CN110069924A - Computer user's behavior monitoring method and computer readable storage medium - Google Patents
Computer user's behavior monitoring method and computer readable storage medium Download PDFInfo
- Publication number
- CN110069924A CN110069924A CN201910200278.6A CN201910200278A CN110069924A CN 110069924 A CN110069924 A CN 110069924A CN 201910200278 A CN201910200278 A CN 201910200278A CN 110069924 A CN110069924 A CN 110069924A
- Authority
- CN
- China
- Prior art keywords
- user
- behavior
- computer
- information
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/14—Error detection or correction of the data by redundancy in operation
- G06F11/1402—Saving, restoring, recovering or retrying
- G06F11/1446—Point-in-time backing up or restoration of persistent data
- G06F11/1458—Management of the backup or restore process
- G06F11/1464—Management of the backup or restore process for networked environments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
Abstract
The present invention relates to field of computer technology, specifically disclose a kind of computer user's behavior monitoring method and computer readable storage medium, which comprises detection computer user's public information is simultaneously stored to cloud memory and generating user behavior read requests;Data are carried out according to the user behavior information of reading to analyze to form half format data, and cloud server is transmitted to using cipher mode;Real time monitoring computer user's behavior simultaneously generates active user behavioural information, judges whether it is active user behavioural information according to the behavior of user and encrypts and be transmitted to cloud server.The present invention is by reading user behavior information when meeting user safety authentication information, simultaneously, by real time monitoring computer user's behavior and generate active user behavioural information, active user behavioural information is judged whether it is according to the behavior of user and encrypts and be transmitted to cloud server, and information is easy to leak by network during solving the problems, such as computer user's behavior monitoring.
Description
Technical field
The present invention relates to field of computer technology, specifically a kind of computer user's behavior monitoring method and computer-readable
Storage medium.
Background technique
Nowadays, with the information-based development with electronicalization process, more and more enterprises start based on big data and are dug
Client is dug, carries out precision marketing by collecting the information to the enterprise of a large amount of consumers offer product or service.Wherein, pass through
Computer user's behavior monitoring can provide data supporting for user behavior analysis, and user behavior analysis is exactly to use production to user
All data (including download, frequency of use, amount of access, rate of people logging in, remaining time etc.) during product are collected, are whole
The rule that reason, statistics, analysis use the product by the user provides strong for the activity such as follow-up developments, optimization or marketing of product
Data supporting is all used widely in numerous areas such as financial trade, medicine, transport, telecommunication, law, electronic equipments.
But the continuous improvement with society for information security attention rate, more and more enterprise and establishments are opened
Starting weight is depending on the problem of information is leaked by network during computer user's behavior monitoring.Therefore, a kind of computer is designed
User behavior monitoring method and computer readable storage medium, the problem of becoming urgent need to resolve.
Summary of the invention
The purpose of the present invention is to provide a kind of computer user's behavior monitoring method and computer readable storage medium, with
Solve the problems mentioned above in the background art.
To achieve the above object, the invention provides the following technical scheme:
A kind of computer user's behavior monitoring method, comprising:
Detection computer user's public information is simultaneously stored to cloud memory;The cloud memory passes through Web service application
It program interface (API) or is accessed by user's interface of Webization, data can be effectively reduced by cloud memory and accounted for
With space, and then be conducive to improve working efficiency;
User behavior read requests are generated according to user's public information of cloud memory storage and are sent to computer user;
If user receives user behavior read requests, judged whether to meet user safety authentication information according to the behavior of user,
User behavior information is read when meeting user safety authentication information, otherwise carry out monitoring camera-shooting immediately and is forbidden within certain time limit
Send user behavior read requests;
If user refuses user behavior read requests, read requests are sent again and carry out secondary-confirmation, if user refuses again
Read requests then stop sending user behavior read requests;
Data are carried out according to the user behavior information of reading to analyze to form half format data, and cloud is transmitted to using cipher mode
Hold server;
Real time monitoring computer user's behavior simultaneously generates active user behavioural information, judges whether it is real-time according to the behavior of user
User behavior information is encrypted and is transmitted to cloud server;
It is real-time according to half format data of cloud server storage and active user behavioural information progress universal parallel data flow
Processing generates data packet and stores to memory and cloud server and backed up;By storing to memory and cloud server
It is backed up, effectively increases the safety of data storage, and then prevent loss of data caused by due to memory damages;
Data packet is extracted to be shared by mobile terminal.
As a further solution of the present invention: the behavior according to user judge whether it is active user behavioural information into
Row, which encrypts, is simultaneously transmitted to cloud server, comprising: when user is the same as meaning that active user behavioural information encrypts and be transmitted to cloud
When holding server, encrypts active user behavioural information and be transmitted to cloud server, monitoring is otherwise forbidden to count within certain time limit
Calculation machine user behavior simultaneously generates active user behavioural information.
As further scheme of the invention: the data dimension of the data packet includes search engine data, OTA user
The public sentiment data of data (search, purchase, comment data) and transmission on Internet.
As further scheme of the invention: the extraction data packet is shared by mobile terminal, comprising:
Sharing request is sent to computer user;
When user receives sharing request, detects computer user's operating environment and corresponding data packet of extracting generates image data;
When user refuses sharing request, closes sharing request and secondary encryption is carried out to data packet;
It obtains image data and is shared by mobile terminal.
As further scheme of the invention: the mobile terminal includes the first operating system and the second operating system,
When the mobile terminal in the first operating system operational process to break down, triggering starts second operating system,
The data read in first operating system simultaneously are replicated.
As further scheme of the invention: the monitoring camera-shooting is using the camera shooting group for acquiring image or video
Part, the camera assembly include front camera and rear camera;Made by the cooperation of front camera and rear camera
With, and then three-dimensional monitoring camera-shooting may be implemented, be conducive to acquire image or video that criminal operates computer equipment, into
And facilitate cracking of cases.
A kind of computer readable storage medium, is stored thereon with computer program, realization when which is executed by processor
The step of above method.
Compared with prior art, the beneficial effects of the present invention are:
The present invention is judged whether to meet user safety authentication information by the behavior according to user, be believed meeting user safety authentication
User behavior information is read when breath, otherwise carries out monitoring camera-shooting immediately and transmission user behavior reading is forbidden to ask within certain time limit
It asks, meanwhile, pass through real time monitoring computer user's behavior and generate active user behavioural information, is according to the behavior of user judgement
It is no to be encrypted and be transmitted to cloud server for active user behavioural information, during solving computer user's behavior monitoring
Information is easy the problem of leaking by network.
Detailed description of the invention
Fig. 1 is a kind of implementation flow chart of computer user's behavior monitoring method provided in an embodiment of the present invention.
Fig. 2 is a kind of structure chart of computer user's behavior monitoring system provided in an embodiment of the present invention.
Specific embodiment
Present invention will be explained in further detail in the following with reference to the drawings and specific embodiments.Following embodiment will be helpful to
Those skilled in the art further understands the present invention, but the invention is not limited in any way.It should be pointed out that ability
For the those of ordinary skill in domain, without departing from the inventive concept of the premise, various modifications and improvements can be made.These
Belong to protection scope of the present invention.
It should be appreciated that ought use in this specification and in the appended claims, term " includes " and "comprising" instruction
Described feature, entirety, step, operation, the presence of element and/or component, but one or more of the other feature, whole is not precluded
Body, step, operation, the presence or addition of element, component and/or its set.
It is also understood that mesh of the term used in this description of the invention merely for the sake of description specific embodiment
And be not intended to limit the present invention.As description of the invention and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
Referring to Fig. 1, in one embodiment provided by the invention, a kind of computer user's behavior monitoring method, comprising:
In a step 101, it detects computer user's public information and stores to cloud memory;The cloud memory passes through
It Web service application program interface (API) or is accessed by user's interface of Webization, cloud storage is a kind of internet
The mode of upper storage, i.e., be stored in data the more virtual servers usually managed on behalf of another by third party, and non-exclusive server
On, data occupied space can be effectively reduced by cloud memory, and then be conducive to improve working efficiency;
In a step 102, user behavior read requests are generated according to user's public information of cloud memory storage and be sent to
Computer user;
In step 103, if user receives user behavior read requests, judge whether to meet user security according to the behavior of user
Authentication information reads user behavior information when meeting user safety authentication information, otherwise carries out monitoring camera-shooting immediately and one
Periodically forbid sending user behavior read requests in limit;
At step 104, if user refuses user behavior read requests, read requests are sent again and carry out secondary-confirmation, if
User refuses read requests again, then stops sending user behavior read requests;
In step 105, it carries out data according to the user behavior information of reading to analyze to form half format data, and using encryption
Mode is transmitted to cloud server;
In step 106, it monitors computer user's behavior in real time and generates active user behavioural information, sentenced according to the behavior of user
Whether disconnected is that active user behavioural information is encrypted and is transmitted to cloud server;
When user is with meaning that active user behavioural information encrypts and is transmitted to cloud server, active user behavior is encrypted
Information is simultaneously transmitted to cloud server, otherwise forbids monitoring computer user's behavior within certain time limit and generates active user row
For information;
In step 107, general simultaneously according to half format data of cloud server storage and the progress of active user behavioural information
Row data flow is handled to generate data packet and store to memory and cloud server in real time and be backed up;By storing to memory
Backed up with cloud server, effectively increase data storage safety, and then prevent because memory damage due to caused by
Loss of data;
Wherein, the memory can be real by any kind of volatibility or non-volatile memory device or their combination
Existing, such as static random access memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable is only
It reads memory (EPROM), programmable read only memory (PROM), read-only memory ((ROM), magnetic memory, flash memory,
Disk or CD;
In step 108, data packet is extracted to be shared by mobile terminal.
It should be understood that although each step in the flow chart of Fig. 1 is successively shown according to the instruction of arrow, this
A little steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly state otherwise herein, these steps
It executes there is no the limitation of stringent sequence, these steps can execute in other order.Moreover, at least part in Fig. 1
Step is not necessarily to execute completion in synchronization, but can execute at different times, these steps are also not necessarily
It successively carries out, but can be executed in turn or alternately with other steps.
Optionally, in embodiments of the present invention, when detecting that user receives read requests, transmission authentication information (such as
The preset close guarantor's problem of computer booting) to computer progress safety certification, judge whether to meet user according to the behavior of user
Secure authenticated information to reading user behavior information after authenticating successfully, and is transmitted to cloud server using cipher mode, can be with
It effectively prevent user behavior information to leak outside in transmission process, and then improves the reliability of privacy of user protection.
Further, in embodiments of the present invention, when user receives read requests for the first time, authentication information is user's body
Part information, generates digital certificate after authenticating successfully, can locally pass through memory digital certificate.
Further, in embodiments of the present invention, when user's non-first time receives read requests, authentication information is specially
The digital certificate comprising subscriber identity information of oneself local storage, can be through safety certification by direct upload digital certificate.
Further, in embodiments of the present invention, the data dimension of the data packet includes search engine data, OTA use
The public sentiment data of user data (search, purchase, comment data) and transmission on Internet;For example, when containing tourism letter in data packet
When breath, tourist's movement law is analyzed based on crowd's position data of telecom operators, wechat, so that excavation is right
The tourist that market content and marketing materials generate interest is precisely pushed, and the tourist for having arrived at destination goes out from interest
Hair is pushed, and target is that tourist is allowed to carry out purchase product.
It should be noted that K arest neighbors sorting algorithm can also be used in the analysis of tourist's movement law.So-called K is nearest
Neighbour refers to that each sample can be represented with its immediate k neighbour, and core concept is if a sample is in feature
Most of in k in space most adjacent samples belong to some classification, then the sample also belongs to this classification, and has
The characteristic of sample in this classification.This method is on determining categorised decision only according to one or several closest limited samples
This classification is determined wait divide classification belonging to sample.
Referring to Fig. 1, the extraction data packet is carried out by mobile terminal in another embodiment provided by the invention
Share, comprising:
Sharing request is sent to computer user;
When user receives sharing request, detects computer user's operating environment and corresponding data packet of extracting generates image data;
When user refuses sharing request, closes sharing request and secondary encryption is carried out to data packet;
It obtains image data and is shared by mobile terminal.
Further, in embodiments of the present invention, the mobile terminal includes the first operating system and the second operating system,
When the mobile terminal in the first operating system operational process to break down, triggering starts second operating system,
The data read in first operating system simultaneously are replicated.
Further, in embodiments of the present invention, the data dimension of the data packet includes search engine data, OTA use
The public sentiment data of user data (search, purchase, comment data) and transmission on Internet;For example, when containing tourism letter in data packet
When breath, tourist's movement law is analyzed based on crowd's position data of telecom operators, wechat, so that excavation is right
The tourist that market content and marketing materials generate interest is precisely pushed, and the tourist for having arrived at destination goes out from interest
Hair is pushed, and target is that tourist is allowed to carry out purchase product.
Referring to Fig. 1, in another embodiment provided by the invention, a kind of computer user's behavior monitoring method, packet
It includes:
Detection computer user's public information is simultaneously stored to cloud memory;The cloud memory passes through Web service application
It program interface (API) or is accessed by user's interface of Webization, data can be effectively reduced by cloud memory and accounted for
With space, and then be conducive to improve working efficiency;
User behavior read requests are generated according to user's public information of cloud memory storage and are sent to computer user;
If user receives user behavior read requests, judged whether to meet user safety authentication information according to the behavior of user,
User behavior information is read when meeting user safety authentication information, otherwise carry out monitoring camera-shooting immediately and is forbidden within certain time limit
Send user behavior read requests;
Data are carried out according to the user behavior information of reading to analyze to form half format data, and cloud is transmitted to using cipher mode
Hold server;
Real time monitoring computer user's behavior simultaneously generates active user behavioural information, judges whether it is real-time according to the behavior of user
User behavior information is encrypted and is transmitted to cloud server;
It is real-time according to half format data of cloud server storage and active user behavioural information progress universal parallel data flow
Processing generates data packet and stores to memory and cloud server and backed up;By storing to memory and cloud server
It is backed up, effectively increases the safety of data storage, and then prevent loss of data caused by due to memory damages;
Data packet is extracted to be shared by mobile terminal.
Referring to Fig. 2, in another embodiment provided by the invention, a kind of computer user's behavior monitoring system, institute
Stating computer user's behavior monitoring system includes control module and computer equipment, and the control module passes through network and computer
Equipment connection.
Further, in embodiments of the present invention, the control module includes user behavior MIM message input module, Yong Huhang
For Information revision module and data analysis module;The user behavior MIM message input module passes through user behavior Information revision mould
Block is connect with data analysis module.
Further, in embodiments of the present invention, the user behavior MIM message input module is for reading computer user
Behavioural information is simultaneously input to memory;The user behavior Information revision module is used for the user behavior information of memory input
It is compared with the data information of pre- typing in user behavior information characteristics database to correct error of transmission;The data analysis
Module is used to carry out data analysis to user behavior information, while carrying out universal parallel data flow and handling generation data packet in real time.
Further, in embodiments of the present invention, the computer equipment include processor, it is network interface, non-volatile
Storage medium and built-in storage.The non-volatile memory medium is stored with operating system, can also be stored with computer program, should
When computer program is executed by processor, processor may make to realize computer user's behavior monitoring method.
Further, in embodiments of the present invention, computer user's behavior monitoring system further includes for being system
The power supply being powered, the power supply can be alternating current, direct current, disposable battery or rechargeable battery.When power supply includes
When rechargeable battery, which can support wired charging or wireless charging.
It will be understood by those skilled in the art that structure shown in Figure 2, only part relevant to application scheme is tied
The block diagram of structure, does not constitute the restriction of computer user's behavior monitoring system described in application scheme, and specific computer is used
Family behavior monitoring system may include perhaps combining certain components than more or fewer components as shown in the figure or having not
Same component layout.
In another embodiment provided by the invention, processor also performs the steps of when executing computer program
Detection computer user's public information is simultaneously stored to cloud memory;
User behavior read requests are generated according to user's public information of cloud memory storage and are sent to computer user;
If user receives user behavior read requests, judged whether to meet user safety authentication information according to the behavior of user,
User behavior information is read when meeting user safety authentication information, otherwise carry out monitoring camera-shooting immediately and is forbidden within certain time limit
Send user behavior read requests;
If user refuses user behavior read requests, read requests are sent again and carry out secondary-confirmation, if user refuses again
Read requests then stop sending user behavior read requests;
Data are carried out according to the user behavior information of reading to analyze to form half format data, and cloud is transmitted to using cipher mode
Hold server;
Real time monitoring computer user's behavior simultaneously generates active user behavioural information, judges whether it is real-time according to the behavior of user
User behavior information is encrypted and is transmitted to cloud server;
It is real-time according to half format data of cloud server storage and active user behavioural information progress universal parallel data flow
Processing generates data packet and stores to memory and cloud server and backed up;
Data packet is extracted to be shared by mobile terminal.
It further, in embodiments of the present invention, can be user behavior point by real time monitoring computer user's behavior
Analysis provide data supporting, user behavior analysis be exactly to during using the product by the user all data (including download, use
Frequency, amount of access, rate of people logging in, remaining time etc.) it is collected, arranges, counting, analyzing the rule used the product by the user, be
The activity such as follow-up developments, optimization or marketing of product provides strong data supporting;By the way that behavior and consumer behavior will be accessed
Association, and then may be implemented precisely to push.For example, compare other content preference person, preference finance and economics, video, game user disappear
Take that the amount of money is also corresponding higher, by precisely push product information to preference finance and economics, video, game user, can effectively improve
Product marketing efficiency.
In another embodiment provided by the invention, processor also performs the steps of when executing computer program
Sharing request is sent to computer user;
When user receives sharing request, detects computer user's operating environment and corresponding data packet of extracting generates image data;
When user refuses sharing request, closes sharing request and secondary encryption is carried out to data packet;
It obtains image data and is shared by mobile terminal.
In another embodiment provided by the invention, the mobile terminal may is that smart phone, tablet computer, MP4
Player, laptop or desktop computer, the mobile terminal are connect by network with computer equipment.
Further, in embodiments of the present invention, the network interface of the computer equipment is used for and external mobile terminal
It is communicated by network connection.The display screen of the computer equipment can be liquid crystal display or electric ink display screen, the meter
The input unit for calculating machine equipment can be the touch layer covered on display screen, be also possible to be arranged on computer equipment shell by
Key, trace ball or Trackpad can also be external keyboard, Trackpad or input equipment etc..
In another embodiment provided by the invention, the monitoring camera-shooting is using the camera shooting for acquiring image or video
Component, the camera assembly include front camera and rear camera.Optionally, the front camera is arranged in computer
The back side of computer equipment is arranged in the front panel of equipment, the rear camera.In some embodiments, front camera is
At least two, it is respectively main camera, depth of field camera, wide-angle camera, any one in focal length camera.In some realities
Apply in example, rear camera at least two, be respectively main camera, depth of field camera, wide-angle camera, in focal length camera
Any one, by being used cooperatively for front camera and rear camera, and then three-dimensional monitoring camera-shooting may be implemented, has
The image or video of computer equipment are operated conducive to acquisition criminal, and then facilitates cracking of cases.
The beneficial effects of the present invention are: the present invention judges whether that meeting user safety authentication believes by the behavior according to user
Breath reads user behavior information when meeting user safety authentication information, otherwise carries out monitoring camera-shooting immediately and in certain time limit
Inside forbid sending user behavior read requests, meanwhile, by real time monitoring computer user's behavior and generate active user behavior
Information judges whether it is active user behavioural information according to the behavior of user and encrypts and be transmitted to cloud server, solves
Information is easy the problem of leaking by network during computer user's behavior monitoring, also by storing to memory and cloud
Server is backed up, and the safety of data storage is effectively increased, and then prevents data caused by due to memory damages from losing
It loses, has a vast market foreground.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can for
Machine memory, flash memory, read-only memory, programmable read only memory, electrically erasable programmable memory, register etc..
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that
A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in the process, method, article or apparatus that includes the element.
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
Better embodiment of the invention is explained in detail above, but the present invention is not limited to above-mentioned embodiment party
Formula, it is noted that for those of ordinary skill in the art, without departing from the concept of this application, may be used also
To make several modifications and improvements.There is no necessity and possibility to exhaust all the enbodiments.And thus amplify out
Obvious changes or variations belong to the protection scope of the application.
Claims (8)
1. a kind of computer user's behavior monitoring method characterized by comprising
Detection computer user's public information is simultaneously stored to cloud memory;
User behavior read requests are generated according to user's public information of cloud memory storage and are sent to computer user;
If user receives user behavior read requests, judged whether to meet user safety authentication information according to the behavior of user,
User behavior information is read when meeting user safety authentication information, otherwise carry out monitoring camera-shooting immediately and is forbidden within certain time limit
Send user behavior read requests;
If user refuses user behavior read requests, read requests are sent again and carry out secondary-confirmation, if user refuses again
Read requests then stop sending user behavior read requests;
Data are carried out according to the user behavior information of reading to analyze to form half format data, and cloud is transmitted to using cipher mode
Hold server;
Real time monitoring computer user's behavior simultaneously generates active user behavioural information, judges whether it is real-time according to the behavior of user
User behavior information is encrypted and is transmitted to cloud server;
It is real-time according to half format data of cloud server storage and active user behavioural information progress universal parallel data flow
Processing generates data packet and stores to memory and cloud server and backed up;
Data packet is extracted to be shared by mobile terminal.
2. computer user's behavior monitoring method according to claim 1, which is characterized in that the behavior according to user
Judge whether it is active user behavioural information to be encrypted and be transmitted to cloud server, comprising:
When user is with meaning that active user behavioural information encrypts and is transmitted to cloud server, active user behavior is encrypted
Information is simultaneously transmitted to cloud server, otherwise forbids monitoring computer user's behavior within certain time limit and generates active user row
For information.
3. computer user's behavior monitoring method according to claim 1, which is characterized in that the data dimension of the data packet
Degree includes search engine data, the public sentiment data of OTA user data and transmission on Internet.
4. computer user's behavior monitoring method according to claim 1 to 3, which is characterized in that the extraction data
Packet is shared by mobile terminal, comprising:
Sharing request is sent to computer user;
When user receives sharing request, detects computer user's operating environment and corresponding data packet of extracting generates image data;
When user refuses sharing request, closes sharing request and secondary encryption is carried out to data packet;
It obtains image data and is shared by mobile terminal.
5. computer user's behavior monitoring method according to claim 4, which is characterized in that the mobile terminal includes the
One operating system and the second operating system, when the mobile terminal in the first operating system operational process to break down
Triggering starts second operating system, while the data read in first operating system are replicated.
6. computer user's behavior monitoring method according to claim 1, which is characterized in that the monitoring camera-shooting is using use
In acquisition image or the camera assembly of video.
7. computer user's behavior monitoring method according to claim 6, which is characterized in that before the camera assembly includes
Set camera and rear camera.
8. a kind of computer readable storage medium, is stored with computer program, which is characterized in that the computer program is processed
When device executes, so that the processor is executed such as the step of any one of claims 1 to 7 the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910200278.6A CN110069924B (en) | 2019-03-16 | 2019-03-16 | Computer user behavior monitoring method and computer-readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910200278.6A CN110069924B (en) | 2019-03-16 | 2019-03-16 | Computer user behavior monitoring method and computer-readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110069924A true CN110069924A (en) | 2019-07-30 |
CN110069924B CN110069924B (en) | 2023-01-10 |
Family
ID=67365248
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910200278.6A Active CN110069924B (en) | 2019-03-16 | 2019-03-16 | Computer user behavior monitoring method and computer-readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110069924B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112153337A (en) * | 2020-09-21 | 2020-12-29 | 长江存储科技有限责任公司 | Monitoring method and related equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090182873A1 (en) * | 2000-06-30 | 2009-07-16 | Hitwise Pty, Ltd | Method and system for monitoring online computer network behavior and creating online behavior profiles |
CN103914644A (en) * | 2013-01-01 | 2014-07-09 | 深圳鼎识科技有限公司 | Data acquisition and processing system and method |
CN107169796A (en) * | 2017-05-12 | 2017-09-15 | 深圳市浩天投资有限公司 | A kind of analysis method of user behavior data, system and computer-readable recording medium |
CN107896285A (en) * | 2017-12-27 | 2018-04-10 | 广东欧珀移动通信有限公司 | data reporting method, device, mobile terminal and computer-readable medium |
CN109388970A (en) * | 2018-10-25 | 2019-02-26 | 麒麟合盛网络技术股份有限公司 | Data processing method and device |
CN109410032A (en) * | 2018-09-26 | 2019-03-01 | 深圳壹账通智能科技有限公司 | A kind of information processing method, server and computer storage medium |
-
2019
- 2019-03-16 CN CN201910200278.6A patent/CN110069924B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090182873A1 (en) * | 2000-06-30 | 2009-07-16 | Hitwise Pty, Ltd | Method and system for monitoring online computer network behavior and creating online behavior profiles |
CN103914644A (en) * | 2013-01-01 | 2014-07-09 | 深圳鼎识科技有限公司 | Data acquisition and processing system and method |
CN107169796A (en) * | 2017-05-12 | 2017-09-15 | 深圳市浩天投资有限公司 | A kind of analysis method of user behavior data, system and computer-readable recording medium |
CN107896285A (en) * | 2017-12-27 | 2018-04-10 | 广东欧珀移动通信有限公司 | data reporting method, device, mobile terminal and computer-readable medium |
CN109410032A (en) * | 2018-09-26 | 2019-03-01 | 深圳壹账通智能科技有限公司 | A kind of information processing method, server and computer storage medium |
CN109388970A (en) * | 2018-10-25 | 2019-02-26 | 麒麟合盛网络技术股份有限公司 | Data processing method and device |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112153337A (en) * | 2020-09-21 | 2020-12-29 | 长江存储科技有限责任公司 | Monitoring method and related equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110069924B (en) | 2023-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Goel et al. | Smartphone forensic investigation process model | |
CN105337928B (en) | Method for identifying ID, safety protection problem generation method and device | |
US11593904B2 (en) | System and method for collecting forensic data via a mobile device | |
WO2019237362A1 (en) | Privacy-preserving content classification | |
CN107403094A (en) | Distribution file is to perform the system and method for anti-virus scan between the virtual machine of distributed system is formed | |
CN104753675B (en) | Information Authentication method, electric paying method, terminal, server and system | |
Suarez-Tangil et al. | Power-aware anomaly detection in smartphones: An analysis of on-platform versus externalized operation | |
Actoriano et al. | Forensic Investigation on WhatsApp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2 | |
CN111652096A (en) | Face recognition method, device and system based on block chain | |
CN112468409A (en) | Access control method, device, computer equipment and storage medium | |
Yuliani et al. | Forensic analysis whatsapp mobile application on android-based smartphones using national institute of standard and technology (nist) framework | |
Holmes et al. | A framework for live host-based Bitcoin wallet forensics and triage | |
CN110069924A (en) | Computer user's behavior monitoring method and computer readable storage medium | |
Arafat et al. | Technical challenges of cloud forensics and suggested solutions | |
Zhu | Mobile Cloud Computing: implications to smartphone forensic procedures and methodologies | |
CN103052060B (en) | A kind of method and a kind of mobile terminal for improving information of mobile terminal safety | |
Al-Faaruuq et al. | iOS Digital Evidence Comparison of Instant Messaging Apps | |
CN108920971A (en) | The method of data encryption, the method for verification, the device of encryption and verification device | |
CN114625756A (en) | Data query method and device and server | |
Lee | Mobile digital forensics framework to increase security level of for smartphone user | |
CN113987206A (en) | Abnormal user identification method, device, equipment and storage medium | |
CN113873025A (en) | Data processing method and device, storage medium and electronic equipment | |
Rahman et al. | Framework Analysis of IDFIF V2 in WhatsApp Investigation Process on Android Smartphones | |
CN110062001A (en) | Data put-on method, device, equipment and computer readable storage medium | |
Zakarneh et al. | Forensic Investigation of WhatsApp on Android Smartphone’s |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |