CN110795320A - User behavior recording and tracing management method, device, electronic equipment and system - Google Patents
User behavior recording and tracing management method, device, electronic equipment and system Download PDFInfo
- Publication number
- CN110795320A CN110795320A CN201910994664.7A CN201910994664A CN110795320A CN 110795320 A CN110795320 A CN 110795320A CN 201910994664 A CN201910994664 A CN 201910994664A CN 110795320 A CN110795320 A CN 110795320A
- Authority
- CN
- China
- Prior art keywords
- human
- computer interaction
- operator
- information
- user behavior
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000007726 management method Methods 0.000 title claims abstract description 38
- 230000003993 interaction Effects 0.000 claims abstract description 172
- 230000002093 peripheral effect Effects 0.000 claims abstract description 51
- 238000000034 method Methods 0.000 claims abstract description 36
- 238000004891 communication Methods 0.000 claims abstract description 13
- 230000001960 triggered effect Effects 0.000 claims abstract description 7
- 230000006399 behavior Effects 0.000 claims description 52
- 238000004458 analytical method Methods 0.000 claims description 19
- 238000010801 machine learning Methods 0.000 claims description 10
- 238000001514 detection method Methods 0.000 claims description 4
- 230000002452 interceptive effect Effects 0.000 claims description 4
- 238000012545 processing Methods 0.000 claims description 4
- 239000000725 suspension Substances 0.000 claims description 4
- 230000008569 process Effects 0.000 abstract description 27
- 238000012795 verification Methods 0.000 description 11
- 230000009471 action Effects 0.000 description 4
- 238000010586 diagram Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000012466 permeate Substances 0.000 description 1
- 239000003208 petroleum Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3438—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Quality & Reliability (AREA)
- User Interface Of Digital Computer (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention provides a user behavior recording and tracing management method, a device, electronic equipment and a system, wherein the electronic equipment is respectively in communication connection with a human-computer interaction peripheral device and a human-computer interaction host in a human-computer interaction system, and the user behavior recording and tracing management method comprises the following steps: detecting whether an electronic identity card uniquely identifying an operator of the human-computer interaction system is inserted into the electronic equipment; when the electronic identity card is determined to be inserted in the electronic equipment, acquiring biological characteristic information of an operator; the identity authentication is carried out on the operator based on the biological characteristic information of the operator, and when the identity authentication passes, the operation of the human-computer interaction peripheral equipment and the human-computer interaction host is triggered; and recording and storing the interaction information between the operator and the human-computer interaction peripheral equipment and any interaction host. By the technical scheme, the consistency of the actual operator and the authorized operator is ensured, and the human-computer interaction process is effectively analyzed, recorded, traced and managed.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a user behavior recording and tracing management method, a user behavior recording and tracing management device, electronic equipment and a user behavior recording and tracing management system.
Background
The development of computer technology and control technology changes the life and working modes of people. With the development of computer application technology, computer systems continuously permeate the industrial control field and become core equipment of human-computer interaction in the industrial control field. Especially in the fields of bank, finance, rail transit, national defense, electric power, petroleum and petrochemical industry and the like, the operating requirements on the human-computer interaction system are extremely strict, and the illegal operation of the human-computer interaction system operator can cause results of different degrees.
Therefore, strict security measures are required for the operation of the human-computer interaction system in such applications. The traditional man-machine interaction system only performs single identity authentication on an operator to determine an authorized operator. However, the identity of an operator of the human-computer interaction system is convenient to recognize, and for a specific operation process of human-computer interaction, recording and tracing are difficult, for example, a person illegally tampers a key parameter or a file of a computer, and a traditional safety protection measure of the human-computer interaction system is difficult to record a tampering process of the operator, so that responsibility tracking is inconvenient when responsibility accidents are caused by illegal tampering.
Disclosure of Invention
Based on at least one of the technical problems, the invention provides a new user behavior recording and tracing management scheme, which can ensure the consistency of an actual operator and an authorized operator and effectively analyze, record, trace and manage the human-computer interaction process.
In view of this, the present invention provides a new user behavior recording and tracing management method, which is applicable to an electronic device, where the electronic device is respectively in communication connection with a human-computer interaction peripheral device and a human-computer interaction host in a human-computer interaction system, and the user behavior recording and tracing management method includes: detecting whether an electronic identity card uniquely identifying an operator of a human-computer interaction system is inserted on the electronic equipment; when the electronic identity card is determined to be inserted in the electronic equipment, acquiring biological characteristic information of the operator; the identity of the operator is verified based on the biological characteristic information of the operator, and the human-computer interaction peripheral equipment and the human-computer interaction host are triggered to operate when the identity is verified; and recording and storing the interaction information between the operator and the human-computer interaction peripheral equipment and any interaction host.
According to the technical scheme, when a user needs to operate a human-computer interaction peripheral device or a human-computer interaction host, a held electronic identity card needs to be inserted into electronic equipment connected with the human-computer interaction peripheral device and the human-computer interaction host to activate the electronic equipment, then biological characteristic information of an operator is obtained, whether the operator is an authorized operator is verified based on the biological characteristic information of the operator, and the operation of the human-computer interaction peripheral device and the human-computer interaction host is triggered after the operator passes the verification, so that the consistency of an actual operator and an authorized operator is effectively ensured, the safety risk in the process of using an interaction system (comprising the host and the peripheral device) is greatly reduced, and in addition, the interaction information (such as the identity information of the operator, the interaction information generated in the process of using the human-computer interaction peripheral device (such as a mouse, a keyboard, a touch display screen or the like), the human-computer, Action behavior information, input information, display information and the like) so as to analyze, record, trace and manage the human-computer interaction process, effectively prevent illegal operation, record the identity and the operation process of an operator after the operator performs the illegal operation on the human-computer interaction system, facilitate the tracing of the illegal operation of the human-computer interaction system in the later period, and make clear the work responsibility of the human-computer interaction operator.
In the above technical solution, preferably, the method further includes: and performing machine learning analysis on the interaction information to obtain the operation behavior characteristics of the operator.
In the technical scheme, machine learning analysis is carried out on the interactive information for operation tracing analysis and characteristic analysis, and the correctness of the operator execution process is distinguished based on behavior tracing.
In any one of the above technical solutions, preferably, the method further includes: and when receiving a pause operation instruction, controlling the human-computer interaction peripheral equipment and the human-computer interaction host to stop operating.
In any one of the above technical solutions, preferably, the biometric information of the operator includes one or more of the following combinations: fingerprint information, iris information, voice information, and face information.
According to a second aspect of the present invention, a user behavior recording and tracing management apparatus is provided, which is suitable for an electronic device, where the electronic device is respectively in communication connection with a human-computer interaction peripheral device and a human-computer interaction host in a human-computer interaction system, and the user behavior recording and tracing management apparatus includes: the detection unit is used for detecting whether an electronic identity card which uniquely identifies an operator of the man-machine interaction system is inserted into the electronic equipment; the acquisition unit is used for acquiring the biological characteristic information of the operator when the electronic identity card is determined to be inserted in the electronic equipment; the triggering unit is used for carrying out identity authentication on the operator based on the biological characteristic information of the operator and triggering the human-computer interaction peripheral equipment and the human-computer interaction host to operate when the identity authentication passes; and the recording unit is used for recording and storing the interaction information between the operator and the human-computer interaction peripheral equipment as well as between the operator and any one of the interaction hosts.
According to the technical scheme, when a user needs to operate a human-computer interaction peripheral device or a human-computer interaction host, a held electronic identity card needs to be inserted into electronic equipment connected with the human-computer interaction peripheral device and the human-computer interaction host to activate the electronic equipment, then biological characteristic information of an operator is obtained, whether the operator is an authorized operator is verified based on the biological characteristic information of the operator, and the operation of the human-computer interaction peripheral device and the human-computer interaction host is triggered after the operator passes the verification, so that the consistency of an actual operator and an authorized operator is effectively ensured, the safety risk in the process of using an interaction system (comprising the host and the peripheral device) is greatly reduced, and in addition, the interaction information (such as the identity information of the operator, the interaction information generated in the process of using the human-computer interaction peripheral device (such as a mouse, a keyboard, a touch display screen or the like), the human-computer, Action behavior information, input information, display information and the like) so as to analyze, record, trace and manage the human-computer interaction process, effectively prevent illegal operation, record the identity and the operation process of an operator after the operator performs the illegal operation on the human-computer interaction system, facilitate the tracing of the illegal operation of the human-computer interaction system in the later period, and make clear the work responsibility of the human-computer interaction operator.
In the above technical solution, preferably, the method further includes: and the processing unit is used for performing machine learning analysis on the interactive information to obtain the operation behavior characteristics of the operator.
In the technical scheme, machine learning analysis is carried out on the interactive information for operation tracing analysis and characteristic analysis, and the correctness of the operator execution process is distinguished based on behavior tracing.
In any one of the above technical solutions, preferably, the method further includes: and the control unit is used for controlling the human-computer interaction peripheral equipment and the human-computer interaction host to stop running when receiving a running suspension instruction.
In any one of the above technical solutions, preferably, the biometric information of the operator includes one or more of the following combinations: fingerprint information, iris information, voice information, and face information.
According to a third aspect of the invention, there is provided an electronic device comprising: the user behavior recording and tracing management device according to any one of the above technical solutions.
According to a fourth aspect of the present invention, a user behavior recording and tracing management system is provided, which includes: the electronic device according to the above technical solution; a human-computer interaction peripheral device in communication connection with the electronic device; and the human-computer interaction host is in communication connection with the electronic equipment.
Through the technical scheme, the consistency of the actual operator and the authorized operator can be ensured, and the human-computer interaction process is effectively analyzed, recorded, traced and managed.
Drawings
Fig. 1 is a flow chart of a user behavior recording and tracing management method according to an embodiment of the present invention;
fig. 2 shows a schematic block diagram of a user behavior recording and tracing management apparatus according to an embodiment of the present invention;
FIG. 3 shows a schematic block diagram of an electronic device according to an embodiment of the invention;
fig. 4 shows a schematic block diagram of a user behavior recording and tracing management system according to an embodiment of the present invention.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
The technical solution of the present invention is further explained with reference to fig. 1 to 4 as follows:
in this embodiment, the user behavior recording and tracing management method is applicable to an electronic device, and the electronic device is in communication connection with a human-computer interaction peripheral device and a human-computer interaction host in a human-computer interaction system, specifically, the user behavior recording and tracing management method is shown in fig. 1, and includes the following steps:
step S102, detecting whether an electronic identity card uniquely identifying an operator of the man-machine interaction system is inserted into the electronic equipment.
And step S104, acquiring the biological characteristic information of the operator when the electronic identity card is determined to be inserted in the electronic equipment. The biological characteristic information of the operator comprises one or more combinations of fingerprint information, iris information, voice information and face information.
And S106, performing identity authentication on the operator based on the biological characteristic information of the operator, and triggering the operation of the human-computer interaction peripheral equipment and the human-computer interaction host when the identity authentication is passed.
And step S108, recording and storing the interaction information between the operator and the human-computer interaction peripheral equipment and any interaction host.
Further, still include: and performing machine learning analysis on the interaction information to obtain the operation behavior characteristics of the operator. Machine learning analysis is carried out on the interaction information for operation tracing analysis and characteristic analysis, and then correctness of an operator execution process is distinguished based on behavior tracing.
Further, still include: and when receiving the operation suspension command, controlling the human-computer interaction peripheral equipment and the human-computer interaction host to stop operating.
When a user needs to operate a human-computer interaction peripheral device or a human-computer interaction host, firstly, a held electronic identity card needs to be inserted into electronic equipment connected with the human-computer interaction peripheral device and the human-computer interaction host to activate the electronic equipment, then, biological characteristic information of an operator is obtained, whether the operator is an authorized operator is verified based on the biological characteristic information of the operator, and the human-computer interaction peripheral device and the human-computer interaction host are triggered to operate after the verification is passed, so that the consistency of the actual operator and the authorized operator is effectively ensured, the safety risk in the process of using an interaction system (comprising the host and the peripheral device) is greatly reduced, and in addition, the interaction information (such as the identity information of the operator, the safety risk in the process of using the human-computer interaction peripheral device (such as a mouse, a keyboard or a touch display screen) and the human-computer interaction host, Action behavior information, input information, display information and the like) so as to analyze, record, trace and manage the human-computer interaction process, effectively prevent illegal operation, record the identity and the operation process of an operator after the operator performs the illegal operation on the human-computer interaction system, facilitate the tracing of the illegal operation of the human-computer interaction system in the later period, and make clear the work responsibility of the human-computer interaction operator.
In this embodiment, the user behavior recording and tracing management apparatus is suitable for an electronic device, and the electronic device is respectively in communication connection with a human-computer interaction peripheral device and a human-computer interaction host in a human-computer interaction system, and specifically, as shown in fig. 2, the user behavior recording and tracing management apparatus 200 includes: a detection unit 202, an acquisition unit 204, a trigger unit 206 and a recording unit 208.
The detection unit 202 is configured to detect whether an electronic identity card uniquely identifying an operator of the human-computer interaction system is inserted into the electronic device; the obtaining unit 204 is configured to obtain biometric information of an operator when it is determined that the electronic identity card is inserted in the electronic device, where the biometric information includes one or more combinations of fingerprint information, iris information, voice information, and face information; the triggering unit 206 is configured to perform identity authentication on an operator based on biometric information of the operator, and trigger the operation of the human-computer interaction peripheral device and the human-computer interaction host when the identity authentication passes; the recording unit 208 is used for recording and storing interaction information between an operator and the human-computer interaction peripheral equipment and any interaction host.
Further, the user behavior recording and tracing management apparatus 200 further includes: and the processing unit 210 is used for performing machine learning analysis on the interaction information to obtain the operation behavior characteristics of the operator. Machine learning analysis is carried out on the interaction information for operation tracing analysis and characteristic analysis, and then correctness of an operator execution process is distinguished based on behavior tracing.
Further, the user behavior recording and tracing management apparatus 200 further includes: and the control unit 212 is used for controlling the human-computer interaction peripheral equipment and the human-computer interaction host to stop running when the running suspension instruction is received.
When a user needs to operate a human-computer interaction peripheral device or a human-computer interaction host, firstly, a held electronic identity card needs to be inserted into electronic equipment connected with the human-computer interaction peripheral device and the human-computer interaction host to activate the electronic equipment, then, biological characteristic information of an operator is obtained, whether the operator is an authorized operator is verified based on the biological characteristic information of the operator, and the human-computer interaction peripheral device and the human-computer interaction host are triggered to operate after the verification is passed, so that the consistency of the actual operator and the authorized operator is effectively ensured, the safety risk in the process of using an interaction system (comprising the host and the peripheral device) is greatly reduced, and in addition, the interaction information (such as the identity information of the operator, the safety risk in the process of using the human-computer interaction peripheral device (such as a mouse, a keyboard or a touch display screen) and the human-computer interaction host, Action behavior information, input information, display information and the like) so as to analyze, record, trace and manage the human-computer interaction process, effectively prevent illegal operation, record the identity and the operation process of an operator after the operator performs the illegal operation on the human-computer interaction system, facilitate the tracing of the illegal operation of the human-computer interaction system in the later period, and make clear the work responsibility of the human-computer interaction operator.
As shown in fig. 3, an electronic device 300 according to an embodiment of the present invention includes: such as the user behavior recording and tracing management apparatus 200 shown in fig. 2.
As shown in fig. 4, the user behavior recording and tracing management system according to the present invention includes: an electronic device as shown in FIG. 3; a human-computer interaction peripheral device in communication connection with the electronic device; and the human-computer interaction host is in communication connection with the electronic equipment.
The electronic device in fig. 4 has a fingerprint identification function, and the processing procedure of the whole system is as follows:
4.1 treatment step
(1) If the electronic equipment is used for the first time or the authorization of an operator is modified, fingerprint data is required to be added and deleted to the fingerprint database of the equipment by using a configuration computer (the specific fingerprint input process refers to 4.2 fingerprint input) so as to authorize the operator of the human-computer interaction system; if the human-computer interaction system does not need to add or delete the authorized operator, the step is omitted.
(2) The data interfaces of input equipment (such as a mouse and a keyboard) and output equipment (such as a display) of peripheral equipment of the human-computer interaction system are connected to the equipment, and are connected to a human-computer interaction system host through the corresponding data interfaces of the equipment.
(3) The electronic identity card (Ukey) is arranged on a specific interface of the equipment and is used as a necessary part for normal work of the equipment, and after the equipment is electrified, the system is completely started after the related operation indicator lamp normally flickers. The electronic identity card is uniquely corresponding to each set of equipment, if the electronic identity card is lacked, the system cannot be started normally, fingerprint verification cannot pass, and subsequent functions cannot be realized.
(4) After the system is normally started, a fingerprint identification module connected to the equipment is used for fingerprint verification of a human-computer interaction operator, and if the fingerprint identification module is successfully verified, the related running state indicator lamp normally flickers, namely the system normally runs. It is noted that if the operator is an unauthorized user and the device fingerprint library does not have the user information, the authentication is not successful, and if a new authorized operator is required, the fingerprint entry needs to be re-performed. Here, fingerprint verification is described, but other biometric verification methods are also possible.
(5) After the fingerprint verification is successful, the equipment is in a normal operation state, the input and output of the human-computer interaction system can be normally operated, and the input and output information of the human-computer interaction is recorded by the equipment and stored in the self-contained storage of the equipment.
(6) If the human-computer interaction operation needs to be stopped temporarily, a logout button on the equipment is pressed, the human-computer interaction system is in a logout state, the operation of the human-computer interaction input equipment is forbidden, the equipment stops recording the human-computer interaction information, and the fingerprint verification system needs to be logged in again after the equipment is used again.
(7) After the operator stops the man-machine interaction work, the equipment power-off can remove the equipment memory, the equipment memory is accessed to the configuration computer, the man-machine interaction behavior data of the operator can be checked, the man-machine interaction behavior can be traced, and the correctness of the man-machine interaction execution process of the operator can be distinguished. The electronic equipment has a self-learning function, extracts the operation behavior characteristics of an operator by collecting human-computer interaction data, establishes different types of operator models, and can be used as an important component of identity verification of the operator of the human-computer interaction system.
(8) By recording and analyzing the operation behaviors of different operators, operation tracing data and characteristic analysis are provided, and the possibility of misoperation is reduced.
4.2 fingerprint input (authorized operator identity)
(1) Fingerprint collection
A. Opening a configuration computer with client software, and connecting a fingerprint acquisition module through a USB interface;
B. and opening the upper computer client software, and inputting a correct administrator user name and a correct password. Selecting a correct serial port to connect with the fingerprint acquisition module, and displaying hardware information of the fingerprint module by a software interface after successful connection;
C. inputting fingerprint data of an authorized operator of the man-machine interaction system according to the prompt of a software interface, and distributing corresponding fingerprint serial numbers;
D. after the input is successful, the fingerprint data is stored in a fingerprint database of the configuration computer and can be selectively exported according to the fingerprint serial number.
(2) Fingerprint distribution
A. Opening upper computer software, setting static IP of a configuration computer, IP of a management server, a fixed IP address preset by equipment (realized by the method) and a port address;
B. the equipment is directly connected with the configuration host through the network port, and after the connection is successful, the equipment information can be monitored at the client of the upper computer;
C. after the equipment is powered on and before fingerprint login, fingerprint data of an authorized operator can be selected from a configuration computer fingerprint library to be transmitted and stored in the equipment, and the existing fingerprint data of the operator in the equipment, which is not authorized, can be deleted.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
Claims (10)
1. A user behavior recording and tracing management method is applicable to electronic equipment, and is characterized in that the electronic equipment is respectively in communication connection with a human-computer interaction peripheral device and a human-computer interaction host in a human-computer interaction system, and the user behavior recording and tracing management method comprises the following steps:
detecting whether an electronic identity card uniquely identifying an operator of a human-computer interaction system is inserted on the electronic equipment;
when the electronic identity card is determined to be inserted in the electronic equipment, acquiring biological characteristic information of the operator;
the identity of the operator is verified based on the biological characteristic information of the operator, and the human-computer interaction peripheral equipment and the human-computer interaction host are triggered to operate when the identity is verified;
and recording and storing the interaction information between the operator and the human-computer interaction peripheral equipment and any interaction host.
2. The method for user behavior recording and traceability management as claimed in claim 1, further comprising:
and performing machine learning analysis on the interaction information to obtain the operation behavior characteristics of the operator.
3. The method for user behavior recording and traceability management as claimed in claim 1, further comprising:
and when receiving a pause operation instruction, controlling the human-computer interaction peripheral equipment and the human-computer interaction host to stop operating.
4. The user behavior recording and tracing management method according to any one of claims 1 to 3, wherein the biometric information of the operator includes one or more of the following combinations:
fingerprint information, iris information, voice information, and face information.
5. A user behavior recording and tracing management device is suitable for electronic equipment, and is characterized in that the electronic equipment is respectively in communication connection with a human-computer interaction peripheral device and a human-computer interaction host in a human-computer interaction system, and the user behavior recording and tracing management device comprises:
the detection unit is used for detecting whether an electronic identity card which uniquely identifies an operator of the man-machine interaction system is inserted into the electronic equipment;
the acquisition unit is used for acquiring the biological characteristic information of the operator when the electronic identity card is determined to be inserted in the electronic equipment;
the triggering unit is used for carrying out identity authentication on the operator based on the biological characteristic information of the operator and triggering the human-computer interaction peripheral equipment and the human-computer interaction host to operate when the identity authentication passes;
and the recording unit is used for recording and storing the interaction information between the operator and the human-computer interaction peripheral equipment as well as between the operator and any one of the interaction hosts.
6. The apparatus for user behavior recording and tracing management according to claim 5, further comprising:
and the processing unit is used for performing machine learning analysis on the interactive information to obtain the operation behavior characteristics of the operator.
7. The apparatus for user behavior recording and tracing management according to claim 5, further comprising:
and the control unit is used for controlling the human-computer interaction peripheral equipment and the human-computer interaction host to stop running when receiving a running suspension instruction.
8. The user behavior recording and tracing management device according to any one of claims 5 to 7, wherein the biometric information of the operator includes one or more of the following combinations: fingerprint information, iris information, voice information, and face information.
9. An electronic device, comprising:
the user behavior recording and tracing management apparatus according to any one of claims 5 to 8.
10. A user behavior recording and tracing management system is characterized by comprising:
the electronic device of claim 9;
a human-computer interaction peripheral device in communication connection with the electronic device;
and the human-computer interaction host is in communication connection with the electronic equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910994664.7A CN110795320A (en) | 2019-10-18 | 2019-10-18 | User behavior recording and tracing management method, device, electronic equipment and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910994664.7A CN110795320A (en) | 2019-10-18 | 2019-10-18 | User behavior recording and tracing management method, device, electronic equipment and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110795320A true CN110795320A (en) | 2020-02-14 |
Family
ID=69439396
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910994664.7A Pending CN110795320A (en) | 2019-10-18 | 2019-10-18 | User behavior recording and tracing management method, device, electronic equipment and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110795320A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111797379A (en) * | 2020-07-15 | 2020-10-20 | 上海瀚之友信息技术服务有限公司 | Processing method and device for improving information security |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104112090A (en) * | 2013-04-16 | 2014-10-22 | 北京白象新技术有限公司 | Fingerprint verification traceability system applied to medical equipment |
CN107180237A (en) * | 2017-07-20 | 2017-09-19 | 成都市佳颖医用制品有限公司 | One kind adopts slurry checking system and method |
US20180173935A1 (en) * | 2016-12-20 | 2018-06-21 | Adedayo Sanni | Biometric Identity Authentication System |
CN208188894U (en) * | 2018-05-11 | 2018-12-04 | 珠海方图智能科技有限公司 | Multi-functional government affairs service desktop terminal |
CN109583166A (en) * | 2018-11-09 | 2019-04-05 | 山西特信环宇信息技术有限公司 | A kind of certificate chain electronic certificate system |
-
2019
- 2019-10-18 CN CN201910994664.7A patent/CN110795320A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104112090A (en) * | 2013-04-16 | 2014-10-22 | 北京白象新技术有限公司 | Fingerprint verification traceability system applied to medical equipment |
US20180173935A1 (en) * | 2016-12-20 | 2018-06-21 | Adedayo Sanni | Biometric Identity Authentication System |
CN107180237A (en) * | 2017-07-20 | 2017-09-19 | 成都市佳颖医用制品有限公司 | One kind adopts slurry checking system and method |
CN208188894U (en) * | 2018-05-11 | 2018-12-04 | 珠海方图智能科技有限公司 | Multi-functional government affairs service desktop terminal |
CN109583166A (en) * | 2018-11-09 | 2019-04-05 | 山西特信环宇信息技术有限公司 | A kind of certificate chain electronic certificate system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111797379A (en) * | 2020-07-15 | 2020-10-20 | 上海瀚之友信息技术服务有限公司 | Processing method and device for improving information security |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111343173B (en) | Data access abnormity monitoring method and device | |
CN103473844B (en) | Public affairs are rented a house intelligent control method and system | |
KR101552950B1 (en) | direct access management system for a server and network device | |
CN102541729A (en) | Detection device and method for security vulnerability of software | |
CN105933348A (en) | Login method based on biological characteristics, terminal and system | |
WO2008101142A1 (en) | Biometric based repeat visitor recognition system and method | |
CN107302586A (en) | A kind of Webshell detection methods and device, computer installation, readable storage medium storing program for executing | |
CN105005721A (en) | Computer authorization starting control system and method based on computer starting key | |
CN113065119A (en) | Authorization method of network equipment | |
CN112230584A (en) | Safety monitoring visualization system and safety monitoring method applied to industrial control field | |
CN110795320A (en) | User behavior recording and tracing management method, device, electronic equipment and system | |
CN107808082B (en) | Electronic device, data access verification method, and computer-readable storage medium | |
CN106407836B (en) | A kind of method and device that the behavior of data illegal modifications detects automatically | |
CN115146283A (en) | Information security testing method and device for vehicle-mounted information interaction system | |
US20200050756A1 (en) | Action monitoring apparatus, system, and method | |
CN114006735B (en) | Data protection method, device, computer equipment and storage medium | |
KR101576242B1 (en) | Security management system and method for server accessible by temporarily authorized worker | |
CN104646349A (en) | Ultrasonic cleaning machine with fingerprint recognizing function | |
CN114428955A (en) | Method and system for judging abnormal risk based on operation information and electronic equipment | |
CN114444048A (en) | Feature management method, feature management device, computer equipment and storage medium | |
CN111832030A (en) | Data security audit device and method based on domestic password data identification | |
WO1987001835A1 (en) | Secure computer system | |
CN112583812B (en) | Account security determination method, device, equipment and medium | |
CN117951677A (en) | Computer key management device, management method, equipment and medium | |
CN117473550A (en) | Test data management method, system, equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20200214 |
|
RJ01 | Rejection of invention patent application after publication |