CN110069924A - Computer user's behavior monitoring method and computer readable storage medium - Google Patents

Computer user's behavior monitoring method and computer readable storage medium Download PDF

Info

Publication number
CN110069924A
CN110069924A CN201910200278.6A CN201910200278A CN110069924A CN 110069924 A CN110069924 A CN 110069924A CN 201910200278 A CN201910200278 A CN 201910200278A CN 110069924 A CN110069924 A CN 110069924A
Authority
CN
China
Prior art keywords
user
behavior
computer
information
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910200278.6A
Other languages
Chinese (zh)
Other versions
CN110069924B (en
Inventor
朱春平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Wuji Interconnection Technology Co Ltd
Original Assignee
Zhejiang Wuji Interconnection Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Wuji Interconnection Technology Co Ltd filed Critical Zhejiang Wuji Interconnection Technology Co Ltd
Priority to CN201910200278.6A priority Critical patent/CN110069924B/en
Publication of CN110069924A publication Critical patent/CN110069924A/en
Application granted granted Critical
Publication of CN110069924B publication Critical patent/CN110069924B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Abstract

The present invention relates to field of computer technology, specifically disclose a kind of computer user's behavior monitoring method and computer readable storage medium, which comprises detection computer user's public information is simultaneously stored to cloud memory and generating user behavior read requests;Data are carried out according to the user behavior information of reading to analyze to form half format data, and cloud server is transmitted to using cipher mode;Real time monitoring computer user's behavior simultaneously generates active user behavioural information, judges whether it is active user behavioural information according to the behavior of user and encrypts and be transmitted to cloud server.The present invention is by reading user behavior information when meeting user safety authentication information, simultaneously, by real time monitoring computer user's behavior and generate active user behavioural information, active user behavioural information is judged whether it is according to the behavior of user and encrypts and be transmitted to cloud server, and information is easy to leak by network during solving the problems, such as computer user's behavior monitoring.

Description

Computer user's behavior monitoring method and computer readable storage medium
Technical field
The present invention relates to field of computer technology, specifically a kind of computer user's behavior monitoring method and computer-readable Storage medium.
Background technique
Nowadays, with the information-based development with electronicalization process, more and more enterprises start based on big data and are dug Client is dug, carries out precision marketing by collecting the information to the enterprise of a large amount of consumers offer product or service.Wherein, pass through Computer user's behavior monitoring can provide data supporting for user behavior analysis, and user behavior analysis is exactly to use production to user All data (including download, frequency of use, amount of access, rate of people logging in, remaining time etc.) during product are collected, are whole The rule that reason, statistics, analysis use the product by the user provides strong for the activity such as follow-up developments, optimization or marketing of product Data supporting is all used widely in numerous areas such as financial trade, medicine, transport, telecommunication, law, electronic equipments.
But the continuous improvement with society for information security attention rate, more and more enterprise and establishments are opened Starting weight is depending on the problem of information is leaked by network during computer user's behavior monitoring.Therefore, a kind of computer is designed User behavior monitoring method and computer readable storage medium, the problem of becoming urgent need to resolve.
Summary of the invention
The purpose of the present invention is to provide a kind of computer user's behavior monitoring method and computer readable storage medium, with Solve the problems mentioned above in the background art.
To achieve the above object, the invention provides the following technical scheme:
A kind of computer user's behavior monitoring method, comprising:
Detection computer user's public information is simultaneously stored to cloud memory;The cloud memory passes through Web service application It program interface (API) or is accessed by user's interface of Webization, data can be effectively reduced by cloud memory and accounted for With space, and then be conducive to improve working efficiency;
User behavior read requests are generated according to user's public information of cloud memory storage and are sent to computer user;
If user receives user behavior read requests, judged whether to meet user safety authentication information according to the behavior of user, User behavior information is read when meeting user safety authentication information, otherwise carry out monitoring camera-shooting immediately and is forbidden within certain time limit Send user behavior read requests;
If user refuses user behavior read requests, read requests are sent again and carry out secondary-confirmation, if user refuses again Read requests then stop sending user behavior read requests;
Data are carried out according to the user behavior information of reading to analyze to form half format data, and cloud is transmitted to using cipher mode Hold server;
Real time monitoring computer user's behavior simultaneously generates active user behavioural information, judges whether it is real-time according to the behavior of user User behavior information is encrypted and is transmitted to cloud server;
It is real-time according to half format data of cloud server storage and active user behavioural information progress universal parallel data flow Processing generates data packet and stores to memory and cloud server and backed up;By storing to memory and cloud server It is backed up, effectively increases the safety of data storage, and then prevent loss of data caused by due to memory damages;
Data packet is extracted to be shared by mobile terminal.
As a further solution of the present invention: the behavior according to user judge whether it is active user behavioural information into Row, which encrypts, is simultaneously transmitted to cloud server, comprising: when user is the same as meaning that active user behavioural information encrypts and be transmitted to cloud When holding server, encrypts active user behavioural information and be transmitted to cloud server, monitoring is otherwise forbidden to count within certain time limit Calculation machine user behavior simultaneously generates active user behavioural information.
As further scheme of the invention: the data dimension of the data packet includes search engine data, OTA user The public sentiment data of data (search, purchase, comment data) and transmission on Internet.
As further scheme of the invention: the extraction data packet is shared by mobile terminal, comprising:
Sharing request is sent to computer user;
When user receives sharing request, detects computer user's operating environment and corresponding data packet of extracting generates image data;
When user refuses sharing request, closes sharing request and secondary encryption is carried out to data packet;
It obtains image data and is shared by mobile terminal.
As further scheme of the invention: the mobile terminal includes the first operating system and the second operating system, When the mobile terminal in the first operating system operational process to break down, triggering starts second operating system, The data read in first operating system simultaneously are replicated.
As further scheme of the invention: the monitoring camera-shooting is using the camera shooting group for acquiring image or video Part, the camera assembly include front camera and rear camera;Made by the cooperation of front camera and rear camera With, and then three-dimensional monitoring camera-shooting may be implemented, be conducive to acquire image or video that criminal operates computer equipment, into And facilitate cracking of cases.
A kind of computer readable storage medium, is stored thereon with computer program, realization when which is executed by processor The step of above method.
Compared with prior art, the beneficial effects of the present invention are:
The present invention is judged whether to meet user safety authentication information by the behavior according to user, be believed meeting user safety authentication User behavior information is read when breath, otherwise carries out monitoring camera-shooting immediately and transmission user behavior reading is forbidden to ask within certain time limit It asks, meanwhile, pass through real time monitoring computer user's behavior and generate active user behavioural information, is according to the behavior of user judgement It is no to be encrypted and be transmitted to cloud server for active user behavioural information, during solving computer user's behavior monitoring Information is easy the problem of leaking by network.
Detailed description of the invention
Fig. 1 is a kind of implementation flow chart of computer user's behavior monitoring method provided in an embodiment of the present invention.
Fig. 2 is a kind of structure chart of computer user's behavior monitoring system provided in an embodiment of the present invention.
Specific embodiment
Present invention will be explained in further detail in the following with reference to the drawings and specific embodiments.Following embodiment will be helpful to Those skilled in the art further understands the present invention, but the invention is not limited in any way.It should be pointed out that ability For the those of ordinary skill in domain, without departing from the inventive concept of the premise, various modifications and improvements can be made.These Belong to protection scope of the present invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded Body, step, operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
Referring to Fig. 1, in one embodiment provided by the invention, a kind of computer user's behavior monitoring method, comprising:
In a step 101, it detects computer user's public information and stores to cloud memory;The cloud memory passes through It Web service application program interface (API) or is accessed by user's interface of Webization, cloud storage is a kind of internet The mode of upper storage, i.e., be stored in data the more virtual servers usually managed on behalf of another by third party, and non-exclusive server On, data occupied space can be effectively reduced by cloud memory, and then be conducive to improve working efficiency;
In a step 102, user behavior read requests are generated according to user's public information of cloud memory storage and be sent to Computer user;
In step 103, if user receives user behavior read requests, judge whether to meet user security according to the behavior of user Authentication information reads user behavior information when meeting user safety authentication information, otherwise carries out monitoring camera-shooting immediately and one Periodically forbid sending user behavior read requests in limit;
At step 104, if user refuses user behavior read requests, read requests are sent again and carry out secondary-confirmation, if User refuses read requests again, then stops sending user behavior read requests;
In step 105, it carries out data according to the user behavior information of reading to analyze to form half format data, and using encryption Mode is transmitted to cloud server;
In step 106, it monitors computer user's behavior in real time and generates active user behavioural information, sentenced according to the behavior of user Whether disconnected is that active user behavioural information is encrypted and is transmitted to cloud server;
When user is with meaning that active user behavioural information encrypts and is transmitted to cloud server, active user behavior is encrypted Information is simultaneously transmitted to cloud server, otherwise forbids monitoring computer user's behavior within certain time limit and generates active user row For information;
In step 107, general simultaneously according to half format data of cloud server storage and the progress of active user behavioural information Row data flow is handled to generate data packet and store to memory and cloud server in real time and be backed up;By storing to memory Backed up with cloud server, effectively increase data storage safety, and then prevent because memory damage due to caused by Loss of data;
Wherein, the memory can be real by any kind of volatibility or non-volatile memory device or their combination Existing, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable is only It reads memory (EPROM), programmable read only memory (PROM), read-only memory ((ROM), magnetic memory, flash memory, Disk or CD;
In step 108, data packet is extracted to be shared by mobile terminal.
It should be understood that although each step in the flow chart of Fig. 1 is successively shown according to the instruction of arrow, this A little steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein, these steps It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least part in Fig. 1 Step is not necessarily to execute completion in synchronization, but can execute at different times, these steps are also not necessarily It successively carries out, but can be executed in turn or alternately with other steps.
Optionally, in embodiments of the present invention, when detecting that user receives read requests, transmission authentication information (such as The preset close guarantor's problem of computer booting) to computer progress safety certification, judge whether to meet user according to the behavior of user Secure authenticated information to reading user behavior information after authenticating successfully, and is transmitted to cloud server using cipher mode, can be with It effectively prevent user behavior information to leak outside in transmission process, and then improves the reliability of privacy of user protection.
Further, in embodiments of the present invention, when user receives read requests for the first time, authentication information is user's body Part information, generates digital certificate after authenticating successfully, can locally pass through memory digital certificate.
Further, in embodiments of the present invention, when user's non-first time receives read requests, authentication information is specially The digital certificate comprising subscriber identity information of oneself local storage, can be through safety certification by direct upload digital certificate.
Further, in embodiments of the present invention, the data dimension of the data packet includes search engine data, OTA use The public sentiment data of user data (search, purchase, comment data) and transmission on Internet;For example, when containing tourism letter in data packet When breath, tourist's movement law is analyzed based on crowd's position data of telecom operators, wechat, so that excavation is right The tourist that market content and marketing materials generate interest is precisely pushed, and the tourist for having arrived at destination goes out from interest Hair is pushed, and target is that tourist is allowed to carry out purchase product.
It should be noted that K arest neighbors sorting algorithm can also be used in the analysis of tourist's movement law.So-called K is nearest Neighbour refers to that each sample can be represented with its immediate k neighbour, and core concept is if a sample is in feature Most of in k in space most adjacent samples belong to some classification, then the sample also belongs to this classification, and has The characteristic of sample in this classification.This method is on determining categorised decision only according to one or several closest limited samples This classification is determined wait divide classification belonging to sample.
Referring to Fig. 1, the extraction data packet is carried out by mobile terminal in another embodiment provided by the invention Share, comprising:
Sharing request is sent to computer user;
When user receives sharing request, detects computer user's operating environment and corresponding data packet of extracting generates image data;
When user refuses sharing request, closes sharing request and secondary encryption is carried out to data packet;
It obtains image data and is shared by mobile terminal.
Further, in embodiments of the present invention, the mobile terminal includes the first operating system and the second operating system, When the mobile terminal in the first operating system operational process to break down, triggering starts second operating system, The data read in first operating system simultaneously are replicated.
Further, in embodiments of the present invention, the data dimension of the data packet includes search engine data, OTA use The public sentiment data of user data (search, purchase, comment data) and transmission on Internet;For example, when containing tourism letter in data packet When breath, tourist's movement law is analyzed based on crowd's position data of telecom operators, wechat, so that excavation is right The tourist that market content and marketing materials generate interest is precisely pushed, and the tourist for having arrived at destination goes out from interest Hair is pushed, and target is that tourist is allowed to carry out purchase product.
Referring to Fig. 1, in another embodiment provided by the invention, a kind of computer user's behavior monitoring method, packet It includes:
Detection computer user's public information is simultaneously stored to cloud memory;The cloud memory passes through Web service application It program interface (API) or is accessed by user's interface of Webization, data can be effectively reduced by cloud memory and accounted for With space, and then be conducive to improve working efficiency;
User behavior read requests are generated according to user's public information of cloud memory storage and are sent to computer user;
If user receives user behavior read requests, judged whether to meet user safety authentication information according to the behavior of user, User behavior information is read when meeting user safety authentication information, otherwise carry out monitoring camera-shooting immediately and is forbidden within certain time limit Send user behavior read requests;
Data are carried out according to the user behavior information of reading to analyze to form half format data, and cloud is transmitted to using cipher mode Hold server;
Real time monitoring computer user's behavior simultaneously generates active user behavioural information, judges whether it is real-time according to the behavior of user User behavior information is encrypted and is transmitted to cloud server;
It is real-time according to half format data of cloud server storage and active user behavioural information progress universal parallel data flow Processing generates data packet and stores to memory and cloud server and backed up;By storing to memory and cloud server It is backed up, effectively increases the safety of data storage, and then prevent loss of data caused by due to memory damages;
Data packet is extracted to be shared by mobile terminal.
Referring to Fig. 2, in another embodiment provided by the invention, a kind of computer user's behavior monitoring system, institute Stating computer user's behavior monitoring system includes control module and computer equipment, and the control module passes through network and computer Equipment connection.
Further, in embodiments of the present invention, the control module includes user behavior MIM message input module, Yong Huhang For Information revision module and data analysis module;The user behavior MIM message input module passes through user behavior Information revision mould Block is connect with data analysis module.
Further, in embodiments of the present invention, the user behavior MIM message input module is for reading computer user Behavioural information is simultaneously input to memory;The user behavior Information revision module is used for the user behavior information of memory input It is compared with the data information of pre- typing in user behavior information characteristics database to correct error of transmission;The data analysis Module is used to carry out data analysis to user behavior information, while carrying out universal parallel data flow and handling generation data packet in real time.
Further, in embodiments of the present invention, the computer equipment include processor, it is network interface, non-volatile Storage medium and built-in storage.The non-volatile memory medium is stored with operating system, can also be stored with computer program, should When computer program is executed by processor, processor may make to realize computer user's behavior monitoring method.
Further, in embodiments of the present invention, computer user's behavior monitoring system further includes for being system The power supply being powered, the power supply can be alternating current, direct current, disposable battery or rechargeable battery.When power supply includes When rechargeable battery, which can support wired charging or wireless charging.
It will be understood by those skilled in the art that structure shown in Figure 2, only part relevant to application scheme is tied The block diagram of structure, does not constitute the restriction of computer user's behavior monitoring system described in application scheme, and specific computer is used Family behavior monitoring system may include perhaps combining certain components than more or fewer components as shown in the figure or having not Same component layout.
In another embodiment provided by the invention, processor also performs the steps of when executing computer program
Detection computer user's public information is simultaneously stored to cloud memory;
User behavior read requests are generated according to user's public information of cloud memory storage and are sent to computer user;
If user receives user behavior read requests, judged whether to meet user safety authentication information according to the behavior of user, User behavior information is read when meeting user safety authentication information, otherwise carry out monitoring camera-shooting immediately and is forbidden within certain time limit Send user behavior read requests;
If user refuses user behavior read requests, read requests are sent again and carry out secondary-confirmation, if user refuses again Read requests then stop sending user behavior read requests;
Data are carried out according to the user behavior information of reading to analyze to form half format data, and cloud is transmitted to using cipher mode Hold server;
Real time monitoring computer user's behavior simultaneously generates active user behavioural information, judges whether it is real-time according to the behavior of user User behavior information is encrypted and is transmitted to cloud server;
It is real-time according to half format data of cloud server storage and active user behavioural information progress universal parallel data flow Processing generates data packet and stores to memory and cloud server and backed up;
Data packet is extracted to be shared by mobile terminal.
It further, in embodiments of the present invention, can be user behavior point by real time monitoring computer user's behavior Analysis provide data supporting, user behavior analysis be exactly to during using the product by the user all data (including download, use Frequency, amount of access, rate of people logging in, remaining time etc.) it is collected, arranges, counting, analyzing the rule used the product by the user, be The activity such as follow-up developments, optimization or marketing of product provides strong data supporting;By the way that behavior and consumer behavior will be accessed Association, and then may be implemented precisely to push.For example, compare other content preference person, preference finance and economics, video, game user disappear Take that the amount of money is also corresponding higher, by precisely push product information to preference finance and economics, video, game user, can effectively improve Product marketing efficiency.
In another embodiment provided by the invention, processor also performs the steps of when executing computer program
Sharing request is sent to computer user;
When user receives sharing request, detects computer user's operating environment and corresponding data packet of extracting generates image data;
When user refuses sharing request, closes sharing request and secondary encryption is carried out to data packet;
It obtains image data and is shared by mobile terminal.
In another embodiment provided by the invention, the mobile terminal may is that smart phone, tablet computer, MP4 Player, laptop or desktop computer, the mobile terminal are connect by network with computer equipment.
Further, in embodiments of the present invention, the network interface of the computer equipment is used for and external mobile terminal It is communicated by network connection.The display screen of the computer equipment can be liquid crystal display or electric ink display screen, the meter The input unit for calculating machine equipment can be the touch layer covered on display screen, be also possible to be arranged on computer equipment shell by Key, trace ball or Trackpad can also be external keyboard, Trackpad or input equipment etc..
In another embodiment provided by the invention, the monitoring camera-shooting is using the camera shooting for acquiring image or video Component, the camera assembly include front camera and rear camera.Optionally, the front camera is arranged in computer The back side of computer equipment is arranged in the front panel of equipment, the rear camera.In some embodiments, front camera is At least two, it is respectively main camera, depth of field camera, wide-angle camera, any one in focal length camera.In some realities Apply in example, rear camera at least two, be respectively main camera, depth of field camera, wide-angle camera, in focal length camera Any one, by being used cooperatively for front camera and rear camera, and then three-dimensional monitoring camera-shooting may be implemented, has The image or video of computer equipment are operated conducive to acquisition criminal, and then facilitates cracking of cases.
The beneficial effects of the present invention are: the present invention judges whether that meeting user safety authentication believes by the behavior according to user Breath reads user behavior information when meeting user safety authentication information, otherwise carries out monitoring camera-shooting immediately and in certain time limit Inside forbid sending user behavior read requests, meanwhile, by real time monitoring computer user's behavior and generate active user behavior Information judges whether it is active user behavioural information according to the behavior of user and encrypts and be transmitted to cloud server, solves Information is easy the problem of leaking by network during computer user's behavior monitoring, also by storing to memory and cloud Server is backed up, and the safety of data storage is effectively increased, and then prevents data caused by due to memory damages from losing It loses, has a vast market foreground.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can for Machine memory, flash memory, read-only memory, programmable read only memory, electrically erasable programmable memory, register etc..
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in the process, method, article or apparatus that includes the element.
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
Better embodiment of the invention is explained in detail above, but the present invention is not limited to above-mentioned embodiment party Formula, it is noted that for those of ordinary skill in the art, without departing from the concept of this application, may be used also To make several modifications and improvements.There is no necessity and possibility to exhaust all the enbodiments.And thus amplify out Obvious changes or variations belong to the protection scope of the application.

Claims (8)

1. a kind of computer user's behavior monitoring method characterized by comprising
Detection computer user's public information is simultaneously stored to cloud memory;
User behavior read requests are generated according to user's public information of cloud memory storage and are sent to computer user;
If user receives user behavior read requests, judged whether to meet user safety authentication information according to the behavior of user, User behavior information is read when meeting user safety authentication information, otherwise carry out monitoring camera-shooting immediately and is forbidden within certain time limit Send user behavior read requests;
If user refuses user behavior read requests, read requests are sent again and carry out secondary-confirmation, if user refuses again Read requests then stop sending user behavior read requests;
Data are carried out according to the user behavior information of reading to analyze to form half format data, and cloud is transmitted to using cipher mode Hold server;
Real time monitoring computer user's behavior simultaneously generates active user behavioural information, judges whether it is real-time according to the behavior of user User behavior information is encrypted and is transmitted to cloud server;
It is real-time according to half format data of cloud server storage and active user behavioural information progress universal parallel data flow Processing generates data packet and stores to memory and cloud server and backed up;
Data packet is extracted to be shared by mobile terminal.
2. computer user's behavior monitoring method according to claim 1, which is characterized in that the behavior according to user Judge whether it is active user behavioural information to be encrypted and be transmitted to cloud server, comprising:
When user is with meaning that active user behavioural information encrypts and is transmitted to cloud server, active user behavior is encrypted Information is simultaneously transmitted to cloud server, otherwise forbids monitoring computer user's behavior within certain time limit and generates active user row For information.
3. computer user's behavior monitoring method according to claim 1, which is characterized in that the data dimension of the data packet Degree includes search engine data, the public sentiment data of OTA user data and transmission on Internet.
4. computer user's behavior monitoring method according to claim 1 to 3, which is characterized in that the extraction data Packet is shared by mobile terminal, comprising:
Sharing request is sent to computer user;
When user receives sharing request, detects computer user's operating environment and corresponding data packet of extracting generates image data;
When user refuses sharing request, closes sharing request and secondary encryption is carried out to data packet;
It obtains image data and is shared by mobile terminal.
5. computer user's behavior monitoring method according to claim 4, which is characterized in that the mobile terminal includes the One operating system and the second operating system, when the mobile terminal in the first operating system operational process to break down Triggering starts second operating system, while the data read in first operating system are replicated.
6. computer user's behavior monitoring method according to claim 1, which is characterized in that the monitoring camera-shooting is using use In acquisition image or the camera assembly of video.
7. computer user's behavior monitoring method according to claim 6, which is characterized in that before the camera assembly includes Set camera and rear camera.
8. a kind of computer readable storage medium, is stored with computer program, which is characterized in that the computer program is processed When device executes, so that the processor is executed such as the step of any one of claims 1 to 7 the method.
CN201910200278.6A 2019-03-16 2019-03-16 Computer user behavior monitoring method and computer-readable storage medium Active CN110069924B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910200278.6A CN110069924B (en) 2019-03-16 2019-03-16 Computer user behavior monitoring method and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910200278.6A CN110069924B (en) 2019-03-16 2019-03-16 Computer user behavior monitoring method and computer-readable storage medium

Publications (2)

Publication Number Publication Date
CN110069924A true CN110069924A (en) 2019-07-30
CN110069924B CN110069924B (en) 2023-01-10

Family

ID=67365248

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910200278.6A Active CN110069924B (en) 2019-03-16 2019-03-16 Computer user behavior monitoring method and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN110069924B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112153337A (en) * 2020-09-21 2020-12-29 长江存储科技有限责任公司 Monitoring method and related equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090182873A1 (en) * 2000-06-30 2009-07-16 Hitwise Pty, Ltd Method and system for monitoring online computer network behavior and creating online behavior profiles
CN103914644A (en) * 2013-01-01 2014-07-09 深圳鼎识科技有限公司 Data acquisition and processing system and method
CN107169796A (en) * 2017-05-12 2017-09-15 深圳市浩天投资有限公司 A kind of analysis method of user behavior data, system and computer-readable recording medium
CN107896285A (en) * 2017-12-27 2018-04-10 广东欧珀移动通信有限公司 data reporting method, device, mobile terminal and computer-readable medium
CN109388970A (en) * 2018-10-25 2019-02-26 麒麟合盛网络技术股份有限公司 Data processing method and device
CN109410032A (en) * 2018-09-26 2019-03-01 深圳壹账通智能科技有限公司 A kind of information processing method, server and computer storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090182873A1 (en) * 2000-06-30 2009-07-16 Hitwise Pty, Ltd Method and system for monitoring online computer network behavior and creating online behavior profiles
CN103914644A (en) * 2013-01-01 2014-07-09 深圳鼎识科技有限公司 Data acquisition and processing system and method
CN107169796A (en) * 2017-05-12 2017-09-15 深圳市浩天投资有限公司 A kind of analysis method of user behavior data, system and computer-readable recording medium
CN107896285A (en) * 2017-12-27 2018-04-10 广东欧珀移动通信有限公司 data reporting method, device, mobile terminal and computer-readable medium
CN109410032A (en) * 2018-09-26 2019-03-01 深圳壹账通智能科技有限公司 A kind of information processing method, server and computer storage medium
CN109388970A (en) * 2018-10-25 2019-02-26 麒麟合盛网络技术股份有限公司 Data processing method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112153337A (en) * 2020-09-21 2020-12-29 长江存储科技有限责任公司 Monitoring method and related equipment

Also Published As

Publication number Publication date
CN110069924B (en) 2023-01-10

Similar Documents

Publication Publication Date Title
Goel et al. Smartphone forensic investigation process model
CN105337928B (en) Method for identifying ID, safety protection problem generation method and device
US11593904B2 (en) System and method for collecting forensic data via a mobile device
WO2019237362A1 (en) Privacy-preserving content classification
CN107403094A (en) Distribution file is to perform the system and method for anti-virus scan between the virtual machine of distributed system is formed
CN104753675B (en) Information Authentication method, electric paying method, terminal, server and system
Suarez-Tangil et al. Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation
Actoriano et al. Forensic Investigation on WhatsApp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2
CN111652096A (en) Face recognition method, device and system based on block chain
CN112468409A (en) Access control method, device, computer equipment and storage medium
Yuliani et al. Forensic analysis whatsapp mobile application on android-based smartphones using national institute of standard and technology (nist) framework
Holmes et al. A framework for live host-based Bitcoin wallet forensics and triage
CN110069924A (en) Computer user's behavior monitoring method and computer readable storage medium
Arafat et al. Technical challenges of cloud forensics and suggested solutions
Zhu Mobile Cloud Computing: implications to smartphone forensic procedures and methodologies
CN103052060B (en) A kind of method and a kind of mobile terminal for improving information of mobile terminal safety
Al-Faaruuq et al. iOS Digital Evidence Comparison of Instant Messaging Apps
CN108920971A (en) The method of data encryption, the method for verification, the device of encryption and verification device
CN114625756A (en) Data query method and device and server
Lee Mobile digital forensics framework to increase security level of for smartphone user
CN113987206A (en) Abnormal user identification method, device, equipment and storage medium
CN113873025A (en) Data processing method and device, storage medium and electronic equipment
Rahman et al. Framework Analysis of IDFIF V2 in WhatsApp Investigation Process on Android Smartphones
CN110062001A (en) Data put-on method, device, equipment and computer readable storage medium
Zakarneh et al. Forensic Investigation of WhatsApp on Android Smartphone’s

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant