CN112463429A - Information processing method and device - Google Patents

Information processing method and device Download PDF

Info

Publication number
CN112463429A
CN112463429A CN202011401990.1A CN202011401990A CN112463429A CN 112463429 A CN112463429 A CN 112463429A CN 202011401990 A CN202011401990 A CN 202011401990A CN 112463429 A CN112463429 A CN 112463429A
Authority
CN
China
Prior art keywords
client
time period
control behavior
target time
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011401990.1A
Other languages
Chinese (zh)
Inventor
刘文军
彭飞
邓竹立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing 58 Information Technology Co Ltd
Original Assignee
Beijing 58 Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing 58 Information Technology Co Ltd filed Critical Beijing 58 Information Technology Co Ltd
Priority to CN202011401990.1A priority Critical patent/CN112463429A/en
Publication of CN112463429A publication Critical patent/CN112463429A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • G06F11/0781Error filtering or prioritizing based on a policy defined by the user or on a policy defined by a hardware/software module, e.g. according to a severity level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0766Error or fault reporting or storing
    • G06F11/0787Storage of error reports, e.g. persistent data storage, storage using memory protection

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application discloses an information processing method and device. In the application, the client may send, to the server, a control behavior log that is helpful for solving the anomaly of the client, for example, the client may send, to the server, the control behavior log that the client is controlled in the target time period, and may not send, to the server, the control behavior log that the client is controlled in the non-target time period. Therefore, the number of the operation and control behavior logs sent to the server by the client can be reduced, and network resources can be saved. In addition, through the application, the control behavior log obtained by the server is often a control behavior log helpful for technical staff to solve the abnormity of the client, and is equivalent to a log which automatically helps the technical staff to screen the abnormity (the abnormal path is reproduced) of the positioning client, the technical staff can directly use the log, manual screening can be omitted, and therefore labor cost can be reduced.

Description

Information processing method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to an information processing method and apparatus.
Background
With the popularization of smart phones, clients (application programs) on smart phones are involved in various industries, and people can do various things through the clients.
In order to ensure the stability of the client, behavior logs of users in the process of using the client can be collected, for example, each client can collect behavior logs of a large number of users using the respective client, and send the collected behavior logs to the server in real time after collecting the behavior logs. The server stores the behavior logs sent by the clients and respectively stores the behavior logs sent by the clients, and technicians can solve the client abnormity according to the behavior logs to keep the stability of the clients.
The inventor finds that, in a general case, only a few very individual users have a client exception when using the client, that is, only the control behavior logs of the few very individual users in the process of using the client will have an effect on solving the client exception, and the control behavior logs of other users in the process of using the client will not have an effect on solving the client exception, so that collection of the control behavior logs of other users in the process of using the client is redundant.
Therefore, the above method wastes most of the network traffic of the mobile phone where the client is located.
Disclosure of Invention
In order to solve the technical problem, the present application shows an information processing method and apparatus.
In a first aspect, the present application shows an information processing method applied to a server, where the method includes:
receiving an abnormal indication, wherein the abnormal indication is used for indicating that the client has an abnormality in a target time period;
generating an obtaining request according to the abnormal indication, wherein the obtaining request is used for obtaining a control behavior log controlled by the client in the target time period;
sending the acquisition request to a client;
and receiving a control behavior log which is returned by the client according to the acquisition request and is controlled by the client in the target time period.
In an optional implementation manner, the anomaly indication is further used for indicating that an anomaly exists in a target service line of the client within the target time period; the obtaining request is used for obtaining a control behavior log of the target service line of the client terminal controlled in the target time period;
the receiving of the control behavior log, which is returned by the client according to the acquisition request and is controlled by the client within the target time period, includes:
and receiving a control behavior log of the target service line of the client terminal which is controlled in the target time period.
In an optional implementation manner, the receiving a control behavior log returned by the client according to the acquisition request and controlled by the client within the target time period includes:
receiving an encrypted log returned by the client according to the acquisition request, wherein the encrypted log is obtained by encrypting a control behavior log which is controlled by the client in the target time period by the client;
and decrypting the encrypted log to obtain a control behavior log which is controlled by the client in the target time period.
In a second aspect, the present application shows an information processing method applied to a client, the method including:
receiving an acquisition request sent by a server, wherein the acquisition request is sent to a client by the server after receiving an abnormal indication, the abnormal indication is used for indicating that the client is abnormal in a target time period, and the acquisition request is used for acquiring a control behavior log controlled by the client in the target time period;
acquiring a control behavior log which is controlled by the client in the target time period from a plurality of control behavior logs which are stored in the client and controlled by the client according to the acquisition request;
and sending the control behavior log of the client controlled in the target time period to a server.
In an optional implementation manner, the anomaly indication is further used for indicating that an anomaly exists in a target service line of the client within the target time period;
the obtaining, according to the obtaining request, a manipulated behavior log of the client manipulated in the target time period from a plurality of manipulated behavior logs of the client that have been stored in the client and manipulated by the client includes:
acquiring a control behavior log of the target service line of the client controlled in the target time period according to the acquisition request;
and sending the control behavior log of the client controlled in the target time period to a server, wherein the sending comprises:
and sending a control behavior log of the target service line of the client terminal controlled in the target time period to a server terminal.
In an optional implementation, the method further includes:
acquiring a manipulated behavior log of the client based on a buried point set in the client;
encrypting the collected control behavior log to obtain an encrypted log;
storing the encrypted log in the client.
In an optional implementation manner, the obtaining, according to the obtaining request, a manipulated behavior log that is manipulated by the client within the target time period from a plurality of manipulated behavior logs that are stored by the client and manipulated by the client, includes:
acquiring an encrypted log corresponding to a control behavior log controlled by the client in the target time period from the stored encrypted logs;
and sending the control behavior log of the client controlled in the target time period to a server, wherein the sending comprises:
and sending the acquired encryption log.
In an optional implementation manner, the sending, to the server, the log of the manipulation behavior manipulated by the client within the target time period includes:
encrypting the operation and control behavior log controlled by the client in the target time period to obtain an encrypted log;
and sending the encrypted log to the server.
In an optional implementation, the method further includes:
and deleting at least one control behavior log according to the sequence of the storage time of the control behavior logs in the client from early to late under the condition that the space occupied by the control behavior logs stored in the client is larger than a preset space, so that the space occupied by the rest control behavior logs in the client is smaller than or equal to the preset space.
In a third aspect, the present application shows an information processing apparatus applied to a server, the apparatus comprising:
the client comprises a first receiving module, a second receiving module and a sending module, wherein the first receiving module is used for receiving an abnormal indication which is used for indicating that the client has abnormality in a target time period;
the generating module is used for generating an obtaining request according to the abnormal indication, wherein the obtaining request is used for obtaining a control behavior log controlled by the client in the target time period;
the first sending module is used for sending the acquisition request to a client;
and the second receiving module is used for receiving a control behavior log which is returned by the client according to the acquisition request and is controlled by the client in the target time period.
In an optional implementation manner, the anomaly indication is further used for indicating that an anomaly exists in a target service line of the client within the target time period; the obtaining request is used for obtaining a control behavior log of the target service line of the client terminal controlled in the target time period;
the second receiving module includes:
a first receiving unit, configured to receive a control behavior log that the target service line of the client is controlled in the target time period.
In an optional implementation manner, the second receiving module includes:
a second receiving unit, configured to receive an encrypted log returned by the client according to the acquisition request, where the encrypted log is obtained by encrypting, by the client, a control behavior log that is controlled by the client within the target time period;
and the decryption unit is used for decrypting the encrypted log to obtain the control behavior log which is controlled by the client in the target time period.
In a fourth aspect, the present application shows an information processing apparatus applied to a client, the apparatus comprising:
a third receiving module, configured to receive an acquisition request sent by a server, where the acquisition request is sent to a client by the server after receiving an exception indication, the exception indication is used to indicate that the client has an exception in a target time period, and the acquisition request is used to acquire a control behavior log that the client is controlled in the target time period;
the acquisition module is used for acquiring the operation and control behavior logs operated and controlled by the client in the target time period from a plurality of operation and control behavior logs operated and controlled by the client, which are stored by the client, according to the acquisition request;
and the second sending module is used for sending the control behavior log which is controlled by the client in the target time period to the server.
In an optional implementation manner, the anomaly indication is further used for indicating that an anomaly exists in a target service line of the client within the target time period;
the acquisition module includes:
a first obtaining unit, configured to obtain, according to the obtaining request, a control behavior log that is controlled by the target service line of the client within the target time period;
and the second sending module comprises:
and the first sending unit is used for sending the control behavior log of the target service line of the client controlled in the target time period to a server.
In an optional implementation, the apparatus further comprises:
the acquisition module is used for acquiring a control behavior log controlled by the client based on a buried point set in the client;
the encryption module is used for encrypting the collected control behavior logs to obtain encrypted logs;
and the storage module is used for storing the encrypted log in the client.
In an optional implementation manner, the obtaining module includes:
the second obtaining unit is used for obtaining an encrypted log corresponding to a control behavior log controlled by the client in the target time period from the stored encrypted logs;
and the second sending module comprises:
and a second transmitting unit for transmitting the acquired encryption log.
In an optional implementation manner, the second sending module includes:
the encryption unit is used for encrypting the control behavior log controlled by the client in the target time period to obtain an encrypted log;
and the third sending unit is used for sending the encrypted log to the server.
In an optional implementation, the apparatus further comprises:
and the deleting module is used for deleting at least one control behavior log according to the sequence of the storage time of the control behavior logs in the client from early to late under the condition that the space occupied by the control behavior logs stored in the client is larger than a preset space, so that the space occupied by the rest control behavior logs in the client is smaller than or equal to the preset space.
In a fifth aspect, the present application illustrates an electronic device comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the information processing method according to the first aspect.
In a sixth aspect, the present application shows a non-transitory computer-readable storage medium having instructions which, when executed by a processor of an electronic device, enable the electronic device to perform the information processing method according to the first aspect.
In a seventh aspect, the present application shows a computer program product, wherein instructions of the computer program product, when executed by a processor of an electronic device, enable the electronic device to perform the information processing method according to the first aspect.
In an eighth aspect, the present application illustrates an electronic device comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to execute the information processing method according to the second aspect.
In a ninth aspect, the present application shows a non-transitory computer-readable storage medium having instructions which, when executed by a processor of an electronic device, enable the electronic device to perform the information processing method of the second aspect.
In a tenth aspect, the present application shows a computer program product, in which instructions, when executed by a processor of an electronic device, enable the electronic device to perform the information processing method according to the second aspect.
The technical scheme provided by the application can comprise the following beneficial effects:
in the application, the server receives an abnormal indication, the abnormal indication is used for indicating that the client is abnormal in a target time period, an obtaining request is generated according to the abnormal indication, the obtaining request is used for obtaining a control behavior log controlled by the client in the target time period, and the obtaining request is sent to the client. The client receives the acquisition request, acquires the operation and control behavior log operated and controlled by the client in a target time period from a plurality of operation and control behavior logs operated and controlled by the client stored in the client according to the acquisition request, and sends the operation and control behavior log operated and controlled by the client in the target time period to the server. And the server receives the control behavior log which is controlled by the client in the target time period.
In the application, the client may send, to the server, a control behavior log that is helpful for solving the anomaly of the client, for example, the client may send, to the server, the control behavior log that the client is controlled in the target time period, and may not send, to the server, the control behavior log that the client is controlled in the non-target time period. Therefore, the number of the operation and control behavior logs sent to the server by the client can be reduced, and network resources can be saved.
And secondly, when the client is abnormal, the server can obtain the control behavior log of the client which is controlled, but can not obtain all the control behavior logs of the clients which are controlled. For example, the server may obtain the manipulated behavior log of the client that has the abnormality, and may not obtain the manipulated behavior log of the client that has not the abnormality, so that the client that has the abnormality may send the manipulated behavior log to the server, and the client that has not the abnormality may not send the manipulated behavior log to the server, thereby saving network resources of the terminal where the client that has not the abnormality is located. And the number of the operation and control behavior logs obtained by the server can be reduced, so that the storage resource of the server can be saved.
In addition, through the application, the control behavior log obtained by the server is often a control behavior log helpful for technical staff to solve the abnormity of the client, and is equivalent to a log which automatically helps the technical staff to screen the abnormity (the abnormal path is reproduced) of the positioning client, the technical staff can directly use the log, manual screening can be omitted, and therefore labor cost can be reduced.
Drawings
Fig. 1 is a block diagram of an information processing structure of the present application.
FIG. 2 is a flow chart of steps of an information processing method of the present application.
Fig. 3 is a block diagram of a configuration of an information processing apparatus according to the present application.
Fig. 4 is a block diagram of a configuration of an information processing apparatus according to the present application.
Fig. 5 is a block diagram of an electronic device shown in the present application.
Fig. 6 is a block diagram of an electronic device shown in the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
Referring to fig. 1, a block diagram of an information processing system according to the present application is shown, where the system includes at least a client 01 and a server 02, the client 01 may include an Application (APP) installed on a terminal, and the client 01 and the server 02 are connected in communication. The terminal comprises a mobile phone or a tablet computer and the like.
The server 02 includes a background server corresponding to the client 01, and the like, for example, the client 01 and the server 02 may belong to the same vendor, and the server 02 may provide a data service for the client 01, for example, the client 01 may obtain data from the server 02.
Referring to fig. 2, a flowchart illustrating steps of an information processing method according to the present application is shown, where the method may be applied to the system shown in fig. 1, and the method may specifically include the following steps:
in step S101, the server receives an exception indication, which indicates that the client has an exception within a target time period.
In an embodiment of the application, whether a client is abnormal or not can be monitored based on quality tracking service tools (such as Bugly) such as Crash monitoring and Crash analysis, and when the client is monitored to be abnormal, a target time period in which the time (often lasting for a period of time) when the client is abnormal is determined, and then an abnormal indication can be generated, wherein the abnormal indication carries unique identification information of the client and the target time period, and the abnormal indication is used for indicating that the client is abnormal in the target time period. Then, the abnormal indication may be sent to the server, so that the server may perceive that the client has an abnormality in the target time period according to the abnormal indication, and then step S102 may be executed.
In an embodiment of the application, in a process that a user uses a client, if an application is found to be abnormal, the user may determine a target time period in which a time (often lasting for a period of time) when the client is abnormal, and then manually generate an abnormal indication on the client, where the abnormal indication carries unique identification information of the client and the target time period, and the abnormal indication is used for indicating that the client is abnormal in the target time period. Then, the client is manually controlled to send the abnormal indication to the server, so that the server can perceive that the client has an abnormality in the target time period according to the abnormal indication, and then step S102 can be executed.
Wherein, the unique identification information of different clients is different. The unique identification information of the client may include identification information of a terminal where the client is located, and the identification information of the terminal includes an IMEI (International Mobile Equipment Identity) or an MEID (Mobile Equipment Identity) of the terminal.
In step S102, the server generates an obtaining request according to the abnormal indication, where the obtaining request is used to obtain a control behavior log that is controlled by the client within a target time period.
In order to solve the abnormality, the server needs to acquire a control behavior log of the user control client and provide the control behavior log to the technical staff.
In an embodiment, because the client has an abnormality in the target time period, the client may obtain the control behavior log that the client is controlled in the target time period, and then the client may send the control behavior log that the client is controlled in the target time period to the server, and after sending the control behavior log that the client is controlled in the target time period to the server, a technician may view the control behavior log that the client is controlled in the target time period on the server, and then may locate the abnormality (duplicate the abnormal path) of the client according to the control behavior log that the client is controlled in the target time period, and solve the abnormality.
The control behavior log which is controlled by the client in the non-target time period generally has little help for solving the abnormity of the client, so that the client does not acquire the control behavior log which is controlled by the client in the non-target time period. The control behavior logs which are controlled by the client in the non-target time period are not sent to the server, so that the number of the control behavior logs which need to be sent to the server by the client can be reduced, and the network resources of the terminal where the client is located can be saved.
In this application, when the server needs to obtain the operation and control behavior log that the client is operated and controlled within the target time period, the server may generate an obtaining request, and then execute step S103. The obtaining request carries a target time period, for example, a start time and an end time of the target time period, and the obtaining request is used for obtaining a control behavior log that is controlled by the client in the target time period.
In step S103, the server sends the acquisition request to the client.
In the application, the server may send the obtaining request to the client based on a communication connection with the client.
In step S104, the client receives the acquisition request.
In the present application, the client may receive the obtaining request based on a communication connection with the server.
In step S105, the client acquires, according to the acquisition request, a manipulated behavior log that the client is manipulated within the target time period from a plurality of manipulated behavior logs that the client has manipulated and stored in the client.
In the application, after the client is successfully installed on the terminal, each time the user starts the client on the terminal and controls the client, the client records a control behavior log of each user for controlling the client, and simultaneously records the control time when the user controls the client. For example, a corresponding entry may be formed by a control behavior log of a user controlling the client and a control time when the user controls the client, and the entry may be stored in a corresponding relationship between the control behavior log and the control time.
In this way, in this step, when the client needs to obtain the control behavior log that the client is controlled within the target time period, the client may search for the control time within the target time period in the correspondence between the control behavior log and the control time, and then search for the control behavior log corresponding to the searched control time in the correspondence between the control behavior log and the control time.
In step S106, the client sends, to the server, a control behavior log that the client is controlled in the target time period.
In the application, the client side can send the control behavior log which is controlled by the client side in the target time period to the server side based on the communication connection with the server side.
In step S107, the server receives the handling behavior log that the client is handled within the target time period.
In the application, the server side can receive the control behavior log which is controlled by the client side in the target time period based on the communication connection with the client side.
And then the server can output the control behavior log controlled by the client in the target time period for a technician to check, so that the technician can position the log of the client with the exception (the abnormal path is reproduced) according to the control behavior log controlled by the client in the target time period, and the exception of the client is solved.
In the application, the server receives an abnormal indication, the abnormal indication is used for indicating that the client is abnormal in a target time period, an obtaining request is generated according to the abnormal indication, the obtaining request is used for obtaining a control behavior log controlled by the client in the target time period, and the obtaining request is sent to the client. The client receives the acquisition request, acquires the operation and control behavior log operated and controlled by the client in a target time period from a plurality of operation and control behavior logs operated and controlled by the client stored in the client according to the acquisition request, and sends the operation and control behavior log operated and controlled by the client in the target time period to the server. And the server receives the control behavior log which is controlled by the client in the target time period.
In the application, the client may send, to the server, a control behavior log that is helpful for solving the anomaly of the client, for example, the client may send, to the server, the control behavior log that the client is controlled in the target time period, and may not send, to the server, the control behavior log that the client is controlled in the non-target time period. Therefore, the number of the operation and control behavior logs sent to the server by the client can be reduced, and network resources can be saved.
And secondly, when the client is abnormal, the server can obtain the control behavior log of the client which is controlled, but can not obtain all the control behavior logs of the clients which are controlled. For example, the server may obtain the manipulated behavior log of the client that has the abnormality, and may not obtain the manipulated behavior log of the client that has not the abnormality, so that the client that has the abnormality may send the manipulated behavior log to the server, and the client that has not the abnormality may not send the manipulated behavior log to the server, thereby saving network resources of the terminal where the client that has not the abnormality is located. And the number of the operation and control behavior logs obtained by the server can be reduced, so that the storage resource of the server can be saved.
In addition, through the application, the control behavior log obtained by the server is often a control behavior log helpful for technical staff to solve the abnormity of the client, and is equivalent to a log which automatically helps the technical staff to screen the abnormity (the abnormal path is reproduced) of the positioning client, the technical staff can directly use the log, manual screening can be omitted, and therefore labor cost can be reduced.
In the application, the control behavior log controlled by the client often relates to the privacy of the user, and in order to avoid the situation that the control behavior log is stolen by a lawbreaker and the privacy of the user is leaked in the process of sending the control behavior log from the client to the server, in step S106, the client can encrypt the control behavior log controlled by the client in a target time period to obtain an encrypted log, and then the encrypted log is sent to the server.
When a developer develops a client, an encryption algorithm used for encrypting the control behavior log is built in the client, and a decryption algorithm used for decrypting the encrypted control behavior log is arranged on the server, wherein the decryption algorithm corresponds to the encryption algorithm.
The Encryption algorithm used for encrypting the control behavior log may include a DES (Data Encryption Standard) algorithm, an AES (Advanced Encryption Standard) algorithm, an ECC (Elliptic curve Encryption) algorithm, or an HMAC (Hash-based Message Authentication Code) algorithm.
Therefore, when the control behavior log controlled by the client in the target time period is encrypted, the client can obtain an encryption algorithm built in the client, and then encrypt the control behavior log controlled by the client in the target time period by using the obtained encryption algorithm to obtain an encrypted log.
Through encrypting the control behavior log controlled by the client in the target time period, even if lawless persons obtain the encryption log through packet capturing, the lawless persons cannot know the encryption algorithm and cannot know the decryption algorithm corresponding to the encryption algorithm, and therefore the encryption log cannot be decrypted, so that the control behavior controlled by the client in the target time period can be prevented from being leaked, and further the privacy of users is prevented from being leaked.
In addition, in order to support that the client can encrypt the control behavior log controlled by the client in the target time period to obtain an encrypted log and send the encrypted log to the server, leakage of the control behavior controlled by the client in the target time period is avoided, and further privacy of a user is avoided.
In the application, a technician may set a decryption algorithm for decrypting the encrypted control behavior log on the server in advance, so that after the server receives the encrypted log, the server may obtain the decryption algorithm built in the server, and then decrypt the encrypted log by using the decryption algorithm to obtain the control behavior log controlled by the client within the target time period.
In the embodiment shown in fig. 2 of the present application, in a process that a user uses a client, if an application is found to be abnormal, the user may determine a target time period in which a time (often lasting for a period of time) at which the client is abnormal is located, and then manually generate an abnormal indication on the client, where the abnormal indication carries unique identification information of the client and the target time period, and the abnormal indication is used to indicate that the client has an abnormality in the target time period. And then, manually controlling the client to send the abnormal indication to the server, so that the server can sense that the client has abnormality in the target time period according to the abnormal indication.
However, sometimes the user cannot accurately determine the time when the client is abnormal to be a few minutes, a few seconds or even milliseconds, and the user usually determines which minute of which hour to which minute of which hour the time period is. Thus, the determined target time period includes a time period of 1 minute less and a time period of at least 2 minutes more.
However, within a duration of at least one minute, the client may be sequentially manipulated by the user many times, and the client records the manipulation behavior log after each manipulation, but actually, only part of the manipulated behavior logs may help to solve the abnormality of the client, and other manipulated manipulation behavior logs may not help much to solve the abnormality of the client.
For example, in the present application, there are often a plurality of service lines in the client, for example, a service line for instant messaging, a service line for login, a service line for setting attributes of the client, a service line for games, a service line for placing orders, a service line for payment, a service line for rendering pages, and the like.
Suppose that a user performs control of at least two service lines on a client in a target time period, the client has an abnormality on one of the service lines and does not have an abnormality on the other service line.
Therefore, the client can obtain the operation and control behavior log of the service line of the client, which is operated and controlled in the target time period, and after the operation and control behavior log is sent to the server, a technician can locate the abnormal reproduction path (abnormal reproduction path) of the service line of the client according to the operation and control behavior of the service line of the client, which is operated and controlled in the target time period, and solve the abnormality occurring on the service line. And the client may not acquire a control behavior log that another service line of the client is controlled in the target time period. Therefore, the number of the operation and control behavior logs which need to be sent to the server side by the client side can be reduced, and further network resources of the terminal where the client side is located can be saved.
Specifically, the abnormal indication is further used for indicating that the target service line of the client is abnormal in the target time period, and the obtaining request is used for obtaining a control behavior log that the target service line of the client is controlled in the target time period. In this way, when the operation and control behavior log of the client operated in the target time period is obtained in step S105, the operation and control behavior log of the target service line of the client operated in the target time period may be obtained according to the obtaining request.
In the application, after the client is installed on the terminal, each time the user starts the client on the terminal and operates the client, the client records an operation behavior log of the user for operating the client each time, and records a service line related to the operation and an operation time when the client is operated. For example, a control behavior log for controlling the client, a service line related to the control, and a control time when the client is controlled may be formed into a corresponding entry, and stored in a corresponding relationship among the control behavior log, the service line, and the control time.
Thus, in this step, when the client needs to obtain the operation and control behavior log operated and controlled by the target service line of the client in the target time period according to the obtaining request, the client may search the operation and control time in the target time period in the correspondence relationship among the operation and control behavior log, the service line and the operation and control time, and then search the operation and control behavior log corresponding to the searched operation and control time and the target service line in the correspondence relationship among the operation and control behavior log, the service line and the operation and control time.
Then, when the control behavior log that the client is controlled in the target time period is sent to the server in step S106, the control behavior log that the target service line of the client is controlled in the target time period may be sent to the server.
Accordingly, when the operation behavior log returned by the client according to the acquisition request and operated by the client in the target time period is received in step S107, the operation behavior log operated by the target service line of the client in the target time period may be received.
In the application, after the client is installed on the terminal, each time the user starts the client on the terminal and controls the client, the client records a control behavior log of each user for controlling the client, and simultaneously records the control time when the client is controlled.
The control behavior log controlled by the client often relates to the privacy of a user, in order to avoid the situation that the control behavior log is stolen from the client by lawless persons and the privacy of the user is leaked, after the client collects the control behavior log controlled by the client based on a buried point arranged in the client, the collected control behavior log can be encrypted to obtain an encrypted log, and the encrypted log is stored in the client. For example, the collected control behavior log may be encrypted by using an encryption algorithm built in the client in the foregoing embodiment, so as to obtain an encrypted log.
For example, the encryption log and the control time when the client is controlled may be combined into a corresponding entry, and stored in the corresponding relationship between the encryption log and the control time.
In this way, in step S105, when the client needs to obtain the operation and control behavior log that the client is operated and controlled within the target time period, the client may search the operation and control time within the target time period in the correspondence between the encryption log and the operation and control time, and then search the encryption log corresponding to the searched operation and control time in the correspondence between the encryption log and the operation and control time.
Therefore, when the control behavior log which is controlled by the client in the target time period is sent to the server, the acquired encryption log can be directly sent to the client.
By the method and the device, when the control behavior log controlled by the client in the target time period needs to be sent to the server, the control behavior log controlled by the client in the target time period does not need to be encrypted in real time.
The encrypted log is obtained by encrypting the control behavior log controlled by the client in the target time period, so that the encrypted log obtained by encrypting the control behavior log controlled by the client in the target time period can be directly obtained, the time consumed by encrypting the control behavior log controlled by the client in the target time period is saved, and the efficiency of obtaining the encrypted log can be improved.
Therefore, the efficiency of obtaining the control behavior log by the server is improved on the premise of ensuring that the control behavior log is not stolen (safety).
In the application, after the client is installed on the terminal, each time the user starts the client on the terminal and controls the client, the client records the control behavior log of each control of the client by the user, and simultaneously records the control time when the client is controlled, however, as the number of times of controlling the client by the user is more and more, the control behavior log recorded in the client is more and more, and thus, more storage space is occupied.
Therefore, in order to save the storage space, when the space occupied by the control behavior logs stored in the client is larger than the preset space, at least one control behavior log is deleted according to the sequence of the storage time of the control behavior logs in the client from early to late, so that the space occupied by the remaining control behavior logs in the client is smaller than or equal to the preset space.
The storage time of the control behavior log in the client can also be understood as: the generation time of the control behavior log, or the occurrence time of the control behavior corresponding to the control behavior log on the client (the time when the user controls the client), and the like.
The preset space may be set according to specific situations, and is not described in detail herein.
Or, in another embodiment, in a general case, for any one of the manipulated behavior logs recorded by the client, which are manipulated by the client, if the client sends the manipulated behavior log to the server due to an abnormality of the client, the server may obtain the manipulated behavior log, and then a technician may attempt to solve the abnormality according to the manipulated behavior log.
Since the server has already obtained the control behavior log, the client may not record the control behavior log any more, and therefore, in order to save the storage space, the client may delete the control behavior log.
Therefore, in another embodiment of the present application, after the client sends the handling behavior log that the client is handled within the target time period to the server, the client may delete the handling behavior log that is recorded in the client and that is handled within the target time period by the client.
In one example, after the server receives a control behavior log sent by the client and controlled within a target time period, the server may send a receipt to the client to inform the client that the server has received the control behavior log sent by the client and controlled within the target time period, and after the client receives the receipt, the control behavior log recorded in the client and controlled within the target time period by the client may be deleted.
After the client sends the control behavior log of the client controlled in the target time period to the server, if the receiving receipt is not received for a long time, the server may not receive the control behavior log of the client controlled in the target time period, and the control behavior log of the client controlled in the target time period may be sent to the server again until the receiving receipt returned by the server is received, and then the control behavior log recorded in the client and controlled by the client in the target time period may be deleted.
It is noted that, for simplicity of explanation, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will appreciate that the present application is not limited by the order of acts, as some steps may, in accordance with the present application, occur in other orders and concurrently. Further, those skilled in the art will also appreciate that the embodiments described in the specification are exemplary and that no action is necessarily required in this application.
Referring to fig. 3, a block diagram of an information processing apparatus according to the present application is shown, and the apparatus is applied to a server, and specifically includes the following modules:
a first receiving module 11, configured to receive an exception indication, where the exception indication is used to indicate that an exception exists in a target time period at a client;
a generating module 12, configured to generate an obtaining request according to the abnormal indication, where the obtaining request is used to obtain a control behavior log that is controlled by the client within the target time period;
a first sending module 13, configured to send the obtaining request to a client;
a second receiving module 14, configured to receive a control behavior log returned by the client according to the obtaining request, where the control behavior log is controlled by the client within the target time period.
In an optional implementation manner, the anomaly indication is further used for indicating that an anomaly exists in a target service line of the client within the target time period; the obtaining request is used for obtaining a control behavior log of the target service line of the client terminal controlled in the target time period;
the second receiving module includes:
a first receiving unit, configured to receive a control behavior log that the target service line of the client is controlled in the target time period.
In an optional implementation manner, the second receiving module includes:
a second receiving unit, configured to receive an encrypted log returned by the client according to the acquisition request, where the encrypted log is obtained by encrypting, by the client, a control behavior log that is controlled by the client within the target time period;
and the decryption unit is used for decrypting the encrypted log to obtain the control behavior log which is controlled by the client in the target time period.
In the application, the server receives an abnormal indication, the abnormal indication is used for indicating that the client is abnormal in a target time period, an obtaining request is generated according to the abnormal indication, the obtaining request is used for obtaining a control behavior log controlled by the client in the target time period, and the obtaining request is sent to the client. The client receives the acquisition request, acquires the operation and control behavior log operated and controlled by the client in a target time period from a plurality of operation and control behavior logs operated and controlled by the client stored in the client according to the acquisition request, and sends the operation and control behavior log operated and controlled by the client in the target time period to the server. And the server receives the control behavior log which is controlled by the client in the target time period.
In the application, the client may send, to the server, a control behavior log that is helpful for solving the anomaly of the client, for example, the client may send, to the server, the control behavior log that the client is controlled in the target time period, and may not send, to the server, the control behavior log that the client is controlled in the non-target time period. Therefore, the number of the operation and control behavior logs sent to the server by the client can be reduced, and network resources can be saved.
And secondly, when the client is abnormal, the server can obtain the control behavior log of the client which is controlled, but can not obtain all the control behavior logs of the clients which are controlled. For example, the server may obtain the manipulated behavior log of the client that has the abnormality, and may not obtain the manipulated behavior log of the client that has not the abnormality, so that the client that has the abnormality may send the manipulated behavior log to the server, and the client that has not the abnormality may not send the manipulated behavior log to the server, thereby saving network resources of the terminal where the client that has not the abnormality is located. And the number of the operation and control behavior logs obtained by the server can be reduced, so that the storage resource of the server can be saved.
In addition, through the application, the control behavior log obtained by the server is often a control behavior log helpful for technical staff to solve the abnormity of the client, and is equivalent to a log which automatically helps the technical staff to screen the abnormity (the abnormal path is reproduced) of the positioning client, the technical staff can directly use the log, manual screening can be omitted, and therefore labor cost can be reduced.
Referring to fig. 4, a block diagram of an information processing apparatus according to the present application is shown, and the apparatus is applied to a client, and specifically includes the following modules:
a third receiving module 21, configured to receive an acquisition request sent by a server, where the acquisition request is sent by the server to a client after receiving an exception indication, the exception indication is used to indicate that the client has an exception in a target time period, and the acquisition request is used to acquire a control behavior log that the client is controlled in the target time period;
the obtaining module 22 is configured to obtain, according to the obtaining request, a manipulated behavior log that is manipulated by the client within the target time period from a plurality of manipulated behavior logs that are stored by the client and manipulated by the client;
and a second sending module 23, configured to send, to the server, the control behavior log that is controlled by the client within the target time period.
In an optional implementation manner, the anomaly indication is further used for indicating that an anomaly exists in a target service line of the client within the target time period;
the acquisition module includes:
a first obtaining unit, configured to obtain, according to the obtaining request, a control behavior log that is controlled by the target service line of the client within the target time period;
and the second sending module comprises:
and the first sending unit is used for sending the control behavior log of the target service line of the client controlled in the target time period to a server.
In an optional implementation, the apparatus further comprises:
the acquisition module is used for acquiring a control behavior log controlled by the client based on a buried point set in the client;
the encryption module is used for encrypting the collected control behavior logs to obtain encrypted logs;
and the storage module is used for storing the encrypted log in the client.
In an optional implementation manner, the obtaining module includes:
the second obtaining unit is used for obtaining an encrypted log corresponding to a control behavior log controlled by the client in the target time period from the stored encrypted logs;
and the second sending module comprises:
and a second transmitting unit for transmitting the acquired encryption log.
In an optional implementation manner, the second sending module includes:
the encryption unit is used for encrypting the control behavior log controlled by the client in the target time period to obtain an encrypted log;
and the third sending unit is used for sending the encrypted log to the server.
In an optional implementation, the apparatus further comprises:
and the deleting module is used for deleting at least one control behavior log according to the sequence of the storage time of the control behavior logs in the client from early to late under the condition that the space occupied by the control behavior logs stored in the client is larger than a preset space, so that the space occupied by the rest control behavior logs in the client is smaller than or equal to the preset space.
In the application, the server receives an abnormal indication, the abnormal indication is used for indicating that the client is abnormal in a target time period, an obtaining request is generated according to the abnormal indication, the obtaining request is used for obtaining a control behavior log controlled by the client in the target time period, and the obtaining request is sent to the client. The client receives the acquisition request, acquires the operation and control behavior log operated and controlled by the client in a target time period from a plurality of operation and control behavior logs operated and controlled by the client stored in the client according to the acquisition request, and sends the operation and control behavior log operated and controlled by the client in the target time period to the server. And the server receives the control behavior log which is controlled by the client in the target time period.
In the application, the client may send, to the server, a control behavior log that is helpful for solving the anomaly of the client, for example, the client may send, to the server, the control behavior log that the client is controlled in the target time period, and may not send, to the server, the control behavior log that the client is controlled in the non-target time period. Therefore, the number of the operation and control behavior logs sent to the server by the client can be reduced, and network resources can be saved.
And secondly, when the client is abnormal, the server can obtain the control behavior log of the client which is controlled, but can not obtain all the control behavior logs of the clients which are controlled. For example, the server may obtain the manipulated behavior log of the client that has the abnormality, and may not obtain the manipulated behavior log of the client that has not the abnormality, so that the client that has the abnormality may send the manipulated behavior log to the server, and the client that has not the abnormality may not send the manipulated behavior log to the server, thereby saving network resources of the terminal where the client that has not the abnormality is located. And the number of the operation and control behavior logs obtained by the server can be reduced, so that the storage resource of the server can be saved.
In addition, through the application, the control behavior log obtained by the server is often a control behavior log helpful for technical staff to solve the abnormity of the client, and is equivalent to a log which automatically helps the technical staff to screen the abnormity (the abnormal path is reproduced) of the positioning client, the technical staff can directly use the log, manual screening can be omitted, and therefore labor cost can be reduced.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
Fig. 5 is a block diagram of an electronic device 800 shown in the present application. For example, the electronic device 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 5, electronic device 800 may include one or more of the following components: a processing component 802, a memory 804, a power component 806, a multimedia component 808, an audio component 810, an input/output (I/O) interface 812, a sensor component 814, and a communication component 816.
The processing component 802 generally controls overall manipulation of the electronic device 800, such as manipulations associated with display, telephone calls, data communications, camera manipulations, and recording manipulations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support manipulation at the device 800. Examples of such data include instructions for any application or method being manipulated on the electronic device 800, contact data, phonebook data, messages, images, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 806 provides power to the various components of the electronic device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the electronic device 800.
The multimedia component 808 includes a screen that provides an output interface between the electronic device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide manipulation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the device 800 is in a manipulation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 800 is in a manipulation mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the electronic device 800. For example, the sensor assembly 814 may detect an open/closed state of the device 800, the relative positioning of components, such as a display and keypad of the electronic device 800, the sensor assembly 814 may also detect a change in the position of the electronic device 800 or a component of the electronic device 800, the presence or absence of user contact with the electronic device 800, orientation or acceleration/deceleration of the electronic device 800, and a change in the temperature of the electronic device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate wired or wireless communication between the electronic device 800 and other devices. The electronic device 800 may access a wireless network based on a communication standard, such as WiFi, a carrier network (such as 2G, 3G, 4G, or 5G), or a combination thereof. In an exemplary embodiment, the communication component 816 receives broadcast signals or broadcast handling information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the electronic device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Fig. 6 is a block diagram of an electronic device 1900 shown in the present application. For example, the electronic device 1900 may be provided as a server.
Referring to fig. 6, electronic device 1900 includes a processing component 1922 further including one or more processors and memory resources, represented by memory 1932, for storing instructions, e.g., applications, executable by processing component 1922. The application programs stored in memory 1932 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1922 is configured to execute instructions to perform the above-described method.
The electronic device 1900 may also include a power component 1926 configured to perform power management of the electronic device 1900, a wired or wireless network interface 1950 configured to connect the electronic device 1900 to a network, and an input/output (I/O) interface 1958. The electronic device 1900 may operate a control system based on information stored in memory 1932, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
Finally, it is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The information processing method and apparatus provided by the present application are introduced in detail, and a specific example is applied in the present application to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (22)

1. An information processing method, applied to a server, the method comprising:
receiving an abnormal indication, wherein the abnormal indication is used for indicating that the client has an abnormality in a target time period;
generating an obtaining request according to the abnormal indication, wherein the obtaining request is used for obtaining a control behavior log controlled by the client in the target time period;
sending the acquisition request to a client;
and receiving a control behavior log which is returned by the client according to the acquisition request and is controlled by the client in the target time period.
2. The method of claim 1, wherein the anomaly indication is further used to indicate that a target traffic line of the client has an anomaly within the target time period; the obtaining request is used for obtaining a control behavior log of the target service line of the client terminal controlled in the target time period;
the receiving of the control behavior log, which is returned by the client according to the acquisition request and is controlled by the client within the target time period, includes:
and receiving a control behavior log of the target service line of the client terminal which is controlled in the target time period.
3. The method according to claim 1, wherein the receiving a handling behavior log returned by the client according to the obtaining request, where the handling behavior log is handled by the client within the target time period, includes:
receiving an encrypted log returned by the client according to the acquisition request, wherein the encrypted log is obtained by encrypting a control behavior log which is controlled by the client in the target time period by the client;
and decrypting the encrypted log to obtain a control behavior log which is controlled by the client in the target time period.
4. An information processing method applied to a client, the method comprising:
receiving an acquisition request sent by a server, wherein the acquisition request is sent to a client by the server after receiving an abnormal indication, the abnormal indication is used for indicating that the client is abnormal in a target time period, and the acquisition request is used for acquiring a control behavior log controlled by the client in the target time period;
acquiring a control behavior log which is controlled by the client in the target time period from a plurality of control behavior logs which are stored in the client and controlled by the client according to the acquisition request;
and sending the control behavior log of the client controlled in the target time period to a server.
5. The method of claim 4, wherein the anomaly indication is further used to indicate that a target traffic line of the client has an anomaly within the target time period;
the obtaining, according to the obtaining request, a manipulated behavior log of the client manipulated in the target time period from a plurality of manipulated behavior logs of the client that have been stored in the client and manipulated by the client includes:
acquiring a control behavior log of the target service line of the client controlled in the target time period according to the acquisition request;
and sending the control behavior log of the client controlled in the target time period to a server, wherein the sending comprises:
and sending a control behavior log of the target service line of the client terminal controlled in the target time period to a server terminal.
6. The method of claim 4, further comprising:
acquiring a manipulated behavior log of the client based on a buried point set in the client;
encrypting the collected control behavior log to obtain an encrypted log;
storing the encrypted log in the client.
7. The method according to claim 6, wherein the obtaining, according to the obtaining request, a manipulated behavior log that the client is manipulated in the target time period from a plurality of manipulated behavior logs that the client has manipulated, which are stored in the client, comprises:
acquiring an encrypted log corresponding to a control behavior log controlled by the client in the target time period from the stored encrypted logs;
and sending the control behavior log of the client controlled in the target time period to a server, wherein the sending comprises:
and sending the acquired encryption log.
8. The method according to claim 4, wherein the sending, to the server, the log of the handling behavior of the client handled within the target time period includes:
encrypting the operation and control behavior log controlled by the client in the target time period to obtain an encrypted log;
and sending the encrypted log to the server.
9. The method of claim 4, further comprising:
and deleting at least one control behavior log according to the sequence of the storage time of the control behavior logs in the client from early to late under the condition that the space occupied by the control behavior logs stored in the client is larger than a preset space, so that the space occupied by the rest control behavior logs in the client is smaller than or equal to the preset space.
10. An information processing apparatus, applied to a server, the apparatus comprising:
the client comprises a first receiving module, a second receiving module and a sending module, wherein the first receiving module is used for receiving an abnormal indication which is used for indicating that the client has abnormality in a target time period;
the generating module is used for generating an obtaining request according to the abnormal indication, wherein the obtaining request is used for obtaining a control behavior log controlled by the client in the target time period;
the first sending module is used for sending the acquisition request to a client;
and the second receiving module is used for receiving a control behavior log which is returned by the client according to the acquisition request and is controlled by the client in the target time period.
11. The apparatus of claim 10, wherein the anomaly indication is further configured to indicate that a target traffic line of the client has an anomaly within the target time period; the obtaining request is used for obtaining a control behavior log of the target service line of the client terminal controlled in the target time period;
the second receiving module includes:
a first receiving unit, configured to receive a control behavior log that the target service line of the client is controlled in the target time period.
12. The apparatus of claim 10, wherein the second receiving module comprises:
a second receiving unit, configured to receive an encrypted log returned by the client according to the acquisition request, where the encrypted log is obtained by encrypting, by the client, a control behavior log that is controlled by the client within the target time period;
and the decryption unit is used for decrypting the encrypted log to obtain the control behavior log which is controlled by the client in the target time period.
13. An information processing apparatus, applied to a client, the apparatus comprising:
a third receiving module, configured to receive an acquisition request sent by a server, where the acquisition request is sent to a client by the server after receiving an exception indication, the exception indication is used to indicate that the client has an exception in a target time period, and the acquisition request is used to acquire a control behavior log that the client is controlled in the target time period;
the acquisition module is used for acquiring the operation and control behavior logs operated and controlled by the client in the target time period from a plurality of operation and control behavior logs operated and controlled by the client, which are stored by the client, according to the acquisition request;
and the second sending module is used for sending the control behavior log which is controlled by the client in the target time period to the server.
14. The apparatus of claim 13, wherein the anomaly indication is further configured to indicate that a target traffic line of the client has an anomaly within the target time period;
the acquisition module includes:
a first obtaining unit, configured to obtain, according to the obtaining request, a control behavior log that is controlled by the target service line of the client within the target time period;
and the second sending module comprises:
and the first sending unit is used for sending the control behavior log of the target service line of the client controlled in the target time period to a server.
15. The apparatus of claim 13, further comprising:
the acquisition module is used for acquiring a control behavior log controlled by the client based on a buried point set in the client;
the encryption module is used for encrypting the collected control behavior logs to obtain encrypted logs;
and the storage module is used for storing the encrypted log in the client.
16. The apparatus of claim 15, wherein the obtaining module comprises:
the second obtaining unit is used for obtaining an encrypted log corresponding to a control behavior log controlled by the client in the target time period from the stored encrypted logs;
and the second sending module comprises:
and a second transmitting unit for transmitting the acquired encryption log.
17. The apparatus of claim 13, wherein the second sending module comprises:
the encryption unit is used for encrypting the control behavior log controlled by the client in the target time period to obtain an encrypted log;
and the third sending unit is used for sending the encrypted log to the server.
18. The apparatus of claim 13, further comprising:
and the deleting module is used for deleting at least one control behavior log according to the sequence of the storage time of the control behavior logs in the client from early to late under the condition that the space occupied by the control behavior logs stored in the client is larger than a preset space, so that the space occupied by the rest control behavior logs in the client is smaller than or equal to the preset space.
19. An electronic device, characterized in that the electronic device comprises:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the information processing method of any one of claims 1 to 3.
20. A non-transitory computer-readable storage medium in which instructions, when executed by a processor of an electronic device, enable the electronic device to perform the information processing method of any one of claims 1 to 3.
21. An electronic device, characterized in that the electronic device comprises:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the information processing method of any one of claims 4 to 9.
22. A non-transitory computer-readable storage medium in which instructions, when executed by a processor of an electronic device, enable the electronic device to perform the information processing method of any one of claims 4 to 9.
CN202011401990.1A 2020-12-03 2020-12-03 Information processing method and device Pending CN112463429A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011401990.1A CN112463429A (en) 2020-12-03 2020-12-03 Information processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011401990.1A CN112463429A (en) 2020-12-03 2020-12-03 Information processing method and device

Publications (1)

Publication Number Publication Date
CN112463429A true CN112463429A (en) 2021-03-09

Family

ID=74806123

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011401990.1A Pending CN112463429A (en) 2020-12-03 2020-12-03 Information processing method and device

Country Status (1)

Country Link
CN (1) CN112463429A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105868040A (en) * 2016-03-29 2016-08-17 Tcl通力电子(惠州)有限公司 Log collection method and collection terminal
CN107678869A (en) * 2017-07-26 2018-02-09 上海壹账通金融科技有限公司 Client exception localization method, device, computer equipment and storage medium
CN108874612A (en) * 2017-05-09 2018-11-23 腾讯科技(深圳)有限公司 A kind of method of acquisition of information, relevant device and system
CN109710490A (en) * 2018-12-20 2019-05-03 网易(杭州)网络有限公司 Acquisition method, device, storage medium and the electronic equipment of client log

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105868040A (en) * 2016-03-29 2016-08-17 Tcl通力电子(惠州)有限公司 Log collection method and collection terminal
CN108874612A (en) * 2017-05-09 2018-11-23 腾讯科技(深圳)有限公司 A kind of method of acquisition of information, relevant device and system
CN107678869A (en) * 2017-07-26 2018-02-09 上海壹账通金融科技有限公司 Client exception localization method, device, computer equipment and storage medium
CN109710490A (en) * 2018-12-20 2019-05-03 网易(杭州)网络有限公司 Acquisition method, device, storage medium and the electronic equipment of client log

Similar Documents

Publication Publication Date Title
CN107819572B (en) Command transmission method and device and electronic equipment
EP2961128B1 (en) Method, system, computer program and computer program product for binding a token key to an account
CN109219036B (en) Method and device for unbinding equipment and electronic equipment
EP3151507A1 (en) Methods and apparatuses for controlling device
CN104715337A (en) Attendance method, and attendance management method and device
US20220382884A1 (en) Method and device for parsing shared password
US9723486B2 (en) Method and apparatus for accessing network
CN106454392A (en) Live broadcast processing method, device and terminal
KR101639147B1 (en) Method, device, program and storage medium for sending information in voice service
CN105389507A (en) Method and apparatus for monitoring files of system partition
CN113868505A (en) Data processing method and device, electronic equipment, server and storage medium
CN107154977B (en) Information pushing method and device
CN111917728A (en) Password verification method and device
CN115333813A (en) Data encryption transmission method and device, electronic equipment and storage medium
CN105677513A (en) Method and device for restoring backup data
CN113055169B (en) Data encryption method and device, electronic equipment and storage medium
CN108664216B (en) Data storage method and device
CN112434339A (en) Information processing method and device
CN114221788B (en) Login method, login device, electronic equipment and storage medium
CN106062762A (en) Application encryption method and device
CN114553552B (en) Data encryption method and device, data decryption method and device and storage medium
CN112733092B (en) Information processing method and device
CN107302519B (en) Identity authentication method and device for terminal equipment, terminal equipment and server
CN114826567A (en) Terminal password updating method and device, electronic equipment, medium and product
CN112463429A (en) Information processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination