-
公开(公告)号:US12205043B2
公开(公告)日:2025-01-21
申请号:US17208921
申请日:2021-03-22
Inventor: Shuangquan Yang , Yang Zhang , Chang Liu , Yi Xie
IPC: G06F16/901 , G06F16/906 , G06N5/022
Abstract: The present disclosure provides a method for generating a knowledge graph, a method for mining relation and an apparatus for generating a knowledge graph. The method for generating a knowledge graph includes: obtaining an initial knowledge graph, wherein the initial knowledge graph comprises a plurality of nodes having connection relationships; determining a plurality of target map elements meeting preset property information requirements from the initial knowledge graph, in which the target map elements comprise target nodes, or target edges; and merging the plurality of the target map elements to generate a knowledge graph.
-
公开(公告)号:US20210209112A1
公开(公告)日:2021-07-08
申请号:US17206697
申请日:2021-03-19
Inventor: Chang Liu , Shuangquan Yang , Yang Zhang , Yi Xie
IPC: G06F16/2455
Abstract: The present application discloses a text query method and apparatus, device and storage medium, and relates to the field of intelligent search technology. A specific implementation scheme includes: identifying intention information and feature information of a query text, where the intention information is used to indicate intention of the query text; according to the intention information, determining a query interface for querying the intention; and querying a query result matching the feature information in information corresponding to the intention through the query interface. The present application can improve query efficiency of text query.
-
公开(公告)号:US20210209162A1
公开(公告)日:2021-07-08
申请号:US17211219
申请日:2021-03-24
Inventor: Shuangquan Yang , Yang Zhang , Chang Liu , Yi Xie , Xueting Zhang , Kunpeng Ji , Canxiang Zheng
IPC: G06F16/901 , G06F16/909 , G06F16/904 , G06F16/906 , G06K9/62
Abstract: The disclosure discloses a method and an apparatus for processing identity information, an electronic device, and a storage medium, and relates to a field of data processing technologies. The detailed implementation includes: obtaining first association relationships between identities and entity objects from a plurality of information sources; establishing a relationship graph corresponding to each information source based on at least one first association relationship obtained from each information source; generating a virtual node associated with at least two entity objects in different relationship graphs based on a space-time distance between respective entity objects; and determining a second association relationship between identities involved in different relationship graphs based on the relationship graphs associated with the virtual node.
-
公开(公告)号:US20210160216A1
公开(公告)日:2021-05-27
申请号:US17165737
申请日:2021-02-02
Inventor: Chang Liu , Shaoyan Wang , Li Mi
IPC: H04L29/06
Abstract: An anti-cracking method and system for a cloud host, as well as a terminal device are provided according to the disclosure. The method includes: obtaining system logs of the cloud host; determining an IP which fails to log in the cloud host according to the system logs as a suspicious IP; tracking and determining the suspicious IP to be an attacker IP according to the number of times of consecutive login failure of the suspicious IP; and adding a first blocking rule to firewall settings of the cloud host; wherein the first blocking rule instructs to block a login operation of the attacker IP during a first preset blocking time. With the anti-cracking method for a cloud host of the disclosure, the brute-force cracking can be prevented proactively in a timely manner with only very few system resources occupied.
-
公开(公告)号:US10944718B2
公开(公告)日:2021-03-09
申请号:US16129778
申请日:2018-09-12
Inventor: Chang Liu , Shaoyan Wang , Li Mi
IPC: H04L29/06
Abstract: An anti-cracking method and system for a cloud host, as well as a terminal device are provided according to the disclosure. The method includes: obtaining system logs of the cloud host; determining an IP which fails to log in the cloud host according to the system logs as a suspicious IP; tracking and determining the suspicious IP to be an attacker IP according to the number of times of consecutive login failure of the suspicious IP; and adding a first blocking rule to firewall settings of the cloud host; wherein the first blocking rule instructs to block a login operation of the attacker IP during a first preset blocking time. With the anti-cracking method for a cloud host of the disclosure, the brute-force cracking can be prevented proactively in a timely manner with only very few system resources occupied.
-
公开(公告)号:US11470043B2
公开(公告)日:2022-10-11
申请号:US17165737
申请日:2021-02-02
Inventor: Chang Liu , Shaoyan Wang , Li Mi
IPC: H04L9/40
Abstract: An anti-cracking method and system for a cloud host, as well as a terminal device are provided according to the disclosure. The method includes: obtaining system logs of the cloud host; determining an IP which fails to log in the cloud host according to the system logs as a suspicious IP; tracking and determining the suspicious IP to be an attacker IP according to the number of times of consecutive login failure of the suspicious IP; and adding a first blocking rule to firewall settings of the cloud host; wherein the first blocking rule instructs to block a login operation of the attacker IP during a first preset blocking time. With the anti-cracking method for a cloud host of the disclosure, the brute-force cracking can be prevented proactively in a timely manner with only very few system resources occupied.
-
公开(公告)号:US20190182214A1
公开(公告)日:2019-06-13
申请号:US16129778
申请日:2018-09-12
Inventor: Chang Liu , Shaoyan Wang , Li Mi
IPC: H04L29/06
Abstract: An anti-cracking method and system for a cloud host, as well as a terminal device are provided according to the disclosure. The method includes: obtaining system logs of the cloud host; determining an IP which fails to log in the cloud host according to the system logs as a suspicious IP; tracking and determining the suspicious IP to be an attacker IP according to the number of times of consecutive login failure of the suspicious IP; and adding a first blocking rule to firewall settings of the cloud host; wherein the first blocking rule instructs to block a login operation of the attacker IP during a first preset blocking time. With the anti-cracking method for a cloud host of the disclosure, the brute-force cracking can be prevented proactively in a timely manner with only very few system resources occupied.
-
-
-
-
-
-