CN108023779A - A kind of method and system based on network traffic analysis user behavior - Google Patents
A kind of method and system based on network traffic analysis user behavior Download PDFInfo
- Publication number
- CN108023779A CN108023779A CN201711384465.1A CN201711384465A CN108023779A CN 108023779 A CN108023779 A CN 108023779A CN 201711384465 A CN201711384465 A CN 201711384465A CN 108023779 A CN108023779 A CN 108023779A
- Authority
- CN
- China
- Prior art keywords
- network
- user
- user behavior
- behavioural characteristic
- behavior
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
- H04L43/062—Generation of reports related to network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/12—Network monitoring probes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/14—Session management
- H04L67/146—Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a kind of method and system based on network traffic analysis user behavior, the network traffics to be communicated by obtaining between subscription client and application server, network traffics include the response contents that the network request of subscription client transmission and/or application server return;The behavioural characteristic storehouse pre-established is called, the agenda of active user is identified according to network traffics, generates user behavior data.Method and system based on network traffic analysis user behavior provided herein, network traffics can be analyzed automatically by behavioural characteristic storehouse, identify the behavior description that user is appreciated that, specifically include subscriber identity information, the related data information involved by behavior, it can be used for analyzing customer access network custom, judge network failure, optimization Internet resources distribution, there is more wide application prospect.
Description
Technical field
The present invention relates to field of communication technology, more particularly to a kind of method based on network traffic analysis user behavior and
System.
Background technology
With the development of internet and the popularization of computer, the quantity rapid development of the network user, network behavior gradually into
For one of most important social phenomenon in human behavior, the depth development of internet causes network traffic to roll up, and uses
The frequency that family accesses Network also steeply rises, and there is an urgent need for the behavior to the network user effectively to be identified.
Some conventional gateway devices can identify the behavior of user to a certain extent by analyzing network amount, but usually
It is merely able to the URL that record user accesses, it is impossible to makes specific behavior description, can not understand the relevant parameter in URL
Into user it is appreciated that content.For example, user has given some sharing files to other users, in URL only comprising file ID and
User's id information, and wish the content for the relevant document title and user's name paid close attention to and do not relate to.In consideration of it, provide a kind of
The behavior description being appreciated that is analyzed from network traffics to be necessary.
The content of the invention
It is existing to solve the object of the present invention is to provide a kind of method and system based on network traffic analysis user behavior
The problem of user's agenda describes cannot be analyzed in technology from network traffics.
In order to solve the above technical problems, the present invention provides a kind of method based on network traffic analysis user behavior, including:
The network traffics to communicate between subscription client and application server are obtained, the network traffics include described
The response contents that the network request and/or application server that subscription client is sent return;
The behavioural characteristic storehouse pre-established is called, the agenda of active user, generation are identified according to the network traffics
User behavior data.
Alternatively, the network traffics to communicate between subscription client and application server that obtain include:
Obtain what is communicated between subscription client and application server by way of flow agency or flow monitor
Network traffics.
Alternatively, the reality called the behavioural characteristic storehouse pre-established, active user is identified according to the network traffics
Border behavior, generation user behavior data include:
Rule is obtained according to default user identity in the behavioural characteristic storehouse, obtains the row of user in the network request
For people's identity information and authentication information.
Alternatively, in the behavioural characteristic storehouse called and pre-established, identify active user's according to the network traffics
Agenda, generation user behavior data further include afterwards:
Judge whether the agenda needs to be prevented from;
If it is, according to rule of response after default prevention in the behavioural characteristic storehouse, determine and the user client
The corresponding push prompt message of type at end, is shown to push to the subscription client.
Alternatively, the reality called the behavioural characteristic storehouse pre-established, active user is identified according to the network traffics
Border behavior, generation user behavior data include:
Rule is obtained according to default behavioral data in the behavioural characteristic storehouse, actual row is captured from the response contents
For related data, generate user behavior data.
Alternatively, the reality called the behavioural characteristic storehouse pre-established, active user is identified according to the network traffics
Border behavior, generation user behavior data include:
Request rule is initiated according to default active in the behavioural characteristic storehouse, utilizes the authentication information, active
Specific request is initiated to the application server, obtains extra behavioral data, generates user behavior data.
Alternatively, further include:
According to default Additional Verification rule in the behavioural characteristic storehouse, planted when responding the request of the subscription client
Enter extra certification cookie, to be tracked to the user identity of follow-up behavior.
Present invention also offers a kind of system based on network traffic analysis user behavior, including:
Acquisition module, for obtaining the network traffics to communicate between subscription client and application server, the net
Network flow includes the response contents that the network request of subscription client transmission and/or application server return;
Generation module, for calling the behavioural characteristic storehouse pre-established, identifies active user's according to the network traffics
Agenda, generates user behavior data.
Alternatively, further include:
Respond module, for judging whether the agenda needs to be prevented from;If it is, according to the behavioural characteristic
Rule of response after default prevention in storehouse, determines push prompt message corresponding with the type of the subscription client, to push away
Send to the subscription client and shown.
Alternatively, further include:
Tracing module, for according to default Additional Verification rule in the behavioural characteristic storehouse, responding the user visitor
Extra certification cookie is implanted into during the request at family end, to be tracked to the user identity of follow-up behavior.
Method and system provided by the present invention based on network traffic analysis user behavior, by obtaining subscription client
The network traffics to communicate between application server, network traffics include subscription client send network request and/or
The response contents that application server returns;The behavioural characteristic storehouse pre-established is called, identifies active user's according to network traffics
Agenda, generates user behavior data.Method and system based on network traffic analysis user behavior provided herein,
Network traffics can be analyzed automatically by behavioural characteristic storehouse, identify the behavior description that user is appreciated that, specific bag
Subscriber identity information, the related data information involved by behavior are included, can be used for analyzing customer access network custom, judge net
Network failure, optimization Internet resources distribution, have more wide application prospect.
Brief description of the drawings
, below will be to embodiment or existing for the clearer explanation embodiment of the present invention or the technical solution of the prior art
Attached drawing is briefly described needed in technology description, it should be apparent that, drawings in the following description are only this hair
Some bright embodiments, for those of ordinary skill in the art, without creative efforts, can be with root
Other attached drawings are obtained according to these attached drawings.
Fig. 1 is a kind of embodiment of the method provided by the present invention based on network traffic analysis user behavior
Flow chart;
Fig. 2 is another embodiment of the method provided by the present invention based on network traffic analysis user behavior
Schematic diagram;
Fig. 3 is another embodiment of the method provided by the present invention based on network traffic analysis user behavior
Flow chart;
Fig. 4 is the structure diagram of the system provided in an embodiment of the present invention based on network traffic analysis user behavior.
Embodiment
In order to make those skilled in the art more fully understand the present invention program, with reference to the accompanying drawings and detailed description
The present invention is described in further detail.Obviously, described embodiment is only part of the embodiment of the present invention, rather than
Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise
Lower all other embodiments obtained, belong to the scope of protection of the invention.
A kind of flow of embodiment of method provided by the present invention based on network traffic analysis user behavior
Figure is as shown in Figure 1, this method includes:
Step S101:Obtain the network traffics to communicate between subscription client and application server, the network flow
Amount includes the response contents that the network request of the subscription client transmission and/or application server return;
Obtain what is communicated between subscription client and application server by way of flow agency or flow monitor
Network traffics.
Step S102:The behavioural characteristic storehouse pre-established is called, the reality of active user is identified according to the network traffics
Behavior, generates user behavior data.
Specifically, behavioural characteristic storehouse is the database pre-established in the embodiment of the present invention, which defines Activity recognition rule
Then, user identity obtains rule, behavioral data obtains a systems such as the rule of response that regular, active is initiated after request rule, prevention
Row rule.Each rule-like in behavior feature database, can be identified the specific access behavior of user.The behavior is special
Sign storehouse can be that system default sets to obtain, and can also voluntarily set to obtain according to actual conditions by user, running certainly
Real-time update can also be carried out according to actual conditions in journey, this does not influence the realization of the present invention.
The response contents that network request, the application server sent according to subscription client returns, Behavior-based control feature database
Defined in series of rules, can therefrom obtain the behavioral data of user.It is pointed out that the user's behavioral data is true
Real user behavior, be one will understand that information description.For example, user uploads file this event, the prior art is only
The id information of user, the address information uploaded can be obtained, and can clearly be known using the present invention:" some particular user
Any information is uploaded where " this particular content.
As a kind of embodiment, the data of user behavior are generated in the embodiment of the present invention to be included:According to institute
State default user identity in behavioural characteristic storehouse and obtain rule, obtain involved party's identity information of user in the network request with
And authentication information.The prior art can only identify user identity based on IP, it is impossible to navigate to the account of user on this system
Family information, and the embodiment of the present invention can associate user behavior with user account, according to user account come affirming conduct
The true identity of people.
As a kind of embodiment, the data of user behavior are generated in the embodiment of the present invention to be included:According to
Default behavioral data obtains rule in the behavioural characteristic storehouse, and the dependency number of agenda is captured from the response contents
According to generation user behavior data.For example, user has browsed an article, in the prior art only can until the ID of this article, and
The application can grab the other informations such as the title, content, date of this article from response contents, as user behavior number
According to.And the content that these data, which are users, to be appreciated that, it is monitored easy to the concrete behavior to user.
In addition, the data of generation user behavior can also include:Initiated according to default active in the behavioural characteristic storehouse
Request rule, using the authentication information, actively initiates specific request to the application server, obtains extra behavior
Data, generate user behavior data.The present embodiment can be adapted in the case of not including enough information in response contents, pass through
The user's ID authentication information acquired, actively goes to obtain user's associated description information to be accessed from application server, makees
For user behavior data, it is monitored with the concrete behavior further to user.
In addition, further include:According to default Additional Verification rule in the behavioural characteristic storehouse, the user client is being responded
Extra certification cookie is implanted into during the request at end, to be tracked to the user identity of follow-up behavior.
In the prior art, may result in the exception of client-side program when behavior is prevented from, user do not know there occurs
What.It is provided by the present invention based on network traffic analysis user behavior in consideration of it, on the basis of any of the above-described embodiment
Method, in the behavioural characteristic storehouse that calling pre-establishes, the agenda of active user is identified according to the network traffics, generates and uses
The process responded to corresponding agenda is can further include after the behavioral data of family.Specifically include:Judge institute
State whether agenda needs to be prevented from;If it is, according to rule of response after default prevention in the behavioural characteristic storehouse, really
Fixed push prompt message corresponding with the type of the subscription client, is shown to push to the subscription client.
Setting in this way, when behavior is prevented from, the rule that can be defined according to behavioural characteristic, into client end response customization
Hold, so that client-side program can correctly handle prevention event.
When certain some user behavior is not allow, application server notification agent server goes to prevent the prior art, resistance
A alarming page can have been ejected after only.But terminal does not meet with a response in some cases, situations such as the non-display alarm page,
To avoid the generation of such case, the content that respond after being prevented in advance defined in behavioural characteristic storehouse, so that after prevention
Push to client to be shown, to allow client to understand the prevention behavior occurred, the use of more convenient user, improves use
The usage experience at family.
Method provided by the present invention based on network traffic analysis user behavior, by obtaining subscription client and application
The network traffics to communicate between server, network traffics include the network request and/or application clothes that subscription client is sent
The response contents that business device returns;The behavioural characteristic storehouse pre-established is called, the actual row of active user is identified according to network traffics
To generate user behavior data.Method based on network traffic analysis user behavior provided herein, passes through behavioural characteristic
Storehouse automatically can analyze network traffics, identify the behavior description that user is appreciated that, specifically include user identity letter
Related data information involved by breath, behavior, can be accustomed to customer analysis customer access network, judge network failure, optimization
Internet resources distribute, and have more wide application prospect.
With reference to the schematic diagram of Fig. 2 methods provided by the present invention based on network traffic analysis user behavior, below to this
Another embodiment provided is invented to be described in detail.Such as Fig. 3 another specific implementations provided by the present invention
Shown in mode flow chart, which includes:
Step S201:Subscription client sends request by proxy server;
Step S202:Proxy server will ask flow to be copied to behavioural analysis module;
Step S203:Behavioural analysis module levies storehouse to identify user behavior according to behavior, obtains the authentication in request
Information and the relevant data of behavior;
Step S204:If behavior needs are prevented from, behavioural analysis module is by according to the rule defined in behavioural characteristic
Response data is generated, subscription client is transmitted to by agency;Otherwise agency can ask user to be given to application server;
Step S205:Response contents are transmitted to agency by application server;
Step S206:Response contents are transmitted to behavioural analysis module by agency as needed after receiving response;
Step S207:Behavioural analysis module captures relevant according to the rule defined in behavioural characteristic storehouse from response contents
Behavioral data;
Step S208:Behavioural analysis module utilizes the use obtained in step S203 according to the rule defined in behavioural characteristic storehouse
Family authentication actively initiates specific request to application server to obtain extra behavioral data;
Step S209:Generation one is extra as needed according to the rule defined in behavioural characteristic storehouse for behavioural analysis module
Certification Cookie, is implanted in response by agency;
Step S210:Response is transmitted to subscription client by agency.
The application can usage behavior feature database analyze network traffics, identify user behavior.And can be by user
Behavior is associated with user account, and user identity is determined according to user account.The rule that can also be defined according to behavioural characteristic
Then, the relevant data message of behavior is accurately obtained from network amount;The rule that can be defined according to behavioural characteristic, from network traffics
Middle acquisition authenticating user identification, and new request is constructed to obtain more behavior related datas using authenticating user identification.
The rule defined according to behavioural characteristic, new Cookie can be implanted into the request at customer in response end, to follow the trail of follow-up behavior
User identity.When behavior is prevented from, the rule that can be defined according to behavioural characteristic, the content customized to client end response,
So that client-side program can correctly handle prevention event.
The system provided in an embodiment of the present invention based on network traffic analysis user behavior is introduced below, is hereafter retouched
The system based on network traffic analysis user behavior stated with it is above-described based on network traffic analysis user behavior can phase
Mutually to should refer to.
Fig. 4 be the system provided in an embodiment of the present invention based on network traffic analysis user behavior structure diagram, reference
Systems of the Fig. 4 based on network traffic analysis user behavior can include:
Acquisition module 100, it is described for obtaining the network traffics to communicate between subscription client and application server
Network traffics include the response contents that the network request of subscription client transmission and/or application server return;
Generation module 200, for calling the behavioural characteristic storehouse pre-established, active user is identified according to the network traffics
Agenda, generate user behavior data.
As a kind of embodiment, the system provided by the present invention based on network traffic analysis user behavior may be used also
To further comprise:
Respond module, for judging whether the agenda needs to be prevented from;If it is, according to the behavioural characteristic
Rule of response after default prevention in storehouse, determines push prompt message corresponding with the type of the subscription client, to push away
Send to the subscription client and shown.
As a kind of embodiment, the system provided by the present invention based on network traffic analysis user behavior may be used also
To further comprise:
Tracing module, for according to default Additional Verification rule in the behavioural characteristic storehouse, responding the user visitor
Extra certification cookie is implanted into during the request at family end, to be tracked to the user identity of follow-up behavior.
The system based on network traffic analysis user behavior of the present embodiment is used for realization foregoing based on network traffics point
The method for analysing user behavior, therefore the embodiment in the system based on network traffic analysis user behavior is visible hereinbefore
The method based on network traffic analysis user behavior embodiment part, for example, acquisition module 100, generation module 200, point
Step S101, S102 in the above-mentioned method based on network traffic analysis user behavior are not used for realization, so, its specific embodiment party
Formula is referred to the description of corresponding various pieces embodiment, and details are not described herein.
System provided by the present invention based on network traffic analysis user behavior, by obtaining subscription client and application
The network traffics to communicate between server, network traffics include the network request and/or application clothes that subscription client is sent
The response contents that business device returns;The behavioural characteristic storehouse pre-established is called, the actual row of active user is identified according to network traffics
To generate user behavior data.System based on network traffic analysis user behavior provided herein, passes through behavioural characteristic
Storehouse automatically can analyze network traffics, identify the behavior description that user is appreciated that, specifically include user identity letter
Related data information involved by breath, behavior, can be used for analyzing customer access network custom, judges network failure, optimization
Internet resources distribute, and have more wide application prospect.
Each embodiment is described by the way of progressive in this specification, what each embodiment stressed be with it is other
The difference of embodiment, between each embodiment same or similar part mutually referring to.For dress disclosed in embodiment
For putting, since it is corresponded to the methods disclosed in the examples, so description is fairly simple, related part is referring to method part
Explanation.
Professional further appreciates that, with reference to each exemplary unit of the embodiments described herein description
And algorithm steps, can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software, generally describes each exemplary composition and step according to function in the above description.These
Function is performed with hardware or software mode actually, application-specific and design constraint depending on technical solution.Specialty
Technical staff can realize described function to each specific application using distinct methods, but this realization should not
Think beyond the scope of this invention.
Can directly it be held with reference to the step of method or algorithm that the embodiments described herein describes with hardware, processor
Capable software module, or the two combination are implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
Detailed Jie has been carried out to the method and system provided by the present invention based on network traffic analysis user behavior above
Continue.Specific case used herein is set forth the principle of the present invention and embodiment, and the explanation of above example is only
It is the method and its core concept for being used to help understand the present invention.It should be pointed out that for those skilled in the art
For, without departing from the principle of the present invention, some improvement and modification can also be carried out to the present invention, these improve and repair
Decorations are also fallen into the protection domain of the claims in the present invention.
Claims (10)
- A kind of 1. method based on network traffic analysis user behavior, it is characterised in that including:The network traffics to communicate between subscription client and application server are obtained, the network traffics include the user The response contents that the network request and/or application server that client is sent return;The behavioural characteristic storehouse pre-established is called, the agenda of active user is identified according to the network traffics, generates user Behavioral data.
- 2. the method as claimed in claim 1 based on network traffic analysis user behavior, it is characterised in that the acquisition user The network traffics to communicate between client and application server include:The network to communicate between subscription client and application server is obtained by way of flow agency or flow monitor Flow.
- 3. the method as claimed in claim 1 based on network traffic analysis user behavior, it is characterised in that described to call in advance The behavioural characteristic storehouse of foundation, the agenda of active user is identified according to the network traffics, and generation user behavior data includes:Rule is obtained according to default user identity in the behavioural characteristic storehouse, obtains the involved party of user in the network request Identity information and authentication information.
- 4. such as method of the claims 1 to 3 any one of them based on network traffic analysis user behavior, it is characterised in that It is described to call the behavioural characteristic storehouse pre-established, the agenda of active user is identified according to the network traffics, generates user Further included after behavioral data:Judge whether the agenda needs to be prevented from;If it is, according to rule of response after default prevention in the behavioural characteristic storehouse, determine and the subscription client The corresponding push prompt message of type, is shown to push to the subscription client.
- 5. the method as claimed in claim 4 based on network traffic analysis user behavior, it is characterised in that described to call in advance The behavioural characteristic storehouse of foundation, the agenda of active user is identified according to the network traffics, and generation user behavior data includes:Rule is obtained according to default behavioral data in the behavioural characteristic storehouse, agenda is captured from the response contents Related data, generates user behavior data.
- 6. the method as claimed in claim 3 based on network traffic analysis user behavior, it is characterised in that described to call in advance The behavioural characteristic storehouse of foundation, the agenda of active user is identified according to the network traffics, and generation user behavior data includes:Request rule is initiated according to default active in the behavioural characteristic storehouse, using the authentication information, actively to institute State application server and initiate specific request, obtain extra behavioral data, generate user behavior data.
- 7. the method as claimed in claim 1 or 2 based on network traffic analysis user behavior, it is characterised in that further include:According to default Additional Verification rule in the behavioural characteristic storehouse, volume is implanted into when responding the request of the subscription client Outer certification cookie, to be tracked to the user identity of follow-up behavior.
- A kind of 8. system based on network traffic analysis user behavior, it is characterised in that including:Acquisition module, for obtaining the network traffics to communicate between subscription client and application server, the network flow Amount includes the response contents that the network request of the subscription client transmission and/or application server return;Generation module, for calling the behavioural characteristic storehouse pre-established, the reality of active user is identified according to the network traffics Behavior, generates user behavior data.
- 9. the system as claimed in claim 8 based on network traffic analysis user behavior, it is characterised in that further include:Respond module, for judging whether the agenda needs to be prevented from;If it is, according in the behavioural characteristic storehouse Rule of response after default prevention, determines push prompt message corresponding with the type of the subscription client, to push to The subscription client is shown.
- 10. the system as claimed in claim 8 based on network traffic analysis user behavior, it is characterised in that further include:Tracing module, for according to default Additional Verification rule in the behavioural characteristic storehouse, responding the subscription client Request when be implanted into extra certification cookie, to be tracked to the user identity of follow-up behavior.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711384465.1A CN108023779A (en) | 2017-12-20 | 2017-12-20 | A kind of method and system based on network traffic analysis user behavior |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711384465.1A CN108023779A (en) | 2017-12-20 | 2017-12-20 | A kind of method and system based on network traffic analysis user behavior |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108023779A true CN108023779A (en) | 2018-05-11 |
Family
ID=62074242
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711384465.1A Pending CN108023779A (en) | 2017-12-20 | 2017-12-20 | A kind of method and system based on network traffic analysis user behavior |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108023779A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112367406A (en) * | 2020-11-19 | 2021-02-12 | 全知科技(杭州)有限责任公司 | Method for identifying account behavior analysis corresponding account correlation attribute in web application system |
CN113609362A (en) * | 2021-07-14 | 2021-11-05 | 上海德衡数据科技有限公司 | Data management method and system based on 5G |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102185762A (en) * | 2011-04-19 | 2011-09-14 | 北京网康科技有限公司 | Equipment for recognizing, extracting and processing user data sending behavior |
CN102387135A (en) * | 2011-09-29 | 2012-03-21 | 北京邮电大学 | User identity filtering method and firewall |
US20140136608A1 (en) * | 2012-11-15 | 2014-05-15 | Tencent Technology (Shenzhen) Company Limited | Method, device and system for processing client environment data |
CN104410533A (en) * | 2014-12-17 | 2015-03-11 | 乐山师范学院 | Network user behavior identification system |
CN104506644A (en) * | 2014-12-30 | 2015-04-08 | 北京奇虎科技有限公司 | Method, device and mobile terminal for accessing network data |
CN105049456A (en) * | 2015-08-28 | 2015-11-11 | 中国科学技术大学苏州研究院 | Covert communication method based on webpage link request |
CN105282181A (en) * | 2014-05-28 | 2016-01-27 | 中兴通讯股份有限公司 | Education system and information interaction method thereof |
CN105554098A (en) * | 2015-12-14 | 2016-05-04 | 瑞斯康达科技发展股份有限公司 | Device configuration method, server and system |
CN106156628A (en) * | 2015-04-16 | 2016-11-23 | 阿里巴巴集团控股有限公司 | A kind of user behavior analysis method and device |
CN106878438A (en) * | 2017-03-03 | 2017-06-20 | 久远谦长(北京)技术服务有限公司 | The method and system of user behavior analysis under a kind of https environment |
-
2017
- 2017-12-20 CN CN201711384465.1A patent/CN108023779A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102185762A (en) * | 2011-04-19 | 2011-09-14 | 北京网康科技有限公司 | Equipment for recognizing, extracting and processing user data sending behavior |
CN102387135A (en) * | 2011-09-29 | 2012-03-21 | 北京邮电大学 | User identity filtering method and firewall |
US20140136608A1 (en) * | 2012-11-15 | 2014-05-15 | Tencent Technology (Shenzhen) Company Limited | Method, device and system for processing client environment data |
CN105282181A (en) * | 2014-05-28 | 2016-01-27 | 中兴通讯股份有限公司 | Education system and information interaction method thereof |
CN104410533A (en) * | 2014-12-17 | 2015-03-11 | 乐山师范学院 | Network user behavior identification system |
CN104506644A (en) * | 2014-12-30 | 2015-04-08 | 北京奇虎科技有限公司 | Method, device and mobile terminal for accessing network data |
CN106156628A (en) * | 2015-04-16 | 2016-11-23 | 阿里巴巴集团控股有限公司 | A kind of user behavior analysis method and device |
CN105049456A (en) * | 2015-08-28 | 2015-11-11 | 中国科学技术大学苏州研究院 | Covert communication method based on webpage link request |
CN105554098A (en) * | 2015-12-14 | 2016-05-04 | 瑞斯康达科技发展股份有限公司 | Device configuration method, server and system |
CN106878438A (en) * | 2017-03-03 | 2017-06-20 | 久远谦长(北京)技术服务有限公司 | The method and system of user behavior analysis under a kind of https environment |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112367406A (en) * | 2020-11-19 | 2021-02-12 | 全知科技(杭州)有限责任公司 | Method for identifying account behavior analysis corresponding account correlation attribute in web application system |
CN113609362A (en) * | 2021-07-14 | 2021-11-05 | 上海德衡数据科技有限公司 | Data management method and system based on 5G |
CN113609362B (en) * | 2021-07-14 | 2024-04-12 | 上海德衡数据科技有限公司 | Data management method and system based on 5G |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11233866B2 (en) | Methods and apparatus to monitor online activity | |
US10257199B2 (en) | Online privacy management system with enhanced automatic information detection | |
CN110798472B (en) | Data leakage detection method and device | |
US8131861B2 (en) | Method for cross-domain tracking of web site traffic | |
US8788617B2 (en) | Cookies stored in a cloud computing environment | |
CN103443781B (en) | Data deliver | |
Chen et al. | The where and when of finding new friends: Analysis of a location-based social discovery network | |
CN104427519B (en) | IP address ownership place management method and device | |
CN107092544A (en) | monitoring method and device | |
CN107592346A (en) | User classification method based on user behavior analysis | |
US20190289085A1 (en) | System and method for tracking online user behavior across browsers or devices | |
CN113095875A (en) | Message delivery effect statistical method and related device | |
CN107194009A (en) | Determine the unique visitor of network site | |
EP2973192B1 (en) | Online privacy management | |
CN108023779A (en) | A kind of method and system based on network traffic analysis user behavior | |
CN106874293A (en) | A kind of data processing method and device | |
CN109309664A (en) | A kind of browser fingerprint detection behavior monitoring method | |
CN104992060A (en) | User age estimation method and apparatus | |
US9723017B1 (en) | Method, apparatus and computer program product for detecting risky communications | |
US11816694B2 (en) | Techniques for managing advertisement attributions while preserving user privacy | |
CN108881275A (en) | A kind of user accesses the method and system of compliance analysis | |
JP6322522B2 (en) | Advertisement distribution system and program | |
CN108140200A (en) | The assessment based on device integrality of user action associated with advertisement | |
CN109190342A (en) | The owner's auth method and community server of intelligence community | |
EP3617893B1 (en) | Device for managing utilized service |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180511 |