CN118505235B - A management method and system for e-commerce users - Google Patents
A management method and system for e-commerce users Download PDFInfo
- Publication number
- CN118505235B CN118505235B CN202410945665.3A CN202410945665A CN118505235B CN 118505235 B CN118505235 B CN 118505235B CN 202410945665 A CN202410945665 A CN 202410945665A CN 118505235 B CN118505235 B CN 118505235B
- Authority
- CN
- China
- Prior art keywords
- user
- data
- interactive content
- commerce platform
- commerce
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/01—Customer relationship services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/32—User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- General Engineering & Computer Science (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Databases & Information Systems (AREA)
- Medical Informatics (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a management method and a system for E-commerce users, which are applied to the field of data processing, and the invention can help E-commerce customer service personnel and management personnel to maintain consistent processing standards for the E-commerce users in different channels or areas by establishing a unified data classification and standardization system including a definition and classification method of sensitive information, and simultaneously, corresponding data management strategies and processes including data storage positions, access authority control and data transfer rules are formulated according to industry standards in different areas so as to ensure compliance and safety after data transfer.
Description
Technical Field
The invention relates to the field of data processing, in particular to a management method and system for an e-commerce user.
Background
The management and the dispatch of the e-commerce customer service are of great importance in the multi-channel customer service management, and relate to how to effectively allocate and manage customer service resources to meet the customer demands of different channels and areas, while the e-commerce customer service is difficult to ensure whether the data conforms to the local industry standard after the data are cross-regional when the data of the e-commerce customers are processed, because different channels and areas have different definitions on the e-commerce industry standard, the e-commerce customer service cannot establish an effective data management framework for the e-commerce customers when sensitive information is processed.
Disclosure of Invention
The invention aims to solve the problem that an effective data management framework cannot be established for an electronic commerce user when the electronic commerce customer service processes sensitive information because different channels and areas have different definitions on electronic commerce industry standards, and provides a management method and system for the electronic commerce user.
The invention adopts the following technical means for solving the technical problems:
The invention provides a management method of an e-commerce user, which comprises the following steps:
Identifying interactive contents received by each preset channel, carrying out message aggregation on the interactive contents, and generating a priority queue of the interactive contents based on basic information input by a user through the preset channels, wherein the basic information specifically comprises an interactive type, a waiting duration and a region to which the user belongs;
judging whether the interactive content detects preset sensitive information or not;
If yes, acquiring authority setting of the user on the interactive content according to the basic information, limiting authorized access of the interactive content on an e-commerce platform according to the authority setting, acquiring access preconditions of the interactive content formulated by the user from the e-commerce platform, establishing a data life cycle of the interactive content on the e-commerce platform, and generating a data management framework of the interactive content in the data life cycle;
judging whether the data management framework needs data transfer or not;
If so, identifying and classifying the sensitive information from the data management framework, acquiring a transfer end preset by the user on the e-commerce platform, establishing encryption connection for the data management framework by applying a preset transmission encryption protocol, generating a static key of the data management framework, splitting and synchronizing the static key into the e-commerce platform and the transfer end, identifying static key data acquired by the user from the e-commerce platform and the transfer end, and giving the user access rights to the data management framework on the transfer end by combining the static key data.
Further, the step of obtaining the authority setting of the user for the interactive content according to the basic information and limiting the authorized access of the interactive content on the e-commerce platform according to the authority setting includes:
Identifying other users who give access to the interactive content based on a preset authority level of the e-commerce platform, carrying out preset access verification on the other users through the electric Shang Ping station, and collecting verification results;
judging whether the verification result matches the authority level;
If yes, acquiring behavior data of the other users on the e-commerce platform, establishing a behavior mode of the other users by applying a preset machine learning algorithm according to the behavior data and basic information of the other users, calculating risk factors preset on the e-commerce platform by the other users according to the behavior mode, and generating risk levels corresponding to the other users accessing the interactive content, wherein the behavior data specifically comprises login time, access frequency, browsing history, purchase records, equipment information and IP addresses.
Further, before the step of establishing the data life cycle of the interactive content on the e-commerce platform, the method further includes:
Identifying regional management settings corresponding to the interactive content from the basic information based on a rule engine pre-constructed by the e-commerce platform;
judging whether the region management setting limits the interactive content or not;
If yes, applying the rule engine to set a keyword filtering rule according to the regional management setting, marking corresponding limiting keywords in the interactive content, intercepting the interactive content according to the limiting keywords, generating interception information pushed by the electric Shang Ping station to the user, and shielding the interactive content by combining the regional management setting and the interception information.
Further, the step of establishing an encrypted connection for the data management framework by applying a preset transmission encryption protocol includes:
Dividing the time granularity of the data management framework based on encryption timeliness preset by a user on the interactive content, introducing a current time stamp into a key generation process according to the time granularity, and generating an encryption key by combining the time stamp through a preset hash parameter;
judging whether the encryption key is decrypted in the encryption time period or not;
if not, regenerating a second encryption key according to the encryption aging, putting the encryption key down as a spare key, taking the second encryption key as a main key, resetting the encryption aging to be the second encryption aging, and allowing the main key and the spare key to be used as decryption contents of the data management framework together in the second encryption aging.
Further, in the step of determining whether the interactive content detects the preset sensitive information, the method further includes:
Collecting voice information output by the user from the interactive content, removing background noise in the voice information, dividing a long audio stream into short audio fragments with preset parts, and performing endpoint detection on the short audio fragments to generate corresponding audio features;
judging whether the audio features match the sensitive information;
If yes, marking the audio feature as sensitive content, blurring information access of the sensitive content by applying preset shielding data, collecting privacy setting of the user on the sensitive content on the e-commerce platform, and correspondingly adjusting the voice information based on the privacy setting, wherein the shielding data specifically comprises text shielding, audio mute and superposition coverage.
Further, in the step of determining whether the data management framework needs to perform data transfer, the method further includes:
Identifying real-time region information of the user on the e-commerce platform;
Judging whether the real-time region information is matched with a region pre-recorded by the e-commerce platform;
if yes, acquiring the data privacy requirement of the user based on the real-time region information, and evaluating the data feasibility of the data management framework at the transfer end according to the industry standard of the electric Shang Ping station for pre-recording the transfer end.
Further, the step of identifying the interactive content received by each preset channel, aggregating the messages of the interactive content, and generating the priority queue of the interactive content based on the basic information input by the user through the preset channel further includes:
Detecting a complete item of basic information before the user interacts with the e-commerce platform;
Judging whether the complete item of the basic information can be matched with the basic information;
If yes, constructing a queue code for the user to interact with the E-commerce customer service on the E-commerce platform, and waiting for the interactive service of the user from the E-commerce platform based on the queue code.
The invention also provides a management system of the E-commerce user, which comprises the following steps:
the identification module is used for identifying the interactive content received by each preset channel, carrying out message aggregation on the interactive content, and generating a priority queue of the interactive content based on basic information input by a user through the preset channel, wherein the basic information specifically comprises the interactive type, the duration to be treated and the region to which the user belongs;
the judging module is used for judging whether the interaction content detects preset sensitive information or not;
The execution module is used for acquiring authority setting of the user on the interactive content according to the basic information if the user is on the electronic commerce platform, limiting authorized access of the interactive content on the electronic commerce platform according to the authority setting, acquiring access preconditions of the interactive content formulated by the user from the electronic commerce platform, establishing a data life cycle of the interactive content on the electronic commerce platform, and generating a data management framework of the interactive content in the data life cycle;
the second judging module is used for judging whether the data management frame needs data transfer or not;
The second execution module is used for identifying and classifying the sensitive information from the data management frame if needed, acquiring a transfer end preset by the user on the e-commerce platform, establishing encryption connection for the data management frame by applying a preset transmission encryption protocol, generating a static key of the data management frame, splitting and synchronizing the data of the static key to the e-commerce platform and the transfer end, identifying static key data acquired by the user from the e-commerce platform and the transfer end, and giving the user access right to the data management frame on the transfer end by combining the static key data.
Further, the execution module includes:
the acquisition unit is used for identifying other users who give access to the interactive content based on a permission level preset by the e-commerce platform, carrying out preset access verification on the other users through the electric Shang Ping station, and acquiring a verification result;
the judging unit is used for judging whether the verification result is matched with the authority level;
And the execution unit is used for acquiring the behavior data of the other users on the e-commerce platform if the user is in the e-commerce platform, establishing a behavior mode of the other users by applying a preset machine learning algorithm according to the behavior data and the basic information of the other users, calculating risk factors preset on the e-commerce platform by the other users according to the behavior mode, and generating risk levels corresponding to the other users accessing the interactive content, wherein the behavior data specifically comprises login time, access frequency, browsing history, purchase records, equipment information and IP addresses.
Further, the method further comprises the following steps:
the second identification module is used for identifying regional management settings corresponding to the interactive content from the basic information based on a rule engine pre-constructed by the e-commerce platform;
The third judging module is used for judging whether the region management setting limits the interactive content or not;
And the third execution module is used for applying the rule engine to set keyword filtering rules according to the regional management setting if yes, marking corresponding limiting keywords in the interactive contents, intercepting the interactive contents according to the limiting keywords, generating interception information pushed by the electric Shang Ping units to the users, and shielding the interactive contents by combining the regional management setting and the interception information.
The invention provides a management method and a management system for an e-commerce user, which have the following beneficial effects:
The invention establishes a unified data classification and standardization system, including definition and classification methods of sensitive information, which can help E-business customer service personnel and management personnel to maintain consistent processing standards for E-business users in different channels or areas, and simultaneously, according to industry standards in different areas, corresponding data management strategies and processes, including data storage positions, access right control and data transfer rules, are formulated so as to ensure the security after data transfer, and encryption technology and security protocols are used to ensure that data processing and storage can conform to the data protection rules and industry standards of the transfer areas.
Drawings
FIG. 1 is a flow chart of an embodiment of a method for managing e-commerce users of the present invention;
FIG. 2 is a block diagram illustrating an exemplary embodiment of a system for managing e-commerce users of the present invention.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present invention, as the achievement, functional features, and advantages of the present invention are further described with reference to the embodiments, with reference to the accompanying drawings.
The technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Referring to fig. 1, a method for managing e-commerce users according to an embodiment of the present invention includes:
S1, identifying interactive contents received by each preset channel, carrying out message aggregation on the interactive contents, and generating a priority queue of the interactive contents based on basic information input by a user through the preset channels, wherein the basic information specifically comprises an interactive type, a waiting duration and a region;
s2, judging whether the interactive content detects preset sensitive information or not;
S3, if so, acquiring authority setting of the user on the interactive content according to the basic information, limiting authorized access of the interactive content on an e-commerce platform according to the authority setting, acquiring access preconditions of the interactive content formulated by the user from the e-commerce platform, establishing a data life cycle of the interactive content on the e-commerce platform, and generating a data management framework of the interactive content in the data life cycle;
S4, judging whether the data management framework needs data transfer or not;
And S5, if necessary, identifying and classifying the sensitive information from the data management frame, acquiring a transfer end preset by the user on the e-commerce platform, establishing encryption connection for the data management frame by applying a preset transmission encryption protocol, generating a static key of the data management frame, splitting the static key into data and synchronizing the data to the e-commerce platform and the transfer end, identifying static key data acquired by the user from the e-commerce platform and the transfer end, and giving the user access authority to the data management frame on the transfer end by combining the static key data.
In this embodiment, the system aggregates the messages of the interactive contents by identifying the interactive contents received by each preset channel of the e-commerce platform, and based on the basic information input by the user through the preset channel before the user performs the interaction, the basic information specifically includes the interaction type, When the system judges that the interactive contents of the e-commerce users do not detect the preset sensitive format information, for example, the system considers that the interactive contents of the e-commerce users do not need to be protected by using a secret measure only by detecting whether the data are transferred according to the industry standard and the data protection of the transfer terminal area or not, the system can check the interactive contents by using a predefined rule and algorithm to ensure that the sensitive information is not contained, and under the condition that an automation tool cannot completely confirm, the system can introduce manual checking to ensure that the interactive contents do not contain the sensitive information, and simultaneously, the system inquires and acquires the industry standard and the data protection rule of the target area, ensures that all necessary compliance requirements are known, and maintains a latest rule database on an e-commerce platform, and comprises the data protection requirements and the industry standard of each area, and selects proper data transmission according to the rule of the target area, so as to ensure that the data is safe in the transmission process, for example, when the system judges that the electronic commerce users are not provided with the pre-arranged in the transfer terminal area, the system can set the secret information by the e-commerce users, the user can not need to access the secret information of the user by setting the secret information of the e-commerce users according to the preset electric commerce users, the secret information can be limited by the rule of the electric commerce users, the user can acquire the secret information of the interactive contents, and the user can not need to set the secret information of the user's, and the secret information of the user has the secret requirements according to the rule, acquiring a precondition for an e-commerce user to access the interactive content from an e-commerce platform, establishing a data life cycle of the interactive content for privacy protection on the e-commerce platform, and generating a data management framework of the interactive content in the data life cycle; the system can carefully control who can access the interactive content according to the basic information and authority setting of the e-commerce user, ensure that only authorized users can view the sensitive information, allow the users to set access authorities on the e-commerce platform by themselves, enhance the control feeling and trust degree of the users on own data, dynamically adjust a data management frame and a protection strategy according to the latest regional rule change, enable the processing of the interactive content to conform to the privacy protection rule of each region, then the system judges whether the data management frame needs to carry out data transfer so as to execute corresponding steps, for example, when the system judges that the data management frame of the interactive content does not need to carry out data transfer, the system can consider that the e-commerce user does not need to carry out cross-regional data transfer on the e-commerce platform, the system can ensure that the local storage of the interactive content on the e-commerce platform adopts high-standard security measures, such as data encryption and access control, avoid the data loss in real-time by selecting a storage position conforming to the safety and compliance requirements, store data in an unsafe environment, simultaneously carry out data loss in real-time, ensure that the data is lost or a plurality of data is monitored at a single point, and the data is monitored at a certain time, when the system judges that the data management framework of the interactive content needs to transfer data, for example, the system considers that the user needs to transfer data across areas in the data transfer end area, the system identifies and classifies corresponding sensitive information from the data management framework, acquires preset data transfer end areas of the user on the user platform, establishes encryption connection for the data management framework by applying preset transmission encryption protocols, generates a static key of the data management framework, splits and synchronizes the static key to the user platform and the data transfer end areas, identifies static key data acquired from the user platform and the data transfer end areas, combines the static key data in the user platform and the data transfer end areas, can acquire access authority of the data management framework in the data transfer end areas, ensures confidentiality and integrity of data transmission in the data transfer process by using the preset transmission encryption protocols, prevents the data from being transferred in the transmission end areas or the data transfer end areas from being further tampered with by the user platform and further, and can only enhance the security key decryption method when the data is further intercepted and controlled by the user end areas, ensuring that the data meets local rule requirements at the destination.
It should be noted that, specific examples of message aggregation for interactive contents are as follows:
the user can interact with the E-commerce platform through the following channels:
e-mail, sending a mail inquiry order state;
Social media, namely, issuing a push for complaining of logistics delay on a social platform, and @ an official account of an electronic commerce platform;
instant communication, namely sending a message to change the delivery address through the communication platform;
The e-commerce platform will first pass through the identification channel:
An email (xxxx@example.com);
Social platform (xx@zhangsan);
A communications platform (xxx+123456789);
Data collection is then performed:
Collecting mail contents of Zhang III from an email server;
Collecting the third push text from the social platform API;
collecting the instant message of Zhang III from the communication platform API;
and then data preprocessing is carried out, including:
Removing repeated mails and invalid push messages sent before Zhang III;
converting all text contents into a unified coding format;
Identifying mail as 'order inquiry', pushing text as 'complaint', and instant message as 'address change';
finally, data aggregation is carried out, including:
Confirming that the three interactive contents are all three pieces of information such as user ID, mailbox and telephone number;
combining the mail, the push message and the instant message of the third step into a session record;
Since the push relates to complaints, the priority is highest, and then instant messages and mails are next;
The data display result is as follows, and the aggregation interaction record of Zhang three is displayed in the interface of the customer service system:
User Zhang San
E-mail (order query): "please ask My order status?
Social platform (complaint), "@ e-commerce platform i have waited for a week why have my packages not yet arrived?
Communication platform (address change), "hello, i need to change my shipping address, new address is:,";
Through message aggregation, the customer service system of the e-commerce platform can provide a unified view, namely customer service personnel can view all relevant user interaction contents in one interface, so that switching among a plurality of systems is avoided, meanwhile, the interaction information of all channels is integrated, the requirements and problems of the users are quickly identified and responded, the users can get consistent and quick feedback no matter which channel the users contact the platform, and the satisfaction degree of the users is enhanced.
It should be added that, a preset transmission encryption protocol is applied to establish an encryption connection for the data governance framework, and specific examples of generating a static key of the data governance framework are as follows:
Assuming that a certain e-commerce platform needs to safely transmit the sensitive order information of the e-commerce user from the platform server to the server of the third-party logistics service provider, a transmission encryption protocol needs to be selected first, and assuming that the e-commerce platform and the logistics service provider decide to use a TLS protocol to ensure the transmission safety;
firstly, initializing encryption connection, initiating a TLS handshake request to a server (a logistics server) by a client (an e-commerce platform server), verifying a digital certificate provided by the logistics server by the e-commerce platform server, ensuring the authenticity of the digital certificate, generating a static key, negotiating by both parties to generate a symmetric key, assuming an AES 256-bit key, safely sharing the symmetric key through the TLS handshake process, and then encrypting and transmitting data, namely encrypting order information by using the generated AES 256-bit static key by the e-commerce platform server as follows;
# generation of random key
Key=os.urandot (32) # 256-bit key
Iv = os. Urandom (16) # 128-bit initial vector
cipher=Cipher(algorithms.AES(key),modes.CFB(iv),backend=default_backend())
encryptor=cipher.encryptor()
plaintext=b"OrderID:12345;UserID:zhangsan;Address:123 Main St"
ciphertext=encryptor.update(plaintext)+encryptor.finalize()
The encrypted order information is sent to a logistics service provider server through TLS encryption connection, and after the logistics service provider server receives the encrypted data, the same AES 256-bit static key is used for decryption;
decryptor=cipher.decryptor()
decrypted_data=decryptor.update(ciphertext)+decryptor.finalize()print(decrypted_data.decode('utf-8'))# Restoring original order information
Finally, the logistics service provider server verifies the integrity of the data and ensures that the data is not tampered;
In summary, through the above steps, the e-commerce platform can ensure that the sensitive order information of the user is fully protected in the transmission process, and prevent data leakage and tampering. Selecting proper transmission encryption protocol, generating and using static key to encrypt data, and decrypting and verifying at receiving end, forming a complete data security transmission flow. The process not only improves the security of data transmission, but also enhances the trust of users to the platform.
In this embodiment, the step S3 of obtaining the authority setting of the user for the interactive content according to the basic information and limiting the authorized access of the interactive content to the e-commerce platform according to the authority setting includes:
S31, identifying other users who give access to the interactive content based on a permission level preset by the e-commerce platform, carrying out preset access verification on the other users through the electric Shang Ping, and collecting verification results;
S32, judging whether the verification result matches the authority level;
And S33, if so, acquiring behavior data of the other users on the e-commerce platform, establishing a behavior mode of the other users by applying a preset machine learning algorithm according to the behavior data and basic information of the other users, calculating risk factors preset on the e-commerce platform by the other users according to the behavior mode, and generating risk levels corresponding to the other users accessing the interactive content, wherein the behavior data specifically comprises login time, access frequency, browsing history, purchase records, equipment information and IP addresses.
In this embodiment, the system identifies other users who access the interactive content based on a permission level preset by the e-commerce platform, performs preset access verification on the other users who access the interactive content through the e-commerce platform, collects a verification result, and then determines whether the verification result matches the permission level preset by the e-commerce platform to execute corresponding steps; for example, when the system determines that the authentication result cannot match the authority level preset by the electric commerce platform, the system considers that the user authority attempting to access the interactive content is insufficient and cannot obtain the access authority, the system displays prompt information of insufficient authority to the user and informs the user of the fact that the user cannot access the requested content, relevant help information or links are provided on the electric commerce platform, the user is guided to know the authority requirement and the authority improvement method, meanwhile, the access attempt of insufficient authority is recorded in a system log, the recorded information comprises a user ID, request time, request content and authority level, if the user considers that the user has authority, an option of contacting the electric commerce client is provided, the electric commerce client can further authenticate and process the user request, for example, when the system determines that the authentication result can match the authority level preset by the electric commerce platform, the system considers that the user accessing the interactive content meets the authority, the system obtains behavior data of the user on the electric commerce platform, the behavior data specifically comprises login time, access frequency, browsing history, purchase record, equipment information and IP address, the behavior data and basic information of the user are established by applying a machine learning algorithm preset by the user, the preset behavior pattern is calculated according to the behavior pattern of the user on the electric commerce client, the system ensures that only trusted users can access, protects the privacy of the users and the safety of platform data by carrying out stricter risk assessment on the access of sensitive interactive contents, simultaneously, the platform can realize finer risk control, reduce fraud loss and operation risk by establishing a behavior mode and a risk factor of the users, and monitor the behaviors of the users in real time, respond to high risk behaviors in time, such as triggering secondary verification, limiting account operation and sending safety reminding.
It should be noted that, according to different behavior modes, risk factors preset on the e-commerce platform by the user are calculated, and specific examples of corresponding risk levels when the user accesses the interactive content are generated are as follows:
Assuming that a user performs the following operations on the e-commerce platform, the system calculates risk factors and generates risk grades through the operations, and obtaining operation data of the user on the e-commerce platform comprises the following steps:
login time is 9 am to 6 pm a day;
access frequency, 3-5 times per week;
browsing history, mainly browsing electronic products and books;
Purchase records, namely purchasing 1-2 electronic products per month;
Equipment information, namely often using a home PC and a mobile phone;
IP address: fixed IP for common home and office;
The system detects that Zhang Sanat 2 am on a certain day logs in from a new cross-country IP address and tries to purchase a large amount of high-price commodities, because the login time is abnormal and is 2 am, the login time does not accord with the normal login time of Zhang San, the login IP is the new cross-country IP address, zhang San tries to purchase a large amount of high-price commodities and does not accord with the normal purchase record of Zhang San, and the system calculates a high risk factor by integrating the abnormality;
according to the risk factors, the system generates a high risk level, and the specific operation steps are as follows:
login time, namely 2 am;
IP address, new transnational IP;
purchasing behavior, namely high-volume consumption;
the login time and the IP address are found to be abnormal by comparing the normal behavior mode of the third sheet, and the purchase record is compared to find that the consumption amount is abnormal;
abnormal login time, namely increasing risk factors;
the IP address is abnormal, namely the risk factor is increased;
the consumption amount is abnormal, namely the risk factor is increased;
And then generating a risk level, namely setting the access risk level of the third party to be high after the comprehensive calculation of the system, and adopting corresponding measures by the system according to the high risk level, wherein the measures comprise limiting the access of the third party to the interactive content of the E-commerce user, simultaneously requiring the sending of a short message verification code or mail confirmation, requiring the assistance of an E-commerce platform for identity verification, temporarily freezing an account or limiting the large-scale transaction operation, and sending a security warning notice to the third party to remind the account of possible risk.
In this embodiment, before step S3 of establishing a data life cycle of the interactive content on the e-commerce platform, the method further includes:
s301, identifying regional management settings corresponding to the interactive content from the basic information based on a rule engine pre-constructed by the e-commerce platform;
S302, judging whether the region management setting limits the interactive content or not;
And S303, if yes, applying the rule engine to set a keyword filtering rule according to the regional management setting, marking corresponding limiting keywords in the interactive content, intercepting the interactive content according to the limiting keywords, generating interception information pushed by the electric Shang Ping station to the user, and shielding the interactive content by combining the regional management setting and the interception information.
In this embodiment, the system pre-builds a rule engine based on the e-commerce platform, identifies the region management settings corresponding to the interactive content from the basic information of the e-commerce user, then the system judges whether the region management settings limit the interactive content of the e-commerce user to execute the corresponding steps, for example, when the system judges that the region management settings are not limited to the interactive content of the e-commerce user, the system considers that the interactive content of the user needs to meet the industry standard of the region where the user is located, the system can continuously process the interactive content of the user to ensure the normal display and interaction of the user, and simultaneously provides normal user service and interaction functions, no additional prompt or limitation is needed, the interactive content of the user is continuously monitored, the region management settings are ensured to be continuously met, and the interactive content and judgment process are recorded, so that the audit and compliance check are convenient, for example, when the system judges that the region management settings limit the interactive content of the e-commerce user, the system judges that the interactive content of the user is not met the industry standard of the region, the system can apply a rule engine to set a keyword filtering rule according to the region management settings, the corresponding limit keyword is marked in the interactive content, the interactive content is intercepted, the user's interactive content is required to meet the industry standard of the region management settings, the interactive content is blocked, the user is generated by the user, the user is blocked by the user, the user is required to be blocked by the user, and the region management rules are well-required to be blocked by the region-related to the region management rules, and the user's interactive content is kept by the region-related to be well, and the region-related to the region management rules, and the region-user is kept by the region-related to be blocked by the region-user, and the region-related rule is appropriate rule is blocked by region-user, the content security of the platform is maintained, and interception information is generated and pushed, so that a user can know why the content is intercepted and how to modify the content in time, and the problem that the user repeatedly tries to release the non-compliant content due to unknowing is avoided.
In this embodiment, the step S5 of establishing an encrypted connection for the data management frame by applying a preset transport encryption protocol includes:
S51, dividing the time granularity of the data management framework based on encryption timeliness preset by a user on the interactive content, introducing a current time stamp into a key generation process according to the time granularity, and generating an encryption key by combining the time stamp through a preset hash parameter;
S52, judging whether the encryption key is decrypted within the encryption timeliness;
And S53, if not, regenerating a second encryption key according to the encryption aging, and lowering the encryption key to be a spare key, taking the second encryption key as a main key, resetting the encryption aging to be the second encryption aging, and allowing the main key and the spare key to be used as decryption contents of the data management framework together in the second encryption aging.
In this embodiment, the system divides the time granularity of the data management framework based on the encryption timeliness preset by the electric user for the interactive content, the time granularity specifically includes seconds, minutes, hours or days, introduces the current time stamp into the key generation process according to different time granularities, generates the encryption key by combining the preset hash parameter with the time stamp, and then the system judges whether the encryption key is used for decryption by the electric user in the encryption timeliness to execute the corresponding steps; for example, when the system determines that the encryption key can be used by the electric consumer for decryption within the encryption timeliness, the system considers that the encryption key is valid and available within a specified time window, the system verifies the validity of the encryption key, recalculates the encryption key according to the current time stamp and a preset hash parameter, compares the newly generated encryption key with the encryption key stored by the user, confirms that the encryption key is valid within the encryption timeliness, allows the user to use the encryption key for decryption operation, the user can continue accessing and operating the interactive content without being affected by the encryption timeliness limit, and if the system detects that the encryption key is about to expire or exceeds the encryption timeliness, the system can automatically update the encryption key when the user operates next time, so that the security and availability of data can be ensured, and an updating state of the encryption key is maintained when necessary, for example, when the system determines that the encryption key cannot be used by the electric consumer for decryption within the encryption timeliness, the system considers that the encryption key is expired, namely the electric consumer cannot obtain the encryption key again from the electric consumer platform, but the encryption key is valid within a short time, if the electric consumer has not input the encryption key for decryption operation is confirmed, the system can still decrypt the data by introducing a main key and a spare key mechanism, ensures that the user can not interrupt the access to the data in the key updating process, can still decrypt the data by using the spare key even if the encryption aging expires, and simultaneously can decrypt the data by using the spare key when the old encryption key is lowered into the spare key, so that even if the new key is just generated and a problem occurs, the user can still decrypt the data by using the spare key, double guarantee is provided, and after the new key is generated, the encryption aging is reset, so that the user can continuously access the data seamlessly in the aging of the new key, and the availability and the continuity of the data are ensured.
In this embodiment, in step S2 of determining whether the interactive content detects preset sensitive information, the method further includes:
S21, collecting voice information output by the user from the interactive content, removing background noise in the voice information, dividing a long audio stream into short audio fragments with preset parts, and detecting endpoints of the short audio fragments to generate corresponding audio features;
s22, judging whether the audio features are matched with the sensitive information;
And S23, if yes, marking the audio feature as sensitive content, blurring information access of the sensitive content by applying preset shielding data, collecting privacy setting of the user on the sensitive content on the e-commerce platform, and correspondingly adjusting the voice information based on the privacy setting, wherein the shielding data specifically comprises text shielding, audio mute and superposition coverage.
In this embodiment, the system collects voice information output by the e-commerce user from the interactive content, removes background noise in the voice information, segments the long audio stream into short audio segments with preset parts, performs endpoint detection on the short audio segments to generate corresponding audio features, and then the system judges whether the audio features match sensitive type information preset by the e-commerce platform to execute corresponding steps; for example, when the system judges that the voice characteristics of the voice information cannot be matched with the sensitive type information, the system considers that the voice interaction content of the e-commerce user does not contain the sensitive information preset by the platform, the system marks the voice information which is not matched with the sensitive type information as common content or non-sensitive content, the system is favorable for subsequent data audit and management, the integrity and compliance of data are ensured, meanwhile, for the voice information which is not matched with the sensitive type information, the system can continuously monitor the processing result and analysis effect, if the voice information which is not matched with the sensitive type information is found to contain the unforeseen sensitive content, the system adjusts the preset setting of the sensitive type information according to the actual situation so as to improve the sensitive data detection capability of the system, collects user feedback and data analysis result, acquires new sensitive type information from the new sensitive type information, and further improves the sensitive data detection and processing capability of the system, for example, when the system judges that the voice interaction content of the e-commerce user contains the sensitive information preset by the platform is favorable for subsequent data audit and management, the system marks the voice characteristics as the sensitive content which is matched with the sensitive type information, and uses the preset by the preset shielding data, the system can access specific shielding data to the specific shielding data, the method comprises the steps of audio muting and overlapping coverage, collecting privacy settings of an e-commerce user on sensitive content on an e-commerce platform, and correspondingly adjusting voice information based on different privacy settings; the system can avoid the complexity of manual inspection and the risk of missed inspection by automatically identifying and marking the voice content containing the sensitive information, process the sensitive information in time to prevent unauthorized access and leakage, provide various shielding modes, such as text shielding, audio mute and overlapping coverage, ensure that the sensitive information can be effectively protected under different use scenes, because the flexible shielding mode can be adjusted according to different types of sensitive information and user requirements, and the sensitive information is correspondingly processed according to privacy settings of the user, the privacy preferences of the user are respected, the user has higher trust degree on the platform, and the privacy and the sensitive information are considered to be fully protected.
In this embodiment, in step S4 of determining whether the data management frame needs to perform data transfer, the method further includes:
s41, identifying real-time region information of the user on the e-commerce platform;
S42, judging whether the real-time region information is matched with the region pre-recorded by the E-commerce platform;
And S43, if so, acquiring the data privacy requirement of the user based on the real-time region information, and evaluating the data feasibility of the data management framework at the transfer end according to the industry standard of the electric Shang Ping station for pre-recording the transfer end.
In this embodiment, the system identifies real-time region information of the e-commerce user on the e-commerce platform, and then the system judges whether the real-time region information matches a region previously recorded by the e-commerce platform to execute corresponding steps; for example, when the system judges that the real-time regional information of the E-commerce user cannot be matched with the region pre-recorded by the E-commerce platform, the system considers that the E-commerce user does not need to carry out cross-region data transfer, the system can collect and store data according to the standards of the current region of the user, ensure to meet the region rule and platform policy, simultaneously continue to collect the interactive content and behavior data of the user in the current region, store the user data according to the current region rule and platform rule, set localized data access permission to ensure that the data is only accessed and processed in the current region, for example, when the system judges that the real-time regional information of the E-commerce user can be matched with the region pre-recorded by the E-commerce platform, the system considers that the E-commerce user needs to carry out cross-region data transfer according to the data privacy requirement of the real-time regional information, and evaluates the data feasibility of a data frame at the data transfer end according to the industry standard pre-recorded by the E-commerce platform, ensure that all the cross-region data transmission and processing meets the target region rule and industry data can not meet the privacy requirement or the data transmission and security risk protection requirements, and the data transmission security protection safety and security requirements are simultaneously prevented from being applied to the security protection and security protection requirements of the data transmission and security protection in the data transfer end, and according to the pre-recorded industry standard, the most suitable transmission protocol and method are selected, so that the data is ensured to be quickly and reliably transferred to a target area, the data transmission efficiency is improved, and the transmission time and possible interruption are reduced.
In this embodiment, identifying the interactive content received by each preset channel, aggregating the messages of the interactive content, and generating the priority queue of the interactive content based on the basic information input by the user through the preset channel, where step S1 further includes:
S11, detecting a complete item of basic information before the user interacts with the e-commerce platform;
s12, judging whether the complete item of the basic information can be matched with the basic information;
and S13, if yes, constructing a queue code for the user to interact with the E-commerce customer service on the E-commerce platform, and waiting for the interaction service of the user from the E-commerce platform based on the queue code.
In this embodiment, the system detects complete items of basic information before the electronic commerce and the electronic commerce platform interact, and then the system judges whether the complete items of basic information can match the basic information so as to execute corresponding steps; for example, when the system determines that the complete item of basic information before the interaction of the e-commerce user cannot match the basic information, the system considers that the e-commerce user does not have the authority to interact with the e-commerce customer service preferentially, that is, the system preferentially queues other e-commerce users in front of the e-commerce user, the system marks the e-commerce user which is identified as not matching the basic information as a non-preferential user, which means that the system does not preferentially process the interaction request, but places the e-commerce user at the tail or middle position of the queue, waits for the processing of other preferential users to process the request, and inserts the interaction request of the e-commerce user into the proper position of the queue, usually after the other users waiting to process in the current queue, and provides an information display or notification function of the user waiting for the queue, so that the current position of the user in the queue can be displayed to the e-commerce user, and the waiting time is expected to be needed, and the user is helped to know the sequence and the time of the processing of the interaction request. For example, when the system determines that the complete item of the basic information before the interaction of the E-commerce user can be matched with the basic information, the system considers that the E-commerce user has the authority of preferentially interacting with the E-commerce customer service, the system constructs a queue code for the E-commerce user to interact with the E-commerce customer service on the E-commerce platform, and the system waits for the interaction service of the E-commerce user from the E-commerce platform based on the queue code, can respond to the user requirement more quickly and timely by preferentially processing the user interaction request with complete basic information, therefore, satisfaction and experience of users are remarkably improved, meanwhile, the interactive service mechanism based on queue coding is established, the processing sequence of interactive requests can be effectively managed and optimized, so that customer service teams can process the requests of high-priority users more efficiently, response time and processing time are shortened, and by accurately identifying and preferentially processing users with matched basic information, the system can enable the customer service teams to concentrate on processing problems and requirements of key users, so that customer service efficiency and problem solving speed are improved, namely, the interactive service mechanism based on queue coding can also support more personalized services, and service flows and strategies can be customized according to the priorities and specific interaction requirements of the users, so that personalized requirements of the users can be met better.
Referring to fig. 2, a management system for an e-commerce user according to an embodiment of the present invention includes:
The identification module 10 is configured to identify interactive content received by each preset channel, aggregate messages of the interactive content, and generate a priority queue of the interactive content based on basic information input by a user through the preset channel, where the basic information specifically includes an interactive type, a waiting duration and a region to which the user belongs;
The judging module 20 is configured to judge whether the interactive content detects preset sensitive information;
The execution module 30 is configured to obtain, if yes, an authority setting of the user for the interactive content according to the basic information, limit authorized access of the interactive content on an e-commerce platform according to the authority setting, collect access preconditions of the interactive content formulated by the user from the e-commerce platform, establish a data life cycle of the interactive content on the e-commerce platform, and generate a data management framework of the interactive content in the data life cycle;
a second judging module 40, configured to judge whether the data management framework needs to perform data transfer;
The second execution module 50 is configured to identify and classify the sensitive information from the data management frame if necessary, obtain a transfer end preset by the user on the e-commerce platform, establish an encrypted connection for the data management frame by applying a preset transmission encryption protocol, generate a static key of the data management frame, split and synchronize the static key to the e-commerce platform and the transfer end, identify static key data acquired by the user from the e-commerce platform and the transfer end, and give the user access rights to the data management frame on the transfer end in combination with the static key data.
In this embodiment, the recognition module 10 performs message aggregation on the interactive contents received by recognizing the interactive contents received by each preset channel of the e-commerce platform, and based on basic information input by the user through the preset channel before the user performs the interaction, the basic information specifically includes an interaction type, when the system determines that the interactive contents of the e-commerce user do not detect the preset sensitive format information, for example, when the system determines that the interactive contents of the e-commerce user do not detect the preset sensitive format information, the system considers that the interactive contents of the e-commerce user do not need to be protected by using a secret measure by using an e-commerce platform, only needs to detect whether the data are transferred according to the industry standard and the data protection of the transfer end region, the system checks the interactive contents by using a predefined rule and algorithm, ensures that the sensitive information is not contained, and under the condition that an automation tool cannot completely confirm, the system can introduce manual auditing, ensures that the interactive contents do not contain the sensitive information, simultaneously queries and acquires the industry standard and the data protection rule of the target region, ensures that all necessary compliance requirements are known, maintains a latest rule database, contains the data protection requirements and the industry standard of each region, and selects proper data transmission according to the rule of the target region, ensures that the data are safe in transmission process, for example, when the system determines that the system detects the pre-arranged industry standard and the data are not required to be completely confirmed by the e-commerce user, the system sets the secret information by using the pre-arranged by using the e-commerce platform, the user can be authorized by the user, the user can access the secret information, and the user can be authorized by setting the user's privacy requirements of the user content to the user has the secret information, and the user has the secret requirements when the user has the secret protection module is required to be satisfied by setting the electronic protection platform, and the user has the secret information, acquiring a precondition for an e-commerce user to access the interactive content from an e-commerce platform, establishing a data life cycle of the interactive content for privacy protection on the e-commerce platform, and generating a data management framework of the interactive content in the data life cycle; the system can carefully control who can access the interactive content according to the basic information and authority setting of the e-commerce user, ensure that only authorized users can view the sensitive information, allow the users to set access authorities on the e-commerce platform by themselves, enhance the control feeling and trust degree of the users on own data, dynamically adjust a data management frame and a protection strategy according to the latest regional rule change, enable the processing of the interactive content to conform to the privacy protection rule of each region, then a second judging module 40 judges whether the data management frame needs to perform data transfer so as to execute corresponding steps, for example, when the system judges that the data management frame of the interactive content does not need to perform data transfer, the system can consider that the e-commerce user does not need to perform data transfer across regions on the e-commerce platform, ensure that the local storage of the interactive content on the e-commerce platform adopts high-standard security measures, such as data encryption and access control, and can ensure that the data is quickly restored in real-time by selecting storage positions conforming to the security and compliance requirements, and can prevent the data from being lost when the data is stored in the non-security environment, and the data is quickly monitored and the data is prevented from being lost in real time, for example, when the system judges that the data management framework of the interactive content needs to transfer data, the second execution module 50 considers that the electric user needs to transfer data across areas in the electric business platform, the system identifies and sorts out corresponding sensitive information from the data management framework, acquires preset data transfer end areas of the electric user on the electric business platform, establishes encryption connection for the data management framework by applying preset transmission encryption protocols, generates static keys of the data management framework, splits and synchronizes the static keys to the static keys of the electric business platform and the data transfer end areas, identifies the static key data acquired from the electric business platform and the data transfer end areas, combines the static key data in the electric business platform and the data transfer end areas, and can acquire the access right of the data management framework in the data transfer end areas, ensuring that the data meets local rule requirements at the destination.
In this embodiment, the execution module includes:
the acquisition unit is used for identifying other users who give access to the interactive content based on a permission level preset by the e-commerce platform, carrying out preset access verification on the other users through the electric Shang Ping station, and acquiring a verification result;
the judging unit is used for judging whether the verification result is matched with the authority level;
And the execution unit is used for acquiring the behavior data of the other users on the e-commerce platform if the user is in the e-commerce platform, establishing a behavior mode of the other users by applying a preset machine learning algorithm according to the behavior data and the basic information of the other users, calculating risk factors preset on the e-commerce platform by the other users according to the behavior mode, and generating risk levels corresponding to the other users accessing the interactive content, wherein the behavior data specifically comprises login time, access frequency, browsing history, purchase records, equipment information and IP addresses.
In this embodiment, the system identifies other users who access the interactive content based on a permission level preset by the e-commerce platform, performs preset access verification on the other users who access the interactive content through the e-commerce platform, collects a verification result, and then determines whether the verification result matches the permission level preset by the e-commerce platform to execute corresponding steps; for example, when the system determines that the authentication result cannot match the authority level preset by the electric commerce platform, the system considers that the user authority attempting to access the interactive content is insufficient and cannot obtain the access authority, the system displays prompt information of insufficient authority to the user and informs the user of the fact that the user cannot access the requested content, relevant help information or links are provided on the electric commerce platform, the user is guided to know the authority requirement and the authority improvement method, meanwhile, the access attempt of insufficient authority is recorded in a system log, the recorded information comprises a user ID, request time, request content and authority level, if the user considers that the user has authority, an option of contacting the electric commerce client is provided, the electric commerce client can further authenticate and process the user request, for example, when the system determines that the authentication result can match the authority level preset by the electric commerce platform, the system considers that the user accessing the interactive content meets the authority, the system obtains behavior data of the user on the electric commerce platform, the behavior data specifically comprises login time, access frequency, browsing history, purchase record, equipment information and IP address, the behavior data and basic information of the user are established by applying a machine learning algorithm preset by the user, the preset behavior pattern is calculated according to the behavior pattern of the user on the electric commerce client, the system ensures that only trusted users can access, protects the privacy of the users and the safety of platform data by carrying out stricter risk assessment on the access of sensitive interactive contents, simultaneously, the platform can realize finer risk control, reduce fraud loss and operation risk by establishing a behavior mode and a risk factor of the users, and monitor the behaviors of the users in real time, respond to high risk behaviors in time, such as triggering secondary verification, limiting account operation and sending safety reminding.
In this embodiment, further comprising:
the second identification module is used for identifying regional management settings corresponding to the interactive content from the basic information based on a rule engine pre-constructed by the e-commerce platform;
The third judging module is used for judging whether the region management setting limits the interactive content or not;
And the third execution module is used for applying the rule engine to set keyword filtering rules according to the regional management setting if yes, marking corresponding limiting keywords in the interactive contents, intercepting the interactive contents according to the limiting keywords, generating interception information pushed by the electric Shang Ping units to the users, and shielding the interactive contents by combining the regional management setting and the interception information.
In this embodiment, the system pre-builds a rule engine based on the e-commerce platform, identifies the region management settings corresponding to the interactive content from the basic information of the e-commerce user, then the system judges whether the region management settings limit the interactive content of the e-commerce user to execute the corresponding steps, for example, when the system judges that the region management settings are not limited to the interactive content of the e-commerce user, the system considers that the interactive content of the user needs to meet the industry standard of the region where the user is located, the system can continuously process the interactive content of the user to ensure the normal display and interaction of the user, and simultaneously provides normal user service and interaction functions, no additional prompt or limitation is needed, the interactive content of the user is continuously monitored, the region management settings are ensured to be continuously met, and the interactive content and judgment process are recorded, so that the audit and compliance check are convenient, for example, when the system judges that the region management settings limit the interactive content of the e-commerce user, the system judges that the interactive content of the user is not met the industry standard of the region, the system can apply a rule engine to set a keyword filtering rule according to the region management settings, the corresponding limit keyword is marked in the interactive content, the interactive content is intercepted, the user's interactive content is required to meet the industry standard of the region management settings, the interactive content is blocked, the user is generated by the user, the user is blocked by the user, the user is required to be blocked by the user, and the region management rules are well-required to be blocked by the region-related to the region management rules, and the user's interactive content is kept by the region-related to be well, and the region-related to the region management rules, and the region-user is kept by the region-related to be blocked by the region-user, and the region-related rule is appropriate rule is blocked by region-user, the content security of the platform is maintained, and interception information is generated and pushed, so that a user can know why the content is intercepted and how to modify the content in time, and the problem that the user repeatedly tries to release the non-compliant content due to unknowing is avoided.
In this embodiment, the second execution module further includes:
The dividing unit is used for dividing the time granularity of the data management framework based on encryption timeliness preset by a user on the interactive content, introducing a current time stamp into a key generation process according to the time granularity, and generating an encryption key by combining the time stamp through a preset hash parameter;
a second judging unit configured to judge whether the encryption key is decrypted within the encryption age;
and the second execution unit is used for regenerating a second encryption key according to the encryption aging if not, setting the encryption key down as a spare key, setting the second encryption key as a main key, resetting the encryption aging as the second encryption aging, and allowing the main key and the spare key to be used as decryption contents of the data management framework together in the second encryption aging.
In this embodiment, the system divides the time granularity of the data management framework based on the encryption timeliness preset by the electric user for the interactive content, the time granularity specifically includes seconds, minutes, hours or days, introduces the current time stamp into the key generation process according to different time granularities, generates the encryption key by combining the preset hash parameter with the time stamp, and then the system judges whether the encryption key is used for decryption by the electric user in the encryption timeliness to execute the corresponding steps; for example, when the system determines that the encryption key can be used by the electric consumer for decryption within the encryption timeliness, the system considers that the encryption key is valid and available within a specified time window, the system verifies the validity of the encryption key, recalculates the encryption key according to the current time stamp and a preset hash parameter, compares the newly generated encryption key with the encryption key stored by the user, confirms that the encryption key is valid within the encryption timeliness, allows the user to use the encryption key for decryption operation, the user can continue accessing and operating the interactive content without being affected by the encryption timeliness limit, and if the system detects that the encryption key is about to expire or exceeds the encryption timeliness, the system can automatically update the encryption key when the user operates next time, so that the security and availability of data can be ensured, and an updating state of the encryption key is maintained when necessary, for example, when the system determines that the encryption key cannot be used by the electric consumer for decryption within the encryption timeliness, the system considers that the encryption key is expired, namely the electric consumer cannot obtain the encryption key again from the electric consumer platform, but the encryption key is valid within a short time, if the electric consumer has not input the encryption key for decryption operation is confirmed, the system can still decrypt the data by introducing a main key and a spare key mechanism, ensures that the user can not interrupt the access to the data in the key updating process, can still decrypt the data by using the spare key even if the encryption aging expires, and simultaneously can decrypt the data by using the spare key when the old encryption key is lowered into the spare key, so that even if the new key is just generated and a problem occurs, the user can still decrypt the data by using the spare key, double guarantee is provided, and after the new key is generated, the encryption aging is reset, so that the user can continuously access the data seamlessly in the aging of the new key, and the availability and the continuity of the data are ensured.
In this embodiment, the judging module further includes:
The generating unit is used for collecting voice information output by the user from the interactive content, removing background noise in the voice information, dividing a long audio stream into short audio fragments with preset parts, detecting endpoints of the short audio fragments, and generating corresponding audio characteristics;
A third judging unit for judging whether the audio feature matches the sensitive information;
And the third execution unit is used for marking the audio feature as sensitive content if the audio feature is marked, blurring information access of the sensitive content by applying preset shielding data, collecting privacy setting of the user on the sensitive content on the e-commerce platform, and correspondingly adjusting the voice information based on the privacy setting, wherein the shielding data specifically comprises text shielding, audio mute and superposition coverage.
In this embodiment, the system collects voice information output by the e-commerce user from the interactive content, removes background noise in the voice information, segments the long audio stream into short audio segments with preset parts, performs endpoint detection on the short audio segments to generate corresponding audio features, and then the system judges whether the audio features match sensitive type information preset by the e-commerce platform to execute corresponding steps; for example, when the system judges that the voice characteristics of the voice information cannot be matched with the sensitive type information, the system considers that the voice interaction content of the e-commerce user does not contain the sensitive information preset by the platform, the system marks the voice information which is not matched with the sensitive type information as common content or non-sensitive content, the system is favorable for subsequent data audit and management, the integrity and compliance of data are ensured, meanwhile, for the voice information which is not matched with the sensitive type information, the system can continuously monitor the processing result and analysis effect, if the voice information which is not matched with the sensitive type information is found to contain the unforeseen sensitive content, the system adjusts the preset setting of the sensitive type information according to the actual situation so as to improve the sensitive data detection capability of the system, collects user feedback and data analysis result, acquires new sensitive type information from the new sensitive type information, and further improves the sensitive data detection and processing capability of the system, for example, when the system judges that the voice interaction content of the e-commerce user contains the sensitive information preset by the platform is favorable for subsequent data audit and management, the system marks the voice characteristics as the sensitive content which is matched with the sensitive type information, and uses the preset by the preset shielding data, the system can access specific shielding data to the specific shielding data, the method comprises the steps of audio muting and overlapping coverage, collecting privacy settings of an e-commerce user on sensitive content on an e-commerce platform, and correspondingly adjusting voice information based on different privacy settings; the system can avoid the complexity of manual inspection and the risk of missed inspection by automatically identifying and marking the voice content containing the sensitive information, process the sensitive information in time to prevent unauthorized access and leakage, provide various shielding modes, such as text shielding, audio mute and overlapping coverage, ensure that the sensitive information can be effectively protected under different use scenes, because the flexible shielding mode can be adjusted according to different types of sensitive information and user requirements, and the sensitive information is correspondingly processed according to privacy settings of the user, the privacy preferences of the user are respected, the user has higher trust degree on the platform, and the privacy and the sensitive information are considered to be fully protected.
In this embodiment, the second judging module further includes:
the identification unit is used for identifying the real-time region information of the user on the e-commerce platform;
a fourth judging unit, configured to judge whether the real-time region information matches a region pre-recorded by the e-commerce platform;
And the fourth execution unit is used for acquiring the data privacy requirement of the user based on the real-time region information if the data privacy requirement is met, and evaluating the data feasibility of the data management framework at the transfer end according to the industry standard of the electric Shang Ping for the pre-recording of the transfer end.
In this embodiment, the system identifies real-time region information of the e-commerce user on the e-commerce platform, and then the system judges whether the real-time region information matches a region previously recorded by the e-commerce platform to execute corresponding steps; for example, when the system judges that the real-time regional information of the E-commerce user cannot be matched with the region pre-recorded by the E-commerce platform, the system considers that the E-commerce user does not need to carry out cross-region data transfer, the system can collect and store data according to the standards of the current region of the user, ensure to meet the region rule and platform policy, simultaneously continue to collect the interactive content and behavior data of the user in the current region, store the user data according to the current region rule and platform rule, set localized data access permission to ensure that the data is only accessed and processed in the current region, for example, when the system judges that the real-time regional information of the E-commerce user can be matched with the region pre-recorded by the E-commerce platform, the system considers that the E-commerce user needs to carry out cross-region data transfer according to the data privacy requirement of the real-time regional information, and evaluates the data feasibility of a data frame at the data transfer end according to the industry standard pre-recorded by the E-commerce platform, ensure that all the cross-region data transmission and processing meets the target region rule and industry data can not meet the privacy requirement or the data transmission and security risk protection requirements, and the data transmission security protection safety and security requirements are simultaneously prevented from being applied to the security protection and security protection requirements of the data transmission and security protection in the data transfer end, and according to the pre-recorded industry standard, the most suitable transmission protocol and method are selected, so that the data is ensured to be quickly and reliably transferred to a target area, the data transmission efficiency is improved, and the transmission time and possible interruption are reduced.
In this embodiment, the identification module further includes:
the detection unit is used for detecting complete basic information items before the user interacts with the e-commerce platform;
a fifth judging unit, configured to judge whether the complete item of the basic information can match the basic information;
And the fifth execution unit is used for constructing a queue code for the user to interact with the E-commerce customer service on the E-commerce platform if the user is in the E-commerce platform, and waiting for the interactive service of the user from the E-commerce platform based on the queue code.
In this embodiment, the system detects complete items of basic information before the electronic commerce and the electronic commerce platform interact, and then the system judges whether the complete items of basic information can match the basic information so as to execute corresponding steps; for example, when the system determines that the complete item of basic information before the interaction of the e-commerce user cannot match the basic information, the system considers that the e-commerce user does not have the authority to interact with the e-commerce customer service preferentially, that is, the system preferentially queues other e-commerce users in front of the e-commerce user, the system marks the e-commerce user which is identified as not matching the basic information as a non-preferential user, which means that the system does not preferentially process the interaction request, but places the e-commerce user at the tail or middle position of the queue, waits for the processing of other preferential users to process the request, and inserts the interaction request of the e-commerce user into the proper position of the queue, usually after the other users waiting to process in the current queue, and provides an information display or notification function of the user waiting for the queue, so that the current position of the user in the queue can be displayed to the e-commerce user, and the waiting time is expected to be needed, and the user is helped to know the sequence and the time of the processing of the interaction request. For example, when the system determines that the complete item of the basic information before the interaction of the E-commerce user can be matched with the basic information, the system considers that the E-commerce user has the authority of preferentially interacting with the E-commerce customer service, the system constructs a queue code for the E-commerce user to interact with the E-commerce customer service on the E-commerce platform, and the system waits for the interaction service of the E-commerce user from the E-commerce platform based on the queue code, can respond to the user requirement more quickly and timely by preferentially processing the user interaction request with complete basic information, therefore, satisfaction and experience of users are remarkably improved, meanwhile, the interactive service mechanism based on queue coding is established, the processing sequence of interactive requests can be effectively managed and optimized, so that customer service teams can process the requests of high-priority users more efficiently, response time and processing time are shortened, and by accurately identifying and preferentially processing users with matched basic information, the system can enable the customer service teams to concentrate on processing problems and requirements of key users, so that customer service efficiency and problem solving speed are improved, namely, the interactive service mechanism based on queue coding can also support more personalized services, and service flows and strategies can be customized according to the priorities and specific interaction requirements of the users, so that personalized requirements of the users can be met better.
Although embodiments of the present invention have been shown and described, it will be understood by those skilled in the art that various changes, modifications, substitutions and alterations can be made therein without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (8)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410945665.3A CN118505235B (en) | 2024-07-15 | 2024-07-15 | A management method and system for e-commerce users |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN202410945665.3A CN118505235B (en) | 2024-07-15 | 2024-07-15 | A management method and system for e-commerce users |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN118505235A CN118505235A (en) | 2024-08-16 |
| CN118505235B true CN118505235B (en) | 2024-12-31 |
Family
ID=92248277
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN202410945665.3A Active CN118505235B (en) | 2024-07-15 | 2024-07-15 | A management method and system for e-commerce users |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN118505235B (en) |
Families Citing this family (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN119939630B (en) * | 2025-01-17 | 2025-10-03 | 山东经贸职业学院 | Cross-border electronic commerce background data secure storage method and system |
| CN120278454B (en) * | 2025-03-26 | 2025-08-29 | 科融科技(北京)有限公司 | Digital intelligent service system for enterprise service |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115951843A (en) * | 2023-03-13 | 2023-04-11 | 聊城市茌平区润德勘察测绘有限公司 | Information data migration and safety protection system and method for e-commerce platform |
| CN117319334A (en) * | 2023-05-23 | 2023-12-29 | 北京麦芽田网络科技有限公司 | Method for aggregating platform chatting |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN117034305A (en) * | 2023-06-29 | 2023-11-10 | 上海观安信息技术股份有限公司 | Sensitive information identification method, device, computer equipment and readable storage medium |
| CN117688446A (en) * | 2023-12-12 | 2024-03-12 | 国泰君安证券股份有限公司 | Method, device, processor and readable storage medium for realizing large-scale data asset classification and hierarchical processing based on transfer learning |
-
2024
- 2024-07-15 CN CN202410945665.3A patent/CN118505235B/en active Active
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN115951843A (en) * | 2023-03-13 | 2023-04-11 | 聊城市茌平区润德勘察测绘有限公司 | Information data migration and safety protection system and method for e-commerce platform |
| CN117319334A (en) * | 2023-05-23 | 2023-12-29 | 北京麦芽田网络科技有限公司 | Method for aggregating platform chatting |
Also Published As
| Publication number | Publication date |
|---|---|
| CN118505235A (en) | 2024-08-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN118505235B (en) | A management method and system for e-commerce users | |
| US8799981B2 (en) | Privacy protection system | |
| KR101294280B1 (en) | System and Method capable of Preventing Individual Information Leakage by Monitoring Encrypted HTTPS-based Communication Data via Network Packet Mirroring | |
| US7272716B2 (en) | Enterprise secure messaging architecture | |
| US7321969B2 (en) | Secure instant messaging system using instant messaging group policy certificates | |
| CA2577504C (en) | Secure method of termination of service notification | |
| US9438568B2 (en) | System and method for email and file decryption without direct access to required decryption key | |
| US9397835B1 (en) | Web of trust management in a distributed system | |
| US20030204722A1 (en) | Instant messaging apparatus and method with instant messaging secure policy certificates | |
| US11824971B2 (en) | Peer-to-peer transmission system with a controlled, double-tier cryptographic key structure | |
| US7590844B1 (en) | Decryption system and method for network analyzers and security programs | |
| US9692759B1 (en) | Control of cloud application access for enterprise customers | |
| US20030051172A1 (en) | Method and system for protecting digital objects distributed over a network | |
| US9356926B1 (en) | Security system | |
| EP1403839A1 (en) | Data originality validating method and system | |
| US20030237005A1 (en) | Method and system for protecting digital objects distributed over a network by electronic mail | |
| CN110519203B (en) | Data encryption transmission method and device | |
| CN109873819A (en) | Method and system for preventing illegal access to server | |
| CN106101092A (en) | A kind of information evaluation processing method and first instance | |
| CN112699391B (en) | Target data sending method and privacy computing platform | |
| CN110378135A (en) | Intimacy protection system and method based on big data analysis and trust computing | |
| CN100477647C (en) | E-mail management system and method | |
| CN104506530B (en) | A kind of network data processing method and device, data transmission method for uplink and device | |
| CN112699085B (en) | Audit log management method and device | |
| CN106453069B (en) | An instant messaging message sending, viewing, viewing control method and device thereof |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |