CN104935478A - Intelligent terminal depth perception method and system thereof - Google Patents

Intelligent terminal depth perception method and system thereof Download PDF

Info

Publication number
CN104935478A
CN104935478A CN201510343512.2A CN201510343512A CN104935478A CN 104935478 A CN104935478 A CN 104935478A CN 201510343512 A CN201510343512 A CN 201510343512A CN 104935478 A CN104935478 A CN 104935478A
Authority
CN
China
Prior art keywords
intelligent terminal
business datum
depth perception
module
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510343512.2A
Other languages
Chinese (zh)
Inventor
金果
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Feixun Data Communication Technology Co Ltd
Original Assignee
Shanghai Feixun Data Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Feixun Data Communication Technology Co Ltd filed Critical Shanghai Feixun Data Communication Technology Co Ltd
Priority to CN201510343512.2A priority Critical patent/CN104935478A/en
Publication of CN104935478A publication Critical patent/CN104935478A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports
    • H04L43/062Generation of reports related to network traffic

Abstract

The invention discloses an intelligent terminal depth perception method. The method comprises the following steps: S1, acquiring user mobile Internet flow, and filtering business data traffic from the user mobile Internet traffic; S2, performing identification, feature matching and statistical analysis on the business data traffic according to a preset identification rule to gain the type and content of business data and the identification and statistics results of a special subject; and S3, controlling the business data according to a preset control rule. The invention also discloses an intelligent terminal depth perception system. An intelligent machine application is analyzed, and the operation behaviors of a user on an intelligent system are analyzed, so that an intelligent terminal has a corresponding perception capability and control capability, and identified user operation data is controlled and managed in real time.

Description

A kind of intelligent terminal depth perception method and system thereof
Technical field
The present invention relates to mobile Internet field, be specifically related to a kind of intelligent terminal depth perception method and system thereof.
Background technology
Along with the development of mobile Internet and intelligent terminal, increasing user carry out corresponding Business Processing by intelligent terminal and do shopping accordingly, read, chat, live, audio-visual etc.Intelligent terminal has become an indispensable part in people's life.Analyze behavior and the custom of user's downloading application software, user can be understood interested in which application, and statistical analysis is carried out to the corresponding behavior of intelligent terminal, obtain data, for product marketing provides data supporting.
Following two kinds of analytical methods are mainly comprised in prior art:
(1) in intelligent terminal, gather the data of user's downloading application software.This method needs the application program of user installation band statistical function, although can add up to a certain extent, and analyze the application software that user downloads on intelligent terminal, but this application program only rests in the aspect of statistics collection user behavior information, and may cause adding up corresponding privacy of user behavior, and some information is user is unwilling to allow the information of collecting, and user also can uninstall corresponding application program.Analytic statistics is carried out to the behavior of user, and does not rely on intelligent system.And if third party's program needs more general depth perception system, must possess root authority, this brings threat to intelligent machine system.
(2) at application software download site statistical analysis user downloading data.This method can add up user's downloading data of certain application software download site, the downloading data of each application software in this website can be added up, but there is not statistical uncertainty true defect in this statistics, the application software that user downloads and installs from application software download site may not necessarily often use, and can not the accurately feature of consumer positioning and potential hobby, the application of this kind of website statistics is caused to be all social forever, media, the application such as amusement, can not knowing for sure, what like is which class media is social, and accurately can not navigate to subscriber phone number, customer analysis coverage rate is not high yet.
Application number is that combined analysis method and device are downloaded in a kind of mobile Internet mobile phone application of 201210466780.X, disclose following technology contents: comprise DPI system and mobile Internet application download analytic unit, described DPI system carries out preliminary treatment to HTTP flow and aaa authentication data on flows, obtain download URL, user mobile phone number, download time and be sent to mobile Internet application download analytic unit; Described mobile Internet application is downloaded analytic unit and is analyzed download URL, obtains and downloads source web and application name, by user mobile phone number corresponding for download URL, download time, download source web and application name stored in database.Its defect existed is, although can by combination various analysis, behavior and custom that user downloads application program of mobile phone can be analyzed accurately, only make use of deep message detection (DPI) to carry out preliminary treatment to HTTP flow and aaa authentication data on flows, obtain its download URL, user mobile phone number, then download time is sent to mobile Internet application and downloads analytic unit, do not have from data stream for detecting with data flow characteristics, also the business of transport network layer to application layer is not identified, therefore also can the combined analysis method of a kind of coarseness at last.
Summary of the invention
The object of the present invention is to provide a kind of intelligent terminal depth perception method and system thereof, by analyzing intelligent machine application program, and user analyzes intelligent system operation behavior, makes intelligent terminal self have corresponding perception and control ability; And the deep message based on data flow state detects (DPI) technology, comprise data flow behavioral value and data flow characteristics detection technique, user's intelligent machine transport network layer is identified to application layer business, then by processing the user operation of intelligent terminal, abandon, shaping, the modes such as interference carry out real-time control and management to the user operation data identified.
In order to achieve the above object, the present invention is achieved through the following technical solutions: a kind of intelligent terminal depth perception method, is characterized in, comprises following steps:
S1, acquisition user mobile Internet flow, filter out business datum flow from user's mobile Internet flow;
S2, according to presetting, recognition rule identifies business datum flow, characteristic matching and statistical analysis, obtains identification and the statistics of the type of business datum, content and special topic;
S3, according to default control rule business datum is controlled.
A step S4 is comprised further after described step S3;
S4, by the identification of the type of business datum, content and special topic and statistics be stored in database to the control result of business datum flow.
Described recognition rule identifies data traffic for adopting deep packet inspection technology.
Described default control rule is according to user, time, historical traffic and bandwidth, controls Business Stream.
Described step S2 comprises:
S2.1, the business of identification to be mated with the type of service recorded;
If the match is successful for S2.2, then proceed to step S3;
If it fails to match for S2.3, then this business is managed.
Described step S2.3, specifically by obstruction, shaping, heavy label, formulates priority, the obligate information that the traffic assignments for different priorities is different.
A kind of intelligent terminal depth perception system, is characterized in, comprises:
Identification module, for carrying out deep analysis according to presetting recognition rule to the business datum message of intelligent terminal in mobile Internet, and statistical analysis is carried out to the behavior of business datum flow, and carry out characteristic matching, obtain identification and the statistics of the type of business datum, content and special topic;
Control module, is connected with described identification module, for controlling business datum according to predetermined control strategy;
Characteristic information storehouse, is connected with described identification module, for storing default recognition rule;
Policy information base, is connected with described control module, for storing predetermined control strategy;
Administration module, is connected with described characteristic information storehouse and policy information base respectively, for completing the renewal to characteristic information storehouse and policy information base;
Statistical module; Be connected with described administration module, the result that object information and control module for showing business datum identification in real time control business datum;
Interface module, is connected with described administration module, for providing the calling interface connecting intelligent terminal.
Described intelligent terminal depth perception system comprises a memory module further, is connected with described administration module, for backup traffic data, and the intermediate processing results of the type of record traffic data, content and special topic.
Described recognition rule identifies data traffic for adopting deep packet inspection technology.
Described default control rule is according to user, time, historical traffic and bandwidth, controls Business Stream.
A kind of intelligent terminal depth perception method of the present invention and system thereof compared with prior art have the following advantages: by analyzing intelligent machine application program, and user analyzes intelligent system operation behavior, intelligent terminal self is made to have corresponding perception and control ability; And the deep message based on data flow state detects (DPI) technology, comprise data flow behavioral value and data flow characteristics detection technique, user's intelligent machine transport network layer is identified to application layer business, then by processing the user operation of intelligent terminal, abandon, shaping, the modes such as interference carry out real-time control and management to the user operation data identified.
Accompanying drawing explanation
Fig. 1 is the overall structure block diagram of a kind of intelligent terminal depth perception of the present invention system;
Fig. 2 is the method flow diagram of a kind of intelligent terminal depth perception of the present invention system.
Embodiment
Below in conjunction with accompanying drawing, by describing a preferably specific embodiment in detail, the present invention is further elaborated.
As shown in Figure 1, a kind of intelligent terminal depth perception system, comprise: identification module 1, for carrying out deep analysis according to presetting recognition rule to the business datum message of intelligent terminal in mobile Internet, and statistical analysis is carried out to the behavior of business datum flow, and carry out characteristic matching, obtain identification and the statistics of the type of business datum, content and special topic; Control module 2, is connected with described identification module 1, for controlling business datum according to predetermined control strategy; Characteristic information storehouse 3, is connected with described identification module 1, for storing default recognition rule; Policy information base 4, is connected with described control module 2, for storing predetermined control strategy; Administration module 5, is connected with described characteristic information storehouse 3 and policy information base 4 respectively, for completing the renewal to characteristic information storehouse 3 and policy information base 4; Statistical module 6; Be connected with described administration module 5, the result that object information and control module 2 pairs of business datums for showing business datum identification in real time control; Interface module 7, be connected with described administration module 5, for providing the calling interface connecting intelligent terminal, intelligent machine system android is different with intelligent system interfaces such as IOS, so corresponding call method is also different, and the unified intelligent terminal interface module that arranges is conducive to native system and may operate on the smart mobile phone of various platform; Memory module 8, is connected with described administration module 5, for backup traffic data, and the intermediate processing results of the type of record traffic data, content and special topic.
As shown in Figure 2, a kind of intelligent terminal depth perception method, comprises following steps:
S1, acquisition user mobile Internet flow, filter out business datum flow from user's mobile Internet flow.
Check that unencrypted packet header and unprotected bag find the confidential information about protected session; Unencrypted IP source and destination address (even tcp port) can be checked; Check the flow of network data flow, data-flow analysis person just can determine which communication party is carrying out alternately, using the service of what type, analyzes the information of business or personal relationship; Intercept and capture related news, read and they sent to server and adds up corresponding recognition result.
S2, according to presetting, recognition rule identifies business datum flow, characteristic matching and statistical analysis, obtains identification and the statistics of the type of business datum, content and special topic.
S3, according to default control rule business datum is controlled.
S4, by the identification of the type of business datum, content and special topic and statistics be stored in database to the control result of business datum flow.
Described recognition rule identifies data traffic for adopting deep packet inspection technology.
Described default control rule is according to user, time, historical traffic and bandwidth, controls Business Stream.Program meets and is expressed as follows:
G <—define Event Graph
CEC<—Critical Events Chain of G
startEvent<— App Event init
Procedure FeatureGraph(ce)
forall the ce ∈ CEC do
mp ← FindMiniEvent(ce,G)
C ← featureExcute(C, mp)
if ? e : < ce; e > ∈ CEC then
Output: C as Data Constraint, P as Event
Inputs
exit()
end
C ← Feature Execute Rollback(C, mp)
end
End
Explain: G defines various event and characteristic set thereof.CEC constitutes various times, the flow relative set of the user operation of all event chain type set representative.Recognition rule is found out by correlation function featureGraph (ce) in code, by the function variable of the ce current environment in current intelligent terminal as parameter, by function F indMiniEvent (), featureExcut () extracts data constraint regular collection C.Regular collection comprises certain characteristic set and comprises NFC, bluetooth, WiFI data traffic characteristic set.
Described step S2 comprises:
S2.1, the business of identification to be mated with the type of service recorded;
If the match is successful for S2.2, then proceed to step S3;
If it fails to match for S2.3, then this business is managed.
Described step S2.3, specifically by obstruction, shaping, heavy label, formulates priority, the obligate information that the traffic assignments for different priorities is different.
Embody rule: when user needs to carry out some operation, when carrying out corresponding service condition circulation in intelligent terminal; First corresponding business operation enters the identification module of intelligent terminal depth perception system, and identification module generally can carry out corresponding service identification according to the operation of user, and this identification is also just decomposed corresponding operation.First carry out when carrying out service decomposition searching in characteristic information storehouse, if return optimum operation in characteristic information storehouse (namely after the analysis of identification module, discovery is no problem user operation), then by control module, business datum flow is controlled.The operation that user commonly uses can be found, conventional phone operation, multimedia audio video playback, shopping online, the recognition rule that Network Synchronization etc. business datum is involved in process in identifying signature storehouse in characteristic information storehouse.
If do not found in characteristic information storehouse, then characteristic information storehouse then needs to seek help from administration module and manages accordingly intelligent terminal business.Administration module is the core unified management of intelligent terminal depth perception system and operation modules, to the operation (comprising maintenance management, tactical management, configuration management, resource management) that user commonly uses.The object information identified is stored in memory module automatically can automatically fetch data from memory module time next time starts.Memory module also for storing the object information that identification module identifies, and is carried out business datum and is backed up, mitigation system computing capability greatly time such system starts next time.
Although content of the present invention has done detailed introduction by above preferred embodiment, will be appreciated that above-mentioned description should not be considered to limitation of the present invention.After those skilled in the art have read foregoing, for multiple amendment of the present invention and substitute will be all apparent.Therefore, protection scope of the present invention should be limited to the appended claims.

Claims (10)

1. an intelligent terminal depth perception method, is characterized in that, comprises following steps:
S1, acquisition user mobile Internet flow, filter out business datum flow from user's mobile Internet flow;
S2, according to presetting, recognition rule identifies business datum flow, characteristic matching and statistical analysis, obtains identification and the statistics of the type of business datum, content and special topic;
S3, according to default control rule business datum is controlled.
2. intelligent terminal depth perception method as claimed in claim 1, is characterized in that, comprise a step S4 further after described step S3;
S4, by the identification of the type of business datum, content and special topic and statistics be stored in database to the control result of business datum flow.
3. intelligent terminal depth perception method as claimed in claim 1, is characterized in that, described recognition rule identifies data traffic for adopting deep packet inspection technology.
4. intelligent terminal depth perception method as claimed in claim 1, it is characterized in that, described default control rule is according to user, time, historical traffic and bandwidth, controls Business Stream.
5. intelligent terminal depth perception method as claimed in claim 1, it is characterized in that, described step S2 comprises:
S2.1, the business of identification to be mated with the type of service recorded;
If the match is successful for S2.2, then proceed to step S3;
If it fails to match for S2.3, then this business is managed.
6. intelligent terminal depth perception method as claimed in claim 1, is characterized in that, described step S2.3, specifically by obstruction, shaping, heavy label, formulates priority, the obligate information that the traffic assignments for different priorities is different.
7. an intelligent terminal depth perception system, is characterized in that, comprises:
Identification module, for carrying out deep analysis according to presetting recognition rule to the business datum message of intelligent terminal in mobile Internet, and statistical analysis is carried out to the behavior of business datum flow, and carry out characteristic matching, obtain identification and the statistics of the type of business datum, content and special topic;
Control module, is connected with described identification module, for controlling business datum according to predetermined control strategy;
Characteristic information storehouse, is connected with described identification module, for storing default recognition rule;
Policy information base, is connected with described control module, for storing predetermined control strategy;
Administration module, is connected with described characteristic information storehouse and policy information base respectively, for completing the renewal to characteristic information storehouse and policy information base;
Statistical module; Be connected with described administration module, the result that object information and control module for showing business datum identification in real time control business datum;
Interface module, is connected with described administration module, for providing the calling interface connecting intelligent terminal.
8. intelligent terminal depth perception system as claimed in claim 7, is characterized in that, comprise a memory module further, be connected with described administration module, for backup traffic data, and the intermediate processing results of the type of record traffic data, content and special topic.
9. intelligent terminal depth perception system as claimed in claim 7, is characterized in that, described recognition rule identifies data traffic for adopting deep packet inspection technology.
10. intelligent terminal depth perception system as claimed in claim 7, it is characterized in that, described default control rule is according to user, time, historical traffic and bandwidth, controls Business Stream.
CN201510343512.2A 2015-06-19 2015-06-19 Intelligent terminal depth perception method and system thereof Pending CN104935478A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510343512.2A CN104935478A (en) 2015-06-19 2015-06-19 Intelligent terminal depth perception method and system thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510343512.2A CN104935478A (en) 2015-06-19 2015-06-19 Intelligent terminal depth perception method and system thereof

Publications (1)

Publication Number Publication Date
CN104935478A true CN104935478A (en) 2015-09-23

Family

ID=54122454

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510343512.2A Pending CN104935478A (en) 2015-06-19 2015-06-19 Intelligent terminal depth perception method and system thereof

Country Status (1)

Country Link
CN (1) CN104935478A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106792616A (en) * 2017-01-24 2017-05-31 深圳企管加企业服务有限公司 Mobile terminal user's surfing flow analysis method and system
CN106936663A (en) * 2015-12-31 2017-07-07 中国移动通信集团上海有限公司 A kind of method and device for determining the application that terminal is installed
CN107027143A (en) * 2016-01-29 2017-08-08 中国移动通信集团贵州有限公司 A kind of information acquisition method and device
CN111355628A (en) * 2020-02-12 2020-06-30 深圳市博瑞得科技有限公司 Model training method, business recognition device and electronic device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006216A (en) * 2009-09-02 2011-04-06 中兴通讯股份有限公司 Deep packet inspection system and packet processing method
CN102111814A (en) * 2010-12-29 2011-06-29 华为技术有限公司 Method, device and system for identifying service type
WO2012037817A1 (en) * 2010-09-20 2012-03-29 中兴通讯股份有限公司 Method and system for implementing strategy synchronization
CN102938789A (en) * 2012-11-19 2013-02-20 江苏省公用信息有限公司 Download combination analysis method and device for mobile internet mobile phone applications
CN103607691A (en) * 2013-11-26 2014-02-26 中国联合网络通信集团有限公司 Flow package recommendation method and device
CN104022920A (en) * 2014-06-26 2014-09-03 重庆重邮汇测通信技术有限公司 LTE (long term evolution) network flow recognition system and method
CN104702603A (en) * 2015-03-04 2015-06-10 南京邮电大学 Multi-view-angle security auditing system for mobile internet

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102006216A (en) * 2009-09-02 2011-04-06 中兴通讯股份有限公司 Deep packet inspection system and packet processing method
WO2012037817A1 (en) * 2010-09-20 2012-03-29 中兴通讯股份有限公司 Method and system for implementing strategy synchronization
CN102111814A (en) * 2010-12-29 2011-06-29 华为技术有限公司 Method, device and system for identifying service type
CN102938789A (en) * 2012-11-19 2013-02-20 江苏省公用信息有限公司 Download combination analysis method and device for mobile internet mobile phone applications
CN103607691A (en) * 2013-11-26 2014-02-26 中国联合网络通信集团有限公司 Flow package recommendation method and device
CN104022920A (en) * 2014-06-26 2014-09-03 重庆重邮汇测通信技术有限公司 LTE (long term evolution) network flow recognition system and method
CN104702603A (en) * 2015-03-04 2015-06-10 南京邮电大学 Multi-view-angle security auditing system for mobile internet

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
吴倩: ""基于DPI与DFI的流量识别与控制系统的设计与实现"", 《中国优秀硕士学位论文全文数据库》 *
饶瑾: ""深度包检测(DPI)技术浅谈及应用"", 《信息通信》 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106936663A (en) * 2015-12-31 2017-07-07 中国移动通信集团上海有限公司 A kind of method and device for determining the application that terminal is installed
CN107027143A (en) * 2016-01-29 2017-08-08 中国移动通信集团贵州有限公司 A kind of information acquisition method and device
CN106792616A (en) * 2017-01-24 2017-05-31 深圳企管加企业服务有限公司 Mobile terminal user's surfing flow analysis method and system
CN111355628A (en) * 2020-02-12 2020-06-30 深圳市博瑞得科技有限公司 Model training method, business recognition device and electronic device
CN111355628B (en) * 2020-02-12 2023-05-09 博瑞得科技有限公司 Model training method, service identification method, device and electronic device

Similar Documents

Publication Publication Date Title
CN109862018B (en) Anti-crawler method and system based on user access behavior
US9553918B1 (en) Stateful and stateless cookie operations servers
US20200012785A1 (en) Self-adaptive application programming interface level security monitoring
US9219787B1 (en) Stateless cookie operations server
US9003552B2 (en) Online privacy management
US8938534B2 (en) Automatic provisioning of new users of interest for capture on a communication network
KR20090111821A (en) Systems and methods of network operation and information processing using persistent/anonymous identifiers
CN106878074B (en) Flow filtering method and device
CN110519177A (en) A kind of network flow identification method and relevant device
CN104935478A (en) Intelligent terminal depth perception method and system thereof
US9058323B2 (en) System for accessing a set of communication and transaction data associated with a user of interest sourced from multiple different network carriers and for enabling multiple analysts to independently and confidentially access the set of communication and transaction data
CN104021141B (en) Method, device and system for data processing and cloud service
KR101496632B1 (en) System for safe contents service for youths and method therefor
CN103580962A (en) System and method for providing customization network service for home gateway user
CN111131493B (en) Data acquisition method and device and user portrait generation method and device
CN107710263A (en) Shop accesses data creation and management
JP2019532378A (en) Single-source cross-platform media measurement apparatus, device, and related method
CN105553770B (en) Data acquisition control method and device
CN111885339A (en) Privacy processing method and device, computer-readable storage medium and electronic medium
WO2014151539A1 (en) Online privacy management
US20180191757A1 (en) Using data science to aid in detection of unauthorized distribution
CN109429296B (en) Method, device and storage medium for associating terminal with internet surfing information
US9118563B2 (en) Methods and apparatus for detecting and filtering forced traffic data from network data
KR101652328B1 (en) Method and system for collecting data using anonymization method
CN114004708A (en) Risk control method and device for business system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150923

RJ01 Rejection of invention patent application after publication