CN109446030A - A kind of behavior monitoring method and device - Google Patents

A kind of behavior monitoring method and device Download PDF

Info

Publication number
CN109446030A
CN109446030A CN201811339201.9A CN201811339201A CN109446030A CN 109446030 A CN109446030 A CN 109446030A CN 201811339201 A CN201811339201 A CN 201811339201A CN 109446030 A CN109446030 A CN 109446030A
Authority
CN
China
Prior art keywords
information
business operation
user
behavior
operation behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811339201.9A
Other languages
Chinese (zh)
Inventor
袁春旭
赵军
郭阳
王俊杰
孙悦
郭晓鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Core Time Technology Co Ltd
Original Assignee
Beijing Core Time Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Core Time Technology Co Ltd filed Critical Beijing Core Time Technology Co Ltd
Priority to CN201811339201.9A priority Critical patent/CN109446030A/en
Publication of CN109446030A publication Critical patent/CN109446030A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Abstract

This application provides a kind of behavior monitoring method and devices, comprising: obtains the business operation request of user;The business operation request includes operation behavior information and the identification information of the user;Based on preset regular expression, determine whether the operation behavior information is target monitoring information;In the case where the operation behavior information is the target monitoring information, it is based on the identification information, requests corresponding business operation behavior to be monitored the business operation of the user.Whether the operation behavior that the embodiment of the present application can judge automatically user needs to monitor, and does not need bury a little in client and operation system, and then cooperates without developer, and easy to operate, practicability is higher.

Description

A kind of behavior monitoring method and device
Technical field
This application involves net application technology fields, in particular to a kind of behavior monitoring method and device.
Background technique
In contemporary life, for convenience, more and more business can be operated based on electronic products such as computer, mobile phones.Example As government organs high level personnel can check classified papers by the client of computer;Individual can pass through e-bank's client Handle the business such as transfer accounts.
In order to ensure the safety during business handling, in the prior art, not only need usual in business service system Bury a little using in client, after burying and being a little activated, the operation behavior of user is monitored.
But since an existing technology of burying is to realize in the application system for will bury point code insertion client to user's Operation behavior is monitored, once it then needs corresponding update to bury point code, needs system development in this way, client updates Personnel, which cooperate to update, buries point code, and complicated for operation to the more demanding of technical staff, practicability is poor.
Summary of the invention
In view of this, the embodiment of the present application is designed to provide a kind of behavior monitoring method and device, it can be automatic Judge whether the operation behavior of user needs to monitor, does not need bury a little in the corresponding application system of client, and then be not necessarily to Developer's cooperation, easy to operate, practicability is higher.
In a first aspect, the embodiment of the present application provides a kind of behavior monitoring method, comprising:
Obtain the business operation request of user;Business operation request include operation behavior information and with the user Identification information;
Based on pre-defined rule, determine whether the operation behavior information is target monitoring information;
In the case where the operation behavior information is the target monitoring information, it is based on the identification information, it is right The business operation of the user requests corresponding business operation behavior to be monitored.
With reference to first aspect, the embodiment of the present application provides the first possible embodiment of first aspect, wherein institute It states based on the identification information, requests corresponding business operation behavior to be supervised the business operation of the user It surveys, comprising:
According to the target monitoring information, the risk class of the business operation behavior is determined;
When the risk class is greater than the risk level threshold, ID authentication request is initiated to user;
In the case where user identity authentication passes through, the business operation request is forwarded to server.
With reference to first aspect, the embodiment of the present application provides second of possible embodiment of first aspect, wherein packet It includes:
Identity information corresponding with the identification information is matched from data pool using the identification information;
The identity information is associated with the business operation behavior.
The possible embodiment of second with reference to first aspect, the embodiment of the present application provide the third of first aspect Possible embodiment, wherein it is described in the case where user identity authentication passes through, forward the business operation to ask to server It asks and includes:
It is requested based on the business operation, generates object run information;
Based on the object run information and the identity information, to server request and the object run information pair The target information answered;
Receive the target information of the server feedback.
The third possible embodiment with reference to first aspect, the embodiment of the present application provide the 4th kind of first aspect Possible embodiment, wherein include:
The target information is stored, and/or the target information is analyzed.
Second aspect, the embodiment of the present application also provide a kind of behavior monitoring device, comprising:
Module is obtained, the business operation for obtaining user is requested;The business operation request includes operation behavior information And the identification information with the user;
Determining module determines whether the operation behavior information is target monitoring information for being based on pre-defined rule;
Monitoring modular, for being based on the body in the case where the operation behavior information is the target monitoring information Part identification information requests corresponding business operation behavior to be monitored the business operation of the user.
In conjunction with second aspect, the embodiment of the present application provides the first possible embodiment of second aspect, wherein institute It states monitoring modular to be specifically used for being based on the identification information by following manner, the business operation of the user is asked Corresponding business operation behavior is asked to be monitored, comprising:
According to the target monitoring information, the risk class of the business operation behavior is determined;
When the risk class is greater than the risk level threshold, ID authentication request is initiated to user;
In the case where user identity authentication passes through, the business operation request is forwarded to server.
In conjunction with second aspect, the embodiment of the present application provides second of possible embodiment of second aspect, wherein institute Stating device further includes relating module;
The relating module, for being matched from data pool and the identification information using the identification information Corresponding identity information;The identity information is associated with the business operation behavior.
In conjunction with second of possible embodiment of second aspect, the embodiment of the present application provides the third of second aspect Possible embodiment, wherein the monitoring modular is specifically used for through following manner the case where user identity authentication passes through Under, the business operation request is forwarded to server:
It is requested based on the business operation, generates object run information;
Based on the object run information and the identity information, to server request and the object run information pair The target information answered;
Receive the target information of the server feedback.
In conjunction with the third possible embodiment of second aspect, the embodiment of the present application provides the 4th kind of second aspect Possible embodiment, wherein described device further includes storage analysis module;
The storage analysis module is specifically used for storing the target information, and/or divides the target information Analysis.
The third aspect, the embodiment of the present application also provide a kind of electronic equipment, comprising: processor, memory and bus, it is described Memory is stored with the executable machine readable instructions of the processor, when electronic equipment operation, the processor with it is described By bus communication between memory, the machine readable instructions executed when being executed by the processor it is above-mentioned in a first aspect, or Step in first aspect in any possible embodiment.
Fourth aspect, the embodiment of the present application also provide a kind of computer readable storage medium, the computer-readable storage medium Computer program is stored in matter, which executes above-mentioned in a first aspect, or in first aspect when being run by processor Step in any possible embodiment.
Behavior monitoring method provided by the embodiments of the present application and device are asked using the business operation that gateway obtains user It asks;Wherein, operation behavior information and the identification information of user are carried in business operation request;Use preset canonical Expression formula, to determine whether business operation information is target monitoring information, when business operation information is target monitoring information It waits, according to the identification information of user, requests corresponding business operation behavior to be monitored the business operation of user, and it is existing There is will realize in the application system for burying point code insertion client in technology to be monitored the operation behavior of user, in this way, Once client updates, then needs corresponding update to bury point code, need system developer that update is cooperated to bury point code, it is right Developer's is more demanding, complicated for operation, and practicability is poor to be compared, and whether the operation behavior that can judge automatically user needs It monitors, does not need bury a little in client and operation system, and then cooperate without developer, it is easy to operate, it is practical Property is higher.
To enable the above objects, features, and advantages of the application to be clearer and more comprehensible, preferred embodiment is cited below particularly, and cooperate Appended attached drawing, is described in detail below.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 shows a kind of flow chart of behavior monitoring method provided by the embodiment of the present application;
Fig. 2 shows in behavior monitoring method provided by the embodiment of the present application, it is based on the identification information, to institute The flow chart for the specific method that the business operation for stating user requests corresponding business operation behavior to be monitored;
Fig. 3 shows a kind of schematic diagram of behavior monitoring device provided by the embodiment of the present application;
Fig. 4 shows the schematic diagram of a kind of electronic equipment provided by the embodiment of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the embodiment of the present application clearer, below in conjunction with the embodiment of the present application Middle attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only It is some embodiments of the present application, instead of all the embodiments.The application being usually described and illustrated herein in the accompanying drawings is real The component for applying example can be arranged and be designed with a variety of different configurations.Therefore, below to the application's provided in the accompanying drawings The detailed description of embodiment is not intended to limit claimed scope of the present application, but is merely representative of the selected reality of the application Apply example.Based on embodiments herein, those skilled in the art institute obtained without making creative work There are other embodiments, shall fall in the protection scope of this application.
Currently, in order to ensure user is using the safety in the client process on electronic product, using in client Bury a little, when corresponding business operation behavior occurs, then can trigger to bury a little being monitored to the behavior of user, but It is to be monitored to the behavior of user using burying a technology, refers to and refer to one section of code insertion in the application system of client, when It when client updates, is also required to be updated then burying a little corresponding code, and updates and bury a little corresponding code, need to answer Cooperated with the developer of system, therefore to the more demanding of technical staff, complicated for operation, practicability is poor.
It has been investigated that gateway is arranged between client and service server, using gateway to the operation behavior of user It is monitored, and match whether the operation behavior of user is the operation behavior for needing to monitor by regular expression, does not need Bury a little in the corresponding application system of client.
Based on the studies above, this application provides a kind of behavior monitoring method and devices, can judge automatically user's Whether my operation behavior needs to monitor, and does not need bury a little in the corresponding application system of client, and then is not necessarily to exploit person Member's cooperation, easy to operate, practicability is higher.
For defect present in above scheme, be inventor being obtained after practicing and carefully studying as a result, Therefore, the discovery procedure of the above problem and the solution that hereinafter the application is proposed regarding to the issue above all should be The contribution that inventor makes the application during the application.
Below in conjunction with attached drawing in the application, the technical solution in the application is clearly and completely described, it is clear that Described embodiments are only a part of embodiments of the present application, instead of all the embodiments.Usually retouched in attached drawing here The component for the application for stating and showing can be arranged and be designed with a variety of different configurations.Therefore, below to mentioning in the accompanying drawings The detailed description of the embodiments herein of confession is not intended to limit claimed scope of the present application, but is merely representative of this The selected embodiment of application.Based on embodiments herein, those skilled in the art are in the premise for not making creative work Under every other embodiment obtained, shall fall in the protection scope of this application.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.
For convenient for understanding the present embodiment, first to a kind of behavior monitoring method disclosed in the embodiment of the present application into Row is discussed in detail, and the executing subject of behavior monitoring method is between client and service server provided by the embodiment of the present application The gateway of setting.
Embodiment one
Shown in Figure 1, for the flow chart for the behavior monitoring method that the embodiment of the present application one provides, the method includes steps Rapid S101~S103, in which:
S101: the business operation request of user is obtained;Business operation request includes operation behavior information and described The identification information of user.
When specific implementation, when user customer is operated, corresponding business, example can be requested to operation system Such as: logging in, bank transfer business, user requests to consult personal data etc., then business operation request is exactly user to business The solicited message of system request business, identification information can be stored in the number that user identity is identified in user client According to such as cookie.
When user is when client operates, gateway can get user to the corresponding industry of operation system requested service Business operation requests.
S102: it is based on preset regular expression, determines whether the operation behavior information is target monitoring information.
When specific implementation, gateway is provided with filtering module, and regular expression is arranged in filtering module, gateway Place also saves multiple business operation behavioral datas of monitoring in need, by regular expression, can match and believe with operation behavior Corresponding business operation behavioral data is ceased, when being matched to business operation behavioral data corresponding with operation behavior information, then table Show that operation behavior information is target monitoring information.
Such as: for user when carrying out transferred account service, the operation behaviors such as the frequency transferred accounts, the amount of money transferred accounts are to need to supervise It surveys, then Monitoring Rules are then arranged using regular expression, and the operation behaviors pair such as the frequency transferred accounts, the amount of money transferred accounts The business operation behavioral data answered, when using regular expression matching to the operation behaviors such as the frequency transferred accounts, the amount of money transferred accounts Corresponding business operation behavioral data, then the operation behaviors such as this frequency transferred accounts, the amount of money transferred accounts need gateway to be monitored, It that is to say target monitoring information.
S103: in the case where the operation behavior information is the target monitoring information, believed based on the identity Breath requests corresponding business operation behavior to be monitored the business operation of the user.
When specific implementation, when determining operation behavior information is object detection information, according to identity Information matches user identity corresponding with identification information in data pool, determines that business operation requests corresponding identity letter Breath, determine user identity, after determining user identity, the identity information of user and business operation behavior be associated, to The business operation behavior at family is monitored.
Specifically, shown in Figure 2, the embodiment of the present application is also provided based on the identification information, to the user The business operation specific method of requesting corresponding business operation behavior to be monitored flow chart, the method includes steps Rapid S201~S203, in which:
S201: according to the target monitoring information, the risk class of the business operation behavior is determined.
S202: when the risk class is greater than the risk level threshold, ID authentication request is initiated to user.
S203: in the case where user identity authentication passes through, the business operation request is forwarded to server.
When specific implementation, the risk class of business operation behavior can determine according to target monitoring information, such as: Target monitoring information is to transfer accounts quantity, and business operation behavior is to transfer accounts 800,000, then corresponding 800,000 this business of transferring accounts Operation behavior is that have existing for certain risk, after determining corresponding risk class, then by risk class and risk level threshold It is compared, in the case where risk class is greater than risk level threshold, ID authentication request is initiated to user, to user identity It is authenticated, e.g., carries out authentication using the mode of recognition of face, the authentication etc. of user is carried out using fingerprint, After authentication passes through, business operation request is transmitted to server, finishing service operation.
Specifically, the embodiment of the present application is also provided in the case where user identity authentication passes through, to described in server forwarding The specific method of business operation request, comprising:
It is requested based on the business operation, generates object run information;
Based on the object run information and the identity information, to server request and the object run information pair The target information answered;
Receive the target information of the server feedback.
It when specific implementation, is requested according to business operation, generates object run information, such as: business operation request It is to transfer accounts, number of transferring accounts is 8,000,000, then generating object run information is to transfer accounts 8,000,000.Generate object run information Afterwards, the corresponding identity information of corresponding object run information requests target information corresponding with object run information to server, and Receive the target information that server feedback is returned.
After the target information for receiving server feedback, target information is stored, is needing the business behaviour to user When analysis as behavior, the target information stored is called to analyze target information, and then analyzes the industry of user Business operation behavior.
Embodiment two
The embodiment of the present application two also provides another behavior monitoring method, comprising:
Obtain the business operation request of user;The business operation request includes operation behavior information and the user Identification information;
Based on the identification information, using preset regular expression, determine the operation behavior information whether be Target monitoring information;
In the case where the operation behavior information is the target monitoring information, the business operation of the user is requested Corresponding business operation behavior is monitored.
When specific implementation, according to identification information, matched in data pool corresponding with identification information User identity determines that business operation requests corresponding identity information, determines user identity.After determining user identity, by user Identity information be associated with business operation behavior, and by regular expression, match industry corresponding with operation behavior information Business operation behavior data, when being matched to business operation behavioral data corresponding with operation behavior information, then it represents that operation behavior Information is target monitoring information, when determining operation behavior information is object detection information, to the business operation row of user To be monitored.
Behavior monitoring method provided by the embodiments of the present application is requested using the business operation that gateway obtains user;Wherein, industry Operation behavior information and the identification information of user are carried in business operation requests;Using preset regular expression, come Determine whether business operation information is target monitoring information, when business operation information is target monitoring information, according to The identification information at family requests corresponding business operation behavior to be monitored the business operation of user, and in the prior art The application system that will bury point code insertion client in realize the operation behavior of user be monitored, once in this way, client End updates, then needs corresponding update to bury point code, need system developer that update is cooperated to bury point code, to developer It is more demanding, complicated for operation, practicability is poor to be compared, and whether the operation behavior that can judge automatically user needs to monitor, It does not need bury a little in client and operation system, and then cooperates without developer, easy to operate, practicability is higher.
Based on the same inventive concept, behavior monitoring dress corresponding with behavior monitoring method is additionally provided in the embodiment of the present application It sets, since the principle that the device in the embodiment of the present application solves the problems, such as is similar to the above-mentioned behavior monitoring method of the embodiment of the present application, Therefore the implementation of device may refer to the implementation of method, and overlaps will not be repeated.
Embodiment three
Referring to shown in Fig. 3, for a kind of schematic diagram for behavior monitoring device that the embodiment of the present application five provides, described device packet It includes: obtaining module 31, determining module 32, monitoring modular 33;Wherein,
Module 31 is obtained, the business operation for obtaining user is requested;The business operation request includes that operation behavior is believed Breath and the identification information with the user;
Determining module 32 determines whether the operation behavior information is target prison for being based on preset regular expression Measurement information;
Monitoring modular 33, for being based on described in the case where the operation behavior information is the target monitoring information Identification information requests corresponding business operation behavior to be monitored the business operation of the user.
In a kind of possible embodiment, monitoring modular 33 is specifically used for being based on identity letter by following manner Breath requests corresponding business operation behavior to be monitored the business operation of the user, comprising:
According to the target monitoring information, the risk class of the business operation behavior is determined;
When the risk class is greater than the risk level threshold, ID authentication request is initiated to user;
In the case where user identity authentication passes through, the business operation request is forwarded to server.
In a kind of possible embodiment, described device further includes relating module 34;
The relating module 34 is believed for being matched from data pool using the identification information with the identity Cease corresponding identity information;The identity information is associated with the business operation behavior.
In a kind of possible embodiment, monitoring modular 33 is specifically used for passing through by following manner in user identity authentication In the case where, the business operation request is forwarded to server:
It is requested based on the business operation, generates object run information;
Based on the object run information and the identity information, to server request and the object run information pair The target information answered;
Receive the target information of the server feedback.
In a kind of possible embodiment, described device further includes storage analysis module 35;
The storage analysis module is specifically used for storing the target information, and/or divides the target information Analysis.
Description about the interaction flow between the process flow and each module of each module in device is referred to The related description in embodiment of the method is stated, I will not elaborate.
Corresponding to the behavior monitoring method in Fig. 1, the embodiment of the present application also provides a kind of electronic equipment, as shown in figure 4, The equipment includes memory 41, processor 42, bus 43 and is stored on the memory 41 and can run on the processor 42 Computer program, wherein the step of above-mentioned processor 42 realizes above-mentioned behavior monitoring method when executing above-mentioned computer program.
Specifically, above-mentioned memory 41 and processor 42 can be general memory and processor, not do here specific It limits, when the computer program of 42 run memory 41 of processor storage, above-mentioned behavior monitoring method is able to carry out, to solve It will certainly be realized in the application system for burying point code insertion client in the prior art and the operation behavior of user be monitored, this Sample then needs corresponding update to bury point code, needs system developer that update is cooperated to bury a generation once client updates Code, complicated for operation to the more demanding of developer, the poor technical problem of practicability reaches the operation for judging automatically user Whether behavior, which needs, monitors, and does not need bury a little in client and operation system, and then cooperates without developer, operation Simply, effect more practical.
Corresponding to the behavior monitoring method in Fig. 1, the embodiment of the present application also provides a kind of computer readable storage medium, It is stored with computer program on the computer readable storage medium, which executes above-mentioned behavior when being run by processor The step of monitoring method.
Specifically, which can be general storage medium, such as mobile disk, hard disk, on the storage medium Computer program when being run, above-mentioned behavior monitoring method is able to carry out, to solve that point code will be buried in the prior art embedding Enter to realize in the application system of client and be monitored the operation behavior of user, once it then needs in this way, client updates It corresponds to update and buries point code, need system developer that update is cooperated to bury point code, to the more demanding of developer, operation Whether complexity, the poor technical problem of practicability reach and judge automatically the operation behavior of user and need to monitor, do not need in client End and operation system bury a little, and then cooperate without developer, easy to operate, effect more practical.
The computer program product of behavior monitoring method and device provided by the embodiment of the present application, including store journey The computer readable storage medium of sequence code, the instruction that said program code includes can be used for executing institute in previous methods embodiment The method stated, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.In the application In provided several embodiments, it should be understood that disclosed systems, devices and methods, it can be real by another way It is existing.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, only a kind of logic function It can divide, there may be another division manner in actual implementation, in another example, multiple units or components can combine or can collect At another system is arrived, or some features can be ignored or not executed.Another point, shown or discussed mutual coupling Conjunction or direct-coupling or communication connection can be the indirect coupling or communication connection by some communication interfaces, device or unit, It can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in the executable non-volatile computer-readable storage medium of a processor.Based on this understanding, the application Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with software in other words The form of product embodies, which is stored in a storage medium, including some instructions use so that One computer equipment (can be personal computer, server or the network equipment etc.) executes each embodiment institute of the application State all or part of the steps of method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk etc. is various to deposit Store up the medium of program code.
Finally, it should be noted that embodiment described above, the only specific embodiment of the application, to illustrate the application Technical solution, rather than its limitations, the protection scope of the application is not limited thereto, although with reference to the foregoing embodiments to this Shen It please be described in detail, those skilled in the art should understand that: anyone skilled in the art Within the technical scope of the present application, it can still modify to technical solution documented by previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of the embodiment of the present application technical solution, should all cover the protection in the application Within the scope of.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.

Claims (10)

1. a kind of behavior monitoring method characterized by comprising
Obtain the business operation request of user;The business operation request includes operation behavior information and the identity of the user Identification information;
Based on preset regular expression, determine whether the operation behavior information is target monitoring information;
In the case where the operation behavior information is the target monitoring information, it is based on the identification information, to described The business operation of user requests corresponding business operation behavior to be monitored.
2. the method according to claim 1, wherein described be based on the identification information, to the user The business operation request corresponding business operation behavior to be monitored, comprising:
According to the target monitoring information, the risk class of the business operation behavior is determined;
When the risk class is greater than the risk level threshold, ID authentication request is initiated to user;
In the case where user identity authentication passes through, the business operation request is forwarded to server.
3. according to right want 1 described in method characterized by comprising
Identity information corresponding with the identification information is matched from data pool using the identification information;
The identity information is associated with the business operation behavior.
4. according to the method described in claim 3, it is characterized in that, described in the case where user identity authentication passes through, to clothes The business device forwarding business operation is requested
It is requested based on the business operation, generates object run information;
Based on the object run information and the identity information, requested to server corresponding with the object run information Target information;
Receive the target information of the server feedback.
5. according to the method described in claim 4, it is characterized by further comprising: being stored to the target information, and/or to institute Target information is stated to be analyzed.
6. a kind of behavior monitoring device characterized by comprising
Module is obtained, the business operation for obtaining user is requested;Business operation request include operation behavior information and With the identification information of the user;
Determining module determines whether the operation behavior information is target monitoring information for being based on preset regular expression;
Monitoring modular, for being based on the identity mark in the case where the operation behavior information is the target monitoring information Know information, requests corresponding business operation behavior to be monitored the business operation of the user.
7. device according to claim 6, which is characterized in that the monitoring modular is specifically used for being based on by following manner The identification information requests corresponding business operation behavior to be monitored the business operation of the user, comprising:
According to the target monitoring information, the risk class of the business operation behavior is determined;
When the risk class is greater than the risk level threshold, ID authentication request is initiated to user;
In the case where user identity authentication passes through, the business operation request is forwarded to server.
8. device according to claim 6, which is characterized in that described device further includes relating module;
The relating module, it is corresponding with the identification information for being matched from data pool using the identification information Identity information;The identity information is associated with the business operation behavior.
9. device according to claim 8, which is characterized in that the monitoring modular be specifically used for by following manner with In the case that family authentication passes through, the business operation request is forwarded to server:
It is requested based on the business operation, generates object run information;
Based on the object run information and the identity information, requested to server corresponding with the object run information Target information;
Receive the target information of the server feedback.
10. device according to claim 9, which is characterized in that described device further includes storage analysis module;
The storage analysis module is specifically used for storing the target information, and/or analyzes the target information.
CN201811339201.9A 2018-11-12 2018-11-12 A kind of behavior monitoring method and device Pending CN109446030A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811339201.9A CN109446030A (en) 2018-11-12 2018-11-12 A kind of behavior monitoring method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811339201.9A CN109446030A (en) 2018-11-12 2018-11-12 A kind of behavior monitoring method and device

Publications (1)

Publication Number Publication Date
CN109446030A true CN109446030A (en) 2019-03-08

Family

ID=65551969

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811339201.9A Pending CN109446030A (en) 2018-11-12 2018-11-12 A kind of behavior monitoring method and device

Country Status (1)

Country Link
CN (1) CN109446030A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443677A (en) * 2019-07-05 2019-11-12 五八有限公司 A kind of information processing method and device
CN112398792A (en) * 2019-08-15 2021-02-23 奇安信安全技术(珠海)有限公司 Login protection method, client, central control management equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110022214A1 (en) * 2009-07-23 2011-01-27 Bernhard Glomann Method for Monitoring Operation Behaviour of a Component of an Industrial Plant
CN103679031A (en) * 2013-12-12 2014-03-26 北京奇虎科技有限公司 File virus immunizing method and device
CN103927253A (en) * 2013-01-11 2014-07-16 阿里巴巴集团控股有限公司 Multiple browser compatibility testing method and system
CN105306204A (en) * 2014-07-04 2016-02-03 腾讯科技(深圳)有限公司 Security verification method, device and system
CN105959180A (en) * 2016-06-12 2016-09-21 乐视控股(北京)有限公司 Data detection method and device
CN108574605A (en) * 2017-03-07 2018-09-25 中国移动通信有限公司研究院 A kind of acquisition method and device of user behavior data

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110022214A1 (en) * 2009-07-23 2011-01-27 Bernhard Glomann Method for Monitoring Operation Behaviour of a Component of an Industrial Plant
CN103927253A (en) * 2013-01-11 2014-07-16 阿里巴巴集团控股有限公司 Multiple browser compatibility testing method and system
CN103679031A (en) * 2013-12-12 2014-03-26 北京奇虎科技有限公司 File virus immunizing method and device
CN105306204A (en) * 2014-07-04 2016-02-03 腾讯科技(深圳)有限公司 Security verification method, device and system
CN105959180A (en) * 2016-06-12 2016-09-21 乐视控股(北京)有限公司 Data detection method and device
CN108574605A (en) * 2017-03-07 2018-09-25 中国移动通信有限公司研究院 A kind of acquisition method and device of user behavior data

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110443677A (en) * 2019-07-05 2019-11-12 五八有限公司 A kind of information processing method and device
CN112398792A (en) * 2019-08-15 2021-02-23 奇安信安全技术(珠海)有限公司 Login protection method, client, central control management equipment and storage medium
CN112398792B (en) * 2019-08-15 2022-07-05 奇安信安全技术(珠海)有限公司 Login protection method, client, central control management equipment and storage medium

Similar Documents

Publication Publication Date Title
EP3497609B1 (en) Detecting scripted or otherwise anomalous interactions with social media platform
CN105051693B (en) Method, equipment and system for managing computer server capacity
CN107918733A (en) The system and method for detecting the malicious element of webpage
US10817813B2 (en) Resource configuration and management system
CN109478263A (en) System and equipment for architecture assessment and strategy execution
CN110383795A (en) Serverless backup cloud management platform based on service graph
CN109246027B (en) Network maintenance method and device and terminal equipment
CN109710942A (en) Construction method and device, the electronic equipment of map
CN109446030A (en) A kind of behavior monitoring method and device
CN113867782A (en) Gray scale distribution method and device, computer equipment and storage medium
GB2604787A (en) Systems and methods for objective-based skill training
CN110457118A (en) Task processing method, device, computer equipment and storage medium
CN112711640A (en) Method and device for configuring business handling process
CN110852761B (en) Method and device for formulating anti-cheating strategy and electronic equipment
CN115705255A (en) Learning causal relationships
US20230362112A1 (en) Virtual-assistant-based resolution of user inquiries via failure-triggered document presentation
CN109426551A (en) A kind of transaction methods and system
CN110059175A (en) A kind of method and device of information on services processing
Chevallier et al. Detection of dependence patterns with delay
CN110209558A (en) Intelligent operation and maintenance method and device based on software definition storage
CN110263551A (en) A kind of test method and device
CN104462484B (en) Data processing method, data processor and system
CN109214189A (en) Method, apparatus, storage medium and the electronic equipment of recognizer loophole
EP3131014B1 (en) Multi-data analysis based proactive defect detection and resolution
CN109902698A (en) Information generating method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190308

RJ01 Rejection of invention patent application after publication