CN106878438A - The method and system of user behavior analysis under a kind of https environment - Google Patents

The method and system of user behavior analysis under a kind of https environment Download PDF

Info

Publication number
CN106878438A
CN106878438A CN201710122538.3A CN201710122538A CN106878438A CN 106878438 A CN106878438 A CN 106878438A CN 201710122538 A CN201710122538 A CN 201710122538A CN 106878438 A CN106878438 A CN 106878438A
Authority
CN
China
Prior art keywords
page
https
resource
condition code
user
Prior art date
Application number
CN201710122538.3A
Other languages
Chinese (zh)
Inventor
白晟
张伟
Original Assignee
久远谦长(北京)技术服务有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 久远谦长(北京)技术服务有限公司 filed Critical 久远谦长(北京)技术服务有限公司
Priority to CN201710122538.3A priority Critical patent/CN106878438A/en
Publication of CN106878438A publication Critical patent/CN106878438A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9574Browsing optimisation, e.g. caching or content distillation of access to content, e.g. by caching
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network-specific arrangements or communication protocols supporting networked applications
    • H04L67/02Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP]
    • H04L67/025Network-specific arrangements or communication protocols supporting networked applications involving the use of web-based technology, e.g. hyper text transfer protocol [HTTP] for remote control or remote monitoring of the application

Abstract

The invention discloses a kind of method and system of user behavior analysis under https environment, method includes:Step 1) content characteristic storehouse is set up to the Internet resources page that needs are analyzed, feature database is made up of multiple condition codes, and condition code includes:The Host of https request URLs, page-size, the page include resource content, resource content size, dynamic resource information, embedded one of URLs and quantity or combination;Step 2) to user access Internet resources https message datas analyze one by one, characteristic information extraction, with condition code the matching analysis;Step 3) daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse, also original subscriber truly accesses behavior, and is further analyzed and counts.

Description

The method and system of user behavior analysis under a kind of https environment

Technical field

The invention belongs to internet arena, it is related to a kind of method of user behavior analysis under https environment.

Background technology

Http user access requests message data is all the time the user behavior analysis key data under internet environment Source, by http messages, can effectively track user behavior path, content and frequency, so as to analyze the row of Internet user It is custom, behavior prediction, so as to for enterprise, investor etc. provide strong decision-making foundation, be worked out according to different user and performed Detailed, effective strategy.

With continuing to develop for internet, the business of carrying is more and more, particularly the business such as terminal payment, finance and money management Development so that the security requirement more and more higher of data transfer, therefore many application/Web services progressively switch to http Https, it is ensured that communications security between client and server, such as day cat, Taobao, Baidu, Jingdone district, IOS APP.

TLS/SSL agreements are added on the basis of https-over-http, TSL/SSL carrys out the body of authentication server by certificate Part, and be the communication encryption between browser and server.And the method for accessing message analysis based on http originally cannot The total data that user really accesses URL is grabbed, also the internet behavior of user cannot just be analysed in depth.

Mainly there is two ways at present:

Scheme one:

The limited information coarse analysis user behaviors such as the host of record are only capable of in https by analyzing.This scheme, due to It is only capable of obtaining in plain text the host information of user access request in https data, it is impossible to recorded user and access under the host in detail Path so as to obtain complete URL, therefore also cannot just accomplish user access content in-depth analysis, it is impossible to for decision-making is provided Effective data supporting.

Scheme two:

Proxy agencies are set up between the server that client and user access, realizes that https is asked to kidnap.Pass through Https is asked to kidnap, it is possible to achieve with the identical analytical effects of http, but cannot realize dividing the whole network user behavior Analysis ability, is relatively adapted to enterprise network exit and sets up Proxy agencies, realizes the tracking of enterprises user behavior and analyzes, because There is the technology restriction of Proxy proxy servers deployment, scene limitation and cost limitation in this program.

The content of the invention

Regarding to the issue above, the present invention is by setting up Internet content page feature database, with reference to having that https can be obtained Limit information, based on big data analytical technology, user internet under https is realized in the accurate calculating to user's actual access content Behavioural analysis.

The technical scheme that present invention solution above-mentioned technical problem is taken is as follows:

A kind of method of user behavior analysis under https environment, including:

Step 1) content characteristic storehouse is set up to the Internet resources page that needs are analyzed, feature database is by multiple feature code characters Into condition code includes:The Host of https request URLs, page-size, the page include resource content, resource content size, dynamic Resource information, embedded one of URLs and quantity or combination;

Step 2) to user access Internet resources https message datas analyze one by one, characteristic information extraction, with spy Levy a yard the matching analysis;

Step 3) daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse, also original subscriber truly accesses Behavior, and be further analyzed and count.

Preferably, step 1) in, required each analyzed is crawled by crawler technology for the website of analysis is needed Webpage, Web page feature base is set up according to the data for crawling webpage.

Preferably, step 2) in, the characteristic information of extraction is selected from following:

Access the Host/Domain of URL;

The total length of the uncached part of https requests for page;

Uncached picture or CSS load the quantity of resource in https requests for page;

The size of each resource object of page loading;

The time that https requests occur.

Preferably, step 2) in, one or more characteristic informations combine and to form one or more features and refer to based on more than Line, accesses https and asks to determine user access path by user in the range of certain hour.

Preferably, step 3) in the daily record of characteristic information extraction is matched into specific choosing with the condition code in content characteristic storehouse From following method:

By fingerprint combination unique match;

If cannot by fingerprint combination unique match when, can by access during the webpage resource of loading simultaneously or URL sequences many condition is matched;

The 3-5 contents of object that can must be loaded every time is obtained from the page, while obtaining the size of these contents of object With host information, the host information and object size for accessing object sequence according to each loading page carries out as finger print information Match somebody with somebody.

The system of user behavior analysis under a kind of https environment, including:

Feature database sets up unit, for setting up content characteristic storehouse to the Internet resources page for needing analysis, feature database by Multiple condition code compositions, condition code includes:Host, page-size, the page of https request URLs are comprising in resource content, resource Hold size, dynamic resource information, embedded one of URLs and quantity or combination;

Condition code matching unit, the https message datas for accessing user Internet resources are analyzed one by one, extract special Reference cease, with condition code the matching analysis;

Behavior reduction unit, for the daily record of characteristic information extraction to be matched with the condition code in content characteristic storehouse, reduction User truly accesses behavior, and is further analyzed and counts.

Preferably, the feature database sets up unit, required for being crawled by crawler technology for the website for needing to analyze Each webpage of analysis, Web page feature base is set up according to the data for crawling webpage.

Preferably, described document information matching unit, the characteristic information of extraction is selected from following:

Access the Host/Domain of URL;

The total length of the uncached part of https requests for page;

Uncached picture or CSS load the quantity of resource in https requests for page;

The size of each resource object of page loading;

The time that https requests occur.

Preferably, described document information matching unit, is further used for one or more characteristic informations combination shape based on more than Into one or more characteristic fingerprints, https is accessed by user in the range of certain hour and asks to determine user access path.

Preferably, the behavior reduction unit, by the condition code in the daily record of characteristic information extraction and content characteristic storehouse Matching is chosen in particular from following method:

By fingerprint combination unique match;

If cannot by fingerprint combination unique match when, can by access during the webpage resource of loading simultaneously or URL sequences many condition is matched;

The 3-5 contents of object that can must be loaded every time is obtained from the page, while obtaining the size of these contents of object With host information, the host information and object size for accessing object sequence according to each loading page carries out as finger print information Match somebody with somebody.

The program is main by following characteristics:

1st, need not increase additional investment, including change network structure or increase computing resource, based on existing data and set It is standby to complete;

2nd, the data analysis and original http daily records after reduction user behavior are essentially identical, protect the throwing of original analysis system Enter;

3rd, user behavior reduction granularity can be determined according to practical business demand, to reduce the exploitation and maintenance of feature database Cost.

Other features and advantages of the present invention will be illustrated in the following description, also, the partly change from specification Obtain it is clear that or being understood by implementing the present invention.The purpose of the present invention and other advantages can be by the explanations write Specifically noted structure is realized and obtained in book, claims and accompanying drawing.

Brief description of the drawings

The present invention is described in detail below in conjunction with the accompanying drawings, to cause above-mentioned advantage of the invention definitely.Its In,

Fig. 1 is the schematic flow sheet of the method for user behavior analysis under https environment of the present invention;

Fig. 2 is the structural representation of the system of user behavior analysis under https environment of the present invention.

Specific embodiment

Describe embodiments of the present invention in detail below with reference to drawings and Examples, how the present invention is applied whereby Technological means solves technical problem, and reaches the implementation process of technique effect and can fully understand and implement according to this.Need explanation As long as not constituting conflict, each embodiment in the present invention and each feature in each embodiment can be combined with each other, The technical scheme for being formed is within protection scope of the present invention.

In addition, can be in the such as one group department of computer science of computer executable instructions the step of the flow of accompanying drawing is illustrated Performed in system, and, although logical order is shown in flow charts, but in some cases, can be with different from herein Order perform shown or described step.

Embodiment one:

As shown in figure 1, under a kind of https environment user behavior analysis method, including:

Step 1) content characteristic storehouse is set up to the Internet resources page that needs are analyzed, feature database is by multiple feature code characters Into condition code includes:The Host of https request URLs, page-size, the page include resource content, resource content size, dynamic Resource information, embedded one of URLs and quantity or combination;

Step 2) to user access Internet resources https message datas analyze one by one, characteristic information extraction, with spy Levy a yard the matching analysis;

Step 3) daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse, also original subscriber truly accesses Behavior, and be further analyzed and count.

Limited information by setting up Internet content page feature database, can obtain with reference to https of the invention, based on big User internet behavioural analysis under https is realized in data analysis technique, the accurate calculating to user's actual access content.

Embodiment two:

The present invention is carried out in conjunction with the embodiments continuing on, these, it is preferred to, step 2) in, the characteristic information of extraction Selected from following:

Access the Host/Domain of URL;

The total length of the uncached part of https requests for page;

Uncached picture or CSS load the quantity of resource in https requests for page;

The size of each resource object of page loading;

The time that https requests occur.

Preferably, step 2) in, one or more characteristic informations combine and to form one or more features and refer to based on more than Line, accesses https and asks to determine user access path by user in the range of certain hour.

Preferably, step 3) in the daily record of characteristic information extraction is matched into specific choosing with the condition code in content characteristic storehouse From following method:

By fingerprint combination unique match;

If cannot by fingerprint combination unique match when, can by access during the webpage resource of loading simultaneously or URL sequences many condition is matched;

The 3-5 contents of object that can must be loaded every time is obtained from the page, while obtaining the size of these contents of object With host information, the host information and object size for accessing object sequence according to each loading page carries out as finger print information Match somebody with somebody.

Embodiment three:

In one embodiment, the invention mainly comprises following key step:

1. pair Internet resources page for needing analysis sets up content characteristic storehouse

Each webpage of analysis required for being crawled by crawler technology for the website for needing analysis, according to crawling webpage Data set up Web page feature base, and feature database is made up of multiple condition codes (fingerprint), and condition code includes but is not limited to https requests The Host of URL, page-size, the page include resource content, resource content size, dynamic resource information, embedded URLs and quantity Deng.

2. couple user accesses the https message datas of Internet resources and analyzes one by one, characteristic information extraction, with feature Code/fingerprint matching is analyzed

When https passes through TLS/SSL encrypted communication channels, following letter still can be obtained after capturing message analysis Breath:

(1) Host/Domain of URL is accessed

(2) total length of the uncached part of https requests for page

(3) quantity of loading resource uncached in https requests for page, such as picture, CSS

(4) size of each resource object of page loading

(5) time that https requests occur

One or more combinations form one or more characteristic fingerprints based on more than, are visited by user in the range of certain hour Ask that request determines user access path to https.

3. the daily record of characteristic information extraction is matched by certain algorithm with content characteristic storehouse, also original subscriber truly accesses row For, and be further analyzed and count.Feature Correspondence Algorithm mainly includes following methods:

(1) by fingerprint combination unique match;

(2) if cannot by fingerprint combination unique match when, can be by accessing during the webpage resource of loading simultaneously Or the matching of URL sequences many condition, such as, a page not only loads the content of the page when loading, be also loaded with some special Fixed picture, or a special new https/http request is initiated, can now be visited by fingerprint combination+definition URL Ask sequence the accessed page of positioning jointly.

(3) the 3-5 contents of object (picture, media file, css, js etc.) that can must be loaded every time is obtained from the page, Obtain the size and host information of these contents of object simultaneously, according to each loading page access object sequence host information and Object size is used as finger print information.

The program is main by following characteristics:

1st, need not increase additional investment, including change network structure or increase computing resource, based on existing data and set It is standby to complete;

2nd, the data analysis and original http daily records after reduction user behavior are essentially identical, protect the throwing of original analysis system Enter;

3rd, user behavior reduction granularity can be determined according to practical business demand, to reduce the exploitation and maintenance of feature database Cost.

Wherein, it is all to realize that the user behavior analysis method based on https daily records belongs to using same or similar algorithm In the application protection domain of this patent:

1. by parse https ask in obtain host, page-size, the page include object size, dynamic resource load The method that the information such as quantity uniquely position the https pages as fingerprint;

2. when many https pages are identical, other elements are increased, it is big that such as JS, picture, URL access visit sequence, content object The method of the small unique positioning webpage of grade;

3. by the method for web crawlers technique construction Web page feature database.

Example IV:

It is corresponding with above method embodiment, present invention also offers user behavior analysis under a kind of https environment System, including:

Feature database sets up unit, for setting up content characteristic storehouse to the Internet resources page for needing analysis, feature database by Multiple condition code compositions, condition code includes:Host, page-size, the page of https request URLs are comprising in resource content, resource Hold size, dynamic resource information, embedded one of URLs and quantity or combination;

Condition code matching unit, the https message datas for accessing user Internet resources are analyzed one by one, extract special Reference cease, with condition code the matching analysis;

Behavior reduction unit, for the daily record of characteristic information extraction to be matched with the condition code in content characteristic storehouse, reduction User truly accesses behavior, and is further analyzed and counts.

Preferably, the feature database sets up unit, required for being crawled by crawler technology for the website for needing to analyze Each webpage of analysis, Web page feature base is set up according to the data for crawling webpage.

Preferably, described document information matching unit, the characteristic information of extraction is selected from following:

Access the Host/Domain of URL;

The total length of the uncached part of https requests for page;

Uncached picture or CSS load the quantity of resource in https requests for page;

The size of each resource object of page loading;

The time that https requests occur.

Preferably, described document information matching unit, is further used for one or more characteristic informations combination shape based on more than Into one or more characteristic fingerprints, https is accessed by user in the range of certain hour and asks to determine user access path.

Preferably, the behavior reduction unit, by the condition code in the daily record of characteristic information extraction and content characteristic storehouse Matching is chosen in particular from following method:

By fingerprint combination unique match;

If cannot by fingerprint combination unique match when, can by access during the webpage resource of loading simultaneously or URL sequences many condition is matched;

The 3-5 contents of object that can must be loaded every time is obtained from the page, while obtaining the size of these contents of object With host information, the host information and object size for accessing object sequence according to each loading page carries out as finger print information Match somebody with somebody.

The program is main by following characteristics:

1st, need not increase additional investment, including change network structure or increase computing resource, based on existing data and set It is standby to complete;

2nd, the data analysis and original http daily records after reduction user behavior are essentially identical, protect the throwing of original analysis system Enter;

3rd, user behavior reduction granularity can be determined according to practical business demand, to reduce the exploitation and maintenance of feature database Cost.

It should be noted that for above method embodiment, in order to be briefly described, therefore it is all expressed as a series of Combination of actions, but those skilled in the art should know, the application is not limited by described sequence of movement because According to the application, some steps can sequentially or simultaneously be carried out using other.Secondly, those skilled in the art should also know Know, embodiment described in this description belongs to preferred embodiment, involved action and module not necessarily the application It is necessary.

It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program Product.Therefore, the application can be using the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.

And, the application can be used and can use in one or more computers for wherein including computer usable program code The computer program product implemented on storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Form.

Finally it should be noted that:The preferred embodiments of the present invention are the foregoing is only, are not intended to limit the invention, Although being described in detail to the present invention with reference to the foregoing embodiments, for a person skilled in the art, it still may be used Modified with to the technical scheme described in foregoing embodiments, or equivalent is carried out to which part technical characteristic. All any modification, equivalent substitution and improvements within the spirit and principles in the present invention, made etc., should be included in of the invention Within protection domain.

Claims (10)

1. under a kind of https environment user behavior analysis method, it is characterised in that including:
Step 1) content characteristic storehouse is set up to the Internet resources page that needs are analyzed, feature database is made up of multiple condition codes, special Levying code includes:The Host of https request URLs, page-size, the page include resource content, resource content size, dynamic resource letter Breath, embedded one of URLs and quantity or combination;
Step 2) to user access Internet resources https message datas analyze one by one, characteristic information extraction, with condition code The matching analysis;
Step 3) daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse, also original subscriber truly accesses row For, and be further analyzed and count.
2. under https environment according to claim 1 user behavior analysis method, it is characterised in that step 1) in, pin Each webpage that website to needing analysis is analyzed required for being crawled by crawler technology, net is set up according to the data for crawling webpage Page feature database.
3. under https environment according to claim 1 and 2 user behavior analysis method, it is characterised in that step 2) In, the characteristic information of extraction is selected from following:
Access the Host/Domain of URL;
The total length of the uncached part of https requests for page;
Uncached picture or CSS load the quantity of resource in https requests for page;
The size of each resource object of page loading;
The time that https requests occur.
4. under https environment according to claim 3 user behavior analysis method, it is characterised in that step 2) in, base One or more characteristic informations combine to form one or more characteristic fingerprints more than, are accessed by user in the range of certain hour Https requests determine user access path.
5. under https environment according to claim 1 user behavior analysis method, it is characterised in that step 3) in will The daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse and is chosen in particular from following method:
By fingerprint combination unique match;
If cannot by fingerprint combination unique match when, can be by accessing during the webpage resource or URL sequences of loading simultaneously Row many condition is matched;
The contents of object that 3-5 can must be loaded every time is obtained from the page, at the same obtain these contents of object size and Host information, the host information and object size for accessing object sequence according to each loading page is carried out as finger print information Match somebody with somebody.
6. under a kind of https environment user behavior analysis system, it is characterised in that including:
Feature database sets up unit, and for setting up content characteristic storehouse to the Internet resources page for needing analysis, feature database is by multiple Condition code is constituted, and condition code includes:The Host of https request URLs, page-size, the page are big comprising resource content, resource content Small, dynamic resource information, embedded one of URLs and quantity or combination;
Condition code matching unit, the https message datas for accessing user Internet resources are analyzed one by one, extract feature letter Breath, with condition code the matching analysis;
Behavior reduction unit, for the daily record of characteristic information extraction to be matched with the condition code in content characteristic storehouse, goes back original subscriber It is true to access behavior, and be further analyzed and count.
7. under https environment according to claim 6 user behavior analysis system, it is characterised in that the feature database Unit is set up, each webpage of analysis required for being crawled by crawler technology for the website for needing analysis, according to crawling webpage Data set up Web page feature base.
8. under the https environment according to claim 6 or 7 user behavior analysis system, it is characterised in that the feature Code matching unit, the characteristic information of extraction is selected from following:
Access the Host/Domain of URL;
The total length of the uncached part of https requests for page;
Uncached picture or CSS load the quantity of resource in https requests for page;
The size of each resource object of page loading;
The time that https requests occur.
9. under https environment according to claim 8 user behavior analysis system, it is characterised in that described document information Matching unit, is further used for one or more characteristic informations based on more than and combines to form one or more characteristic fingerprints, by one User accesses https request determination user access paths in the range of fixing time.
10. under https environment according to claim 6 user behavior analysis system, it is characterised in that the behavior is also Former unit, the daily record of characteristic information extraction is matched with the condition code in content characteristic storehouse and is chosen in particular from following method:
By fingerprint combination unique match;
If cannot by fingerprint combination unique match when, can be by accessing during the webpage resource or URL sequences of loading simultaneously Row many condition is matched;
The contents of object that 3-5 can must be loaded every time is obtained from the page, at the same obtain these contents of object size and Host information, the host information and object size for accessing object sequence according to each loading page is carried out as finger print information Match somebody with somebody.
CN201710122538.3A 2017-03-03 2017-03-03 The method and system of user behavior analysis under a kind of https environment CN106878438A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710122538.3A CN106878438A (en) 2017-03-03 2017-03-03 The method and system of user behavior analysis under a kind of https environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710122538.3A CN106878438A (en) 2017-03-03 2017-03-03 The method and system of user behavior analysis under a kind of https environment

Publications (1)

Publication Number Publication Date
CN106878438A true CN106878438A (en) 2017-06-20

Family

ID=59169594

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710122538.3A CN106878438A (en) 2017-03-03 2017-03-03 The method and system of user behavior analysis under a kind of https environment

Country Status (1)

Country Link
CN (1) CN106878438A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101808093A (en) * 2010-03-15 2010-08-18 北京安天电子设备有限公司 System and method for automatically detecting WEB security
CN102143224A (en) * 2011-01-25 2011-08-03 张金海 Mobile phone Internet accessing-based user behavior analysis method and device
CN103077356A (en) * 2013-01-11 2013-05-01 中国地质大学(武汉) Protecting and tracking method for primary information of mobile terminal based on user behavior pattern
CN103561004A (en) * 2013-10-22 2014-02-05 西安交通大学 Cooperative type active defense system based on honey nets
CN106161091A (en) * 2016-07-13 2016-11-23 久远谦长(北京)技术服务有限公司 A kind of method and system adding up Internet user's behavior
US20160381166A1 (en) * 2011-12-23 2016-12-29 Akamai Technologies, Inc. Assessment of content delivery services using performance measurements from within an end user client application

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101808093A (en) * 2010-03-15 2010-08-18 北京安天电子设备有限公司 System and method for automatically detecting WEB security
CN102143224A (en) * 2011-01-25 2011-08-03 张金海 Mobile phone Internet accessing-based user behavior analysis method and device
US20160381166A1 (en) * 2011-12-23 2016-12-29 Akamai Technologies, Inc. Assessment of content delivery services using performance measurements from within an end user client application
CN103077356A (en) * 2013-01-11 2013-05-01 中国地质大学(武汉) Protecting and tracking method for primary information of mobile terminal based on user behavior pattern
CN103561004A (en) * 2013-10-22 2014-02-05 西安交通大学 Cooperative type active defense system based on honey nets
CN106161091A (en) * 2016-07-13 2016-11-23 久远谦长(北京)技术服务有限公司 A kind of method and system adding up Internet user's behavior

Similar Documents

Publication Publication Date Title
Van Panhuis et al. A systematic review of barriers to data sharing in public health
US10044730B1 (en) Methods, systems, and articles of manufacture for implementing adaptive levels of assurance in a financial management system
JP6068506B2 (en) System and method for dynamic scoring of online fraud detection
Conradie et al. Exploring process barriers to release public sector information in local government
US9898595B2 (en) Monetized online content systems and methods and computer-readable media for processing requests for the same
US10210321B2 (en) Digital identity
Das et al. Creating meaningful data from web logs for improving the impressiveness of a website by using path analysis method
US10394902B2 (en) Creating rules for use in third-party tag management systems
JP2016129038A (en) Method and apparatus for processing multi-step authentication sequence
US8165078B2 (en) System and method for controlling use of a network resource
US9648496B2 (en) Authentication of web content
WO2016128569A1 (en) Digital identity system
US9412115B2 (en) Configuring tags to monitor other webpage tags in a tag management system
CN101404014B (en) Methods and systems for creating and updating approved-file and trusted-domain databases
CN101582887B (en) Safety protection method, gateway device and safety protection system
Woodside et al. Blockchain technology adoption status and strategies
Foltz Inhabiting the earth: Heidegger, environmental ethics, and the metaphysics of nature
US8548920B2 (en) System and method of authentication, monitoring, and advertisement distribution
JP4884243B2 (en) Method and apparatus for caching private data for a configurable period
US8918895B2 (en) Prevention of information leakage from a document based on dynamic database label based access control (LBAC) policies
ES2679286T3 (en) Distinguish valid users of robots, OCR and third-party solvers when CAPTCHA is presented
US10178105B2 (en) System for providing levels of security access to a process data network
WO2016173200A1 (en) Malicious website detection method and system
US9443104B2 (en) Tokenization of structured data
US9613156B2 (en) Cookie information sharing method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination