A method for identifying fingerprint similarity of plug-in operation

A fingerprint similarity and identification method technology, applied in the field of business security protection, can solve problems such as low accuracy, waste of labor costs, and low efficiency, and achieve the effects of high accuracy, improved security, and improved accuracy

Inactive Publication Date: 2019-02-22
CHENGDU GOLDTEL IND GROUP
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The identification process does not rely on human participation, avoiding the problems of low efficiency, low accuracy, and waste of labor costs caused by human participation, and has the self-learning ab...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for identifying fingerprint similarity of plug-in operation
  • A method for identifying fingerprint similarity of plug-in operation
  • A method for identifying fingerprint similarity of plug-in operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The technical solutions of the present invention will be clearly and completely described below in conjunction with the embodiments. Apparently, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0046] refer to Figure 1-11 , the present invention provides a technical solution: as figure 1 As shown, an identification method for plug-in operation fingerprint similarity includes the following steps:

[0047] S1: Collect access operation logs, reuse the existing technical foundation, use CRM, BOSS, BASS and other business system queries, process logs and 4A login logs as data sources, and extract business characteristic data of access behaviors from them;

[0048] S2: Construct the event fingerprint model of plug-in operat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for identifying fingerprint similarity of plug-in operation, By acquiring the CRM in its entirety, BOSS, login and operation log data of 4A and other services, A method for exploit a business vulnerability or management flaw through plug-in scripts, A method for automatically identifying a high-frequency operation of a business module in a CRM system by collectinga large number of access operation logs of users or salespersons, extracting the business characteristics of the access behavior, and constructing an event fingerprint model of the plug-in operation behavior by means of aggregation, statistics and the like; Comparing a real-time collected user operation fingerprint with the plug-in fingerprint model; When the real-time operation fingerprint is matched with the fingerprint sequence contained in the plug-in model, the plug-in abnormal operation is outputted and an alarm is given. Otherwise normal operation. The invention monitors the similarityof the external plug-in operation behavior through the accurate detection of the user operation behavior, so as to timely find out the illegal plug-in operation.

Description

technical field [0001] The invention relates to the technical field of business security protection, in particular to a method for identifying similarity of plug-in operation fingerprints. Background technique [0002] In current mobile CRM, BOSS and other systems, operations such as batch query of user information, detailed bill information, or business processing through plug-in scripts and programs are common. Such operations generally occur at night, with short time intervals and relatively high batch execution times. The risk of disclosure of sensitive user information and illegal business handling will reduce the security of business. At present, the method of discovering cheating operations is mainly through manual statistical analysis. At present, a complete cheating operation is found to roughly include the following stages: [0003] 1) Collection of business operation data: At this stage, the business processing and user information query logs of systems such as C...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06K9/00
CPCG06V40/1365
Inventor 陶磊彭光辉赵启卫黄丽洪
Owner CHENGDU GOLDTEL IND GROUP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products