CN115146957A - Method and device for judging abnormal modification of information - Google Patents
Method and device for judging abnormal modification of information Download PDFInfo
- Publication number
- CN115146957A CN115146957A CN202210767881.4A CN202210767881A CN115146957A CN 115146957 A CN115146957 A CN 115146957A CN 202210767881 A CN202210767881 A CN 202210767881A CN 115146957 A CN115146957 A CN 115146957A
- Authority
- CN
- China
- Prior art keywords
- information
- user information
- modified
- ciphertext
- modification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/02—Banking, e.g. interest calculation or account maintenance
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Marketing (AREA)
- General Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Development Economics (AREA)
- Health & Medical Sciences (AREA)
- Tourism & Hospitality (AREA)
- Quality & Reliability (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Operations Research (AREA)
- Educational Administration (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Data Mining & Analysis (AREA)
- Game Theory and Decision Science (AREA)
- Technology Law (AREA)
- Storage Device Security (AREA)
Abstract
本申请公开一种判断信息异常修改的方法及装置,用于数据处理领域,所述方法包括获取第一操作,基于预设修改规则和预设事件规则对第一操作进行评分,获取评分结果,响应于评分结果大于第一阈值,向多个第一管理员发送警告信息,以便所述第一管理员基于警告信息对修改的用户信息进行判断,判断所述修改的用户信息是否为异常修改。本申请可以对第一操作,也就是修改用户信息的操作进行评分,针对评分结果大于第一阈值第一操作,向多个第一管理员发送警告信息。从而,第一管理员只需要判断发送警告信息的第一操作就可以完成判断。极大程度的减少在判断修改用户信息是否为非法修改过程中的人力消耗,提高判断信息异常修改的效率。
The present application discloses a method and device for judging abnormal modification of information, which is used in the field of data processing. The method includes obtaining a first operation, scoring the first operation based on a preset modification rule and a preset event rule, and obtaining a scoring result, In response to the scoring result being greater than the first threshold, warning information is sent to a plurality of first administrators, so that the first administrators judge the modified user information based on the warning information, and determine whether the modified user information is abnormally modified. The present application can score the first operation, that is, the operation of modifying user information, and send warning information to a plurality of first administrators for the first operation whose score is greater than the first threshold. Therefore, the first administrator only needs to judge the first operation of sending the warning information to complete the judgment. It greatly reduces the manpower consumption in the process of judging whether the modification of user information is illegal, and improves the efficiency of judging abnormal modification of information.
Description
技术领域technical field
本申请涉及数据处理的技术领域,特别是涉及一种判断信息修改的方法。The present application relates to the technical field of data processing, and in particular, to a method for judging information modification.
背景技术Background technique
现在,随着社会的发展,银行业务越来越成熟,去银行办理业务的客户也越来越多。导致银行方面储存的客户信息也就越来越多。可是,一旦这些客户信息被非法修改会对客户的资金安全和银行的经济利益带来巨大损失。所以银行方面需要对修改的用户信息进行判断。以判断是否为非法修改。Now, with the development of society, the banking business is becoming more and more mature, and more and more customers go to the bank for business. As a result, more and more customer information is stored by banks. However, once these customer information is illegally modified, it will bring huge losses to the safety of customers' funds and the economic interests of the bank. Therefore, the bank needs to judge the modified user information. to determine whether it is an illegal modification.
目前,人工对所有修改的用户信息进行判断,由于需要判断的修改用户信息较多,所以人工需要长时间工作,导致其有耗费大量人力,且人工在长时间工作的情况下工作效率低。At present, all modified user information is manually judged. Since there are many modified user information to be judged, the manual labor needs to work for a long time, which results in a lot of manpower consumption, and the work efficiency is low when the manual labor works for a long time.
因此,如何在判断修改用户信息是否为非法修改过程中,极大程度的减少人力消耗,提高判断信息异常修改的效率是本领域技术人员急需解决的技术问题。Therefore, in the process of judging whether the modification of user information is illegal, how to greatly reduce manpower consumption and improve the efficiency of judging abnormal modification of information is a technical problem that those skilled in the art need to solve urgently.
发明内容SUMMARY OF THE INVENTION
基于上述问题,本申请提供了一种判断信息异常修改的方法及装置,以在判断修改用户信息是否为非法修改过程中,极大程度的减少人力消耗,提高判断信息异常修改的效率。本申请实施例公开了如下技术方案。Based on the above problems, the present application provides a method and device for judging abnormal modification of information, so as to greatly reduce labor consumption and improve the efficiency of judging abnormal modification of information in the process of judging whether modification of user information is illegal modification. The embodiments of the present application disclose the following technical solutions.
第一方面,本申请提供的一种判断信息异常修改的方法,包括:In the first aspect, a method for judging abnormal modification of information provided by this application includes:
获取第一操作,所述第一操作为修改用户信息的操作;obtaining a first operation, where the first operation is an operation of modifying user information;
基于预设修改规则和预设事件规则对所述第一操作进行评分,获取评分结果,所述评分用于指示第一操作的风险程度;Score the first operation based on the preset modification rule and the preset event rule, and obtain a scoring result, where the score is used to indicate the risk level of the first operation;
响应于所述评分结果大于第一阈值,向多个第一管理员发送警告信息,以便所述第一管理员基于警告信息对修改的用户信息进行判断,判断所述修改的用户信息是否为异常修改,所述第一管理员为具有修改用户信息权限的管理员。In response to the scoring result being greater than the first threshold, sending warning information to a plurality of first administrators, so that the first administrators can judge the modified user information based on the warning information, and determine whether the modified user information is abnormal Modify, the first administrator is an administrator with the right to modify user information.
可选的,在获取第一操作之前,所述方法还包括:Optionally, before acquiring the first operation, the method further includes:
获取第一信息,对所述第一信息行加密,得到第一密文和第一签名,所述第一信息为用户在正常办理业务时修改的用户信息;obtaining first information, encrypting the first information row, and obtaining a first ciphertext and a first signature, where the first information is user information modified by the user during normal business handling;
获取第二信息;obtain second information;
对所述第二信息加密,得到第二密文和第二签名;确定所述第二密文与所述第一密文匹配,且所述第二签名与所述第一签名匹配,获取所述第一操作。Encrypt the second information to obtain a second ciphertext and a second signature; determine that the second ciphertext matches the first ciphertext, and the second signature matches the first signature, obtain all the Describe the first operation.
可选的,所述方法还包括:Optionally, the method further includes:
响应于所述多个第一管理员中大于阈值数量的第一管理员确认修改的用户信息正确,修改的用户信息不是异常修改,允许对用户信息进行修改。In response to the first administrators of the plurality of first administrators who are greater than the threshold number confirming that the modified user information is correct, the modified user information is not an abnormal modification, and the modification of the user information is allowed.
可选的,所述方法还包括:Optionally, the method further includes:
响应于所述修改的用户信息为异常修改,生成第三密文和第三签名;In response to the modified user information being an abnormal modification, a third ciphertext and a third signature are generated;
将所述第一密文替换成所述第三密文,将所述第一签名替换成所述第三签名。Replace the first ciphertext with the third ciphertext, and replace the first signature with the third signature.
可选的,所述方法还包括:Optionally, the method further includes:
响应于所述修改的用户信息为异常修改,修改读取标识;In response to the modified user information being abnormal modification, modify the read identification;
将所述修改后的读取标识重新连接至数据库。The modified read identification is reconnected to the database.
第二方面,本申请提供一种判断信息异常修改的装置,所述装置包括:In a second aspect, the present application provides a device for judging abnormal modification of information, the device comprising:
第一获取单元,用于获取第一操作,所述第一操作为修改用户信息的操作;a first obtaining unit, configured to obtain a first operation, where the first operation is an operation of modifying user information;
第二获取单元,用于基于预设修改规则和预设事件规则对所述第一操作进行评分,获取评分结果,所述评分用于指示第一操作的风险程度;a second obtaining unit, configured to score the first operation based on a preset modification rule and a preset event rule, and obtain a scoring result, where the score is used to indicate the risk level of the first operation;
第一响应单元,用于响应于所述评分结果大于第一阈值,向多个第一管理员发送警告信息,以便所述第一管理员基于警告信息对修改的用户信息进行判断,判断所述修改的用户信息是否为异常修改,所述第一管理员为具有修改用户信息权限的管理员。A first response unit, configured to send warning information to a plurality of first administrators in response to the scoring result being greater than a first threshold, so that the first administrators can judge the modified user information based on the warning information, and judge the Whether the modified user information is abnormally modified, the first administrator is an administrator with the right to modify user information.
可选的,所述装置还包括:Optionally, the device further includes:
第三获取单元,用于获取第一信息;a third obtaining unit, configured to obtain the first information;
第一加密单元,用于对所述第一信息行加密,得到第一密文和第一签名,所述第一信息为用户在正常办理业务时修改的用户信息;a first encryption unit, configured to encrypt the first line of information to obtain a first ciphertext and a first signature, where the first information is user information modified by the user during normal business handling;
第四获取单元,用于获取第二信息;a fourth acquiring unit, configured to acquire the second information;
第二加密单元,用于对所述第二信息加密,得到第二密文和第二签名;确定所述第二密文与所述第一密文匹配,且所述第二签名与所述第一签名匹配,获取所述第一操作。a second encryption unit, configured to encrypt the second information to obtain a second ciphertext and a second signature; determine that the second ciphertext matches the first ciphertext, and the second signature matches the The first signature matches, and the first operation is obtained.
可选的,所述装置还包括:Optionally, the device further includes:
允许单元,用于响应于所述多个第一管理员中大于阈值数量的第一管理员确认修改的用户信息正确,修改的用户信息不是异常修改,允许对用户信息进行修改。The permitting unit is configured to allow the modification of the user information in response to the confirmation that the modified user information is correct and the modified user information is not abnormally modified in response to the first administrators of the plurality of first administrators who are greater than the threshold number.
可选的,所述装置还包括:Optionally, the device further includes:
生成单元,用于响应于所述修改的用户信息为异常修改,生成第三密文和第三签名;a generating unit, configured to generate a third ciphertext and a third signature in response to the modified user information being an abnormal modification;
替换单元,用于将所述第一密文替换成所述第三密文,将所述第一签名替换成所述第三签名。A replacement unit, configured to replace the first ciphertext with the third ciphertext, and replace the first signature with the third signature.
可选的,所述装置还包括:Optionally, the device further includes:
修改单元,用于响应于所述修改的用户信息为异常修改,修改读取标识;a modification unit, configured to modify the read identification in response to the modified user information being an abnormal modification;
连接单元,用于将所述修改后的读取标识重新连接至数据库。A connection unit, configured to reconnect the modified read identification to the database.
第三方面,本申请实施例提供了一种设备,所述设备包括存储器和处理器,所述存储器用于存储指令或代码,所述处理器用于执行所述指令或代码,以使所述设备执行前述第一方面任一项所述的方法。In a third aspect, an embodiment of the present application provides a device, the device includes a memory and a processor, the memory is used to store instructions or codes, and the processor is used to execute the instructions or codes, so that the device The method of any one of the preceding first aspects is performed.
第四方面,本申请实施例提供了一种计算机存储介质,所述计算机存储介质中存储有代码,当所述代码被运行时,运行所述代码的设备实现前述第一方面任一项所述的方法。In a fourth aspect, an embodiment of the present application provides a computer storage medium, where code is stored in the computer storage medium, and when the code is run, a device that runs the code implements any one of the foregoing first aspects. Methods.
相较于现有技术,本申请具有以下有益效果:Compared with the prior art, the present application has the following beneficial effects:
本申请中获取第一操作,基于预设修改规则和预设事件规则对第一操作进行评分,获取评分结果,响应于评分结果大于第一阈值,向多个第一管理员发送警告信息,以便所述第一管理员基于警告信息对修改的用户信息进行判断,判断所述修改的用户信息是否为异常修改。相对于现有技术中人工对所有修改的用户信息进行判断。本申请可以对第一操作,也就是修改用户信息的操作进行评分,针对评分结果大于第一阈值第一操作,向多个第一管理员发送警告信息。从而,第一管理员只需要判断发送警告信息的第一操作就可以完成判断。也就克服了现有技术中人工对所有修改的用户信息进行判断,由于需要判断的修改用户信息较多,所以人工需要长时间工作,导致其有耗费大量人力,且人工在长时间工作的情况下工作效率低的问题。极大程度的减少在判断修改用户信息是否为非法修改过程中的人力消耗,提高判断信息异常修改的效率。In this application, the first operation is obtained, the first operation is scored based on the preset modification rules and the preset event rules, the scoring result is obtained, and in response to the scoring result being greater than the first threshold, warning information is sent to multiple first administrators, so that The first administrator judges the modified user information based on the warning information, and judges whether the modified user information is abnormal modification. Compared with the prior art, all modified user information is manually judged. The present application can score the first operation, that is, the operation of modifying user information, and send warning information to a plurality of first administrators for the first operation whose score is greater than the first threshold. Therefore, the first administrator only needs to judge the first operation of sending the warning information to complete the judgment. It also overcomes the manual judgment of all the modified user information in the prior art. Since there are many modified user information that needs to be judged, the manual labor needs to work for a long time, resulting in a lot of manpower consumption and manual work for a long time. The problem of low work efficiency. It greatly reduces the manpower consumption in the process of judging whether the modification of user information is illegal, and improves the efficiency of judging abnormal modification of information.
附图说明Description of drawings
为更清楚地说明本实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the technical solutions in the present embodiment or the prior art, the following briefly introduces the accompanying drawings required in the description of the embodiment or the prior art. Obviously, the accompanying drawings in the following description are only For some embodiments of the present application, for those of ordinary skill in the art, other drawings can also be obtained according to these drawings without any creative effort.
图1为本申请实施例提供的一种判断信息异常修改的方法流程图;1 is a flowchart of a method for judging abnormal modification of information provided by an embodiment of the present application;
图2为本申请实施例提供的另一种判断信息异常修改方法流程图;2 is a flowchart of another method for judging abnormality modification of information provided by an embodiment of the present application;
图3为本申请实施例提供的一种判断信息异常修改的装置一种具体的结构示意图。FIG. 3 is a schematic structural diagram of a specific structure of an apparatus for judging abnormal modification of information according to an embodiment of the present application.
具体实施方式Detailed ways
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅是本申请一部分实施例,而不是全部实施例。基于本申请中的实施例,本领域普通技术人员在没有做出创造性劳动前提下,所获得的所有其他实施例,都属于本申请保护范围。The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only a part of the embodiments of the present application, but not all of the embodiments. All other embodiments obtained by those of ordinary skill in the art based on the embodiments in the present application without creative work fall within the protection scope of the present application.
需要说明的是,本申请提供的一种判断信息异常修改的方法及装置,用于数据处理领域,上述仅为示例,并不对本申请提供的方法及装置名称的应用领域进行限定。It should be noted that the method and device for judging abnormal modification of information provided by this application are used in the field of data processing.
随着社会的发展,银行业务越来越成熟,去银行办理业务的客户也越来越多。导致银行方面储存的客户信息也就越来越多。可是,一旦这些客户信息被非法修改会对客户的资金安全和银行的经济利益带来巨大损失。所以银行方面需要对修改的用户信息进行判断。以判断是否为非法修改。目前,人工对所有修改的用户信息进行判断,由于需要判断的修改用户信息较多,所以人工需要长时间工作,导致其有耗费大量人力,且人工在长时间工作的情况下工作效率低。With the development of society, the banking business is becoming more and more mature, and more and more customers go to the bank for business. As a result, more and more customer information is stored by banks. However, once these customer information is illegally modified, it will bring huge losses to the safety of customers' funds and the economic interests of the bank. Therefore, the bank needs to judge the modified user information. to determine whether it is an illegal modification. At present, all modified user information is manually judged. Since there are many modified user information to be judged, the manual labor needs to work for a long time, which results in a lot of manpower consumption, and the work efficiency is low when the manual labor works for a long time.
发明人经过研究提出本申请技术方案。本申请可以对第一操作,也就是修改用户信息的操作进行评分,针对评分结果大于第一阈值第一操作,向多个第一管理员发送警告信息。从而,第一管理员只需要判断发送警告信息的第一操作就可以完成判断。也就克服了现有技术中人工对所有修改的用户信息进行判断,由于需要判断的修改用户信息较多,所以人工需要长时间工作,导致其有耗费大量人力,且人工在长时间工作的情况下工作效率低的问题。极大程度的减少在判断修改用户信息是否为非法修改过程中的人力消耗,提高判断信息异常修改的效率。The inventor proposes the technical solution of the present application after research. The present application can score the first operation, that is, the operation of modifying user information, and send warning information to a plurality of first administrators for the first operation whose score is greater than the first threshold. Therefore, the first administrator only needs to judge the first operation of sending the warning information to complete the judgment. It also overcomes the manual judgment of all the modified user information in the prior art. Since there are many modified user information that needs to be judged, the manual labor needs to work for a long time, resulting in a lot of manpower consumption and manual work for a long time. The problem of low work efficiency. It greatly reduces the manpower consumption in the process of judging whether the modification of user information is illegal, and improves the efficiency of judging abnormal modification of information.
本申请实施例提供的方法可以由终端设备上的软件执行。所述终端设备例如可以是手机、平板电脑、计算机等设备。所述软件例如可以是系统软件。The methods provided by the embodiments of the present application may be executed by software on a terminal device. The terminal device may be, for example, a mobile phone, a tablet computer, a computer and other devices. The software may be, for example, system software.
为了使本技术领域的人员更好地理解本申请方案,下面结合附图和具体实施方式对本申请作进一步的详细说明。为了使本技术领域的人员更好地理解本申请方案,下面结合附图和具体实施方式对本申请作进一步的详细说明。下面以本申请实施例提供的方法由第一终端执行为例进行说明。In order to make those skilled in the art better understand the solution of the present application, the present application will be further described in detail below with reference to the accompanying drawings and specific embodiments. In order to make those skilled in the art better understand the solution of the present application, the present application will be further described in detail below with reference to the accompanying drawings and specific embodiments. The following description is made by taking the method provided by the embodiment of the present application being executed by the first terminal as an example.
图1为本申请实施例提供的一种判断信息异常修改的方法流程图,如图1所示,该方法包括:FIG. 1 is a flowchart of a method for judging abnormal modification of information provided by an embodiment of the present application. As shown in FIG. 1 , the method includes:
S101:获取第一操作。S101: Obtain the first operation.
第一终端获取第一操作。可以理解的是第一操作为修改用户信息的操作,例如,用户执行了转账操作、用户执行了大额理财购买操作、用户执行了限额管理操作等,通过用户执行的第一操作,可以对用户信息进行修改,其中用户信息可以包括用户的身份信息、用户的账户信息、用户的转账信息、用户的理财信息等。为了方便理解,进一步举例,比如用户账户里存有1000元,用户执行了转账操作,转出800元,此时用户账户信息可以为账户里存有200元。The first terminal acquires the first operation. It can be understood that the first operation is an operation of modifying user information. For example, the user performs a transfer operation, the user performs a large-amount wealth management purchase operation, and the user performs a limit management operation. The user information may include the user's identity information, the user's account information, the user's transfer information, the user's financial management information, and the like. For ease of understanding, for example, for example, the user has 1,000 yuan in the account, and the user performs a transfer operation and transfers 800 yuan. At this time, the user's account information can be 200 yuan in the account.
S102:基于预设修改规则和预设事件规则对所述第一操作进行评分,获取评分结果。S102: Score the first operation based on a preset modification rule and a preset event rule, and obtain a scoring result.
第一终端在获取第一操作之后,基于预设的修改规则和预设的事件规则对第一操作,也就是修改用户信息的操作进行评分。从而检测第一操作的风险程度。After acquiring the first operation, the first terminal scores the first operation, that is, the operation of modifying the user information, based on the preset modification rule and the preset event rule. Thereby, the risk level of the first operation is detected.
进一步解释,修改规则和事件规则可以根据欺诈交易获取,修改规则可以是完成交易过程中的客户输入过程的规则,例如,业务字段修改次数大于2次(0.1分)、字段累计修改次数大于5次(0.3分)、业务办理反复退回至主页2次以上(0.1)、特定时间后交易金额修改或短时频繁金额修改(0.2)等。事件规则可以是交易外的其他办理过程规则。例如,填写过程中多人辅助填写(0.1)、业务办理时他人远程指导(0.1)、信息填写参与度低于50%(0.5)等。For further explanation, the modification rules and event rules can be obtained from fraudulent transactions, and the modification rules can be the rules for completing the customer input process in the transaction process. (0.3 points), business processing is repeatedly returned to the homepage more than 2 times (0.1), the transaction amount is modified after a specific time or the amount is modified frequently in a short time (0.2), etc. Event rules can be other handling process rules than transactions. For example, during the filling process, multiple people assist in filling in (0.1), others provide remote guidance during business processing (0.1), and the participation rate in information filling is less than 50% (0.5).
S103:响应于所述评分结果大于第一阈值,向多个第一管理员发送警告信息,以便所述第一管理员基于警告信息对修改的用户信息进行判断,判断所述修改的用户信息是否为异常修改。S103: In response to the scoring result being greater than a first threshold, send warning information to a plurality of first administrators, so that the first administrators can judge the modified user information based on the warning information, and determine whether the modified user information is Modified for exceptions.
第一终端设备在获取第一操作评分结果之后,判断第一操作评分结果与第一阈值的大小关系。当评分结果大于第一阈值的时候,可以向多个具有修改用户信息权限的管理员发送警告信息,然后第一管理员可以基于警告信息,对第一操作进行判断,判断修改的用户信息是正常修改还是异常修改。After acquiring the first operation scoring result, the first terminal device determines the magnitude relationship between the first operation scoring result and the first threshold. When the scoring result is greater than the first threshold, a warning message can be sent to multiple administrators who have the authority to modify user information, and then the first administrator can judge the first operation based on the warning message, and determine that the modified user information is normal Modification or abnormal modification.
进一步解释,第一终端将警告信息发送给多个第一管理员,第一管理员对第一操作进行判断。当多个第一管理员中大于阈值数量的第一管理员确认修改的用户信息正确时,可以说明修改的用户信息不是异常修改,允许对用户信息进行修改。例如,将警告信息发送给10个第一管理员,阈值数量设置为5,如果超过5个人确认修改的用户信息为正确,可以说明修改的用户信息不是异常修改,允许对用户信息进行修改。It is further explained that the first terminal sends the warning information to a plurality of first administrators, and the first administrators judge the first operation. When more than the threshold number of the first administrators among the plurality of first administrators confirms that the modified user information is correct, it can be indicated that the modified user information is not an abnormal modification, and the modification of the user information is allowed. For example, the warning message is sent to 10 first administrators, and the threshold number is set to 5. If more than 5 people confirm that the modified user information is correct, it can be shown that the modified user information is not an abnormal modification, and the modification of the user information is allowed.
为了方便理解,举例说明,例如对于“客户执行了转账操作”交易,获取第一操作,假如在客户的操作过程中监控发现,在转账时客户操作由他人代办,客户很少参与甚至被他人直接使用身份证信息办理,且业务办理过程中反复修改字段7次,则触发的修改规则可以为:字段累计修改次数大于5次(0.3分),触发的事件规则可以为:业务办理时他人远程指导(0.1)、信息填写参与度低于50%(0.5),风险得分为0.9。计算累计获取的评分结果,如果评分结果大于第一阈值,则需要给第一管理员发送警告确认,以保证用户资金安全。In order to facilitate understanding, for example, for the transaction of "the customer has performed a transfer operation", the first operation is obtained. If the monitoring during the customer's operation shows that the customer's operation is performed by others during the transfer, the customer seldom participates or even is directly If the ID card information is used for processing, and the field is repeatedly modified 7 times during the business processing, the triggered modification rule can be: the cumulative number of field modifications is greater than 5 times (0.3 points), and the triggered event rule can be: remote guidance by others during business processing (0.1), the participation in information filling is less than 50% (0.5), and the risk score is 0.9. Calculate the accumulatively obtained scoring results. If the scoring results are greater than the first threshold, a warning confirmation needs to be sent to the first administrator to ensure the safety of user funds.
本申请中获取第一操作,基于预设修改规则和预设事件规则对第一操作进行评分,获取评分结果,响应于评分结果大于第一阈值,向多个第一管理员发送警告信息,以便所述第一管理员基于警告信息对修改的用户信息进行判断,判断所述修改的用户信息是否为异常修改。相对于现有技术中人工对所有修改的用户信息进行判断。本申请可以对第一操作,也就是修改用户信息的操作进行评分,针对评分结果大于第一阈值第一操作,向多个第一管理员发送警告信息。从而,第一管理员只需要判断发送警告信息的第一操作就可以完成判断。也就克服了现有技术中人工对所有修改的用户信息进行判断,由于需要判断的修改用户信息较多,所以人工需要长时间工作,导致其有耗费大量人力,且人工在长时间工作的情况下工作效率低的问题。极大程度的减少在判断修改用户信息是否为非法修改过程中的人力消耗,提高判断信息异常修改的效率。In this application, the first operation is obtained, the first operation is scored based on the preset modification rules and the preset event rules, the scoring result is obtained, and in response to the scoring result being greater than the first threshold, warning information is sent to multiple first administrators, so that The first administrator judges the modified user information based on the warning information, and judges whether the modified user information is abnormal modification. Compared with the prior art, all modified user information is manually judged. The present application can score the first operation, that is, the operation of modifying user information, and send warning information to a plurality of first administrators for the first operation whose score is greater than the first threshold. Therefore, the first administrator only needs to judge the first operation of sending the warning information to complete the judgment. It also overcomes the manual judgment of all the modified user information in the prior art. Since there are many modified user information that needs to be judged, the manual labor needs to work for a long time, resulting in a lot of manpower consumption and manual work for a long time. The problem of low work efficiency. It greatly reduces the manpower consumption in the process of judging whether the modification of user information is illegal, and improves the efficiency of judging abnormal modification of information.
图2为本申请实施例提供的另一种判断信息异常修改方法流程图,如图2所示,该方法包括:FIG. 2 is a flowchart of another method for judging information abnormality modification provided by an embodiment of the present application. As shown in FIG. 2 , the method includes:
S201:获取第一信息,对所述第一信息行加密,得到第一密文和第一签名。S201: Acquire first information, encrypt the first information line, and obtain a first ciphertext and a first signature.
第一终端获取第一信息。其中,第一信息为用户在正常办理业务时修改的用户信息,然后对第一信息行加密,得到第一密文和第一签名。The first terminal acquires the first information. The first information is user information modified by the user when the user normally handles the business, and then the first information line is encrypted to obtain the first ciphertext and the first signature.
S202:获取第二信息;对所述第二信息加密,得到第二密文和第二签名。S202: Obtain second information; encrypt the second information to obtain a second ciphertext and a second signature.
第一终端在获取第一信息之后,获取第二信息。其中,第二信息为当前修改的用户信息,对第二信息加密,得到第二密文和第二签名。After acquiring the first information, the first terminal acquires the second information. The second information is currently modified user information, and the second information is encrypted to obtain a second ciphertext and a second signature.
S203:确定所述第二密文与所述第一密文匹配,且所述第二签名与所述第一签名匹配,获取所述第一操作。S203: Determine that the second ciphertext matches the first ciphertext, and the second signature matches the first signature, and obtain the first operation.
第一终端判断第二密文与第一密文的是否匹配、判断第二签名与第一签名匹配,当确定第二密文与第一密文匹配,且第二签名与第一签名匹配,身验证通过,获取第一操作。通过验证对信息加密之后的密文和签名是否匹配来验证修改用户信息的人员的身份,从而只有在身份验证通过的情况下,才会运行获取第一操作。提高了判断修改的用户信息是否是异常修改的准确性。The first terminal judges whether the second ciphertext matches the first ciphertext, and judges that the second signature matches the first signature, and when it is determined that the second ciphertext matches the first ciphertext, and the second signature matches the first signature, After the authentication is passed, the first operation is obtained. The identity of the person who modifies the user information is verified by verifying whether the encrypted ciphertext and the signature match, so that only when the identity verification is passed, the first acquisition operation will be performed. The accuracy of judging whether the modified user information is abnormal modification is improved.
S204:获取第一操作,基于预设修改规则和预设事件规则对所述第一操作进行评分,获取评分结果。S204: Acquire a first operation, score the first operation based on a preset modification rule and a preset event rule, and obtain a scoring result.
S205:响应于所述评分结果大于第一阈值,向多个第一管理员发送警告信息,以便所述第一管理员基于警告信息对修改的用户信息进行判断,判断所述修改的用户信息是否为异常修改。S205: In response to the scoring result being greater than the first threshold, send warning information to a plurality of first administrators, so that the first administrators can judge the modified user information based on the warning information, and determine whether the modified user information is Modified for exceptions.
S206:响应于所述修改的用户信息为异常修改,生成第三密文和第三签名,将所述第一密文替换成所述第三密文,将所述第一签名替换成所述第三签名。S206: In response to the modified user information being abnormal modification, generate a third ciphertext and a third signature, replace the first ciphertext with the third ciphertext, and replace the first signature with the Third signature.
第一终端确定修改的用户信息为异常修改时,可以生成第三密文和第三签名,然后将第一密文替换成第三密文,将第一签名替换成所述第三签名。以更新数据库中的密文和签名,使得不法分子无法继续对用户信息进行修改。When determining that the modified user information is abnormally modified, the first terminal may generate a third ciphertext and a third signature, and then replace the first ciphertext with the third ciphertext, and replace the first signature with the third signature. In order to update the ciphertext and signature in the database, criminals cannot continue to modify user information.
S207:响应于所述修改的用户信息为异常修改,修改读取标识,将所述修改后的读取标识重新连接至数据库。S207: In response to the modified user information being an abnormal modification, modify the read identifier, and reconnect the modified read identifier to the database.
需要解释的是,数据库为用户信息存储和查询的位置,数据库中的信息禁止直接修改,例如命令行修改、数据库链接工具修改等。It should be explained that the database is the location where user information is stored and queried, and the information in the database cannot be directly modified, such as command line modification, database link tool modification, etc.
第一终端确定修改的用户信息为异常修改时,也可以修改数据库中原有的读取表示,然后将修改后的读取标识重新连接至数据库。使得不法分子无法读取数据库中的用户信息。When the first terminal determines that the modified user information is abnormally modified, it can also modify the original read representation in the database, and then reconnect the modified read identifier to the database. Make the criminals unable to read the user information in the database.
以上为本申请实施例提供判断信息异常修改的方法的一些具体实现方式,基于此,本申请还提供了对应的装置。下面将从功能模块化的角度对本申请实施例提供的装置进行介绍,该装置与上文描述的数据输入的方法可相互对应参照。The above embodiments of the present application provide some specific implementations of the method for judging abnormal modification of information. Based on this, the present application also provides a corresponding device. The following will introduce the device provided by the embodiments of the present application from the perspective of functional modularity, and the device and the data input method described above can be referred to each other correspondingly.
图3为本申请实施例提供的一种判断信息异常修改的装置一种具体的结构示意图,该装置包括:FIG. 3 is a specific structural schematic diagram of a device for judging abnormal modification of information provided by an embodiment of the present application, and the device includes:
第一获取单元300,用于获取第一操作,所述第一操作为修改用户信息的操作;a first obtaining
第二获取单元310,用于基于预设修改规则和预设事件规则对所述第一操作进行评分,获取评分结果,所述评分用于指示第一操作的风险程度;A second obtaining
第一响应单元320,用于响应于所述评分结果大于第一阈值,向多个第一管理员发送警告信息,以便所述第一管理员基于警告信息对修改的用户信息进行判断,判断所述修改的用户信息是否为异常修改,所述第一管理员为具有修改用户信息权限的管理员。The
可选的,所述装置还包括:Optionally, the device further includes:
第三获取单元,用于获取第一信息;a third obtaining unit, configured to obtain the first information;
第一加密单元,用于对所述第一信息行加密,得到第一密文和第一签名,所述第一信息为用户在正常办理业务时修改的用户信息;a first encryption unit, configured to encrypt the first line of information to obtain a first ciphertext and a first signature, where the first information is user information modified by the user during normal business handling;
第四获取单元,用于获取第二信息;a fourth acquiring unit, configured to acquire the second information;
第二加密单元,用于对所述第二信息加密,得到第二密文和第二签名;确定所述第二密文与所述第一密文匹配,且所述第二签名与所述第一签名匹配,获取所述第一操作。a second encryption unit, configured to encrypt the second information to obtain a second ciphertext and a second signature; determine that the second ciphertext matches the first ciphertext, and the second signature matches the The first signature matches, and the first operation is obtained.
可选的,所述装置还包括:Optionally, the device further includes:
允许单元,用于响应于所述多个第一管理员中大于阈值数量的第一管理员确认修改的用户信息正确,修改的用户信息不是异常修改,允许对用户信息进行修改。The permitting unit is configured to allow the modification of the user information in response to the confirmation that the modified user information is correct and the modified user information is not abnormally modified in response to the first administrators of the plurality of first administrators who are greater than the threshold number.
可选的,所述装置还包括:Optionally, the device further includes:
生成单元,用于响应于所述修改的用户信息为异常修改,生成第三密文和第三签名;a generating unit, configured to generate a third ciphertext and a third signature in response to the modified user information being an abnormal modification;
替换单元,用于将所述第一密文替换成所述第三密文,将所述第一签名替换成所述第三签名,以便验证获取的所述第二签名与所述第三签名是否匹配,所述第二密文与所述第三密文是否匹配。a replacement unit, configured to replace the first ciphertext with the third ciphertext, and replace the first signature with the third signature, so as to verify the acquired second signature and the third signature Whether it matches, whether the second ciphertext matches the third ciphertext.
可选的,所述装置还包括:Optionally, the device further includes:
修改单元,用于响应于所述修改的用户信息为异常修改,修改读取标识;a modification unit, configured to modify the read identification in response to the modified user information being an abnormal modification;
连接单元,用于将所述修改后的读取标识重新连接至数据库。A connection unit, configured to reconnect the modified read identification to the database.
本申请中第一获取单元300获取第一操作。第二获取单元310基于预设修改规则和预设事件规则对第一操作进行评分,获取评分结果。第一响应单元320响应于评分结果大于第一阈值,向多个第一管理员发送警告信息,以便所述第一管理员基于警告信息对修改的用户信息进行判断,判断所述修改的用户信息是否为异常修改。相对于现有技术中人工对所有修改的用户信息进行判断。本申请可以对第一操作,也就是修改用户信息的操作进行评分,针对评分结果大于第一阈值第一操作,向多个第一管理员发送警告信息。从而,第一管理员只需要判断发送警告信息的第一操作就可以完成判断。也就克服了现有技术中人工对所有修改的用户信息进行判断,由于需要判断的修改用户信息较多,所以人工需要长时间工作,导致其有耗费大量人力,且人工在长时间工作的情况下工作效率低的问题。极大程度的减少在判断修改用户信息是否为非法修改过程中的人力消耗,提高判断信息异常修改的效率。In this application, the first obtaining
本申请实施例还提供了对应的设备以及计算机存储介质,用于实现本申请实施例提供的方案。The embodiments of the present application also provide corresponding devices and computer storage media for implementing the solutions provided by the embodiments of the present application.
其中,所述设备包括存储器和处理器,所述存储器用于存储指令或代码,所述处理器用于执行所述指令或代码,以使所述设备执行本申请任一实施例所述的方法。The device includes a memory and a processor, where the memory is used to store instructions or codes, and the processor is used to execute the instructions or codes, so that the device performs the method described in any embodiment of the present application.
所述计算机存储介质中存储有代码,当所述代码被运行时,运行所述代码的设备实现本申请任一实施例所述的方法。Code is stored in the computer storage medium, and when the code is executed, a device running the code implements the method described in any of the embodiments of the present application.
本申请实施例中提到的“第一”、“第二”(若存在)等名称中的“第一”、“第二”只是用来做名字标识,并不代表顺序上的第一、第二。The "first" and "second" in the names such as "first" and "second" (if any) mentioned in the embodiments of this application are only used for name identification, and do not represent the first, second.
通过以上的实施方式的描述可知,本领域的技术人员可以清楚地了解到上述实施例方法中的全部或部分步骤可借助软件加通用硬件平台的方式来实现。基于这样的理解,本申请的技术方案可以以软件产品的形式体现出来,该计算机软件产品可以存储在存储介质中,如只读存储器(英文:read-only memory,ROM)/RAM、磁碟、光盘等,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者诸如路由器等网络通信设备)执行本申请各个实施例或者实施例的某些部分所述的方法。From the description of the above embodiments, those skilled in the art can clearly understand that all or part of the steps in the methods of the above embodiments can be implemented by means of software plus a general hardware platform. Based on this understanding, the technical solution of the present application can be embodied in the form of a software product, and the computer software product can be stored in a storage medium, such as read-only memory (English: read-only memory, ROM)/RAM, magnetic disk, An optical disc, etc., includes several instructions for causing a computer device (which may be a personal computer, a server, or a network communication device such as a router) to execute the methods described in various embodiments or some parts of the embodiments of the present application.
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于装置实施例而言,由于其基本相似于方法实施例,所以描述得比较简单,相关之处参见方法实施例的部分说明即可。可以根据实际的需要选择其中的部分或者全部模块来实现本实施例方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。Each embodiment in this specification is described in a progressive manner, and the same and similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the apparatus embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and reference may be made to the partial description of the method embodiment for related parts. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution in this embodiment. Those of ordinary skill in the art can understand and implement it without creative effort.
以上所述仅是本申请示例性的实施方式,并非用于限定本申请的保护范围。The above descriptions are only exemplary embodiments of the present application, and are not intended to limit the protection scope of the present application.
Claims (10)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210767881.4A CN115146957A (en) | 2022-07-01 | 2022-07-01 | Method and device for judging abnormal modification of information |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202210767881.4A CN115146957A (en) | 2022-07-01 | 2022-07-01 | Method and device for judging abnormal modification of information |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN115146957A true CN115146957A (en) | 2022-10-04 |
Family
ID=83409572
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202210767881.4A Pending CN115146957A (en) | 2022-07-01 | 2022-07-01 | Method and device for judging abnormal modification of information |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN115146957A (en) |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140279641A1 (en) * | 2013-03-15 | 2014-09-18 | Alert Enterprise | Identity and asset risk score intelligence and threat mitigation |
| KR20150014332A (en) * | 2013-07-29 | 2015-02-06 | 한국교육과정평가원 | Scoring management server and operating method thereof |
| CN111522724A (en) * | 2020-04-23 | 2020-08-11 | 广州酷狗计算机科技有限公司 | Abnormal account determination method and device, server and storage medium |
| CN113568887A (en) * | 2021-07-30 | 2021-10-29 | 中国工商银行股份有限公司 | An operation and maintenance operation monitoring method and device based on a big data platform |
| CN114338435A (en) * | 2020-09-24 | 2022-04-12 | 腾讯科技(深圳)有限公司 | Network change monitoring method and device, computer equipment and storage medium |
-
2022
- 2022-07-01 CN CN202210767881.4A patent/CN115146957A/en active Pending
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140279641A1 (en) * | 2013-03-15 | 2014-09-18 | Alert Enterprise | Identity and asset risk score intelligence and threat mitigation |
| KR20150014332A (en) * | 2013-07-29 | 2015-02-06 | 한국교육과정평가원 | Scoring management server and operating method thereof |
| CN111522724A (en) * | 2020-04-23 | 2020-08-11 | 广州酷狗计算机科技有限公司 | Abnormal account determination method and device, server and storage medium |
| CN114338435A (en) * | 2020-09-24 | 2022-04-12 | 腾讯科技(深圳)有限公司 | Network change monitoring method and device, computer equipment and storage medium |
| CN113568887A (en) * | 2021-07-30 | 2021-10-29 | 中国工商银行股份有限公司 | An operation and maintenance operation monitoring method and device based on a big data platform |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11164183B2 (en) | Tokenizing sensitive data | |
| CN112036890B (en) | Customer identity authentication method and device | |
| CN111415163B (en) | Block chain-based service processing and verifying method, system and verifying node | |
| WO2017028630A1 (en) | Verification method and server | |
| CN101751629B (en) | Method and system for authenticating multifactor with changing unique values | |
| US20150220933A1 (en) | Methods and systems for making secure online payments | |
| JP2018517976A (en) | Dialog data processing method and apparatus | |
| US11494769B2 (en) | System, methods and computer program products for identity authentication for electronic payment transactions | |
| US20240187416A1 (en) | Systems and methods for enhanced authorization messages | |
| WO2019153507A1 (en) | Social security digital certificate management method, readable storage medium, terminal device and apparatus | |
| CN106779698A (en) | A kind of distribution for paying mark and its safe payment method, system and device | |
| CN112085469B (en) | Data approval method, device, equipment and storage medium based on vector machine model | |
| CN107231343A (en) | A kind of U-shield Activiation method, client and system | |
| CN110535809A (en) | A kind of identification code pulls method, storage medium and terminal device and server | |
| US9998486B2 (en) | System for utilizing one or more databases to identify a point of compromise | |
| JP7447127B2 (en) | Preventing the sending of accidental copies of data records to a distributed ledger system | |
| CN106355496A (en) | Method, system and device for realizing batch electronic transactions as well as electronic signature tool | |
| CN110517042A (en) | Anti-theft lock code verification method and related equipment based on transaction verification | |
| CN114549011A (en) | Method and device for binding bank card | |
| TWM663501U (en) | Anti-fraud trading system | |
| US12271506B2 (en) | Method and a system for processing transactions between entities | |
| CN115146957A (en) | Method and device for judging abnormal modification of information | |
| US20230267476A1 (en) | Forgery detection method for detecting forgery of nft performed by server of platform using blockchain-based nft | |
| CN111275506A (en) | Bill issuing method and block link point equipment | |
| CN111612486A (en) | Online electronic coupon deduction method based on tamper-proof encryption algorithm |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination |