Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intelligent equipment machine learning safety monitoring system based on user behavior

A smart device and security monitoring technology, applied in computer security devices, transmission systems, instruments, etc., can solve the problems of not building a secure cloud platform, threats to users' life and property, and lack of protection for smart devices, so as to improve monitoring efficiency and success rate, high user behavior pattern correlation, and the effect of preventing extreme malicious operations

Inactive Publication Date: 2016-12-14
INST OF INFORMATION ENG CAS
View PDF5 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For the smart device protection method in the published patent (a smart home Internet of Things security protection method and system, CN201410465799.1), there is a lack of consideration for manufacturers who do not have the ability to build a secure cloud platform and communication protocol, and in the communication chain In the case of wiretapping and lack of security encryption capabilities on smart devices, how to realize the safe operation of smart devices of such manufacturers, and at the same time, lack of protection against extremely malicious behavior of smart devices, which poses a serious threat to users' lives and properties

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intelligent equipment machine learning safety monitoring system based on user behavior
  • Intelligent equipment machine learning safety monitoring system based on user behavior
  • Intelligent equipment machine learning safety monitoring system based on user behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Based on user behavior data, the present invention proposes a two-layer model machine learning system, realizes the separation of cloud model and device-side model, and ensures that when the communication between the cloud or the cloud and the smart device is maliciously attacked, the smart device can pass through its own The machine learning module prevents the execution of malicious instructions.

[0044] In order to make the objectives, advantages and technical solutions of the present invention more clear, the present invention will be further described in detail below through specific implementation and in conjunction with the accompanying drawings.

[0045] for figure 1 Describes the overall implementation framework of the program as a whole. In a nutshell, one is that when the user needs to use the mobile phone APP to send instructions to the cloud server (usually through Internet communication protocols such as WiFi), the cloud server will analyze them. The se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an intelligent equipment machine learning safety monitoring system based on a user behavior. The system is characterized by comprising a first-level machine learning model oriented to the third party intelligent equipment user behavior data and a second-level user behavior machine learning model of an intelligent equipment side based on a MPU memory protection mechanism; the first-level learning model performing data cleaning on two types of data on the basis of two types of data, namely, the data of the same intelligent equipment type and the behavior data of the same individual user, by means of the user behavior data of a third party cloud platform, determining the data and the correlation needed to use by the intelligent equipment, and determining a subject of the intelligent equipment user behavior according to the type of the intelligent equipment; the second-level user behavior machine learning model of the intelligent equipment side based on the MPU memory protection mechanism, the intelligent equipment side firstly using the memory protection mechanism of the MPU to divide safety protection regions on a safety monitoring model obtained in the first-level machine learning model, and finally enabling a monitoring system to effectively protect the security of the intelligent equipment and the user.

Description

technical field [0001] The invention belongs to the technical field of intelligent equipment security in information security, and in particular relates to a machine learning security monitoring system for intelligent equipment based on user behavior. Background technique [0002] With the vigorous development of the Internet of Things, the convenience of smart devices to people's lives has attracted strong attention from both industry and academia. The development of intelligent hardware has led to the intelligentization of a large number of traditional electronic products. In the past two years, a large number of intelligent hardware products have flooded into the market. At present, researchers have invested a huge amount of money and manpower in the architecture, communication protocol and specific implementation of smart devices, and the devices have involved every aspect of people's lives. Smart devices are the integration of the traditional electronics industry and t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04W4/00G06F21/12G06F21/56G06F21/57G06F21/60G06F21/62
CPCG06F21/123G06F21/126G06F21/566G06F21/577G06F21/604G06F21/6281H04L63/14H04L67/025
Inventor 李宇王雅哲王瑜梁超汪祖辉
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products