Operation behavior monitoring method, device, electronic equipment and storage medium

A behavioral and historical operation technology, applied in the server field, can solve problems such as the server's inability to identify the legitimacy of users, the illegal theft of account passwords, and server risk losses.

Active Publication Date: 2020-10-09
SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
View PDF3 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the information age, tens of millions of users log in to various services through account passwords at all times. However, due to the inherent openness and resource sharing of the network, the phenomenon of account passwords being illegally stolen occurs from time to time.
Especially when the account password of the network server or the host is leaked, the server protected by the static password can no longer identify the legitimacy of the user, which may cause huge risks and losses to the server owner and related enterprises and units

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation behavior monitoring method, device, electronic equipment and storage medium
  • Operation behavior monitoring method, device, electronic equipment and storage medium
  • Operation behavior monitoring method, device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0054] The embodiment of the present application discloses an operation behavior monitoring method, which realizes safety monitoring of user operation behavior in a server.

[0055] see figure 1 , a flow chart of an operation behavior monitoring method shown according to an exemplary embodiment, such as figure 1 shown, including:

[0056] S101: Obtain the target user's target historical operation behavior data, and perform data statistics on the target historical operation behavior data a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an operation behavior monitoring method, a device, electronic equipment and a computer readable storage medium. The method comprises the steps: obtaining target historical operation behavior data of a target user, and carrying out the data statistics of the target historical operation behavior data according to different dimensions, so as to build a multi-dimensional coordinate system; when a target operation behavior is received, determining a target data item corresponding to the target operation behavior in each dimension, and judging whether a labeling point corresponding to the target data item exists in the multi-dimensional coordinate system or not; if yes, increasing the density of the marking points by one; if not, determining a labeling point correspondingto the target data item in the multi-dimensional coordinate system, and setting the density of the labeling point to be 1; and calculating a gravity center position corresponding to each coordinate axis according to the densities of all the marking points on each coordinate axis, determining a target point based on all the gravity center positions so as to perform safety monitoring on the targetoperation behavior according to the position of the target point, and analyzing the safety credibility of the user behavior through a multi-dimensional coordinate positioning scheme.

Description

technical field [0001] The present application relates to the technical field of servers, and more specifically, to an operation behavior monitoring method and device, an electronic device, and a computer-readable storage medium. Background technique [0002] In the information age, tens of millions of users log in to various services through their accounts and passwords at all times. However, due to the inherent openness and resource sharing of the network, the phenomenon of illegal theft of accounts and passwords occurs from time to time. Especially when the account password of the network server or the host is leaked, the server protected by the static password can no longer identify the legitimacy of the user, which may cause huge risks and losses to the server owner and related enterprises and units. [0003] In the network payment scenario, the PrefixSpan association algorithm is used to mine the sequence of user behavior, save it in the feature database, and then perf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/554
Inventor 秦朝阳张东
Owner SUZHOU LANGCHAO INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products