CN108874647A - A kind of operation system user trajectory recognition methods - Google Patents

A kind of operation system user trajectory recognition methods Download PDF

Info

Publication number
CN108874647A
CN108874647A CN201810619541.0A CN201810619541A CN108874647A CN 108874647 A CN108874647 A CN 108874647A CN 201810619541 A CN201810619541 A CN 201810619541A CN 108874647 A CN108874647 A CN 108874647A
Authority
CN
China
Prior art keywords
user
access
identity information
cookie
recognition methods
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810619541.0A
Other languages
Chinese (zh)
Inventor
王林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Information Center of Yunnan Power Grid Co Ltd
Original Assignee
Information Center of Yunnan Power Grid Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Information Center of Yunnan Power Grid Co Ltd filed Critical Information Center of Yunnan Power Grid Co Ltd
Priority to CN201810619541.0A priority Critical patent/CN108874647A/en
Publication of CN108874647A publication Critical patent/CN108874647A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

The invention discloses a kind of operation system user trajectory recognition methods, the operation system includes operating system of user, background management system and database, the operating system of user generates the access parameter and operation note with user identifier when user's access function in operating system of user for user's operation;Identity information, user identifier, access parameter and operation note are stored in the database, wherein the identity information is associated with user identifier foundation, the access parameter is associated with user identifier and operation note foundation;The background management system accessible database simultaneously according to condition inquires identity information and corresponding operation record.

Description

A kind of operation system user trajectory recognition methods
Technical field
The present invention relates to inline system monitoring technology field more particularly to a kind of operation system user trajectory recognition methods.
Background technique
Existing application performance monitor supervision platform, the monitoring for carrying out application performance for core CSGII system are disposed, are realized pair The real time monitoring and alarm of the web calling process of key application.Preliminary taking the initiative property prevents sexual norm to enhance application system Monitoring capability.But data collection capacity, data correlation degree is insufficient, be unable to satisfy further promoted application system monitoring capacity, The O&M demand of protective capability, safe early warning ability and Ability of emergency management.The method of the displaying of another aspect data it is intuitive Property deficiency cause the service object of platform excessively to limit to, be unable to satisfy to simultaneously to the roles' such as O&M, business, manufacturer, decision From various dimensions exhibitions such as business working order, function service condition, workflow situation, system performance and application problem positioning analysis Show the demand of service platform.
Summary of the invention
It is novel that it is an object of the invention to overcome the deficiencies of the prior art and provide a kind of technologies, can be used for monitoring user behaviour The operation system user trajectory recognition methods of work.
It is an object of the invention to overcome the deficiencies of the prior art and provide a kind of operation system user trajectory recognition methods, The operation system includes operating system of user, background management system and database, the operating system of user for user's operation, And the access parameter and operation note with user identifier are generated when user's access function in operating system of user;Institute It states and stores identity information, user identifier, access parameter and operation note in database, wherein the identity information and user Mark establishes association, and the access parameter is associated with user identifier and operation note foundation;The background management system can visit It asks database and according to condition inquires identity information and corresponding operation record.
Preferably, the access parameter include session object, URL parameter, HTTP access head, HTTP access body and cookie;
Wherein when user accesses system for the first time, the server of system is that the user distributes a session object, simultaneously Specify unique ID for this session, and send client for the ID and be written in cookie so that client with The session of server establishes one-to-one relationship, and the session object is used in discourse referent, records each use The access state at family;
The URL parameter, HTTP access head, HTTP access body store user identifier, can be obtained in it by configuring User identifier, to identify the identity information of current operation user;
Subscriber identity data is stored in the cookie, the server of operation system is to user terminal when user's access Browser issues the cookie for storing user identifier, when the browser of user terminal accesses the server of operation system again, Server checks the Cookie and grabs user identifier, to identify the identity information of current operation user.
Further, the identity information includes organization names, user's name and user account.
Further, the operation note includes the title of access function, access time, average response duration and mistake Rate.
Further, the background management system can also inquire the operation preference of user, and the operation preference includes display User ID, user's name, login account, institutional affiliation, account registion time select to add up login times in the period, add up Access function number accesses most business function titles, accesses most business function average response duration and business access Most time.
The beneficial effects of the present invention are:Operation system user trajectory recognition methods of the invention is, it can be achieved that realize use Family operation trace automatic identification realizes the promotion of system failure discovery, precise positioning and impact analysis ability, to application system Sustained improvement provides sufficient data supporting.
Detailed description of the invention
Fig. 1 is monitoring principle flow chart of the invention.
Specific embodiment
Now claimed technical solution of the invention is described in further details.
Operation system in the present embodiment includes operating system of user, background management system and database, wherein user For operating system by general user's register, background management system is operated by administrator especially can inquire and analyze user In the operation trace of operating system of user.
Wherein operating system of user is for user's operation, and tool is generated when user's access function in operating system of user There are the access parameter and operation note of user identifier;In the present embodiment, access parameter includes session object, URL ginseng Number, HTTP access head, HTTP access body and cookie.
Specifically, when user accesses a page of operating system of user for the first time, server will be user distribution one A session object, while unique ID is specified for this session, and send user terminal for the ID and be written to In cookie, so that the session of user terminal and server establishes one-to-one relationship, session object is used in session In range, the access state of each user terminal is recorded, in order to track the mode of operation of each user terminal, in the letter of session storage Breath, the valid data of these available sessions when browser issues subsequent request.User identifier is stored in session, It can be by configuring the method for obtaining user identifier, to grab user identifier, to identify the user identity of current operation, and right Answer the identity information in database.
URL parameter is a name/value pair being appended on URL, by the way that user identifier is stored in ginseng by goal systems It, can be by configuring the method for obtaining user identifier, to grab user identifier, to identify user's body of current operation in number Part, and the identity information in correspondence database.
HTTP request head provides the information about request, response or other sending entities.The head packet of HTTP Include four general head, request header, head response and entity head parts.Each header field by a domain name, colon (:) and thresholding three parts Composition.General leader can be used to request, it can also be used to respond, be as a whole rather than specific resources and affairs phase Association.Leader is requested, user terminal is allowed to transmit information and desired response forms about itself.Respond leader, server and In the response of transmitting self information, entity leader:Definition is by the information of transmission resource.It can be used to request, it can also be used to respond. User identifier is stored in request header by goal systems, it can be by configuring the method for obtaining user identifier, to grab use Family mark, to identify the user identity of current operation, and the identity information in correspondence database.
It may include the character string information of user's submission in HTTP request body, user identifier is stored in request text by system In, can by configuring the method for obtaining user identifier, to grab user identifier, to identify the user identity of current operation, And the identity information in correspondence database.
Cookie is a bit of text information.User terminal request server, if server needs to record user's shape State just issues a Cookie to user terminal browser using response.User terminal browser can save Cookie. When browser requests the website again, the network address of request is submitted to server together with the Cookie by browser together.Server It checks the Cookie, User Status is recognized with this.Server can also modify the content of Cookie as needed.If target System is stored in user identifier in cookie, can by configure obtain user identifier method, to grab user identifier, from And identify the user identity of current operation, and the identity information in correspondence database.
Identity information, user identifier, access parameter and operation note are stored in database, wherein the identity information It is associated with user identifier foundation, the access parameter is associated with user identifier and operation note foundation.Visited according to user User identifier is extracted in the access parameter generated when asking function, and identity information and operation note in paired data library, thus Identify the operation note of user, monitoring user operation track.In the present embodiment, the identity information of user include organization names, User's name and user account, operation note include the title of access function, access time, average response duration and mistake Rate.
Operation system is developed based on APM platform in the present embodiment, and APM can collect one or more application mistake Journey establishes each function in application process group and operating system of user when user carries out various operations in operating system of user The association of energy, when same group of application process is called, the function in operating system of user described in system identification is called, and records use Family mark and operation note, in the present embodiment, the operation note include access function title, access time, average to ring Answer duration and error rate.When user accesses a certain page of operating system of user and calls relevant in application, system passes through User identifier in its session object, URL parameter, HTTP request head, HTTP request body and cookie identifies user identity, Simultaneity factor records the application that the user is called in operating system of user and judges this using affiliated function and record The identity information of user and operation note are associated with, to obtain the behaviour of user by relevant operation note in the above manner It notes down.
The background management system inputs screening conditions and the operation note of each user is shown and analyzed according to screening conditions, And the operation preference of each user.Operating preference includes display User ID, user's name, login account, institutional affiliation, account Registion time selects to add up login times in the period, adds up access function number, access most business function titles, visits Ask most business function average response duration and business access most time.
Shown in Figure 1, the monitoring principle process of operation system is as follows in the present embodiment:
S1. user accesses operating system of user for the first time, and server will distribute a session object for the user, together When specify unique ID for this session, server needs to record the User Status, just clear to user terminal using response Device of looking at issues a Cookie, when browser requests the website again, browser the network address of request together with the Cookie together Submit to server.Server checks the Cookie, recognizes User Status with this.
S2. user accesses the function webpage in operating system of user, and thinks that server transmission storage is useful in its access URL parameter, HTTP access head, the HTTP of family mark access body.
S3. the access parameter in data-base recording above-mentioned S1 and S2, and establish identity information and be associated with user identifier, resume Access parameter is associated with user identifier and operation note.
S4. manager logs in background management system input screening conditions and shows according to screening conditions and analyze each user's The operation preference of operation note and each user.
The embodiment of the above is only presently preferred embodiments of the present invention, not does limit in any form to the present invention System.Anyone skilled in the art, without departing from the scope of the technical proposal of the invention, all using the disclosure above Technology contents more possible variations and retouching are made to technical solution of the present invention, or be revised as the equivalence enforcement of equivalent variations Example.Therefore all contents without departing from technical solution of the present invention, equivalent equivalence changes, should all cover made by thinking according to the present invention In in protection scope of the present invention.

Claims (5)

1. a kind of operation system user trajectory recognition methods, the operation system includes operating system of user, background management system And database, it is characterised in that:
The operating system of user is generated to have and be used for user's operation when user's access function in operating system of user The access parameter and operation note of family mark;
Identity information, user identifier, access parameter and operation note are stored in the database, wherein the identity information It is associated with user identifier foundation, the access parameter is associated with user identifier and operation note foundation;
The background management system accessible database simultaneously according to condition inquires identity information and corresponding operation record.
2. a kind of operation system user trajectory recognition methods according to claim 1, it is characterised in that:The access parameter It include session object, URL parameter, HTTP access head, HTTP access body and cookie;Wherein it is when user accesses for the first time When system, the server of system is the user one session object of distribution, while specifying unique ID for this session, and And send client for the ID and be written in cookie, it is corresponded so that the session of client and server is established Relationship, the session object be used in discourse referent, record the access state of each user;
The URL parameter, HTTP access head, HTTP access body store user identifier, can be by configuring the use obtained in it Family mark, to identify the identity information of current operation user;
Subscriber identity data is stored in the cookie, browsing of the server of operation system to user terminal when user's access Device issues the cookie for storing user identifier, when the browser of user terminal accesses the server of operation system again, service Device checks the Cookie and grabs user identifier, to identify the identity information of current operation user.
3. a kind of operation system user trajectory recognition methods according to claim 1, it is characterised in that:The identity information Including organization names, user's name and user account.
4. a kind of operation system user trajectory recognition methods according to claim 1, it is characterised in that:The operation note It include the title of access function, access time, average response duration and error rate.
5. a kind of operation system user trajectory recognition methods according to claim 1, it is characterised in that:The back-stage management System can also inquire the operation preference of user, and the operation preference includes display User ID, user's name, login account, institute Belong to mechanism, account registion time selects to add up login times in the period, adds up access function number, access most business Function title accesses most business function average response duration and business access most time.
CN201810619541.0A 2018-06-12 2018-06-12 A kind of operation system user trajectory recognition methods Pending CN108874647A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810619541.0A CN108874647A (en) 2018-06-12 2018-06-12 A kind of operation system user trajectory recognition methods

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810619541.0A CN108874647A (en) 2018-06-12 2018-06-12 A kind of operation system user trajectory recognition methods

Publications (1)

Publication Number Publication Date
CN108874647A true CN108874647A (en) 2018-11-23

Family

ID=64339074

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810619541.0A Pending CN108874647A (en) 2018-06-12 2018-06-12 A kind of operation system user trajectory recognition methods

Country Status (1)

Country Link
CN (1) CN108874647A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109951355A (en) * 2019-03-13 2019-06-28 苏州洞察云信息技术有限公司 A method of it is tracked for distributed system whitepack associated path
CN110321373A (en) * 2019-07-12 2019-10-11 中国农业银行股份有限公司 A kind of query statistic method, apparatus and system
CN110443643A (en) * 2019-07-25 2019-11-12 合肥非度信息技术有限公司 For tracking the method, system and storage medium of marketing communication track
CN112152873A (en) * 2020-09-02 2020-12-29 杭州安恒信息技术股份有限公司 User identification method and device, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105631007A (en) * 2015-12-29 2016-06-01 云南电网有限责任公司电力科学研究院 Industry technical information collecting method and system
US9609139B1 (en) * 2006-11-10 2017-03-28 Callwave Communications, Llc Methods and systems for providing telecommunications services
CN107729214A (en) * 2017-10-13 2018-02-23 福建富士通信息软件有限公司 A kind of visual distributed system monitors O&M method and device in real time

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9609139B1 (en) * 2006-11-10 2017-03-28 Callwave Communications, Llc Methods and systems for providing telecommunications services
CN105631007A (en) * 2015-12-29 2016-06-01 云南电网有限责任公司电力科学研究院 Industry technical information collecting method and system
CN107729214A (en) * 2017-10-13 2018-02-23 福建富士通信息软件有限公司 A kind of visual distributed system monitors O&M method and device in real time

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
王继林等: "《信息安全导论》", 31 August 2015 *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109951355A (en) * 2019-03-13 2019-06-28 苏州洞察云信息技术有限公司 A method of it is tracked for distributed system whitepack associated path
CN109951355B (en) * 2019-03-13 2022-09-06 苏州洞察云信息技术有限公司 Method for white box associated path tracking of distributed system
CN110321373A (en) * 2019-07-12 2019-10-11 中国农业银行股份有限公司 A kind of query statistic method, apparatus and system
CN110443643A (en) * 2019-07-25 2019-11-12 合肥非度信息技术有限公司 For tracking the method, system and storage medium of marketing communication track
CN112152873A (en) * 2020-09-02 2020-12-29 杭州安恒信息技术股份有限公司 User identification method and device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US11562380B2 (en) System and method for applying tracing tools for network locations
CN108874647A (en) A kind of operation system user trajectory recognition methods
US8386449B2 (en) Customer statistics based on database lock use
CN100533435C (en) Media for accessing network
US6151584A (en) Computer architecture and method for validating and collecting and metadata and data about the internet and electronic commerce environments (data discoverer)
RU2628902C2 (en) Coordination mechanism for cloud choice
US20130275229A1 (en) Apparatus and method for universal personal data portability
EP0953922A2 (en) Method and apparatus for forming user sessions and presenting internet data according to the user sessions
US10437610B2 (en) System for utilizing one or more data sources to generate a customized interface
Sisodia et al. Web usage pattern analysis through web logs: A review
CN113746679B (en) Cross-subdomain communication operation and maintenance method, total operation and maintenance server and medium
CN106982251B (en) It is mobile device-based to reconnoitre project field work data reporting method and system
US11616848B2 (en) Curating proxy server pools
CN108804679A (en) A kind of operation system user's operation monitoring data method for visualizing
US10592140B2 (en) Method and system for automated storage provisioning
CN109818820A (en) Data on flows monitoring method, device, electronic equipment and storage medium
CN106708859A (en) Auditing method for resource access behaviors and device
CN107665237A (en) Data structure sorter, the distribution subscription system of unstructured data and method
CN112141832A (en) Visual operation platform of elevator thing networking
US10922624B2 (en) Identifying users of shared devices based on user interactions and identity graph
US9356845B1 (en) System and method for audience segment profiling and targeting
JP4569962B2 (en) Access log recording server, access log recording system, and access log recording method
US10853430B1 (en) Automated agent search engine
CN111352676A (en) Help information pushing method, help system and readable storage medium
US10083246B2 (en) Apparatus and method for universal personal data portability

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181123

RJ01 Rejection of invention patent application after publication