CN108809718B - Network access method, system, computer device and medium based on virtual resources - Google Patents

Network access method, system, computer device and medium based on virtual resources Download PDF

Info

Publication number
CN108809718B
CN108809718B CN201810602618.3A CN201810602618A CN108809718B CN 108809718 B CN108809718 B CN 108809718B CN 201810602618 A CN201810602618 A CN 201810602618A CN 108809718 B CN108809718 B CN 108809718B
Authority
CN
China
Prior art keywords
configuration
virtual resource
virtual
resource
acquisition platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810602618.3A
Other languages
Chinese (zh)
Other versions
CN108809718A (en
Inventor
周垂富
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Huaxun Network Technology Co ltd
Original Assignee
Shenzhen Huaxun Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Huaxun Network Technology Co ltd filed Critical Shenzhen Huaxun Network Technology Co ltd
Priority to CN201810602618.3A priority Critical patent/CN108809718B/en
Publication of CN108809718A publication Critical patent/CN108809718A/en
Application granted granted Critical
Publication of CN108809718B publication Critical patent/CN108809718B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/22Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks comprising specially adapted graphical user interfaces [GUI]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to a network access method, a network access device, computer equipment and a network access medium based on virtual resources. The method comprises the following steps: acquiring a configuration page of a virtual resource, wherein the configuration page comprises a plurality of configuration items; acquiring corresponding configuration parameters according to configuration operation on the configuration items; generating target codes corresponding to the corresponding configuration items based on the configuration parameters; respectively adding target codes corresponding to the configuration items to the template codes to obtain execution codes for acquiring the virtual resources; and running the execution code, and screening the virtual resources corresponding to the configuration parameters in the virtual resource pool. By adopting the method, the safety of the virtual resource obtaining environment can be improved.

Description

Network access method, system, computer device and medium based on virtual resources
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, a system, a computer device, and a medium for network access based on virtual resources.
Background
With the continuous development of computer technology, it is more and more common to implement network access based on virtual resources through computers. The user can obtain the satisfied virtual resource based on different obtaining logics on the virtual resource obtaining platform. User privacy information or personal property information may be involved in the virtual resource acquisition process, and therefore security of the virtual resource acquisition environment needs to be ensured. However, effective measures for improving the security of the virtual resource acquisition environment are lacking at present.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a virtual resource-based network access method, system, computer device and medium capable of improving security of a virtual resource acquisition environment.
A method of virtual resource based network access, the method comprising: acquiring a mirror image file, and deploying a virtual resource acquisition platform by starting the mirror image file; performing network isolation on the virtual resource acquisition platform; displaying a configuration page on the virtual resource acquisition platform after network isolation; acquiring configuration parameters input in the configuration page; generating an execution code for acquiring the virtual resource based on the configuration parameter; and running the execution code, and screening the virtual resources corresponding to the configuration parameters in a virtual resource pool.
In one embodiment, the performing network isolation on the virtual resource acquisition platform includes: receiving an access instruction to the virtual resource acquisition platform, wherein the access instruction comprises a network identifier; and performing network configuration on the virtual resource acquisition platform according to the network identifier so as to perform network isolation on the virtual resource acquisition platforms accessed by different users.
In one embodiment, the displaying and configuring page of the virtual resource obtaining platform after network isolation includes: receiving an access instruction of a virtual resource acquisition platform, and extracting a characteristic field in the access instruction; generating a feature vector corresponding to the access instruction according to the feature field; inputting the characteristic vector into a preset safety monitoring model, and detecting whether an access instruction is risk access; if so, carrying out risk alarm; otherwise, displaying a configuration page on the virtual resource acquisition platform.
In one embodiment, the generating, based on the configuration parameter, an execution code for acquiring a virtual resource includes: generating target codes corresponding to the corresponding configuration items based on the configuration parameters; and respectively adding the target codes corresponding to the plurality of configuration items to the template codes to obtain the execution codes for acquiring the virtual resources.
In one embodiment, the method further comprises: public opinion information issued by a preset platform is obtained, and the public opinion information is split to obtain a plurality of short texts; calculating the corresponding emotion index of each short text; extracting resource identifiers from the short texts, and determining influence weights corresponding to the short texts respectively; calculating public sentiment indexes corresponding to the corresponding resource identifications according to the sentiment indexes and the influence weights; acquiring user information, and establishing a user portrait according to the user information; determining resource preferences of a user based on the user representation; the resource preference comprises a resource identification; and recommending the virtual resources according to the public sentiment indexes corresponding to the resource identifications in the resource preference.
A virtual resource based network access system, the system comprising: the terminal is used for acquiring the image file and deploying the virtual resource acquisition platform by starting the image file; performing network isolation on the virtual resource acquisition platform; displaying the configuration page on the virtual resource acquisition platform after network isolation; acquiring configuration parameters input in the configuration page; generating an execution code for acquiring the virtual resource based on the configuration parameter; running the execution code, and screening virtual resources corresponding to the configuration parameters in a virtual resource pool; the server is used for predicting public opinion indexes corresponding to the resource identifications; the terminal is also used for displaying a plurality of virtual resources obtained through screening according to the public opinion index.
In one embodiment, the terminal is further configured to perform a retest on the execution code to obtain a retest result; judging whether the retest result reaches the retest threshold value; if yes, running the execution code, and screening virtual resources corresponding to the configuration parameters in a virtual resource pool; otherwise, generating a configuration adjustment report and displaying the configuration adjustment report.
In one embodiment, the server is further configured to monitor public opinion information issued by a preset platform, split the public opinion information, and obtain a plurality of short texts; extracting a resource identifier from the short text; calculating the emotion index corresponding to each short text by using a preset public opinion analysis model; determining influence weights corresponding to the short texts respectively; and calculating the public sentiment index corresponding to the corresponding resource identifier according to the sentiment index and the influence weight.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program: acquiring a mirror image file, and deploying a virtual resource acquisition platform by starting the mirror image file; performing network isolation on the virtual resource acquisition platform; displaying a configuration page on the virtual resource acquisition platform after network isolation; acquiring configuration parameters input in the configuration page; generating an execution code for acquiring the virtual resource based on the configuration parameter; and running the execution code, and screening the virtual resources corresponding to the configuration parameters in a virtual resource pool.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of: acquiring a mirror image file, and deploying a virtual resource acquisition platform by starting the mirror image file; performing network isolation on the virtual resource acquisition platform; displaying a configuration page on the virtual resource acquisition platform after network isolation; acquiring configuration parameters input in the configuration page; generating an execution code for acquiring the virtual resource based on the configuration parameter; and running the execution code, and screening the virtual resources corresponding to the configuration parameters in a virtual resource pool.
The network access method, the network access device, the computer equipment and the medium based on the virtual resources acquire the image file and start the image file, so that the deployment of a virtual resource acquisition platform can be realized; network configuration is carried out on the virtual resource acquisition platform, and network isolation can be carried out on virtual resource acquisition platforms accessed by different users; the virtual resource acquisition platform after network isolation can display a configuration page; the configuration items are configured on the configuration page of the virtual resource, so that corresponding configuration parameters can be obtained; based on the configuration parameters, execution code for acquiring the virtual resource can be generated; by running the execution code, the virtual resources corresponding to the configuration parameters can be screened in the virtual resource pool. The virtual resource acquisition platform is deployed at a terminal of a user based on a container technology, network isolation of the virtual resource acquisition platforms accessed by different users is realized through network configuration, and the running environment of the virtual resource acquisition platform can be improved and safer. Because the user can carry out configuration operation on different configuration items based on the configuration page, the acquisition logic of the virtual resources is further defined, and the acquisition flexibility of the virtual resources can be improved; in addition, the corresponding execution code is automatically generated according to the user-defined acquisition logic, so that the workload of a developer for writing the code is reduced, and the acquisition efficiency of the virtual resource is improved.
Drawings
FIG. 1 is a diagram illustrating an exemplary implementation of a virtual resource-based network access method;
FIG. 2 is a flowchart illustrating a method for virtual resource based network access according to an embodiment;
FIG. 3 is a flowchart illustrating the configuration page presentation step in one embodiment;
FIG. 4 is a flowchart illustrating the steps performed to generate code in one embodiment;
FIG. 5 is a flowchart illustrating the virtual resource recommendation step in one embodiment;
FIG. 6 is a block diagram of a virtual resource based network access system in one embodiment;
FIG. 7 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The network access method based on virtual resources provided by the application can be applied to the application environment shown in fig. 1. Wherein the terminal 102 and the server 104 communicate via a network. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 104 may be implemented by an independent server or a server cluster formed by a plurality of servers. When the virtual resource acquisition platform needs to be accessed, a user can pull the image file in the image warehouse through the terminal 102, and deploy the virtual resource acquisition platform by starting the image file. The terminal 102 performs network configuration on the virtual resource acquisition platform based on the network identifier carried by the access instruction according to the access instruction to the virtual resource acquisition platform triggered by the user, so as to perform network isolation on the virtual resource acquisition platforms accessed by different users. The user can configure the resource acquisition logic on the virtual resource acquisition platform after the network isolation. The terminal 102 receives a configuration request for acquiring logic of the virtual resource, and displays a configuration page according to the configuration request. The configuration page includes a plurality of configuration items. The user can configure the configuration parameters corresponding to the configuration items on the configuration page. The terminal 102 converts the configuration parameters of each configuration item into corresponding object codes. The terminal 102 adds the object codes corresponding to the plurality of configuration items to the template codes respectively to obtain the execution codes for acquiring the virtual resources. The terminal 102 filters the virtual resources corresponding to the configuration parameters in the virtual resource pool by running the execution code. After the terminal 102 obtains the virtual resources through screening, the public sentiment index of the corresponding virtual resources can be obtained from the server 104, the virtual resources obtained through screening are sorted by combining a pre-configured sorting mode and the public sentiment index, and the virtual resources are displayed according to the sorting. The virtual resource acquisition platform is deployed at a user terminal based on a container technology, and network isolation of virtual resource acquisition platforms accessed by different users is realized through network configuration, so that a virtual resource acquisition environment is safer; in addition, the user can customize the acquisition logic of the virtual resources, and the flexibility of acquiring the virtual resources is improved.
In an embodiment, as shown in fig. 2, a virtual resource-based network access method is provided, which is described by taking the method as an example applied to the terminal in fig. 1, and includes the following steps:
step 202, acquiring the image file, and deploying the virtual resource acquisition platform by starting the image file.
In order to reduce the complexity of installing the virtual resource acquisition platform, the image file corresponding to the virtual resource acquisition platform is developed, and then the virtual resource acquisition platform is installed and deployed in a container mode. Specifically, a developer installs a Docker service component on a server, stores a code file of a virtual resource acquisition platform and all files dependent on operation in a directory of the Docker service component according to a standard directory, and packages the directory into a Docker image file (hereinafter referred to as an "image file") based on a Docker Build command, thereby packaging the virtual resource acquisition platform and other files dependent on operation thereof into a portable container. And uploading the image file to an image warehouse by the developer through a Docker Push command. The user can access the virtual resource acquisition platform by downloading the mirror image file in the mirror image warehouse.
The terminal can access the virtual resource acquisition platform based on the image file. Specifically, when a user needs to access the virtual resource acquisition platform, the mirror image file of the virtual resource acquisition platform can be downloaded from the mirror image warehouse through the terminal, the Docker Run command is input into the command line window to start the mirror image file, and the storage address of the mirror image file is input into the browser to access the virtual resource acquisition platform.
Because the image file integrates all other files on which the image file depends in advance, the virtual resource acquisition platform can operate independently without depending on other components, so that a user does not need to care about the support problem of the current platform version or the dependency library when installing and deploying the virtual resource acquisition platform, and the installation operation is greatly simplified.
And step 204, carrying out network isolation on the virtual resource acquisition platform.
The acquisition and transfer of virtual resources are required to be performed in a relatively secure network environment due to the property security of the user. In order to improve the security of virtual resource acquisition, the virtual resource acquisition platforms accessed by different users are isolated from the network.
In one embodiment, the network isolation of the virtual resource acquisition platform includes: receiving an access instruction for the virtual resource acquisition platform, wherein the access instruction comprises a network identifier; and performing network configuration on the virtual resource acquisition platform according to the network identifier so as to perform network isolation on the virtual resource acquisition platforms accessed by different users.
And the user triggers an access instruction to the virtual resource acquisition platform at the terminal. The access instruction carries a user identifier and an overlay network identifier (hereinafter referred to as "network identifier"). And the terminal calls a network configuration interface to send a network isolation request to the network configuration server according to the access instruction. The network isolation request carries a user identifier and a network identifier. And the network configuration server identifies whether the received network identification belongs to the network identifications corresponding to other users. If not, the network configuration server obtains the corresponding terminal identification according to the received user identification, and performs network configuration on the terminal corresponding to the user identification by using the network identification. Different users access the virtual resource acquisition platforms by adopting different overlay networks, so that the isolation between different virtual resource acquisition platforms is ensured.
Step 206, displaying a configuration page on the virtual resource acquisition platform after the network isolation.
When a user needs to acquire virtual resources, the configuration of the acquisition logic can be performed on the configuration page of the virtual resource acquisition platform after network isolation. Specifically, the configuration page includes a plurality of configuration items. The configuration items include resource pool filtering conditions and resource screening conditions. The resource pool filtering condition comprises various attribute information of a resource publisher, such as industry, scale and the like. The resource screening condition includes various index information of the resource, such as technical indexes or value-added indexes. The specific index content and quantity forming the resource screening condition can be freely increased and deleted by the user according to the requirement.
And step 208, acquiring the configuration parameters recorded in the configuration page.
The user can add or delete configuration items on the configuration page, and configure each configuration item respectively, that is, set the configuration parameters corresponding to the configuration items. The configuration parameters include operators, threshold values or index intervals and the like. The operator may be a comparison operator. In another embodiment, all or part of the configuration items preset corresponding configuration parameter options on the configuration page, and the user can complete configuration only by selecting the configuration options, so that the configuration workload of the user is reduced, and the configuration efficiency is also improved. For example, the configuration parameter options for the configuration item "industry" corresponding to the threshold may include construction, media, communications, banking, and the like.
Step 210, generating an execution code for acquiring the virtual resource based on the configuration parameter.
And the terminal converts the configuration parameters of each configuration item into corresponding target codes. Basic logic code (hereinafter referred to as "analog code") for acquiring a certain type of virtual resources is prestored. The template code comprises tags corresponding to a plurality of configuration items respectively. And the terminal replaces the corresponding label in the template code with the object code corresponding to the configuration item, so that the object codes corresponding to the configuration items are respectively added to the template code to obtain an execution code for acquiring the virtual resource.
Step 212, running the execution code, and screening the virtual resources corresponding to the configuration parameters in the virtual resource pool.
Different resource issuers respectively have corresponding resource pool construction interfaces. The virtual resource acquisition platform calls a corresponding resource pool construction interface, extracts the attribute information of the corresponding virtual resource from a corresponding resource publisher server according to preset time frequency, and stores the extracted attribute information of the virtual resource to a pre-constructed virtual resource pool. The virtual resource pool may be a storage module, such as a database or a message queue, for storing attribute information of a plurality of virtual resources.
And the virtual resource acquisition platform operates the execution code according to a resource acquisition instruction triggered by the user on the configuration page, and determines the resource publisher meeting the resource pool filtering condition configured by the user based on the acquisition logic contained in the execution code. In another embodiment, the attribute information of the virtual resource corresponding to the resource publisher meeting the filtering condition of the resource pool can be extracted to form the sub-resource pool separately. The virtual resource acquisition platform screens virtual resources meeting resource screening conditions configured by a user in the sub-resource pool based on acquisition logic contained in the execution code, and displays attribute information of the screened virtual resources.
In the embodiment, the mirror image file is acquired and started, so that the deployment of the virtual resource acquisition platform can be realized; network configuration is carried out on the virtual resource acquisition platform, and network isolation can be carried out on the virtual resource acquisition platforms accessed by different users; the virtual resource acquisition platform after network isolation can display a configuration page; the configuration items are configured on the configuration page of the virtual resource, so that corresponding configuration parameters can be obtained; based on the configuration parameters, execution code for acquiring the virtual resource can be generated; by running the execution code, the virtual resources corresponding to the configuration parameters can be screened in the virtual resource pool. The virtual resource acquisition platform is deployed at a terminal of a user based on a container technology, network isolation of the virtual resource acquisition platforms accessed by different users is realized through network configuration, and the running environment of the virtual resource acquisition platform can be improved and safer. Because the user can carry out configuration operation on different configuration items based on the configuration page, the acquisition logic of the virtual resources is further defined, and the acquisition flexibility of the virtual resources can be improved; in addition, the corresponding execution code is automatically generated according to the user-defined acquisition logic, so that the workload of a developer for writing the code is reduced, and the acquisition efficiency of the virtual resource is improved.
In an embodiment, as shown in fig. 3, the step of displaying the configuration page on the virtual resource obtaining platform after the network isolation and the step of displaying the configuration page include:
step 302, receiving an access instruction for the virtual resource acquisition platform, and extracting a characteristic field in the access instruction.
And step 304, generating a feature vector corresponding to the access instruction according to the feature field.
And step 306, inputting the characteristic vector into a preset safety monitoring model, and detecting whether the access instruction is risk access.
And 308, if the access belongs to risk access, performing risk alarm.
And step 310, if the risk access does not belong to, displaying a configuration page on the virtual resource acquisition platform.
The virtual resource acquisition platform integrates a safety monitoring component in advance. The safety monitoring component is used for identifying whether the access instruction triggered by the user belongs to risk access or not and responding or intercepting the access instruction according to the identification result. Specifically, when monitoring an access instruction triggered by a user, the security monitoring component acquires a feature field table, analyzes the access instruction, and extracts a feature field corresponding to a field identifier in the feature field table from the access instruction. The characteristic field table records the characteristic field identification of the message in the access instruction, the data type of the characteristic field and the characteristic field. The safety monitoring component extracts a characteristic field, maps the extracted characteristic field into a numerical value according to the mapping relation between the characteristic field and the numerical value, and adds the numerical value obtained through mapping to a position, corresponding to the characteristic field, in a preset characteristic vector to obtain a characteristic vector corresponding to the access instruction. And the safety monitoring component inputs the generated characteristic vector into a safety monitoring model which is trained in advance, and the generated characteristic vector is processed by using the safety monitoring model to obtain a monitoring result of whether the access instruction constitutes risk access. If the access instruction constitutes risk access, the safety monitoring component refuses the access instruction; and if the access instruction does not form risk access, the virtual resource acquisition platform responds to the access instruction to perform corresponding data processing.
In the embodiment, the virtual resource acquisition platform is subjected to safety monitoring through the safety monitoring model trained in advance, a detection mode does not need to be preset manually, the manual intervention degree is reduced, the detection time of risk access is shortened, and the accuracy of risk access detection is improved.
In one embodiment, as shown in fig. 4, the step of generating the execution code for acquiring the virtual resource based on the configuration parameter, that is, the step of generating the execution code, includes:
and 402, generating object codes corresponding to the corresponding configuration items based on the configuration parameters.
The virtual resource acquisition platform deploys a corresponding database, and stores a basic code corresponding to each configuration item in the database. The virtual resource acquisition platform monitors configuration operation triggered by a user on a configuration page, acquires a corresponding basic code when monitoring the configuration operation on a certain configuration item, and updates the basic code based on configuration parameters corresponding to the configuration operation to obtain a corresponding target code.
In another embodiment, the virtual resource acquisition platform monitors configuration operations triggered by a user on a configuration page, and converts a configuration item and a corresponding configuration parameter into a corresponding target code each time the configuration of a certain configuration item is completed, so that when the user completes the acquisition logic, the virtual resource acquisition platform only needs to convert the last configured configuration item and configuration parameter into the corresponding target code. When the user completes the configuration operation of one configuration item, namely, the corresponding configuration parameters are converted into the target codes, compared with the method that when the logic configuration is obtained, a plurality of configuration items are uniformly converted into the target codes, the code conversion efficiency can be improved, the execution code generation efficiency can be improved, and the resource obtaining efficiency can be improved.
And step 404, adding the object codes corresponding to the plurality of configuration items to the template codes respectively to obtain the execution codes for acquiring the virtual resources.
The virtual resource acquisition platform also stores template codes in a database. The template code is the basic logic code that enables virtual resource acquisition. In other words, the module code includes the same portion of code that is used in different executions of code. The template codes adopted by the acquisition logics for configuring different virtual resources can be the same or different. The template code includes a tag corresponding to each configuration item in the configuration page. The label is used for recording the filling position of the object code corresponding to the corresponding configuration item in the template code. It should be noted that each tag in the initial template code is in an invalid state, and is stored in the template code as a comment section, for example.
When the configuration operation of a certain configuration item is monitored, the virtual resource acquisition platform activates a label corresponding to the corresponding configuration item in an initial template code. The activation mode can be deleting the comment mark before and after the label, so that the label is converted into an executable statement. And the virtual resource acquisition platform replaces the label with a corresponding object code. When the user completes the configuration of the acquisition logic, that is, completes the configuration operation on the concerned configuration items, the object code corresponding to each configuration item is added to the template code according to the above manner, and the execution code corresponding to the acquisition logic is obtained.
In the embodiment, the corresponding execution code is automatically generated according to the acquisition logic defined by the user, so that the workload of a developer for writing the code is reduced, and the acquisition efficiency of the virtual resource is improved.
In one embodiment, the method further includes a step of recommending the virtual resource, specifically including:
step 502, public sentiment information issued by a preset platform is obtained, and the public sentiment information is split to obtain a plurality of short texts.
The preset platform can be a preset variety of news readers or social platforms, such as a browser, a news reader for the top of the day and the like, or a WeChat, microblog, bar or known social platform. The virtual resource acquisition platform respectively performs text classification on public opinion information issued by a preset platform in a monitoring period to obtain one or more public opinion labels corresponding to each public opinion information. The public sentiment label can be a keyword in the public sentiment information. The virtual resource acquisition platform prestores a plurality of virtual resource related words. The virtual resource acquisition platform filters public sentiment tags containing public sentiment information (hereinafter referred to as "target public sentiment information") of virtual resource related words.
The virtual resource acquisition platform splits the target public opinion information. Specifically, the target public opinion information may be text, voice, video or picture. If the target public opinion information is voice, video or picture, the target public opinion information is firstly converted into text. The converted target public opinion information is a long text comprising a plurality of split identifiers. And the virtual resource acquisition platform determines the position of each split identifier as a split position, and splits at each split position of the long text to obtain a plurality of short texts. The split identifier may be a statement terminator, such as a period, exclamation point, or the like.
And step 504, calculating the emotion index corresponding to each short text.
And the virtual resource acquisition platform calculates the emotion index corresponding to each short text by using a preset public opinion analysis model. The public opinion analysis model can be obtained by training a machine learning classification model. The machine learning classification model may be an XGBOOST model or the like. Specifically, word segmentation processing is carried out on each short text obtained by splitting sample public sentiment information, a plurality of linguistic data obtained by word segmentation are converted into word vectors based on a word2vec model, and a corresponding classification label is added to each word vector. And forming a training set by the word vectors and the corresponding classification labels, and training the machine learning classification model based on the training set to obtain the public opinion analysis model.
Step 506, extracting resource identifiers from the short texts, and determining influence weights corresponding to the plurality of short texts respectively.
And the virtual resource acquisition platform performs word segmentation processing on each short text. And the virtual resource acquisition platform extracts the resource identification in the short text through a dictionary tree (trie) algorithm. The resource identification may be a name or number of the virtual resource, etc. Each public opinion information has corresponding profile information, such as publication time, publication media, publication author, etc. The virtual resource acquisition platform calculates the influence weight of each public opinion information based on the brief introduction information of the public opinion information. For example, the impact weight may be an accumulated sum of a temporal weight, a media weight, and an author weight, etc.
And step 508, calculating public sentiment indexes corresponding to the corresponding resource identifications according to the sentiment indexes and the influence weights.
The virtual resource acquisition platform can extract different resource identifications from different public opinion information. And the virtual resource acquisition platform calculates the public sentiment index of the corresponding virtual resource according to the sentiment index of the short text corresponding to the resource identifier and the corresponding influence weight.
Step 510, obtaining user information, and creating a user portrait according to the user information.
Traditionally, virtual resource recommendation is mainly performed through collaborative filtering technology. The collaborative filtering technology is recommended according to the historical condition of virtual resource transfer performed by a user. The virtual resource transfer refers to converting capital resources to obtain virtual resources equivalent to the capital resources. However, for new users, cold start is often faced, accurate recommendation is difficult to obtain, and interests of some virtual resource users may be one-time, and if recommendation is performed only according to the history of virtual resource transfer performed by the users, the recommendation accuracy is often not high.
In order to improve the virtual resource recommendation accuracy, the virtual resource acquisition platform acquires corresponding user information according to the user identification input by the user. The user identification may be a platform account number or the like. User information a plurality of tag information. The tag information includes attributes of the user such as age, gender, occupation, marital status, cultural degree, occupation, property guarantee, and health status. The virtual resource acquisition platform forms the acquired label information into a text vector, and the formed text vector is used as the user portrait of the user. The user portrait is used as a virtual representation of an actual user, and reflects the characteristics and requirements of the actual user.
The virtual resource acquisition platform also captures browsing records of the user. The browsing record of the user can be a click operation or a query operation on a certain virtual resource. For example, the browsing history may be set to whether a virtual resource is clicked, 1 if clicked, and 0 if not clicked. Of course, the click condition or browsing condition of the user on multiple virtual resources may be used as the browsing record at the same time.
Step 512, determining resource preference of the user based on the user portrait; the resource preference includes a resource identification.
And the virtual resource acquisition platform determines a preference matrix of the user according to the user portrait and the browsing record. Specifically, the user portrait and the browsing records are combined into a long text vector, and the text vector is used as an input variable and substituted into the random forest model, so that the probability that the user expects to acquire various types of virtual resources is predicted. For example, assuming that there are 100 virtual resources (A1 to a100) in the current virtual resource pool, we need to predict the probability that the user desires to acquire each virtual resource according to the user representation and the browsing records of the user.
Whether the A1 virtual resource is clicked is considered as the browsing record of the user, and the value is 1 if the user acquires the virtual resource, and is 0 if the user does not acquire the virtual resource. Then the user portrait and browsing records constitute the input variables shown in table 1:
TABLE 1
Figure BDA0001693627110000111
Figure BDA0001693627110000121
Modeling by taking users with the virtual resource acquisition behaviors of the next step as samples, predicting the possibility that the current user expects to acquire each virtual resource, and outputting variables as shown in table 2:
TABLE 2
A2 A3 A4 …… An
User 1 acquisition probability 0.1 0.2 0.2 …… 0.1
User 2 acquisition probability 0.2 0.15 0.25 …… 0.15
And the virtual resource acquisition platform acquires a preference matrix of the user according to the probability of acquiring the virtual resource. For each user, P (a2) + P (A3) + … + P (an) ═ 1 is satisfied. Then, a probability table as shown in the above table is generated by sequentially considering the possible acquisition probability after clicking the a2 virtual resource, and so on until a random forest model of 100 virtual resources (A1-a100) is established, and finally, a preference matrix of each virtual resource expected by the user is obtained according to the established random forest model. The method for predicting the preference matrix of the user by adopting the random forest algorithm predicts by taking the user who has acquired the behavior in the next step as a sample, namely, the method carries out recommendation by combining the probability of the whole crowd, the personal attribute and the current state, so that the recommendation accuracy is improved.
The virtual resource obtaining platform obtains an interest list of the user according to the preference matrix, wherein the interest list can be the probability that the user is interested in various virtual resources, the interest list can also be the user-interested virtual resources obtained through interest probability screening, and other expression forms capable of reflecting the user resource preference.
And 514, recommending virtual resources according to the public sentiment indexes corresponding to the resource identifications in the resource preferences.
The preference matrix characterizes the resource preferences of the user and contains a plurality of resource identifications which may be of interest to the user. The virtual resource obtaining platform obtains a public sentiment index corresponding to the resource identifier in the resource preference, screens one or more resource identifiers of which the public sentiment index exceeds a threshold value, and displays the resource information of the virtual resource corresponding to the resource identifier obtained through screening. Wherein the threshold value can be dynamically generated based on the user information so as to fully consider the factors that different users have different risk bearing capacities. There may be more virtual resources obtained by screening. In another embodiment, the configuration parameters include a ranking factor, and in order to facilitate the user to obtain more valuable virtual resources in the shortest possible time, the virtual resource obtaining platform ranks the plurality of virtual resources obtained by screening according to the ranking factor and the public opinion index.
In another embodiment, in order to reduce the burden of a user for configuring each configuration item one by one on a configuration page, the virtual resource acquisition platform determines, according to the recommended attribute information of one or more virtual resources, initial configuration parameters corresponding to the plurality of configuration items in the configuration page, respectively. For example, attribute information for a virtual resource that is predicted to be of most likely interest to the user is written to the configuration page. And the virtual resource acquisition platform generates and displays a configuration page according to the plurality of configuration items and the initial configuration parameters respectively corresponding to the configuration items. In other words, a plurality of configuration items in the configuration page respectively have corresponding initial configuration parameters, and a user can acquire logic configuration on the basis of the initial configuration parameters, so that the configuration efficiency is improved.
In the embodiment, the virtual resources are recommended according to the resource preference of the user and the public sentiment indexes of the virtual resources collected in real time, so that the recommendation accuracy is improved, and the user can conveniently obtain more valuable virtual resources in the shortest possible time.
In one embodiment, the method further comprises: carrying out retest on the execution code to obtain a retest result; judging whether the retest result reaches a retest threshold value; if so, running an execution code, and screening virtual resources corresponding to the configuration parameters in the virtual resource pool; otherwise, generating a configuration adjustment report and displaying the configuration adjustment report.
The configuration items also include backtesting conditions. The corresponding backtesting conditions for different types of virtual resources may be different. For example, the backtesting conditions for the invested virtual resources may include resource trading values, resource holding periods, resource allocation proportions, resource allocation proportion adjustment spans, and the like. And the virtual resource acquisition platform converts the retest conditions into corresponding retest threshold values according to preset rules. The regression threshold value comprises a plurality of indexes such as alpha income, beta income, summer proportion, income regression ratio, maximum regression, continuous loss period and the like.
When the logic configuration is obtained, the user can trigger a test-back instruction on the configuration page. And the virtual resource acquisition platform calls the retest interface to perform retest on the execution code according to the retest instruction to obtain a retest result. The retest interface can be realized based on a cloud retest framework such as Python. And the virtual resource acquisition platform compares the calculated retest result with the retest threshold value and judges whether the corresponding retest threshold value is reached. And if the retest results reach the corresponding retest threshold values, the obtaining logic contained in the running codes is represented to be good, the virtual resource obtaining platform runs the execution codes, and the virtual resources corresponding to the configuration parameters are screened in the virtual resource pool according to the mode. If the retest result does not reach the corresponding retest threshold value, the fact that the acquisition logic contained in the running code needs to be adjusted is indicated, the virtual resource acquisition platform calculates the difference value between the retest result and the corresponding retest threshold value, the adjustment strategy corresponding to the difference value is determined according to the preset multiple difference values and the corresponding adjustment strategies, a configuration adjustment report is generated based on the acquired adjustment strategies, and the configuration adjustment report is displayed so as to prompt a user to adjust the acquisition logic of the virtual resource on a configuration page.
In the embodiment, the virtual resource recommendation is performed before the logic configuration is acquired, the retest is performed after the logic configuration is acquired, and the adjustment strategy is given in time when the retest result is not ideal, so that the logic configuration acquisition by a user is greatly facilitated, the threshold for acquiring the logic configuration is reduced, and the virtual resource acquisition efficiency is improved.
It should be understood that although the various steps in the flow charts of fig. 2-5 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-5 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 6, there is provided a virtual resource-based network access system, including: a terminal 602 and a server 604, wherein:
a terminal 602, configured to acquire an image file and deploy a virtual resource acquisition platform by starting the image file; carrying out network isolation on the virtual resource acquisition platform; displaying a configuration page on the virtual resource acquisition platform after network isolation; acquiring configuration parameters input in a configuration page; generating an execution code for acquiring the virtual resource based on the configuration parameters; and running the execution code, and screening the virtual resources corresponding to the configuration parameters in the virtual resource pool.
And the server 604 is used for predicting the public sentiment indexes corresponding to the resource identifications.
The terminal 602 is further configured to display the screened multiple virtual resources according to the public sentiment index.
In one embodiment, the terminal 602 is further configured to receive an access instruction for the virtual resource obtaining platform, where the access instruction includes a network identifier; and performing network configuration on the virtual resource acquisition platform according to the network identifier so as to perform network isolation on the virtual resource acquisition platforms accessed by different users.
In one embodiment, the terminal 602 is further configured to receive an access instruction for the virtual resource acquisition platform, and extract a feature field in the access instruction; generating a feature vector corresponding to the access instruction according to the feature field; inputting the characteristic vector into a preset safety monitoring model, and detecting whether an access instruction is risk access; if so, carrying out risk alarm; otherwise, displaying a configuration page on the virtual resource acquisition platform.
In one embodiment, the terminal 602 is further configured to generate an object code corresponding to the corresponding configuration item based on the configuration parameter; and respectively adding the target codes corresponding to the plurality of configuration items to the template codes to obtain the execution codes for acquiring the virtual resources.
In an embodiment, the terminal 602 is further configured to obtain public opinion information issued by a preset platform, split the public opinion information, and obtain a plurality of short texts; calculating the corresponding emotion index of each short text; extracting resource identification from the short texts, and determining influence weights corresponding to the short texts respectively; calculating public sentiment indexes corresponding to the corresponding resource identifications according to the sentiment indexes and the influence weights; acquiring user information, and establishing a user portrait according to the user information; determining resource preferences of the user based on the user representation; the resource preference includes a resource identification; and recommending the virtual resources according to the public sentiment indexes corresponding to the resource identifications in the resource preference.
In one embodiment, the terminal 602 is further configured to perform a retest on the execution code to obtain a retest result; judging whether the retest result reaches a retest threshold value; if so, running an execution code, and screening virtual resources corresponding to the configuration parameters in the virtual resource pool; otherwise, generating a configuration adjustment report and displaying the configuration adjustment report.
In one embodiment, the server 604 is further configured to monitor public opinion information issued by a preset platform, split the public opinion information, and obtain a plurality of short texts; extracting a resource identifier from the short text; calculating the emotion index corresponding to each short text by using a preset public opinion analysis model; determining influence weights corresponding to the short texts respectively; and calculating the public sentiment index corresponding to the corresponding resource identifier according to the sentiment index and the influence weight.
For specific limitations of the virtual resource based network access system, reference may be made to the above limitations of the virtual resource based network access method, which is not described herein again. The modules in the virtual resource-based network access system can be implemented in whole or in part by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor calls and executes operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 7. The computer device includes a processor, a memory, a network interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a virtual resource based network access method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 7 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, there is provided a computer device comprising a memory storing a computer program and a processor implementing the following steps when the processor executes the computer program: acquiring a configuration page of a virtual resource, wherein the configuration page comprises a plurality of configuration items; acquiring corresponding configuration parameters according to configuration operation on the configuration items; generating target codes corresponding to the corresponding configuration items based on the configuration parameters; respectively adding target codes corresponding to the configuration items to the template codes to obtain execution codes for acquiring the virtual resources; and running the execution code, and screening the virtual resources corresponding to the configuration parameters in the virtual resource pool.
In one embodiment, the processor, when executing the computer program, further performs the steps of: pulling a corresponding mirror image file in a mirror image warehouse; deploying a virtual resource acquisition platform by starting a mirror image file; receiving an access instruction for the virtual resource acquisition platform, wherein the access instruction comprises a network identifier; performing network configuration on the virtual resource acquisition platform according to the network identifier so as to perform network isolation on the virtual resource acquisition platforms accessed by different users; and displaying a configuration page on the virtual resource acquisition platform after the network isolation.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring user information, establishing a user portrait according to the user information, and acquiring a browsing record of a user; determining a preference matrix of the user according to the user portrait and the browsing record; predicting the resource preference of the user according to the preference matrix; predicting initial configuration parameters respectively corresponding to the plurality of configuration items according to the resource preference; generating a configuration page according to the plurality of configuration items and the initial configuration parameters respectively corresponding to the configuration items; and displaying a configuration page.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring user information, and determining a user category corresponding to the user information; acquiring a resource list corresponding to a user category; a plurality of resource identifications and recommended heat values corresponding to the resource identifications are recorded in the resource list; predicting a target resource identifier matched with the user information according to the recommended heat value; determining initial configuration parameters corresponding to the plurality of configuration items according to the resource information corresponding to the target resource identifier; generating a configuration page according to the plurality of configuration items and the initial configuration parameters respectively corresponding to the configuration items; and displaying a configuration page.
In one embodiment, the configuration parameter comprises a backtest threshold; the processor, when executing the computer program, further performs the steps of: carrying out retest on the execution code to obtain a retest result; judging whether the retest result reaches a retest threshold value; if so, running an execution code, and screening virtual resources corresponding to the configuration parameters in the virtual resource pool; otherwise, generating a configuration adjustment report and displaying the configuration adjustment report.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: acquiring a configuration page of a virtual resource, wherein the configuration page comprises a plurality of configuration items; acquiring corresponding configuration parameters according to configuration operation on the configuration items; generating target codes corresponding to the corresponding configuration items based on the configuration parameters; respectively adding target codes corresponding to the configuration items to the template codes to obtain execution codes for acquiring the virtual resources; and running the execution code, and screening the virtual resources corresponding to the configuration parameters in the virtual resource pool.
In one embodiment, the computer program when executed by the processor further performs the steps of: pulling a corresponding mirror image file in a mirror image warehouse; deploying a virtual resource acquisition platform by starting a mirror image file; receiving an access instruction for the virtual resource acquisition platform, wherein the access instruction comprises a network identifier; performing network configuration on the virtual resource acquisition platform according to the network identifier so as to perform network isolation on the virtual resource acquisition platforms accessed by different users; and displaying a configuration page on the virtual resource acquisition platform after the network isolation.
In one embodiment, the computer program when executed by the processor further performs the steps of: acquiring user information, establishing a user portrait according to the user information, and acquiring a browsing record of a user; determining a preference matrix of the user according to the user portrait and the browsing record; predicting the resource preference of the user according to the preference matrix; predicting initial configuration parameters respectively corresponding to the plurality of configuration items according to the resource preference; generating a configuration page according to the plurality of configuration items and the initial configuration parameters respectively corresponding to the configuration items; and displaying a configuration page.
In one embodiment, the computer program when executed by the processor further performs the steps of: acquiring user information, and determining a user category corresponding to the user information; acquiring a resource list corresponding to a user category; a plurality of resource identifications and recommended heat values corresponding to the resource identifications are recorded in the resource list; predicting a target resource identifier matched with the user information according to the recommended heat value; determining initial configuration parameters corresponding to the plurality of configuration items according to the resource information corresponding to the target resource identifier; generating a configuration page according to the plurality of configuration items and the initial configuration parameters respectively corresponding to the configuration items; and displaying a configuration page.
In one embodiment, the configuration parameter comprises a backtest threshold; the computer program when executed by the processor further realizes the steps of: carrying out retest on the execution code to obtain a retest result; judging whether the retest result reaches a retest threshold value; if so, running an execution code, and screening virtual resources corresponding to the configuration parameters in the virtual resource pool; otherwise, generating a configuration adjustment report and displaying the configuration adjustment report.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (14)

1. A method of virtual resource based network access, the method comprising:
acquiring a mirror image file, and deploying a virtual resource acquisition platform by starting the mirror image file;
performing network isolation on the virtual resource acquisition platform;
displaying a configuration page on the virtual resource acquisition platform after network isolation;
acquiring configuration parameters input in the configuration page;
generating an execution code for acquiring the virtual resource based on the configuration parameter;
and running the execution code, and screening the virtual resources corresponding to the configuration parameters in a virtual resource pool.
2. The method of claim 1, wherein the network isolating the virtual resource acquisition platform comprises:
receiving an access instruction to the virtual resource acquisition platform, wherein the access instruction comprises a network identifier;
and performing network configuration on the virtual resource acquisition platform according to the network identifier so as to perform network isolation on the virtual resource acquisition platforms accessed by different users.
3. The method of claim 1, wherein the virtual resource acquisition platform presentation configuration page after network isolation comprises:
receiving an access instruction of a virtual resource acquisition platform, and extracting a characteristic field in the access instruction;
generating a feature vector corresponding to the access instruction according to the feature field;
inputting the characteristic vector into a preset safety monitoring model, and detecting whether an access instruction is risk access;
if so, carrying out risk alarm; otherwise, displaying a configuration page on the virtual resource acquisition platform.
4. The method of claim 1, wherein generating an execution code for acquiring a virtual resource based on the configuration parameter comprises:
generating target codes corresponding to the corresponding configuration items based on the configuration parameters;
and respectively adding the target codes corresponding to the plurality of configuration items to the template codes to obtain the execution codes for acquiring the virtual resources.
5. The method of claim 1, further comprising:
public opinion information issued by a preset platform is obtained, and the public opinion information is split to obtain a plurality of short texts;
calculating the corresponding emotion index of each short text;
extracting resource identifiers from the short texts, and determining influence weights corresponding to the short texts respectively;
calculating public sentiment indexes corresponding to the corresponding resource identifications according to the sentiment indexes and the influence weights;
acquiring user information, and establishing a user portrait according to the user information;
determining resource preferences of a user based on the user representation; the resource preference comprises a resource identification;
and recommending the virtual resources according to the public sentiment indexes corresponding to the resource identifications in the resource preference.
6. A virtual resource based network access system, the system comprising:
the terminal is used for acquiring the image file and deploying the virtual resource acquisition platform by starting the image file; performing network isolation on the virtual resource acquisition platform; displaying a configuration page on the virtual resource acquisition platform after network isolation; acquiring configuration parameters input in the configuration page; generating an execution code for acquiring the virtual resource based on the configuration parameter; running the execution code, and screening virtual resources corresponding to the configuration parameters in a virtual resource pool;
the server is used for predicting public opinion indexes corresponding to the resource identifications;
the terminal is also used for displaying a plurality of virtual resources obtained through screening according to the public sentiment index.
7. The system of claim 6, wherein the terminal is further configured to perform a backtest on the execution code to obtain a backtest result; judging whether the retest result reaches a retest threshold value; if yes, running the execution code, and screening virtual resources corresponding to the configuration parameters in a virtual resource pool; otherwise, generating a configuration adjustment report and displaying the configuration adjustment report.
8. The system according to claim 6, wherein the terminal is further configured to receive an access instruction to the virtual resource acquisition platform, where the access instruction includes a network identifier; and performing network configuration on the virtual resource acquisition platform according to the network identifier so as to perform network isolation on the virtual resource acquisition platforms accessed by different users.
9. The system according to claim 6, wherein the terminal is further configured to receive an access instruction to the virtual resource acquisition platform, extract a feature field in the access instruction; generating a feature vector corresponding to the access instruction according to the feature field; inputting the characteristic vector into a preset safety monitoring model, and detecting whether the access instruction is risk access; if so, carrying out risk alarm; otherwise, displaying a configuration page on the virtual resource acquisition platform.
10. The system of claim 6, wherein the terminal is further configured to generate an object code corresponding to the corresponding configuration item based on the configuration parameter; and respectively adding the target codes corresponding to the configuration items to template codes to obtain execution codes for acquiring the virtual resources.
11. The system according to claim 6, wherein the terminal is further configured to obtain public opinion information published by a preset platform, split the public opinion information, and obtain a plurality of short texts; calculating the corresponding emotion index of each short text; extracting resource identifiers from the short texts, and determining influence weights corresponding to the short texts respectively; calculating public sentiment indexes corresponding to the corresponding resource identifications according to the sentiment indexes and the influence weights; acquiring user information, and establishing a user portrait according to the user information; determining resource preferences of a user based on the user representation; the resource preference comprises a resource identification; and recommending virtual resources according to the public sentiment index corresponding to the resource identifier in the resource preference.
12. The system of claim 6, wherein the server is further configured to monitor public opinion information issued by a preset platform, split the public opinion information, and obtain a plurality of short texts; extracting a resource identifier from the short text; calculating the emotion index corresponding to each short text by using a preset public opinion analysis model; determining influence weights corresponding to the short texts respectively; and calculating the public sentiment index corresponding to the corresponding resource identifier according to the sentiment index and the influence weight.
13. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 5 when executing the computer program.
14. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 5.
CN201810602618.3A 2018-06-12 2018-06-12 Network access method, system, computer device and medium based on virtual resources Active CN108809718B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810602618.3A CN108809718B (en) 2018-06-12 2018-06-12 Network access method, system, computer device and medium based on virtual resources

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810602618.3A CN108809718B (en) 2018-06-12 2018-06-12 Network access method, system, computer device and medium based on virtual resources

Publications (2)

Publication Number Publication Date
CN108809718A CN108809718A (en) 2018-11-13
CN108809718B true CN108809718B (en) 2021-03-19

Family

ID=64085445

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810602618.3A Active CN108809718B (en) 2018-06-12 2018-06-12 Network access method, system, computer device and medium based on virtual resources

Country Status (1)

Country Link
CN (1) CN108809718B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112187703B (en) * 2019-07-02 2023-06-20 北京百度网讯科技有限公司 Data processing method and device
CN112749022B (en) * 2019-10-29 2024-05-31 阿里巴巴集团控股有限公司 Camera resource access method, operating system, terminal and virtual camera
CN111709769B (en) * 2020-05-15 2023-09-19 口碑(上海)信息技术有限公司 Data processing method and device
CN111931049B (en) * 2020-08-02 2021-04-30 深圳前海大道金融服务有限公司 Business processing method based on big data and artificial intelligence and block chain financial system
CN112600906B (en) * 2020-12-09 2022-04-26 中国科学院深圳先进技术研究院 Resource allocation method and device for online scene and electronic equipment
CN114531287B (en) * 2022-02-17 2024-06-11 恒安嘉新(北京)科技股份公司 Method, device, equipment and medium for detecting virtual resource acquisition behavior
CN115617745B (en) * 2022-10-13 2023-08-01 自然资源部国土卫星遥感应用中心 Management method, management device and medium for satellite image data storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103051710A (en) * 2012-12-20 2013-04-17 中国科学院深圳先进技术研究院 Virtual cloud platform management system and method
CN103107994A (en) * 2013-02-06 2013-05-15 中电长城网际系统应用有限公司 Vitualization environment data security partition method and system
US8510821B1 (en) * 2010-06-29 2013-08-13 Amazon Technologies, Inc. Tiered network flow analysis
CN103338241A (en) * 2013-06-19 2013-10-02 合肥工业大学 Novel public cloud architecture and virtualized resource self-adaption configuration method thereof
CN104468504A (en) * 2014-10-22 2015-03-25 南京绿云信息技术有限公司 Monitoring method and system for virtualized network dynamic information security
CN107426152A (en) * 2017-04-07 2017-12-01 西安电子科技大学 Multitask security isolation system and method under cloud platform actual situation Interconnection Environment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8510821B1 (en) * 2010-06-29 2013-08-13 Amazon Technologies, Inc. Tiered network flow analysis
CN103051710A (en) * 2012-12-20 2013-04-17 中国科学院深圳先进技术研究院 Virtual cloud platform management system and method
CN103107994A (en) * 2013-02-06 2013-05-15 中电长城网际系统应用有限公司 Vitualization environment data security partition method and system
CN103338241A (en) * 2013-06-19 2013-10-02 合肥工业大学 Novel public cloud architecture and virtualized resource self-adaption configuration method thereof
CN104468504A (en) * 2014-10-22 2015-03-25 南京绿云信息技术有限公司 Monitoring method and system for virtualized network dynamic information security
CN107426152A (en) * 2017-04-07 2017-12-01 西安电子科技大学 Multitask security isolation system and method under cloud platform actual situation Interconnection Environment

Also Published As

Publication number Publication date
CN108809718A (en) 2018-11-13

Similar Documents

Publication Publication Date Title
CN108809718B (en) Network access method, system, computer device and medium based on virtual resources
CN108874992B (en) Public opinion analysis method, system, computer equipment and storage medium
CN108804133B (en) Method, system, computer device and storage medium for acquiring virtual resources
CN108228873B (en) Object recommendation and release content pushing method and device, storage medium and equipment
US11704439B2 (en) Systems and methods for managing privacy policies using machine learning
CN109543925B (en) Risk prediction method and device based on machine learning, computer equipment and storage medium
CN110688598B (en) Service parameter acquisition method and device, computer equipment and storage medium
CN110109750B (en) Virtual resource acquisition method, device, computer equipment and storage medium
CN111563220A (en) Business website project construction method and device, computer equipment and storage medium
CN110233879B (en) Intelligent interface pushing method and device, computer equipment and storage medium
CN111310427A (en) Service data configuration processing method and device, computer equipment and storage medium
CN111192025A (en) Occupational information matching method and device, computer equipment and storage medium
CN109376237A (en) Prediction technique, device, computer equipment and the storage medium of client's stability
CN108595697B (en) Webpage integration method, device and system
CN112035611B (en) Target user recommendation method, device, computer equipment and storage medium
CN112395500A (en) Content data recommendation method and device, computer equipment and storage medium
CN111078507A (en) Data monitoring method, system, computer equipment and storage medium
CN112784168B (en) Information push model training method and device, information push method and device
CN113157315A (en) Method, device, equipment and medium for identifying difference information of different versions of software
CN110020280B (en) Application page display method and device, storage medium and computer equipment
CN113420018A (en) User behavior data analysis method, device, equipment and storage medium
CN111597422A (en) Buried point mapping method and device, computer equipment and storage medium
CN110659435A (en) Page data acquisition processing method and device, computer equipment and storage medium
CN111813816A (en) Data processing method, data processing device, computer readable storage medium and computer equipment
US11562121B2 (en) AI driven content correction built on personas

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant