CN104090835B - eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method - Google Patents
eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method Download PDFInfo
- Publication number
- CN104090835B CN104090835B CN201410298277.7A CN201410298277A CN104090835B CN 104090835 B CN104090835 B CN 104090835B CN 201410298277 A CN201410298277 A CN 201410298277A CN 104090835 B CN104090835 B CN 104090835B
- Authority
- CN
- China
- Prior art keywords
- matrix
- transaction
- audit
- user
- eid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Abstract
The invention discloses an eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method. The core concept of the technology includes that modeling is performed on transaction operation logs of cross-platform virtual assets and an audit rule base is constructed, the associated audit analysis on the user transaction logs is implemented through transaction attributes by combining with an eID technology, and the ideal virtual asset transaction audit accuracy rate is obtained finally. According to the eID and spectrum theory based cross-platform virtual asset transaction audit method, data related attributes are fully considered when a data model is established and the method can adapt to the variability of the user transaction attributes and the uncertainty of transaction behaviors; the dynamic correction can be performed on the rule base according to audit results through the construction of the rule base; the detection method is simple and the high accuracy can be obtained in the virtual asset transaction log testing phase.
Description
Technical field
This technology belongs to Networks and information security field and in particular to a kind of cross-platform virtual based on eid and spectral theory
Transaction in assets auditing method.
Background technology
Eid is the english abbreviation of electronic ID card (electronic ident i ty), and full name is citizen's network electronic body
Part mark, is alienation form on network for the resident identification card.Eid is the authority of remote proving individual true identity on network
Electronic information file, signs and issues (http://eid.cn/khat i by Ministry of Public Security citizen network identity identifying system
seid.html).It is the one group of unique network identifier and digital certificate being generated by netizen's personally identifiable information, and netizen
Real information is saved in third party's trust authority.Smart chip card is other identification informations of function and user (as title, e-
Mai l, identification card number etc.) bundle, the checking information of user identity is provided on network so that each netizen is in network
Have in virtual environment and the corresponding true identity of only one of which.Eid has authority, security and public credibility, and it avoids directly
Connect the privacy compromise problem leading to using identity card, realize " front end is anonymous, rear end real name " mechanism truly.At present,
As a major project of the Department of Science and Technology, eid starts test run in some areas such as Beijing, Shanghai and uses, mainly on internet
Remote identity be identified and verify, such as campus network, ecommerce, the network media, online service etc..Beijing post and telecommunications is big
School garden net has achieved the service function based on eid substantially, and achieves the achievement of stage.The use of eid is this skill
The realization of art is laid a good foundation.
Fictitious assets transaction audit is mainly the exception detecting in process of exchange, that is, by concluding the business related day to fictitious assets
Will is associated analyzing, and finds the violation operation behavior to fictitious assets for the user in time.Abnormal audit is the important of data mining
Content, its implementation has multiple.Abnormal auditing method based on classification: the abnormal audit technique based on classification is two ranks
Section process, including study stage and sorting phase.In the study stage, also known as the training stage, set up and describe predefined data class
Or the grader of concept set, by effective mark training set structural classification device;Sorting phase, also known as test phase, utilizes and divides
One test object is labeled as normal or abnormal by class device.Its use is assumed based on general as follows: empty in given feature
Between in, grader (tan p n, steinbach m, the kumar distinguishing normal and abnormal data class must be constructed
v.introduct ion to data mining[j].2006.).Based on closest abnormal audit technique: given feature is empty
Between in data set, it is possible to use distance metric is quantifying the similitude between object.Intuitively, away from the object of other objects
Can be considered abnormal, the method based on propinquity supposes: abnormal data deviates significantly from data set with the propinquity of its arest neighbors
In other data and their neighbours between propinquity (byers s, raftery a e.nearest-neighbor
clutter removal for est imat ing features in spat ial point processes[j]
.journal of the american stat i st ical assoc iat ion,1998,93(442):577-584.).
Statistics exception audit technique: statistics exception audit technique is assumed to the normality of data.They suppose in data set
Normal subjects produced by a random process (generation model), therefore, normal subjects occur in the high probability of this stochastic model
In region, and in low probability region to as if abnormal.The general thoughts of this technology are: one matching data-oriented collection of study
Generation model, then identify the object in this model low probability region, they be considered as exception (aggarkal c c, phi l
ip s y.outl i er detect ion ki th uncertain data[c]//sdm.2008:483-493.).Information
By abnormal audit technique: information theory technology adopts the different information theory sides such as kolmogorov complexity, entropy and relative entropy
The information content that method analyze data is concentrated.The use of this technology is based on the fact that the exception in data set can cause data set to believe
The irregular change of breath amount.The step of information-theoretical abnormality detection technology is as follows: data-oriented collection d, finds out the one of this data set
So that the value of c (d)-c (d-i) is maximum, the data in subset i is considered as abnormal to individual smallest subset i, and wherein c (d) represents number
Complexity (keogh e, lonardi s, ratanamahatana c a.tokards parameter-free data according to d
mining[c]//proceedings of the tenth acm sigkdd internat i onal conference on
knokl edge di scovery and data mining.acm,2004:206-215.).Exception audit based on spectral theory
Technology: spectral technology finds a kind of approximate representation of data by one group of attribute comprising data set principal character.Different based on spectrum
Often audit technique assumes that data can be mapped in the subspace of low dimensional and normal data has notable area with abnormal data
Not.Therefore this technology typically finds such subspace using PCA, in this subspace, abnormal data easily quilt
Identification (agovic a, banerjee a, ganguly a r, et al.6anomaly detect ion in transportat
ion corridors us ing manifold embedding[j].knokledge di scovery from sensor
data,2008:81-105.).
In fictitious assets transaction audit, it is abnormal, because fictitious assets that the exception relevant with fictitious assets is generally situation
There is polytype, different types of fictitious assets attribute is different;And the operation to similar fictitious assets for the different users
Different, this is related to the diversity of fictitious assets transaction platform.Therefore, the audit of fictitious assets comprises two aspect contents: virtual
The audit of Asset operation daily record and the audit of fictitious assets attribute information.Therefore solely using certain technology above-mentioned to virtual money
The transaction produced carry out abnormal audit not science it is also difficult to obtain higher Detection accuracy.Existing abnormal auditing method side
Overweight transfer attribute or the frequency attribute of Audit data, the association attributes of little focused data.
Content of the invention
For the defect of prior art, this technology has just taken into full account asking of data association attributes when setting up data model
Topic, and adapt to customer transaction attribute polytropy and the probabilistic feature of trading activity.This technology is by using spectral theory
Method builds the audit regulation storehouse that according to auditing result, it can be carried out with dynamic corrections, and combines the realization of eid technology to virtual
The cross-platform audit of transaction in assets.In fictitious assets transaction log test phase, the detection method that this technology uses is not only simple
And higher precision can be obtained.
The core concept of this technology is exactly that the transactional operation daily record to fictitious assets is modeled and constructs audit regulation storehouse,
Using transaction attribute, customer transaction daily record is realized with association audit analysis then in conjunction with eid technology, finally obtain preferably virtual
Transaction in assets audit accuracy rate.The present invention program is as follows:
Step 1, the arm's length dealing log recording of certain class fictitious assets given, referred to as training set;For this training set, root
According to the uniqueness of eid, it is pre-processed: merge the transaction log of identical eid user, ordinal number when transactional operation is converted into
According to counting the transaction attribute information of each eid user, form customer transaction attribute information base φ;
Step 2, the transactional operation daily record founding mathematical models for user: by ordinal number during the transactional operation of every eid user
According to being split, segmentation length is l;Additionally, the number of operation different in log recording is designated as n, can be so every
The transactional operation sequence of individual l length creates the matrix c of n × n sizel;The transverse and longitudinal coordinate of this matrix is all different types of operation, and
Matrix element is exactly the frequency to appearance in window size h for the corresponding operation, and that is, in h continuous operation, certain operates to appearance
Number of times;Matrix clEach element represent operate between the degree of association;
Step 3, extract the main feature of customer transaction operation behavior using spectral theory: by the training set matrix stack that obtains of conversion be
C={ c1,c2,…,cn, size is all n × n, calculates Mean Matrix c by equation (1)mean, n is ordinal number when in training set
Sum according to section;
Each matrix in matrix stack c deducts Mean Matrix cmeanObtain new matrix stack c ';For the n × n square in c '
Battle array ci', 1 × n can be rewritten as2VectorI.e.1≤i
≤ n, constructs covariance matrix e, size is n2×n2, the implication of matrix e element be exactly operate to operation to the degree of association before;
Characteristic value according to pca method calculating matrix e is λiWith corresponding characteristic vector
According to the property of spectral theory and matrix e,Constitute n2×n2One group of orthogonal basis of dimension space.From n2Individual feature
Before selecting in vector, k is so that the principal component contributor rate of this k feature reaches predetermined threshold η, that is,
This k characteristic vector just represents the main feature of customer transaction behavior.
Step 4, pass through customer transaction behavior main feature construction audit regulation storehouse.Any fictitious assets transaction log conversion
Time series data matrix can use vector product
Calculate its coordinate representation in the main feature space that k characteristic vector is constituted, be designated as x=(x1,…,xk), wherein
The c of n × n is rewritten into 1 × n2'sCalculated by above formula, the time series data matrix of any higher-dimension can convert based on feature empty
Between coordinate representation, reached the purpose of dimensionality reduction;
Wherein aiIn element by xiviThe value that middle element is more than threshold alpha is constituted, and remaining constitutes bi;Positive divisor module aiInstead
Reflect the most possible generation sequence of operation of user during arm's length dealing, and biThen reflect the operation of most unlikely appearance
Sequence;Calculate in c ' coordinate representation in main feature space for each matrix by formula (4), (5) and constitute positive divisor module groupWith negative factor module groupSoJust constitute fictitious assets transaction log to examine
Meter rule base;
Step 5, fictitious assets transactional operation and transaction Attribute Association audit: for arbitrary user's fictitious assets to be detected
Transaction time series data s, sends out according to the attribute that the eid that user uses inquires about s associative operation in transaction attribute information base φ first
Whether raw probability all reaches threshold value ζ set in advance, if reaching, building matrix m by step 2, otherwise just not reaching in matrix m
The row or column being located to the Attribute Association operation of threshold value ζ adds penalty factor θ, and θ value is determined by practical application;Then deduct average
Matrix cmeanObtain m ', and according to formula (4), formula (5) calculates positive and negative factor module a of this time series datai' and bi′;Finally forWithIn each group of module, calculate the whether normal judgment value of this section of fictitious assets transaction log of user according to following equalities;
For auditor's judgement value ε, there is a following audit regulation:
IfAndThen audit as normal;
IfAndThen audit as exception;
IfAnd
If i.Then audit as normal;
Ii. otherwise audit as exception;
IfAnd
If i.Then audit as exception
Ii. otherwise audit as normal;
Step 6, algorithm correction, if this technology correct judgment and auditing result is normal, user's respective transaction are operated
Attribute information adds attribute information base φ, and carries out probability statistics according to user eid;If this technology misjudgment and auditing result
For normal, then the negative factor module of the generation of user's time series data is added negative factor module groupIf this technology misjudgment and
Auditing result is abnormal, then the positive divisor module of the generation of user's time series data is added positive divisor module group
This technology of the present invention has just taken into full account the problem of data association attributes when setting up data model, and adapts to
Customer transaction attribute polytropy and the probabilistic feature of trading activity.The rule base that this technology builds can be according to auditing result
Dynamic corrections are carried out to it.In fictitious assets transaction log test phase, the detection method that this technology uses not only simple but also
Higher precision can be obtained, Social benefit and economic benefit is notable.
Brief description
Fig. 1 is the inventive method schematic flow sheet
Fig. 2 is inventive network structural representation
Specific embodiment
To further illustrate technical scheme below by specific embodiment:
Because this technology is to be realized based on the application of eid, the therefore transaction of fictitious assets needs to carry out with eid binding.
The transaction log record that fictitious assets transaction platform based on eid produces to user in further detail, for whole transaction flow
Carried out careful division, be divided into multiple different transactional operation, such as e-commerce transaction Operation Log can be converted into following
Time series data:
Each above-mentioned transactional operation of correspondence, all can have corresponding transaction attribute information, be such as logged in ip, clearing have gold
Volume, payment have account etc., and this needs accounts for according to the concrete application of this technology.
In the implementation process of technology, netizen's activities on the internet are all bound with eid.With electronics
As a example commercial affairs, user is required for the unified certification of eid in whole process of exchange.The related behaviour of each transaction of so user
Make and eid verification process all can be recorded in fictitious assets database server each time, and hand over to improve fictitious assets
Easy transaction capabilities, these servers are based on distributed.It is distributed virtual that this technology is mainly aiming at these
Asset database is audited offline, finds abnormal data therein.
The core concept of this technology is exactly that the transactional operation daily record to fictitious assets is modeled and constructs audit regulation storehouse,
Using transaction attribute, customer transaction daily record is realized with association audit analysis then in conjunction with eid technology, finally obtain preferably virtual
Transaction in assets audit accuracy rate.Its specific implementation step is as follows:
Step 1) give certain class fictitious assets arm's length dealing log recording, referred to as training set.For this training set, root
According to the uniqueness of eid, it is pre-processed: merge the transaction log of identical eid user, ordinal number when transactional operation is converted into
According to;Count the transaction attribute information of each eid user, form customer transaction attribute information base φ.
If table 1 is exactly the attribute information base example of one section of log recording statistics in e-commerce transaction fictitious assets database
φ
Table one simplified example of 1 attribute information base
Step 2) for user transactional operation daily record founding mathematical models.By ordinal number during the transactional operation of every eid user
According to being split, segmentation length is l.Depending on l is typically by the concrete application of this technology, because dissimilar fictitious assets will be completed
Transactional operation number be indefinite, this to using this application customer transaction be accustomed to related.Additionally, can produce in user transaction process
Raw a lot of associative operations, in log recording, the number of different operation is n, can be so the transactional operation sequence of each l length
Row create the matrix c of n × n sizel.The transverse and longitudinal coordinate of this matrix is all different types of operation, and matrix element is exactly to correspond to
Operation (on the time, front, the corresponding operation of ordinate is rear for the corresponding operation of abscissa) is occurred in window size h
Frequency, i.e. certain operation number of times to appearance in h continuous operation.Matrix clEach element represent operate between association
Degree, numerical value bigger illustrate this operation to association tightr, that is, customer transaction carry out previous operation after h step in carry out after one
The possibility of individual operation is very big.
Parameter in this step can be selected according to different fictitious assets transaction platforms, and different platforms is to transaction
The granularity of division of operation is inconsistent, and that is, n is unequal, can take union or the common factor of the division of each transaction platform.This depends on this
The specific environment of technology application, if occuring simultaneously, then mitigates system resource burden, but audit precision reduces;If union, then increase
System burden, but audit precision is improved.But, generally, user can complete certain within about 10 operations
Fictitious assets is concluded the business, and therefore segmentation length is l=10.Window size h is usually the integral multiple splitting length l, because only that this
Attribute information between sample ability digging user fictitious assets transaction.
Step 3) extract the main feature of customer transaction operation behavior using spectral theory.By the matrix stack that training set conversion obtains it is
C={ c1,c2,…,cn, size is all n × n, calculates Mean Matrix c by equation (1)mean, n is ordinal number when in training set
Sum according to section.
Each matrix in matrix stack c deducts Mean Matrix cmeanObtain new matrix stack c '.For the n × n square in c '
Battle array ci', 1 × n can be rewritten as2VectorI.e.1≤i
≤n.Construction covariance matrix e, size is n2×n2, the implication of matrix e element be exactly operate to operation to the degree of association before.
Characteristic value according to pca method calculating matrix e is λiWith corresponding characteristic vector
According to the property of spectral theory and matrix e,Constitute n2×n2One group of orthogonal basis of dimension space.From n2Individual feature
Before selecting in vector, k is so that the principal component contributor rate of this k feature reaches predetermined threshold η, that is,
The selection of η value is related to the time complexity of this technology and the accuracy rate of audit, and usual value not only can for 0.9
Obtain the principal character of user's fictitious assets transaction moreover it is possible to ensure higher audit precision.
Characteristic vector v that covariance matrix e extracts1,v2,…,vkWith matrix ciProperty the same, both be from same
Individual vector space, represent each operation between correlation degree.1×n2Vector viThe matrix v of n × n size can be written asi(1
≤ i≤k) it is not necessary to using all of characteristic vector it is possible to by any customer transaction daily record time series data matrix by n2Individual feature
K in vector shows, and therefore this k characteristic vector just represents the main feature of customer transaction behavior.
Step 4) pass through customer transaction behavior main feature construction audit regulation storehouse.Any fictitious assets transaction log conversion
Time series data matrix can use vector product
Calculate its coordinate representation in the main feature space that k characteristic vector is constituted, be designated as x=(x1..., xk), its
The c of middle n × n is rewritten into 1 × n2'sCalculated by above formula, the time series data matrix of any higher-dimension can convert based on feature
The coordinate representation in space, has reached the purpose of dimensionality reduction.
Above formula can calculate positive divisor module a of time series data matrixiWith negative factor module bi, wherein aiIn element by
xiviThe value that middle element is more than threshold alpha is constituted, and remaining constitutes bi.Positive divisor module aiReflect and use during arm's length dealing
The most possible generation sequence of operation in family, and biThen reflect the sequence of operation of most unlikely appearance.Calculated by formula (4), (5)
Coordinate representation in main feature space for each matrix constitute positive divisor module group in c 'With negative factor modulus
Block groupSoJust constitute fictitious assets transaction log audit regulation storehouse.By series of computation,
Finally give the easy model of virtual money of eid userWithThese models are stored on specific audit database server, so that
Use when afterwards the transaction log record of eid user being audited.
Step 5) fictitious assets transactional operation and transaction Attribute Association audit.For arbitrary user's fictitious assets to be detected
Transaction time series data s, sends out according to the attribute that the eid that user uses inquires about s associative operation in transaction attribute information base φ first
Whether raw probability all reaches threshold value ζ set in advance (as the Nogata distribution statisticses of attribute information), if reaching, by step 2) structure
Build matrix m, the row or column being otherwise just not up to the Attribute Association operation place of threshold value ζ in matrix m adds penalty factor θ, θ value
Determined by practical application;Then deduct Mean Matrix cmeanObtain m ', and according to formula (4), formula (5) is just calculating this time series data
Negative factor module ai' and bi′;Finally forWithIn each group of module, according to following equalities calculate the virtual money of this section of user
Produce the whether normal judgment value of transaction log.
The value of ζ typically takes 0.8, and now the value of θ is more complicated, if a certain property value of this time transaction of eid user falls
The interval probability entering is more than ζ, then θ is 0;If the interval probability that a certain property value of this time transaction of eid user falls into is less than ζ,
Then θ is the difference of this interval probability and ζ.As the user 1 in table 1, no matter his certain dealing money is how many, this θ value for ζ-
0.5th, ζ -0.45 or ζ -0.05;And for user 2, if his dealing money is less than 1000 yuan, then this θ value is 0, if its
It is worth, then the algorithm of θ value is identical with the situation of user 1.
For auditor's judgement value ε, there is a following audit regulation:
IfAndThen audit as normal;
IfAndThen audit as exception;
IfAnd
IfThen audit as normal;
Otherwise audit as exception;
IfAnd
IfThen audit as exception
Otherwise audit as normal.
From many-sided consideration such as computational complexity and audit accuracy rate, the value of ε is 0.8 to this technology.Table 2 is that an audit is real
Example.
Table 2 is simply audited example
Step 6) algorithm correction.If this technology correct judgment and auditing result is normal, user's respective transaction is operated
Attribute information adds attribute information base φ, and carries out probability statistics according to user eid;If this technology misjudgment and auditing result
For normal, then the negative factor module of the generation of user's time series data is added negative factor module groupIf this technology misjudgment and
Auditing result is abnormal, then the positive divisor module of the generation of user's time series data is added positive divisor module group
In sum, technical solution of the present invention has just taken into full account asking of data association attributes when setting up data model
Topic, and adapt to customer transaction attribute polytropy and the probabilistic feature of trading activity.The rule base that this technology builds can
So that dynamic corrections are carried out to it according to auditing result.In fictitious assets transaction log test phase, the detection of the use of this technology
Method is not only simple but also can obtain higher precision.
Be more than exemplary description has been carried out to the present invention it is clear that the present invention realize do not limited by aforesaid way
System, as long as employing the various improvement that technical solution of the present invention is carried out, or the not improved design by the present invention and technical scheme
Directly apply to other occasions, all within the scope of the present invention.
Claims (1)
1. a kind of cross-platform fictitious assets transaction auditing method based on eid and spectral theory is it is characterised in that include following walking
Rapid:
Step 1, the arm's length dealing log recording of certain class fictitious assets given, referred to as training set;For this training set, according to
The uniqueness of eid, pre-processes to it: merges the transaction log of identical eid user, ordinal number when transactional operation is converted into
According to counting the transaction attribute information of each eid user, form customer transaction attribute information base φ;
Step 2, the transactional operation daily record founding mathematical models for user: the transactional operation time series data of every eid user is entered
Row segmentation, segmentation length is l;Additionally, the number of operation different in log recording is designated as n, can be so each l length
Transactional operation sequence create n × n size matrix cl;The transverse and longitudinal coordinate of this matrix is all different types of operation, and matrix
Element is exactly the corresponding frequency operating to appearance in window size h, and that is, in h continuous operation, certain operation is secondary to occur
Number;Matrix clEach element represent operate between the degree of association;
Step 3, extract the main feature of customer transaction operation behavior using spectral theory: be c=by the training set matrix stack that obtains of conversion
{c1,c2,…,cn, ciIt is all n × n, 1≤i≤n, Mean Matrix c is calculated by equation (1)mean, n is sequential in training set
The sum of data segment;
Each matrix in matrix stack c deducts Mean Matrix cmeanObtain new matrix stack c ';For n × n matrix c in c 'i',
1 × n can be rewritten as2VectorI.e.
Construction covariance matrix e, size is n2×n2, the implication of matrix e element be exactly operate to operation to the degree of association before;
Characteristic value according to pca method calculating matrix e is λiWith corresponding characteristic vector
According to the property of spectral theory and matrix e,Constitute n2×n2One group of orthogonal basis of dimension space, from n2Individual feature
Before selecting in vector, k is so that the principal component contributor rate of this k feature reaches predetermined threshold η, that is,
This k characteristic vector just represents the main feature of customer transaction behavior;
Step 4, pass through customer transaction behavior main feature construction audit regulation storehouse;The sequential of any fictitious assets transaction log conversion
Data matrix can use vector product
Calculate its coordinate representation in the main feature space that k characteristic vector is constituted, be designated as x=(x1,…,xk), wherein n × n
C be rewritten into 1 × n2'sCalculated by above formula, the time series data matrix of any higher-dimension can convert based on feature space
Coordinate representation, has reached the purpose of dimensionality reduction;
Wherein aiIn element by xiviThe value that middle element is more than threshold alpha is constituted, and remaining constitutes bi;Positive divisor module aiReflect
The most possible generation sequence of operation of user during arm's length dealing, and biThen reflect the operation sequence of most unlikely appearance
Row;Calculate in c ' coordinate representation in main feature space for each matrix by formula (4), (5) and constitute positive divisor module group With negative factor module groupSoJust constitute the audit of fictitious assets transaction log
Rule base;
Step 5, fictitious assets transactional operation and transaction Attribute Association audit: for arbitrary user's fictitious assets transaction to be detected
Time series data s, occurs general first according to the attribute that the eid that user uses inquires about s associative operation in transaction attribute information base φ
Whether rate all reaches threshold value ζ set in advance, if reaching, builds matrix m by step 2, is otherwise just not up to threshold in matrix m
The row or column that the Attribute Association operation of value ζ is located adds penalty factor θ, and θ value is determined by practical application;Then deduct Mean Matrix
cmeanObtain m ', and according to formula (4), formula (5) calculates positive and negative factor module a of this time series datai' and bi′;Finally forWith
In each group of module, calculate the whether normal judgment value of this section of fictitious assets transaction log of user according to following equalities;
For auditor's judgement value ε, there is a following audit regulation:
IfAndThen audit as normal;
IfAndThen audit as exception;
IfAnd
If i.Then audit as normal;
Ii. otherwise audit as exception;
IfAnd
If i.Then audit as exception
Ii. otherwise audit as normal;
Step 6, algorithm correction, if this technology correct judgment and auditing result is normal, by user's respective transaction operational attribute
Information adds attribute information base φ, and carries out probability statistics according to user eid;If this technology misjudgment and auditing result are just
Often, then the negative factor module of the generation of user's time series data is added negative factor module groupIf this technology misjudgment and audit
Result is abnormal, then the positive divisor module of the generation of user's time series data is added positive divisor module group
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410298277.7A CN104090835B (en) | 2014-06-27 | 2014-06-27 | eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410298277.7A CN104090835B (en) | 2014-06-27 | 2014-06-27 | eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104090835A CN104090835A (en) | 2014-10-08 |
CN104090835B true CN104090835B (en) | 2017-01-25 |
Family
ID=51638553
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410298277.7A Active CN104090835B (en) | 2014-06-27 | 2014-06-27 | eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104090835B (en) |
Families Citing this family (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105654277A (en) * | 2014-12-08 | 2016-06-08 | 阿里巴巴集团控股有限公司 | Transaction operation identification method and server |
CN106156904B (en) * | 2015-03-24 | 2020-04-07 | 中国人民解放军国防科学技术大学 | Cross-platform virtual asset tracing method based on eID |
CN106156026B (en) * | 2015-03-24 | 2020-02-18 | 中国人民解放军国防科学技术大学 | Method for discovering online abnormity of virtual assets based on data flow |
CN105117477B (en) * | 2015-09-09 | 2018-07-31 | 中国人民解放军国防科学技术大学 | A kind of the fictitious assets anomaly system and implementation method of adaptive self feed back |
CN107026731A (en) * | 2016-01-29 | 2017-08-08 | 阿里巴巴集团控股有限公司 | A kind of method and device of subscriber authentication |
CN108449307B (en) * | 2017-02-16 | 2020-12-29 | 上海行邑信息科技有限公司 | Method for identifying risk equipment |
CN107103470B (en) * | 2017-03-03 | 2021-08-13 | 九次方大数据信息集团有限公司 | Method and system for improving information security in spot transaction process |
CN107766500A (en) * | 2017-10-19 | 2018-03-06 | 国网冀北电力有限公司 | The auditing method of fixed assets card |
CN108647243B (en) * | 2018-04-13 | 2021-11-23 | 中国神华能源股份有限公司 | Industrial big data storage method based on time series |
CN108829715B (en) * | 2018-05-04 | 2022-03-25 | 慧安金科(北京)科技有限公司 | Method, apparatus, and computer-readable storage medium for detecting abnormal data |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6119229A (en) * | 1997-04-11 | 2000-09-12 | The Brodia Group | Virtual property system |
CN102724176A (en) * | 2012-02-23 | 2012-10-10 | 北京市计算中心 | Intrusion detection system facing cloud calculating environment |
-
2014
- 2014-06-27 CN CN201410298277.7A patent/CN104090835B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6119229A (en) * | 1997-04-11 | 2000-09-12 | The Brodia Group | Virtual property system |
CN102724176A (en) * | 2012-02-23 | 2012-10-10 | 北京市计算中心 | Intrusion detection system facing cloud calculating environment |
Non-Patent Citations (2)
Title |
---|
基于共生矩阵的电子商务交易日志异常检测;全拥 等;《2013云计算与信息技术应用学术会议》;20130831;第39-45页 * |
基于电子身份的虚拟资产保全系统的研究与实现;白志华 等;《2013云计算与信息技术应用学术会议优秀论文》;20130831;第109-114页 * |
Also Published As
Publication number | Publication date |
---|---|
CN104090835A (en) | 2014-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104090835B (en) | eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method | |
CN108156237A (en) | Product information method for pushing, device, storage medium and computer equipment | |
CN107302547A (en) | A kind of web service exceptions detection method and device | |
CN104881783A (en) | E-bank account fraudulent conduct and risk detecting method and system | |
AU2020273310A1 (en) | Identity recognition method and device | |
CN108156131A (en) | Webshell detection methods, electronic equipment and computer storage media | |
CN111709756A (en) | Method and device for identifying suspicious communities, storage medium and computer equipment | |
CN106548343A (en) | A kind of illegal transaction detection method and device | |
CN110992041A (en) | Individual behavior hypersphere construction method for online fraud detection | |
CN110019194A (en) | Verification of data method, apparatus, computer equipment and storage medium | |
CN109300026A (en) | Financial intelligent analysis method and its system based on automatic book keeping operation big data | |
CN109039710A (en) | Route data auditing method, device, server and storage medium | |
CN107993056A (en) | With reference to weekly wage and the emolument delivery system and method for monthly pay | |
CN109784833A (en) | A kind of generation method and equipment of income statement | |
CN108229964B (en) | Transaction behavior profile construction and authentication method, system, medium and equipment | |
CN111797942A (en) | User information classification method and device, computer equipment and storage medium | |
CN111709837A (en) | Risk conduction assessment method and device based on business bank customer incidence relation | |
CN116302640A (en) | Abnormality analysis method, abnormality analysis device, abnormality analysis computer device, and abnormality analysis program | |
CN108053510A (en) | Intelligent attendance system and method | |
CN113051257B (en) | Service data cleaning method and device | |
CN114493820A (en) | Correlation verification type acquisition method and device suitable for financial data and storage medium | |
CN108446985A (en) | The share system and method for Portfolio Selection | |
JP7325318B2 (en) | Trail recording system and data verification method | |
EP4128655A1 (en) | Deterministic sparse-tree based cryptographic proof of liabilities | |
Aghania | Hybrid tip selection algorithm in IOTA |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |