CN108023779A - A kind of method and system based on network traffic analysis user behavior - Google Patents

A kind of method and system based on network traffic analysis user behavior Download PDF

Info

Publication number
CN108023779A
CN108023779A CN201711384465.1A CN201711384465A CN108023779A CN 108023779 A CN108023779 A CN 108023779A CN 201711384465 A CN201711384465 A CN 201711384465A CN 108023779 A CN108023779 A CN 108023779A
Authority
CN
China
Prior art keywords
network
user
user behavior
behavioural characteristic
behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711384465.1A
Other languages
Chinese (zh)
Inventor
李旭阳
杨赵勇
姚中凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Cloud Screen Technology Co Ltd
Original Assignee
Hangzhou Cloud Screen Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Cloud Screen Technology Co Ltd filed Critical Hangzhou Cloud Screen Technology Co Ltd
Priority to CN201711384465.1A priority Critical patent/CN108023779A/en
Publication of CN108023779A publication Critical patent/CN108023779A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/06Generation of reports
    • H04L43/062Generation of reports related to network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of method and system based on network traffic analysis user behavior, the network traffics to be communicated by obtaining between subscription client and application server, network traffics include the response contents that the network request of subscription client transmission and/or application server return;The behavioural characteristic storehouse pre-established is called, the agenda of active user is identified according to network traffics, generates user behavior data.Method and system based on network traffic analysis user behavior provided herein, network traffics can be analyzed automatically by behavioural characteristic storehouse, identify the behavior description that user is appreciated that, specifically include subscriber identity information, the related data information involved by behavior, it can be used for analyzing customer access network custom, judge network failure, optimization Internet resources distribution, there is more wide application prospect.

Description

A kind of method and system based on network traffic analysis user behavior
Technical field
The present invention relates to field of communication technology, more particularly to a kind of method based on network traffic analysis user behavior and System.
Background technology
With the development of internet and the popularization of computer, the quantity rapid development of the network user, network behavior gradually into For one of most important social phenomenon in human behavior, the depth development of internet causes network traffic to roll up, and uses The frequency that family accesses Network also steeply rises, and there is an urgent need for the behavior to the network user effectively to be identified.
Some conventional gateway devices can identify the behavior of user to a certain extent by analyzing network amount, but usually It is merely able to the URL that record user accesses, it is impossible to makes specific behavior description, can not understand the relevant parameter in URL Into user it is appreciated that content.For example, user has given some sharing files to other users, in URL only comprising file ID and User's id information, and wish the content for the relevant document title and user's name paid close attention to and do not relate to.In consideration of it, provide a kind of The behavior description being appreciated that is analyzed from network traffics to be necessary.
The content of the invention
It is existing to solve the object of the present invention is to provide a kind of method and system based on network traffic analysis user behavior The problem of user's agenda describes cannot be analyzed in technology from network traffics.
In order to solve the above technical problems, the present invention provides a kind of method based on network traffic analysis user behavior, including:
The network traffics to communicate between subscription client and application server are obtained, the network traffics include described The response contents that the network request and/or application server that subscription client is sent return;
The behavioural characteristic storehouse pre-established is called, the agenda of active user, generation are identified according to the network traffics User behavior data.
Alternatively, the network traffics to communicate between subscription client and application server that obtain include:
Obtain what is communicated between subscription client and application server by way of flow agency or flow monitor Network traffics.
Alternatively, the reality called the behavioural characteristic storehouse pre-established, active user is identified according to the network traffics Border behavior, generation user behavior data include:
Rule is obtained according to default user identity in the behavioural characteristic storehouse, obtains the row of user in the network request For people's identity information and authentication information.
Alternatively, in the behavioural characteristic storehouse called and pre-established, identify active user's according to the network traffics Agenda, generation user behavior data further include afterwards:
Judge whether the agenda needs to be prevented from;
If it is, according to rule of response after default prevention in the behavioural characteristic storehouse, determine and the user client The corresponding push prompt message of type at end, is shown to push to the subscription client.
Alternatively, the reality called the behavioural characteristic storehouse pre-established, active user is identified according to the network traffics Border behavior, generation user behavior data include:
Rule is obtained according to default behavioral data in the behavioural characteristic storehouse, actual row is captured from the response contents For related data, generate user behavior data.
Alternatively, the reality called the behavioural characteristic storehouse pre-established, active user is identified according to the network traffics Border behavior, generation user behavior data include:
Request rule is initiated according to default active in the behavioural characteristic storehouse, utilizes the authentication information, active Specific request is initiated to the application server, obtains extra behavioral data, generates user behavior data.
Alternatively, further include:
According to default Additional Verification rule in the behavioural characteristic storehouse, planted when responding the request of the subscription client Enter extra certification cookie, to be tracked to the user identity of follow-up behavior.
Present invention also offers a kind of system based on network traffic analysis user behavior, including:
Acquisition module, for obtaining the network traffics to communicate between subscription client and application server, the net Network flow includes the response contents that the network request of subscription client transmission and/or application server return;
Generation module, for calling the behavioural characteristic storehouse pre-established, identifies active user's according to the network traffics Agenda, generates user behavior data.
Alternatively, further include:
Respond module, for judging whether the agenda needs to be prevented from;If it is, according to the behavioural characteristic Rule of response after default prevention in storehouse, determines push prompt message corresponding with the type of the subscription client, to push away Send to the subscription client and shown.
Alternatively, further include:
Tracing module, for according to default Additional Verification rule in the behavioural characteristic storehouse, responding the user visitor Extra certification cookie is implanted into during the request at family end, to be tracked to the user identity of follow-up behavior.
Method and system provided by the present invention based on network traffic analysis user behavior, by obtaining subscription client The network traffics to communicate between application server, network traffics include subscription client send network request and/or The response contents that application server returns;The behavioural characteristic storehouse pre-established is called, identifies active user's according to network traffics Agenda, generates user behavior data.Method and system based on network traffic analysis user behavior provided herein, Network traffics can be analyzed automatically by behavioural characteristic storehouse, identify the behavior description that user is appreciated that, specific bag Subscriber identity information, the related data information involved by behavior are included, can be used for analyzing customer access network custom, judge net Network failure, optimization Internet resources distribution, have more wide application prospect.
Brief description of the drawings
, below will be to embodiment or existing for the clearer explanation embodiment of the present invention or the technical solution of the prior art Attached drawing is briefly described needed in technology description, it should be apparent that, drawings in the following description are only this hair Some bright embodiments, for those of ordinary skill in the art, without creative efforts, can be with root Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of embodiment of the method provided by the present invention based on network traffic analysis user behavior Flow chart;
Fig. 2 is another embodiment of the method provided by the present invention based on network traffic analysis user behavior Schematic diagram;
Fig. 3 is another embodiment of the method provided by the present invention based on network traffic analysis user behavior Flow chart;
Fig. 4 is the structure diagram of the system provided in an embodiment of the present invention based on network traffic analysis user behavior.
Embodiment
In order to make those skilled in the art more fully understand the present invention program, with reference to the accompanying drawings and detailed description The present invention is described in further detail.Obviously, described embodiment is only part of the embodiment of the present invention, rather than Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Lower all other embodiments obtained, belong to the scope of protection of the invention.
A kind of flow of embodiment of method provided by the present invention based on network traffic analysis user behavior Figure is as shown in Figure 1, this method includes:
Step S101:Obtain the network traffics to communicate between subscription client and application server, the network flow Amount includes the response contents that the network request of the subscription client transmission and/or application server return;
Obtain what is communicated between subscription client and application server by way of flow agency or flow monitor Network traffics.
Step S102:The behavioural characteristic storehouse pre-established is called, the reality of active user is identified according to the network traffics Behavior, generates user behavior data.
Specifically, behavioural characteristic storehouse is the database pre-established in the embodiment of the present invention, which defines Activity recognition rule Then, user identity obtains rule, behavioral data obtains a systems such as the rule of response that regular, active is initiated after request rule, prevention Row rule.Each rule-like in behavior feature database, can be identified the specific access behavior of user.The behavior is special Sign storehouse can be that system default sets to obtain, and can also voluntarily set to obtain according to actual conditions by user, running certainly Real-time update can also be carried out according to actual conditions in journey, this does not influence the realization of the present invention.
The response contents that network request, the application server sent according to subscription client returns, Behavior-based control feature database Defined in series of rules, can therefrom obtain the behavioral data of user.It is pointed out that the user's behavioral data is true Real user behavior, be one will understand that information description.For example, user uploads file this event, the prior art is only The id information of user, the address information uploaded can be obtained, and can clearly be known using the present invention:" some particular user Any information is uploaded where " this particular content.
As a kind of embodiment, the data of user behavior are generated in the embodiment of the present invention to be included:According to institute State default user identity in behavioural characteristic storehouse and obtain rule, obtain involved party's identity information of user in the network request with And authentication information.The prior art can only identify user identity based on IP, it is impossible to navigate to the account of user on this system Family information, and the embodiment of the present invention can associate user behavior with user account, according to user account come affirming conduct The true identity of people.
As a kind of embodiment, the data of user behavior are generated in the embodiment of the present invention to be included:According to Default behavioral data obtains rule in the behavioural characteristic storehouse, and the dependency number of agenda is captured from the response contents According to generation user behavior data.For example, user has browsed an article, in the prior art only can until the ID of this article, and The application can grab the other informations such as the title, content, date of this article from response contents, as user behavior number According to.And the content that these data, which are users, to be appreciated that, it is monitored easy to the concrete behavior to user.
In addition, the data of generation user behavior can also include:Initiated according to default active in the behavioural characteristic storehouse Request rule, using the authentication information, actively initiates specific request to the application server, obtains extra behavior Data, generate user behavior data.The present embodiment can be adapted in the case of not including enough information in response contents, pass through The user's ID authentication information acquired, actively goes to obtain user's associated description information to be accessed from application server, makees For user behavior data, it is monitored with the concrete behavior further to user.
In addition, further include:According to default Additional Verification rule in the behavioural characteristic storehouse, the user client is being responded Extra certification cookie is implanted into during the request at end, to be tracked to the user identity of follow-up behavior.
In the prior art, may result in the exception of client-side program when behavior is prevented from, user do not know there occurs What.It is provided by the present invention based on network traffic analysis user behavior in consideration of it, on the basis of any of the above-described embodiment Method, in the behavioural characteristic storehouse that calling pre-establishes, the agenda of active user is identified according to the network traffics, generates and uses The process responded to corresponding agenda is can further include after the behavioral data of family.Specifically include:Judge institute State whether agenda needs to be prevented from;If it is, according to rule of response after default prevention in the behavioural characteristic storehouse, really Fixed push prompt message corresponding with the type of the subscription client, is shown to push to the subscription client. Setting in this way, when behavior is prevented from, the rule that can be defined according to behavioural characteristic, into client end response customization Hold, so that client-side program can correctly handle prevention event.
When certain some user behavior is not allow, application server notification agent server goes to prevent the prior art, resistance A alarming page can have been ejected after only.But terminal does not meet with a response in some cases, situations such as the non-display alarm page, To avoid the generation of such case, the content that respond after being prevented in advance defined in behavioural characteristic storehouse, so that after prevention Push to client to be shown, to allow client to understand the prevention behavior occurred, the use of more convenient user, improves use The usage experience at family.
Method provided by the present invention based on network traffic analysis user behavior, by obtaining subscription client and application The network traffics to communicate between server, network traffics include the network request and/or application clothes that subscription client is sent The response contents that business device returns;The behavioural characteristic storehouse pre-established is called, the actual row of active user is identified according to network traffics To generate user behavior data.Method based on network traffic analysis user behavior provided herein, passes through behavioural characteristic Storehouse automatically can analyze network traffics, identify the behavior description that user is appreciated that, specifically include user identity letter Related data information involved by breath, behavior, can be accustomed to customer analysis customer access network, judge network failure, optimization Internet resources distribute, and have more wide application prospect.
With reference to the schematic diagram of Fig. 2 methods provided by the present invention based on network traffic analysis user behavior, below to this Another embodiment provided is invented to be described in detail.Such as Fig. 3 another specific implementations provided by the present invention Shown in mode flow chart, which includes:
Step S201:Subscription client sends request by proxy server;
Step S202:Proxy server will ask flow to be copied to behavioural analysis module;
Step S203:Behavioural analysis module levies storehouse to identify user behavior according to behavior, obtains the authentication in request Information and the relevant data of behavior;
Step S204:If behavior needs are prevented from, behavioural analysis module is by according to the rule defined in behavioural characteristic Response data is generated, subscription client is transmitted to by agency;Otherwise agency can ask user to be given to application server;
Step S205:Response contents are transmitted to agency by application server;
Step S206:Response contents are transmitted to behavioural analysis module by agency as needed after receiving response;
Step S207:Behavioural analysis module captures relevant according to the rule defined in behavioural characteristic storehouse from response contents Behavioral data;
Step S208:Behavioural analysis module utilizes the use obtained in step S203 according to the rule defined in behavioural characteristic storehouse Family authentication actively initiates specific request to application server to obtain extra behavioral data;
Step S209:Generation one is extra as needed according to the rule defined in behavioural characteristic storehouse for behavioural analysis module Certification Cookie, is implanted in response by agency;
Step S210:Response is transmitted to subscription client by agency.
The application can usage behavior feature database analyze network traffics, identify user behavior.And can be by user Behavior is associated with user account, and user identity is determined according to user account.The rule that can also be defined according to behavioural characteristic Then, the relevant data message of behavior is accurately obtained from network amount;The rule that can be defined according to behavioural characteristic, from network traffics Middle acquisition authenticating user identification, and new request is constructed to obtain more behavior related datas using authenticating user identification. The rule defined according to behavioural characteristic, new Cookie can be implanted into the request at customer in response end, to follow the trail of follow-up behavior User identity.When behavior is prevented from, the rule that can be defined according to behavioural characteristic, the content customized to client end response, So that client-side program can correctly handle prevention event.
The system provided in an embodiment of the present invention based on network traffic analysis user behavior is introduced below, is hereafter retouched The system based on network traffic analysis user behavior stated with it is above-described based on network traffic analysis user behavior can phase Mutually to should refer to.
Fig. 4 be the system provided in an embodiment of the present invention based on network traffic analysis user behavior structure diagram, reference Systems of the Fig. 4 based on network traffic analysis user behavior can include:
Acquisition module 100, it is described for obtaining the network traffics to communicate between subscription client and application server Network traffics include the response contents that the network request of subscription client transmission and/or application server return;
Generation module 200, for calling the behavioural characteristic storehouse pre-established, active user is identified according to the network traffics Agenda, generate user behavior data.
As a kind of embodiment, the system provided by the present invention based on network traffic analysis user behavior may be used also To further comprise:
Respond module, for judging whether the agenda needs to be prevented from;If it is, according to the behavioural characteristic Rule of response after default prevention in storehouse, determines push prompt message corresponding with the type of the subscription client, to push away Send to the subscription client and shown.
As a kind of embodiment, the system provided by the present invention based on network traffic analysis user behavior may be used also To further comprise:
Tracing module, for according to default Additional Verification rule in the behavioural characteristic storehouse, responding the user visitor Extra certification cookie is implanted into during the request at family end, to be tracked to the user identity of follow-up behavior.
The system based on network traffic analysis user behavior of the present embodiment is used for realization foregoing based on network traffics point The method for analysing user behavior, therefore the embodiment in the system based on network traffic analysis user behavior is visible hereinbefore The method based on network traffic analysis user behavior embodiment part, for example, acquisition module 100, generation module 200, point Step S101, S102 in the above-mentioned method based on network traffic analysis user behavior are not used for realization, so, its specific embodiment party Formula is referred to the description of corresponding various pieces embodiment, and details are not described herein.
System provided by the present invention based on network traffic analysis user behavior, by obtaining subscription client and application The network traffics to communicate between server, network traffics include the network request and/or application clothes that subscription client is sent The response contents that business device returns;The behavioural characteristic storehouse pre-established is called, the actual row of active user is identified according to network traffics To generate user behavior data.System based on network traffic analysis user behavior provided herein, passes through behavioural characteristic Storehouse automatically can analyze network traffics, identify the behavior description that user is appreciated that, specifically include user identity letter Related data information involved by breath, behavior, can be used for analyzing customer access network custom, judges network failure, optimization Internet resources distribute, and have more wide application prospect.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be with it is other The difference of embodiment, between each embodiment same or similar part mutually referring to.For dress disclosed in embodiment For putting, since it is corresponded to the methods disclosed in the examples, so description is fairly simple, related part is referring to method part Explanation.
Professional further appreciates that, with reference to each exemplary unit of the embodiments described herein description And algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware and The interchangeability of software, generally describes each exemplary composition and step according to function in the above description.These Function is performed with hardware or software mode actually, application-specific and design constraint depending on technical solution.Specialty Technical staff can realize described function to each specific application using distinct methods, but this realization should not Think beyond the scope of this invention.
Can directly it be held with reference to the step of method or algorithm that the embodiments described herein describes with hardware, processor Capable software module, or the two combination are implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.
Detailed Jie has been carried out to the method and system provided by the present invention based on network traffic analysis user behavior above Continue.Specific case used herein is set forth the principle of the present invention and embodiment, and the explanation of above example is only It is the method and its core concept for being used to help understand the present invention.It should be pointed out that for those skilled in the art For, without departing from the principle of the present invention, some improvement and modification can also be carried out to the present invention, these improve and repair Decorations are also fallen into the protection domain of the claims in the present invention.

Claims (10)

  1. A kind of 1. method based on network traffic analysis user behavior, it is characterised in that including:
    The network traffics to communicate between subscription client and application server are obtained, the network traffics include the user The response contents that the network request and/or application server that client is sent return;
    The behavioural characteristic storehouse pre-established is called, the agenda of active user is identified according to the network traffics, generates user Behavioral data.
  2. 2. the method as claimed in claim 1 based on network traffic analysis user behavior, it is characterised in that the acquisition user The network traffics to communicate between client and application server include:
    The network to communicate between subscription client and application server is obtained by way of flow agency or flow monitor Flow.
  3. 3. the method as claimed in claim 1 based on network traffic analysis user behavior, it is characterised in that described to call in advance The behavioural characteristic storehouse of foundation, the agenda of active user is identified according to the network traffics, and generation user behavior data includes:
    Rule is obtained according to default user identity in the behavioural characteristic storehouse, obtains the involved party of user in the network request Identity information and authentication information.
  4. 4. such as method of the claims 1 to 3 any one of them based on network traffic analysis user behavior, it is characterised in that It is described to call the behavioural characteristic storehouse pre-established, the agenda of active user is identified according to the network traffics, generates user Further included after behavioral data:
    Judge whether the agenda needs to be prevented from;
    If it is, according to rule of response after default prevention in the behavioural characteristic storehouse, determine and the subscription client The corresponding push prompt message of type, is shown to push to the subscription client.
  5. 5. the method as claimed in claim 4 based on network traffic analysis user behavior, it is characterised in that described to call in advance The behavioural characteristic storehouse of foundation, the agenda of active user is identified according to the network traffics, and generation user behavior data includes:
    Rule is obtained according to default behavioral data in the behavioural characteristic storehouse, agenda is captured from the response contents Related data, generates user behavior data.
  6. 6. the method as claimed in claim 3 based on network traffic analysis user behavior, it is characterised in that described to call in advance The behavioural characteristic storehouse of foundation, the agenda of active user is identified according to the network traffics, and generation user behavior data includes:
    Request rule is initiated according to default active in the behavioural characteristic storehouse, using the authentication information, actively to institute State application server and initiate specific request, obtain extra behavioral data, generate user behavior data.
  7. 7. the method as claimed in claim 1 or 2 based on network traffic analysis user behavior, it is characterised in that further include:
    According to default Additional Verification rule in the behavioural characteristic storehouse, volume is implanted into when responding the request of the subscription client Outer certification cookie, to be tracked to the user identity of follow-up behavior.
  8. A kind of 8. system based on network traffic analysis user behavior, it is characterised in that including:
    Acquisition module, for obtaining the network traffics to communicate between subscription client and application server, the network flow Amount includes the response contents that the network request of the subscription client transmission and/or application server return;
    Generation module, for calling the behavioural characteristic storehouse pre-established, the reality of active user is identified according to the network traffics Behavior, generates user behavior data.
  9. 9. the system as claimed in claim 8 based on network traffic analysis user behavior, it is characterised in that further include:
    Respond module, for judging whether the agenda needs to be prevented from;If it is, according in the behavioural characteristic storehouse Rule of response after default prevention, determines push prompt message corresponding with the type of the subscription client, to push to The subscription client is shown.
  10. 10. the system as claimed in claim 8 based on network traffic analysis user behavior, it is characterised in that further include:
    Tracing module, for according to default Additional Verification rule in the behavioural characteristic storehouse, responding the subscription client Request when be implanted into extra certification cookie, to be tracked to the user identity of follow-up behavior.
CN201711384465.1A 2017-12-20 2017-12-20 A kind of method and system based on network traffic analysis user behavior Pending CN108023779A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711384465.1A CN108023779A (en) 2017-12-20 2017-12-20 A kind of method and system based on network traffic analysis user behavior

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711384465.1A CN108023779A (en) 2017-12-20 2017-12-20 A kind of method and system based on network traffic analysis user behavior

Publications (1)

Publication Number Publication Date
CN108023779A true CN108023779A (en) 2018-05-11

Family

ID=62074242

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711384465.1A Pending CN108023779A (en) 2017-12-20 2017-12-20 A kind of method and system based on network traffic analysis user behavior

Country Status (1)

Country Link
CN (1) CN108023779A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112367406A (en) * 2020-11-19 2021-02-12 全知科技(杭州)有限责任公司 Method for identifying account behavior analysis corresponding account correlation attribute in web application system
CN113609362A (en) * 2021-07-14 2021-11-05 上海德衡数据科技有限公司 Data management method and system based on 5G

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102185762A (en) * 2011-04-19 2011-09-14 北京网康科技有限公司 Equipment for recognizing, extracting and processing user data sending behavior
CN102387135A (en) * 2011-09-29 2012-03-21 北京邮电大学 User identity filtering method and firewall
US20140136608A1 (en) * 2012-11-15 2014-05-15 Tencent Technology (Shenzhen) Company Limited Method, device and system for processing client environment data
CN104410533A (en) * 2014-12-17 2015-03-11 乐山师范学院 Network user behavior identification system
CN104506644A (en) * 2014-12-30 2015-04-08 北京奇虎科技有限公司 Method, device and mobile terminal for accessing network data
CN105049456A (en) * 2015-08-28 2015-11-11 中国科学技术大学苏州研究院 Covert communication method based on webpage link request
CN105282181A (en) * 2014-05-28 2016-01-27 中兴通讯股份有限公司 Education system and information interaction method thereof
CN105554098A (en) * 2015-12-14 2016-05-04 瑞斯康达科技发展股份有限公司 Device configuration method, server and system
CN106156628A (en) * 2015-04-16 2016-11-23 阿里巴巴集团控股有限公司 A kind of user behavior analysis method and device
CN106878438A (en) * 2017-03-03 2017-06-20 久远谦长(北京)技术服务有限公司 The method and system of user behavior analysis under a kind of https environment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102185762A (en) * 2011-04-19 2011-09-14 北京网康科技有限公司 Equipment for recognizing, extracting and processing user data sending behavior
CN102387135A (en) * 2011-09-29 2012-03-21 北京邮电大学 User identity filtering method and firewall
US20140136608A1 (en) * 2012-11-15 2014-05-15 Tencent Technology (Shenzhen) Company Limited Method, device and system for processing client environment data
CN105282181A (en) * 2014-05-28 2016-01-27 中兴通讯股份有限公司 Education system and information interaction method thereof
CN104410533A (en) * 2014-12-17 2015-03-11 乐山师范学院 Network user behavior identification system
CN104506644A (en) * 2014-12-30 2015-04-08 北京奇虎科技有限公司 Method, device and mobile terminal for accessing network data
CN106156628A (en) * 2015-04-16 2016-11-23 阿里巴巴集团控股有限公司 A kind of user behavior analysis method and device
CN105049456A (en) * 2015-08-28 2015-11-11 中国科学技术大学苏州研究院 Covert communication method based on webpage link request
CN105554098A (en) * 2015-12-14 2016-05-04 瑞斯康达科技发展股份有限公司 Device configuration method, server and system
CN106878438A (en) * 2017-03-03 2017-06-20 久远谦长(北京)技术服务有限公司 The method and system of user behavior analysis under a kind of https environment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112367406A (en) * 2020-11-19 2021-02-12 全知科技(杭州)有限责任公司 Method for identifying account behavior analysis corresponding account correlation attribute in web application system
CN113609362A (en) * 2021-07-14 2021-11-05 上海德衡数据科技有限公司 Data management method and system based on 5G
CN113609362B (en) * 2021-07-14 2024-04-12 上海德衡数据科技有限公司 Data management method and system based on 5G

Similar Documents

Publication Publication Date Title
US11233866B2 (en) Methods and apparatus to monitor online activity
US10257199B2 (en) Online privacy management system with enhanced automatic information detection
CN110798472B (en) Data leakage detection method and device
US8131861B2 (en) Method for cross-domain tracking of web site traffic
US8788617B2 (en) Cookies stored in a cloud computing environment
CN103443781B (en) Data deliver
Chen et al. The where and when of finding new friends: Analysis of a location-based social discovery network
CN104427519B (en) IP address ownership place management method and device
CN107092544A (en) monitoring method and device
CN107592346A (en) User classification method based on user behavior analysis
US20190289085A1 (en) System and method for tracking online user behavior across browsers or devices
CN113095875A (en) Message delivery effect statistical method and related device
CN107194009A (en) Determine the unique visitor of network site
EP2973192B1 (en) Online privacy management
CN108023779A (en) A kind of method and system based on network traffic analysis user behavior
CN106874293A (en) A kind of data processing method and device
CN109309664A (en) A kind of browser fingerprint detection behavior monitoring method
CN104992060A (en) User age estimation method and apparatus
US9723017B1 (en) Method, apparatus and computer program product for detecting risky communications
US11816694B2 (en) Techniques for managing advertisement attributions while preserving user privacy
CN108881275A (en) A kind of user accesses the method and system of compliance analysis
JP6322522B2 (en) Advertisement distribution system and program
CN108140200A (en) The assessment based on device integrality of user action associated with advertisement
CN109190342A (en) The owner's auth method and community server of intelligence community
EP3617893B1 (en) Device for managing utilized service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180511