CN110069924B - Computer user behavior monitoring method and computer-readable storage medium - Google Patents

Computer user behavior monitoring method and computer-readable storage medium Download PDF

Info

Publication number
CN110069924B
CN110069924B CN201910200278.6A CN201910200278A CN110069924B CN 110069924 B CN110069924 B CN 110069924B CN 201910200278 A CN201910200278 A CN 201910200278A CN 110069924 B CN110069924 B CN 110069924B
Authority
CN
China
Prior art keywords
user behavior
user
computer
information
real
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910200278.6A
Other languages
Chinese (zh)
Other versions
CN110069924A (en
Inventor
朱春平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Wuji Internet Technology Co ltd
Original Assignee
Zhejiang Wuji Internet Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Wuji Internet Technology Co ltd filed Critical Zhejiang Wuji Internet Technology Co ltd
Priority to CN201910200278.6A priority Critical patent/CN110069924B/en
Publication of CN110069924A publication Critical patent/CN110069924A/en
Application granted granted Critical
Publication of CN110069924B publication Critical patent/CN110069924B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/14Error detection or correction of the data by redundancy in operation
    • G06F11/1402Saving, restoring, recovering or retrying
    • G06F11/1446Point-in-time backing up or restoration of persistent data
    • G06F11/1458Management of the backup or restore process
    • G06F11/1464Management of the backup or restore process for networked environments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes

Abstract

The invention relates to the technical field of computers, and particularly discloses a computer user behavior monitoring method and a computer readable storage medium, wherein the method comprises the following steps: detecting public information of a computer user and storing the public information into a cloud storage and generating a user behavior reading request; performing data analysis according to the read user behavior information to form half-formatted data, and transmitting the half-formatted data to a cloud server in an encryption mode; and monitoring the user behavior of the computer in real time, generating real-time user behavior information, judging whether the real-time user behavior information is encrypted according to the user behavior, and transmitting the encrypted real-time user behavior information to the cloud server. According to the invention, the user behavior information is read when the user safety authentication information is met, meanwhile, the real-time user behavior information is generated by monitoring the user behavior of the computer in real time, whether the real-time user behavior information is encrypted or not is judged according to the user behavior and is transmitted to the cloud server, and the problem that the information is easy to leak through a network in the computer user behavior monitoring process is solved.

Description

Computer user behavior monitoring method and computer-readable storage medium
Technical Field
The invention relates to the technical field of computers, in particular to a computer user behavior monitoring method and a computer readable storage medium.
Background
Today, with the development of informatization and electronics, more and more businesses begin to mine customers based on big data for accurate marketing by gathering information of businesses that provide products or services to a large number of consumers. The computer user behavior monitoring can provide data support for user behavior analysis, the user behavior analysis is that all data (including download amount, use frequency, access amount, access rate, retention time and the like) in the product using process of a user are collected, sorted, counted and analyzed, powerful data support is provided for subsequent development, optimization or marketing and other activities of products, and the method is widely applied to the fields of financial trade, medicine, transportation, remote communication, law, electronic equipment and the like.
However, as the society has increased its interest in information security, more and more enterprises and utilities are paying attention to the problem of information leakage through the network during the monitoring of computer user behavior. Therefore, it is an urgent need to provide a method for monitoring computer user behavior and a computer readable storage medium.
Disclosure of Invention
The present invention is directed to a method for monitoring user behavior of a computer and a computer-readable storage medium, so as to solve the problems mentioned above.
In order to achieve the purpose, the invention provides the following technical scheme:
a computer user behavior monitoring method, comprising:
detecting public information of a computer user and storing the public information to a cloud storage; the cloud storage is accessed through a Web service Application Program Interface (API) or a Web user interface, and the data occupation space can be effectively reduced through the cloud storage, so that the working efficiency is improved;
generating a user behavior reading request according to the user public information stored in the cloud storage and sending the user behavior reading request to a computer user;
if the user accepts the user behavior reading request, judging whether the user behavior reading request accords with the user safety authentication information according to the user behavior, reading the user behavior information when the user safety authentication information accords, or immediately carrying out camera monitoring and forbidding sending the user behavior reading request within a certain time limit;
if the user refuses the user behavior reading request, sending the reading request again for secondary confirmation, and if the user refuses the reading request again, stopping sending the user behavior reading request;
performing data analysis according to the read user behavior information to form semi-formatted data, and transmitting the semi-formatted data to a cloud server in an encryption mode;
monitoring the user behavior of the computer in real time, generating real-time user behavior information, judging whether the real-time user behavior information is encrypted according to the user behavior, and transmitting the encrypted real-time user behavior information to the cloud server;
performing general parallel data stream real-time processing according to the semi-formatted data and the real-time user behavior information stored in the cloud server to generate a data packet, and storing the data packet in a memory to be backed up with the cloud server; the data is stored in the memory and backed up with the cloud server, so that the safety of data storage is effectively improved, and data loss caused by memory damage is further prevented;
and extracting the data packet to share through the mobile terminal.
As a further scheme of the invention: the method for judging whether the real-time user behavior information is encrypted according to the behavior of the user and transmitting the encrypted real-time user behavior information to the cloud server comprises the following steps: and when the user agreement means that the real-time user behavior information is encrypted and transmitted to the cloud server, encrypting the real-time user behavior information and transmitting the encrypted real-time user behavior information to the cloud server, otherwise, forbidding monitoring of the computer user behavior and generating the real-time user behavior information within a certain period.
As a still further scheme of the invention: the data dimensions of the data package include search engine data, OTA user data (search, purchase, comment data), and internet-disseminated public opinion data.
As a still further scheme of the invention: the data packet extraction is shared through the mobile terminal, and the data packet extraction method comprises the following steps:
sending a sharing request to a computer user;
when a user accepts a sharing request, detecting the operating environment of the computer user and correspondingly extracting a data packet to generate picture data;
when the user refuses the sharing request, closing the sharing request and carrying out secondary encryption on the data packet;
and acquiring picture data and sharing the picture data through the mobile terminal.
As a still further scheme of the invention: the mobile terminal comprises a first operation system and a second operation system, when the mobile terminal breaks down in the operation process of the first operation system, the second operation system is triggered to be started, and meanwhile, data in the first operation system are read to be copied.
As a still further scheme of the invention: the camera monitoring adopts a camera assembly for collecting images or videos, and the camera assembly comprises a front camera and a rear camera; the front camera and the rear camera are matched for use, so that three-dimensional camera monitoring can be realized, images or videos of lawless persons operating computer equipment can be collected, and case detection is facilitated.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method.
Compared with the prior art, the invention has the beneficial effects that:
according to the method, whether the user safety certification information is met or not is judged according to the user behavior, the user behavior information is read when the user safety certification information is met, if not, camera monitoring is carried out immediately, sending of a user behavior reading request is forbidden in a certain period, meanwhile, the computer user behavior is monitored in real time, the real-time user behavior information is generated, whether the real-time user behavior information is encrypted or not is judged according to the user behavior, and the real-time user behavior information is transmitted to the cloud server, and the problem that the information is prone to leak through a network in the computer user behavior monitoring process is solved.
Drawings
Fig. 1 is a flowchart illustrating an implementation of a method for monitoring computer user behavior according to an embodiment of the present invention.
Fig. 2 is a structural diagram of a computer user behavior monitoring system according to an embodiment of the present invention.
Detailed Description
The invention is described in further detail below with reference to the figures and specific examples. The following examples will aid those skilled in the art in further understanding the present invention, but are not intended to limit the invention in any manner. It should be noted that variations and modifications can be made by persons skilled in the art without departing from the spirit of the invention. All falling within the scope of the invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
Referring to fig. 1, in an embodiment of the present invention, a method for monitoring computer user behavior includes:
in step 101, detecting public information of a computer user and storing the public information to a cloud storage; the cloud storage is accessed through a Web service Application Program Interface (API) or a Web user interface, the cloud storage is a mode of storage on the Internet, namely, data are stored in a plurality of virtual servers which are generally managed by a third party, but not exclusive servers, and the data occupation space can be effectively reduced through the cloud storage, so that the work efficiency is improved;
in step 102, a user behavior reading request is generated according to the user public information stored in the cloud storage and is sent to a computer user;
in step 103, if the user accepts the user behavior reading request, judging whether the user behavior reading request conforms to the user safety authentication information according to the user behavior, reading the user behavior information when the user safety authentication information conforms, or immediately performing camera monitoring and prohibiting sending the user behavior reading request within a certain time limit;
in step 104, if the user rejects the user behavior reading request, sending the reading request again for secondary confirmation, and if the user rejects the reading request again, stopping sending the user behavior reading request;
in step 105, performing data analysis according to the read user behavior information to form half-formatted data, and transmitting the half-formatted data to a cloud server in an encryption mode;
in step 106, monitoring the computer user behavior in real time, generating real-time user behavior information, judging whether the real-time user behavior information is encrypted according to the user behavior, and transmitting the encrypted real-time user behavior information to the cloud server;
when the user agrees to mean that the real-time user behavior information is encrypted and transmitted to the cloud server, encrypting the real-time user behavior information and transmitting the encrypted real-time user behavior information to the cloud server, otherwise, monitoring the computer user behavior and generating the real-time user behavior information is forbidden within a certain period;
in step 107, performing real-time processing on the universal parallel data stream according to the semi-formatted data and the real-time user behavior information stored in the cloud server to generate a data packet, and storing the data packet in a memory to be backed up with the cloud server; the data is stored in the memory and backed up with the cloud server, so that the safety of data storage is effectively improved, and data loss caused by memory damage is prevented;
wherein the memory may be implemented by any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory ((ROM), magnetic memory, flash memory, magnetic or optical disk;
in step 108, the extracted data packet is shared by the mobile terminal.
It should be understood that, although the steps in the flowchart of fig. 1 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 1 are not necessarily performed at the same time, but may be performed at different times, and these steps are not necessarily performed sequentially, but may be performed alternately or alternately with other steps.
Optionally, in the embodiment of the present invention, when it is detected that the user accepts the reading request, authentication information (for example, a preset problem of computer boot security) is sent to the computer for security authentication, whether the user security authentication information is met is determined according to a behavior of the user, and after the authentication is successful, the user behavior information is read and transmitted to the cloud server in an encryption manner, so that the user behavior information can be effectively prevented from being leaked in a transmission process, and further, the reliability of user privacy protection is improved.
Further, in the embodiment of the present invention, when the user accepts the reading request for the first time, the authentication information is the user identity information, a digital certificate is generated after the authentication is successful, and the digital certificate may be locally stored through the memory.
Further, in the embodiment of the present invention, when the user does not receive the reading request for the first time, the authentication information is specifically a locally stored digital certificate containing user identity information, and the secure authentication can be passed by directly uploading the digital certificate.
Further, in the embodiment of the present invention, the data dimensions of the data packet include search engine data, OTA user data (search, purchase, comment data), and internet-transmitted public opinion data; for example, when the data packet contains travel information, the movement rules of the tourists are analyzed based on the crowd location data of telecom operators and WeChat, so that the tourists who have interest in marketing content and marketing materials are mined and accurately pushed, and the tourists who have arrived at the destination are pushed from the interest, and the aim is to make the tourists purchase products.
It should be noted that, when analyzing the movement law of the guest, the K nearest neighbor classification algorithm may also be used. By K nearest neighbors, it is meant that each sample can be represented by its nearest K neighbors, and the core idea is that if most of K nearest neighbors of a sample in feature space belong to a certain class, the sample also belongs to this class and has the characteristics of the samples on this class. The method only determines the category of the sample to be classified according to the category of the nearest limited sample or a few limited samples in the determination of the classification decision.
Referring to fig. 1, in another embodiment of the present invention, the sharing of the extracted data packet by the mobile terminal includes:
sending a sharing request to a computer user;
when a user accepts a sharing request, detecting the operating environment of the computer user and correspondingly extracting a data packet to generate picture data;
when the user refuses the sharing request, closing the sharing request and carrying out secondary encryption on the data packet;
and acquiring picture data and sharing the picture data through the mobile terminal.
Further, in the embodiment of the present invention, the mobile terminal includes a first operating system and a second operating system, and when a fault occurs during an operation of the mobile terminal with the first operating system, the second operating system is triggered to be started, and data in the first operating system is read to be copied.
Further, in the embodiment of the present invention, the data dimension of the data packet includes search engine data, OTA user data (search, purchase, comment data) and internet-transmitted public opinion data; for example, when the data packet contains travel information, the movement rules of the tourists are analyzed based on crowd position data of telecom operators and WeChat, so that the tourists who have interests in marketing content and marketing materials are mined and accurately pushed, and the tourists who arrive at the destination are pushed from the interests with the aim of purchasing products by the tourists.
Referring to fig. 1, in another embodiment provided by the present invention, a method for monitoring computer user behavior includes:
detecting public information of a computer user and storing the public information to a cloud storage; the cloud storage is accessed through a Web service Application Program Interface (API) or a Web user interface, so that the data occupation space can be effectively reduced through the cloud storage, and the working efficiency can be improved;
generating a user behavior reading request according to the user public information stored in the cloud storage and sending the user behavior reading request to a computer user;
if the user accepts the user behavior reading request, judging whether the user behavior reading request accords with the user safety authentication information according to the user behavior, reading the user behavior information when the user safety authentication information accords, or immediately carrying out camera monitoring and forbidding sending the user behavior reading request within a certain time limit;
performing data analysis according to the read user behavior information to form half-formatted data, and transmitting the half-formatted data to a cloud server in an encryption mode;
monitoring the user behavior of the computer in real time, generating real-time user behavior information, judging whether the real-time user behavior information is encrypted according to the user behavior, and transmitting the encrypted real-time user behavior information to the cloud server;
performing general parallel data stream real-time processing according to the semi-formatted data and the real-time user behavior information stored in the cloud server to generate a data packet, and storing the data packet in a memory to be backed up with the cloud server; the data is stored in the memory and backed up with the cloud server, so that the safety of data storage is effectively improved, and data loss caused by memory damage is further prevented;
and extracting the data packet to share through the mobile terminal.
Referring to fig. 2, in another embodiment provided by the present invention, a computer user behavior monitoring system includes a control module and a computer device, where the control module is connected to the computer device through a network.
Further, in the embodiment of the present invention, the control module includes a user behavior information input module, a user behavior information modification module, and a data analysis module; the user behavior information input module is connected with the data analysis module through the user behavior information correction module.
Further, in the embodiment of the present invention, the user behavior information input module is configured to read computer user behavior information and input the information to the memory; the user behavior information correction module is used for comparing the user behavior information input by the memory with data information pre-input in the user behavior information characteristic database to correct transmission errors; the data analysis module is used for carrying out data analysis on the user behavior information and simultaneously carrying out real-time processing on the general parallel data stream to generate a data packet.
Further, in the embodiment of the present invention, the computer device includes a processor, a network interface, a nonvolatile storage medium, and an internal memory. The non-volatile storage medium stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement a computer user behavior monitoring method.
Further, in the embodiment of the present invention, the computer user behavior monitoring system further includes a power supply for supplying power to the system, and the power supply may be an alternating current, a direct current, a disposable battery or a rechargeable battery. When the power source comprises a rechargeable battery, the rechargeable battery may support wired charging or wireless charging.
It will be appreciated by those skilled in the art that the configuration shown in fig. 2 is a block diagram of only a portion of the configuration associated with the present application, and is not intended to limit the computer user behavior monitoring system described in the present application, and that a particular computer user behavior monitoring system may include more or fewer components than those shown, or some of the components may be combined, or have a different arrangement of components.
In another embodiment provided by the present invention, the processor, when executing the computer program, further performs the following steps:
detecting public information of a computer user and storing the public information to a cloud storage;
generating a user behavior reading request according to the user public information stored in the cloud storage and sending the user behavior reading request to a computer user;
if the user accepts the user behavior reading request, judging whether the user behavior reading request accords with the user safety certification information or not according to the user behavior, reading the user behavior information when the user safety certification information accords, and if not, immediately carrying out camera monitoring and forbidding sending the user behavior reading request within a certain time limit;
if the user refuses the user behavior reading request, sending the reading request again for secondary confirmation, and if the user refuses the reading request again, stopping sending the user behavior reading request;
performing data analysis according to the read user behavior information to form half-formatted data, and transmitting the half-formatted data to a cloud server in an encryption mode;
monitoring the user behavior of the computer in real time, generating real-time user behavior information, judging whether the real-time user behavior information is encrypted according to the user behavior, and transmitting the encrypted real-time user behavior information to the cloud server;
performing general parallel data stream real-time processing according to the semi-formatted data and the real-time user behavior information stored in the cloud server to generate a data packet, and storing the data packet in a memory to be backed up with the cloud server;
and extracting the data packet and sharing the data packet through the mobile terminal.
Furthermore, in the embodiment of the invention, the user behavior of the computer can be monitored in real time to provide data support for user behavior analysis, and the user behavior analysis is to collect, sort, count and analyze the rule of the user using the product for all data (including download amount, use frequency, access amount, access rate, retention time and the like) in the process of using the product by the user, so as to provide powerful data support for subsequent development, optimization or marketing and other activities of the product; by associating the access behavior with the consumption behavior, accurate pushing can be achieved. For example, compared with other content preferers, the consumption amount of the users who prefer the finance, the video and the game is correspondingly higher, and the product sale efficiency can be effectively improved by accurately pushing the product information to the users who prefer the finance, the video and the game.
In another embodiment provided by the present invention, the processor when executing the computer program further realizes the following steps:
sending a sharing request to a computer user;
when a user accepts a sharing request, detecting the operating environment of the computer user and correspondingly extracting a data packet to generate picture data;
when the user refuses the sharing request, closing the sharing request and carrying out secondary encryption on the data packet;
and acquiring picture data and sharing the picture data through the mobile terminal.
In another embodiment provided by the present invention, the mobile terminal may be: the mobile terminal comprises a smart phone, a tablet computer, an MP4 player, a notebook computer or a desktop computer, and is connected with the computer equipment through a network.
Further, in an embodiment of the present invention, the network interface of the computer device is used for communicating with an external mobile terminal through a network connection. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or input equipment and the like.
In another embodiment provided by the present invention, the camera monitoring employs a camera assembly for capturing images or videos, and the camera assembly includes a front camera and a rear camera. Optionally, the front camera is disposed on a front panel of the computer device, and the rear camera is disposed on a back side of the computer device. In some embodiments, the number of the front cameras is at least two, and each of the front cameras is any one of a main camera, a depth camera, a wide camera and a telephoto camera. In some embodiments, the number of the rear cameras is at least two, and the rear cameras are any one of the main camera, the depth-of-field camera, the wide-angle camera and the long-focus camera respectively, and the front camera and the rear camera are used in a matched manner, so that three-dimensional camera monitoring can be realized, images or videos of a computer device operated by a lawless person can be collected, and case detection is facilitated.
The beneficial effects of the invention are: according to the invention, whether the user safety authentication information is met is judged according to the user behavior, the user behavior information is read when the user safety authentication information is met, otherwise, camera monitoring is carried out immediately and the user behavior reading request is prohibited to be sent within a certain period, meanwhile, the computer user behavior is monitored in real time and the real-time user behavior information is generated, whether the real-time user behavior information is encrypted and transmitted to the cloud server is judged according to the user behavior, the problem that the information is easy to leak through the network in the computer user behavior monitoring process is solved, and the data is stored into the memory and backed up with the cloud server, so that the safety of data storage is effectively improved, further, the data loss caused by the damage of the memory is prevented, and the method has a wide market prospect.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium can be a random access memory, a flash memory, a read only memory, a programmable read only memory, an electrically erasable programmable memory, a register and the like.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
While the preferred embodiments of the present invention have been illustrated and described in detail, it is to be understood that the invention is not limited thereto, and that various changes and modifications may be effected therein by one skilled in the art without departing from the spirit and scope of the invention. And are neither required nor exhaustive of all embodiments. And obvious variations or modifications are intended to be covered by the present application.

Claims (7)

1. A computer user behavior monitoring method, comprising:
detecting public information of a computer user and storing the public information to a cloud storage;
generating a user behavior reading request according to the user public information stored in the cloud storage and sending the user behavior reading request to a computer user;
if the user accepts the user behavior reading request, authentication information is sent to a computer for safety authentication, whether the user behavior reading request accords with the user safety authentication information is judged according to the user behavior, the user behavior information is read when the user safety authentication information accords with the user safety authentication information, and if not, camera monitoring is immediately carried out and the user behavior reading request is forbidden to be sent within a certain time limit;
if the user refuses the user behavior reading request, sending the reading request again for secondary confirmation, and if the user refuses the reading request again, stopping sending the user behavior reading request;
performing data analysis according to the read user behavior information to form half-formatted data, and transmitting the half-formatted data to a cloud server in an encryption mode;
monitoring the user behavior of the computer in real time, generating real-time user behavior information, judging whether the real-time user behavior information is encrypted according to the user behavior, and transmitting the encrypted real-time user behavior information to a cloud server; the method for judging whether the real-time user behavior information is encrypted according to the behavior of the user and transmitting the encrypted real-time user behavior information to the cloud server comprises the following steps: when the user agrees to mean that the real-time user behavior information is encrypted and transmitted to the cloud server, encrypting the real-time user behavior information and transmitting the encrypted real-time user behavior information to the cloud server, otherwise, monitoring the computer user behavior and generating the real-time user behavior information is forbidden within a certain period;
performing general parallel data stream real-time processing according to the semi-formatted data and the real-time user behavior information stored in the cloud server to generate a data packet, storing the data packet in a memory, and performing backup in the cloud server;
and extracting the data packet and sharing the data packet through the mobile terminal.
2. The method of claim 1, wherein the data dimensions of the data package include search engine data, OTA user data, and internet-delivered public opinion data.
3. The method for monitoring the behavior of the computer user according to any one of claims 1-2, wherein the extracting the data packet through a mobile terminal for sharing comprises:
sending a sharing request to a computer user;
when a user accepts a sharing request, detecting the operating environment of the computer user and correspondingly extracting a data packet to generate picture data;
when the user refuses the sharing request, closing the sharing request and carrying out secondary encryption on the data packet;
and acquiring picture data and sharing the picture data through the mobile terminal.
4. The method for monitoring the user behavior of the computer according to claim 3, wherein the mobile terminal comprises a first running system and a second running system, and when the mobile terminal fails in the running process of the first running system, the second running system is triggered to be started, and simultaneously data in the first running system is read for copying.
5. The computer user behavior monitoring method of claim 1, wherein the camera monitoring employs a camera assembly for capturing images or video.
6. The computer user behavior monitoring method of claim 5, wherein the camera assembly comprises a front-facing camera and a rear-facing camera.
7. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, causes the processor to carry out the steps of the method according to any one of claims 1 to 6.
CN201910200278.6A 2019-03-16 2019-03-16 Computer user behavior monitoring method and computer-readable storage medium Active CN110069924B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910200278.6A CN110069924B (en) 2019-03-16 2019-03-16 Computer user behavior monitoring method and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910200278.6A CN110069924B (en) 2019-03-16 2019-03-16 Computer user behavior monitoring method and computer-readable storage medium

Publications (2)

Publication Number Publication Date
CN110069924A CN110069924A (en) 2019-07-30
CN110069924B true CN110069924B (en) 2023-01-10

Family

ID=67365248

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910200278.6A Active CN110069924B (en) 2019-03-16 2019-03-16 Computer user behavior monitoring method and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN110069924B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112153337B (en) * 2020-09-21 2023-05-30 长江存储科技有限责任公司 Monitoring method and related equipment

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001270169A1 (en) * 2000-06-30 2002-01-14 Plurimus Corporation Method and system for monitoring online computer network behavior and creating online behavior profiles
CN103914644B (en) * 2013-01-01 2017-02-08 深圳鼎识科技有限公司 Data acquisition and processing system and method
CN107169796A (en) * 2017-05-12 2017-09-15 深圳市浩天投资有限公司 A kind of analysis method of user behavior data, system and computer-readable recording medium
CN107896285A (en) * 2017-12-27 2018-04-10 广东欧珀移动通信有限公司 data reporting method, device, mobile terminal and computer-readable medium
CN109410032A (en) * 2018-09-26 2019-03-01 深圳壹账通智能科技有限公司 A kind of information processing method, server and computer storage medium
CN109388970B (en) * 2018-10-25 2020-08-21 麒麟合盛网络技术股份有限公司 Data processing method and device

Also Published As

Publication number Publication date
CN110069924A (en) 2019-07-30

Similar Documents

Publication Publication Date Title
CN112132198B (en) Data processing method, device and system and server
CN106850346B (en) Method and device for monitoring node change and assisting in identifying blacklist and electronic equipment
CN103020541B (en) Personal space (data) in contrast to company space (data)
US10958657B2 (en) Utilizing transport layer security (TLS) fingerprints to determine agents and operating systems
US20150261940A1 (en) Systems and methods for detecting information leakage by an organizational insider
CN112106049A (en) System and method for generating private data isolation and reporting
WO2022116491A1 (en) Dbscan clustering method based on horizontal federation, and related device therefor
CN110321479A (en) A kind of secret protection Information Mobile Service recommended method and client, recommender system
CN112949545A (en) Method, apparatus, computing device and medium for recognizing face image
Liu et al. Priwe: Recommendation for privacy settings of mobile apps based on crowdsourced users' expectations
Aggarwal et al. The follower count fallacy: Detecting twitter users with manipulated follower count
CN115658604A (en) Information acquisition management system and method
CN110069924B (en) Computer user behavior monitoring method and computer-readable storage medium
CN114666135A (en) Data encryption method and device, electronic equipment and storage medium
US11120160B2 (en) Distributed personal data storage and encrypted personal data service based on secure computation
CN117252429A (en) Risk user identification method and device, storage medium and electronic equipment
CN114625756A (en) Data query method and device and server
CN107256151A (en) Processing method, device and the terminal of page rendering
Rübsamen et al. Evidence for accountable cloud computing services
CN107846391B (en) Login authentication method, device and system for application
CN114465738A (en) Application program evidence obtaining method, system, device and storage medium
CN111447082B (en) Determination method and device of associated account and determination method of associated data object
Alotaibi et al. A New User-Apps Interactions Dataset for Behavioral Profiling Using Smartphones
Chih-Chang et al. A Framework for Estimating Privacy Risk Scores of Mobile Apps
Abiteboul Issues in ethical data management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant