User behavior analysis-based data theft risk assessment method and system
A technology of behavior analysis and risk assessment, applied in the field of data theft risk assessment based on user behavior analysis, can solve problems such as inability to avoid hidden dangers of unsafe operations and cumbersome procedures
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0063] The specific embodiments of the present invention will be described in further detail below in conjunction with the drawings and embodiments. The following examples are used to illustrate the present invention, but not to limit the scope of the present invention.
[0064] figure 1 Shows a schematic flow chart of a data theft risk assessment method based on user behavior analysis provided by an embodiment of the present invention, such as figure 1 A data theft risk assessment method based on user behavior analysis is shown, and the method includes the following steps:
[0065] S11. Obtain the operation behavior pair of the terminal user.
[0066] It is understandable that a terminal is a device used by an endpoint user to communicate with a host, and it can be a monitor, keyboard, or printer. The data theft risk assessment method based on network behavior is to mine the operation behavior of terminal users and analyze the terminals with potential security risks.
[0067] It i...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com