CN109242280A - User behavior data processing method, device, electronic equipment and readable medium - Google Patents

User behavior data processing method, device, electronic equipment and readable medium Download PDF

Info

Publication number
CN109242280A
CN109242280A CN201810961163.4A CN201810961163A CN109242280A CN 109242280 A CN109242280 A CN 109242280A CN 201810961163 A CN201810961163 A CN 201810961163A CN 109242280 A CN109242280 A CN 109242280A
Authority
CN
China
Prior art keywords
data
user
risk
block chain
behavioral data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810961163.4A
Other languages
Chinese (zh)
Inventor
李夫路
梁爽
李群
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taikang Insurance Group Co Ltd
Original Assignee
Taikang Insurance Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taikang Insurance Group Co Ltd filed Critical Taikang Insurance Group Co Ltd
Priority to CN201810961163.4A priority Critical patent/CN109242280A/en
Publication of CN109242280A publication Critical patent/CN109242280A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

This disclosure relates to a kind of user behavior data processing method, device, electronic equipment and computer-readable medium based on block chain.This method comprises: obtaining the behavioral data of user by block chain network;According in the block chain network time data and time window the behavioral data is screened;The risk score of the behavioral data is determined with risk evaluation model by the behavioral data after screening;And the risk class of the user is determined according to the risk score.This disclosure relates to user behavior data processing method, device, electronic equipment and the computer-readable medium based on block chain, can it is timely and effective and accurately assess employee's risk class, promote enterprises safety management system standardization.

Description

User behavior data processing method, device, electronic equipment and readable medium
Technical field
This disclosure relates to computer information processing field, in particular to a kind of user behavior number based on block chain According to processing method, device, electronic equipment and computer-readable medium.
Background technique
In general, enterprise is by human resources, fund, market.The elements such as machinery equipment, material, information composition.Wherein, For an enterprise, most important or enterprise heart: employee.Employee occupies an leading position in enterprise, rises to dominate and make With.The behavior management of enterprise staff is a kind of by improving people's work performance and development individual and team competence in enterprise, The successful management program of duration is brought for enterprise.
Currently, business administration becomes more and more important, and especially in present information-intensive society, the various electronics of enterprises Data is easy to be stolen by enterprise staff, in turn results in very big business loss.To realize Enterprise Sustainable security developments, have more Kind of approach manages the information security of enterprise: first is that scientific and technological level is improved energetically, construction network security system;Two It is specification " ruling by law ", promotes the information security awareness of employee;Third is that the regulatory responsibility of refinement government agencies at all levels, strengthens supervision. But the content of aspects above, enterprise staff can only be constrained from the angle of morals and regulation, there is special mesh to some And special attempt employee, the above management means produces little effect.Moreover, being especially responsible for carrying out enterprise the member of network security Work, some unlawful practices of these employees or violation operation trace are easy to be cleaned up by it, in this case, enterprise Internal information security control is a problem to be solved.
Therefore, it is necessary to a kind of new user behavior data processing method, device, electronic equipment and calculating based on block chain Machine readable medium.
Above- mentioned information are only used for reinforcing the understanding to the background of the disclosure, therefore it disclosed in the background technology part It may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
In view of this, the disclosure provide it is a kind of based on the user behavior data processing method of block chain, device, electronic equipment And computer-readable medium, can it is timely and effective and accurately assess employee's risk class, promote enterprises safety management system The standardization of system.
Other characteristics and advantages of the disclosure will be apparent from by the following detailed description, or partially by the disclosure Practice and acquistion.
According to the one side of the disclosure, a kind of user behavior data processing method based on block chain, this method packet are proposed It includes: obtaining the behavioral data of user by block chain network;According to the time data and time window pair in the block chain network The behavioral data is screened;The behavioral data is determined with risk evaluation model by the behavioral data after screening Risk score;And the risk class of the user is determined according to the risk score.
In a kind of exemplary embodiment of the disclosure, further includes: obtain the behavioral data of user, and by the behavior number According to storing to the block chain network.
In a kind of exemplary embodiment of the disclosure, the behavioral data of user is obtained, and the behavioral data is stored It include: behavioral data and the corresponding time of the act for obtaining user to the block chain network;By each behavioral data with it is right The time answered is stored in the block chain network as a block.
In a kind of exemplary embodiment of the disclosure, the behavioral data includes that office space discrepancy data are set with office Standby operation data;The behavioral data of user is obtained, and it includes: described that the behavioral data, which is stored to the block chain network, When obtaining office space when user discrepancy office space and enter and leave data, and the office space being entered and left data with corresponding discrepancy Between store to the block chain network as the behavioral data;And office is obtained when the user carries out predetermined registration operation and is set Standby operation data, and store using the office equipment operating data with the corresponding operating time as the behavioral data to described Block chain network.
In a kind of exemplary embodiment of the disclosure, office space is obtained when the user enters and leaves office space and is entered and left Data include: to obtain the office space when the user passes through gate to enter and leave data;And/or pass through gate inhibition in the user The office space is obtained when sensor enters and leaves data.
In a kind of exemplary embodiment of the disclosure, according in the block chain network data and time window to institute State behavioral data carry out screening comprise determining that time window effective range;It obtains in the block chain network in each block Time of the act;The behavioral data is screened according to the time window effective range and time of the act.
In a kind of exemplary embodiment of the disclosure, according to the time window effective range and time of the act to institute Stating behavioral data and carrying out screening includes: the corresponding behavioral data of time of the act in retention time window effective range.
In a kind of exemplary embodiment of the disclosure, by screening after the behavioral data and risk evaluation model it is true The risk score of the fixed behavioral data includes: to obtain the Risk rated ratio that each single item behavior is corresponding in the behavioral data; And the corresponding Risk rated ratio of behavior is inputted into the risk evaluation model with the risk score of the determination behavioral data.
In a kind of exemplary embodiment of the disclosure, the risk evaluation model includes:
It wherein, is risk score, N is risk category quantity, and Fn is the priority of each risk factors, and Cn is each risk factors Risk factor.
In a kind of exemplary embodiment of the disclosure, further includes: obtain the attributive character of the user;And when described When the attributive character of user belongs to role's risk factors, supervised in real time by behavioral data of the block chain network to the user It surveys with the risk class of the determination user.
According to the one side of the disclosure, a kind of user behavior data processing unit based on block chain, the device packet are proposed It includes: behavioral module, for obtaining the behavioral data of user by block chain network;Screening module, for according to the block link network Data and time window in network screen the behavioral data;Grading module, for passing through the behavior after screening Time data and risk evaluation model determine the risk score of the behavioral data;And risk module, for according to the wind Danger scoring determines the risk class of the user.
In a kind of exemplary embodiment of the disclosure, further includes: block chain module, for obtaining the behavior number of user According to, and the behavioral data is stored to the block chain network.
According to the one side of the disclosure, a kind of electronic equipment is proposed, which includes: one or more processors; Storage device, for storing one or more programs;When one or more programs are executed by one or more processors, so that one A or multiple processors realize such as methodology above.
According to the one side of the disclosure, it proposes a kind of computer-readable medium, is stored thereon with computer program, the program Method as mentioned in the above is realized when being executed by processor.
It can according to user behavior data processing method, device, electronic equipment and the computer based on block chain of the disclosure Read medium, can it is timely and effective and accurately assess employee's risk class, promote enterprises safety management system standardization.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited It is open.
Detailed description of the invention
Its example embodiment is described in detail by referring to accompanying drawing, above and other target, feature and the advantage of the disclosure will It becomes more fully apparent.Drawings discussed below is only some embodiments of the present disclosure, for the ordinary skill of this field For personnel, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of user behavior data processing method and dress based on block chain shown according to an exemplary embodiment The system block diagram set.
Fig. 2 is a kind of stream of user behavior data processing method based on block chain shown according to an exemplary embodiment Cheng Tu.
Fig. 3 is a kind of user behavior data processing method based on block chain shown according to another exemplary embodiment Flow chart.
Fig. 4 is a kind of user behavior data processing method based on block chain shown according to another exemplary embodiment Schematic diagram.
Fig. 5 is a kind of stream of user behavior data processing method based on block chain shown according to an exemplary embodiment Cheng Tu.
Fig. 6 is a kind of user behavior data processing unit based on block chain shown according to another exemplary embodiment Block diagram.
Fig. 7 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.
Fig. 8 is that a kind of computer readable storage medium schematic diagram is shown according to an exemplary embodiment.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be real in a variety of forms It applies, and is not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will be comprehensively and complete It is whole, and the design of example embodiment is comprehensively communicated to those skilled in the art.Identical appended drawing reference indicates in figure Same or similar part, thus repetition thereof will be omitted.
In addition, described feature, structure or characteristic can be incorporated in one or more implementations in any suitable manner In example.In the following description, many details are provided to provide and fully understand to embodiment of the disclosure.However, It will be appreciated by persons skilled in the art that can with technical solution of the disclosure without one or more in specific detail, Or it can be using other methods, constituent element, device, step etc..In other cases, it is not shown in detail or describes known side Method, device, realization or operation are to avoid fuzzy all aspects of this disclosure.
Block diagram shown in the drawings is only functional entity, not necessarily must be corresponding with physically separate entity. I.e., it is possible to realize these functional entitys using software form, or realized in one or more hardware modules or integrated circuit These functional entitys, or these functional entitys are realized in heterogeneous networks and/or processor device and/or microcontroller device.
Flow chart shown in the drawings is merely illustrative, it is not necessary to including all content and operation/step, It is not required to execute by described sequence.For example, some operation/steps can also decompose, and some operation/steps can close And or part merge, therefore the sequence actually executed is possible to change according to the actual situation.
It will be understood by those skilled in the art that attached drawing is the schematic diagram of example embodiment, module or process in attached drawing Necessary to not necessarily implementing the disclosure, therefore it cannot be used for the protection scope of the limitation disclosure.
Fig. 1 is a kind of user behavior data processing method and dress based on block chain shown according to an exemplary embodiment The system block diagram set.
As shown in Figure 1, system architecture 100 may include terminal device 101,102,103, network 104,105 and of server Management equipment 106.Network 104 between terminal device 101,102,103 and server 105 to provide Jie of communication link Matter, network 104 between management equipment 106 and server 105 also to provide the medium of communication link.Network 104 can wrap Include various connection types, such as wired, wireless communication link or fiber optic cables etc..
Using terminal equipment 101,102,103 acquires the behavioral data of user, and then terminal device 101,102,103 passes through Network 104 is interacted with server 105, to receive or send message etc..It can be equipped on terminal device 101,102,103 various Client application, such as the application of web browser applications, searching class, instant messaging tools, mailbox client, social platform software Deng.
Terminal device 101,102,103 can be with data acquisition function and the various electronics of data transmission supported to set It is standby, including but not limited to smart phone, tablet computer, fingerprint sensor and safety check gate etc..
Server 105 can be to provide the server of various services, such as collected to terminal device 101,102,103 Data provide the background server of analysis.Server 105 can enter and leave the office space time to the user received, user enters and leaves The data such as office space state, user network behavior analyze etc. processing, and (security level of user is by processing result Restricting driving is warning information etc.) feed back to management equipment 106.
Management equipment 106 can be the various electronic equipments with display function and branch browsing data, including but unlimited In smart phone, tablet computer, kneetop computer and desktop computer etc..
Server 105 can for example be obtained the behavioral data of user by block chain network;Server 105 can be for example according to Time data and time window in block chain network screen the behavioral data;Server 105 can for example pass through sieve The behavioral data and risk evaluation model after choosing determine the risk score of the behavioral data;Server 105 can such as root The risk class of the user is determined according to the risk score.
Server 105 can be the server of an entity, also may be, for example, that multiple servers form, in server 105 A part for obtaining the behavioral data of user, and the behavior can be stored for example as the block chain network in the disclosure Data;It is also used to obtain the behavioral data of user and corresponding time of the act;And by each behavioral data with it is corresponding when Between be stored in the block chain network as a block.
It should be noted that the user behavior data processing method based on block chain provided by the embodiment of the present disclosure can be with It is executed by server 105, correspondingly, the user behavior data processing unit based on block chain can be set in server 105. And the collection terminal for acquiring user behavior data is normally in terminal device 101,102,103, is provided and is shown information to bursting tube The displaying end of reason personnel is normally in management equipment 106.
Information exchange on internet, almost require by can standing bad third party credit institution handle related letter Breath.This kind of system is limited by " fiduciary mode " still endogenously.Block chain technology is building bit coin block link network The basic technology of network and Transaction Information encrypted transmission.It is based on Cryptography Principles and is not based on credit, so that any reach an agreement Both sides' direct payment, without the participation of third party intermediary.From the perspective of data: block chain be it is a kind of hardly The distributed data base that may be modified.Here " distribution " is not only presented as the distributed storage of data, is also embodied in number According to distributed recording (being safeguarded jointly by system participant).In the most of application scenarios of block chain technology, block is utilized Hash calculation and encryption that the chain transaction data structure of chain Hash pointer and encryption are learned learn the mechanism of digital signature, can be realized area Thus multi-level evidence in block chain process of exchange trusts each other problem between Different Individual counterparty to realize.In view of This, the user behavior data that acquisition obtains is stored in block chain network by present inventor, can be mentioned by block chain The data safety guarantee of confession then reaches acquisition accurately, the purpose for the user data being not tampered with.
According to the user behavior data processing method and processing device based on block chain of the disclosure, obtained by obtaining block chain The behavioral data of user, and user behavior data is analyzed, it determines the mode of security level, accurate user can be obtained Row data, and on the basis of valid data, assessment employee's risk class promptly and accurately can promote enterprises safe The standardization of management system.
Fig. 2 is a kind of stream of user behavior data processing method based on block chain shown according to an exemplary embodiment Cheng Tu.User behavior data processing method 20 based on block chain includes at least step S202 to S208.
As shown in Fig. 2, obtaining the behavioral data of user by block chain network in S202.Wherein, the behavioral data packet It includes office space and enters and leaves data and office equipment operating data.
In one embodiment, office space is obtained when the user enters and leaves office space and enters and leaves data, and will be described Office space enters and leaves data and stores as the behavioral data to the block chain network with the corresponding access time.
In one embodiment, office equipment operating data are obtained when the user carries out predetermined registration operation, and will be described Office equipment operating data are stored as the behavioral data to the block chain network with the corresponding operating time.Wherein, in advance It also may be, for example, the operation etc. of the movable equipments such as USB flash disk copy data if operation may be, for example, data upload or down operation Deng.
In one embodiment, the behavioral data of user and corresponding time of the act are obtained;By each behavioral data with The corresponding time is stored in the block chain network as a block.Each user or each office space can for example be obtained The real time information of other disengaging personnel.Specifically for example personnel can be entered and left and temporal information is swiped the card sensor by gate or gate inhibition Deng uploading to block chain in real time, can also for example by employee or other staff access Office Area computer time and upload and under The time of published article part uploads to block chain and is stored.If employee's first is swiped the card in 2018.7.14 morning 9:00 into company, in 9: 15 log in office computer, respectively at the operation that 9:20 and 10:15 has carried out downloading file, swipe the card in morning 11:00 and leave public affairs Department, then the access time of first can be uploaded block chain by gate inhibition's sensor of swiping the card, and corporate networks management system can log in the personnel Computer time and file download record upload to block chain.
In S204, according in the block chain network time data and time window the behavioral data is sieved Choosing.It can be for example, determining time window effective range;Obtain the time of the act in the block chain network in each block;According to The time window effective range and time of the act screen the behavioral data.
In one embodiment, the effective range of time window can be for example determined according to the working time of user, based on discrepancy Personnel identity information (internal or office work, field personnel, visitor etc.), temporal information, date feature (working day, weekend, national red-letter day etc.) etc., really The effective time of the normal behaviour of the fixed user.Normal time range on and off duty for example can be defined as normal time range, Time not within normal time is defined as time window effective range.Data sieve is carried out to all users by the time window Choosing.
In one embodiment, the effective range of time window can be for example determined according to the status attribute of user, can for example, with Family first has proposed application of leaving office, and user's first can be proposed to the time range positioning time window of preceding the latter moon of leaving office application Effective range is screened by user behavior of the time window to user's first.
In S206, the risk of the behavioral data is determined with risk evaluation model by the behavioral data after screening Scoring.According to the access time of the discrepancy personnel in block chain and behavior historical data, safety wind that may be present is automatically determined Danger, for example, according to personnel identity, access time, date, historical behavior (including access computer time and downloading file record Deng) etc. safety factors establish risk evaluation model.
In a kind of exemplary embodiment of the disclosure, the behavioral data further include: behavior property;Obtain the user Behavior property data;And when the behavior property of the user is to pass through block chain network pair there are when role's risk factors The behavioral data of the user carries out real-time monitoring with the risk class of the determination user.It can be for example, will when existing in company When the user to be left office, the user with role's risk can be set by the behavior property of this certain customers, by block chain The behavior of the behavioral data real-time monitoring user of the user, and the safety of user is calculated in real time.
In one embodiment, the behavioral data is determined with risk evaluation model by the behavioral data after screening Risk score include: to obtain the Risk rated ratio that each single item behavior is corresponding in the behavioral data;And by behavior and its Corresponding Risk rated ratio inputs the risk evaluation model with the risk score of the determination behavioral data.
In a kind of exemplary embodiment of the disclosure, the risk evaluation model includes:
Wherein, R is risk score, and N is risk category quantity, and Fn is the priority of each risk factors, Cn be each risk because The risk factor of element.R is bigger, and explanation personnel's security risk is bigger.
In S208, the risk class of the user is determined according to the risk score.Personnel risk identifies that conclusion can example For example common/risky/high risk/immediately treats.Different risk threshold values is set, it can be for example, length of service longer member The risk threshold value of work can be set higher;And the working time it is shorter employee's risk threshold value setting can be lower.It can also be for example, work What the employee's risk threshold value for being related to the post of Commercial Secrets of Enterprise as position was set can be lower, and general work position, such as people The secure threshold of the personnel such as power or marketing can set higher, and the application is not limited.According to different risk thresholds Value, in conjunction with the risk score that risk evaluation model provides, the comprehensive risk class for determining user.
According to the user behavior data processing method based on block chain of the disclosure, obtain user's by obtaining block chain Behavioral data, and analyzing user behavior data, determines the mode of security level, being capable of assessment employee's wind promptly and accurately Dangerous grade can promote the standardization of enterprises safety management system.
It will be clearly understood that the present disclosure describes how to form and use particular example, but the principle of the disclosure is not limited to These exemplary any details.On the contrary, the introduction based on disclosure disclosure, these principles can be applied to many other Embodiment.
Fig. 3 is a kind of user behavior data processing method based on block chain shown according to another exemplary embodiment Flow chart.User behavior data processing method 30 based on block chain as shown in Figure 3 is to the user behavior based on block chain The detailed description of block chain network building in " obtaining the behavioral data of user by block chain network " in data processing method 20.
In S302, office space is obtained when the user enters and leaves office space and enters and leaves data.It can be for example, in the use Family obtains the office space and enters and leaves data when passing through gate;And/or described in being obtained when the user passes through entrance guard sensor Office space enters and leaves data.
In S304, the office space is entered and left into data and time as block data.Each block is by build It is formed with block body.Build is used to be linked to the address of a block, and provides the guarantee of integrality for block chain database. Block body then contains Transaction Details or other data records by verifying, occurring during block creation.
The data storage method of block chain guarantees the integrality and preciseness of database by two modes.First, often All exchange of value that the transaction recorded on one block is after a upper block is formed, the block occurs before being created are living Dynamic, this feature ensure that the integrality of data.Second, in most cases, once it is added into after the completion of new block Block chain finally, then the data record of this block just again cannot change or delete.This feature ensure that the rigorous of data Property, i.e., it can not be tampered.
In S306, the user carry out office equipment operating when obtain office equipment operating data, can for example, with When family uploads data, user's office equipment operating data are obtained, can also obtain user's office for example in user's log into thr computer Equipment operation data.
In S308, using the office equipment operating data with the corresponding time as block data.Specific block knot Structure can be for example shown in Fig. 4.
In S310, block data is stored in the block chain network.Each block is relied between block and block Between data block header information be chained up, block be it is a kind of record transaction data structure.Each block is by block head It is formed with block main body, block main body is only responsible for recording the All Activity information in for the previous period, most of function of block chain It can all be realized by block head.Specifically can such as header information have recorded the HASH value an of block and (converted by hash function Hashed value) and this block HASH value, thus the HASH of this block, and being recorded in next new block completes The information chain of each block.
In the embodiment of the present application, in block chain network, a block chain can be opened for each employee, the employee's Each user behavior data can be linked in upper a behavioral data block of the employee.New block can be added into record Finally, once the behavioral data of employee is written into block chain, just again cannot change and delete.Each block has recorded its quilt All events occurred before creation.The block structure of one block is as follows:
As shown in figure 4, each block is a transaction, after the transaction reached by scheduled mechanism, area can be written to Between block, each block content contain (block ID, block father ID, chaincodeID (index value), Transaction Information, etc.). The mark of each block is chaincodeID value, and chaincodeID value is the legal registration code of traffic contract, it was demonstrated that this area Block transaction is after being successfully processed by current scheduled mechanism, to be written among block chain.
Wherein, block chain node and block chain network building, can for example using certain base of company operating agency as minimum node, One or more branch companies participate in insurance transaction block chain network building.In the embodiment of the present application, the data structure of block can Such as shown in following table;
Further, common recognition mechanism confirmation is carried out by algorithm of knowing together between block data.Show in one kind of the disclosure In example property embodiment, the common recognition algorithm includes: Byzantine failure tolerance algorithm.Wherein, PBFT is Practical Byzantine The abbreviation of Fault Tolerance means Byzantine failure tolerance algorithm.The basic ideas of PBFT algorithm are as follows: Client can be sent A series of requests execute corresponding operation to each replicas node, and PBFT is this to utilize copy replication (replication) method solves the problems, such as Byzantine failure tolerance, and can allow algorithm work in asynchronous environment, and sound Answer performance boost an order of magnitude or more.
According to the user behavior data processing method based on block chain of the disclosure, by the behavior number for obtaining user in real time According to, and the behavioral data is uploaded in block chain network in a manner of storing user behavior data by block chain in real time, Can promptly and accurately acquisition user behavioral data, additionally it is possible to guarantee information storage and information processing high efficiency.
Fig. 5 is a kind of frame of user behavior data processing method based on block chain shown according to an exemplary embodiment Figure.User behavior data processing method 50 based on block chain as shown in Figure 5 is to the user behavior data based on block chain In processing method 20 " according in the block chain network data and time window the behavioral data is screened " it is detailed Thin description.
In S502, time window effective range is determined.It in one embodiment, can be for example according to the working time of user The effective range of time window is determined, based on discrepancy personnel identity information (internal or office work, field personnel, visitor etc.), temporal information, date feature (working day, weekend, national red-letter day etc.) etc., determine the effective time of the normal behaviour of the user.It can for example will be normal on and off duty Time range be defined as normal time range, the time not within normal time is defined as time window effective range.Pass through The time window carries out data screening to all users.
In S504, the time of the act in the block chain network in each block is obtained.It can be for example, by block " Transactions (transaction) " data item, extracts the time of the act of user.
In one embodiment, since the data volume in block is big, also for example a large amount of user data can be stored to place It manages in server, the data in block is further processed in conjunction with data search tool in the prior art etc..
In S506, the behavioral data is screened according to the time window effective range and time of the act. It can be for example, the corresponding behavioral data of time of the act in retention time window effective range.
According to the user behavior data processing method based on block chain of the disclosure, based on entering and leaving, personnel identity information is (interior Duty, field personnel, visitor etc.), temporal information, date feature (working day, weekend, national red-letter day etc.) etc. in time series according to difference Priority (identification of festivals or holidays security risk is preferential, and visitor and the identification of field personnel security risk are preferential, the poor back office force of performance or Personnel Who Left security risk is identified into priority scheduling) more people's real-time confirmations (need two or more personnel on the scene to significant information Confirmation) and time window matching and recognition methods, according in block chain enter and leave personnel access time and behavior historical data, Security risk that may be present is searched and identified automatically to system, to effectively promote block chain technical application in office space employee Effective popularization of safety management.As block chain technology is more in office safety management, medical treatment, endowment, insurance, finance, logistics etc. The extensive use in a field, the invention will bring considerable economic benefit and social benefit.
It will be appreciated by those skilled in the art that realizing that all or part of the steps of above-described embodiment is implemented as being executed by CPU Computer program.When the computer program is executed by CPU, above-mentioned function defined by the above method that the disclosure provides is executed Energy.The program can store in a kind of computer readable storage medium, which can be read-only memory, magnetic Disk or CD etc..
Further, it should be noted that above-mentioned attached drawing is only the place according to included by the method for disclosure exemplary embodiment Reason schematically illustrates, rather than limits purpose.It can be readily appreciated that above-mentioned processing shown in the drawings is not indicated or is limited at these The time sequencing of reason.In addition, be also easy to understand, these processing, which can be, for example either synchronously or asynchronously to be executed in multiple modules.
Following is embodiment of the present disclosure, can be used for executing embodiments of the present disclosure.It is real for disclosure device Undisclosed details in example is applied, embodiments of the present disclosure is please referred to.
Fig. 6 is a kind of user behavior data processing unit based on block chain shown according to another exemplary embodiment Block diagram.User behavior data processing unit 60 based on block chain includes: behavioral module 602, screening module 604, grading module 606 and risk module 608.
Behavioral module 602 is used to be obtained the behavioral data of user by block chain network;Wherein, the behavioral data includes doing Public place enters and leaves data and office equipment operating data.
Screening module 604 be used for according in the block chain network data and time window to the behavioral data carry out Screening;Screening module 604 is specific can include: time window module, for determining time window effective range;Time extracts mould Block, for obtaining the time of the act in the block chain network in each block;Screening module, for according to the time window Effective range and time of the act screen the behavioral data.
Grading module 606 is used to determine the behavioral data with risk evaluation model by the behavioral data after screening Risk score;According to the access time of the discrepancy personnel in block chain and behavior historical data, automatically determine that may be present Security risk, for example, according to personnel identity, access time, date, historical behavior (including access computer time and lower published article Part record etc.) etc. safety factors establish risk evaluation model.In a kind of exemplary embodiment of the disclosure, the risk assessment Model includes:
Wherein, R is risk score, and N is risk category quantity, and Fn is the priority of each risk factors, Cn be each risk because The risk factor of element.R is bigger, and explanation personnel's security risk is bigger.
Risk module 608 is used to determine the risk class of the user according to the risk score.According to different risks Threshold value, in conjunction with the risk score that risk evaluation model provides, the comprehensive risk class for determining user.
According to the user behavior data processing unit based on block chain of the disclosure, obtain user's by obtaining block chain Behavioral data, and analyzing user behavior data, determines the mode of security level, being capable of assessment employee's wind promptly and accurately Dangerous grade can promote the standardization of enterprises safety management system.
Fig. 7 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.
The electronic equipment 200 of this embodiment according to the disclosure is described referring to Fig. 7.The electronics that Fig. 7 is shown Equipment 200 is only an example, should not function to the embodiment of the present disclosure and use scope bring any restrictions.
As shown in fig. 7, electronic equipment 200 is showed in the form of universal computing device.The component of electronic equipment 200 can wrap It includes but is not limited to: at least one processing unit 210, at least one storage unit 220, (including the storage of the different system components of connection Unit 220 and processing unit 210) bus 230, display unit 240 etc..
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 210 Row, so that the processing unit 210 executes described in this specification above-mentioned electronic prescription circulation processing method part according to this The step of disclosing various illustrative embodiments.For example, the processing unit 210 can be executed such as Fig. 2, Fig. 3, shown in Fig. 5 The step of.
The storage unit 220 may include the readable medium of volatile memory cell form, such as random access memory Unit (RAM) 2201 and/or cache memory unit 2202 can further include read-only memory unit (ROM) 2203.
The storage unit 220 can also include program/practical work with one group of (at least one) program module 2205 Tool 2204, such program module 2205 includes but is not limited to: operating system, one or more application program, other programs It may include the realization of network environment in module and program data, each of these examples or certain combination.
Bus 230 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
Electronic equipment 200 can also be with one or more external equipments 300 (such as keyboard, sensing equipment, bluetooth equipment Deng) communication, can also be enabled a user to one or more equipment interact with the electronic equipment 200 communicate, and/or with make Any equipment (such as the router, modulation /demodulation that the electronic equipment 200 can be communicated with one or more of the other calculating equipment Device etc.) communication.This communication can be carried out by input/output (I/O) interface 250.Also, electronic equipment 200 can be with By network adapter 260 and one or more network (such as local area network (LAN), wide area network (WAN) and/or public network, Such as internet) communication.Network adapter 260 can be communicated by bus 230 with other modules of electronic equipment 200.It should Understand, although not shown in the drawings, other hardware and/or software module can be used in conjunction with electronic equipment 200, including but unlimited In: microcode, device driver, redundant processing unit, external disk drive array, RAID system, tape drive and number According to backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server or network equipment etc.) executes the above method according to disclosure embodiment.
Fig. 8 schematically shows a kind of computer readable storage medium schematic diagram in disclosure exemplary embodiment.
Refering to what is shown in Fig. 8, describing the program product for realizing the above method according to embodiment of the present disclosure 400, can using portable compact disc read only memory (CD-ROM) and including program code, and can in terminal device, Such as it is run on PC.However, the program product of the disclosure is without being limited thereto, in this document, readable storage medium storing program for executing can be with To be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or It is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
The computer readable storage medium may include in a base band or the data as the propagation of carrier wave a part are believed Number, wherein carrying readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetism Signal, optical signal or above-mentioned any appropriate combination.Readable storage medium storing program for executing can also be any other than readable storage medium storing program for executing Readable medium, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or Person's program in connection.The program code for including on readable storage medium storing program for executing can transmit with any suitable medium, packet Include but be not limited to wireless, wired, optical cable, RF etc. or above-mentioned any appropriate combination.
Can with any combination of one or more programming languages come write for execute the disclosure operation program Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
Above-mentioned computer-readable medium carries one or more program, when said one or multiple programs are by one When the equipment executes, so that the computer-readable medium implements function such as: obtaining the behavioral data of user by block chain network; According in the block chain network time data and time window the behavioral data is screened;Pass through the institute after screening It states behavioral data and risk evaluation model determines the risk score of the behavioral data;And institute is determined according to the risk score State the risk class of user.
It will be appreciated by those skilled in the art that above-mentioned each module can be distributed in device according to the description of embodiment, it can also Uniquely it is different from one or more devices of the present embodiment with carrying out corresponding change.The module of above-described embodiment can be merged into One module, can also be further split into multiple submodule.
By the description of above embodiment, those skilled in the art is it can be readily appreciated that example embodiment described herein It can also be realized in such a way that software is in conjunction with necessary hardware by software realization.Therefore, implemented according to the disclosure The technical solution of example can be embodied in the form of software products, which can store in a non-volatile memories In medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) or on network, including some instructions are so that a calculating equipment (can To be personal computer, server, mobile terminal or network equipment etc.) it executes according to the method for the embodiment of the present disclosure.
It is particularly shown and described the exemplary embodiment of the disclosure above.It should be appreciated that the present disclosure is not limited to Detailed construction, set-up mode or implementation method described herein;On the contrary, disclosure intention covers included in appended claims Various modifications and equivalence setting in spirit and scope.
In addition, structure shown by this specification Figure of description, ratio, size etc., only to cooperate specification institute Disclosure, for skilled in the art realises that be not limited to the enforceable qualifications of the disclosure with reading, therefore Do not have technical essential meaning, the modification of any structure, the change of proportionate relationship or the adjustment of size are not influencing the disclosure Under the technical effect and achieved purpose that can be generated, it should all still fall in technology contents disclosed in the disclosure and obtain and can cover In the range of.Meanwhile cited such as "upper" in this specification, " first ", " second " and " one " term, be also only and be convenient for Narration is illustrated, rather than to limit the enforceable range of the disclosure, relativeness is altered or modified, without substantive change Under technology contents, when being also considered as the enforceable scope of the disclosure.

Claims (10)

1. a kind of user behavior data processing method based on block chain characterized by comprising
The behavioral data of user is obtained by block chain network;
According in the block chain network time data and time window the behavioral data is screened;
The risk score of the behavioral data is determined with risk evaluation model by the behavioral data after screening;And
The risk class of the user is determined according to the risk score.
2. the method as described in claim 1, which is characterized in that also wrapped before obtaining the behavioral data of user by block chain network It includes:
Obtain the behavioral data of user;And
It is stored in the block chain network using each behavioral data with corresponding time of the act as a block.
3. method according to claim 2, which is characterized in that the behavioral data includes that office space enters and leaves data and office Equipment operation data;
Obtain user behavioral data include:
Office space is obtained when the user enters and leaves office space enters and leaves data;And
Office equipment operating data are obtained when the user carries out office equipment operating.
4. method as claimed in claim 3, which is characterized in that obtain office space when the user enters and leaves office space and go out Entering data includes:
The office space is obtained when the user passes through gate enters and leaves data;And/or
The office space is obtained when the user passes through entrance guard sensor enters and leaves data.
5. method according to claim 2, which is characterized in that according to the time data and time window in the block chain network Mouth carries out screening to the behavioral data
Determine time window effective range;
Obtain the time of the act in the block chain network in each block;And
The corresponding behavioral data of time of the act in screening time window effective range.
6. the method as described in claim 1, which is characterized in that the behavioral data further include: behavior property;
Obtain the behavior property of the user;And
When in the behavior property of the user there are when role's risk factors, by block chain network to the behavior number of the user According to progress real-time monitoring with the risk class of the determination user.
7. such as method as claimed in any one of claims 1 to 6, which is characterized in that pass through the behavioral data and wind after screening Dangerous assessment models determine that the risk score of the behavioral data includes:
Obtain each single item behavior and corresponding Risk rated ratio in the behavioral data;And
Behavior and corresponding Risk rated ratio are inputted into the risk evaluation model with the risk score of the determination behavioral data;
Wherein, the risk evaluation model includes:
Wherein, R is risk score, and N is risk category quantity, and Fn is the priority of each risk factors, and Cn is each risk factors Risk factor.
8. a kind of user behavior data processing unit based on block chain characterized by comprising
Behavioral module, for obtaining the behavioral data of user by block chain network;
Screening module, for according in the block chain network time data and time window the behavioral data is sieved Choosing;
Grading module, for determining the risk of the behavioral data with risk evaluation model by the behavioral data after screening Scoring;And
Risk module, for determining the risk class of the user according to the risk score.
9. a kind of electronic equipment characterized by comprising
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now method as described in any in claim 1-7.
10. a kind of computer-readable medium, is stored thereon with computer program, which is characterized in that described program is held by processor The method as described in any in claim 1-7 is realized when row.
CN201810961163.4A 2018-08-22 2018-08-22 User behavior data processing method, device, electronic equipment and readable medium Pending CN109242280A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810961163.4A CN109242280A (en) 2018-08-22 2018-08-22 User behavior data processing method, device, electronic equipment and readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810961163.4A CN109242280A (en) 2018-08-22 2018-08-22 User behavior data processing method, device, electronic equipment and readable medium

Publications (1)

Publication Number Publication Date
CN109242280A true CN109242280A (en) 2019-01-18

Family

ID=65068427

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810961163.4A Pending CN109242280A (en) 2018-08-22 2018-08-22 User behavior data processing method, device, electronic equipment and readable medium

Country Status (1)

Country Link
CN (1) CN109242280A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110059984A (en) * 2019-04-30 2019-07-26 深信服科技股份有限公司 Security risk recognition methods, device, equipment and storage medium
CN110084698A (en) * 2019-04-29 2019-08-02 百度时代网络技术(北京)有限公司 Interactive system, exchange method and device based on block chain
CN110135141A (en) * 2019-04-28 2019-08-16 佛山科学技术学院 The check method and device of a kind of student's identity card based on block chain according to the true and false
CN110348999A (en) * 2019-06-29 2019-10-18 北京淇瑀信息科技有限公司 The recognition methods of financial risks sensitive users, device and electronic equipment
CN110458425A (en) * 2019-07-25 2019-11-15 腾讯科技(深圳)有限公司 Risk analysis method, device, readable medium and the electronic equipment of risk subject
CN110569909A (en) * 2019-09-10 2019-12-13 腾讯科技(深圳)有限公司 fault early warning method, device, equipment and storage medium based on block chain
WO2020248968A1 (en) * 2019-06-11 2020-12-17 Beijing Didi Infinity Technology And Development Co., Ltd. Identifying high risk trips using continuous call sequence analysis
US11645603B1 (en) 2019-12-17 2023-05-09 Wells Fargo Bank, N.A. Computer system for automatic alert assessment
CN117749530A (en) * 2024-02-19 2024-03-22 瑞达可信安全技术(广州)有限公司 Network information security analysis method and system based on big data

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107944772A (en) * 2017-12-27 2018-04-20 深圳市轱辘车联数据技术有限公司 Car based on block chain borrows risk information processing method and processing device
CN107977303A (en) * 2017-11-30 2018-05-01 努比亚技术有限公司 A kind of operation behavior monitoring method, mobile terminal and computer-readable recording medium
CN108229963A (en) * 2016-12-12 2018-06-29 阿里巴巴集团控股有限公司 The Risk Identification Method and device of user's operation behavior
CN108234463A (en) * 2017-12-22 2018-06-29 杭州安恒信息技术有限公司 A kind of consumer's risk assessment and analysis method based on multidimensional behavior model
CN108416669A (en) * 2018-03-13 2018-08-17 腾讯科技(深圳)有限公司 User behavior data processing method, device, electronic equipment and computer-readable medium
CN108432176A (en) * 2015-08-11 2018-08-21 J·斯托曼 The system and method for ensuring assets and supply chain integrality

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108432176A (en) * 2015-08-11 2018-08-21 J·斯托曼 The system and method for ensuring assets and supply chain integrality
CN108229963A (en) * 2016-12-12 2018-06-29 阿里巴巴集团控股有限公司 The Risk Identification Method and device of user's operation behavior
CN107977303A (en) * 2017-11-30 2018-05-01 努比亚技术有限公司 A kind of operation behavior monitoring method, mobile terminal and computer-readable recording medium
CN108234463A (en) * 2017-12-22 2018-06-29 杭州安恒信息技术有限公司 A kind of consumer's risk assessment and analysis method based on multidimensional behavior model
CN107944772A (en) * 2017-12-27 2018-04-20 深圳市轱辘车联数据技术有限公司 Car based on block chain borrows risk information processing method and processing device
CN108416669A (en) * 2018-03-13 2018-08-17 腾讯科技(深圳)有限公司 User behavior data processing method, device, electronic equipment and computer-readable medium

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110135141A (en) * 2019-04-28 2019-08-16 佛山科学技术学院 The check method and device of a kind of student's identity card based on block chain according to the true and false
CN110084698A (en) * 2019-04-29 2019-08-02 百度时代网络技术(北京)有限公司 Interactive system, exchange method and device based on block chain
CN110059984A (en) * 2019-04-30 2019-07-26 深信服科技股份有限公司 Security risk recognition methods, device, equipment and storage medium
WO2020248968A1 (en) * 2019-06-11 2020-12-17 Beijing Didi Infinity Technology And Development Co., Ltd. Identifying high risk trips using continuous call sequence analysis
US11481856B2 (en) 2019-06-11 2022-10-25 Beijing Didi Infinity Technology And Development Co., Ltd. Identifying high risk trips using continuous call sequence analysis
CN110348999A (en) * 2019-06-29 2019-10-18 北京淇瑀信息科技有限公司 The recognition methods of financial risks sensitive users, device and electronic equipment
CN110348999B (en) * 2019-06-29 2023-12-22 北京淇瑀信息科技有限公司 Financial risk sensitive user identification method and device and electronic equipment
CN110458425A (en) * 2019-07-25 2019-11-15 腾讯科技(深圳)有限公司 Risk analysis method, device, readable medium and the electronic equipment of risk subject
CN110569909A (en) * 2019-09-10 2019-12-13 腾讯科技(深圳)有限公司 fault early warning method, device, equipment and storage medium based on block chain
US11645603B1 (en) 2019-12-17 2023-05-09 Wells Fargo Bank, N.A. Computer system for automatic alert assessment
CN117749530A (en) * 2024-02-19 2024-03-22 瑞达可信安全技术(广州)有限公司 Network information security analysis method and system based on big data

Similar Documents

Publication Publication Date Title
CN109242280A (en) User behavior data processing method, device, electronic equipment and readable medium
WO2020108046A1 (en) Cross-block chain interaction method and system, computer device, and storage medium
CN112132198B (en) Data processing method, device and system and server
CN109102340A (en) Service evaluation method, apparatus, electronic equipment and medium based on block chain
CN112348660A (en) Method and device for generating risk warning information and electronic equipment
US11563727B2 (en) Multi-factor authentication for non-internet applications
CN109003192A (en) A kind of insurance underwriting method and relevant device based on block chain
CN110109905A (en) Risk list data generation method, device, equipment and computer storage medium
CN111461739A (en) Bank mobile comprehensive service system and device suitable for second-level legal person
US20170091666A1 (en) System framework processor for channel contacts
CN112418859B (en) Block chain consensus method and device, electronic equipment and readable storage medium
CN109147918A (en) Reserve matching process, device, electronic equipment and computer-readable medium
CN109102852A (en) User data processing method, device, electronic equipment and computer-readable medium
CN111861716B (en) Method for generating monitoring early warning level in credit based on software system
WO2022018574A1 (en) System and method for assessment of crypto and digital assests
US20200387843A1 (en) Risk management of processes utilizing personal data
CN108108963A (en) For the method and device warned to contract
CN112634017A (en) Remote card opening activation method and device, electronic equipment and computer storage medium
CN116956326A (en) Authority data processing method and device, computer equipment and storage medium
CN111639916A (en) Online auditing method, system and readable storage medium based on block chain technology and deep learning
CN114357403A (en) User login request processing method and device based on equipment credibility and equipment
KR20160127920A (en) Cyber bigdata trade system and method
CN110362981A (en) The method and system of abnormal behaviour are judged based on credible equipment fingerprint
US20230032963A1 (en) Method and system for validating financial events and security events
CN111950836A (en) Intelligent tax planning robot for real estate industry and robot service method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190118

RJ01 Rejection of invention patent application after publication