Unlock instant, AI-driven research and patent intelligence for your innovation.

Joint detection method and system based on behaviors inside and outside screen

A joint detection and off-screen technology, applied in error detection/correction, instrumentation, computing, etc., can solve problems such as data security and privacy issues within the software, data leakage, and prone to monitoring blind spots, etc., to achieve flexible and changeable security Detection, good recognition and matching effect, easy to implement by computer

Pending Publication Date: 2022-05-17
SHANGHAI PUDONG DEVELOPMENT BANK +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, most security software systems only consider the security and privacy of internal data in the software, and lack the detection of external human behavior. Therefore, information security incidents caused by improper external human behavior are prone to occur, for example: when operating a sensitive business When the operator artificially photographs the data leakage
[0004] Based on the above, the existing data security monitoring implements a single route (only security detection of internal data in the software), which cannot realize flexible monitoring, has limited effects, and is prone to monitoring blind spots

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Joint detection method and system based on behaviors inside and outside screen
  • Joint detection method and system based on behaviors inside and outside screen

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0035] This embodiment provides a joint detection method based on behaviors inside and outside the screen, which is implemented by one or more clients and a server in terms of security audit. The client and server are computers, mobile phones or tablets.

[0036] Such as figure 1 As shown, the method includes:

[0037] Obtaining operation events in the screen, and converting the operation events into event logs;

[0038] Obtain off-screen behavior events, and convert the behavior events into behavior logs;

[0039] Realize joint detection based on the event log and the behavior log according to preset business rules;

[0040] The event log and the behavior log are represented in a unified text form, and each log of the event log and the behavior log includes start time, end time, user ID, terminal ID, event type, and event content respectively.

[0041] Based on the above, the present invention not only monitors the operation events in the screen, but also synchronously mon...

Embodiment 2

[0050] Such as figure 2 As shown, this implementation provides a joint detection system based on on-screen and off-screen behaviors, which includes:

[0051] The desktop recognition module is used to obtain the operation event in the screen, and convert the operation event into an event log, and the operation event includes operation message and text content;

[0052] A video monitoring module, configured to obtain behavioral events outside the screen, and convert said behavioral events into behavioral logs, where the behavioral events include face recognition results and action recognition results;

[0053] The rule definition module is used to store preset business rules;

[0054] A rule execution module, configured to implement joint detection based on the event log and the behavior log according to preset business rules;

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a joint detection method and system based on behaviors inside and outside a screen, and the method comprises the steps: obtaining an operation event in the screen, and converting the operation event into an event log; obtaining a behavior event outside a screen, and converting the behavior event into a behavior log; based on the event log and the behavior log, realizing joint detection according to a preset business rule; the event log and the behavior log are expressed in a unified text form. Compared with the prior art, operation events and behavior events are comprehensively considered, the security audit precision is improved, and the protection strength of privacy data is enhanced.

Description

technical field [0001] The invention relates to the technical field of security auditing, in particular to a joint detection method and system based on behaviors inside and outside the screen. Background technique [0002] With the rapid development of the Internet, mobile phones, tablets, and computers play an increasingly prominent role in daily life and work. A large amount of personal information and work content are recorded in various forms. Due to the complexity of the network environment, network data protection is becoming more and more important. [0003] At present, most security software systems only consider the security and privacy of internal data in the software, and lack the detection of external human behavior. Therefore, information security incidents caused by improper external human behavior are prone to occur, for example: when operating a sensitive business , data leakage caused by the operator's manual photo taking. [0004] Based on the above, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/30G06F11/34G06V30/40G06V40/16G06V40/20
CPCG06F11/3438G06F11/3065
Inventor 宋钰涛许剑青李虎曾毅峰李文清唐琦松林平吴鑫靳志业葛亮
Owner SHANGHAI PUDONG DEVELOPMENT BANK
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More