CN103258021B - The character terminal characteristic extracting method that a kind of Behavior-based control is analyzed - Google Patents

The character terminal characteristic extracting method that a kind of Behavior-based control is analyzed Download PDF

Info

Publication number
CN103258021B
CN103258021B CN201310160791.XA CN201310160791A CN103258021B CN 103258021 B CN103258021 B CN 103258021B CN 201310160791 A CN201310160791 A CN 201310160791A CN 103258021 B CN103258021 B CN 103258021B
Authority
CN
China
Prior art keywords
data
user
client
terminal
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310160791.XA
Other languages
Chinese (zh)
Other versions
CN103258021A (en
Inventor
刘韬
吴永越
范渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DBAPPSecurity Co Ltd filed Critical DBAPPSecurity Co Ltd
Priority to CN201310160791.XA priority Critical patent/CN103258021B/en
Publication of CN103258021A publication Critical patent/CN103258021A/en
Application granted granted Critical
Publication of CN103258021B publication Critical patent/CN103258021B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to information security, data mining and Data Audit, aim to provide the character terminal characteristic extracting method that a kind of Behavior-based control is analyzed.The method obtains by network monitoring the data produced in the client of user and main frame reciprocal process, by terminal simulation to data analysis, reciprocal process between reduction client and main frame, then extract required content further according to the rule of conduct of direct interaction man-machine in client use procedure.The present invention solves the problem that when using automation tools analysis network character terminal device data stream, accuracy, high efficiency and applicability can not be taken into account well, and provide one flexibly, the flogic system of sustainable improvement, thus there is wide application space.<!--1-->

Description

The character terminal characteristic extracting method that a kind of Behavior-based control is analyzed
Technical field
The present invention relates to information security, data mining and Data Audit.Be specifically related to the character terminal characteristic extracting method that a kind of Behavior-based control is analyzed
Background technology
Along with network technology is popularized gradually, the life of people is day by day tight to the dependence of network with work, and the safety problem thereupon produced also more and more receives publicity.The network terminal is one of the most frequently used network interaction instrument.They are mainly divided into " character terminal " (as by network entry to a Linux server) and the large class of " graphic terminal " (such as using Remote desk process to a Windows PC) two.
Although both decide displaying contents on terminal display by the control information of Network Capture host server but their principle of work is completely different---the control information least unit that the former needs is " char ", and the control information least unit of the latter is " pixel ".Such as will show a character " A " on terminal display, character terminal only needs to transmit " A " graphic terminal in a network then to be needed to transmit a lot of Pixel Information (the little luminous point that can be understood as with a lot of human eye is difficult to differentiate forms letter " A ").
So character terminal simple and stable but the content that can show is relatively limited and graphic terminal can show abundant in content colorful but to the network bandwidth and Computing Capability Requirement higher.So even to this day, character terminal is mainly applied to finance, aviation, data maintenance etc. to stable and that reliability requirement is very high field; Graphic terminal is then used in the directions such as multimedia, amusement, PC more.
Character terminal can produce countless data every day on network.The key message paid close attention to containing mass data analyst in these data, but more be then no-good redundant data.Automation tools how is used to become a problem demanding prompt solution to distinguish these effective informations.
Due to character terminal be man-machine between the interface of direct interaction, the behavior being many times subject to people directly affects, and automation tools be used to carry out analysis to it and be faced with many difficult points.The defect that more or less always there is following (and being not limited to) of existing product:
(1) terminal work mode judgment mode is stiff; (2) full scan efficiency is low; (3) key-strings is relied on; (4) limitation of applied environment; (5) limitation function, impact uses.
Accurately, the efficient and main points being the related tool existed at present and being difficult to possess simultaneously applied widely.These main points are interrelated to be restricted again mutually, and such as accuracy improves must cause applicability decline, efficiency improves and can reduce accuracy.And an outstanding product will inevitably be tried one's best and possessed above-mentioned every advantage simultaneously.
Summary of the invention
The technical problem to be solved in the present invention is, by the creative use to existing network character terminal technology, provides a kind of character terminal characteristic extracting method accurate, efficient, applied widely.
For solving these technical matterss, solution of the present invention is:
The invention provides the character terminal characteristic extracting method that a kind of Behavior-based control is analyzed, obtain by network monitoring the data produced in the client of user and main frame reciprocal process, by terminal simulation to data analysis, reciprocal process between reduction client and main frame, then extract required content further according to the rule of conduct of direct interaction man-machine in client use procedure; The method realizes based on character terminal characteristic extraction system;
Described character terminal characteristic extraction system comprises data monitoring module, terminal simulation module, behavioural analysis module and data recordin module; Wherein, data monitoring module is connected with behavioural analysis module with terminal simulation module respectively, and terminal simulation module is connected with behavioural analysis module, and behavioural analysis module is connected with data recordin module, realizes electrical signal transfer between each connected module; Described data monitoring module is deployed between client and main frame, for all communication datas between supervisory user and main frame, and submits to terminal simulation module and processes after these data of acquisition; Described terminal simulation module for the instruction simulation that main frame sent to the description of client and how to draw on client terminal display and change into user can the Word message of direct reading; Described behavioural analysis module is used for the data analysis collected and screening, to promote the efficiency that character terminal characteristic is extracted; Described data recordin module, for recording the data by analysis, produces corresponding log information simultaneously;
Describedly obtained the data produced in the client of user and main frame reciprocal process by network monitoring, refer to that all data of data monitoring module to client and main frame reciprocal process carry out record, comprise the data of recording user request and response of host;
Described by terminal simulation to data analysis, reciprocal process between reduction client and main frame, referring to the instruction simulation that main frame sends to the description of client how to draw on the terminal display of client by terminal simulation module and change into user can the Word message of direct reading;
By the analysis to response of host data, terminal work mode is divided into command mode and edit pattern; The described rule of conduct according to direct interaction man-machine in client use procedure extracts required content further, refers to the data of behavioural analysis module needed for the extraction of one of following rule:
(1) by judging whether there is the mode of operation that cursor positioning sequence distinguishes client in the interaction data between client and main frame, if there is cursor positioning sequence, client operation is under edit pattern; If there is no cursor positioning sequence then client operation in command mode;
(2) last column content only extracting response of host data is analyzed, and constructs last column content that user is operating, i.e. the order line content of user's execution;
(3) input of character string of user command is recorded, and the data content comparison of replying with host side; Be exactly the place that this order starts to perform when identical character string occurs time, time namely this last bar order performs and terminates;
(4) by extracting and analyze the end row of response of host data, when user keys in execution symbol (enter key), the input data of user are re-constructed out as the content needing to extract;
(5) if require only to need to extract the order line performed by user, then the correlated inputs that user does under editing mode exports and is just left in the basket, to reduce redundant work amount;
(6) when user's request is the multiple line content of sticky note, multiple line content is split as single file content one by one, and processes with single file logic respectively;
(7) specify a separator (enter key is also order execute key simultaneously), with this separator for boundary, splitting multiple line content, is single file logic by multirow logic simplifying.
In the present invention, the data of response of host comprise two kinds: need the printable content (as character and symbol) that outputs on terminal display and control the terminal serial that character and character attibute terminal attribute content are described in where over the display.
Compared with prior art, beneficial effect of the present invention is:
The present invention solves the problem that when using automation tools analysis network character terminal device data stream, accuracy, high efficiency and applicability can not be taken into account well, and provide one flexibly, the flogic system of sustainable improvement, thus there is wide application space.
Accompanying drawing explanation
Fig. 1 is the character terminal characteristic extracting method fundamental diagram that Behavior-based control is analyzed.
Fig. 2 is the character terminal characteristic extracting method workflow diagram that Behavior-based control is analyzed.
Embodiment
First it should be noted that, the present invention relates to the aspects of contents such as computer networking technology, information security technology and data mining technology, is a kind of integrated application of computer technology in above-mentioned field.In implementation procedure of the present invention, the application of multiple software function module can be related to.Applicant thinks, as reading over application documents, accurate understanding is of the present invention realize principle and goal of the invention after, when in conjunction with existing known technology, those skilled in the art can use its software programming technical ability grasped to realize the present invention completely.Aforementioned software functional module comprises but is not limited to:
Data monitoring module: this module is deployed between user and main frame, all communication datas between user and main frame all can under the monitoring of this module, and a series of modules submitted to below process by these data.
Terminal simulation module: as mentioned before, the instruction simulation that host side sends to client to describe how to draw on client terminal display by this module in charge also changes into the Word message that ordinary people can read.
Behavioural analysis module: this module be a series of according to character terminal in use man-machine direct interaction time behavior and the rule set that sums up of experience.By these rules to the data analysis collected and screening, promote working effect.
Data recordin module: this module in charge record needs the data recorded after described series module analysis above, produces corresponding log information simultaneously.
This category of all genus that all the present patent application files are mentioned, applicant will not enumerate.
The principle that realizes of the present invention is:
First obtained the data produced in user and main frame reciprocal process by network monitoring, comprise user's request and the two-part content of response of host.Then by terminal simulation, response of host is analyzed, restore the content that user can see on terminal display.This content again with the user's request msg obtained before, integrate and analyze further (behavioural analysis) according to the behavior of direct interaction man-machine in character terminal use procedure and experience, thus obtain the critical data be concerned about.Finally extract and record data.
Describedly obtained the data produced in the client of user and main frame reciprocal process by network monitoring, refer to that all data of data monitoring module to client and main frame reciprocal process carry out record, comprise the data of recording user request and response of host;
By analytic record data, reciprocal process is reduced, comprises the following steps:
(1) utilize terminal simulation to analyze response of host, restore the content that user sees on terminal display.
(2) data of user's request are obtained.
(3) in conjunction with the behavior of direct interaction man-machine in character terminal use procedure and experience, the data of acquisition are comprehensively analyzed, extract paid close attention to data (hereinafter referred to as " behavioural analysis ").
The use-pattern to terminal serial that " terminal simulation " mentioned above method is traditional, with the addition of new application idea.Traditionally, if the effect of terminal serial is control terminal display show what content---terminal display is regarded as a piece of paper, and the effect of terminal serial is exactly tell how Computer application draws on this paper.And the information that user wants to pass on by understanding main frame to the reading of these images.Terminal simulation is then that these to be described the information reverting of how to draw be that domestic consumer can the Word message of direct reading, is below the contrast of conventional terminal analysis and the terminal simulation course of work:
Conventional terminal is analyzed: the image → user on terminal serial → terminal display reads the Word message required for oneself from image.
Terminal simulation: terminal serial → Word message → user's direct reading.
" behavioural analysis " mentioned above be a series of according to character terminal equipment in use man-machine direct interaction time behavior and the rule set that sums up of experience.Apply these rules to the data analysis collected, can greatly promote working effect of the present invention.This serial of methods is comparatively loaded down with trivial details can not simplified summary, and following instance illustrates how this function solves the ubiquitous problem of previously mentioned like product:
(1) terminal work mode judgment mode is stiff:
The mode of operation of terminal is divided into two classes, i.e. command mode and edit pattern, and we need the mode of operation of distinguishing terminal to stop the generation of a large amount of gibberish.Such as: if the order line (mode of operation of order line is command mode) will extracting user's input so just needs to ignore the operation (such as user writes document in vi editing machine) under edit pattern, otherwise redundant data useless in a large number can be produced.
More common differentiation mode relies on the terminal serial of certain several key (DECSET:DECPrivateModeSet enters edit pattern; DECRST:DECPrivateModeReset exits edit pattern etc.), then think when these sequences occur to have entered or exited edit pattern.This method seems feasible but in fact as previously mentioned, terminal and user are direct interactions, how user uses terminal to be prescribed, in this example, if user adopts improper means to exit edit pattern and (such as directly stops this process after entering edit pattern, in linux, use kill order etc.) then these critical sequences would not occur, but edit pattern has been exited and entered command mode, user's use procedures all has afterwards been carried out under being all considered to be in edit pattern and can not have been carried out record.So just lost the data that originally should record.
And determination methods of the present invention is like this: cursor positioning sequence (CUP:CursorPosition) is the one of terminal serial, its effect is the position describing current cursor traditionally, and the present invention imparts new using method to cursor positioning sequence---rule of thumb analyze, as long as no matter when terminal is in edit pattern, then be bound to by using cursor positioning sequence to carry out cursor location, such terminal display just knows where will show information at screen, and can not use cursor positioning sequence under command mode.Judge whether there is cursor positioning sequence in the interaction data between user and main frame---so just can two kinds of mode of operations of clearly distinguishing terminal whenever and wherever possible, this differentiation mode granularity is fine to every a line of screen display, because the words entered a new line under edit pattern must need to use up and demarcate bit sequence and put to the row first place moving the cursor to next line, even so improper termination process or switch between edit pattern and command mode continually and also can not affect working effect of the present invention.
(2) full scan efficiency is low:
Like product is got used to analyzing obtained all terminal serial at work stiffly, in fact as mentioned before, terminal serial is at description how rendering image on terminal display in fact, wherein a large amount of information does not in fact resolve value, just some crucial literal information wherein in fact that user is concerned about.Such analysis mode wastes a large amount of hardware resources.
Screen divider is some regions by disposal route of the present invention: by behavioural analysis, only analyzes interested region.For a modal example: capture the line command that user inputs in command mode.According to behavioural analysis, user input order necessarily current screen display all the elements in last column, so for obtained all terminal serial, the present invention only resolves (namely only analyzing last terminal line feed sequence---content after " 0x0d0a ") last column.In such Water demand great amount of terminals sequence, very small percentage content just can grab the content needing to capture, and dramatically saves on hardware resource.
(3) key-strings is relied on:
Application scenarios: user replicates multirow order, then pastes terminal and performs these orders.Difficult point maximum in this application scenarios distinguishes the exercise boundary of each order, such as first command performs aft engine end can reply a large amount of information to screen, after these return informations export, and then will input second command and perform, how can just know that first command finishes, second command starts in this case?
Traditional method relies on command-line prompt symbol, command-line prompt symbol character string (character string that similar " [usercentos139 ~] $ " is such) namely printed during each host side prompting user's input command.Same precedent, first command performs after prompt, and when prompt occurs again, illustrate and be about to perform second command, that is first command is finished.
The method seems feasible but in fact there is very big hidden danger, because the command-line prompt symbol of nearly all character terminal can both be modified by User Defined, once user in use have modified the character string of command-line prompt symbol---even direct prompt is defined as sky, so this working method just thoroughly fails.
Solution of the present invention: according to behavioural analysis, for each character of user's input, main frame all sequentially can give echo, such as user have input respectively in order character " abcde " then host side to be bound to the character string that echo " abcde " is so in order.Get back in application scenarios above-mentioned, the present invention records the input of character string of second command, and with the content comparison that host side is replied, when identical character string occurs time be exactly second command start perform place, namely first command perform terminate time.
This mode user inputs any content with regard to what content of comparison, and do not associate with Time window with applied environment, the scope of application is greatly improved.
(4) limitation of applied environment.
Some like product specifies that user can only use the terminal of its customized, just can complete or complete above-mentioned functions preferably.
And the present invention does not have such restriction, the terminal program of any one main flow is all within the scope of application.Because terminal control sequence is terminal works standard general at present, be that customized terminal or those traditional classical end products are all based upon on this standard of terminal control sequence.The present invention supports the terminal serial of standard completely, the scope of application and extensively.
(5) limitation function, impact uses.
Some like product is the use habit of limited subscriber because processing the application scenarios of some complexity, and the function that some are conventional is forbidden.Such as user can not use the complete order of tab key automatic makeup, upper and lower key can not be used to input history command fast, can not use classical " reverse-i-search " function etc.Although can guarantee like this to implement record to the use procedure of user, so limitation function greatly can affect the experience of user.
And the present invention does not do any similar restriction, user in use can not feel completely.
5 enumerated above examples are a part for behavioural analysis module, also have much loaded down with trivial details analysis mode just not list one by one here.
" behavioural analysis " function mentioned above is a module being similar to rule base, and the experience that this module produces in can using according to reality on existing basis adds more analysis logic, improves accuracy, high efficiency and the applicability extracted further.
Below once the exemplary embodiments that simple character terminal order line is extracted:
Suppose that user is signed in on certain typical linux system by network character terminal.
Suppose that user has carried out some operations on the terminal.
Suppose that we need to extract user and have keyed in those orders.
Concrete steps:
(1) user signs in host computer system, and main frame can reply to user's bulk information, as system logo, current time, user basic information etc., and character as shown below:
Lastlogin:SatMar1612:05:022013from192.168.50.139<0d><0d><0a>
[usercentos139~]$
(2) learn that be concerned about command-line prompt character string is positioned at last column through behavioural analysis, so the content before last <0d><0aGreatT.Gr eaT.GT can be left in the basket, more finally obtain character string through terminal simulation:
[usercentos139~]$
(3) user begins typing order, and such as user keys in order " ls ", and namely first backward main frame have sent two characters " l ", " s ".
(4) main frame can carry out echo to the order that user keys in, and now we record host response further, after general terminal simulation, just obtains following character string in the data recorded before the content of reply being added to:
[usercentos139 ~] $ ls---(non-concealed file is listed in the effect of ordering " ls " in linux)
(5) user finds the order that have input mistake, needs to modify to order line, and suppose that user has keyed in backspace key (backspace) here, host side can reply following character:
<08><1b>[K
(6) through terminal simulation analysis, string representation current cursor above moves forward a col width, and eliminates all the elements of cursor position and (but being only limited to one's own profession) afterwards thereof.So obtain character string:
[usercentos139 ~] $ l---(character " s " has been eliminated)
(7) user's typing character ". ", host side can reply same character ". ".
(8) through terminal simulation analysis, new character string is obtained:
[usercentos139 ~] $ l.---(hidden file is listed in the effect of ordering " l. " in linux)
(9) user keys in enter key, namely starts fill order, and data monitoring module captures this action, represents that an order is about to be performed, and produce a record as above-mentioned command-line string, this order line captures successfully thereupon.
Above-mentioned example is a very simple applicating example, applied environment in reality wants complicated a lot of by comparison, the content of such as user input in the editing machine (the vi editing machine as Linux) does not need to extract, user have input very long order and carries out various editing operation (as inserted or delete character) to order line, or employing many situations such as history command search function, the complete function of order automatic makeup.

Claims (1)

1. the character terminal characteristic extracting method of a Behavior-based control analysis, it is characterized in that, obtain by network monitoring the data produced in the client of user and main frame reciprocal process, by terminal simulation to data analysis, reciprocal process between reduction client and main frame, then extract required content further according to the rule of conduct of direct interaction man-machine in client use procedure; The method realizes based on character terminal characteristic extraction system;
Described character terminal characteristic extraction system comprises data monitoring module, terminal simulation module, behavioural analysis module and data recordin module; Wherein, data monitoring module is connected with behavioural analysis module with terminal simulation module respectively, and terminal simulation module is connected with behavioural analysis module, and behavioural analysis module is connected with data recordin module, realizes electrical signal transfer between each connected module; Described data monitoring module is deployed between client and main frame, for all communication datas between supervisory user and main frame, and submits to terminal simulation module and processes after these data of acquisition; Described terminal simulation module for the instruction simulation that main frame sent to the description of client and how to draw on client terminal display and change into user can the Word message of direct reading; Described behavioural analysis module is used for the data analysis collected and screening, to promote the efficiency that character terminal characteristic is extracted; Described data recordin module, for recording the data by analysis, produces corresponding log information simultaneously;
Describedly obtained the data produced in the client of user and main frame reciprocal process by network monitoring, refer to that all data of data monitoring module to client and main frame reciprocal process carry out record, comprise the data of recording user request and response of host;
Described by terminal simulation to data analysis, reciprocal process between reduction client and main frame, referring to the instruction simulation that main frame sends to the description of client how to draw on the terminal display of client by terminal simulation module and change into user can the Word message of direct reading; By the analysis to response of host data, terminal work mode is divided into command mode and edit pattern;
The described rule of conduct according to direct interaction man-machine in client use procedure extracts required content further, refers to the data of behavioural analysis module needed for the extraction of one of following rule:
(1) by judging whether there is the mode of operation that cursor positioning sequence distinguishes client in the interaction data between client and main frame, if there is cursor positioning sequence, client operation is under edit pattern; If there is no cursor positioning sequence then client operation in command mode;
(2) last column content only extracting response of host data is analyzed, and constructs last column content that user is operating, i.e. the order line content of user's execution;
(3) input of character string of user command is recorded, and the data content comparison of replying with host side; Be exactly this order when starting to perform when identical character string occurs time, time namely this last bar order performs and terminates;
(4) by extracting and analyze the end row of response of host data, when user keys in execution symbol, the input data of user are re-constructed out as the content needing to extract;
(5) if require only to need to extract the order line performed by user, then the correlated inputs that user does under editing mode exports and is just left in the basket, to reduce redundant work amount;
(6) when user's request is the multiple line content of sticky note, multiple line content is split as single file content one by one, and processes with single file logic respectively;
(7) specify a separator, with this separator for boundary, splitting multiple line content, is single file logic by multirow logic simplifying.
CN201310160791.XA 2013-05-03 2013-05-03 The character terminal characteristic extracting method that a kind of Behavior-based control is analyzed Active CN103258021B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310160791.XA CN103258021B (en) 2013-05-03 2013-05-03 The character terminal characteristic extracting method that a kind of Behavior-based control is analyzed

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310160791.XA CN103258021B (en) 2013-05-03 2013-05-03 The character terminal characteristic extracting method that a kind of Behavior-based control is analyzed

Publications (2)

Publication Number Publication Date
CN103258021A CN103258021A (en) 2013-08-21
CN103258021B true CN103258021B (en) 2016-02-03

Family

ID=48961938

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310160791.XA Active CN103258021B (en) 2013-05-03 2013-05-03 The character terminal characteristic extracting method that a kind of Behavior-based control is analyzed

Country Status (1)

Country Link
CN (1) CN103258021B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103701783B (en) * 2013-12-17 2017-01-11 沈阳觉醒软件有限公司 Preprocessing unit, data processing system consisting of same, and processing method
CN103841115B (en) * 2014-03-21 2017-02-08 成都安恒信息技术有限公司 Character terminal command real-time approval method and application layer structure
CN104951382B (en) * 2014-03-25 2017-12-01 北京神州泰岳软件股份有限公司 Intelligent terminal user behavior analysis method and system based on APP mapping libraries
CN105847222B (en) * 2015-01-14 2019-04-23 中国移动通信集团浙江有限公司 A kind of graphical auditing method, device and electronic equipment
CN108540314A (en) * 2018-03-22 2018-09-14 微梦创科网络科技(中国)有限公司 The restoring method and system of user behavior

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556636A (en) * 2004-01-02 2004-12-22 南京金鹰国际集团软件系统有限公司 Character terminal monitoring system
CN1889442A (en) * 2006-06-14 2007-01-03 杭州奇智信息科技有限公司 Method and apparatus for identifying terminal command line

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100338604B1 (en) * 2000-05-29 2002-05-27 배영주 remote network management system via serial port

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1556636A (en) * 2004-01-02 2004-12-22 南京金鹰国际集团软件系统有限公司 Character terminal monitoring system
CN1889442A (en) * 2006-06-14 2007-01-03 杭州奇智信息科技有限公司 Method and apparatus for identifying terminal command line

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
通信网管终端VT100的接口软件设计;苏玉勤;《科技情报开发与经济》;20041230;第14卷(第12期);全文 *

Also Published As

Publication number Publication date
CN103258021A (en) 2013-08-21

Similar Documents

Publication Publication Date Title
US8959109B2 (en) Business intelligent in-document suggestions
CN103258021B (en) The character terminal characteristic extracting method that a kind of Behavior-based control is analyzed
CN109684803B (en) Man-machine verification method based on gesture sliding
CN105786930B (en) Based on the searching method and device for touching interaction
CN105871690B (en) Method and device for realizing instant messaging
DE112011102891T5 (en) Automatic adjustment of an input configuration
CN102831345A (en) Injection point extracting method in SQL (Structured Query Language) injection vulnerability detection
CN109726712A (en) Character recognition method, device and storage medium, server
CN104156201A (en) Device and method for generating a user interface for activating multiple applications
CN111291572B (en) Text typesetting method and device and computer readable storage medium
CN109634570A (en) Front and back end integrated development method, device, equipment and computer readable storage medium
CN104238763A (en) Information input control method and device of input box
CN105550179A (en) Webpage collection method and browser plug-in
US11038789B2 (en) System and method for automated generation of web decoding templates
CN111447507A (en) Video production method and device, electronic equipment and storage medium
CN103778141A (en) Mixed PDF book catalogue automatic extracting algorithm
CN111026604B (en) Log file analysis method and device
JP2019101889A (en) Test execution device and program
CN117057318A (en) Domain model generation method, device, equipment and storage medium
CN104182479A (en) Method and device for processing information
CN111857932A (en) Web substitution and filling method for operation and maintenance auditing system based on puppeteer
CN104158696A (en) Determination method and device for measuring delayed operation time and terminal
CN104850484A (en) Bitmap analysis based automatic determination method for character terminal interactive state
CN103778210A (en) Method and device for judging specific file type of file to be analyzed
CN104268314B (en) Waveform display method is measured based on Easy HDL emulation logic analyzers

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: Zhejiang Zhongcai Building No. 68 Hangzhou 310051 Zhejiang province Binjiang District Tong Road 15

Patentee after: Hangzhou Annan information technology Limited by Share Ltd

Address before: Zhejiang Zhongcai Building No. 68 Binjiang District road Hangzhou City, Zhejiang Province, the 310051 and 15 layer

Patentee before: Dbappsecurity Co.,ltd.

CP02 Change in the address of a patent holder
CP02 Change in the address of a patent holder

Address after: Zhejiang Zhongcai Building No. 68 Binjiang District road Hangzhou City, Zhejiang Province, the 310051 and 15 layer

Patentee after: Hangzhou Annan information technology Limited by Share Ltd

Address before: Zhejiang Zhongcai Building No. 68 Hangzhou 310051 Zhejiang province Binjiang District Tong Road 15

Patentee before: Hangzhou Annan information technology Limited by Share Ltd