Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Behavior vector generation method and device, terminal and storage medium

A behavior and vector technology, applied in the field of devices, behavior vector generation methods, terminals and storage media, can solve the problems of leaking user privacy and poor security, and achieve the effect of avoiding user privacy, avoiding the impact of accuracy, and ensuring accuracy

Active Publication Date: 2018-11-06
TENCENT TECH (SHENZHEN) CO LTD
View PDF12 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The behavior identifier in the above behavior vector corresponds to the operation behavior of the end user in the application. According to the behavior identifier in the behavior vector, the operation behavior of the end user can be restored, so there is a risk of leaking user privacy and poor security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Behavior vector generation method and device, terminal and storage medium
  • Behavior vector generation method and device, terminal and storage medium
  • Behavior vector generation method and device, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] An application detection method is proposed in the related art. Model training is performed according to the behavior vector of the application and known detection results to obtain an application detection model. The application detection model can obtain the detection result of the application according to the behavior vector of any application. . However, during the implementation process, the server needs to collect the behavior vector ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a behavior vector generation method and device, a terminal and a storage medium, and belongs to the information security field. The method comprises the stepsthat an operation record is acquired, wherein the operation record comprises behavior identifiers of at least one operation behavior generated in a target application; according to multiple preset groups, the at least one behavior identifier in the operation record is replaced with other behavior identifiers belonging to the same group, wherein the operation behaviors corresponding to the behavior identifiers in the same group have the association relation; and behavior vectors are generated according to the behavior identifiers obtained after the at least one behavior identifier is replaced.The generated behavior vectors can describe the operation behaviors generated in the target application to obtain an accurate application detection model through training, the operation behaviors ofa terminal user cannot be restored according to the behavior identifiers in the behavior vectors, therefore, the condition that the user privacy is leaked is avoided, and the security is improved.

Description

technical field [0001] Embodiments of the present invention relate to the field of information security, and in particular to a behavior vector generation method, device, terminal and storage medium. Background technique [0002] With the rapid development of Internet technology and the popularity of various applications, many malicious applications appear on the Internet. These malicious applications will perform malicious operations during operation and affect the information security of users. Therefore, how to accurately detect malicious applications has become an urgent problem to be solved in the field of information security. At present, an application detection method is proposed, which can detect according to the behavior vector corresponding to the operation behavior occurred in the application, so as to determine whether the application is a malicious application. [0003] One or more terminals generate operation records during the running of the application, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/32G06F21/56G06K9/62
CPCG06F21/32G06F21/56G06F18/214
Inventor 雷经纬
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products