CN104090835B - eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method - Google Patents

eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method Download PDF

Info

Publication number
CN104090835B
CN104090835B CN201410298277.7A CN201410298277A CN104090835B CN 104090835 B CN104090835 B CN 104090835B CN 201410298277 A CN201410298277 A CN 201410298277A CN 104090835 B CN104090835 B CN 104090835B
Authority
CN
China
Prior art keywords
matrix
transaction
audit
user
eid
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410298277.7A
Other languages
Chinese (zh)
Other versions
CN104090835A (en
Inventor
全拥
贾焰
韩伟红
李爱平
周斌
杨树强
李树栋
黄九鸣
李虎
邓璐
姬炳帅
刘斐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National University of Defense Technology
Original Assignee
National University of Defense Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National University of Defense Technology filed Critical National University of Defense Technology
Priority to CN201410298277.7A priority Critical patent/CN104090835B/en
Publication of CN104090835A publication Critical patent/CN104090835A/en
Application granted granted Critical
Publication of CN104090835B publication Critical patent/CN104090835B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The invention discloses an eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method. The core concept of the technology includes that modeling is performed on transaction operation logs of cross-platform virtual assets and an audit rule base is constructed, the associated audit analysis on the user transaction logs is implemented through transaction attributes by combining with an eID technology, and the ideal virtual asset transaction audit accuracy rate is obtained finally. According to the eID and spectrum theory based cross-platform virtual asset transaction audit method, data related attributes are fully considered when a data model is established and the method can adapt to the variability of the user transaction attributes and the uncertainty of transaction behaviors; the dynamic correction can be performed on the rule base according to audit results through the construction of the rule base; the detection method is simple and the high accuracy can be obtained in the virtual asset transaction log testing phase.

Description

Cross-platform fictitious assets transaction auditing method based on eid and spectral theory
Technical field
This technology belongs to Networks and information security field and in particular to a kind of cross-platform virtual based on eid and spectral theory Transaction in assets auditing method.
Background technology
Eid is the english abbreviation of electronic ID card (electronic ident i ty), and full name is citizen's network electronic body Part mark, is alienation form on network for the resident identification card.Eid is the authority of remote proving individual true identity on network Electronic information file, signs and issues (http://eid.cn/khat i by Ministry of Public Security citizen network identity identifying system seid.html).It is the one group of unique network identifier and digital certificate being generated by netizen's personally identifiable information, and netizen Real information is saved in third party's trust authority.Smart chip card is other identification informations of function and user (as title, e- Mai l, identification card number etc.) bundle, the checking information of user identity is provided on network so that each netizen is in network Have in virtual environment and the corresponding true identity of only one of which.Eid has authority, security and public credibility, and it avoids directly Connect the privacy compromise problem leading to using identity card, realize " front end is anonymous, rear end real name " mechanism truly.At present, As a major project of the Department of Science and Technology, eid starts test run in some areas such as Beijing, Shanghai and uses, mainly on internet Remote identity be identified and verify, such as campus network, ecommerce, the network media, online service etc..Beijing post and telecommunications is big School garden net has achieved the service function based on eid substantially, and achieves the achievement of stage.The use of eid is this skill The realization of art is laid a good foundation.
Fictitious assets transaction audit is mainly the exception detecting in process of exchange, that is, by concluding the business related day to fictitious assets Will is associated analyzing, and finds the violation operation behavior to fictitious assets for the user in time.Abnormal audit is the important of data mining Content, its implementation has multiple.Abnormal auditing method based on classification: the abnormal audit technique based on classification is two ranks Section process, including study stage and sorting phase.In the study stage, also known as the training stage, set up and describe predefined data class Or the grader of concept set, by effective mark training set structural classification device;Sorting phase, also known as test phase, utilizes and divides One test object is labeled as normal or abnormal by class device.Its use is assumed based on general as follows: empty in given feature Between in, grader (tan p n, steinbach m, the kumar distinguishing normal and abnormal data class must be constructed v.introduct ion to data mining[j].2006.).Based on closest abnormal audit technique: given feature is empty Between in data set, it is possible to use distance metric is quantifying the similitude between object.Intuitively, away from the object of other objects Can be considered abnormal, the method based on propinquity supposes: abnormal data deviates significantly from data set with the propinquity of its arest neighbors In other data and their neighbours between propinquity (byers s, raftery a e.nearest-neighbor clutter removal for est imat ing features in spat ial point processes[j] .journal of the american stat i st ical assoc iat ion,1998,93(442):577-584.). Statistics exception audit technique: statistics exception audit technique is assumed to the normality of data.They suppose in data set Normal subjects produced by a random process (generation model), therefore, normal subjects occur in the high probability of this stochastic model In region, and in low probability region to as if abnormal.The general thoughts of this technology are: one matching data-oriented collection of study Generation model, then identify the object in this model low probability region, they be considered as exception (aggarkal c c, phi l ip s y.outl i er detect ion ki th uncertain data[c]//sdm.2008:483-493.).Information By abnormal audit technique: information theory technology adopts the different information theory sides such as kolmogorov complexity, entropy and relative entropy The information content that method analyze data is concentrated.The use of this technology is based on the fact that the exception in data set can cause data set to believe The irregular change of breath amount.The step of information-theoretical abnormality detection technology is as follows: data-oriented collection d, finds out the one of this data set So that the value of c (d)-c (d-i) is maximum, the data in subset i is considered as abnormal to individual smallest subset i, and wherein c (d) represents number Complexity (keogh e, lonardi s, ratanamahatana c a.tokards parameter-free data according to d mining[c]//proceedings of the tenth acm sigkdd internat i onal conference on knokl edge di scovery and data mining.acm,2004:206-215.).Exception audit based on spectral theory Technology: spectral technology finds a kind of approximate representation of data by one group of attribute comprising data set principal character.Different based on spectrum Often audit technique assumes that data can be mapped in the subspace of low dimensional and normal data has notable area with abnormal data Not.Therefore this technology typically finds such subspace using PCA, in this subspace, abnormal data easily quilt Identification (agovic a, banerjee a, ganguly a r, et al.6anomaly detect ion in transportat ion corridors us ing manifold embedding[j].knokledge di scovery from sensor data,2008:81-105.).
In fictitious assets transaction audit, it is abnormal, because fictitious assets that the exception relevant with fictitious assets is generally situation There is polytype, different types of fictitious assets attribute is different;And the operation to similar fictitious assets for the different users Different, this is related to the diversity of fictitious assets transaction platform.Therefore, the audit of fictitious assets comprises two aspect contents: virtual The audit of Asset operation daily record and the audit of fictitious assets attribute information.Therefore solely using certain technology above-mentioned to virtual money The transaction produced carry out abnormal audit not science it is also difficult to obtain higher Detection accuracy.Existing abnormal auditing method side Overweight transfer attribute or the frequency attribute of Audit data, the association attributes of little focused data.
Content of the invention
For the defect of prior art, this technology has just taken into full account asking of data association attributes when setting up data model Topic, and adapt to customer transaction attribute polytropy and the probabilistic feature of trading activity.This technology is by using spectral theory Method builds the audit regulation storehouse that according to auditing result, it can be carried out with dynamic corrections, and combines the realization of eid technology to virtual The cross-platform audit of transaction in assets.In fictitious assets transaction log test phase, the detection method that this technology uses is not only simple And higher precision can be obtained.
The core concept of this technology is exactly that the transactional operation daily record to fictitious assets is modeled and constructs audit regulation storehouse, Using transaction attribute, customer transaction daily record is realized with association audit analysis then in conjunction with eid technology, finally obtain preferably virtual Transaction in assets audit accuracy rate.The present invention program is as follows:
Step 1, the arm's length dealing log recording of certain class fictitious assets given, referred to as training set;For this training set, root According to the uniqueness of eid, it is pre-processed: merge the transaction log of identical eid user, ordinal number when transactional operation is converted into According to counting the transaction attribute information of each eid user, form customer transaction attribute information base φ;
Step 2, the transactional operation daily record founding mathematical models for user: by ordinal number during the transactional operation of every eid user According to being split, segmentation length is l;Additionally, the number of operation different in log recording is designated as n, can be so every The transactional operation sequence of individual l length creates the matrix c of n × n sizel;The transverse and longitudinal coordinate of this matrix is all different types of operation, and Matrix element is exactly the frequency to appearance in window size h for the corresponding operation, and that is, in h continuous operation, certain operates to appearance Number of times;Matrix clEach element represent operate between the degree of association;
Step 3, extract the main feature of customer transaction operation behavior using spectral theory: by the training set matrix stack that obtains of conversion be C={ c1,c2,…,cn, size is all n × n, calculates Mean Matrix c by equation (1)mean, n is ordinal number when in training set Sum according to section;
c m e a n = 1 n σ i = 1 n c i - - - ( 1 )
Each matrix in matrix stack c deducts Mean Matrix cmeanObtain new matrix stack c ';For the n × n square in c ' Battle array ci', 1 × n can be rewritten as2VectorI.e.1≤i ≤ n, constructs covariance matrix e, size is n2×n2, the implication of matrix e element be exactly operate to operation to the degree of association before;
e = σ i = 1 n c i ^ t c i ^ - - - ( 2 )
Characteristic value according to pca method calculating matrix e is λiWith corresponding characteristic vector According to the property of spectral theory and matrix e,Constitute n2×n2One group of orthogonal basis of dimension space.From n2Individual feature Before selecting in vector, k is so that the principal component contributor rate of this k feature reaches predetermined threshold η, that is,
σ i = 1 k λ i σ i = 1 n 2 λ i &greaterequal; η - - - ( 3 )
This k characteristic vector just represents the main feature of customer transaction behavior.
Step 4, pass through customer transaction behavior main feature construction audit regulation storehouse.Any fictitious assets transaction log conversion Time series data matrix can use vector product
x i = v i · c ^ t , 1 ≤ i ≤ k - - - ( 4 )
Calculate its coordinate representation in the main feature space that k characteristic vector is constituted, be designated as x=(x1,…,xk), wherein The c of n × n is rewritten into 1 × n2'sCalculated by above formula, the time series data matrix of any higher-dimension can convert based on feature empty Between coordinate representation, reached the purpose of dimensionality reduction;
σ i = 1 k x i v i = σ i = 1 k ( a i + b i ) = σ i = 1 k a i + σ i = 1 k b i - - - ( 5 )
Wherein aiIn element by xiviThe value that middle element is more than threshold alpha is constituted, and remaining constitutes bi;Positive divisor module aiInstead Reflect the most possible generation sequence of operation of user during arm's length dealing, and biThen reflect the operation of most unlikely appearance Sequence;Calculate in c ' coordinate representation in main feature space for each matrix by formula (4), (5) and constitute positive divisor module groupWith negative factor module groupSoJust constitute fictitious assets transaction log to examine Meter rule base;
Step 5, fictitious assets transactional operation and transaction Attribute Association audit: for arbitrary user's fictitious assets to be detected Transaction time series data s, sends out according to the attribute that the eid that user uses inquires about s associative operation in transaction attribute information base φ first Whether raw probability all reaches threshold value ζ set in advance, if reaching, building matrix m by step 2, otherwise just not reaching in matrix m The row or column being located to the Attribute Association operation of threshold value ζ adds penalty factor θ, and θ value is determined by practical application;Then deduct average Matrix cmeanObtain m ', and according to formula (4), formula (5) calculates positive and negative factor module a of this time series datai' and bi′;Finally forWithIn each group of module, calculate the whether normal judgment value of this section of fictitious assets transaction log of user according to following equalities;
For auditor's judgement value ε, there is a following audit regulation:
IfAndThen audit as normal;
IfAndThen audit as exception;
IfAnd
If i.Then audit as normal;
Ii. otherwise audit as exception;
IfAnd
If i.Then audit as exception
Ii. otherwise audit as normal;
Step 6, algorithm correction, if this technology correct judgment and auditing result is normal, user's respective transaction are operated Attribute information adds attribute information base φ, and carries out probability statistics according to user eid;If this technology misjudgment and auditing result For normal, then the negative factor module of the generation of user's time series data is added negative factor module groupIf this technology misjudgment and Auditing result is abnormal, then the positive divisor module of the generation of user's time series data is added positive divisor module group
This technology of the present invention has just taken into full account the problem of data association attributes when setting up data model, and adapts to Customer transaction attribute polytropy and the probabilistic feature of trading activity.The rule base that this technology builds can be according to auditing result Dynamic corrections are carried out to it.In fictitious assets transaction log test phase, the detection method that this technology uses not only simple but also Higher precision can be obtained, Social benefit and economic benefit is notable.
Brief description
Fig. 1 is the inventive method schematic flow sheet
Fig. 2 is inventive network structural representation
Specific embodiment
To further illustrate technical scheme below by specific embodiment:
Because this technology is to be realized based on the application of eid, the therefore transaction of fictitious assets needs to carry out with eid binding. The transaction log record that fictitious assets transaction platform based on eid produces to user in further detail, for whole transaction flow Carried out careful division, be divided into multiple different transactional operation, such as e-commerce transaction Operation Log can be converted into following Time series data:
Each above-mentioned transactional operation of correspondence, all can have corresponding transaction attribute information, be such as logged in ip, clearing have gold Volume, payment have account etc., and this needs accounts for according to the concrete application of this technology.
In the implementation process of technology, netizen's activities on the internet are all bound with eid.With electronics As a example commercial affairs, user is required for the unified certification of eid in whole process of exchange.The related behaviour of each transaction of so user Make and eid verification process all can be recorded in fictitious assets database server each time, and hand over to improve fictitious assets Easy transaction capabilities, these servers are based on distributed.It is distributed virtual that this technology is mainly aiming at these Asset database is audited offline, finds abnormal data therein.
The core concept of this technology is exactly that the transactional operation daily record to fictitious assets is modeled and constructs audit regulation storehouse, Using transaction attribute, customer transaction daily record is realized with association audit analysis then in conjunction with eid technology, finally obtain preferably virtual Transaction in assets audit accuracy rate.Its specific implementation step is as follows:
Step 1) give certain class fictitious assets arm's length dealing log recording, referred to as training set.For this training set, root According to the uniqueness of eid, it is pre-processed: merge the transaction log of identical eid user, ordinal number when transactional operation is converted into According to;Count the transaction attribute information of each eid user, form customer transaction attribute information base φ.
If table 1 is exactly the attribute information base example of one section of log recording statistics in e-commerce transaction fictitious assets database φ
Table one simplified example of 1 attribute information base
Step 2) for user transactional operation daily record founding mathematical models.By ordinal number during the transactional operation of every eid user According to being split, segmentation length is l.Depending on l is typically by the concrete application of this technology, because dissimilar fictitious assets will be completed Transactional operation number be indefinite, this to using this application customer transaction be accustomed to related.Additionally, can produce in user transaction process Raw a lot of associative operations, in log recording, the number of different operation is n, can be so the transactional operation sequence of each l length Row create the matrix c of n × n sizel.The transverse and longitudinal coordinate of this matrix is all different types of operation, and matrix element is exactly to correspond to Operation (on the time, front, the corresponding operation of ordinate is rear for the corresponding operation of abscissa) is occurred in window size h Frequency, i.e. certain operation number of times to appearance in h continuous operation.Matrix clEach element represent operate between association Degree, numerical value bigger illustrate this operation to association tightr, that is, customer transaction carry out previous operation after h step in carry out after one The possibility of individual operation is very big.
Parameter in this step can be selected according to different fictitious assets transaction platforms, and different platforms is to transaction The granularity of division of operation is inconsistent, and that is, n is unequal, can take union or the common factor of the division of each transaction platform.This depends on this The specific environment of technology application, if occuring simultaneously, then mitigates system resource burden, but audit precision reduces;If union, then increase System burden, but audit precision is improved.But, generally, user can complete certain within about 10 operations Fictitious assets is concluded the business, and therefore segmentation length is l=10.Window size h is usually the integral multiple splitting length l, because only that this Attribute information between sample ability digging user fictitious assets transaction.
Step 3) extract the main feature of customer transaction operation behavior using spectral theory.By the matrix stack that training set conversion obtains it is C={ c1,c2,…,cn, size is all n × n, calculates Mean Matrix c by equation (1)mean, n is ordinal number when in training set Sum according to section.
c m e a n = 1 n σ i = 1 n c i - - - ( 1 )
Each matrix in matrix stack c deducts Mean Matrix cmeanObtain new matrix stack c '.For the n × n square in c ' Battle array ci', 1 × n can be rewritten as2VectorI.e.1≤i ≤n.Construction covariance matrix e, size is n2×n2, the implication of matrix e element be exactly operate to operation to the degree of association before.
e = σ i = 1 n c i ^ t c i ^ - - - ( 2 )
Characteristic value according to pca method calculating matrix e is λiWith corresponding characteristic vector According to the property of spectral theory and matrix e,Constitute n2×n2One group of orthogonal basis of dimension space.From n2Individual feature Before selecting in vector, k is so that the principal component contributor rate of this k feature reaches predetermined threshold η, that is,
σ i = 1 k λ i σ i = 1 n 2 λ i &greaterequal; η - - - ( 3 )
The selection of η value is related to the time complexity of this technology and the accuracy rate of audit, and usual value not only can for 0.9 Obtain the principal character of user's fictitious assets transaction moreover it is possible to ensure higher audit precision.
Characteristic vector v that covariance matrix e extracts1,v2,…,vkWith matrix ciProperty the same, both be from same Individual vector space, represent each operation between correlation degree.1×n2Vector viThe matrix v of n × n size can be written asi(1 ≤ i≤k) it is not necessary to using all of characteristic vector it is possible to by any customer transaction daily record time series data matrix by n2Individual feature K in vector shows, and therefore this k characteristic vector just represents the main feature of customer transaction behavior.
Step 4) pass through customer transaction behavior main feature construction audit regulation storehouse.Any fictitious assets transaction log conversion Time series data matrix can use vector product
x i = v i · c ^ t , 1 ≤ i ≤ k - - - ( 4 )
Calculate its coordinate representation in the main feature space that k characteristic vector is constituted, be designated as x=(x1..., xk), its The c of middle n × n is rewritten into 1 × n2'sCalculated by above formula, the time series data matrix of any higher-dimension can convert based on feature The coordinate representation in space, has reached the purpose of dimensionality reduction.
σ i = 1 k x i v i = σ i = 1 k ( a i + b i ) = σ i = 1 k a i + σ i = 1 k b i - - - ( 5 )
Above formula can calculate positive divisor module a of time series data matrixiWith negative factor module bi, wherein aiIn element by xiviThe value that middle element is more than threshold alpha is constituted, and remaining constitutes bi.Positive divisor module aiReflect and use during arm's length dealing The most possible generation sequence of operation in family, and biThen reflect the sequence of operation of most unlikely appearance.Calculated by formula (4), (5) Coordinate representation in main feature space for each matrix constitute positive divisor module group in c 'With negative factor modulus Block groupSoJust constitute fictitious assets transaction log audit regulation storehouse.By series of computation, Finally give the easy model of virtual money of eid userWithThese models are stored on specific audit database server, so that Use when afterwards the transaction log record of eid user being audited.
Step 5) fictitious assets transactional operation and transaction Attribute Association audit.For arbitrary user's fictitious assets to be detected Transaction time series data s, sends out according to the attribute that the eid that user uses inquires about s associative operation in transaction attribute information base φ first Whether raw probability all reaches threshold value ζ set in advance (as the Nogata distribution statisticses of attribute information), if reaching, by step 2) structure Build matrix m, the row or column being otherwise just not up to the Attribute Association operation place of threshold value ζ in matrix m adds penalty factor θ, θ value Determined by practical application;Then deduct Mean Matrix cmeanObtain m ', and according to formula (4), formula (5) is just calculating this time series data Negative factor module ai' and bi′;Finally forWithIn each group of module, according to following equalities calculate the virtual money of this section of user Produce the whether normal judgment value of transaction log.
The value of ζ typically takes 0.8, and now the value of θ is more complicated, if a certain property value of this time transaction of eid user falls The interval probability entering is more than ζ, then θ is 0;If the interval probability that a certain property value of this time transaction of eid user falls into is less than ζ, Then θ is the difference of this interval probability and ζ.As the user 1 in table 1, no matter his certain dealing money is how many, this θ value for ζ- 0.5th, ζ -0.45 or ζ -0.05;And for user 2, if his dealing money is less than 1000 yuan, then this θ value is 0, if its It is worth, then the algorithm of θ value is identical with the situation of user 1.
For auditor's judgement value ε, there is a following audit regulation:
IfAndThen audit as normal;
IfAndThen audit as exception;
IfAnd
IfThen audit as normal;
Otherwise audit as exception;
IfAnd
IfThen audit as exception
Otherwise audit as normal.
From many-sided consideration such as computational complexity and audit accuracy rate, the value of ε is 0.8 to this technology.Table 2 is that an audit is real Example.
Table 2 is simply audited example
Step 6) algorithm correction.If this technology correct judgment and auditing result is normal, user's respective transaction is operated Attribute information adds attribute information base φ, and carries out probability statistics according to user eid;If this technology misjudgment and auditing result For normal, then the negative factor module of the generation of user's time series data is added negative factor module groupIf this technology misjudgment and Auditing result is abnormal, then the positive divisor module of the generation of user's time series data is added positive divisor module group
In sum, technical solution of the present invention has just taken into full account asking of data association attributes when setting up data model Topic, and adapt to customer transaction attribute polytropy and the probabilistic feature of trading activity.The rule base that this technology builds can So that dynamic corrections are carried out to it according to auditing result.In fictitious assets transaction log test phase, the detection of the use of this technology Method is not only simple but also can obtain higher precision.
Be more than exemplary description has been carried out to the present invention it is clear that the present invention realize do not limited by aforesaid way System, as long as employing the various improvement that technical solution of the present invention is carried out, or the not improved design by the present invention and technical scheme Directly apply to other occasions, all within the scope of the present invention.

Claims (1)

1. a kind of cross-platform fictitious assets transaction auditing method based on eid and spectral theory is it is characterised in that include following walking Rapid:
Step 1, the arm's length dealing log recording of certain class fictitious assets given, referred to as training set;For this training set, according to The uniqueness of eid, pre-processes to it: merges the transaction log of identical eid user, ordinal number when transactional operation is converted into According to counting the transaction attribute information of each eid user, form customer transaction attribute information base φ;
Step 2, the transactional operation daily record founding mathematical models for user: the transactional operation time series data of every eid user is entered Row segmentation, segmentation length is l;Additionally, the number of operation different in log recording is designated as n, can be so each l length Transactional operation sequence create n × n size matrix cl;The transverse and longitudinal coordinate of this matrix is all different types of operation, and matrix Element is exactly the corresponding frequency operating to appearance in window size h, and that is, in h continuous operation, certain operation is secondary to occur Number;Matrix clEach element represent operate between the degree of association;
Step 3, extract the main feature of customer transaction operation behavior using spectral theory: be c=by the training set matrix stack that obtains of conversion {c1,c2,…,cn, ciIt is all n × n, 1≤i≤n, Mean Matrix c is calculated by equation (1)mean, n is sequential in training set The sum of data segment;
c m e a n = 1 n σ i = 1 n c i - - - ( 1 )
Each matrix in matrix stack c deducts Mean Matrix cmeanObtain new matrix stack c ';For n × n matrix c in c 'i', 1 × n can be rewritten as2VectorI.e. Construction covariance matrix e, size is n2×n2, the implication of matrix e element be exactly operate to operation to the degree of association before;
e = σ i = 1 n c ^ i t c ^ i - - - ( 2 )
Characteristic value according to pca method calculating matrix e is λiWith corresponding characteristic vector According to the property of spectral theory and matrix e,Constitute n2×n2One group of orthogonal basis of dimension space, from n2Individual feature Before selecting in vector, k is so that the principal component contributor rate of this k feature reaches predetermined threshold η, that is,
σ i = 1 k λ i σ i = 1 n 2 λ i &greaterequal; η - - - ( 3 )
This k characteristic vector just represents the main feature of customer transaction behavior;
Step 4, pass through customer transaction behavior main feature construction audit regulation storehouse;The sequential of any fictitious assets transaction log conversion Data matrix can use vector product
x i = v i · c ^ t 1 ≤ i ≤ k - - - ( 4 )
Calculate its coordinate representation in the main feature space that k characteristic vector is constituted, be designated as x=(x1,…,xk), wherein n × n C be rewritten into 1 × n2'sCalculated by above formula, the time series data matrix of any higher-dimension can convert based on feature space Coordinate representation, has reached the purpose of dimensionality reduction;
σ i = 1 k x i v i = σ i = 1 k ( a i + b i ) = σ i = 1 k a i + σ i = 1 k b i - - - ( 5 )
Wherein aiIn element by xiviThe value that middle element is more than threshold alpha is constituted, and remaining constitutes bi;Positive divisor module aiReflect The most possible generation sequence of operation of user during arm's length dealing, and biThen reflect the operation sequence of most unlikely appearance Row;Calculate in c ' coordinate representation in main feature space for each matrix by formula (4), (5) and constitute positive divisor module group With negative factor module groupSoJust constitute the audit of fictitious assets transaction log Rule base;
Step 5, fictitious assets transactional operation and transaction Attribute Association audit: for arbitrary user's fictitious assets transaction to be detected Time series data s, occurs general first according to the attribute that the eid that user uses inquires about s associative operation in transaction attribute information base φ Whether rate all reaches threshold value ζ set in advance, if reaching, builds matrix m by step 2, is otherwise just not up to threshold in matrix m The row or column that the Attribute Association operation of value ζ is located adds penalty factor θ, and θ value is determined by practical application;Then deduct Mean Matrix cmeanObtain m ', and according to formula (4), formula (5) calculates positive and negative factor module a of this time series datai' and bi′;Finally forWith In each group of module, calculate the whether normal judgment value of this section of fictitious assets transaction log of user according to following equalities;
For auditor's judgement value ε, there is a following audit regulation:
IfAndThen audit as normal;
IfAndThen audit as exception;
IfAnd
If i.Then audit as normal;
Ii. otherwise audit as exception;
IfAnd
If i.Then audit as exception
Ii. otherwise audit as normal;
Step 6, algorithm correction, if this technology correct judgment and auditing result is normal, by user's respective transaction operational attribute Information adds attribute information base φ, and carries out probability statistics according to user eid;If this technology misjudgment and auditing result are just Often, then the negative factor module of the generation of user's time series data is added negative factor module groupIf this technology misjudgment and audit Result is abnormal, then the positive divisor module of the generation of user's time series data is added positive divisor module group
CN201410298277.7A 2014-06-27 2014-06-27 eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method Active CN104090835B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410298277.7A CN104090835B (en) 2014-06-27 2014-06-27 eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410298277.7A CN104090835B (en) 2014-06-27 2014-06-27 eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method

Publications (2)

Publication Number Publication Date
CN104090835A CN104090835A (en) 2014-10-08
CN104090835B true CN104090835B (en) 2017-01-25

Family

ID=51638553

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410298277.7A Active CN104090835B (en) 2014-06-27 2014-06-27 eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method

Country Status (1)

Country Link
CN (1) CN104090835B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105654277A (en) * 2014-12-08 2016-06-08 阿里巴巴集团控股有限公司 Transaction operation identification method and server
CN106156904B (en) * 2015-03-24 2020-04-07 中国人民解放军国防科学技术大学 Cross-platform virtual asset tracing method based on eID
CN106156026B (en) * 2015-03-24 2020-02-18 中国人民解放军国防科学技术大学 Method for discovering online abnormity of virtual assets based on data flow
CN105117477B (en) * 2015-09-09 2018-07-31 中国人民解放军国防科学技术大学 A kind of the fictitious assets anomaly system and implementation method of adaptive self feed back
CN107026731A (en) * 2016-01-29 2017-08-08 阿里巴巴集团控股有限公司 A kind of method and device of subscriber authentication
CN108449307B (en) * 2017-02-16 2020-12-29 上海行邑信息科技有限公司 Method for identifying risk equipment
CN107103470B (en) * 2017-03-03 2021-08-13 九次方大数据信息集团有限公司 Method and system for improving information security in spot transaction process
CN107766500A (en) * 2017-10-19 2018-03-06 国网冀北电力有限公司 The auditing method of fixed assets card
CN108647243B (en) * 2018-04-13 2021-11-23 中国神华能源股份有限公司 Industrial big data storage method based on time series
CN108829715B (en) * 2018-05-04 2022-03-25 慧安金科(北京)科技有限公司 Method, apparatus, and computer-readable storage medium for detecting abnormal data

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6119229A (en) * 1997-04-11 2000-09-12 The Brodia Group Virtual property system
CN102724176A (en) * 2012-02-23 2012-10-10 北京市计算中心 Intrusion detection system facing cloud calculating environment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6119229A (en) * 1997-04-11 2000-09-12 The Brodia Group Virtual property system
CN102724176A (en) * 2012-02-23 2012-10-10 北京市计算中心 Intrusion detection system facing cloud calculating environment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于共生矩阵的电子商务交易日志异常检测;全拥 等;《2013云计算与信息技术应用学术会议》;20130831;第39-45页 *
基于电子身份的虚拟资产保全系统的研究与实现;白志华 等;《2013云计算与信息技术应用学术会议优秀论文》;20130831;第109-114页 *

Also Published As

Publication number Publication date
CN104090835A (en) 2014-10-08

Similar Documents

Publication Publication Date Title
CN104090835B (en) eID (electronic IDentity) and spectrum theory based cross-platform virtual asset transaction audit method
CN108156237A (en) Product information method for pushing, device, storage medium and computer equipment
CN107302547A (en) A kind of web service exceptions detection method and device
CN104881783A (en) E-bank account fraudulent conduct and risk detecting method and system
AU2020273310A1 (en) Identity recognition method and device
CN108156131A (en) Webshell detection methods, electronic equipment and computer storage media
CN111709756A (en) Method and device for identifying suspicious communities, storage medium and computer equipment
CN106548343A (en) A kind of illegal transaction detection method and device
CN110992041A (en) Individual behavior hypersphere construction method for online fraud detection
CN110019194A (en) Verification of data method, apparatus, computer equipment and storage medium
CN109300026A (en) Financial intelligent analysis method and its system based on automatic book keeping operation big data
CN109039710A (en) Route data auditing method, device, server and storage medium
CN107993056A (en) With reference to weekly wage and the emolument delivery system and method for monthly pay
CN109784833A (en) A kind of generation method and equipment of income statement
CN108229964B (en) Transaction behavior profile construction and authentication method, system, medium and equipment
CN111797942A (en) User information classification method and device, computer equipment and storage medium
CN111709837A (en) Risk conduction assessment method and device based on business bank customer incidence relation
CN116302640A (en) Abnormality analysis method, abnormality analysis device, abnormality analysis computer device, and abnormality analysis program
CN108053510A (en) Intelligent attendance system and method
CN113051257B (en) Service data cleaning method and device
CN114493820A (en) Correlation verification type acquisition method and device suitable for financial data and storage medium
CN108446985A (en) The share system and method for Portfolio Selection
JP7325318B2 (en) Trail recording system and data verification method
EP4128655A1 (en) Deterministic sparse-tree based cryptographic proof of liabilities
Aghania Hybrid tip selection algorithm in IOTA

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant