CN106878438A - The method and system of user behavior analysis under a kind of https environment - Google Patents

The method and system of user behavior analysis under a kind of https environment Download PDF

Info

Publication number
CN106878438A
CN106878438A CN201710122538.3A CN201710122538A CN106878438A CN 106878438 A CN106878438 A CN 106878438A CN 201710122538 A CN201710122538 A CN 201710122538A CN 106878438 A CN106878438 A CN 106878438A
Authority
CN
China
Prior art keywords
page
https
resource
characteristic
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710122538.3A
Other languages
Chinese (zh)
Inventor
白晟
张伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Far Long (beijing) Technical Service Co Ltd
Original Assignee
Far Long (beijing) Technical Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Far Long (beijing) Technical Service Co Ltd filed Critical Far Long (beijing) Technical Service Co Ltd
Priority to CN201710122538.3A priority Critical patent/CN106878438A/en
Publication of CN106878438A publication Critical patent/CN106878438A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • H04L67/025Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9574Browsing optimisation, e.g. caching or content distillation of access to content, e.g. by caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of method and system of user behavior analysis under https environment, method includes:Step 1) content characteristic storehouse is set up to the Internet resources page that needs are analyzed, feature database is made up of multiple condition codes, and condition code includes:The Host of https request URLs, page-size, the page include resource content, resource content size, dynamic resource information, embedded one of URLs and quantity or combination;Step 2) to user access Internet resources https message datas analyze one by one, characteristic information extraction, with condition code the matching analysis;Step 3) daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse, also original subscriber truly accesses behavior, and is further analyzed and counts.

Description

The method and system of user behavior analysis under a kind of https environment
Technical field
The invention belongs to internet arena, it is related to a kind of method of user behavior analysis under https environment.
Background technology
Http user access requests message data is all the time the user behavior analysis key data under internet environment Source, by http messages, can effectively track user behavior path, content and frequency, so as to analyze the row of Internet user It is custom, behavior prediction, so as to for enterprise, investor etc. provide strong decision-making foundation, be worked out according to different user and performed Detailed, effective strategy.
With continuing to develop for internet, the business of carrying is more and more, particularly the business such as terminal payment, finance and money management Development so that the security requirement more and more higher of data transfer, therefore many application/Web services progressively switch to http Https, it is ensured that communications security between client and server, such as day cat, Taobao, Baidu, Jingdone district, IOS APP.
TLS/SSL agreements are added on the basis of https-over-http, TSL/SSL carrys out the body of authentication server by certificate Part, and be the communication encryption between browser and server.And the method for accessing message analysis based on http originally cannot The total data that user really accesses URL is grabbed, also the internet behavior of user cannot just be analysed in depth.
Mainly there is two ways at present:
Scheme one:
The limited information coarse analysis user behaviors such as the host of record are only capable of in https by analyzing.This scheme, due to It is only capable of obtaining in plain text the host information of user access request in https data, it is impossible to recorded user and access under the host in detail Path so as to obtain complete URL, therefore also cannot just accomplish user access content in-depth analysis, it is impossible to for decision-making is provided Effective data supporting.
Scheme two:
Proxy agencies are set up between the server that client and user access, realizes that https is asked to kidnap.Pass through Https is asked to kidnap, it is possible to achieve with the identical analytical effects of http, but cannot realize dividing the whole network user behavior Analysis ability, is relatively adapted to enterprise network exit and sets up Proxy agencies, realizes the tracking of enterprises user behavior and analyzes, because There is the technology restriction of Proxy proxy servers deployment, scene limitation and cost limitation in this program.
The content of the invention
Regarding to the issue above, the present invention is by setting up Internet content page feature database, with reference to having that https can be obtained Limit information, based on big data analytical technology, user internet under https is realized in the accurate calculating to user's actual access content Behavioural analysis.
The technical scheme that present invention solution above-mentioned technical problem is taken is as follows:
A kind of method of user behavior analysis under https environment, including:
Step 1) content characteristic storehouse is set up to the Internet resources page that needs are analyzed, feature database is by multiple feature code characters Into condition code includes:The Host of https request URLs, page-size, the page include resource content, resource content size, dynamic Resource information, embedded one of URLs and quantity or combination;
Step 2) to user access Internet resources https message datas analyze one by one, characteristic information extraction, with spy Levy a yard the matching analysis;
Step 3) daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse, also original subscriber truly accesses Behavior, and be further analyzed and count.
Preferably, step 1) in, required each analyzed is crawled by crawler technology for the website of analysis is needed Webpage, Web page feature base is set up according to the data for crawling webpage.
Preferably, step 2) in, the characteristic information of extraction is selected from following:
Access the Host/Domain of URL;
The total length of the uncached part of https requests for page;
Uncached picture or CSS load the quantity of resource in https requests for page;
The size of each resource object of page loading;
The time that https requests occur.
Preferably, step 2) in, one or more characteristic informations combine and to form one or more features and refer to based on more than Line, accesses https and asks to determine user access path by user in the range of certain hour.
Preferably, step 3) in the daily record of characteristic information extraction is matched into specific choosing with the condition code in content characteristic storehouse From following method:
By fingerprint combination unique match;
If cannot by fingerprint combination unique match when, can by access during the webpage resource of loading simultaneously or URL sequences many condition is matched;
The 3-5 contents of object that can must be loaded every time is obtained from the page, while obtaining the size of these contents of object With host information, the host information and object size for accessing object sequence according to each loading page carries out as finger print information Match somebody with somebody.
The system of user behavior analysis under a kind of https environment, including:
Feature database sets up unit, for setting up content characteristic storehouse to the Internet resources page for needing analysis, feature database by Multiple condition code compositions, condition code includes:Host, page-size, the page of https request URLs are comprising in resource content, resource Hold size, dynamic resource information, embedded one of URLs and quantity or combination;
Condition code matching unit, the https message datas for accessing user Internet resources are analyzed one by one, extract special Reference cease, with condition code the matching analysis;
Behavior reduction unit, for the daily record of characteristic information extraction to be matched with the condition code in content characteristic storehouse, reduction User truly accesses behavior, and is further analyzed and counts.
Preferably, the feature database sets up unit, required for being crawled by crawler technology for the website for needing to analyze Each webpage of analysis, Web page feature base is set up according to the data for crawling webpage.
Preferably, described document information matching unit, the characteristic information of extraction is selected from following:
Access the Host/Domain of URL;
The total length of the uncached part of https requests for page;
Uncached picture or CSS load the quantity of resource in https requests for page;
The size of each resource object of page loading;
The time that https requests occur.
Preferably, described document information matching unit, is further used for one or more characteristic informations combination shape based on more than Into one or more characteristic fingerprints, https is accessed by user in the range of certain hour and asks to determine user access path.
Preferably, the behavior reduction unit, by the condition code in the daily record of characteristic information extraction and content characteristic storehouse Matching is chosen in particular from following method:
By fingerprint combination unique match;
If cannot by fingerprint combination unique match when, can by access during the webpage resource of loading simultaneously or URL sequences many condition is matched;
The 3-5 contents of object that can must be loaded every time is obtained from the page, while obtaining the size of these contents of object With host information, the host information and object size for accessing object sequence according to each loading page carries out as finger print information Match somebody with somebody.
The program is main by following characteristics:
1st, need not increase additional investment, including change network structure or increase computing resource, based on existing data and set It is standby to complete;
2nd, the data analysis and original http daily records after reduction user behavior are essentially identical, protect the throwing of original analysis system Enter;
3rd, user behavior reduction granularity can be determined according to practical business demand, to reduce the exploitation and maintenance of feature database Cost.
Other features and advantages of the present invention will be illustrated in the following description, also, the partly change from specification Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages can be by the explanations write Specifically noted structure is realized and obtained in book, claims and accompanying drawing.
Brief description of the drawings
The present invention is described in detail below in conjunction with the accompanying drawings, to cause above-mentioned advantage of the invention definitely.Its In,
Fig. 1 is the schematic flow sheet of the method for user behavior analysis under https environment of the present invention;
Fig. 2 is the structural representation of the system of user behavior analysis under https environment of the present invention.
Specific embodiment
Describe embodiments of the present invention in detail below with reference to drawings and Examples, how the present invention is applied whereby Technological means solves technical problem, and reaches the implementation process of technique effect and can fully understand and implement according to this.Need explanation As long as not constituting conflict, each embodiment in the present invention and each feature in each embodiment can be combined with each other, The technical scheme for being formed is within protection scope of the present invention.
In addition, can be in the such as one group department of computer science of computer executable instructions the step of the flow of accompanying drawing is illustrated Performed in system, and, although logical order is shown in flow charts, but in some cases, can be with different from herein Order perform shown or described step.
Embodiment one:
As shown in figure 1, under a kind of https environment user behavior analysis method, including:
Step 1) content characteristic storehouse is set up to the Internet resources page that needs are analyzed, feature database is by multiple feature code characters Into condition code includes:The Host of https request URLs, page-size, the page include resource content, resource content size, dynamic Resource information, embedded one of URLs and quantity or combination;
Step 2) to user access Internet resources https message datas analyze one by one, characteristic information extraction, with spy Levy a yard the matching analysis;
Step 3) daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse, also original subscriber truly accesses Behavior, and be further analyzed and count.
Limited information by setting up Internet content page feature database, can obtain with reference to https of the invention, based on big User internet behavioural analysis under https is realized in data analysis technique, the accurate calculating to user's actual access content.
Embodiment two:
The present invention is carried out in conjunction with the embodiments continuing on, these, it is preferred to, step 2) in, the characteristic information of extraction Selected from following:
Access the Host/Domain of URL;
The total length of the uncached part of https requests for page;
Uncached picture or CSS load the quantity of resource in https requests for page;
The size of each resource object of page loading;
The time that https requests occur.
Preferably, step 2) in, one or more characteristic informations combine and to form one or more features and refer to based on more than Line, accesses https and asks to determine user access path by user in the range of certain hour.
Preferably, step 3) in the daily record of characteristic information extraction is matched into specific choosing with the condition code in content characteristic storehouse From following method:
By fingerprint combination unique match;
If cannot by fingerprint combination unique match when, can by access during the webpage resource of loading simultaneously or URL sequences many condition is matched;
The 3-5 contents of object that can must be loaded every time is obtained from the page, while obtaining the size of these contents of object With host information, the host information and object size for accessing object sequence according to each loading page carries out as finger print information Match somebody with somebody.
Embodiment three:
In one embodiment, the invention mainly comprises following key step:
1. pair Internet resources page for needing analysis sets up content characteristic storehouse
Each webpage of analysis required for being crawled by crawler technology for the website for needing analysis, according to crawling webpage Data set up Web page feature base, and feature database is made up of multiple condition codes (fingerprint), and condition code includes but is not limited to https requests The Host of URL, page-size, the page include resource content, resource content size, dynamic resource information, embedded URLs and quantity Deng.
2. couple user accesses the https message datas of Internet resources and analyzes one by one, characteristic information extraction, with feature Code/fingerprint matching is analyzed
When https passes through TLS/SSL encrypted communication channels, following letter still can be obtained after capturing message analysis Breath:
(1) Host/Domain of URL is accessed
(2) total length of the uncached part of https requests for page
(3) quantity of loading resource uncached in https requests for page, such as picture, CSS
(4) size of each resource object of page loading
(5) time that https requests occur
One or more combinations form one or more characteristic fingerprints based on more than, are visited by user in the range of certain hour Ask that request determines user access path to https.
3. the daily record of characteristic information extraction is matched by certain algorithm with content characteristic storehouse, also original subscriber truly accesses row For, and be further analyzed and count.Feature Correspondence Algorithm mainly includes following methods:
(1) by fingerprint combination unique match;
(2) if cannot by fingerprint combination unique match when, can be by accessing during the webpage resource of loading simultaneously Or the matching of URL sequences many condition, such as, a page not only loads the content of the page when loading, be also loaded with some special Fixed picture, or a special new https/http request is initiated, can now be visited by fingerprint combination+definition URL Ask sequence the accessed page of positioning jointly.
(3) the 3-5 contents of object (picture, media file, css, js etc.) that can must be loaded every time is obtained from the page, Obtain the size and host information of these contents of object simultaneously, according to each loading page access object sequence host information and Object size is used as finger print information.
The program is main by following characteristics:
1st, need not increase additional investment, including change network structure or increase computing resource, based on existing data and set It is standby to complete;
2nd, the data analysis and original http daily records after reduction user behavior are essentially identical, protect the throwing of original analysis system Enter;
3rd, user behavior reduction granularity can be determined according to practical business demand, to reduce the exploitation and maintenance of feature database Cost.
Wherein, it is all to realize that the user behavior analysis method based on https daily records belongs to using same or similar algorithm In the application protection domain of this patent:
1. by parse https ask in obtain host, page-size, the page include object size, dynamic resource load The method that the information such as quantity uniquely position the https pages as fingerprint;
2. when many https pages are identical, other elements are increased, it is big that such as JS, picture, URL access visit sequence, content object The method of the small unique positioning webpage of grade;
3. by the method for web crawlers technique construction Web page feature database.
Example IV:
It is corresponding with above method embodiment, present invention also offers user behavior analysis under a kind of https environment System, including:
Feature database sets up unit, for setting up content characteristic storehouse to the Internet resources page for needing analysis, feature database by Multiple condition code compositions, condition code includes:Host, page-size, the page of https request URLs are comprising in resource content, resource Hold size, dynamic resource information, embedded one of URLs and quantity or combination;
Condition code matching unit, the https message datas for accessing user Internet resources are analyzed one by one, extract special Reference cease, with condition code the matching analysis;
Behavior reduction unit, for the daily record of characteristic information extraction to be matched with the condition code in content characteristic storehouse, reduction User truly accesses behavior, and is further analyzed and counts.
Preferably, the feature database sets up unit, required for being crawled by crawler technology for the website for needing to analyze Each webpage of analysis, Web page feature base is set up according to the data for crawling webpage.
Preferably, described document information matching unit, the characteristic information of extraction is selected from following:
Access the Host/Domain of URL;
The total length of the uncached part of https requests for page;
Uncached picture or CSS load the quantity of resource in https requests for page;
The size of each resource object of page loading;
The time that https requests occur.
Preferably, described document information matching unit, is further used for one or more characteristic informations combination shape based on more than Into one or more characteristic fingerprints, https is accessed by user in the range of certain hour and asks to determine user access path.
Preferably, the behavior reduction unit, by the condition code in the daily record of characteristic information extraction and content characteristic storehouse Matching is chosen in particular from following method:
By fingerprint combination unique match;
If cannot by fingerprint combination unique match when, can by access during the webpage resource of loading simultaneously or URL sequences many condition is matched;
The 3-5 contents of object that can must be loaded every time is obtained from the page, while obtaining the size of these contents of object With host information, the host information and object size for accessing object sequence according to each loading page carries out as finger print information Match somebody with somebody.
The program is main by following characteristics:
1st, need not increase additional investment, including change network structure or increase computing resource, based on existing data and set It is standby to complete;
2nd, the data analysis and original http daily records after reduction user behavior are essentially identical, protect the throwing of original analysis system Enter;
3rd, user behavior reduction granularity can be determined according to practical business demand, to reduce the exploitation and maintenance of feature database Cost.
It should be noted that for above method embodiment, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the application is not limited by described sequence of movement because According to the application, some steps can sequentially or simultaneously be carried out using other.Secondly, those skilled in the art should also know Know, embodiment described in this description belongs to preferred embodiment, involved action and module not necessarily the application It is necessary.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program Product.Therefore, the application can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.
And, the application can be used and can use in one or more computers for wherein including computer usable program code The computer program product implemented on storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Form.
Finally it should be noted that:The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, Although being described in detail to the present invention with reference to the foregoing embodiments, for a person skilled in the art, it still may be used Modified with to the technical scheme described in foregoing embodiments, or equivalent is carried out to which part technical characteristic. All any modification, equivalent substitution and improvements within the spirit and principles in the present invention, made etc., should be included in of the invention Within protection domain.

Claims (10)

1. under a kind of https environment user behavior analysis method, it is characterised in that including:
Step 1) content characteristic storehouse is set up to the Internet resources page that needs are analyzed, feature database is made up of multiple condition codes, special Levying code includes:The Host of https request URLs, page-size, the page include resource content, resource content size, dynamic resource letter Breath, embedded one of URLs and quantity or combination;
Step 2) to user access Internet resources https message datas analyze one by one, characteristic information extraction, with condition code The matching analysis;
Step 3) daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse, also original subscriber truly accesses row For, and be further analyzed and count.
2. under https environment according to claim 1 user behavior analysis method, it is characterised in that step 1) in, pin Each webpage that website to needing analysis is analyzed required for being crawled by crawler technology, net is set up according to the data for crawling webpage Page feature database.
3. under https environment according to claim 1 and 2 user behavior analysis method, it is characterised in that step 2) In, the characteristic information of extraction is selected from following:
Access the Host/Domain of URL;
The total length of the uncached part of https requests for page;
Uncached picture or CSS load the quantity of resource in https requests for page;
The size of each resource object of page loading;
The time that https requests occur.
4. under https environment according to claim 3 user behavior analysis method, it is characterised in that step 2) in, base One or more characteristic informations combine to form one or more characteristic fingerprints more than, are accessed by user in the range of certain hour Https requests determine user access path.
5. under https environment according to claim 1 user behavior analysis method, it is characterised in that step 3) in will The daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse and is chosen in particular from following method:
By fingerprint combination unique match;
If cannot by fingerprint combination unique match when, can be by accessing during the webpage resource or URL sequences of loading simultaneously Row many condition is matched;
The contents of object that 3-5 can must be loaded every time is obtained from the page, at the same obtain these contents of object size and Host information, the host information and object size for accessing object sequence according to each loading page is carried out as finger print information Match somebody with somebody.
6. under a kind of https environment user behavior analysis system, it is characterised in that including:
Feature database sets up unit, and for setting up content characteristic storehouse to the Internet resources page for needing analysis, feature database is by multiple Condition code is constituted, and condition code includes:The Host of https request URLs, page-size, the page are big comprising resource content, resource content Small, dynamic resource information, embedded one of URLs and quantity or combination;
Condition code matching unit, the https message datas for accessing user Internet resources are analyzed one by one, extract feature letter Breath, with condition code the matching analysis;
Behavior reduction unit, for the daily record of characteristic information extraction to be matched with the condition code in content characteristic storehouse, goes back original subscriber It is true to access behavior, and be further analyzed and count.
7. under https environment according to claim 6 user behavior analysis system, it is characterised in that the feature database Unit is set up, each webpage of analysis required for being crawled by crawler technology for the website for needing analysis, according to crawling webpage Data set up Web page feature base.
8. under the https environment according to claim 6 or 7 user behavior analysis system, it is characterised in that the feature Code matching unit, the characteristic information of extraction is selected from following:
Access the Host/Domain of URL;
The total length of the uncached part of https requests for page;
Uncached picture or CSS load the quantity of resource in https requests for page;
The size of each resource object of page loading;
The time that https requests occur.
9. under https environment according to claim 8 user behavior analysis system, it is characterised in that described document information Matching unit, is further used for one or more characteristic informations based on more than and combines to form one or more characteristic fingerprints, by one User accesses https request determination user access paths in the range of fixing time.
10. under https environment according to claim 6 user behavior analysis system, it is characterised in that the behavior is also Former unit, the daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse and is chosen in particular from following method:
By fingerprint combination unique match;
If cannot by fingerprint combination unique match when, can be by accessing during the webpage resource or URL sequences of loading simultaneously Row many condition is matched;
The contents of object that 3-5 can must be loaded every time is obtained from the page, at the same obtain these contents of object size and Host information, the host information and object size for accessing object sequence according to each loading page is carried out as finger print information Match somebody with somebody.
CN201710122538.3A 2017-03-03 2017-03-03 The method and system of user behavior analysis under a kind of https environment Pending CN106878438A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710122538.3A CN106878438A (en) 2017-03-03 2017-03-03 The method and system of user behavior analysis under a kind of https environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710122538.3A CN106878438A (en) 2017-03-03 2017-03-03 The method and system of user behavior analysis under a kind of https environment

Publications (1)

Publication Number Publication Date
CN106878438A true CN106878438A (en) 2017-06-20

Family

ID=59169594

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710122538.3A Pending CN106878438A (en) 2017-03-03 2017-03-03 The method and system of user behavior analysis under a kind of https environment

Country Status (1)

Country Link
CN (1) CN106878438A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107577783A (en) * 2017-09-15 2018-01-12 电子科技大学 The type of webpage automatic identifying method excavated based on Web architectural features
CN108023779A (en) * 2017-12-20 2018-05-11 杭州云屏科技有限公司 A kind of method and system based on network traffic analysis user behavior

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101808093A (en) * 2010-03-15 2010-08-18 北京安天电子设备有限公司 System and method for automatically detecting WEB security
CN102143224A (en) * 2011-01-25 2011-08-03 张金海 Mobile phone Internet accessing-based user behavior analysis method and device
CN103077356A (en) * 2013-01-11 2013-05-01 中国地质大学(武汉) Protecting and tracking method for primary information of mobile terminal based on user behavior pattern
CN103561004A (en) * 2013-10-22 2014-02-05 西安交通大学 Cooperative type active defense system based on honey nets
CN106161091A (en) * 2016-07-13 2016-11-23 久远谦长(北京)技术服务有限公司 A kind of method and system adding up Internet user's behavior
US20160381166A1 (en) * 2011-12-23 2016-12-29 Akamai Technologies, Inc. Assessment of content delivery services using performance measurements from within an end user client application

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101808093A (en) * 2010-03-15 2010-08-18 北京安天电子设备有限公司 System and method for automatically detecting WEB security
CN102143224A (en) * 2011-01-25 2011-08-03 张金海 Mobile phone Internet accessing-based user behavior analysis method and device
US20160381166A1 (en) * 2011-12-23 2016-12-29 Akamai Technologies, Inc. Assessment of content delivery services using performance measurements from within an end user client application
CN103077356A (en) * 2013-01-11 2013-05-01 中国地质大学(武汉) Protecting and tracking method for primary information of mobile terminal based on user behavior pattern
CN103561004A (en) * 2013-10-22 2014-02-05 西安交通大学 Cooperative type active defense system based on honey nets
CN106161091A (en) * 2016-07-13 2016-11-23 久远谦长(北京)技术服务有限公司 A kind of method and system adding up Internet user's behavior

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107577783A (en) * 2017-09-15 2018-01-12 电子科技大学 The type of webpage automatic identifying method excavated based on Web architectural features
CN108023779A (en) * 2017-12-20 2018-05-11 杭州云屏科技有限公司 A kind of method and system based on network traffic analysis user behavior

Similar Documents

Publication Publication Date Title
MacFeely The big (data) bang: Opportunities and challenges for compiling SDG indicators
Ocheja et al. Managing lifelong learning records through blockchain
US11475437B2 (en) Method and apparatus for managing subject data based on block chain
US10454918B1 (en) Method for SSO service using PKI based on blockchain networks, and device and server using the same
CN104766014B (en) For detecting the method and system of malice network address
Malandrino et al. Privacy awareness about information leakage: Who knows what about me?
JP5368515B2 (en) Advertising method and advertising system
Preibusch et al. Shopping for privacy: Purchase details leaked to PayPal
US20180020005A1 (en) Providing selective access to resources
CA3073714C (en) Method and system for identifying potential fraud activity in a tax return preparation system to trigger an identity verification challenge through the tax return preparation system
CN101482882A (en) Method and system for cross-domain treatment of COOKIE
US11087334B1 (en) Method and system for identifying potential fraud activity in a tax return preparation system, at least partially based on data entry characteristics of tax return content
CN109450879A (en) User access activity monitoring method, electronic device and computer readable storage medium
CN102868712B (en) Method and system for data transmission
CN111815420B (en) Matching method, device and equipment based on trusted asset data
CN102567821A (en) Book management system based on network
WO2020047116A1 (en) Techniques for data access control utilizing blockchains
US20140279578A1 (en) Rights management for content aggregators
CN106878438A (en) The method and system of user behavior analysis under a kind of https environment
CN113285936B (en) Cross-domain data acquisition method and related device
CN109726187A (en) A kind of adaptive authority control method and device towards Hadoop
US11928243B2 (en) System and method of detecting hacking activities during the interaction of users with banking services
Al-Fayad The European Union’s GDPR and Its Effect on Data-Driven Marketing Strategies
CN112633715A (en) Method for analyzing loss of online service user
JP2009064220A (en) Method and system for permitting access to web site for disclosing related information of printed matter, only to owner of printed matter

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170620

RJ01 Rejection of invention patent application after publication