CN108536507A - A kind of figure applicating text recognition methods and system - Google Patents
A kind of figure applicating text recognition methods and system Download PDFInfo
- Publication number
- CN108536507A CN108536507A CN201810237757.0A CN201810237757A CN108536507A CN 108536507 A CN108536507 A CN 108536507A CN 201810237757 A CN201810237757 A CN 201810237757A CN 108536507 A CN108536507 A CN 108536507A
- Authority
- CN
- China
- Prior art keywords
- data
- user
- hook
- desktop
- video
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/451—Execution arrangements for user interfaces
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/04—Protocols for data compression, e.g. ROHC
Abstract
The invention discloses a kind of figure applicating text recognition methods and systems, the present invention is used based on BHO hooks injection technique, window traversal and similar sequence difference lock-in techniques and user behavior desktop figure videoing skill, the hook injection technique of wherein BHO is mainly used for acquiring B/S end subscriber operation behavior data, window traverses and similar sequence difference is mainly used for acquiring C/S end subscriber operation behavior data, and user behavior figure is acquired by way of desktop video recording.The present invention assembles the user behavior key node data of acquisition, it is associated simultaneously with the figure of recording, user's operation behavior can precisely be recorded, and relational graph video of the user when operating the behavior record of computer and navigating to the operation note is quickly recognized, realize the identification of figure applicating textization.The present invention is captured and is associated with using precision strategy, is provided the foundation guarantee for business data safety analysis, quickly and accurately can be excavated and analyze user behavior.
Description
Technical field
The present invention relates to internet data safety and big data analysis technical field more particularly to a kind of figure applicating texts
Change recognition methods and system.
Background technology
Now with the fast development and popularization and application of computer and information technology, internet is in real economy or even society
Up and down, all trades and professions have started the tide of innovation.Numerous traditional industries gradually digitization, onlineization, mobile, long-range, together
When more consumers be involved in internet, the data and information of generation also will be in explosive growth;Network passes through " people " and " machine "
Connection generate large batch of data, these data are related to the every aspect of entire society, military affairs and national economy, are passed through with country
The even entire national security of Ji development is all closely bound up, under such new environment, how to ensure, monitors and promote information peace
Entirely, it is that social economy's sound development escorts, this proposes new project and mission for information security field.
Traditional industries diversification leads to the complication of information security issue, and how in diversified industry, system occurs
When the problems such as failure or data fault-tolerant, by effective technological means, scene when reduction breaks down or is fault-tolerant, how
Quickly analyze the active demand for the industry that becomes a reality with accurately positioning failure.
Existing some user behaviors monitoring is broadly divided into two kinds with reduction technique on the market at present, and one kind is webpage JS feet
This injection technique, second is whole videoing skill, and two kinds of technologies all have respective drawback.The former injects skill by webpage JS scripts
Art can only web page monitored operation content, client software operation note can not be recorded, can not also original subscriber's current operation it is complete
Whole scene can not may completely and really restore wrong scene at that time when safety problem occurs in system;The latter's whole process is recorded
As technology is larger for the storage overhead of server, if while whole video recording do not set up nodal operation index, when system occurs
When failure, it is difficult to which quickly there is reason to reduction failure in scene and failure at that time.
Invention content
Technical problem to be solved by the present invention lies in for the defect of background technology, provide a kind of figure applicating text
Change recognition methods and system, used all softwares while energy when can quickly restore, analyze and position user using computer
The video of all corresponding node scenes is presented.
To solve realization above-mentioned technical problem, the technical solution adopted in the present invention is:
A kind of figure applicating text identifying system, including:
BHO hook injection modules based on the ends B/S acquire for the hook method for implanting by BHO and record B/S end subscribers
Operation behavior data;
The similar sequence difference locking module of window based on the ends C/S, for the method by the matching of window traversal and similar poor sequence, search
All components element under mouse coordinates, the user's operation behavioral data at the ends record C/S;
Desktop figure picture recording module based on user behavior, for carrying out desktop figure video recording to all operations of user;
Data memory module, for the entity relationship data set that basis pre-establishes, the text data that the ends B/S and C/S are acquired
It is associated assembling with desktop figure Video data, classification storage is carried out to the data after assembling, while by the number of classification storage
According to establishing corresponding application references;
Data position and display module, and data, the entity relationship data set packet is presented according to the entity relationship data set of foundation
The video file of figure containing desktop and textual identify file.
Further, the similar sequence difference locking module of window includes:
Window Traversal Unit is locked by way of window traversal into row element;
Similar difference sequence unit locks the element of same title by way of similar poor sequence.
The present invention also proposes a kind of figure applicating text recognition methods, and steps are as follows for specific implementation:
1)Data acquire:
By the hook method for implanting of BHO, B/S end subscriber operation behavior data are acquired;
By the method for the matching of window traversal and similar poor sequence, all components element under mouse coordinates is searched for, wherein passing through window
The mode of traversal is locked into row element, and the element of same title is locked by way of similar poor sequence, the ends record C/S
User's operation behavioral data;
Based on B/S hook script strategies and C/S terminals pickup strategy by the element of acquisition carry out cleaning and it is regular;
2)Installation video recording client carries out desktop figure video recording to all operations of user;
3)Data store:
According to the entity relationship data set pre-established, the text data that the ends B/S and the ends C/S are acquired and desktop figure video recording number
According to assembling is associated, classification storage is carried out to the data after assembling, while the data of classification storage are established into corresponding application
Index quickly searches and positions user behavior operation note for the later stage;
4)Data transmission with it is synchronous:
User behavior operation note is stored in client after the completion of generating, and system is by the video recording of desktop figure and text of user's operation
Change record and the data that client stores are synchronized to by progress classified and stored in cloud center by interface gateway system;
5)Data correlation shows:
According to the entity relationship data set of foundation present data, the entity relationship data set include desktop figure video file and
Textual identifies that analysis result is presented to use by the data after classification by file, webpage terminal system according to chronological order
Family.
Further, a kind of figure applicating text recognition methods of the present invention, textual identification file includes to make
With classification, dbase, usage time, use duration information.
Further, a kind of figure applicating text recognition methods of the present invention, when data store, according to system
Acquisition strategies, specific aim record the content of user's operation, and operation content is according to the time and different software is used to be drawn as node
The foundation divided;When user use software when, system automatically records title, duration and the video content of user's operation software, when with
When family switches software, system regenerates an operation note, and records corresponding dbase, duration and video content.
Further, a kind of figure applicating text recognition methods of the present invention, hook injection mode are:It notes first
Volume browser auxiliary, after the completion of registration, generates the registration table address bound therewith in registration table;After the completion of binding, based on clear
The API of device of looking at auxiliary develops corresponding hook.
Further, a kind of figure applicating text recognition methods of the present invention, the hook include mouse bottom
Then hook, keyboard bottom hook, system message hook, message queue hook and dialog box message hook integrate exploitation
Hook be fused in browser.
Compared with the prior art, the present invention has the following advantages:
A kind of figure applicating text recognition methods proposed by the invention and system pass through the side that B/S and C/S whole process is recorded a video
Formula solves the imperfection of user behavior record;Compress technique is stored by specific video simultaneously, is largely saved
Server storage;And the video recording of desktop figure is associated with by node textual, solving cannot real-time precise positioning
Scene when failure occurs.
Description of the drawings
Fig. 1 is system overall flow figure.
Specific implementation mode
Technical scheme of the present invention is described in further detail below in conjunction with the accompanying drawings:
Those skilled in the art of the present technique are it is understood that unless otherwise defined, all terms used herein(Including technology art
Language and scientific terminology)With meaning identical with the general understanding of the those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, which should be understood that, to be had and the meaning in the context of the prior art
The consistent meaning of justice, and unless defined as here, will not be with idealizing or the meaning of too formal be explained.
A kind of figure applicating text recognition methods of present invention proposition and system, by way of hook injection, Ji Nengji
Record webpage(B/S)The detailed content of operation is held, while by way of Window match and similar poor sequence, logging software(C/S)End
All records of operation, and the ends B/S and C/S operation behavior is synchronized by video recording by client of recording a video, and will be in video recording
Appearance is divided into each running node, forms textual associated data, then to textual data and desktop figure Video data into
Row association shows.
The present invention proposes a kind of figure applicating text identifying system, including:
BHO hooks based on the ends B/S(Windows underlying programs)Injection module, for the hook injection technique by BHO, note
Record B/S end subscriber operation behavior data.Wherein BHO(Browser Helper Object)It is the extender of IE browser, text
Part format, which is dll file, to the interface of IE browser and to be accessed content and modify operation.
The similar sequence difference locking module of window based on the ends C/S, for matching the method with similar poor sequence by window traversal,
All components element under mouse coordinates is searched for, is locked into row element by way of window traversal, it is logical for the element of same title
The mode for crossing similar poor sequence is locked, the user's operation behavioral data at the ends record C/S.
Desktop figure picture recording module based on user behavior, for carrying out desktop figure video recording to all operations of user.
Data memory module pre-establishes entity relationship data set, the text data and desktop that the ends B/S and C/S are acquired
Figure Video data is associated assembling, carries out classification storage to the data after assembling, while the data of classification storage being established
Corresponding application references.
Data position and display module, and data, the entity relationship data are presented according to the entity relationship data set of foundation
Collection identifies file comprising desktop figure video file and textual.
The present invention also proposes a kind of implementation method of figure applicating text, refering to what is shown in Fig. 1, steps are as follows:
1)Data produce, specially:
Pass through the sub- injecting strategy of B/S end hooks and the tactful gathered data of the ends C/S terminal pickup;
Hook injection mode is:Registration browser auxiliary first, after the completion of registration, generates the registration bound therewith in registration table
Table address;After the completion of binding, the API based on browser auxiliary develops corresponding Hook Technique, and Hook Technique includes mouse bottom
Then hook, keyboard bottom hook, system message hook, message queue hook and dialog box message hook integrate exploitation
Hook be fused in browser.It registers generated hook and can be used for the crawl of B/S operation behaviors.
2)Installation video recording client, specially:
After installation is complete, client shows current version number, unloads, stops, restarting and close pallet client;It unloads, stop
Only and restart and need administrator to input password can to operate, it refers to that will start icon hiding in taskbar to close pallet, but client
End is run as usual;
The video recording of desktop figure is carried out to all operations of user and generates corresponding video file and textual identification record.
3)Data store, specially:
According to the acquisition strategies of system, specific aim records the content of user's operation, and operation content is according to the time and using different
Foundation of the software as node division.When user uses software, system automatically record the title of user's operation software, duration and
Video content, when user switches software, system regenerates an operation note, and records corresponding dbase, duration
And video content.
4)Data transmission with it is synchronous, specially:
Record is stored in client after the completion of generating, system is by the desktop figure video recording of user's operation and textual record by connecing
The data that client stores are synchronized to cloud center and carry out classified and stored by mouth gateway system.
5)Data correlation shows, specially:
According to the entity relationship data set of foundation present data, the entity relationship data set include desktop figure video file and
Textual identifies that file, textual identify that file includes use classes(B/S or C/S), dbase, usage time, use when
The information such as long.Analysis result is presented to enterprise, enterprise by the data after classification by webpage terminal system according to chronological order
The video for checking corresponding node can be extracted according to presentation sequence.
Using the above technological means, all operation video informations during user's use can be completely restored to, for accidentally
The behaviors such as operation, which are effective trackings, to be proved.Meanwhile by special video compress technique, it is empty largely to save server storage
Between;Also, the present invention can quickly position abnormal nodes, effectively reduce the loss that failure is brought.Such as user occurs at 12 points
Failure, system, which can quickly navigate to 12 points or so of video and decompose, checks, without from the beginning checking.
The above is only some embodiments of the present invention, it is noted that for the ordinary skill people of the art
For member, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications are also answered
It is considered as protection scope of the present invention.
Claims (8)
1. a kind of figure applicating text identifying system, which is characterized in that including:
BHO hook injection modules based on the ends B/S acquire for the hook method for implanting by BHO and record B/S end subscribers
Operation behavior data;
The similar sequence difference locking module of window based on the ends C/S, for the method by the matching of window traversal and similar poor sequence, search
All components element under mouse coordinates, the user's operation behavioral data at the ends record C/S;
Desktop figure picture recording module based on user behavior, for carrying out desktop figure video recording to all operations of user;
Data memory module, for the entity relationship data set that basis pre-establishes, the textual data that the ends B/S and the ends C/S are acquired
It is associated assembling according to desktop figure Video data, classification storage is carried out to the data after assembling, while by classification storage
Data establish corresponding application references;
Data position and display module, and data, the entity relationship data set packet is presented according to the entity relationship data set of foundation
The video file of figure containing desktop and textual identify file.
2. a kind of figure applicating text identifying system according to claim 1, which is characterized in that the similar sequence difference lock of window
Cover half block includes:
Window Traversal Unit is locked by way of window traversal into row element;
Similar difference sequence unit locks the element of same title by way of similar poor sequence.
3. a kind of figure applicating text recognition methods, which is characterized in that steps are as follows for the method specific implementation:
1)Data acquire:
By the hook method for implanting of BHO, B/S end subscriber operation behavior data are acquired;
By the method for the matching of window traversal and similar poor sequence, all components element under mouse coordinates is searched for, wherein passing through window
The mode of traversal is locked into row element, and the element of same title is locked by way of similar poor sequence, the ends record C/S
User's operation behavioral data;
2)Installation video recording client carries out desktop figure video recording to all operations of user;
3)Data store:
According to the entity relationship data set pre-established, the text data that the ends B/S and the ends C/S are acquired and desktop figure video recording number
According to assembling is associated, classification storage is carried out to the data after assembling, while the data of classification storage are established into corresponding application
Index quickly searches and positions user behavior operation note for the later stage;
4)Data transmission with it is synchronous:
User behavior operation note is stored in client after the completion of generating, and system is by the video recording of desktop figure and text of user's operation
Change record and the data that client stores are synchronized to by progress classified and stored in cloud center by interface gateway system;
5)Data correlation shows:
According to the entity relationship data set of foundation present data, the entity relationship data set include desktop figure video file and
Textual identifies that analysis result is presented to use by the data after classification by file, webpage terminal system according to chronological order
Family.
4. a kind of figure applicating text recognition methods according to claim 3, which is characterized in that textual identifies file
Including use classes, dbase, usage time, using duration information.
5. a kind of figure applicating text recognition methods according to claim 3, which is characterized in that when data store, root
According to the acquisition strategies of system, specific aim records the content of user's operation, and operation content is made according to the time and using different software
For the foundation of node division;When user uses software, system automatically records in title, duration and the video of user's operation software
Hold, when user switches software, system regenerates an operation note, and records corresponding dbase, duration and video
Content.
6. a kind of figure applicating text recognition methods according to claim 3, which is characterized in that hook injection mode
It is:Registration browser auxiliary first, after the completion of registration, generates the registration table address bound therewith in registration table;Binding is completed
Afterwards, the API based on browser auxiliary develops corresponding hook.
7. a kind of figure applicating text recognition methods according to claim 6, which is characterized in that the hook includes mouse
Base number of a tender layer hook, keyboard bottom hook, system message hook, message queue hook and dialog box message hook, then will exploitation
The hook integrated is fused in browser.
8. a kind of figure applicating text recognition methods according to claim 3, which is characterized in that in step 1)The number
According to acquisition when, based on B/S hook script strategies and C/S terminals pickup strategy by the element of acquisition carry out cleaning and it is regular.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810237757.0A CN108536507A (en) | 2018-03-22 | 2018-03-22 | A kind of figure applicating text recognition methods and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810237757.0A CN108536507A (en) | 2018-03-22 | 2018-03-22 | A kind of figure applicating text recognition methods and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108536507A true CN108536507A (en) | 2018-09-14 |
Family
ID=63484093
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810237757.0A Pending CN108536507A (en) | 2018-03-22 | 2018-03-22 | A kind of figure applicating text recognition methods and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108536507A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113485615A (en) * | 2021-06-30 | 2021-10-08 | 福州大学 | Method and system for making typical application intelligent image-text tutorial based on computer vision |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222349A (en) * | 2007-01-12 | 2008-07-16 | 中国电信股份有限公司 | Method and system for collecting web user action and performance data |
US20090222735A1 (en) * | 2008-02-28 | 2009-09-03 | Clark Bryan W | Systems and methods for enhancing browser history using syndicated data feeds |
CN101931557A (en) * | 2010-08-13 | 2010-12-29 | 杭州迪普科技有限公司 | User behaviour auditing method and system |
CN102768845A (en) * | 2011-05-03 | 2012-11-07 | 中国移动通信集团公司 | Video index method and system |
CN104700231A (en) * | 2015-03-27 | 2015-06-10 | 福州大学 | Desktop screen auditing method based on user behaviors |
US20150229684A1 (en) * | 2014-02-07 | 2015-08-13 | Spotify Ab | System and method for early media buffering using prediction of user behavior |
CN104850407A (en) * | 2015-05-28 | 2015-08-19 | 深圳市云舒网络技术有限公司 | Desktop screen capture system and method |
CN105338120A (en) * | 2015-12-03 | 2016-02-17 | 厦门法信公证云科技有限公司 | Electronic evidence fixing security method based on cloud storage |
CN105607986A (en) * | 2015-01-06 | 2016-05-25 | 北京志翔科技股份有限公司 | Acquisition method and device of user behavior log data |
CN106325945A (en) * | 2016-08-26 | 2017-01-11 | 北京北信源软件股份有限公司 | Method for collecting network data by using IE browser of window operation system |
CN107018046A (en) * | 2017-06-06 | 2017-08-04 | 上海鋆创信息技术有限公司 | A kind of collecting method, device, terminal and storage medium |
CN107276821A (en) * | 2017-07-11 | 2017-10-20 | 上海精数信息科技有限公司 | User behavior monitoring system and method |
CN107423048A (en) * | 2017-04-14 | 2017-12-01 | 网易乐得科技有限公司 | Method, apparatus, medium and the computing device of Data Collection |
CN107480037A (en) * | 2017-08-17 | 2017-12-15 | 广州视源电子科技股份有限公司 | Method and device, smart machine and the storage medium of record behavior |
-
2018
- 2018-03-22 CN CN201810237757.0A patent/CN108536507A/en active Pending
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101222349A (en) * | 2007-01-12 | 2008-07-16 | 中国电信股份有限公司 | Method and system for collecting web user action and performance data |
US20090222735A1 (en) * | 2008-02-28 | 2009-09-03 | Clark Bryan W | Systems and methods for enhancing browser history using syndicated data feeds |
CN101931557A (en) * | 2010-08-13 | 2010-12-29 | 杭州迪普科技有限公司 | User behaviour auditing method and system |
CN102768845A (en) * | 2011-05-03 | 2012-11-07 | 中国移动通信集团公司 | Video index method and system |
US20150229684A1 (en) * | 2014-02-07 | 2015-08-13 | Spotify Ab | System and method for early media buffering using prediction of user behavior |
CN105607986A (en) * | 2015-01-06 | 2016-05-25 | 北京志翔科技股份有限公司 | Acquisition method and device of user behavior log data |
CN104700231A (en) * | 2015-03-27 | 2015-06-10 | 福州大学 | Desktop screen auditing method based on user behaviors |
CN104850407A (en) * | 2015-05-28 | 2015-08-19 | 深圳市云舒网络技术有限公司 | Desktop screen capture system and method |
CN105338120A (en) * | 2015-12-03 | 2016-02-17 | 厦门法信公证云科技有限公司 | Electronic evidence fixing security method based on cloud storage |
CN106325945A (en) * | 2016-08-26 | 2017-01-11 | 北京北信源软件股份有限公司 | Method for collecting network data by using IE browser of window operation system |
CN107423048A (en) * | 2017-04-14 | 2017-12-01 | 网易乐得科技有限公司 | Method, apparatus, medium and the computing device of Data Collection |
CN107018046A (en) * | 2017-06-06 | 2017-08-04 | 上海鋆创信息技术有限公司 | A kind of collecting method, device, terminal and storage medium |
CN107276821A (en) * | 2017-07-11 | 2017-10-20 | 上海精数信息科技有限公司 | User behavior monitoring system and method |
CN107480037A (en) * | 2017-08-17 | 2017-12-15 | 广州视源电子科技股份有限公司 | Method and device, smart machine and the storage medium of record behavior |
Non-Patent Citations (3)
Title |
---|
向光祥 编著: "《疯狂网络购物——安全、省钱网购全攻略》", 31 July 2009, 云南出版集团公司•云南科技出版社 * |
杨旭 等编著: "《数据科学导论(第2版)》", 31 January 2017, 北京:北京理工大学出版社 * |
毛郁欣 等著: "《大数据时代电商伦理前沿问题研究》", 31 March 2016, 沈阳:东北大学出版社 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113485615A (en) * | 2021-06-30 | 2021-10-08 | 福州大学 | Method and system for making typical application intelligent image-text tutorial based on computer vision |
CN113485615B (en) * | 2021-06-30 | 2024-02-02 | 福州大学 | Method and system for manufacturing typical application intelligent image-text course based on computer vision |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10565077B2 (en) | Using cognitive technologies to identify and resolve issues in a distributed infrastructure | |
US9420068B1 (en) | Log streaming facilities for computing applications | |
US5974572A (en) | Software system and methods for generating a load test using a server access log | |
Nguyen et al. | Sensepath: Understanding the sensemaking process through analytic provenance | |
US20160140232A1 (en) | System and Method of Expanding a Search Query | |
CN103888490A (en) | Automatic WEB client man-machine identification method | |
US8381167B2 (en) | Business service discovery | |
CN103973781A (en) | Method and system for monitoring screen based on proxy server | |
CN111552633A (en) | Interface abnormal call testing method and device, computer equipment and storage medium | |
CN108536521A (en) | Based on emulation platform offline environment checking method and device | |
CN112596951A (en) | NAS data disaster tolerance method, device, equipment and storage medium | |
CN109376133A (en) | File access method and file access system | |
CN107003931A (en) | Test checking is separated from test execution | |
US10204030B1 (en) | Debug session tree recorder with generic playback | |
CN114706734A (en) | Monitoring method and monitoring system for business application | |
CN115599347A (en) | Automatic code development implementation method and system | |
CN108345658A (en) | Algorithm calculates decomposing process, server and the storage medium of track | |
CN106649000A (en) | Fault recovery method for real-time processing engine, and corresponding server | |
CN108536507A (en) | A kind of figure applicating text recognition methods and system | |
CN101887463A (en) | Virtual domain-based HTTP reduction display method | |
Wu et al. | Trust-based service composition and optimization | |
US8607201B2 (en) | Augmenting visualization of a call stack | |
CN115438633B (en) | Cross-document online discussion processing method, interaction method, device and equipment | |
US20090172714A1 (en) | Method and apparatus for collecting metadata during session recording | |
CN106897063B (en) | Method and system for permanently adding OS boot entry to BIOS based on EFI |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20180914 |