Method and system for judging abnormal risk based on operation information and electronic equipment

A technology for manipulating information and exceptions, applied in the computer field, can solve problems such as the inability to easily analyze abnormal risks, and achieve the effects of facilitating timely investigation and handling of security vulnerabilities, saving development costs, and improving convenience and speed.

Pending Publication Date: 2022-05-03
SHANGHAI QIYUE INFORMATION TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This manual provides a method, system, and electronic equipment for judging abnormal risks based on operation information. It adopts a unified user association authentication method, so that each system can embed buried point codes when associated, so as to collect operation information after user authorization. Based on the collected log files with a unified format, it is possible to analyze whether there is an abnormal risk in real time, which solves the problem that the abnormal risk cannot be analyzed conveniently and in a timely manner due to the independence of each system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for judging abnormal risk based on operation information and electronic equipment
  • Method and system for judging abnormal risk based on operation information and electronic equipment
  • Method and system for judging abnormal risk based on operation information and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The following description serves to disclose the present invention to enable those skilled in the art to carry out the present invention. The preferred embodiments described below are only examples, and those skilled in the art can devise other obvious variations. The basic principles of the present invention defined in the following description can be applied to other embodiments, variations, improvements, equivalents and other technical solutions without departing from the spirit and scope of the present invention.

[0069] Exemplary embodiments of the present invention will now be described more fully with reference to the accompanying drawings. However, example embodiments may be embodied in many forms, and this invention should not be construed as limited to the embodiments set forth herein. On the contrary, providing these exemplary embodiments can make the present invention more comprehensive and complete, and facilitate the full transfer of the inventive concep...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and system for judging an abnormal risk based on operation information and electronic equipment, and relates to the technical field of computers, and the method comprises the following steps: associating with a target application, and embedding a burying point code for collecting abnormal information in the target application; obtaining an authentication bill of the target application; exchanging login authentication information based on the authentication bill, and returning the login authentication information to the target application; when identifying that the target application is in a login state, acquiring operation information of the target application based on the burying point code; and in combination with the operation information of the multiple target applications and the current operation information of the current target application, analyzing whether an abnormal risk exists or not in real time. According to the method, unified authentication is performed on the target applications by associating the target applications; after user authorization, operation information is collected by embedding burying point codes, so that risk analysis can be carried out across multiple target applications, and abnormal risks can be checked and processed in time.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method, system and electronic equipment for judging abnormal risks based on operation information. Background technique [0002] A company may use multiple different systems for different business types, such as office management system, process management system, personnel management system, project management system, R&D management system, etc. Each system is independent of each other and performs its own functions. In this way, the same user may have multiple accounts in multiple systems, which cannot guarantee the uniqueness of the user ID, and needs to log in separately when logging in to different systems. When performing abnormal risk analysis, it is necessary to adjust and embed embedded codes for multiple systems to obtain user operation information. In order to meet the analysis requirements, it is also necessary to modify the log output codes of each system...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/57G06F21/45G06F21/41
CPCG06F21/552G06F21/577G06F21/45G06F21/41G06F2221/033
Inventor 刘辉耀吴业超刘方舟任天悦郭佳厉山山李冰
Owner SHANGHAI QIYUE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products