Online behavior monitoring method and device, computer equipment and storage medium

A technology of computer programs and behaviors, applied in the field of information security, can solve problems such as fuzzy evaluation criteria, a lot of manpower, material resources, and difficulty

Active Publication Date: 2020-09-11
PING AN MEDICAL & HEALTHCARE MANAGEMENT CO LTD
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For example, in the process of medical insurance business management, the supervision of medical insurance funds for all entities is conducted through the collection of offline clues and on-site audit inspections to collect evidence and verify clues. The means are relatively traditional, and the identification process consumes a lot of manpower, Material resources, lack of professional identification knowledge system and over-identified professionals
Compared with the fund supervision work of the medical insurance business, the compliance evaluation of doctors' medical behaviors has become a major difficulty; in the medical consumer market, due to the obvious information asymmetry between the supply and demand sides, coupled with individual differences and the complexity of the medical process itself, It is not only very difficult to judge whether the medical behavior is reasonable, but also the judging criteria are very vague. Even if a third party (medical insurance payer) is introduced to participate and the third party has medical professionals, it still cannot make an accurate judgment on the compliance of medical behavior Evaluate
As a result, the existing technology cannot monitor and manage the medical behavior of online physicians
[0004] For the above-mentioned problems existing in related technologies, no effective solution has been found yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Online behavior monitoring method and device, computer equipment and storage medium
  • Online behavior monitoring method and device, computer equipment and storage medium
  • Online behavior monitoring method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] The method embodiment provided in Embodiment 1 of the present application may be executed in a server, a computer, or a similar computing device. Take running on a computer as an example, figure 1 It is a block diagram of the hardware structure of an online behavior monitoring computer according to the embodiment of the present invention. Such as figure 1 As shown, computer 10 may include one or more ( figure 1 Only one is shown in the figure) a processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.) and a memory 104 for storing data. Optionally, the above-mentioned computer can also be A transmission device 106 for communication functions and an input and output device 108 are included. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above-mentioned computer. Fo...

Embodiment 2

[0063] In this embodiment, an online behavior monitoring device is also provided, and the device is used to implement the above embodiments and preferred implementation modes, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0064] Figure 4 is a structural block diagram of an online behavior monitoring device according to an embodiment of the present invention, such as Figure 4As shown, the device includes: an acquisition module 40, a calculation module 42, and a determination module 44, wherein,

[0065] The collection module 40 is configured to collect the behavior data generated by the behavior node of the target behavior after the targ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of information security, and provides an online behavior monitoring method and device, computer equipment and a storage medium. On one hand, the method comprises thesteps: after a target behavior is triggered, collecting behavior data generated by behavior nodes of the target behavior, wherein the target behavior comprises operation behaviors of a plurality of behavior entities on the corresponding behavior nodes; calculating a matching rate of the behavior data and an information circulation path; and if the matching rate is lower than a preset threshold, determining that the target behavior is a risk behavior. Through the method and the device, the technical problem that online behaviors including multi-behavior subjects cannot be monitored online in related technologies is solved, automatic tracking of the online behaviors is achieved, and online illegal operation and risk behaviors can be discovered and intercepted in real time. In addition, theinvention also relates to a blockchain technology, and the behavior data generated by the behavior node of the target behavior is stored in the blockchain.

Description

【Technical field】 [0001] The present invention relates to the field of information security, in particular to an online behavior monitoring method and device, computer equipment, and storage media. 【Background technique】 [0002] In related technologies, only a specific behavior can be monitored, such as risk identification and vulnerability discovery. For a complex online behavior, such as a complex behavior involving multiple actors, multiple devices, and multiple times, there is often nothing that can be done. [0003] For example, in the process of medical insurance business management, the supervision of medical insurance funds for all entities is conducted through the collection of offline clues and on-site audit inspections to collect evidence and verify clues. The means are relatively traditional, and the identification process consumes a lot of manpower, Material resources, lack of professional identification knowledge system, and professionals with excessive medic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q40/08
CPCG06Q40/08
Inventor 韩明超方卫
Owner PING AN MEDICAL & HEALTHCARE MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products