User operation risk coefficient determination method and device, storage medium and server

A technology of risk coefficient and determination method, applied in the fields of host monitoring, user abnormal operation identification, and security monitoring, it can solve the problems of incomplete user operation data collection, incomplete data collection, inability to accurately judge behavior and abnormal detection, etc. Accurate risk factor, reducing errors, and preventing falsified data

Pending Publication Date: 2019-06-25
PING AN TECH (SHENZHEN) CO LTD
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to overcome the above technical problems, especially the incomplete collection of user operation data, incomplete data collection, and the collecti

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User operation risk coefficient determination method and device, storage medium and server
  • User operation risk coefficient determination method and device, storage medium and server
  • User operation risk coefficient determination method and device, storage medium and server

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] The embodiments of the present invention are described in detail below. Examples of the embodiments are shown in the accompanying drawings, in which the same or similar reference numerals indicate the same or similar elements or elements with the same or similar functions. The embodiments described below with reference to the accompanying drawings are exemplary, and are only used to explain the present invention, and cannot be construed as limiting the present invention.

[0044] Those skilled in the art can understand that, unless specifically stated otherwise, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the term "comprising" used in the specification of the present invention refers to the presence of the described features, integers, steps, and operations, but does not exclude the presence or addition of one or more other features, integers, steps, and operations.

[0045] Those skilled in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of security monitoring, host monitoring and user abnormal operation identification, and provides a user operation risk coefficient determination method, which comprises the following steps: capturing a user operation performed by a user at a terminal and a related page; Determining a behavior event triggered by the user according to the user operation and the related page; And obtaining generation time and coordinates of the behavior event, and determining a risk coefficient of the behavior event according to the generation time and the coordinates.According to the invention, the collection is more comprehensive; Compared with the prior art, the method has the advantages that the calculation basic data is provided for the subsequent AI model through the complete user operation and related pages, so that the calculated risk coefficient is more accurate, and meanwhile, through the multi-dimensional user operation and related page collection,the event content is richer, so that the detection of abnormal operation can be more accurately carried out.

Description

technical field [0001] The invention relates to the technical fields of security monitoring, host monitoring, and user abnormal operation identification, and in particular to a method, device, storage medium, and server for determining a user operation risk coefficient. Background technique [0002] In many industries, user needs analysis is an important way to improve user experience and service quality. For the Internet industry, it is very important to analyze the user operation data of the website or terminal application (App in Android, IOS or other operating systems) provided by itself. Better access to user behavior data on web pages or applications can prevent users from maliciously attacking terminals through forged data, and at the same time can more comprehensively understand user needs and bring better services to users, thereby enhancing their own competitiveness . However, determining the security of user operations by collecting behavior traces still has the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/34
Inventor 黎立桂
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products