Software behavior monitor and verification system

A technology for verifying systems and behaviors, applied in transmission systems, payment systems, electrical components, etc., can solve problems such as the inability to guarantee the security of electronic network transactions and the difficulty of preventing diversity

Active Publication Date: 2014-04-09
TONGJI UNIV
View PDF4 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And because of the hiddenness, diversity and difficulty of preventing such vulnerabilities, the variability of user behavior, and the distributed and loosely coupled nature of the network platform, the combination of these three factors makes traditional security methods unable to guarantee the security of today's electronic network transactions. Safety

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software behavior monitor and verification system
  • Software behavior monitor and verification system
  • Software behavior monitor and verification system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The architecture of the entire software behavior monitoring and verification system is as follows: figure 1 shown.

[0022] The entire software behavior monitoring and verification system solidifies the behavior of real legitimate users to form a software behavior certificate. Then, mainly based on the unique order number in the world, the three-party interactive behavior sequence in the transaction process is compared with the software behavior certificate in real time, and one-step verification is performed. Once any party has illegal behaviors such as message disorder or fake identity, it will alarm or take certain measures. .

[0023] Three-party software behavior monitor: Install data packet monitors on e-commerce websites, third-party payment platforms, and user clients to monitor in real time the data packets transmitted between the three parties involved in a complete transaction, and perform data packet monitoring. The extraction and integration of the neces...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a software behavior monitor and verification system which is composed of a soft behavior certificate, three-party software behavior monitoring units and a software behavior real-time verification system. The soft behavior certificate is a three-party communication data packet according to a user, an e-commerce website and a third-party payment platform in the correct transaction process. The three-party software behavior monitoring units are data packet monitor units installed on the e-commerce website, the third-party payment platform and a user client side. The software behavior real-time verification system receives transaction interaction information data packets submitted by the three-party monitoring units respectively and extracts and integrates key sequences and information in the transaction interaction information data packets, a user behavior interaction sequence and a software behavior model are compared in real time according to a global unique order number, and once the out-of-order phenomenon, fake identities and other illegal behaviors occur, an alarm is given out, and the transaction is closed. Three-party interaction url and other key parameters are used, the legal and normal transaction interaction process of the three parties is described, and the soft behavior certificate is provided.

Description

technical field [0001] The invention relates to the technical field of e-commerce network transaction safety monitoring. Background technique [0002] With the development of the Internet, electronic commerce (E-Commerce) has gradually become a new mode of business activities for people, and has become an important business mode in international trade. It is based on computer technology, communication technology and network technology, and realizes the electronization, digitization and networking of the entire business activity by means of electronic data exchange, e-mail and electronic payment. With the emergence of electronic trading platforms, the entire sales, transaction and confirmation procedures have been replaced by online exchanges. From the first-generation bank transaction system Electronic Brokerage System (EBS), to a single transaction platform developed by the bank itself, to today's multi-subject transaction platform provided by a third party, and a market-d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38H04L29/06
CPCG06Q20/02G06Q20/38215G06Q20/3829G06Q20/405H04L63/1416H04L63/1425G06F21/6218G06Q20/40
Inventor 蒋昌俊陈闳中闫春钢丁志军于汪洋钟珺竹
Owner TONGJI UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products