[go: up one dir, main page]

CN118505235B - A management method and system for e-commerce users - Google Patents

A management method and system for e-commerce users Download PDF

Info

Publication number
CN118505235B
CN118505235B CN202410945665.3A CN202410945665A CN118505235B CN 118505235 B CN118505235 B CN 118505235B CN 202410945665 A CN202410945665 A CN 202410945665A CN 118505235 B CN118505235 B CN 118505235B
Authority
CN
China
Prior art keywords
user
data
interactive content
commerce platform
commerce
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410945665.3A
Other languages
Chinese (zh)
Other versions
CN118505235A (en
Inventor
肖荣胜
吴尚游
谢凤姣
周杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Chongqian Industry Co ltd
Original Assignee
Shenzhen Chongqian Industry Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Chongqian Industry Co ltd filed Critical Shenzhen Chongqian Industry Co ltd
Priority to CN202410945665.3A priority Critical patent/CN118505235B/en
Publication of CN118505235A publication Critical patent/CN118505235A/en
Application granted granted Critical
Publication of CN118505235B publication Critical patent/CN118505235B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/01Customer relationship services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a management method and a system for E-commerce users, which are applied to the field of data processing, and the invention can help E-commerce customer service personnel and management personnel to maintain consistent processing standards for the E-commerce users in different channels or areas by establishing a unified data classification and standardization system including a definition and classification method of sensitive information, and simultaneously, corresponding data management strategies and processes including data storage positions, access authority control and data transfer rules are formulated according to industry standards in different areas so as to ensure compliance and safety after data transfer.

Description

E-commerce user management method and system
Technical Field
The invention relates to the field of data processing, in particular to a management method and system for an e-commerce user.
Background
The management and the dispatch of the e-commerce customer service are of great importance in the multi-channel customer service management, and relate to how to effectively allocate and manage customer service resources to meet the customer demands of different channels and areas, while the e-commerce customer service is difficult to ensure whether the data conforms to the local industry standard after the data are cross-regional when the data of the e-commerce customers are processed, because different channels and areas have different definitions on the e-commerce industry standard, the e-commerce customer service cannot establish an effective data management framework for the e-commerce customers when sensitive information is processed.
Disclosure of Invention
The invention aims to solve the problem that an effective data management framework cannot be established for an electronic commerce user when the electronic commerce customer service processes sensitive information because different channels and areas have different definitions on electronic commerce industry standards, and provides a management method and system for the electronic commerce user.
The invention adopts the following technical means for solving the technical problems:
The invention provides a management method of an e-commerce user, which comprises the following steps:
Identifying interactive contents received by each preset channel, carrying out message aggregation on the interactive contents, and generating a priority queue of the interactive contents based on basic information input by a user through the preset channels, wherein the basic information specifically comprises an interactive type, a waiting duration and a region to which the user belongs;
judging whether the interactive content detects preset sensitive information or not;
If yes, acquiring authority setting of the user on the interactive content according to the basic information, limiting authorized access of the interactive content on an e-commerce platform according to the authority setting, acquiring access preconditions of the interactive content formulated by the user from the e-commerce platform, establishing a data life cycle of the interactive content on the e-commerce platform, and generating a data management framework of the interactive content in the data life cycle;
judging whether the data management framework needs data transfer or not;
If so, identifying and classifying the sensitive information from the data management framework, acquiring a transfer end preset by the user on the e-commerce platform, establishing encryption connection for the data management framework by applying a preset transmission encryption protocol, generating a static key of the data management framework, splitting and synchronizing the static key into the e-commerce platform and the transfer end, identifying static key data acquired by the user from the e-commerce platform and the transfer end, and giving the user access rights to the data management framework on the transfer end by combining the static key data.
Further, the step of obtaining the authority setting of the user for the interactive content according to the basic information and limiting the authorized access of the interactive content on the e-commerce platform according to the authority setting includes:
Identifying other users who give access to the interactive content based on a preset authority level of the e-commerce platform, carrying out preset access verification on the other users through the electric Shang Ping station, and collecting verification results;
judging whether the verification result matches the authority level;
If yes, acquiring behavior data of the other users on the e-commerce platform, establishing a behavior mode of the other users by applying a preset machine learning algorithm according to the behavior data and basic information of the other users, calculating risk factors preset on the e-commerce platform by the other users according to the behavior mode, and generating risk levels corresponding to the other users accessing the interactive content, wherein the behavior data specifically comprises login time, access frequency, browsing history, purchase records, equipment information and IP addresses.
Further, before the step of establishing the data life cycle of the interactive content on the e-commerce platform, the method further includes:
Identifying regional management settings corresponding to the interactive content from the basic information based on a rule engine pre-constructed by the e-commerce platform;
judging whether the region management setting limits the interactive content or not;
If yes, applying the rule engine to set a keyword filtering rule according to the regional management setting, marking corresponding limiting keywords in the interactive content, intercepting the interactive content according to the limiting keywords, generating interception information pushed by the electric Shang Ping station to the user, and shielding the interactive content by combining the regional management setting and the interception information.
Further, the step of establishing an encrypted connection for the data management framework by applying a preset transmission encryption protocol includes:
Dividing the time granularity of the data management framework based on encryption timeliness preset by a user on the interactive content, introducing a current time stamp into a key generation process according to the time granularity, and generating an encryption key by combining the time stamp through a preset hash parameter;
judging whether the encryption key is decrypted in the encryption time period or not;
if not, regenerating a second encryption key according to the encryption aging, putting the encryption key down as a spare key, taking the second encryption key as a main key, resetting the encryption aging to be the second encryption aging, and allowing the main key and the spare key to be used as decryption contents of the data management framework together in the second encryption aging.
Further, in the step of determining whether the interactive content detects the preset sensitive information, the method further includes:
Collecting voice information output by the user from the interactive content, removing background noise in the voice information, dividing a long audio stream into short audio fragments with preset parts, and performing endpoint detection on the short audio fragments to generate corresponding audio features;
judging whether the audio features match the sensitive information;
If yes, marking the audio feature as sensitive content, blurring information access of the sensitive content by applying preset shielding data, collecting privacy setting of the user on the sensitive content on the e-commerce platform, and correspondingly adjusting the voice information based on the privacy setting, wherein the shielding data specifically comprises text shielding, audio mute and superposition coverage.
Further, in the step of determining whether the data management framework needs to perform data transfer, the method further includes:
Identifying real-time region information of the user on the e-commerce platform;
Judging whether the real-time region information is matched with a region pre-recorded by the e-commerce platform;
if yes, acquiring the data privacy requirement of the user based on the real-time region information, and evaluating the data feasibility of the data management framework at the transfer end according to the industry standard of the electric Shang Ping station for pre-recording the transfer end.
Further, the step of identifying the interactive content received by each preset channel, aggregating the messages of the interactive content, and generating the priority queue of the interactive content based on the basic information input by the user through the preset channel further includes:
Detecting a complete item of basic information before the user interacts with the e-commerce platform;
Judging whether the complete item of the basic information can be matched with the basic information;
If yes, constructing a queue code for the user to interact with the E-commerce customer service on the E-commerce platform, and waiting for the interactive service of the user from the E-commerce platform based on the queue code.
The invention also provides a management system of the E-commerce user, which comprises the following steps:
the identification module is used for identifying the interactive content received by each preset channel, carrying out message aggregation on the interactive content, and generating a priority queue of the interactive content based on basic information input by a user through the preset channel, wherein the basic information specifically comprises the interactive type, the duration to be treated and the region to which the user belongs;
the judging module is used for judging whether the interaction content detects preset sensitive information or not;
The execution module is used for acquiring authority setting of the user on the interactive content according to the basic information if the user is on the electronic commerce platform, limiting authorized access of the interactive content on the electronic commerce platform according to the authority setting, acquiring access preconditions of the interactive content formulated by the user from the electronic commerce platform, establishing a data life cycle of the interactive content on the electronic commerce platform, and generating a data management framework of the interactive content in the data life cycle;
the second judging module is used for judging whether the data management frame needs data transfer or not;
The second execution module is used for identifying and classifying the sensitive information from the data management frame if needed, acquiring a transfer end preset by the user on the e-commerce platform, establishing encryption connection for the data management frame by applying a preset transmission encryption protocol, generating a static key of the data management frame, splitting and synchronizing the data of the static key to the e-commerce platform and the transfer end, identifying static key data acquired by the user from the e-commerce platform and the transfer end, and giving the user access right to the data management frame on the transfer end by combining the static key data.
Further, the execution module includes:
the acquisition unit is used for identifying other users who give access to the interactive content based on a permission level preset by the e-commerce platform, carrying out preset access verification on the other users through the electric Shang Ping station, and acquiring a verification result;
the judging unit is used for judging whether the verification result is matched with the authority level;
And the execution unit is used for acquiring the behavior data of the other users on the e-commerce platform if the user is in the e-commerce platform, establishing a behavior mode of the other users by applying a preset machine learning algorithm according to the behavior data and the basic information of the other users, calculating risk factors preset on the e-commerce platform by the other users according to the behavior mode, and generating risk levels corresponding to the other users accessing the interactive content, wherein the behavior data specifically comprises login time, access frequency, browsing history, purchase records, equipment information and IP addresses.
Further, the method further comprises the following steps:
the second identification module is used for identifying regional management settings corresponding to the interactive content from the basic information based on a rule engine pre-constructed by the e-commerce platform;
The third judging module is used for judging whether the region management setting limits the interactive content or not;
And the third execution module is used for applying the rule engine to set keyword filtering rules according to the regional management setting if yes, marking corresponding limiting keywords in the interactive contents, intercepting the interactive contents according to the limiting keywords, generating interception information pushed by the electric Shang Ping units to the users, and shielding the interactive contents by combining the regional management setting and the interception information.
The invention provides a management method and a management system for an e-commerce user, which have the following beneficial effects:
The invention establishes a unified data classification and standardization system, including definition and classification methods of sensitive information, which can help E-business customer service personnel and management personnel to maintain consistent processing standards for E-business users in different channels or areas, and simultaneously, according to industry standards in different areas, corresponding data management strategies and processes, including data storage positions, access right control and data transfer rules, are formulated so as to ensure the security after data transfer, and encryption technology and security protocols are used to ensure that data processing and storage can conform to the data protection rules and industry standards of the transfer areas.
Drawings
FIG. 1 is a flow chart of an embodiment of a method for managing e-commerce users of the present invention;
FIG. 2 is a block diagram illustrating an exemplary embodiment of a system for managing e-commerce users of the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present invention, as the achievement, functional features, and advantages of the present invention are further described with reference to the embodiments, with reference to the accompanying drawings.
The technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a method for managing e-commerce users according to an embodiment of the present invention includes:
S1, identifying interactive contents received by each preset channel, carrying out message aggregation on the interactive contents, and generating a priority queue of the interactive contents based on basic information input by a user through the preset channels, wherein the basic information specifically comprises an interactive type, a waiting duration and a region;
s2, judging whether the interactive content detects preset sensitive information or not;
S3, if so, acquiring authority setting of the user on the interactive content according to the basic information, limiting authorized access of the interactive content on an e-commerce platform according to the authority setting, acquiring access preconditions of the interactive content formulated by the user from the e-commerce platform, establishing a data life cycle of the interactive content on the e-commerce platform, and generating a data management framework of the interactive content in the data life cycle;
S4, judging whether the data management framework needs data transfer or not;
And S5, if necessary, identifying and classifying the sensitive information from the data management frame, acquiring a transfer end preset by the user on the e-commerce platform, establishing encryption connection for the data management frame by applying a preset transmission encryption protocol, generating a static key of the data management frame, splitting the static key into data and synchronizing the data to the e-commerce platform and the transfer end, identifying static key data acquired by the user from the e-commerce platform and the transfer end, and giving the user access authority to the data management frame on the transfer end by combining the static key data.
In this embodiment, the system aggregates the messages of the interactive contents by identifying the interactive contents received by each preset channel of the e-commerce platform, and based on the basic information input by the user through the preset channel before the user performs the interaction, the basic information specifically includes the interaction type, When the system judges that the interactive contents of the e-commerce users do not detect the preset sensitive format information, for example, the system considers that the interactive contents of the e-commerce users do not need to be protected by using a secret measure only by detecting whether the data are transferred according to the industry standard and the data protection of the transfer terminal area or not, the system can check the interactive contents by using a predefined rule and algorithm to ensure that the sensitive information is not contained, and under the condition that an automation tool cannot completely confirm, the system can introduce manual checking to ensure that the interactive contents do not contain the sensitive information, and simultaneously, the system inquires and acquires the industry standard and the data protection rule of the target area, ensures that all necessary compliance requirements are known, and maintains a latest rule database on an e-commerce platform, and comprises the data protection requirements and the industry standard of each area, and selects proper data transmission according to the rule of the target area, so as to ensure that the data is safe in the transmission process, for example, when the system judges that the electronic commerce users are not provided with the pre-arranged in the transfer terminal area, the system can set the secret information by the e-commerce users, the user can not need to access the secret information of the user by setting the secret information of the e-commerce users according to the preset electric commerce users, the secret information can be limited by the rule of the electric commerce users, the user can acquire the secret information of the interactive contents, and the user can not need to set the secret information of the user's, and the secret information of the user has the secret requirements according to the rule, acquiring a precondition for an e-commerce user to access the interactive content from an e-commerce platform, establishing a data life cycle of the interactive content for privacy protection on the e-commerce platform, and generating a data management framework of the interactive content in the data life cycle; the system can carefully control who can access the interactive content according to the basic information and authority setting of the e-commerce user, ensure that only authorized users can view the sensitive information, allow the users to set access authorities on the e-commerce platform by themselves, enhance the control feeling and trust degree of the users on own data, dynamically adjust a data management frame and a protection strategy according to the latest regional rule change, enable the processing of the interactive content to conform to the privacy protection rule of each region, then the system judges whether the data management frame needs to carry out data transfer so as to execute corresponding steps, for example, when the system judges that the data management frame of the interactive content does not need to carry out data transfer, the system can consider that the e-commerce user does not need to carry out cross-regional data transfer on the e-commerce platform, the system can ensure that the local storage of the interactive content on the e-commerce platform adopts high-standard security measures, such as data encryption and access control, avoid the data loss in real-time by selecting a storage position conforming to the safety and compliance requirements, store data in an unsafe environment, simultaneously carry out data loss in real-time, ensure that the data is lost or a plurality of data is monitored at a single point, and the data is monitored at a certain time, when the system judges that the data management framework of the interactive content needs to transfer data, for example, the system considers that the user needs to transfer data across areas in the data transfer end area, the system identifies and classifies corresponding sensitive information from the data management framework, acquires preset data transfer end areas of the user on the user platform, establishes encryption connection for the data management framework by applying preset transmission encryption protocols, generates a static key of the data management framework, splits and synchronizes the static key to the user platform and the data transfer end areas, identifies static key data acquired from the user platform and the data transfer end areas, combines the static key data in the user platform and the data transfer end areas, can acquire access authority of the data management framework in the data transfer end areas, ensures confidentiality and integrity of data transmission in the data transfer process by using the preset transmission encryption protocols, prevents the data from being transferred in the transmission end areas or the data transfer end areas from being further tampered with by the user platform and further, and can only enhance the security key decryption method when the data is further intercepted and controlled by the user end areas, ensuring that the data meets local rule requirements at the destination.
It should be noted that, specific examples of message aggregation for interactive contents are as follows:
the user can interact with the E-commerce platform through the following channels:
e-mail, sending a mail inquiry order state;
Social media, namely, issuing a push for complaining of logistics delay on a social platform, and @ an official account of an electronic commerce platform;
instant communication, namely sending a message to change the delivery address through the communication platform;
The e-commerce platform will first pass through the identification channel:
An email (xxxx@example.com);
Social platform (xx@zhangsan);
A communications platform (xxx+123456789);
Data collection is then performed:
Collecting mail contents of Zhang III from an email server;
Collecting the third push text from the social platform API;
collecting the instant message of Zhang III from the communication platform API;
and then data preprocessing is carried out, including:
Removing repeated mails and invalid push messages sent before Zhang III;
converting all text contents into a unified coding format;
Identifying mail as 'order inquiry', pushing text as 'complaint', and instant message as 'address change';
finally, data aggregation is carried out, including:
Confirming that the three interactive contents are all three pieces of information such as user ID, mailbox and telephone number;
combining the mail, the push message and the instant message of the third step into a session record;
Since the push relates to complaints, the priority is highest, and then instant messages and mails are next;
The data display result is as follows, and the aggregation interaction record of Zhang three is displayed in the interface of the customer service system:
User Zhang San
E-mail (order query): "please ask My order status?
Social platform (complaint), "@ e-commerce platform i have waited for a week why have my packages not yet arrived?
Communication platform (address change), "hello, i need to change my shipping address, new address is:,";
Through message aggregation, the customer service system of the e-commerce platform can provide a unified view, namely customer service personnel can view all relevant user interaction contents in one interface, so that switching among a plurality of systems is avoided, meanwhile, the interaction information of all channels is integrated, the requirements and problems of the users are quickly identified and responded, the users can get consistent and quick feedback no matter which channel the users contact the platform, and the satisfaction degree of the users is enhanced.
It should be added that, a preset transmission encryption protocol is applied to establish an encryption connection for the data governance framework, and specific examples of generating a static key of the data governance framework are as follows:
Assuming that a certain e-commerce platform needs to safely transmit the sensitive order information of the e-commerce user from the platform server to the server of the third-party logistics service provider, a transmission encryption protocol needs to be selected first, and assuming that the e-commerce platform and the logistics service provider decide to use a TLS protocol to ensure the transmission safety;
firstly, initializing encryption connection, initiating a TLS handshake request to a server (a logistics server) by a client (an e-commerce platform server), verifying a digital certificate provided by the logistics server by the e-commerce platform server, ensuring the authenticity of the digital certificate, generating a static key, negotiating by both parties to generate a symmetric key, assuming an AES 256-bit key, safely sharing the symmetric key through the TLS handshake process, and then encrypting and transmitting data, namely encrypting order information by using the generated AES 256-bit static key by the e-commerce platform server as follows;
# generation of random key
Key=os.urandot (32) # 256-bit key
Iv = os. Urandom (16) # 128-bit initial vector
cipher=Cipher(algorithms.AES(key),modes.CFB(iv),backend=default_backend())
encryptor=cipher.encryptor()
plaintext=b"OrderID:12345;UserID:zhangsan;Address:123 Main St"
ciphertext=encryptor.update(plaintext)+encryptor.finalize()
The encrypted order information is sent to a logistics service provider server through TLS encryption connection, and after the logistics service provider server receives the encrypted data, the same AES 256-bit static key is used for decryption;
decryptor=cipher.decryptor()
decrypted_data=decryptor.update(ciphertext)+decryptor.finalize()print(decrypted_data.decode('utf-8'))# Restoring original order information
Finally, the logistics service provider server verifies the integrity of the data and ensures that the data is not tampered;
In summary, through the above steps, the e-commerce platform can ensure that the sensitive order information of the user is fully protected in the transmission process, and prevent data leakage and tampering. Selecting proper transmission encryption protocol, generating and using static key to encrypt data, and decrypting and verifying at receiving end, forming a complete data security transmission flow. The process not only improves the security of data transmission, but also enhances the trust of users to the platform.
In this embodiment, the step S3 of obtaining the authority setting of the user for the interactive content according to the basic information and limiting the authorized access of the interactive content to the e-commerce platform according to the authority setting includes:
S31, identifying other users who give access to the interactive content based on a permission level preset by the e-commerce platform, carrying out preset access verification on the other users through the electric Shang Ping, and collecting verification results;
S32, judging whether the verification result matches the authority level;
And S33, if so, acquiring behavior data of the other users on the e-commerce platform, establishing a behavior mode of the other users by applying a preset machine learning algorithm according to the behavior data and basic information of the other users, calculating risk factors preset on the e-commerce platform by the other users according to the behavior mode, and generating risk levels corresponding to the other users accessing the interactive content, wherein the behavior data specifically comprises login time, access frequency, browsing history, purchase records, equipment information and IP addresses.
In this embodiment, the system identifies other users who access the interactive content based on a permission level preset by the e-commerce platform, performs preset access verification on the other users who access the interactive content through the e-commerce platform, collects a verification result, and then determines whether the verification result matches the permission level preset by the e-commerce platform to execute corresponding steps; for example, when the system determines that the authentication result cannot match the authority level preset by the electric commerce platform, the system considers that the user authority attempting to access the interactive content is insufficient and cannot obtain the access authority, the system displays prompt information of insufficient authority to the user and informs the user of the fact that the user cannot access the requested content, relevant help information or links are provided on the electric commerce platform, the user is guided to know the authority requirement and the authority improvement method, meanwhile, the access attempt of insufficient authority is recorded in a system log, the recorded information comprises a user ID, request time, request content and authority level, if the user considers that the user has authority, an option of contacting the electric commerce client is provided, the electric commerce client can further authenticate and process the user request, for example, when the system determines that the authentication result can match the authority level preset by the electric commerce platform, the system considers that the user accessing the interactive content meets the authority, the system obtains behavior data of the user on the electric commerce platform, the behavior data specifically comprises login time, access frequency, browsing history, purchase record, equipment information and IP address, the behavior data and basic information of the user are established by applying a machine learning algorithm preset by the user, the preset behavior pattern is calculated according to the behavior pattern of the user on the electric commerce client, the system ensures that only trusted users can access, protects the privacy of the users and the safety of platform data by carrying out stricter risk assessment on the access of sensitive interactive contents, simultaneously, the platform can realize finer risk control, reduce fraud loss and operation risk by establishing a behavior mode and a risk factor of the users, and monitor the behaviors of the users in real time, respond to high risk behaviors in time, such as triggering secondary verification, limiting account operation and sending safety reminding.
It should be noted that, according to different behavior modes, risk factors preset on the e-commerce platform by the user are calculated, and specific examples of corresponding risk levels when the user accesses the interactive content are generated are as follows:
Assuming that a user performs the following operations on the e-commerce platform, the system calculates risk factors and generates risk grades through the operations, and obtaining operation data of the user on the e-commerce platform comprises the following steps:
login time is 9 am to 6 pm a day;
access frequency, 3-5 times per week;
browsing history, mainly browsing electronic products and books;
Purchase records, namely purchasing 1-2 electronic products per month;
Equipment information, namely often using a home PC and a mobile phone;
IP address: fixed IP for common home and office;
The system detects that Zhang Sanat 2 am on a certain day logs in from a new cross-country IP address and tries to purchase a large amount of high-price commodities, because the login time is abnormal and is 2 am, the login time does not accord with the normal login time of Zhang San, the login IP is the new cross-country IP address, zhang San tries to purchase a large amount of high-price commodities and does not accord with the normal purchase record of Zhang San, and the system calculates a high risk factor by integrating the abnormality;
according to the risk factors, the system generates a high risk level, and the specific operation steps are as follows:
login time, namely 2 am;
IP address, new transnational IP;
purchasing behavior, namely high-volume consumption;
the login time and the IP address are found to be abnormal by comparing the normal behavior mode of the third sheet, and the purchase record is compared to find that the consumption amount is abnormal;
abnormal login time, namely increasing risk factors;
the IP address is abnormal, namely the risk factor is increased;
the consumption amount is abnormal, namely the risk factor is increased;
And then generating a risk level, namely setting the access risk level of the third party to be high after the comprehensive calculation of the system, and adopting corresponding measures by the system according to the high risk level, wherein the measures comprise limiting the access of the third party to the interactive content of the E-commerce user, simultaneously requiring the sending of a short message verification code or mail confirmation, requiring the assistance of an E-commerce platform for identity verification, temporarily freezing an account or limiting the large-scale transaction operation, and sending a security warning notice to the third party to remind the account of possible risk.
In this embodiment, before step S3 of establishing a data life cycle of the interactive content on the e-commerce platform, the method further includes:
s301, identifying regional management settings corresponding to the interactive content from the basic information based on a rule engine pre-constructed by the e-commerce platform;
S302, judging whether the region management setting limits the interactive content or not;
And S303, if yes, applying the rule engine to set a keyword filtering rule according to the regional management setting, marking corresponding limiting keywords in the interactive content, intercepting the interactive content according to the limiting keywords, generating interception information pushed by the electric Shang Ping station to the user, and shielding the interactive content by combining the regional management setting and the interception information.
In this embodiment, the system pre-builds a rule engine based on the e-commerce platform, identifies the region management settings corresponding to the interactive content from the basic information of the e-commerce user, then the system judges whether the region management settings limit the interactive content of the e-commerce user to execute the corresponding steps, for example, when the system judges that the region management settings are not limited to the interactive content of the e-commerce user, the system considers that the interactive content of the user needs to meet the industry standard of the region where the user is located, the system can continuously process the interactive content of the user to ensure the normal display and interaction of the user, and simultaneously provides normal user service and interaction functions, no additional prompt or limitation is needed, the interactive content of the user is continuously monitored, the region management settings are ensured to be continuously met, and the interactive content and judgment process are recorded, so that the audit and compliance check are convenient, for example, when the system judges that the region management settings limit the interactive content of the e-commerce user, the system judges that the interactive content of the user is not met the industry standard of the region, the system can apply a rule engine to set a keyword filtering rule according to the region management settings, the corresponding limit keyword is marked in the interactive content, the interactive content is intercepted, the user's interactive content is required to meet the industry standard of the region management settings, the interactive content is blocked, the user is generated by the user, the user is blocked by the user, the user is required to be blocked by the user, and the region management rules are well-required to be blocked by the region-related to the region management rules, and the user's interactive content is kept by the region-related to be well, and the region-related to the region management rules, and the region-user is kept by the region-related to be blocked by the region-user, and the region-related rule is appropriate rule is blocked by region-user, the content security of the platform is maintained, and interception information is generated and pushed, so that a user can know why the content is intercepted and how to modify the content in time, and the problem that the user repeatedly tries to release the non-compliant content due to unknowing is avoided.
In this embodiment, the step S5 of establishing an encrypted connection for the data management frame by applying a preset transport encryption protocol includes:
S51, dividing the time granularity of the data management framework based on encryption timeliness preset by a user on the interactive content, introducing a current time stamp into a key generation process according to the time granularity, and generating an encryption key by combining the time stamp through a preset hash parameter;
S52, judging whether the encryption key is decrypted within the encryption timeliness;
And S53, if not, regenerating a second encryption key according to the encryption aging, and lowering the encryption key to be a spare key, taking the second encryption key as a main key, resetting the encryption aging to be the second encryption aging, and allowing the main key and the spare key to be used as decryption contents of the data management framework together in the second encryption aging.
In this embodiment, the system divides the time granularity of the data management framework based on the encryption timeliness preset by the electric user for the interactive content, the time granularity specifically includes seconds, minutes, hours or days, introduces the current time stamp into the key generation process according to different time granularities, generates the encryption key by combining the preset hash parameter with the time stamp, and then the system judges whether the encryption key is used for decryption by the electric user in the encryption timeliness to execute the corresponding steps; for example, when the system determines that the encryption key can be used by the electric consumer for decryption within the encryption timeliness, the system considers that the encryption key is valid and available within a specified time window, the system verifies the validity of the encryption key, recalculates the encryption key according to the current time stamp and a preset hash parameter, compares the newly generated encryption key with the encryption key stored by the user, confirms that the encryption key is valid within the encryption timeliness, allows the user to use the encryption key for decryption operation, the user can continue accessing and operating the interactive content without being affected by the encryption timeliness limit, and if the system detects that the encryption key is about to expire or exceeds the encryption timeliness, the system can automatically update the encryption key when the user operates next time, so that the security and availability of data can be ensured, and an updating state of the encryption key is maintained when necessary, for example, when the system determines that the encryption key cannot be used by the electric consumer for decryption within the encryption timeliness, the system considers that the encryption key is expired, namely the electric consumer cannot obtain the encryption key again from the electric consumer platform, but the encryption key is valid within a short time, if the electric consumer has not input the encryption key for decryption operation is confirmed, the system can still decrypt the data by introducing a main key and a spare key mechanism, ensures that the user can not interrupt the access to the data in the key updating process, can still decrypt the data by using the spare key even if the encryption aging expires, and simultaneously can decrypt the data by using the spare key when the old encryption key is lowered into the spare key, so that even if the new key is just generated and a problem occurs, the user can still decrypt the data by using the spare key, double guarantee is provided, and after the new key is generated, the encryption aging is reset, so that the user can continuously access the data seamlessly in the aging of the new key, and the availability and the continuity of the data are ensured.
In this embodiment, in step S2 of determining whether the interactive content detects preset sensitive information, the method further includes:
S21, collecting voice information output by the user from the interactive content, removing background noise in the voice information, dividing a long audio stream into short audio fragments with preset parts, and detecting endpoints of the short audio fragments to generate corresponding audio features;
s22, judging whether the audio features are matched with the sensitive information;
And S23, if yes, marking the audio feature as sensitive content, blurring information access of the sensitive content by applying preset shielding data, collecting privacy setting of the user on the sensitive content on the e-commerce platform, and correspondingly adjusting the voice information based on the privacy setting, wherein the shielding data specifically comprises text shielding, audio mute and superposition coverage.
In this embodiment, the system collects voice information output by the e-commerce user from the interactive content, removes background noise in the voice information, segments the long audio stream into short audio segments with preset parts, performs endpoint detection on the short audio segments to generate corresponding audio features, and then the system judges whether the audio features match sensitive type information preset by the e-commerce platform to execute corresponding steps; for example, when the system judges that the voice characteristics of the voice information cannot be matched with the sensitive type information, the system considers that the voice interaction content of the e-commerce user does not contain the sensitive information preset by the platform, the system marks the voice information which is not matched with the sensitive type information as common content or non-sensitive content, the system is favorable for subsequent data audit and management, the integrity and compliance of data are ensured, meanwhile, for the voice information which is not matched with the sensitive type information, the system can continuously monitor the processing result and analysis effect, if the voice information which is not matched with the sensitive type information is found to contain the unforeseen sensitive content, the system adjusts the preset setting of the sensitive type information according to the actual situation so as to improve the sensitive data detection capability of the system, collects user feedback and data analysis result, acquires new sensitive type information from the new sensitive type information, and further improves the sensitive data detection and processing capability of the system, for example, when the system judges that the voice interaction content of the e-commerce user contains the sensitive information preset by the platform is favorable for subsequent data audit and management, the system marks the voice characteristics as the sensitive content which is matched with the sensitive type information, and uses the preset by the preset shielding data, the system can access specific shielding data to the specific shielding data, the method comprises the steps of audio muting and overlapping coverage, collecting privacy settings of an e-commerce user on sensitive content on an e-commerce platform, and correspondingly adjusting voice information based on different privacy settings; the system can avoid the complexity of manual inspection and the risk of missed inspection by automatically identifying and marking the voice content containing the sensitive information, process the sensitive information in time to prevent unauthorized access and leakage, provide various shielding modes, such as text shielding, audio mute and overlapping coverage, ensure that the sensitive information can be effectively protected under different use scenes, because the flexible shielding mode can be adjusted according to different types of sensitive information and user requirements, and the sensitive information is correspondingly processed according to privacy settings of the user, the privacy preferences of the user are respected, the user has higher trust degree on the platform, and the privacy and the sensitive information are considered to be fully protected.
In this embodiment, in step S4 of determining whether the data management frame needs to perform data transfer, the method further includes:
s41, identifying real-time region information of the user on the e-commerce platform;
S42, judging whether the real-time region information is matched with the region pre-recorded by the E-commerce platform;
And S43, if so, acquiring the data privacy requirement of the user based on the real-time region information, and evaluating the data feasibility of the data management framework at the transfer end according to the industry standard of the electric Shang Ping station for pre-recording the transfer end.
In this embodiment, the system identifies real-time region information of the e-commerce user on the e-commerce platform, and then the system judges whether the real-time region information matches a region previously recorded by the e-commerce platform to execute corresponding steps; for example, when the system judges that the real-time regional information of the E-commerce user cannot be matched with the region pre-recorded by the E-commerce platform, the system considers that the E-commerce user does not need to carry out cross-region data transfer, the system can collect and store data according to the standards of the current region of the user, ensure to meet the region rule and platform policy, simultaneously continue to collect the interactive content and behavior data of the user in the current region, store the user data according to the current region rule and platform rule, set localized data access permission to ensure that the data is only accessed and processed in the current region, for example, when the system judges that the real-time regional information of the E-commerce user can be matched with the region pre-recorded by the E-commerce platform, the system considers that the E-commerce user needs to carry out cross-region data transfer according to the data privacy requirement of the real-time regional information, and evaluates the data feasibility of a data frame at the data transfer end according to the industry standard pre-recorded by the E-commerce platform, ensure that all the cross-region data transmission and processing meets the target region rule and industry data can not meet the privacy requirement or the data transmission and security risk protection requirements, and the data transmission security protection safety and security requirements are simultaneously prevented from being applied to the security protection and security protection requirements of the data transmission and security protection in the data transfer end, and according to the pre-recorded industry standard, the most suitable transmission protocol and method are selected, so that the data is ensured to be quickly and reliably transferred to a target area, the data transmission efficiency is improved, and the transmission time and possible interruption are reduced.
In this embodiment, identifying the interactive content received by each preset channel, aggregating the messages of the interactive content, and generating the priority queue of the interactive content based on the basic information input by the user through the preset channel, where step S1 further includes:
S11, detecting a complete item of basic information before the user interacts with the e-commerce platform;
s12, judging whether the complete item of the basic information can be matched with the basic information;
and S13, if yes, constructing a queue code for the user to interact with the E-commerce customer service on the E-commerce platform, and waiting for the interaction service of the user from the E-commerce platform based on the queue code.
In this embodiment, the system detects complete items of basic information before the electronic commerce and the electronic commerce platform interact, and then the system judges whether the complete items of basic information can match the basic information so as to execute corresponding steps; for example, when the system determines that the complete item of basic information before the interaction of the e-commerce user cannot match the basic information, the system considers that the e-commerce user does not have the authority to interact with the e-commerce customer service preferentially, that is, the system preferentially queues other e-commerce users in front of the e-commerce user, the system marks the e-commerce user which is identified as not matching the basic information as a non-preferential user, which means that the system does not preferentially process the interaction request, but places the e-commerce user at the tail or middle position of the queue, waits for the processing of other preferential users to process the request, and inserts the interaction request of the e-commerce user into the proper position of the queue, usually after the other users waiting to process in the current queue, and provides an information display or notification function of the user waiting for the queue, so that the current position of the user in the queue can be displayed to the e-commerce user, and the waiting time is expected to be needed, and the user is helped to know the sequence and the time of the processing of the interaction request. For example, when the system determines that the complete item of the basic information before the interaction of the E-commerce user can be matched with the basic information, the system considers that the E-commerce user has the authority of preferentially interacting with the E-commerce customer service, the system constructs a queue code for the E-commerce user to interact with the E-commerce customer service on the E-commerce platform, and the system waits for the interaction service of the E-commerce user from the E-commerce platform based on the queue code, can respond to the user requirement more quickly and timely by preferentially processing the user interaction request with complete basic information, therefore, satisfaction and experience of users are remarkably improved, meanwhile, the interactive service mechanism based on queue coding is established, the processing sequence of interactive requests can be effectively managed and optimized, so that customer service teams can process the requests of high-priority users more efficiently, response time and processing time are shortened, and by accurately identifying and preferentially processing users with matched basic information, the system can enable the customer service teams to concentrate on processing problems and requirements of key users, so that customer service efficiency and problem solving speed are improved, namely, the interactive service mechanism based on queue coding can also support more personalized services, and service flows and strategies can be customized according to the priorities and specific interaction requirements of the users, so that personalized requirements of the users can be met better.
Referring to fig. 2, a management system for an e-commerce user according to an embodiment of the present invention includes:
The identification module 10 is configured to identify interactive content received by each preset channel, aggregate messages of the interactive content, and generate a priority queue of the interactive content based on basic information input by a user through the preset channel, where the basic information specifically includes an interactive type, a waiting duration and a region to which the user belongs;
The judging module 20 is configured to judge whether the interactive content detects preset sensitive information;
The execution module 30 is configured to obtain, if yes, an authority setting of the user for the interactive content according to the basic information, limit authorized access of the interactive content on an e-commerce platform according to the authority setting, collect access preconditions of the interactive content formulated by the user from the e-commerce platform, establish a data life cycle of the interactive content on the e-commerce platform, and generate a data management framework of the interactive content in the data life cycle;
a second judging module 40, configured to judge whether the data management framework needs to perform data transfer;
The second execution module 50 is configured to identify and classify the sensitive information from the data management frame if necessary, obtain a transfer end preset by the user on the e-commerce platform, establish an encrypted connection for the data management frame by applying a preset transmission encryption protocol, generate a static key of the data management frame, split and synchronize the static key to the e-commerce platform and the transfer end, identify static key data acquired by the user from the e-commerce platform and the transfer end, and give the user access rights to the data management frame on the transfer end in combination with the static key data.
In this embodiment, the recognition module 10 performs message aggregation on the interactive contents received by recognizing the interactive contents received by each preset channel of the e-commerce platform, and based on basic information input by the user through the preset channel before the user performs the interaction, the basic information specifically includes an interaction type, when the system determines that the interactive contents of the e-commerce user do not detect the preset sensitive format information, for example, when the system determines that the interactive contents of the e-commerce user do not detect the preset sensitive format information, the system considers that the interactive contents of the e-commerce user do not need to be protected by using a secret measure by using an e-commerce platform, only needs to detect whether the data are transferred according to the industry standard and the data protection of the transfer end region, the system checks the interactive contents by using a predefined rule and algorithm, ensures that the sensitive information is not contained, and under the condition that an automation tool cannot completely confirm, the system can introduce manual auditing, ensures that the interactive contents do not contain the sensitive information, simultaneously queries and acquires the industry standard and the data protection rule of the target region, ensures that all necessary compliance requirements are known, maintains a latest rule database, contains the data protection requirements and the industry standard of each region, and selects proper data transmission according to the rule of the target region, ensures that the data are safe in transmission process, for example, when the system determines that the system detects the pre-arranged industry standard and the data are not required to be completely confirmed by the e-commerce user, the system sets the secret information by using the pre-arranged by using the e-commerce platform, the user can be authorized by the user, the user can access the secret information, and the user can be authorized by setting the user's privacy requirements of the user content to the user has the secret information, and the user has the secret requirements when the user has the secret protection module is required to be satisfied by setting the electronic protection platform, and the user has the secret information, acquiring a precondition for an e-commerce user to access the interactive content from an e-commerce platform, establishing a data life cycle of the interactive content for privacy protection on the e-commerce platform, and generating a data management framework of the interactive content in the data life cycle; the system can carefully control who can access the interactive content according to the basic information and authority setting of the e-commerce user, ensure that only authorized users can view the sensitive information, allow the users to set access authorities on the e-commerce platform by themselves, enhance the control feeling and trust degree of the users on own data, dynamically adjust a data management frame and a protection strategy according to the latest regional rule change, enable the processing of the interactive content to conform to the privacy protection rule of each region, then a second judging module 40 judges whether the data management frame needs to perform data transfer so as to execute corresponding steps, for example, when the system judges that the data management frame of the interactive content does not need to perform data transfer, the system can consider that the e-commerce user does not need to perform data transfer across regions on the e-commerce platform, ensure that the local storage of the interactive content on the e-commerce platform adopts high-standard security measures, such as data encryption and access control, and can ensure that the data is quickly restored in real-time by selecting storage positions conforming to the security and compliance requirements, and can prevent the data from being lost when the data is stored in the non-security environment, and the data is quickly monitored and the data is prevented from being lost in real time, for example, when the system judges that the data management framework of the interactive content needs to transfer data, the second execution module 50 considers that the electric user needs to transfer data across areas in the electric business platform, the system identifies and sorts out corresponding sensitive information from the data management framework, acquires preset data transfer end areas of the electric user on the electric business platform, establishes encryption connection for the data management framework by applying preset transmission encryption protocols, generates static keys of the data management framework, splits and synchronizes the static keys to the static keys of the electric business platform and the data transfer end areas, identifies the static key data acquired from the electric business platform and the data transfer end areas, combines the static key data in the electric business platform and the data transfer end areas, and can acquire the access right of the data management framework in the data transfer end areas, ensuring that the data meets local rule requirements at the destination.
In this embodiment, the execution module includes:
the acquisition unit is used for identifying other users who give access to the interactive content based on a permission level preset by the e-commerce platform, carrying out preset access verification on the other users through the electric Shang Ping station, and acquiring a verification result;
the judging unit is used for judging whether the verification result is matched with the authority level;
And the execution unit is used for acquiring the behavior data of the other users on the e-commerce platform if the user is in the e-commerce platform, establishing a behavior mode of the other users by applying a preset machine learning algorithm according to the behavior data and the basic information of the other users, calculating risk factors preset on the e-commerce platform by the other users according to the behavior mode, and generating risk levels corresponding to the other users accessing the interactive content, wherein the behavior data specifically comprises login time, access frequency, browsing history, purchase records, equipment information and IP addresses.
In this embodiment, the system identifies other users who access the interactive content based on a permission level preset by the e-commerce platform, performs preset access verification on the other users who access the interactive content through the e-commerce platform, collects a verification result, and then determines whether the verification result matches the permission level preset by the e-commerce platform to execute corresponding steps; for example, when the system determines that the authentication result cannot match the authority level preset by the electric commerce platform, the system considers that the user authority attempting to access the interactive content is insufficient and cannot obtain the access authority, the system displays prompt information of insufficient authority to the user and informs the user of the fact that the user cannot access the requested content, relevant help information or links are provided on the electric commerce platform, the user is guided to know the authority requirement and the authority improvement method, meanwhile, the access attempt of insufficient authority is recorded in a system log, the recorded information comprises a user ID, request time, request content and authority level, if the user considers that the user has authority, an option of contacting the electric commerce client is provided, the electric commerce client can further authenticate and process the user request, for example, when the system determines that the authentication result can match the authority level preset by the electric commerce platform, the system considers that the user accessing the interactive content meets the authority, the system obtains behavior data of the user on the electric commerce platform, the behavior data specifically comprises login time, access frequency, browsing history, purchase record, equipment information and IP address, the behavior data and basic information of the user are established by applying a machine learning algorithm preset by the user, the preset behavior pattern is calculated according to the behavior pattern of the user on the electric commerce client, the system ensures that only trusted users can access, protects the privacy of the users and the safety of platform data by carrying out stricter risk assessment on the access of sensitive interactive contents, simultaneously, the platform can realize finer risk control, reduce fraud loss and operation risk by establishing a behavior mode and a risk factor of the users, and monitor the behaviors of the users in real time, respond to high risk behaviors in time, such as triggering secondary verification, limiting account operation and sending safety reminding.
In this embodiment, further comprising:
the second identification module is used for identifying regional management settings corresponding to the interactive content from the basic information based on a rule engine pre-constructed by the e-commerce platform;
The third judging module is used for judging whether the region management setting limits the interactive content or not;
And the third execution module is used for applying the rule engine to set keyword filtering rules according to the regional management setting if yes, marking corresponding limiting keywords in the interactive contents, intercepting the interactive contents according to the limiting keywords, generating interception information pushed by the electric Shang Ping units to the users, and shielding the interactive contents by combining the regional management setting and the interception information.
In this embodiment, the system pre-builds a rule engine based on the e-commerce platform, identifies the region management settings corresponding to the interactive content from the basic information of the e-commerce user, then the system judges whether the region management settings limit the interactive content of the e-commerce user to execute the corresponding steps, for example, when the system judges that the region management settings are not limited to the interactive content of the e-commerce user, the system considers that the interactive content of the user needs to meet the industry standard of the region where the user is located, the system can continuously process the interactive content of the user to ensure the normal display and interaction of the user, and simultaneously provides normal user service and interaction functions, no additional prompt or limitation is needed, the interactive content of the user is continuously monitored, the region management settings are ensured to be continuously met, and the interactive content and judgment process are recorded, so that the audit and compliance check are convenient, for example, when the system judges that the region management settings limit the interactive content of the e-commerce user, the system judges that the interactive content of the user is not met the industry standard of the region, the system can apply a rule engine to set a keyword filtering rule according to the region management settings, the corresponding limit keyword is marked in the interactive content, the interactive content is intercepted, the user's interactive content is required to meet the industry standard of the region management settings, the interactive content is blocked, the user is generated by the user, the user is blocked by the user, the user is required to be blocked by the user, and the region management rules are well-required to be blocked by the region-related to the region management rules, and the user's interactive content is kept by the region-related to be well, and the region-related to the region management rules, and the region-user is kept by the region-related to be blocked by the region-user, and the region-related rule is appropriate rule is blocked by region-user, the content security of the platform is maintained, and interception information is generated and pushed, so that a user can know why the content is intercepted and how to modify the content in time, and the problem that the user repeatedly tries to release the non-compliant content due to unknowing is avoided.
In this embodiment, the second execution module further includes:
The dividing unit is used for dividing the time granularity of the data management framework based on encryption timeliness preset by a user on the interactive content, introducing a current time stamp into a key generation process according to the time granularity, and generating an encryption key by combining the time stamp through a preset hash parameter;
a second judging unit configured to judge whether the encryption key is decrypted within the encryption age;
and the second execution unit is used for regenerating a second encryption key according to the encryption aging if not, setting the encryption key down as a spare key, setting the second encryption key as a main key, resetting the encryption aging as the second encryption aging, and allowing the main key and the spare key to be used as decryption contents of the data management framework together in the second encryption aging.
In this embodiment, the system divides the time granularity of the data management framework based on the encryption timeliness preset by the electric user for the interactive content, the time granularity specifically includes seconds, minutes, hours or days, introduces the current time stamp into the key generation process according to different time granularities, generates the encryption key by combining the preset hash parameter with the time stamp, and then the system judges whether the encryption key is used for decryption by the electric user in the encryption timeliness to execute the corresponding steps; for example, when the system determines that the encryption key can be used by the electric consumer for decryption within the encryption timeliness, the system considers that the encryption key is valid and available within a specified time window, the system verifies the validity of the encryption key, recalculates the encryption key according to the current time stamp and a preset hash parameter, compares the newly generated encryption key with the encryption key stored by the user, confirms that the encryption key is valid within the encryption timeliness, allows the user to use the encryption key for decryption operation, the user can continue accessing and operating the interactive content without being affected by the encryption timeliness limit, and if the system detects that the encryption key is about to expire or exceeds the encryption timeliness, the system can automatically update the encryption key when the user operates next time, so that the security and availability of data can be ensured, and an updating state of the encryption key is maintained when necessary, for example, when the system determines that the encryption key cannot be used by the electric consumer for decryption within the encryption timeliness, the system considers that the encryption key is expired, namely the electric consumer cannot obtain the encryption key again from the electric consumer platform, but the encryption key is valid within a short time, if the electric consumer has not input the encryption key for decryption operation is confirmed, the system can still decrypt the data by introducing a main key and a spare key mechanism, ensures that the user can not interrupt the access to the data in the key updating process, can still decrypt the data by using the spare key even if the encryption aging expires, and simultaneously can decrypt the data by using the spare key when the old encryption key is lowered into the spare key, so that even if the new key is just generated and a problem occurs, the user can still decrypt the data by using the spare key, double guarantee is provided, and after the new key is generated, the encryption aging is reset, so that the user can continuously access the data seamlessly in the aging of the new key, and the availability and the continuity of the data are ensured.
In this embodiment, the judging module further includes:
The generating unit is used for collecting voice information output by the user from the interactive content, removing background noise in the voice information, dividing a long audio stream into short audio fragments with preset parts, detecting endpoints of the short audio fragments, and generating corresponding audio characteristics;
A third judging unit for judging whether the audio feature matches the sensitive information;
And the third execution unit is used for marking the audio feature as sensitive content if the audio feature is marked, blurring information access of the sensitive content by applying preset shielding data, collecting privacy setting of the user on the sensitive content on the e-commerce platform, and correspondingly adjusting the voice information based on the privacy setting, wherein the shielding data specifically comprises text shielding, audio mute and superposition coverage.
In this embodiment, the system collects voice information output by the e-commerce user from the interactive content, removes background noise in the voice information, segments the long audio stream into short audio segments with preset parts, performs endpoint detection on the short audio segments to generate corresponding audio features, and then the system judges whether the audio features match sensitive type information preset by the e-commerce platform to execute corresponding steps; for example, when the system judges that the voice characteristics of the voice information cannot be matched with the sensitive type information, the system considers that the voice interaction content of the e-commerce user does not contain the sensitive information preset by the platform, the system marks the voice information which is not matched with the sensitive type information as common content or non-sensitive content, the system is favorable for subsequent data audit and management, the integrity and compliance of data are ensured, meanwhile, for the voice information which is not matched with the sensitive type information, the system can continuously monitor the processing result and analysis effect, if the voice information which is not matched with the sensitive type information is found to contain the unforeseen sensitive content, the system adjusts the preset setting of the sensitive type information according to the actual situation so as to improve the sensitive data detection capability of the system, collects user feedback and data analysis result, acquires new sensitive type information from the new sensitive type information, and further improves the sensitive data detection and processing capability of the system, for example, when the system judges that the voice interaction content of the e-commerce user contains the sensitive information preset by the platform is favorable for subsequent data audit and management, the system marks the voice characteristics as the sensitive content which is matched with the sensitive type information, and uses the preset by the preset shielding data, the system can access specific shielding data to the specific shielding data, the method comprises the steps of audio muting and overlapping coverage, collecting privacy settings of an e-commerce user on sensitive content on an e-commerce platform, and correspondingly adjusting voice information based on different privacy settings; the system can avoid the complexity of manual inspection and the risk of missed inspection by automatically identifying and marking the voice content containing the sensitive information, process the sensitive information in time to prevent unauthorized access and leakage, provide various shielding modes, such as text shielding, audio mute and overlapping coverage, ensure that the sensitive information can be effectively protected under different use scenes, because the flexible shielding mode can be adjusted according to different types of sensitive information and user requirements, and the sensitive information is correspondingly processed according to privacy settings of the user, the privacy preferences of the user are respected, the user has higher trust degree on the platform, and the privacy and the sensitive information are considered to be fully protected.
In this embodiment, the second judging module further includes:
the identification unit is used for identifying the real-time region information of the user on the e-commerce platform;
a fourth judging unit, configured to judge whether the real-time region information matches a region pre-recorded by the e-commerce platform;
And the fourth execution unit is used for acquiring the data privacy requirement of the user based on the real-time region information if the data privacy requirement is met, and evaluating the data feasibility of the data management framework at the transfer end according to the industry standard of the electric Shang Ping for the pre-recording of the transfer end.
In this embodiment, the system identifies real-time region information of the e-commerce user on the e-commerce platform, and then the system judges whether the real-time region information matches a region previously recorded by the e-commerce platform to execute corresponding steps; for example, when the system judges that the real-time regional information of the E-commerce user cannot be matched with the region pre-recorded by the E-commerce platform, the system considers that the E-commerce user does not need to carry out cross-region data transfer, the system can collect and store data according to the standards of the current region of the user, ensure to meet the region rule and platform policy, simultaneously continue to collect the interactive content and behavior data of the user in the current region, store the user data according to the current region rule and platform rule, set localized data access permission to ensure that the data is only accessed and processed in the current region, for example, when the system judges that the real-time regional information of the E-commerce user can be matched with the region pre-recorded by the E-commerce platform, the system considers that the E-commerce user needs to carry out cross-region data transfer according to the data privacy requirement of the real-time regional information, and evaluates the data feasibility of a data frame at the data transfer end according to the industry standard pre-recorded by the E-commerce platform, ensure that all the cross-region data transmission and processing meets the target region rule and industry data can not meet the privacy requirement or the data transmission and security risk protection requirements, and the data transmission security protection safety and security requirements are simultaneously prevented from being applied to the security protection and security protection requirements of the data transmission and security protection in the data transfer end, and according to the pre-recorded industry standard, the most suitable transmission protocol and method are selected, so that the data is ensured to be quickly and reliably transferred to a target area, the data transmission efficiency is improved, and the transmission time and possible interruption are reduced.
In this embodiment, the identification module further includes:
the detection unit is used for detecting complete basic information items before the user interacts with the e-commerce platform;
a fifth judging unit, configured to judge whether the complete item of the basic information can match the basic information;
And the fifth execution unit is used for constructing a queue code for the user to interact with the E-commerce customer service on the E-commerce platform if the user is in the E-commerce platform, and waiting for the interactive service of the user from the E-commerce platform based on the queue code.
In this embodiment, the system detects complete items of basic information before the electronic commerce and the electronic commerce platform interact, and then the system judges whether the complete items of basic information can match the basic information so as to execute corresponding steps; for example, when the system determines that the complete item of basic information before the interaction of the e-commerce user cannot match the basic information, the system considers that the e-commerce user does not have the authority to interact with the e-commerce customer service preferentially, that is, the system preferentially queues other e-commerce users in front of the e-commerce user, the system marks the e-commerce user which is identified as not matching the basic information as a non-preferential user, which means that the system does not preferentially process the interaction request, but places the e-commerce user at the tail or middle position of the queue, waits for the processing of other preferential users to process the request, and inserts the interaction request of the e-commerce user into the proper position of the queue, usually after the other users waiting to process in the current queue, and provides an information display or notification function of the user waiting for the queue, so that the current position of the user in the queue can be displayed to the e-commerce user, and the waiting time is expected to be needed, and the user is helped to know the sequence and the time of the processing of the interaction request. For example, when the system determines that the complete item of the basic information before the interaction of the E-commerce user can be matched with the basic information, the system considers that the E-commerce user has the authority of preferentially interacting with the E-commerce customer service, the system constructs a queue code for the E-commerce user to interact with the E-commerce customer service on the E-commerce platform, and the system waits for the interaction service of the E-commerce user from the E-commerce platform based on the queue code, can respond to the user requirement more quickly and timely by preferentially processing the user interaction request with complete basic information, therefore, satisfaction and experience of users are remarkably improved, meanwhile, the interactive service mechanism based on queue coding is established, the processing sequence of interactive requests can be effectively managed and optimized, so that customer service teams can process the requests of high-priority users more efficiently, response time and processing time are shortened, and by accurately identifying and preferentially processing users with matched basic information, the system can enable the customer service teams to concentrate on processing problems and requirements of key users, so that customer service efficiency and problem solving speed are improved, namely, the interactive service mechanism based on queue coding can also support more personalized services, and service flows and strategies can be customized according to the priorities and specific interaction requirements of the users, so that personalized requirements of the users can be met better.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1.一种电商用户的管理方法,其特征在于,包括以下步骤:1. A method for managing e-commerce users, comprising the following steps: 识别各个预设渠道接收的互动内容,对所述互动内容进行消息聚合,基于用户通过所述预设渠道输入的基础信息,生成所述互动内容的优先级队列,其中,所述基础信息具体包括互动类型、已待时长和所属地区;Identify interactive contents received by each preset channel, aggregate the interactive contents, and generate a priority queue of the interactive contents based on basic information input by the user through the preset channel, wherein the basic information specifically includes the type of interaction, waiting time, and region; 判断所述互动内容是否检测到预设的敏感信息;Determining whether preset sensitive information is detected in the interactive content; 若是,则根据所述基础信息获取所述用户对所述互动内容的权限设定,依据所述权限设定限制所述互动内容在电商平台的授权访问,采集所述用户从所述电商平台上制定的所述互动内容的访问前提条件,建立所述互动内容在所述电商平台上的数据生命周期,生成所述互动内容在所述数据生命周期内的数据治理框架;If so, then obtain the user's permission settings for the interactive content based on the basic information, limit authorized access to the interactive content on the e-commerce platform based on the permission settings, collect access prerequisites for the interactive content set by the user on the e-commerce platform, establish a data lifecycle for the interactive content on the e-commerce platform, and generate a data governance framework for the interactive content within the data lifecycle; 判断所述数据治理框架是否需要进行数据转移;Determine whether the data governance framework requires data transfer; 若需要,则从所述数据治理框架中标识并分类所述敏感信息,获取所述用户在所述电商平台预设的转移端,应用预设的传输加密协议为所述数据治理框架建立加密连接,生成所述数据治理框架的静态密钥,将所述静态密钥进行数据拆分并同步至所述电商平台和所述转移端,识别所述用户从所述电商平台和所述转移端中采集得到的静态密钥数据,结合所述静态密钥数据赋予所述用户在所述转移端上对所述数据治理框架的访问权限;If necessary, identify and classify the sensitive information from the data governance framework, obtain the transfer terminal preset by the user on the e-commerce platform, apply the preset transmission encryption protocol to establish an encrypted connection for the data governance framework, generate a static key for the data governance framework, split the static key data and synchronize it to the e-commerce platform and the transfer terminal, identify the static key data collected by the user from the e-commerce platform and the transfer terminal, and grant the user access rights to the data governance framework on the transfer terminal in combination with the static key data; 其中,所述建立所述互动内容在所述电商平台上的数据生命周期的步骤前,还包括:Wherein, before the step of establishing the data life cycle of the interactive content on the e-commerce platform, it also includes: 基于所述电商平台预构建的规则引擎,从所述基础信息中识别所述互动内容对应的地区管理设定;Based on the pre-built rule engine of the e-commerce platform, identifying the regional management settings corresponding to the interactive content from the basic information; 判断所述地区管理设定是否限制所述互动内容;determining whether the regional management setting restricts the interactive content; 若是,则应用所述规则引擎根据所述地区管理设定设置关键词过滤规则,在所述互动内容中标记出相应的限制关键词,依据所述限制关键词对所述互动内容拦截,生成所述电商平台对所述用户推送的拦截信息,结合所述地区管理设定和所述拦截信息屏蔽所述互动内容。If so, the rule engine is applied to set keyword filtering rules according to the regional management settings, mark corresponding restricted keywords in the interactive content, intercept the interactive content based on the restricted keywords, generate interception information pushed by the e-commerce platform to the user, and block the interactive content in combination with the regional management settings and the interception information. 2.根据权利要求1所述的电商用户的管理方法,其特征在于,所述则根据所述基础信息获取所述用户对所述互动内容的权限设定,依据所述权限设定限制所述互动内容在电商平台的授权访问的步骤中,包括:2. The e-commerce user management method according to claim 1, characterized in that the step of obtaining the user's permission setting for the interactive content according to the basic information and limiting the authorized access to the interactive content on the e-commerce platform according to the permission setting comprises: 基于所述电商平台预设的权限层级,识别对所述互动内容提出访问的其他用户,通过所述电商平台对所述其他用户进行预设的访问验证,采集验证结果;Based on the permission level preset by the e-commerce platform, identify other users who request to access the interactive content, perform preset access verification on the other users through the e-commerce platform, and collect verification results; 判断所述验证结果是否匹配所述权限层级;Determining whether the verification result matches the permission level; 若是,则获取所述其他用户在所述电商平台上的行为数据,根据所述行为数据和所述其他用户的基础信息,应用预设的机器学习算法建立所述其他用户的行为模式,依据所述行为模式计算所述其他用户在所述电商平台上预设的风险因子,生成所述其他用户访问所述互动内容对应的风险等级,其中,所述行为数据具体包括登录时间、访问频率、浏览历史、购买记录、设备信息和IP地址。If so, obtain the behavioral data of the other users on the e-commerce platform, apply a preset machine learning algorithm to establish the behavioral patterns of the other users based on the behavioral data and the basic information of the other users, calculate the risk factors preset for the other users on the e-commerce platform based on the behavioral patterns, and generate the risk level corresponding to the other users' access to the interactive content, wherein the behavioral data specifically includes login time, access frequency, browsing history, purchase history, device information and IP address. 3.根据权利要求1所述的电商用户的管理方法,其特征在于,所述应用预设的传输加密协议为所述数据治理框架建立加密连接的步骤中,包括:3. The e-commerce user management method according to claim 1 is characterized in that the step of applying a preset transmission encryption protocol to establish an encrypted connection for the data governance framework includes: 基于用户对所述互动内容预设的加密时效,划分所述数据治理框架的时间粒度,根据所述时间粒度引入当前的时间戳至密钥生成过程中,通过预设的哈希参数结合所述时间戳生成加密密钥;Based on the encryption validity preset by the user for the interactive content, the time granularity of the data governance framework is divided, and the current timestamp is introduced into the key generation process according to the time granularity, and the encryption key is generated by combining the timestamp with the preset hash parameter; 判断所述加密密钥是否在所述加密时效内解密;Determining whether the encryption key is decrypted within the encryption time limit; 若否,则依据所述加密时效重新生成第二加密密钥,将所述加密密钥下放为备用密钥,并将所述第二加密密钥作为主密钥,重置所述加密时效为第二加密时效,在所述第二加密时效内允许所述主密钥和所述备用密钥共同作为所述数据治理框架的解密内容。If not, regenerate the second encryption key based on the encryption time limit, decentralize the encryption key as a backup key, and use the second encryption key as the master key, reset the encryption time limit to the second encryption time limit, and allow the master key and the backup key to be used together as the decryption content of the data governance framework within the second encryption time limit. 4.根据权利要求1所述的电商用户的管理方法,其特征在于,所述判断所述互动内容是否检测到预设的敏感信息的步骤中,还包括:4. The e-commerce user management method according to claim 1, characterized in that the step of determining whether the interactive content detects preset sensitive information further comprises: 从所述互动内容中采集所述用户输出的语音信息,去除所述语音信息中的背景噪声,将长音频流分割为预设份数的短音频片段,对所述短音频片段进行端点检测,生成对应的音频特征;Collecting voice information output by the user from the interactive content, removing background noise from the voice information, dividing a long audio stream into a preset number of short audio segments, performing endpoint detection on the short audio segments, and generating corresponding audio features; 判断所述音频特征是否匹配所述敏感信息;Determining whether the audio feature matches the sensitive information; 若是,则将所述音频特征标记为敏感内容,应用预设的屏蔽数据模糊所述敏感内容的信息访问,采集所述用户对所述敏感内容在所述电商平台的隐私设定,基于所述隐私设定对应调整所述语音信息,其中,所述屏蔽数据具体包括文本屏蔽、音频静音和叠加覆盖。If so, the audio feature is marked as sensitive content, and preset shielding data is applied to obscure information access to the sensitive content. The user's privacy settings for the sensitive content on the e-commerce platform are collected, and the voice information is adjusted accordingly based on the privacy settings, wherein the shielding data specifically includes text shielding, audio muting, and overlay coverage. 5.根据权利要求1所述的电商用户的管理方法,其特征在于,所述判断所述数据治理框架是否需要进行数据转移的步骤中,还包括:5. The e-commerce user management method according to claim 1, characterized in that the step of determining whether the data governance framework needs to transfer data further includes: 在所述电商平台上识别所述用户的实时地区信息;Identifying the real-time region information of the user on the e-commerce platform; 判断所述实时地区信息是否匹配所述电商平台预收录的地区;Determining whether the real-time region information matches the regions pre-recorded by the e-commerce platform; 若是,则基于所述实时地区信息获取所述用户的数据隐私要求,根据所述电商平台对所述转移端预收录的行业标准,评估所述数据治理框架在所述转移端的数据可行性。If so, the user's data privacy requirements are obtained based on the real-time regional information, and the data feasibility of the data governance framework at the transfer end is evaluated according to the industry standards pre-recorded by the e-commerce platform on the transfer end. 6.根据权利要求1所述的电商用户的管理方法,其特征在于,所述识别各个预设渠道接收的互动内容,对所述互动内容进行消息聚合,基于用户通过所述预设渠道输入的基础信息,生成所述互动内容的优先级队列的步骤中,还包括:6. The e-commerce user management method according to claim 1, characterized in that the step of identifying the interactive content received by each preset channel, aggregating the interactive content, and generating a priority queue of the interactive content based on the basic information input by the user through the preset channel, further comprises: 检测所述用户与所述电商平台互动前的基础信息完整项;Detecting the completeness of basic information items before the user interacts with the e-commerce platform; 判断所述基础信息完整项能否匹配所述基础信息;Determine whether the complete item of the basic information matches the basic information; 若是,则构建所述用户在所述电商平台与电商客服进行互动的队列编码,基于所述队列编码从所述电商平台上待定所述用户的互动服务。If so, a queue code is constructed for the user to interact with the e-commerce customer service on the e-commerce platform, and an interactive service for the user is determined on the e-commerce platform based on the queue code. 7.一种电商用户的管理系统,其特征在于,包括:7. A management system for e-commerce users, characterized by comprising: 识别模块,用于识别各个预设渠道接收的互动内容,对所述互动内容进行消息聚合,基于用户通过所述预设渠道输入的基础信息,生成所述互动内容的优先级队列,其中,所述基础信息具体包括互动类型、已待时长和所属地区;an identification module, used to identify interactive contents received by each preset channel, aggregate the interactive contents, and generate a priority queue of the interactive contents based on basic information input by the user through the preset channel, wherein the basic information specifically includes the type of interaction, waiting time, and region; 判断模块,用于判断所述互动内容是否检测到预设的敏感信息;A determination module, used to determine whether preset sensitive information is detected in the interactive content; 执行模块,用于若是,则根据所述基础信息获取所述用户对所述互动内容的权限设定,依据所述权限设定限制所述互动内容在电商平台的授权访问,采集所述用户从所述电商平台上制定的所述互动内容的访问前提条件,建立所述互动内容在所述电商平台上的数据生命周期,生成所述互动内容在所述数据生命周期内的数据治理框架;an execution module, for, if yes, obtaining the permission setting of the user to the interactive content according to the basic information, limiting the authorized access to the interactive content on the e-commerce platform according to the permission setting, collecting the access prerequisites of the interactive content set by the user on the e-commerce platform, establishing the data life cycle of the interactive content on the e-commerce platform, and generating a data governance framework for the interactive content within the data life cycle; 第二判断模块,用于判断所述数据治理框架是否需要进行数据转移;A second judgment module is used to judge whether the data governance framework needs data transfer; 第二执行模块,用于若需要,则从所述数据治理框架中标识并分类所述敏感信息,获取所述用户在所述电商平台预设的转移端,应用预设的传输加密协议为所述数据治理框架建立加密连接,生成所述数据治理框架的静态密钥,将所述静态密钥进行数据拆分并同步至所述电商平台和所述转移端,识别所述用户从所述电商平台和所述转移端中采集得到的静态密钥数据,结合所述静态密钥数据赋予所述用户在所述转移端上对所述数据治理框架的访问权限;The second execution module is used to identify and classify the sensitive information from the data governance framework if necessary, obtain the transfer terminal preset by the user on the e-commerce platform, apply the preset transmission encryption protocol to establish an encrypted connection for the data governance framework, generate a static key for the data governance framework, split the static key and synchronize it to the e-commerce platform and the transfer terminal, identify the static key data collected by the user from the e-commerce platform and the transfer terminal, and grant the user access rights to the data governance framework on the transfer terminal in combination with the static key data; 其中,还包括:Among them, it also includes: 第二识别模块,用于基于所述电商平台预构建的规则引擎,从所述基础信息中识别所述互动内容对应的地区管理设定;A second identification module, configured to identify, from the basic information, a regional management setting corresponding to the interactive content based on a rule engine pre-built by the e-commerce platform; 第三判断模块,用于判断所述地区管理设定是否限制所述互动内容;A third determination module is used to determine whether the regional management setting restricts the interactive content; 第三执行模块,用于若是,则应用所述规则引擎根据所述地区管理设定设置关键词过滤规则,在所述互动内容中标记出相应的限制关键词,依据所述限制关键词对所述互动内容拦截,生成所述电商平台对所述用户推送的拦截信息,结合所述地区管理设定和所述拦截信息屏蔽所述互动内容。The third execution module is used to apply the rule engine to set keyword filtering rules according to the regional management settings, mark corresponding restriction keywords in the interactive content, intercept the interactive content based on the restriction keywords, generate interception information pushed by the e-commerce platform to the user, and block the interactive content in combination with the regional management settings and the interception information. 8.根据权利要求7所述的电商用户的管理系统,其特征在于,所述执行模块包括:8. The management system for e-commerce users according to claim 7, wherein the execution module comprises: 采集单元,用于基于所述电商平台预设的权限层级,识别对所述互动内容提出访问的其他用户,通过所述电商平台对所述其他用户进行预设的访问验证,采集验证结果;A collection unit, configured to identify other users who request to access the interactive content based on the permission level preset by the e-commerce platform, perform preset access verification on the other users through the e-commerce platform, and collect verification results; 判断单元,用于判断所述验证结果是否匹配所述权限层级;A judging unit, used to judge whether the verification result matches the permission level; 执行单元,用于若是,则获取所述其他用户在所述电商平台上的行为数据,根据所述行为数据和所述其他用户的基础信息,应用预设的机器学习算法建立所述其他用户的行为模式,依据所述行为模式计算所述其他用户在所述电商平台上预设的风险因子,生成所述其他用户访问所述互动内容对应的风险等级,其中,所述行为数据具体包括登录时间、访问频率、浏览历史、购买记录、设备信息和IP地址。an execution unit, for obtaining, if yes, the behavior data of the other users on the e-commerce platform, applying a preset machine learning algorithm to establish the behavior patterns of the other users based on the behavior data and the basic information of the other users, calculating the risk factors preset by the other users on the e-commerce platform based on the behavior patterns, and generating a risk level corresponding to the other users' access to the interactive content, wherein the behavior data specifically includes login time, access frequency, browsing history, purchase history, device information and IP address.
CN202410945665.3A 2024-07-15 2024-07-15 A management method and system for e-commerce users Active CN118505235B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410945665.3A CN118505235B (en) 2024-07-15 2024-07-15 A management method and system for e-commerce users

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410945665.3A CN118505235B (en) 2024-07-15 2024-07-15 A management method and system for e-commerce users

Publications (2)

Publication Number Publication Date
CN118505235A CN118505235A (en) 2024-08-16
CN118505235B true CN118505235B (en) 2024-12-31

Family

ID=92248277

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410945665.3A Active CN118505235B (en) 2024-07-15 2024-07-15 A management method and system for e-commerce users

Country Status (1)

Country Link
CN (1) CN118505235B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119939630B (en) * 2025-01-17 2025-10-03 山东经贸职业学院 Cross-border electronic commerce background data secure storage method and system
CN120278454B (en) * 2025-03-26 2025-08-29 科融科技(北京)有限公司 Digital intelligent service system for enterprise service

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115951843A (en) * 2023-03-13 2023-04-11 聊城市茌平区润德勘察测绘有限公司 Information data migration and safety protection system and method for e-commerce platform
CN117319334A (en) * 2023-05-23 2023-12-29 北京麦芽田网络科技有限公司 Method for aggregating platform chatting

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117034305A (en) * 2023-06-29 2023-11-10 上海观安信息技术股份有限公司 Sensitive information identification method, device, computer equipment and readable storage medium
CN117688446A (en) * 2023-12-12 2024-03-12 国泰君安证券股份有限公司 Method, device, processor and readable storage medium for realizing large-scale data asset classification and hierarchical processing based on transfer learning

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115951843A (en) * 2023-03-13 2023-04-11 聊城市茌平区润德勘察测绘有限公司 Information data migration and safety protection system and method for e-commerce platform
CN117319334A (en) * 2023-05-23 2023-12-29 北京麦芽田网络科技有限公司 Method for aggregating platform chatting

Also Published As

Publication number Publication date
CN118505235A (en) 2024-08-16

Similar Documents

Publication Publication Date Title
CN118505235B (en) A management method and system for e-commerce users
US8799981B2 (en) Privacy protection system
KR101294280B1 (en) System and Method capable of Preventing Individual Information Leakage by Monitoring Encrypted HTTPS-based Communication Data via Network Packet Mirroring
US7272716B2 (en) Enterprise secure messaging architecture
US7321969B2 (en) Secure instant messaging system using instant messaging group policy certificates
CA2577504C (en) Secure method of termination of service notification
US9438568B2 (en) System and method for email and file decryption without direct access to required decryption key
US9397835B1 (en) Web of trust management in a distributed system
US20030204722A1 (en) Instant messaging apparatus and method with instant messaging secure policy certificates
US11824971B2 (en) Peer-to-peer transmission system with a controlled, double-tier cryptographic key structure
US7590844B1 (en) Decryption system and method for network analyzers and security programs
US9692759B1 (en) Control of cloud application access for enterprise customers
US20030051172A1 (en) Method and system for protecting digital objects distributed over a network
US9356926B1 (en) Security system
EP1403839A1 (en) Data originality validating method and system
US20030237005A1 (en) Method and system for protecting digital objects distributed over a network by electronic mail
CN110519203B (en) Data encryption transmission method and device
CN109873819A (en) Method and system for preventing illegal access to server
CN106101092A (en) A kind of information evaluation processing method and first instance
CN112699391B (en) Target data sending method and privacy computing platform
CN110378135A (en) Intimacy protection system and method based on big data analysis and trust computing
CN100477647C (en) E-mail management system and method
CN104506530B (en) A kind of network data processing method and device, data transmission method for uplink and device
CN112699085B (en) Audit log management method and device
CN106453069B (en) An instant messaging message sending, viewing, viewing control method and device thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant