Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User operation risk coefficient determination method and device, storage medium and server

A technology of risk coefficient and determination method, applied in the fields of host monitoring, user abnormal operation identification, and security monitoring, it can solve the problems of incomplete user operation data collection, incomplete data collection, inability to accurately judge behavior and abnormal detection, etc. Accurate risk factor, reducing errors, and preventing falsified data

Pending Publication Date: 2019-06-25
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to overcome the above technical problems, especially the incomplete collection of user operation data, incomplete data collection, and the collection of single event data, resulting in the inability to accurately perform behavior judgment and abnormal detection, the following technical solutions are proposed:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User operation risk coefficient determination method and device, storage medium and server
  • User operation risk coefficient determination method and device, storage medium and server
  • User operation risk coefficient determination method and device, storage medium and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0044] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the existence of the stated features, integers, steps, and operations, but does not exclude the existence or addition of one or more other features, integers, steps, and operations.

[0045] Those skilled in the art can understand that, unless otherwise def...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of security monitoring, host monitoring and user abnormal operation identification, and provides a user operation risk coefficient determination method, which comprises the following steps: capturing a user operation performed by a user at a terminal and a related page; Determining a behavior event triggered by the user according to the user operation and the related page; And obtaining generation time and coordinates of the behavior event, and determining a risk coefficient of the behavior event according to the generation time and the coordinates.According to the invention, the collection is more comprehensive; Compared with the prior art, the method has the advantages that the calculation basic data is provided for the subsequent AI model through the complete user operation and related pages, so that the calculated risk coefficient is more accurate, and meanwhile, through the multi-dimensional user operation and related page collection,the event content is richer, so that the detection of abnormal operation can be more accurately carried out.

Description

technical field [0001] The invention relates to the technical fields of security monitoring, host monitoring, and user abnormal operation identification, and in particular to a method, device, storage medium, and server for determining a user operation risk coefficient. Background technique [0002] In many industries, user needs analysis is an important way to improve user experience and service quality. For the Internet industry, it is very important to analyze the user operation data of the website or terminal application (App in Android, IOS or other operating systems) provided by itself. Better access to user behavior data on web pages or applications can prevent users from maliciously attacking terminals through forged data, and at the same time can more comprehensively understand user needs and bring better services to users, thereby enhancing their own competitiveness . However, determining the security of user operations by collecting behavior traces still has the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/34
Inventor 黎立桂
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products