ORDER CLUSTERING AND MALICIOUS INFORMATION COMBATING METHOD AND APPARATUS

Order information for an order representing an electronic transaction in the distributed order system for a product or a service is received by one or more processors over a network. A unique order ID and order content based on the received order information are generated. An order vector for the or...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
1. Verfasser: Li, Jiuxi
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Li, Jiuxi
description Order information for an order representing an electronic transaction in the distributed order system for a product or a service is received by one or more processors over a network. A unique order ID and order content based on the received order information are generated. An order vector for the order is created based on the order content. The order is added to an order cluster based on a similarity between the created order vector and a representative order vector corresponding to a representative order in the order cluster. The representative order vector corresponding to the representative order in the order cluster is analyzed to determine if the representative order is malicious. A determination is made as to whether the representative order is malicious. If the representative order is malicious, then malicious order processing is performed on the orders in the order cluster.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US2020134702A1</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US2020134702A1</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US2020134702A13</originalsourceid><addsrcrecordid>eNrjZPD0D3JxDVJw9gkNDnEN8vRzV3D0c1HwdfTxdPb0Dw1W8PRz8w_ydQzx9PdTcPb3dQKygGp8XUM8_F3ASh0DAhyDHENCg3kYWNMSc4pTeaE0N4Oym2uIs4duakF-fGpxQWJyal5qSXxosJGBkYGhsYm5gZGjoTFxqgD7Ky4i</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>ORDER CLUSTERING AND MALICIOUS INFORMATION COMBATING METHOD AND APPARATUS</title><source>esp@cenet</source><creator>Li, Jiuxi</creator><creatorcontrib>Li, Jiuxi</creatorcontrib><description>Order information for an order representing an electronic transaction in the distributed order system for a product or a service is received by one or more processors over a network. A unique order ID and order content based on the received order information are generated. An order vector for the order is created based on the order content. The order is added to an order cluster based on a similarity between the created order vector and a representative order vector corresponding to a representative order in the order cluster. The representative order vector corresponding to the representative order in the order cluster is analyzed to determine if the representative order is malicious. A determination is made as to whether the representative order is malicious. If the representative order is malicious, then malicious order processing is performed on the orders in the order cluster.</description><language>eng</language><subject>CALCULATING ; COMPUTING ; COUNTING ; DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; HANDLING RECORD CARRIERS ; PHYSICS ; PRESENTATION OF DATA ; RECOGNITION OF DATA ; RECORD CARRIERS ; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><creationdate>2020</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200430&amp;DB=EPODOC&amp;CC=US&amp;NR=2020134702A1$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,309,781,886,25569,76552</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20200430&amp;DB=EPODOC&amp;CC=US&amp;NR=2020134702A1$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Li, Jiuxi</creatorcontrib><title>ORDER CLUSTERING AND MALICIOUS INFORMATION COMBATING METHOD AND APPARATUS</title><description>Order information for an order representing an electronic transaction in the distributed order system for a product or a service is received by one or more processors over a network. A unique order ID and order content based on the received order information are generated. An order vector for the order is created based on the order content. The order is added to an order cluster based on a similarity between the created order vector and a representative order vector corresponding to a representative order in the order cluster. The representative order vector corresponding to the representative order in the order cluster is analyzed to determine if the representative order is malicious. A determination is made as to whether the representative order is malicious. If the representative order is malicious, then malicious order processing is performed on the orders in the order cluster.</description><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>HANDLING RECORD CARRIERS</subject><subject>PHYSICS</subject><subject>PRESENTATION OF DATA</subject><subject>RECOGNITION OF DATA</subject><subject>RECORD CARRIERS</subject><subject>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2020</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZPD0D3JxDVJw9gkNDnEN8vRzV3D0c1HwdfTxdPb0Dw1W8PRz8w_ydQzx9PdTcPb3dQKygGp8XUM8_F3ASh0DAhyDHENCg3kYWNMSc4pTeaE0N4Oym2uIs4duakF-fGpxQWJyal5qSXxosJGBkYGhsYm5gZGjoTFxqgD7Ky4i</recordid><startdate>20200430</startdate><enddate>20200430</enddate><creator>Li, Jiuxi</creator><scope>EVB</scope></search><sort><creationdate>20200430</creationdate><title>ORDER CLUSTERING AND MALICIOUS INFORMATION COMBATING METHOD AND APPARATUS</title><author>Li, Jiuxi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US2020134702A13</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2020</creationdate><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>HANDLING RECORD CARRIERS</topic><topic>PHYSICS</topic><topic>PRESENTATION OF DATA</topic><topic>RECOGNITION OF DATA</topic><topic>RECORD CARRIERS</topic><topic>SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><toplevel>online_resources</toplevel><creatorcontrib>Li, Jiuxi</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Li, Jiuxi</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>ORDER CLUSTERING AND MALICIOUS INFORMATION COMBATING METHOD AND APPARATUS</title><date>2020-04-30</date><risdate>2020</risdate><abstract>Order information for an order representing an electronic transaction in the distributed order system for a product or a service is received by one or more processors over a network. A unique order ID and order content based on the received order information are generated. An order vector for the order is created based on the order content. The order is added to an order cluster based on a similarity between the created order vector and a representative order vector corresponding to a representative order in the order cluster. The representative order vector corresponding to the representative order in the order cluster is analyzed to determine if the representative order is malicious. A determination is made as to whether the representative order is malicious. If the representative order is malicious, then malicious order processing is performed on the orders in the order cluster.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US2020134702A1
source esp@cenet
subjects CALCULATING
COMPUTING
COUNTING
DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FORADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORYOR FORECASTING PURPOSES
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
HANDLING RECORD CARRIERS
PHYSICS
PRESENTATION OF DATA
RECOGNITION OF DATA
RECORD CARRIERS
SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE,COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTINGPURPOSES, NOT OTHERWISE PROVIDED FOR
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
title ORDER CLUSTERING AND MALICIOUS INFORMATION COMBATING METHOD AND APPARATUS
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-15T20%3A56%3A49IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Li,%20Jiuxi&rft.date=2020-04-30&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS2020134702A1%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true