CN113282918A - User behavior analysis method and device based on cloud computing - Google Patents

User behavior analysis method and device based on cloud computing Download PDF

Info

Publication number
CN113282918A
CN113282918A CN202011327562.9A CN202011327562A CN113282918A CN 113282918 A CN113282918 A CN 113282918A CN 202011327562 A CN202011327562 A CN 202011327562A CN 113282918 A CN113282918 A CN 113282918A
Authority
CN
China
Prior art keywords
data
behavior
verified
identity
biological characteristic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202011327562.9A
Other languages
Chinese (zh)
Inventor
顾黎明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Lyudian Information Technology Co ltd
Original Assignee
Suzhou Lyudian Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Lyudian Information Technology Co ltd filed Critical Suzhou Lyudian Information Technology Co ltd
Priority to CN202011327562.9A priority Critical patent/CN113282918A/en
Publication of CN113282918A publication Critical patent/CN113282918A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The invention provides a user behavior analysis method and device based on cloud computing, which are used for acquiring biological characteristic data and identity data to be verified in an information acquisition end, acquiring similar characteristics of the biological characteristic data and the identity data to be verified, converting the similar characteristics into behavior characteristics, and determining corresponding behavior state data from the biological characteristic data to the identity data to be verified in a preset time period according to behavior state identification of the identity information in the behavior characteristics. In this way, the user behavior can be accurately analyzed.

Description

User behavior analysis method and device based on cloud computing
Technical Field
The invention relates to the technical field of cloud computing data analysis, in particular to a user behavior analysis method and device based on cloud computing.
Background
The user behavior analysis means that under the condition of obtaining basic data of system access amount, relevant data are counted and analyzed, rules of the user for accessing the system are found, and the rules are combined with enterprise development strategies and the like, so that problems possibly existing in the current enterprise are found, and a basis is provided for further correcting or re-formulating the enterprise development strategies.
Therefore, how to accurately analyze the user behavior is a technical problem to be solved at the present stage.
Disclosure of Invention
In order to solve the problems, the invention provides a user behavior analysis method and device based on cloud computing.
A cloud computing-based user behavior analysis method, the method comprising:
acquiring biological characteristic data and to-be-verified identity data in an information acquisition end, wherein the biological characteristic data and the to-be-verified identity data are to-be-processed keys corresponding to an authentication interface in the information acquisition end;
acquiring similar characteristics of the biological characteristic data and the identity data to be verified, wherein the similar characteristics represent common point descriptions between the biological characteristic data and the identity information corresponding to the identity data to be verified;
converting the similar features into behavior features, wherein the behavior features comprise a plurality of identity information;
and determining corresponding behavior state data from the biological characteristic data to the identity data to be verified within a preset time period according to the behavior state identifier of the identity information in the behavior characteristics.
Further, the acquiring similar features of the biometric data and the identity data to be verified includes: determining a sound characteristic set corresponding to the biological characteristic data and a face characteristic set corresponding to the identity data to be verified; and matching the sound feature set with the face feature set to obtain the similar features, wherein the similar features are collected in a recognition mode of sound wave bands and image identifications, and the sound wave bands and the image identifications comprise recognition parameters corresponding to common point description among the identity information.
Further, picking behavior features of the similar features comprises: acquiring the sound wave band corresponding to the similar feature and the identification parameter in the image identification; and converting the identification parameters into behavior state identifications to obtain the behavior characteristics, wherein the behavior characteristics are collected in an identification mode of a behavior state identification matrix.
Further, the determining, according to the behavior state identifier of the identity information in the behavior feature, behavior state data corresponding to the biometric data to the identity data to be verified within a preset time period includes: determining similar behavior state identification of the identity information from the behavior characteristics; and responding to the condition that the similar behavior state identification is not similar to the behavior state identification, and determining the behavior state data corresponding to the biological characteristic data to the identity data to be verified within a preset time period.
A cloud computing-based user behavior analysis apparatus, the apparatus comprising:
the data authentication module is used for acquiring biological characteristic data and to-be-verified identity data in the information acquisition end, wherein the biological characteristic data and the to-be-verified identity data are to-be-processed keys corresponding to an authentication interface in the information acquisition end;
the common point confirmation module is used for acquiring similar characteristics of the biological characteristic data and the identity data to be verified, wherein the similar characteristics represent common point description between the biological characteristic data and the identity information corresponding to the identity data to be verified;
the characteristic conversion module is used for converting the similar characteristics into behavior characteristics, and the behavior characteristics comprise a plurality of identity information;
and the behavior state determining module is used for determining corresponding behavior state data from the biological characteristic data to the identity data to be verified within a preset time period according to the behavior state identifier of the identity information in the behavior characteristics.
By applying the method and the device, the biological characteristic data and the identity data to be verified in the information acquisition end are acquired, the similar characteristics of the biological characteristic data and the identity data to be verified are acquired, the similar characteristics are converted into behavior characteristics, and the behavior state data corresponding to the biological characteristic data and the identity data to be verified in a preset time period are determined according to the behavior state identification of the identity information in the behavior characteristics. In this way, the user behavior can be accurately analyzed. .
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a flowchart of a user behavior analysis method based on cloud computing according to an embodiment of the present invention.
Fig. 2 is a functional block diagram of a user behavior analysis apparatus based on cloud computing according to an embodiment of the present invention.
Fig. 3 is a schematic diagram of a hardware structure of a server according to an embodiment of the present invention.
Detailed Description
In order to better understand the technical solutions of the present invention, the following detailed descriptions of the technical solutions of the present invention are provided with the accompanying drawings and the specific embodiments, and it should be understood that the specific features in the embodiments and the examples of the present invention are the detailed descriptions of the technical solutions of the present invention, and are not limitations of the technical solutions of the present invention, and the technical features in the embodiments and the examples of the present invention may be combined with each other without conflict.
Referring to fig. 1, a cloud computing-based user behavior analysis method applied to a server is shown, including the following steps S11-S14.
Step S11, obtaining biological characteristic data and identity data to be verified in an information acquisition end, wherein the biological characteristic data and the identity data to be verified are to-be-processed keys corresponding to an authentication interface in the information acquisition end.
Step S12, obtaining similar features of the biometric data and the to-be-verified identity data, where the similar features represent common point descriptions between the biometric data and the identity information corresponding to the to-be-verified identity data.
Step S13, converting the similar features into behavior features, where the behavior features include a plurality of identity information.
Step S14, determining the corresponding behavior state data from the biometric data to the to-be-verified identity data within a preset time period according to the behavior state identifier of the identity information in the behavior feature.
By executing the steps S11-S14, biometric data and to-be-verified identity data in an information acquisition terminal are acquired, similar features of the biometric data and the to-be-verified identity data are acquired, the similar features are converted into behavior features, and behavior state data corresponding to the biometric data and the to-be-verified identity data in a preset time period are determined according to behavior state identification of the identity information in the behavior features. Thus, the working condition detection of the continuity of the cast iron equipment can be carried out
Further, the acquiring similar features of the biometric data and the identity data to be verified includes: determining a sound characteristic set corresponding to the biological characteristic data and a face characteristic set corresponding to the identity data to be verified; and matching the sound feature set with the face feature set to obtain the similar features, wherein the similar features are collected in a recognition mode of sound wave bands and image identifications, and the sound wave bands and the image identifications comprise recognition parameters corresponding to common point description among the identity information.
Further, picking behavior features of the similar features comprises: acquiring the sound wave band corresponding to the similar feature and the identification parameter in the image identification; and converting the identification parameters into behavior state identifications to obtain the behavior characteristics, wherein the behavior characteristics are collected in an identification mode of a behavior state identification matrix.
Further, the determining, according to the behavior state identifier of the identity information in the behavior feature, behavior state data corresponding to the biometric data to the identity data to be verified within a preset time period includes: determining similar behavior state identification of the identity information from the behavior characteristics; and responding to the condition that the similar behavior state identification is not similar to the behavior state identification, and determining the behavior state data corresponding to the biological characteristic data to the identity data to be verified within a preset time period.
As shown in fig. 2, there is shown a cloud computing-based user behavior analysis apparatus 200, the apparatus comprising:
the data authentication module 210 is configured to obtain biometric data and identity data to be verified in an information acquisition end, where the biometric data and the identity data to be verified are to-be-processed keys corresponding to an authentication interface in the information acquisition end;
a common point confirmation module 220, configured to obtain similar features of the biometric data and the identity data to be verified, where the similar features represent common point descriptions between the biometric data and identity information corresponding to the identity data to be verified;
a feature conversion module 230, configured to convert the similar features into behavior features, where the behavior features include a plurality of identity information;
a behavior state determining module 240, configured to determine, according to the behavior state identifier of the identity information in the behavior feature, behavior state data corresponding to the identity data to be verified within a preset time period from the biometric data.
Referring to fig. 3, a hardware block diagram of the server 110 is provided.
Fig. 3 is a block diagram illustrating a server 110 according to an embodiment of the present invention. The server 110 in the embodiment of the present invention may be a server with data storage, transmission, and processing functions, as shown in fig. 3, the server 110 includes: memory 111, processor 112, network module 113, and cloud computing-based user behavior analysis device 200.
The memory 111, the processor 112, and the network module 113 are electrically connected directly or indirectly to enable transmission or interaction of data. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The memory 111 stores therein a cloud computing-based user behavior analysis apparatus 200, the cloud computing-based user behavior analysis apparatus 200 includes at least one software function module that can be stored in the memory 111 in the form of software or firmware (firmware), and the processor 112 executes various functional applications and data processing by running software programs and modules stored in the memory 111, for example, the cloud computing-based user behavior analysis apparatus 200 in the embodiment of the present invention, so as to implement the cloud computing-based user behavior analysis method in the embodiment of the present invention.
The Memory 111 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The memory 111 is used for storing a program, and the processor 112 executes the program after receiving the execution instruction.
The processor 112 may be an integrated circuit chip having data processing capabilities. The Processor 112 may be a general-purpose Processor including a Central Processing Unit (CPU), a Network Processor (NP), and the like. The various methods, steps and logic blocks disclosed in embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The network module 113 is used for establishing communication connection between the server 110 and other communication terminal devices through a network, and implementing transceiving operation of network signals and data. The network signal may include a wireless signal or a wired signal.
It will be appreciated that the configuration shown in fig. 3 is merely illustrative and that server 110 may include more or fewer components than shown in fig. 3 or have a different configuration than shown in fig. 3. The components shown in fig. 3 may be implemented in hardware, software, or a combination thereof.
An embodiment of the present invention also provides a computer-readable storage medium, which includes a computer program. The computer program controls the server 110 on which the readable storage medium is executed to perform the above-mentioned method.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus and method embodiments described above are illustrative only, as the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention or a part thereof, which essentially contributes to the prior art, can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, an electronic device 10, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (5)

1. A user behavior analysis method based on cloud computing is characterized by comprising the following steps:
acquiring biological characteristic data and to-be-verified identity data in an information acquisition end, wherein the biological characteristic data and the to-be-verified identity data are to-be-processed keys corresponding to an authentication interface in the information acquisition end;
acquiring similar characteristics of the biological characteristic data and the identity data to be verified, wherein the similar characteristics represent common point descriptions of identity information corresponding to the biological characteristic data and the identity data to be verified;
picking up behavior characteristics in the similar characteristics, wherein the behavior characteristics comprise a plurality of behavior parameters;
and determining corresponding behavior state data from the biological characteristic data to the identity data to be verified within a preset time period according to the behavior state identification of the behavior parameter in the behavior characteristic.
2. The method according to claim 1, wherein the obtaining similar features of the biometric data and the identity data to be verified comprises: determining a sound characteristic set corresponding to the biological characteristic data and a face characteristic set corresponding to the identity data to be verified; and matching the sound feature set with the face feature set to obtain the similar features, wherein the similar features are collected in a recognition mode of sound wave bands and image identifications, and the sound wave bands and the image identifications comprise recognition parameters corresponding to common point description among the identity information.
3. The method of claim 2, wherein picking behavioral features of the similar features comprises: acquiring the sound wave band corresponding to the similar feature and the identification parameter in the image identification; and converting the identification parameters into behavior state identifications to obtain the behavior characteristics, wherein the behavior characteristics are collected in an identification mode of a behavior state identification matrix.
4. The method according to any one of claims 1 to 3, wherein the determining, according to the behavior state identifier of the identity information in the behavior feature, the behavior state data corresponding to the biometric data to the identity data to be verified within a preset time period includes: determining similar behavior state identification of the identity information from the behavior characteristics; and responding to the condition that the similar behavior state identification is not similar to the behavior state identification, and determining the behavior state data corresponding to the biological characteristic data to the identity data to be verified within a preset time period.
5. An apparatus for analyzing user behavior based on cloud computing, the apparatus comprising:
the data authentication module is used for acquiring biological characteristic data and to-be-verified identity data in the information acquisition end, wherein the biological characteristic data and the to-be-verified identity data are to-be-processed keys corresponding to an authentication interface in the information acquisition end;
the common point confirmation module is used for acquiring similar characteristics of the biological characteristic data and the identity data to be verified, wherein the similar characteristics represent common point description between the biological characteristic data and the identity information corresponding to the identity data to be verified;
the characteristic conversion module is used for converting the similar characteristics into behavior characteristics, and the behavior characteristics comprise a plurality of identity information;
and the behavior state determining module is used for determining corresponding behavior state data from the biological characteristic data to the identity data to be verified within a preset time period according to the behavior state identifier of the identity information in the behavior characteristics.
CN202011327562.9A 2020-11-24 2020-11-24 User behavior analysis method and device based on cloud computing Withdrawn CN113282918A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011327562.9A CN113282918A (en) 2020-11-24 2020-11-24 User behavior analysis method and device based on cloud computing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011327562.9A CN113282918A (en) 2020-11-24 2020-11-24 User behavior analysis method and device based on cloud computing

Publications (1)

Publication Number Publication Date
CN113282918A true CN113282918A (en) 2021-08-20

Family

ID=77275642

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011327562.9A Withdrawn CN113282918A (en) 2020-11-24 2020-11-24 User behavior analysis method and device based on cloud computing

Country Status (1)

Country Link
CN (1) CN113282918A (en)

Similar Documents

Publication Publication Date Title
CN113408828A (en) Production line optimization method and device based on intelligent manufacturing and server
CN111367958A (en) Data analysis method and device, electronic equipment and storage medium
CN112231359A (en) Method and device for detecting working condition of cast iron equipment
CN113282918A (en) User behavior analysis method and device based on cloud computing
CN113536360A (en) Information security processing method and device based on intelligent manufacturing and electronic equipment
CN112256660B (en) Cast iron production safety monitoring method and device and server
CN113568815A (en) Industrial manufacturing equipment fault diagnosis method and device based on big data and electronic equipment
CN113486342A (en) Information security processing method and system based on user behavior analysis
CN109344836B (en) Character recognition method and equipment
CN113282650A (en) Service data processing method and device based on big data
CN113283274A (en) Target object verification method and device based on biological feature recognition
CN112116015A (en) Material classification method and device based on image processing and computer equipment
CN112181033A (en) Adjusting method and device for cast iron environment control equipment
CN113568387A (en) Data processing method and device based on intelligent manufacturing and electronic equipment
CN113159201B (en) Cloud edge-based intelligent fusion information calculation method and device and cloud server
CN113284571A (en) Medical platform management method and device based on big data and cloud computing and server
CN113283956A (en) Online order processing method and device based on artificial intelligence
CN113286148A (en) Video equipment optimization method and device based on big data and Internet of things and server
CN113569427A (en) Method and device for detecting service life of intelligent manufacturing equipment and server
CN113742162A (en) Online office offline detection method and device
CN113902506A (en) User portrait based guest obtaining processing method and device and electronic equipment
CN112116268A (en) Method, device and system for processing construction materials
CN113901148A (en) Data processing method and system based on block chain
CN113903463A (en) Practitioner health data monitoring method and device
CN113904931A (en) Network parameter adjusting method and device based on passenger information processing and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20210820

WW01 Invention patent application withdrawn after publication