WO2020071938A1 - Procédé et système de marquage des activités d'un utilisateur pour analyse et stockage ultérieurs - Google Patents

Procédé et système de marquage des activités d'un utilisateur pour analyse et stockage ultérieurs

Info

Publication number
WO2020071938A1
WO2020071938A1 PCT/RU2018/000648 RU2018000648W WO2020071938A1 WO 2020071938 A1 WO2020071938 A1 WO 2020071938A1 RU 2018000648 W RU2018000648 W RU 2018000648W WO 2020071938 A1 WO2020071938 A1 WO 2020071938A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
actions
resource
identifier
encryption key
Prior art date
Application number
PCT/RU2018/000648
Other languages
English (en)
Russian (ru)
Inventor
Федор Иванович КРЕСТНИКОВ
Кирилл Сергеевич МЕЛЬНИКОВ
Кирилл Александрович ПАНИН
Original Assignee
Публичное Акционерное Общество "Сбербанк России"
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Публичное Акционерное Общество "Сбербанк России" filed Critical Публичное Акционерное Общество "Сбербанк России"
Publication of WO2020071938A1 publication Critical patent/WO2020071938A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/40Data acquisition and logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Definitions

  • This technical solution in General, relates to the processing of digital data, and in particular, to a method and system for marking user actions for subsequent analysis and accumulation.
  • a technical problem or task in this technical solution is the need to create a method for collecting information about user actions, as well as verifying this information for the current user profile in order to relevantly monitor his actions on the corresponding Internet resource.
  • the technical result is the provision of a method for verified collection of user activity data associated with its activity, by using encryption of a unique user identifier used during a session of a user accessing a resource on the Internet to link monitoring results with a user profile.
  • An additional technical result is to increase the protection of data collection of user actions by applying the cryptographic protection procedure of the user ID.
  • the claimed method for marking user actions for subsequent analysis and accumulation includes the steps in which:
  • user actions include at least one of: a cursor path, interaction with a graphical interface element, time finding the cursor on a graphical interface element, scrolling a web resource page, switching to a web resource of another domain, transaction data.
  • each committed action contains a unique identifier (UID).
  • UID unique identifier
  • the claimed solution is also carried out through a user action marking system for subsequent analysis and accumulation, which contains at least one processor and at least one memory medium containing machine-readable instructions that, when executed by the processor, implement the above method.
  • FIG. 1 illustrates a block diagram of an implementation of the inventive method for marking and storing data.
  • FIG. 2 illustrates an example system for implementing the method.
  • FIG. 3 illustrates a flowchart of a method for selecting relevant offers.
  • FIG. 4 illustrates an example of processing information of interest to a user.
  • FIG. 5 illustrates an example computing device.
  • This technical solution can be implemented on a computer, in the form of an automated information system (AIS) or a machine-readable medium containing instructions for performing the above method.
  • AIS automated information system
  • the technical solution can be implemented as a distributed computer system, which can be installed on a centralized server (a set of servers).
  • User access to the system is possible both from the Internet and from the internal network of the enterprise / organization through a mobile communication device on which software with the corresponding graphical user interface is installed, or personal a computer with access to the web version of the system with the corresponding graphical user interface.
  • a system refers to a computer system, a computer (electronic computer), CNC (numerical control), PLC (programmable logic controller), computerized control systems, and any other devices that can perform a given, well-defined sequence of computing operations (actions, instructions).
  • An instruction processing device is understood to mean an electronic unit or an integrated circuit (microprocessor) executing machine instructions (programs).
  • An instruction processing device reads and executes machine instructions (programs) from one or more data storage devices.
  • Data storage devices may include, but are not limited to, hard disks (HDDs), flash memory, ROM (read only memory), solid state drives (SSDs), and optical drives.
  • a program is a sequence of instructions for execution by a computer control device or an instruction processing device.
  • FIG. 1 shows a general diagram of the implementation of a method 100 for marking user actions for subsequent analysis and accumulation.
  • At the first stage 101 at least one public and private encryption key is generated for a certain period of validity (day, week, month, etc.). After the set period of validity of the keys, they are deactivated.
  • the encryption method may be selected from various known solutions, for example, the RSA algorithm that performs encryption of public key data, known by AIS.
  • Key deactivation refers to the deletion of the current version of the keys when the set date of their validity expires, because they can no longer be used to identify the user in AIS when decrypting information.
  • new keys are subsequently generated.
  • a user contacts the service channel via the Internet from a personal computer device, in particular, when accessing a website (website page), or a software application installed on a user's device, an authentication procedure is performed. For each user, an encrypted unique identifier (UID) is prepared using the public key.
  • UID encrypted unique identifier
  • the encryption method can be selected from various known solutions, for example, a one-way encryption mechanism using salt (for example, sha1 or sha2), which allows you to get a unique key that can not be decrypted.
  • salt for example, sha1 or sha2
  • the created MIA is recorded in service type files stored on the user's computer device, for example, Internet session files or cookies (step 103).
  • service type files stored on the user's computer device, for example, Internet session files or cookies (step 103).
  • the data in the service file is updated.
  • the MIA may be permanent or temporary.
  • a temporary UID is created in the absence of user profile information in the authentication system located on the server (to be described below). If there is information about the user profile that previously accessed the corresponding resource, the corresponding UID is stored in the authentication system.
  • At step 104 at least one code (script, program) is generated on the resource for which it is necessary to monitor user activity, which contains the encrypted user ID for identifying it and performing appropriate monitoring.
  • a script can be used that is responsible for sending messages about user actions on the resource, for example, clickstream or click path, which allow you to track the transition chain.
  • a resource is understood, for example, a page of a website or a software application.
  • the code may be a personal page of a website or software application interface.
  • the analysis of user actions in step 105 is to monitor the occurring events on the resource with which user interaction is performed.
  • Such actions can be, for example, the trajectory of the cursor, the interaction with the graphical interface element, the time spent by the cursor on the graphical interface element, scrolling a web resource page, switching to a web resource of another domain, transaction data, downloading files, switching from a resource to social networks, etc.
  • the obtained information about the actions of the user at step 106 is stored and transmitted along with the private key to the authentication system for subsequent decryption of the UID and matching actions by the user and his profile (step 107).
  • Each action also contains a UID for storing and analyzing the corresponding types of identified actions.
  • the MIA may be associated with information such as: a user's telephone number, email address, user's full name, payment card number, etc.
  • FIG. 2 presents a General view of the system of interaction of elements of the claimed solution.
  • a user using a computer device 200 for example, a smartphone, personal computer, tablet, game console, smart TV, wearable smart device, etc., interacts with a web resource 250, for example, a website or software application (for example, Sberbank Online).
  • a web resource 250 for example, a website or software application (for example, Sberbank Online).
  • the fact of user interaction on the resource 250 is recorded on the managing server 300.
  • the server 300 contains the necessary software and hardware for organizing the work of the necessary functions to implement the claimed method 100.
  • automated code generation is performed to monitor user actions on the web resource 250.
  • UID is created for the user, or it is selected from the database (DB) of server 330, if the user is already registered in the system.
  • Information about user actions on the web resource is also subsequently stored in the database 330. Data on user actions is also transmitted to the event handler module 340, which provides the selection of relevant offers for users based on the analysis of their activity (actions) on the web resource 250 (Internet resource).
  • FIG. 3 a general diagram of the implementation of a method for selecting proposals 400 for a user based on monitoring data of his actions on a web resource 250 is presented. Based on the information received about user actions (step 401), a data analysis is performed on a web resource 250 using an automated system (step 402) to identify relevant offers for the corresponding user profile.
  • the analysis of user actions 401 may be performed according to various criteria.
  • the analysis can be carried out according to the user's transactions (website, POS-terminals, ATM, self-service device, etc.) made both using the web resource 250 on the Internet (website or software application), and payment by means of payment (debit, credit cards), which are subsequently processed on the server of the payment system and transferred to DB 330 when comparing them with the data of the corresponding user.
  • the analysis of information may occur based on data characterizing the type of product or information corresponding to the interest of the user, for example, on the basis of obtaining data fixing the time spent by the user on the corresponding tab of the website or his interaction with the application interface (for example, a credit calculator , issuing a credit card, opening a deposit).
  • the recorded user actions are used to form the attributes of an event or user service vector during subsequent calls to the channel.
  • business events and / or complex events are generated, which are automatically analyzed and processed by business rules implemented using software logic that interacts with server 300, in particular, using an event handler module 340.
  • business rules implemented using software logic that interacts with server 300, in particular, using an event handler module 340.
  • a specific product is searched at step 403 and a message is sent to the user with its description at step 404
  • a business event is a system-processed event generated by a user of a resource 250 (for example, completed card transactions, switching to a product description on a website, etc.).
  • Business- rules are a sequence of analysis and processing of user business events.
  • module 340 may use the following data: contact information, age, gender, segment, region, and other user attributes.
  • the end of the processing process for each business rule is the name or ID of a particular product / type of product (offer). For this, information from the database 330 on current available offers, as well as the current product catalog, can be used.
  • an analytical function can be implemented that allows you to calculate analytical values for each user in the context of the time interval, for example, these values can be: the number of events, minimum / average / maximum / total / average deviation, etc. the value of one of the attributes of the event.
  • This function allows you to take into account incoming events for each user profile in a given time interval, for example, per second / minute / hour / day / week / month.
  • the counter data is used to set up algorithms for identifying a complex business event of offers and selecting the most relevant information for the respective users. Under a complex business event, as a rule, we mean a business event generated by the results of several previous events generated by the user on the resource 250.
  • module 340 For each business event and / or complex event, module 340 assigns a MIA. Module 340 may also implement an interface for flexible tuning of algorithms for filtering operations recorded by user actions. Module 340 searches and selects offers for the user based on the received event attributes for the user’s actions.
  • the server 300 decrypts the UID of the user, which is contained in the attributes of the event generated by its actions on the corresponding resource. Based on the results of event processing, the server 300 communicates the generated event attributes with the UID of the user for subsequent transmission of information to the event processing module 340 and selection of appropriate offers for the said UID of the user.
  • the analysis of the proposals has a time range for accumulating the necessary information and selecting relevant data.
  • steps 401 repeated pages or categories of interest of the user by the actions taken can be recorded, for example, when viewing thematically similar elements of a web resource during the day or week (topics web pages) 250.
  • the subject matter may apply to various offers, for example, credit offers, deposits, debit / credit cards.
  • Server 300 receives data about user events in a given time period and ranks them for the availability of offers available for that user.
  • the time period for sending a message with an offer to the user can also be selected based on the analysis of the total user activity, both in a given time period and a longer period, which is determined based on the presence of a relevant offer or activity of user actions and the corresponding program logic implemented on the server 300. Additionally, the user's transaction history can be taken into account to take these attributes into account when selecting relevant offers.
  • Business Event Identifier The identifier of a business event received in a request to search for an offer.
  • Offer Name of the sold (banking) / marketing product from the product catalog, by identifier of which a request to search for an offer was received. Date 1 - The number of requests for a unique combination of “business event - product” received by the system on the first day of the selected period.
  • Date 2 - The number of requests for a unique combination of “business event - product” received by the system on the second day of the selected period.
  • Date 3 The number of requests for a unique combination of “business event - product” received by the system on the third day of the selected period.
  • Date N The number of requests for a unique combination of “business event - product” received by the system on the last day of the selected period.
  • Filtering records can be done as follows:
  • the search for offers for the user profile can be performed as follows:
  • the attribute list consists of two user identifiers, then the primary identifier is searched. If the user is not found, then an additional search is performed. In addition to the search attributes, the business search and / or complex event ID and business rule IDs are sent in the search request message. [0038]
  • the function of generating personalized calls for example, SMS messages or letters sent by e-mail, PUSH notifications, or by calling the user by the call center operator, may be provided.
  • the channel for transmitting messages to the user about the notification of the availability of identified offers is selected, as a rule, from the following information transfer channels: SMS, PUSH notifications, Internet network, telephone, software application, messenger, etc.
  • the sent offer to the user may contain information describing a particular product or product purchase conditions, the validity period of the offer, cost and other data type.
  • the application of the method 100 for marking and storing data on user actions can improve the search for relevant one or more sentences for the user by monitoring his activity on the web resource with reliable identification of the user profile.
  • FIG. 5 shows an example of a computing device 500, which can be used to perform the functions of logical processing of the necessary data to implement the claimed solution.
  • the computer device of the user 200 and the server 300 indicated in the materials of this application may be one of the embodiments of the computing device 500.
  • the computing device 500 comprises one or more processors 501 connected by a common bus 510, memory means such as RAM 502 and ROM 503, input / output interfaces 504, input / output means 505, and means for network communication 506 .
  • the 501 processor (or multiple processors, a multi-core processor) can be selected from a variety of devices currently in wide use, for example, Intel TM, AMD TM, Apple TM, Samsung Exynos TM, MediaTEK TM, Qualcomm Snapdragon TM, etc. P.
  • RAM 502 is a random access memory and is intended to store machine-readable instructions executed by the processor 501, to perform necessary operations for logical data processing.
  • RAM 502 as a rule, contains executable instructions of the operating system and corresponding software components (applications, program modules, etc.).
  • the ROM 503 is one or more permanent storage devices, for example, a hard disk drive (HDD), a solid state drive (SSD), flash memory (EEPROM, NAND, etc.), optical storage media (CD- R / RW, DVD-R / RW, BlueRay Disc, MD), etc.
  • HDD hard disk drive
  • SSD solid state drive
  • EEPROM electrically erasable programmable read-only memory
  • NAND flash memory
  • optical storage media CD- R / RW, DVD-R / RW, BlueRay Disc, MD, etc.
  • I / O 504 interfaces To organize the operation of the components of the device 500 and organize the work of external connected devices, various types of I / O 504 interfaces are used. The choice of appropriate interfaces depends on the particular design of the computing device, which may be, but not limited to: PCI, AGP, PS / 2, IrDa, FireWire, LPT, COM, SATA, IDE, Lightning, USB (2.0, 3.0, 3.1, micro, mini, type C), TRS / Audio jack (2.5, 3.5, 6.35), HDMI, DVI, VGA, Display Port , RJ45, RS232, etc.
  • Various means of information 505 are used to provide user interaction with computing device 500, for example, keyboard, display (monitor), touch screen, touch pad, joystick, mouse, light pen, stylus, touch panel, trackball , speakers, microphone, augmented reality tools, optical sensors, tablet, light indicators, projector, camera, biometric identification tools (retina scanner, fingerprint scanner, voice recognition module), etc.
  • the networking tool 506 provides data transfer by the device 500 via an internal or external computer network, such as an Intranet, Internet, LAN, or the like.
  • an internal or external computer network such as an Intranet, Internet, LAN, or the like.
  • 506 can be used, but not limited to: Ethernet card, GSM modem, GPRS modem, LTE modem, 5G modem, satellite communications module, NFC module, Bluetooth and / or BLE module, Wi-Fi module, etc.
  • satellite navigation aids such as GPS, GLONASS, BeiDou, Galileo, can also be used.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Mathematical Physics (AREA)
  • User Interface Of Digital Computer (AREA)
  • Debugging And Monitoring (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne le domaine de marquage des activités d'un utilisateur pour analyse et stockage ultérieurs. Le résultat technique consiste à assurer un procédé de collecte vérifiée de données d'actions d'utilisateur liées à son activité grâce à l'utilisation d'un chiffrage d'identificateur unique d'utilisateur utilisé pendant une séance de consultation par l'utilisateur d'une ressource dans le réseau Internet afin de lier les résultats du monitorage à l'interface utilisateur. Dans un procédé réalisé par ordinateur on effectue le chiffrement de l'identifiant d'utilisateur unique au moyen d'une clé de chiffrement ouverte lorsqu'il consulte une ressource Web ou utilise une application au moyen d'un dispositif informatique ; on forme au moins un code sur la page de ressource Web ou de l'application dotée d'un identifiant d'utilisateur unique chiffré ; on effectue le suivi des actions de l'utilisateur au moyen dudit code et on les enregistre dans une base de données ; on transmet dans le système d'authentification passive d'utilisateur les données utilisateur enregistrées et la clé de chiffrement secrète préalablement formée ; on déchiffre dans le système d'authentification passive l'identifiant d'utilisateur au moyen de la clé de chiffrement secrète ; et on relie les actions obtenues à son profil.
PCT/RU2018/000648 2018-10-03 2018-10-03 Procédé et système de marquage des activités d'un utilisateur pour analyse et stockage ultérieurs WO2020071938A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
RU2018134909 2018-10-03
RU2018134909A RU2702275C1 (ru) 2018-10-03 2018-10-03 Способ и система маркировки действий пользователя для последующего анализа и накопления

Publications (1)

Publication Number Publication Date
WO2020071938A1 true WO2020071938A1 (fr) 2020-04-09

Family

ID=68171008

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/RU2018/000648 WO2020071938A1 (fr) 2018-10-03 2018-10-03 Procédé et système de marquage des activités d'un utilisateur pour analyse et stockage ultérieurs

Country Status (3)

Country Link
EA (1) EA038077B1 (fr)
RU (1) RU2702275C1 (fr)
WO (1) WO2020071938A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112883400A (zh) * 2021-03-11 2021-06-01 杭州网易云音乐科技有限公司 业务资源服务方法、装置、电子设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020112048A1 (en) * 2000-12-11 2002-08-15 Francois Gruyer System and method for providing behavioral information of a user accessing on-line resources
US7340600B1 (en) * 2000-01-14 2008-03-04 Hewlett-Packard Development Company, L.P. Authorization infrastructure based on public key cryptography
US8321952B2 (en) * 2000-06-30 2012-11-27 Hitwise Pty. Ltd. Method and system for monitoring online computer network behavior and creating online behavior profiles
US10033716B2 (en) * 2004-12-20 2018-07-24 Gula Consulting Limited Liability Company Method and device for publishing cross-network user behavioral data
RU2665871C1 (ru) * 2017-08-29 2018-09-04 Общество с ограниченной ответственностью "Бубер" Способ проверки данных о повторном посещении пользователем анализируемого интернет-сайта

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7340600B1 (en) * 2000-01-14 2008-03-04 Hewlett-Packard Development Company, L.P. Authorization infrastructure based on public key cryptography
US8321952B2 (en) * 2000-06-30 2012-11-27 Hitwise Pty. Ltd. Method and system for monitoring online computer network behavior and creating online behavior profiles
US20020112048A1 (en) * 2000-12-11 2002-08-15 Francois Gruyer System and method for providing behavioral information of a user accessing on-line resources
US10033716B2 (en) * 2004-12-20 2018-07-24 Gula Consulting Limited Liability Company Method and device for publishing cross-network user behavioral data
RU2665871C1 (ru) * 2017-08-29 2018-09-04 Общество с ограниченной ответственностью "Бубер" Способ проверки данных о повторном посещении пользователем анализируемого интернет-сайта

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112883400A (zh) * 2021-03-11 2021-06-01 杭州网易云音乐科技有限公司 业务资源服务方法、装置、电子设备及存储介质

Also Published As

Publication number Publication date
EA038077B1 (ru) 2021-07-01
RU2702275C1 (ru) 2019-10-07
EA201892089A1 (ru) 2020-04-30

Similar Documents

Publication Publication Date Title
RU2670030C2 (ru) Способы и системы для определения нестандартной пользовательской активности
KR101757844B1 (ko) 요청된 정보를 삭제하기 위한 방법들 및 시스템들
US11983298B2 (en) Computer system and method of operating same for handling anonymous data
US10069891B2 (en) Channel accessible single function micro service data collection process for light analytics
US20170277774A1 (en) Systems and methods for secure storage of user information in a user profile
US20090083184A1 (en) Methods and Apparatus for Detecting Fraud with Time Based Computer Tags
JP2017091515A (ja) 匿名化のために属性を自動的に識別するコンピュータ実装システムおよび方法
JP2021534468A (ja) 自動化された企業トランザクションデータアグリゲーションおよび会計
US10755344B2 (en) System framework processor for channel contacts
US8897451B1 (en) Storing secure information using hash techniques
US10817879B2 (en) Fraud detection based on an analysis of messages in a messaging account
WO2019024497A1 (fr) Procédé, dispositif, équipement terminal et support de production d'évènement de deuxième visite de client
US11888986B2 (en) Insight generation using personal identifiable information (PII) footprint modeling
Politou et al. The “right to be forgotten” in the GDPR: implementation challenges and potential solutions
US20220335155A1 (en) Insight Generation Using Personal Identifiable Information (PII) Footprint Modeling
RU2702275C1 (ru) Способ и система маркировки действий пользователя для последующего анализа и накопления
US20140189886A1 (en) Template For Customer Attributes
US20230360034A1 (en) Profile badges and access control based on digital wallet blockchain activity
US20230205743A1 (en) Security control framework for an enterprise data management platform
RU2693646C1 (ru) Способ и система подбора предложений для пользователя на основании анализа его действий
US11755571B2 (en) Customized data scanning in a heterogeneous data storage environment
US20150348209A1 (en) Method and system for linking forensic data with purchase behavior
Dimova et al. From Privacy Policies to Privacy Threats: A Case Study in Policy-Based Threat Modeling
CN112528330B (zh) 日志扫描方法、装置和设备
WO2018232021A2 (fr) Systèmes et procédés pour le stockage sécurisé d'informations d'utilisateur dans un profil d'utilisateur

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18936239

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18936239

Country of ref document: EP

Kind code of ref document: A1