) Data management method and related product
CN108365949B (en) Client real-name system information management method, device and system
CN105069158B (en) Data digging method and system
CN109614521A (en) A kind of efficient secret protection subgraph inquiry processing method
CN105184559A (en) System and method for payment
CN112765169A (en) Data processing method, device, equipment and storage medium
CN107124410A (en) Network safety situation feature clustering method based on machine deep learning
CN106027554A (en) Hacker tool mining method, device and system
CN110851758A (en) Webpage visitor number statistical method and device
CN110618989A (en) Information processing method, information processing device and related product

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant