CN110795320A - User behavior recording and tracing management method, device, electronic equipment and system - Google Patents

User behavior recording and tracing management method, device, electronic equipment and system Download PDF

Info

Publication number
CN110795320A
CN110795320A CN201910994664.7A CN201910994664A CN110795320A CN 110795320 A CN110795320 A CN 110795320A CN 201910994664 A CN201910994664 A CN 201910994664A CN 110795320 A CN110795320 A CN 110795320A
Authority
CN
China
Prior art keywords
human
computer interaction
operator
information
user behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910994664.7A
Other languages
Chinese (zh)
Inventor
余健
于东波
徐向峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Institute Of Rail Transit Information Technology
Original Assignee
Zhengzhou Institute Of Rail Transit Information Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhengzhou Institute Of Rail Transit Information Technology filed Critical Zhengzhou Institute Of Rail Transit Information Technology
Priority to CN201910994664.7A priority Critical patent/CN110795320A/en
Publication of CN110795320A publication Critical patent/CN110795320A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • User Interface Of Digital Computer (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention provides a user behavior recording and tracing management method, a device, electronic equipment and a system, wherein the electronic equipment is respectively in communication connection with a human-computer interaction peripheral device and a human-computer interaction host in a human-computer interaction system, and the user behavior recording and tracing management method comprises the following steps: detecting whether an electronic identity card uniquely identifying an operator of the human-computer interaction system is inserted into the electronic equipment; when the electronic identity card is determined to be inserted in the electronic equipment, acquiring biological characteristic information of an operator; the identity authentication is carried out on the operator based on the biological characteristic information of the operator, and when the identity authentication passes, the operation of the human-computer interaction peripheral equipment and the human-computer interaction host is triggered; and recording and storing the interaction information between the operator and the human-computer interaction peripheral equipment and any interaction host. By the technical scheme, the consistency of the actual operator and the authorized operator is ensured, and the human-computer interaction process is effectively analyzed, recorded, traced and managed.

Description

User behavior recording and tracing management method, device, electronic equipment and system
Technical Field
The invention relates to the technical field of computers, in particular to a user behavior recording and tracing management method, a user behavior recording and tracing management device, electronic equipment and a user behavior recording and tracing management system.
Background
The development of computer technology and control technology changes the life and working modes of people. With the development of computer application technology, computer systems continuously permeate the industrial control field and become core equipment of human-computer interaction in the industrial control field. Especially in the fields of bank, finance, rail transit, national defense, electric power, petroleum and petrochemical industry and the like, the operating requirements on the human-computer interaction system are extremely strict, and the illegal operation of the human-computer interaction system operator can cause results of different degrees.
Therefore, strict security measures are required for the operation of the human-computer interaction system in such applications. The traditional man-machine interaction system only performs single identity authentication on an operator to determine an authorized operator. However, the identity of an operator of the human-computer interaction system is convenient to recognize, and for a specific operation process of human-computer interaction, recording and tracing are difficult, for example, a person illegally tampers a key parameter or a file of a computer, and a traditional safety protection measure of the human-computer interaction system is difficult to record a tampering process of the operator, so that responsibility tracking is inconvenient when responsibility accidents are caused by illegal tampering.
Disclosure of Invention
Based on at least one of the technical problems, the invention provides a new user behavior recording and tracing management scheme, which can ensure the consistency of an actual operator and an authorized operator and effectively analyze, record, trace and manage the human-computer interaction process.
In view of this, the present invention provides a new user behavior recording and tracing management method, which is applicable to an electronic device, where the electronic device is respectively in communication connection with a human-computer interaction peripheral device and a human-computer interaction host in a human-computer interaction system, and the user behavior recording and tracing management method includes: detecting whether an electronic identity card uniquely identifying an operator of a human-computer interaction system is inserted on the electronic equipment; when the electronic identity card is determined to be inserted in the electronic equipment, acquiring biological characteristic information of the operator; the identity of the operator is verified based on the biological characteristic information of the operator, and the human-computer interaction peripheral equipment and the human-computer interaction host are triggered to operate when the identity is verified; and recording and storing the interaction information between the operator and the human-computer interaction peripheral equipment and any interaction host.
According to the technical scheme, when a user needs to operate a human-computer interaction peripheral device or a human-computer interaction host, a held electronic identity card needs to be inserted into electronic equipment connected with the human-computer interaction peripheral device and the human-computer interaction host to activate the electronic equipment, then biological characteristic information of an operator is obtained, whether the operator is an authorized operator is verified based on the biological characteristic information of the operator, and the operation of the human-computer interaction peripheral device and the human-computer interaction host is triggered after the operator passes the verification, so that the consistency of an actual operator and an authorized operator is effectively ensured, the safety risk in the process of using an interaction system (comprising the host and the peripheral device) is greatly reduced, and in addition, the interaction information (such as the identity information of the operator, the interaction information generated in the process of using the human-computer interaction peripheral device (such as a mouse, a keyboard, a touch display screen or the like), the human-computer, Action behavior information, input information, display information and the like) so as to analyze, record, trace and manage the human-computer interaction process, effectively prevent illegal operation, record the identity and the operation process of an operator after the operator performs the illegal operation on the human-computer interaction system, facilitate the tracing of the illegal operation of the human-computer interaction system in the later period, and make clear the work responsibility of the human-computer interaction operator.
In the above technical solution, preferably, the method further includes: and performing machine learning analysis on the interaction information to obtain the operation behavior characteristics of the operator.
In the technical scheme, machine learning analysis is carried out on the interactive information for operation tracing analysis and characteristic analysis, and the correctness of the operator execution process is distinguished based on behavior tracing.
In any one of the above technical solutions, preferably, the method further includes: and when receiving a pause operation instruction, controlling the human-computer interaction peripheral equipment and the human-computer interaction host to stop operating.
In any one of the above technical solutions, preferably, the biometric information of the operator includes one or more of the following combinations: fingerprint information, iris information, voice information, and face information.
According to a second aspect of the present invention, a user behavior recording and tracing management apparatus is provided, which is suitable for an electronic device, where the electronic device is respectively in communication connection with a human-computer interaction peripheral device and a human-computer interaction host in a human-computer interaction system, and the user behavior recording and tracing management apparatus includes: the detection unit is used for detecting whether an electronic identity card which uniquely identifies an operator of the man-machine interaction system is inserted into the electronic equipment; the acquisition unit is used for acquiring the biological characteristic information of the operator when the electronic identity card is determined to be inserted in the electronic equipment; the triggering unit is used for carrying out identity authentication on the operator based on the biological characteristic information of the operator and triggering the human-computer interaction peripheral equipment and the human-computer interaction host to operate when the identity authentication passes; and the recording unit is used for recording and storing the interaction information between the operator and the human-computer interaction peripheral equipment as well as between the operator and any one of the interaction hosts.
According to the technical scheme, when a user needs to operate a human-computer interaction peripheral device or a human-computer interaction host, a held electronic identity card needs to be inserted into electronic equipment connected with the human-computer interaction peripheral device and the human-computer interaction host to activate the electronic equipment, then biological characteristic information of an operator is obtained, whether the operator is an authorized operator is verified based on the biological characteristic information of the operator, and the operation of the human-computer interaction peripheral device and the human-computer interaction host is triggered after the operator passes the verification, so that the consistency of an actual operator and an authorized operator is effectively ensured, the safety risk in the process of using an interaction system (comprising the host and the peripheral device) is greatly reduced, and in addition, the interaction information (such as the identity information of the operator, the interaction information generated in the process of using the human-computer interaction peripheral device (such as a mouse, a keyboard, a touch display screen or the like), the human-computer, Action behavior information, input information, display information and the like) so as to analyze, record, trace and manage the human-computer interaction process, effectively prevent illegal operation, record the identity and the operation process of an operator after the operator performs the illegal operation on the human-computer interaction system, facilitate the tracing of the illegal operation of the human-computer interaction system in the later period, and make clear the work responsibility of the human-computer interaction operator.
In the above technical solution, preferably, the method further includes: and the processing unit is used for performing machine learning analysis on the interactive information to obtain the operation behavior characteristics of the operator.
In the technical scheme, machine learning analysis is carried out on the interactive information for operation tracing analysis and characteristic analysis, and the correctness of the operator execution process is distinguished based on behavior tracing.
In any one of the above technical solutions, preferably, the method further includes: and the control unit is used for controlling the human-computer interaction peripheral equipment and the human-computer interaction host to stop running when receiving a running suspension instruction.
In any one of the above technical solutions, preferably, the biometric information of the operator includes one or more of the following combinations: fingerprint information, iris information, voice information, and face information.
According to a third aspect of the invention, there is provided an electronic device comprising: the user behavior recording and tracing management device according to any one of the above technical solutions.
According to a fourth aspect of the present invention, a user behavior recording and tracing management system is provided, which includes: the electronic device according to the above technical solution; a human-computer interaction peripheral device in communication connection with the electronic device; and the human-computer interaction host is in communication connection with the electronic equipment.
Through the technical scheme, the consistency of the actual operator and the authorized operator can be ensured, and the human-computer interaction process is effectively analyzed, recorded, traced and managed.
Drawings
Fig. 1 is a flow chart of a user behavior recording and tracing management method according to an embodiment of the present invention;
fig. 2 shows a schematic block diagram of a user behavior recording and tracing management apparatus according to an embodiment of the present invention;
FIG. 3 shows a schematic block diagram of an electronic device according to an embodiment of the invention;
fig. 4 shows a schematic block diagram of a user behavior recording and tracing management system according to an embodiment of the present invention.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
The technical solution of the present invention is further explained with reference to fig. 1 to 4 as follows:
in this embodiment, the user behavior recording and tracing management method is applicable to an electronic device, and the electronic device is in communication connection with a human-computer interaction peripheral device and a human-computer interaction host in a human-computer interaction system, specifically, the user behavior recording and tracing management method is shown in fig. 1, and includes the following steps:
step S102, detecting whether an electronic identity card uniquely identifying an operator of the man-machine interaction system is inserted into the electronic equipment.
And step S104, acquiring the biological characteristic information of the operator when the electronic identity card is determined to be inserted in the electronic equipment. The biological characteristic information of the operator comprises one or more combinations of fingerprint information, iris information, voice information and face information.
And S106, performing identity authentication on the operator based on the biological characteristic information of the operator, and triggering the operation of the human-computer interaction peripheral equipment and the human-computer interaction host when the identity authentication is passed.
And step S108, recording and storing the interaction information between the operator and the human-computer interaction peripheral equipment and any interaction host.
Further, still include: and performing machine learning analysis on the interaction information to obtain the operation behavior characteristics of the operator. Machine learning analysis is carried out on the interaction information for operation tracing analysis and characteristic analysis, and then correctness of an operator execution process is distinguished based on behavior tracing.
Further, still include: and when receiving the operation suspension command, controlling the human-computer interaction peripheral equipment and the human-computer interaction host to stop operating.
When a user needs to operate a human-computer interaction peripheral device or a human-computer interaction host, firstly, a held electronic identity card needs to be inserted into electronic equipment connected with the human-computer interaction peripheral device and the human-computer interaction host to activate the electronic equipment, then, biological characteristic information of an operator is obtained, whether the operator is an authorized operator is verified based on the biological characteristic information of the operator, and the human-computer interaction peripheral device and the human-computer interaction host are triggered to operate after the verification is passed, so that the consistency of the actual operator and the authorized operator is effectively ensured, the safety risk in the process of using an interaction system (comprising the host and the peripheral device) is greatly reduced, and in addition, the interaction information (such as the identity information of the operator, the safety risk in the process of using the human-computer interaction peripheral device (such as a mouse, a keyboard or a touch display screen) and the human-computer interaction host, Action behavior information, input information, display information and the like) so as to analyze, record, trace and manage the human-computer interaction process, effectively prevent illegal operation, record the identity and the operation process of an operator after the operator performs the illegal operation on the human-computer interaction system, facilitate the tracing of the illegal operation of the human-computer interaction system in the later period, and make clear the work responsibility of the human-computer interaction operator.
In this embodiment, the user behavior recording and tracing management apparatus is suitable for an electronic device, and the electronic device is respectively in communication connection with a human-computer interaction peripheral device and a human-computer interaction host in a human-computer interaction system, and specifically, as shown in fig. 2, the user behavior recording and tracing management apparatus 200 includes: a detection unit 202, an acquisition unit 204, a trigger unit 206 and a recording unit 208.
The detection unit 202 is configured to detect whether an electronic identity card uniquely identifying an operator of the human-computer interaction system is inserted into the electronic device; the obtaining unit 204 is configured to obtain biometric information of an operator when it is determined that the electronic identity card is inserted in the electronic device, where the biometric information includes one or more combinations of fingerprint information, iris information, voice information, and face information; the triggering unit 206 is configured to perform identity authentication on an operator based on biometric information of the operator, and trigger the operation of the human-computer interaction peripheral device and the human-computer interaction host when the identity authentication passes; the recording unit 208 is used for recording and storing interaction information between an operator and the human-computer interaction peripheral equipment and any interaction host.
Further, the user behavior recording and tracing management apparatus 200 further includes: and the processing unit 210 is used for performing machine learning analysis on the interaction information to obtain the operation behavior characteristics of the operator. Machine learning analysis is carried out on the interaction information for operation tracing analysis and characteristic analysis, and then correctness of an operator execution process is distinguished based on behavior tracing.
Further, the user behavior recording and tracing management apparatus 200 further includes: and the control unit 212 is used for controlling the human-computer interaction peripheral equipment and the human-computer interaction host to stop running when the running suspension instruction is received.
When a user needs to operate a human-computer interaction peripheral device or a human-computer interaction host, firstly, a held electronic identity card needs to be inserted into electronic equipment connected with the human-computer interaction peripheral device and the human-computer interaction host to activate the electronic equipment, then, biological characteristic information of an operator is obtained, whether the operator is an authorized operator is verified based on the biological characteristic information of the operator, and the human-computer interaction peripheral device and the human-computer interaction host are triggered to operate after the verification is passed, so that the consistency of the actual operator and the authorized operator is effectively ensured, the safety risk in the process of using an interaction system (comprising the host and the peripheral device) is greatly reduced, and in addition, the interaction information (such as the identity information of the operator, the safety risk in the process of using the human-computer interaction peripheral device (such as a mouse, a keyboard or a touch display screen) and the human-computer interaction host, Action behavior information, input information, display information and the like) so as to analyze, record, trace and manage the human-computer interaction process, effectively prevent illegal operation, record the identity and the operation process of an operator after the operator performs the illegal operation on the human-computer interaction system, facilitate the tracing of the illegal operation of the human-computer interaction system in the later period, and make clear the work responsibility of the human-computer interaction operator.
As shown in fig. 3, an electronic device 300 according to an embodiment of the present invention includes: such as the user behavior recording and tracing management apparatus 200 shown in fig. 2.
As shown in fig. 4, the user behavior recording and tracing management system according to the present invention includes: an electronic device as shown in FIG. 3; a human-computer interaction peripheral device in communication connection with the electronic device; and the human-computer interaction host is in communication connection with the electronic equipment.
The electronic device in fig. 4 has a fingerprint identification function, and the processing procedure of the whole system is as follows:
4.1 treatment step
(1) If the electronic equipment is used for the first time or the authorization of an operator is modified, fingerprint data is required to be added and deleted to the fingerprint database of the equipment by using a configuration computer (the specific fingerprint input process refers to 4.2 fingerprint input) so as to authorize the operator of the human-computer interaction system; if the human-computer interaction system does not need to add or delete the authorized operator, the step is omitted.
(2) The data interfaces of input equipment (such as a mouse and a keyboard) and output equipment (such as a display) of peripheral equipment of the human-computer interaction system are connected to the equipment, and are connected to a human-computer interaction system host through the corresponding data interfaces of the equipment.
(3) The electronic identity card (Ukey) is arranged on a specific interface of the equipment and is used as a necessary part for normal work of the equipment, and after the equipment is electrified, the system is completely started after the related operation indicator lamp normally flickers. The electronic identity card is uniquely corresponding to each set of equipment, if the electronic identity card is lacked, the system cannot be started normally, fingerprint verification cannot pass, and subsequent functions cannot be realized.
(4) After the system is normally started, a fingerprint identification module connected to the equipment is used for fingerprint verification of a human-computer interaction operator, and if the fingerprint identification module is successfully verified, the related running state indicator lamp normally flickers, namely the system normally runs. It is noted that if the operator is an unauthorized user and the device fingerprint library does not have the user information, the authentication is not successful, and if a new authorized operator is required, the fingerprint entry needs to be re-performed. Here, fingerprint verification is described, but other biometric verification methods are also possible.
(5) After the fingerprint verification is successful, the equipment is in a normal operation state, the input and output of the human-computer interaction system can be normally operated, and the input and output information of the human-computer interaction is recorded by the equipment and stored in the self-contained storage of the equipment.
(6) If the human-computer interaction operation needs to be stopped temporarily, a logout button on the equipment is pressed, the human-computer interaction system is in a logout state, the operation of the human-computer interaction input equipment is forbidden, the equipment stops recording the human-computer interaction information, and the fingerprint verification system needs to be logged in again after the equipment is used again.
(7) After the operator stops the man-machine interaction work, the equipment power-off can remove the equipment memory, the equipment memory is accessed to the configuration computer, the man-machine interaction behavior data of the operator can be checked, the man-machine interaction behavior can be traced, and the correctness of the man-machine interaction execution process of the operator can be distinguished. The electronic equipment has a self-learning function, extracts the operation behavior characteristics of an operator by collecting human-computer interaction data, establishes different types of operator models, and can be used as an important component of identity verification of the operator of the human-computer interaction system.
(8) By recording and analyzing the operation behaviors of different operators, operation tracing data and characteristic analysis are provided, and the possibility of misoperation is reduced.
4.2 fingerprint input (authorized operator identity)
(1) Fingerprint collection
A. Opening a configuration computer with client software, and connecting a fingerprint acquisition module through a USB interface;
B. and opening the upper computer client software, and inputting a correct administrator user name and a correct password. Selecting a correct serial port to connect with the fingerprint acquisition module, and displaying hardware information of the fingerprint module by a software interface after successful connection;
C. inputting fingerprint data of an authorized operator of the man-machine interaction system according to the prompt of a software interface, and distributing corresponding fingerprint serial numbers;
D. after the input is successful, the fingerprint data is stored in a fingerprint database of the configuration computer and can be selectively exported according to the fingerprint serial number.
(2) Fingerprint distribution
A. Opening upper computer software, setting static IP of a configuration computer, IP of a management server, a fixed IP address preset by equipment (realized by the method) and a port address;
B. the equipment is directly connected with the configuration host through the network port, and after the connection is successful, the equipment information can be monitored at the client of the upper computer;
C. after the equipment is powered on and before fingerprint login, fingerprint data of an authorized operator can be selected from a configuration computer fingerprint library to be transmitted and stored in the equipment, and the existing fingerprint data of the operator in the equipment, which is not authorized, can be deleted.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A user behavior recording and tracing management method is applicable to electronic equipment, and is characterized in that the electronic equipment is respectively in communication connection with a human-computer interaction peripheral device and a human-computer interaction host in a human-computer interaction system, and the user behavior recording and tracing management method comprises the following steps:
detecting whether an electronic identity card uniquely identifying an operator of a human-computer interaction system is inserted on the electronic equipment;
when the electronic identity card is determined to be inserted in the electronic equipment, acquiring biological characteristic information of the operator;
the identity of the operator is verified based on the biological characteristic information of the operator, and the human-computer interaction peripheral equipment and the human-computer interaction host are triggered to operate when the identity is verified;
and recording and storing the interaction information between the operator and the human-computer interaction peripheral equipment and any interaction host.
2. The method for user behavior recording and traceability management as claimed in claim 1, further comprising:
and performing machine learning analysis on the interaction information to obtain the operation behavior characteristics of the operator.
3. The method for user behavior recording and traceability management as claimed in claim 1, further comprising:
and when receiving a pause operation instruction, controlling the human-computer interaction peripheral equipment and the human-computer interaction host to stop operating.
4. The user behavior recording and tracing management method according to any one of claims 1 to 3, wherein the biometric information of the operator includes one or more of the following combinations:
fingerprint information, iris information, voice information, and face information.
5. A user behavior recording and tracing management device is suitable for electronic equipment, and is characterized in that the electronic equipment is respectively in communication connection with a human-computer interaction peripheral device and a human-computer interaction host in a human-computer interaction system, and the user behavior recording and tracing management device comprises:
the detection unit is used for detecting whether an electronic identity card which uniquely identifies an operator of the man-machine interaction system is inserted into the electronic equipment;
the acquisition unit is used for acquiring the biological characteristic information of the operator when the electronic identity card is determined to be inserted in the electronic equipment;
the triggering unit is used for carrying out identity authentication on the operator based on the biological characteristic information of the operator and triggering the human-computer interaction peripheral equipment and the human-computer interaction host to operate when the identity authentication passes;
and the recording unit is used for recording and storing the interaction information between the operator and the human-computer interaction peripheral equipment as well as between the operator and any one of the interaction hosts.
6. The apparatus for user behavior recording and tracing management according to claim 5, further comprising:
and the processing unit is used for performing machine learning analysis on the interactive information to obtain the operation behavior characteristics of the operator.
7. The apparatus for user behavior recording and tracing management according to claim 5, further comprising:
and the control unit is used for controlling the human-computer interaction peripheral equipment and the human-computer interaction host to stop running when receiving a running suspension instruction.
8. The user behavior recording and tracing management device according to any one of claims 5 to 7, wherein the biometric information of the operator includes one or more of the following combinations: fingerprint information, iris information, voice information, and face information.
9. An electronic device, comprising:
the user behavior recording and tracing management apparatus according to any one of claims 5 to 8.
10. A user behavior recording and tracing management system is characterized by comprising:
the electronic device of claim 9;
a human-computer interaction peripheral device in communication connection with the electronic device;
and the human-computer interaction host is in communication connection with the electronic equipment.
CN201910994664.7A 2019-10-18 2019-10-18 User behavior recording and tracing management method, device, electronic equipment and system Pending CN110795320A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910994664.7A CN110795320A (en) 2019-10-18 2019-10-18 User behavior recording and tracing management method, device, electronic equipment and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910994664.7A CN110795320A (en) 2019-10-18 2019-10-18 User behavior recording and tracing management method, device, electronic equipment and system

Publications (1)

Publication Number Publication Date
CN110795320A true CN110795320A (en) 2020-02-14

Family

ID=69439396

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910994664.7A Pending CN110795320A (en) 2019-10-18 2019-10-18 User behavior recording and tracing management method, device, electronic equipment and system

Country Status (1)

Country Link
CN (1) CN110795320A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111797379A (en) * 2020-07-15 2020-10-20 上海瀚之友信息技术服务有限公司 Processing method and device for improving information security

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104112090A (en) * 2013-04-16 2014-10-22 北京白象新技术有限公司 Fingerprint verification traceability system applied to medical equipment
CN107180237A (en) * 2017-07-20 2017-09-19 成都市佳颖医用制品有限公司 One kind adopts slurry checking system and method
US20180173935A1 (en) * 2016-12-20 2018-06-21 Adedayo Sanni Biometric Identity Authentication System
CN208188894U (en) * 2018-05-11 2018-12-04 珠海方图智能科技有限公司 Multi-functional government affairs service desktop terminal
CN109583166A (en) * 2018-11-09 2019-04-05 山西特信环宇信息技术有限公司 A kind of certificate chain electronic certificate system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104112090A (en) * 2013-04-16 2014-10-22 北京白象新技术有限公司 Fingerprint verification traceability system applied to medical equipment
US20180173935A1 (en) * 2016-12-20 2018-06-21 Adedayo Sanni Biometric Identity Authentication System
CN107180237A (en) * 2017-07-20 2017-09-19 成都市佳颖医用制品有限公司 One kind adopts slurry checking system and method
CN208188894U (en) * 2018-05-11 2018-12-04 珠海方图智能科技有限公司 Multi-functional government affairs service desktop terminal
CN109583166A (en) * 2018-11-09 2019-04-05 山西特信环宇信息技术有限公司 A kind of certificate chain electronic certificate system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111797379A (en) * 2020-07-15 2020-10-20 上海瀚之友信息技术服务有限公司 Processing method and device for improving information security

Similar Documents

Publication Publication Date Title
CN111343173B (en) Data access abnormity monitoring method and device
CN103473844B (en) Public affairs are rented a house intelligent control method and system
KR101552950B1 (en) direct access management system for a server and network device
CN102541729A (en) Detection device and method for security vulnerability of software
CN105933348A (en) Login method based on biological characteristics, terminal and system
WO2008101142A1 (en) Biometric based repeat visitor recognition system and method
CN107302586A (en) A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing
CN105005721A (en) Computer authorization starting control system and method based on computer starting key
CN113065119A (en) Authorization method of network equipment
CN112230584A (en) Safety monitoring visualization system and safety monitoring method applied to industrial control field
CN110795320A (en) User behavior recording and tracing management method, device, electronic equipment and system
CN107808082B (en) Electronic device, data access verification method, and computer-readable storage medium
CN106407836B (en) A kind of method and device that the behavior of data illegal modifications detects automatically
CN115146283A (en) Information security testing method and device for vehicle-mounted information interaction system
US20200050756A1 (en) Action monitoring apparatus, system, and method
CN114006735B (en) Data protection method, device, computer equipment and storage medium
KR101576242B1 (en) Security management system and method for server accessible by temporarily authorized worker
CN104646349A (en) Ultrasonic cleaning machine with fingerprint recognizing function
CN114428955A (en) Method and system for judging abnormal risk based on operation information and electronic equipment
CN114444048A (en) Feature management method, feature management device, computer equipment and storage medium
CN111832030A (en) Data security audit device and method based on domestic password data identification
WO1987001835A1 (en) Secure computer system
CN112583812B (en) Account security determination method, device, equipment and medium
CN117951677A (en) Computer key management device, management method, equipment and medium
CN117473550A (en) Test data management method, system, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20200214

RJ01 Rejection of invention patent application after publication