An operation behavior monitoring method, device, electronic device and storage medium

A behavioral and historical operation technology, applied in the server field, can solve problems such as the server's inability to identify the user's legitimacy, server risk loss, account password illegal theft, etc.

Active Publication Date: 2022-08-02
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the information age, tens of millions of users log in to various services through account passwords at all times. However, due to the inherent openness and resource sharing of the network, the phenomenon of account passwords being illegally stolen occurs from time to time.
Especially when the account password of the network server or the host is leaked, the server protected by the static password can no longer identify the legitimacy of the user, which may cause huge risks and losses to the server owner and related enterprises and units

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An operation behavior monitoring method, device, electronic device and storage medium
  • An operation behavior monitoring method, device, electronic device and storage medium
  • An operation behavior monitoring method, device, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative work fall within the protection scope of the present application.

[0054] The embodiment of the present application discloses an operation behavior monitoring method, which realizes the security monitoring of the user operation behavior in the server.

[0055] see figure 1 , a flowchart of a method for monitoring operation behavior according to an exemplary embodiment, such as figure 1 shown, including:

[0056] S101: Acquire the target historical operation behavior data of the target user, and perform data st...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application discloses an operation behavior monitoring method and device, an electronic device and a computer-readable storage medium. The method includes: acquiring target historical operation behavior data of a target user, and performing data analysis on the target historical operation behavior data according to different dimensions. Statistics in order to establish a multi-dimensional coordinate system; when receiving the target operation behavior, determine the target data item corresponding to the target operation behavior in each dimension, and determine whether there is a label point corresponding to the target data item in the multi-dimensional coordinate system; The density of the point is increased by one; if not, determine the label point corresponding to the target data item in the multi-dimensional coordinate system, and set the density of the label point to one; calculate each axis according to the density of all label points on each axis Corresponding center of gravity positions, target points are determined based on all the center of gravity positions, so as to safely monitor the target operation behavior according to the positions of the target points, and analyze the safety reliability of user behavior through a multi-dimensional coordinate positioning scheme.

Description

technical field [0001] The present application relates to the technical field of servers, and more particularly, to a method and apparatus for monitoring operation behavior, an electronic device, and a computer-readable storage medium. Background technique [0002] In the information age, tens of millions of users log in to various services through account passwords at every moment. However, due to the inherent openness and resource sharing of the network, the phenomenon of account passwords being illegally stolen frequently occurs. Especially when the account password of the network server or host is leaked, the server protected by the static password cannot identify the legitimacy of the user, which may cause huge risks and losses to the server owner and related enterprises and units. [0003] In the online payment scenario, the PrefixSpan association algorithm is used to perform sequence mining on user behavior, save it to the feature database, and then perform sequence m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55
CPCG06F21/554
Inventor 秦朝阳张东
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products