Unlock instant, AI-driven research and patent intelligence for your innovation.

Operation behavior detection method, server and system

A detection method and server technology, which is applied in the field of information processing, can solve problems such as instability of organizational personnel and crimes, and achieve the effect of improving information security and accuracy

Active Publication Date: 2020-09-11
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, when an employee resigns, he exports sensitive information such as names, contact information, avatars, job titles, and positions of all employees in the organization, and sells them to headhunters or advertisers externally, which brings instability to the organization's personnel and even causes crime

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Operation behavior detection method, server and system
  • Operation behavior detection method, server and system
  • Operation behavior detection method, server and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] An embodiment of the present invention provides a method for detecting operation behavior, such as figure 1 shown, including:

[0037] Step 101: Obtain user operation behavior information, wherein the operation behavior information includes at least one operation for at least one target object;

[0038] Step 102: Analyze at least one analysis dimension for at least one operation on at least one target object in the user's operation behavior information, and obtain an analysis result of at least one analysis dimension corresponding to the user;

[0039] Step 103: Based on the analysis result of at least one analysis dimension corresponding to the user, the detection result of the behavior level of the user is obtained.

[0040] First of all, it should be noted that this embodiment can be applied to the network side, specifically, it can be applied to a management device or a server.

[0041] The manner of obtaining the operation behavior information of the user may be:...

Embodiment 2

[0092] An embodiment of the present invention provides a method for detecting operation behavior, such as Figure 8 shown, including:

[0093] Step 801: Obtain the user's operation behavior information, wherein the operation behavior information includes at least one operation for at least one target object;

[0094] Step 802: Analyze at least one analysis dimension for at least one operation on at least one target object in the user's operation behavior information, and obtain an analysis result of at least one analysis dimension corresponding to the user;

[0095] Step 803: Prioritize the at least one analysis dimension to obtain analysis dimensions corresponding to N priorities, where N is an integer greater than or equal to two;

[0096] Step 804: According to at least one analysis result of at least one analysis dimension corresponding to the N priorities, a detection result for the user's behavior level is acquired.

[0097] First of all, it should be noted that this e...

Embodiment 3

[0121] Based on the solution provided in Embodiment 1 or Embodiment 2, this embodiment further explains whether to issue an alarm message after the detection result is obtained: according to the detection result for the user’s behavior level, determine whether to generate and output at least The prompt information of the user's behavior level.

[0122] Specifically, see Figure 12 , implement different warning measures according to the behavior level, for example: Suspicious level, use email to send an alarm to the security administrator. High-risk level, use text messages and phone calls to alert the security administrator. Normal level, it can be determined that no alarm will be issued. The means of warning include but are not limited to email, text message and phone call.

[0123] In this way, by collecting data, it is possible to detect in time the behavior of employees maliciously exporting sensitive information of the organizational structure and issue an alarm, so th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an operation behavior detection method and system, and a server. The method comprises the following steps: obtaining operation behavior information of a user, wherein the operation behavior information at least comprises at least one operation of at least one target object; performing analysis of at least one analysis dimension on the at least one operation of the at least one target object in the operation behavior information to obtain an analysis result of the at least one analysis dimension corresponding to the user; and based on the analysis result of the at least one analysis dimension corresponding to the user, obtaining a detection result of a behavior level of the user.

Description

technical field [0001] The invention relates to information detection technology in the field of information processing, in particular to an operation behavior detection method, server and system. Background technique [0002] At present, more and more organizations, such as enterprises and governments, use enterprise IM tools, which brings convenience, but also creates the risk of organizational structure information leakage. For example, when an employee resigns, he exports sensitive information such as names, contact information, avatars, job titles, and positions of all employees in the organization, and sells them to headhunters or advertisers externally, which brings instability to the organization's personnel and even causes crime. Contents of the invention [0003] In view of this, the main purpose of the embodiments of the present invention is to provide an operation behavior detection method, server and system, so as to at least solve the above-mentioned existin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/302
Inventor 贺啸苏楠陈江洪陈武方梁桢郭力
Owner TENCENT TECH (SHENZHEN) CO LTD