Agent behavior safety monitoring method and device, computer equipment and storage medium

A security monitoring and computer program technology, applied in the field of agent behavior security monitoring, can solve the problems of high risk rate in the face-to-face process, and achieve the effect of monitoring and reducing the risk rate.

Pending Publication Date: 2019-06-04
PING AN TECH (SHENZHEN) CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the configuration file used to configure the phone control tool bar is stored in the terminal device used by the agent, and the agent may change the configuration file in violation of regulations. high risk rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Agent behavior safety monitoring method and device, computer equipment and storage medium
  • Agent behavior safety monitoring method and device, computer equipment and storage medium
  • Agent behavior safety monitoring method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] see figure 1 , in a kind of agent behavior security monitoring method of the present embodiment, comprise the following steps:

[0044] Step 01, when the time from the last scan reaches the preset scan time period, perform this scan on the system log generated in the client.

[0045] System logs are information that records hardware, software, and system problems in the system, and can also monitor events that occur in the system. Users can use it to check why the error occurred, or to find traces left by the attacker when it was attacked. During the process of using the client to handle business, the operations performed by the agent will generate system logs. Therefore, the monitoring of the agent phone can be realized by scanning the system log.

[0046] In this embodiment, in order to monitor the agent's phone, it is necessary to pre-set the target keyword and the scanning time period.

[0047] In this embodiment, the target keyword is the first character used t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a seat behavior safety monitoring method. The invention discloses a device, computer equipment and a storage medium and relates to the safety monitoring technology field. The method comprises steps that scanning is performed through a system log generated in the client; if it is scanned that the system log contains the target keyword, compilation information of a target agent logging in the client at present is further obtained, whether the target agent breaks the rule or not is judged according to the compilation information and the template keyword, and when the rule breaks the rule, a rule breaking notification carrying the number of the target agent is sent to an external monitoring platform. According to the method and the device, the operation of the seat can be recorded in the system log, and the seat cannot modify the system log, so that the host is monitored by periodically scanning the system log, whether the seat has illegal operation or not can be known, the illegal operation is monitored, and the risk rate in the face-to-face signing process is reduced.

Description

technical field [0001] The invention relates to the technical field of safety monitoring, in particular to a method, device, computer equipment and storage medium for safety monitoring of agent behavior. Background technique [0002] At present, in the face-to-face signing process of the auto finance loan industry, the agent uses the phone control to realize the online signing of the customer. According to the different job responsibilities, the agent position is divided into the preliminary review post and the review post. The authority of different posts is different. The regulations for the preliminary review post are not to hang up directly, but need to be transferred to the review post for the client. For the telephone controls used by the agents of different positions, the content of the tool bar configured for them is different, so as to ensure that the agents of different positions can operate the telephone controls within the scope of their authority. [0003] Howe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06G06Q40/02H04M3/22H04M3/523
Inventor 高凌云
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products