CN114840286A - Service processing method based on big data and server - Google Patents

Service processing method based on big data and server Download PDF

Info

Publication number
CN114840286A
CN114840286A CN202210270287.4A CN202210270287A CN114840286A CN 114840286 A CN114840286 A CN 114840286A CN 202210270287 A CN202210270287 A CN 202210270287A CN 114840286 A CN114840286 A CN 114840286A
Authority
CN
China
Prior art keywords
visual
service
interaction
business
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210270287.4A
Other languages
Chinese (zh)
Other versions
CN114840286B (en
Inventor
杨永飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial And Information Technology Beijing Industrial Development Research Institute Co ltd
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202210270287.4A priority Critical patent/CN114840286B/en
Publication of CN114840286A publication Critical patent/CN114840286A/en
Application granted granted Critical
Publication of CN114840286B publication Critical patent/CN114840286B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Biophysics (AREA)
  • Computational Linguistics (AREA)
  • Human Computer Interaction (AREA)
  • Biomedical Technology (AREA)
  • Health & Medical Sciences (AREA)
  • Molecular Biology (AREA)
  • Mathematical Physics (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention relates to a big data-based business processing method and a server, wherein first visual content data is obtained from a first cloud data storage log associated with a visual business server according to a business visual interaction instruction, and the first visual content data is fed back to a target front-end visual interaction device as instruction response data corresponding to the business visual interaction instruction, so that the target front-end visual interaction device performs visual output analysis on the first visual content data; receiving a visual test result sent by the target front-end visual interaction equipment based on the first visual demand image; performing feature recognition on the dynamic feature information through first visual service information corresponding to the first visual demand image to obtain a target visual sample associated with the business visual interaction instruction; and generating a business visualization model for performing visualization conversion with the target front-end visualization interaction equipment according to the target visualization sample.

Description

Service processing method based on big data and server
Technical Field
The embodiment of the invention relates to the technical field of big data digitization, in particular to a business processing method and a server based on big data.
Background
The goal of both visual analysis of data and data mining is to obtain information and knowledge from the data, but by different means. Visual analysis of data is the presentation of data to a user as easily perceived graphical symbols for the user to interactively understand the data. Data mining is to acquire knowledge of data hiding automatically or semi-automatically through a computer and give the acquired knowledge directly to a user. That is, the data visualization may see an interactive interface, better suited to heuristically analyze data.
With the digital transformation of various industries, large data service processing based on a visualization layer receives much attention. Related big data visualization tools include Datawrapper, Tableau Public, Smartbi, Chart. js, and Raw, among others. The big data visualization tools can realize the visual output of business data information, thereby facilitating the understanding of data by users. However, most of the above big data visualization technologies are implemented on a single side, and there are technical problems of poor visualization interaction effect and low security.
Disclosure of Invention
In view of this, embodiments of the present invention provide a service processing method and a service server based on big data.
The embodiment of the invention provides a service processing method based on big data, which is executed by a visual service server in a digital service interaction scene, and comprises the following steps: identifying a visual output label of visual content to be identified of a target business interaction service event based on a business visual interaction instruction sent by target front-end visual interaction equipment; when the visual content to be identified has a visual output label, performing business object verification on a target business interaction service event by combining the visual content to be identified; wherein the target business interaction service event is associated with the visual content to be identified; and when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual conversion strategy between the visual interaction equipment and the target front-end visual interaction equipment and performing visual processing.
The embodiment of the invention also provides a business server, which comprises a processor, a communication bus and a memory; the processor and the memory communicate via the communication bus, and the processor reads the computer program from the memory and runs the computer program to perform the method described above.
The embodiment of the invention also provides a readable storage medium for a computer, wherein the readable storage medium stores a computer program, and the computer program realizes the method when running.
Compared with the prior art, the service processing method and the server based on big data provided by the embodiment of the invention have the following technical effects: visual output label identification, business object verification and instruction signature authentication operation can be carried out during visual processing, on one hand, identity legality of the interactive front-end visual interaction equipment can be ensured through business object verification and instruction signature authentication operation, on the other hand, a visual conversion strategy can be generated by combining the visual output label and visual processing can be carried out, actual visual performance of the front-end visual interaction equipment is considered, phenomena of screen splash, information disorder and the like when the front-end visual interaction equipment outputs a visual result are avoided, visual interaction effect is improved, and visual interaction safety is ensured.
In the description that follows, additional features will be set forth, in part, in the description. These features will be in part apparent to those skilled in the art upon examination of the following and the accompanying drawings, or may be learned by production or use. The features of the present application may be realized and attained by practice or use of various aspects of the methodologies, instrumentalities and combinations particularly pointed out in the detailed examples that follow.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic block diagram of a visualization service server according to an embodiment of the present invention.
Fig. 2 is a flowchart of a service processing method based on big data according to an embodiment of the present invention.
Fig. 3 is a block diagram of a big data based service processing apparatus according to an embodiment of the present invention.
Fig. 4 is an architecture diagram of a big data based business processing system according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The inventor finds that, due to the fact that the visualization performance of the front-end visualization interaction device is not considered in the related online service visualization processing technology, the phenomena of screen splash, information confusion and the like are caused when the front-end visualization interaction device outputs the visualization result. In addition, the related technology does not consider the safety of the business data information in the visualization processing process, which may cause the malicious stealing of the related business data information by the illegal front-end visualization interaction device. In conclusion, the related visualization technology has the problems of poor visualization interaction effect and low security.
The above prior art solutions have shortcomings which are the results of practical and careful study of the inventor, and therefore, the discovery process of the above problems and the solutions proposed by the following embodiments of the present invention to the above problems should be the contribution of the inventor to the present invention in the course of the present invention.
Based on the above research, embodiments of the present invention provide a service processing method and a server based on big data, which can perform visual output tag identification, service object verification, and instruction signature authentication operations during visual processing, on one hand, identity legitimacy of an interacted front-end visual interaction device can be ensured through the service object verification and the instruction signature authentication operations, and on the other hand, a visual conversion policy can be generated and visually processed in combination with a visual output tag, so that actual visual performance of the front-end visual interaction device is considered, phenomena such as screen splash and information confusion occurring when the front-end visual interaction device outputs a visual result are avoided, a visual interaction effect is improved, and safety of visual interaction is ensured.
Fig. 1 shows a block diagram of a visualization service server 10 according to an embodiment of the present invention. The visual service server 10 in the embodiment of the present invention may be a server with data storage, transmission, and processing functions, as shown in fig. 1, the visual service server 10 includes: memory 11, processor 12, communication bus 13 and big data based service processing device 20.
The memory 11, processor 12 and communication bus 13 are electrically connected, directly or indirectly, to enable the transfer or interaction of data. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The memory 11 stores a big data based service processing device 20, the big data based service processing device 20 includes at least one software function module which can be stored in the memory 11 in the form of software or firmware (firmware), and the processor 12 executes various functional applications and data processing by running software programs and modules stored in the memory 11, such as the big data based service processing device 20 in the embodiment of the present invention, so as to implement the big data based service processing method in the embodiment of the present invention.
The Memory 11 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The memory 11 is used for storing a program, and the processor 12 executes the program after receiving an execution instruction.
The processor 12 may be an integrated circuit chip having data processing capabilities. The Processor 12 may be a general-purpose Processor including a Central Processing Unit (CPU), a Network Processor (NP), and the like. The various methods, steps and logic blocks disclosed in embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The communication bus 13 is used for establishing communication connection between the visual service server 10 and other communication terminal devices through a network, and implementing transceiving operation of network signals and data. The network signal may include a wireless signal or a wired signal.
It is to be understood that the configuration shown in fig. 1 is merely illustrative, and the visualization business server 10 may include more or fewer components than shown in fig. 1, or have a different configuration than shown in fig. 1. The components shown in fig. 1 may be implemented in hardware, software, or a combination thereof.
The embodiment of the invention also provides a readable storage medium for a computer, wherein the readable storage medium stores a computer program, and the computer program realizes the method when running.
Fig. 2 shows a flowchart of a big data-based service processing method according to an embodiment of the present invention. The method steps defined by the flow related to the method are applied to the visualization service server 10 and can be implemented by the processor 12, and the method comprises the following steps 110 to 130.
Step 110: and identifying the visual output label of the visual content to be identified of the target business interaction service event based on the business visual interaction instruction sent by the target front-end visual interaction equipment.
It is understood that the front-end visual interaction device includes, but is not limited to, vr (visual reality) device, ar (augmented reality) device, smart electronic device (mobile phone, tablet computer, notebook computer), or a stand-alone interaction device. The front-end visualization interaction device is usually communicated with a visualization service server and other visualization interaction devices, so as to realize visualization interaction of data information.
Generally speaking, Visualization (Visualization) is a theory, method and technology that uses computer graphics and image processing technology to convert data into graphics or images to be displayed on a screen and then perform interactive processing. With the development of digitization, big data and cloud computing, the readability of relevant business information can be improved through visual interaction, and therefore the business processing efficiency is improved. Therefore, in practical applications, the visualization service server usually performs corresponding visualization processing based on the received service visualization interaction instruction.
Generally, the service visualization interaction instruction may be uploaded to the visualization service server by the target front-end visualization interaction device, and is used for requesting the visualization service server to perform related service visualization processing. Accordingly, the target business interaction service event may be a business interaction service event associated with the target front-end visual interaction device presence. For example, the target business interaction service event may be various self-service services (such as self-service ordering and self-service government and enterprise cloud business handling), may also be remote video conference or remote education live broadcast, may also be remote smart medical care, and may also include a service event related to smart city monitoring and having a visual characteristic.
On the basis, the visual content to be recognized of the target business interaction service event can be related content to be visually output, such as text content, image content or voice content. Further, the visual output tag is used for distinguishing visual output indexes (such as device video memory requirements) of the visual content to be recognized, so that subsequent visual processing can be performed in combination with the visual performance of the front-end visual interaction device.
In some possible embodiments, for the "identifying the visual output tag of the visual content to be identified based on the business visual interaction instruction sent by the target front-end visual interaction device" described in step 110, the following may be implemented: acquiring a service visual interaction instruction sent by target front-end visual interaction equipment; the target front-end visual interaction equipment is front-end visual interaction equipment which is associated with target rear-end visual processing equipment in the digital service interaction scene; and acquiring visual contents to be identified associated with a target business interaction service event corresponding to the target back-end visual processing equipment according to the business visual interaction instruction, and identifying a visual output label of the visual contents to be identified.
The visual interactive device at the front end and the visual processing device at the rear end both have visual output functions, and the visual processing device at the rear end belongs to the visual processing device inside the visual business server, and can be generally used for testing and checking visual contents to be output. Therefore, the digital service interaction scene generally comprises a visual service server, a back-end visual processing device and a front-end visual interaction device.
In addition, the target front-end visualization interaction device is associated with the target back-end visualization processing device, and it may be understood that the visualization performance parameters of the target front-end visualization interaction device and the target back-end visualization processing device are the same or similar, such as screen resolution, refresh rate, and the like. In this way, the to-be-identified visual content associated with the target service interaction service event corresponding to the target back-end visual processing device obtained through the service visual interaction instruction can be used as a basis for detecting the visual performance of the target front-end visual interaction device.
It can be understood that, based on step 110, the visual output tag of the visual content to be identified can be identified, so as to implement detection on the visualization performance of the target front-end visual interaction device, and avoid that the visualization performance of the target front-end visual interaction device is too low to normally display the related visual content.
Step 120: and when the visual content to be identified has the visual output label, performing business object verification on the target business interaction service event by combining the visual content to be identified. Wherein the target business interaction service event is associated with the visual content to be identified.
When the visual content to be identified has the visual output tag, the visual content to be identified can be represented to be matched with the visual performance of the front-end visual interaction device, and on the basis, identity verification can be further performed, so that the safety of the visual processed service data information is ensured. For example, the service object check may be performed based on the service object status data, and further may include the following: and when the visual content to be identified has the visual output label, acquiring business object state data associated with the target business interaction service event from the visual content to be identified, and performing business object verification on the target business interaction service event based on the business object state data. For example, the business object status data may be status data of other front-end visual interaction devices associated with the target business interaction service event during visual interaction, including display content data, user feedback data, and the like. By carrying out service object verification, the identity validity of the target front-end visual interaction equipment can be verified, so that the safety of visually processed service data information is ensured.
In some possible embodiments, the visual content to be identified may include business object status data related to the target business interaction service event; the above-mentioned step "when the visual content to be identified has the visual output tag, obtain the business object status data associated with the target business interaction service event from the visual content to be identified, carry on the business object verification to the target business interaction service event based on the business object status data", can be realized through the following steps a-c.
Step a, when the visual content to be identified has a visual output label, extracting the business object state data from the visual content to be identified. It can be understood that the premise of extracting the business object state data is that the visual content to be identified has a visual output tag, that is, the visual content to be identified is adapted to the performance of the target front-end visual interaction device. That is, the visual output tag is judged by the first layer (visual performance adaptation), and subsequent identity verification judgment is performed after the visual output tag is judged by the first layer.
And b, acquiring a target digital service log from a remote visual interaction scene associated with the visual service server, and inquiring a digital service event in the target digital service log. In general, the remote visual interaction scene may be a visual interaction scene in which the front-end visual interaction device is located differently from the visual service server. For example, the location of the front-end visual interaction device is z1, and the location of the visual service server is z2, so that the visual interaction scene corresponding to the front-end visual interaction device and the visual service server can be a remote visual interaction scene. The target digital service log is used for recording interaction records of the visual digital service, and digital service events in the target digital service log can comprise different types of digital service events.
Step c, if the digital business event associated with the business object state data is inquired in the target digital business log, determining the digital business event associated with the business object state data as a first digital business event, determining to complete the business object check of the target business interaction service event, and setting the check result of the business object check as pass check. The digital business event associated with the business object state data can be understood as the mapping relation of the same event type label between the digital business event and the business object state data, so that the business object identity of the target front-end visual interaction device corresponding to the target business interaction service event can be determined to be legal by using a risk conduction thought, and the verification result of the business object verification is judged to be passed.
Step 130: and when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual conversion strategy between the visual interaction equipment and the target front-end visual interaction equipment and performing visual processing.
For example, the instruction signature authentication operation may be used to perform operation verification on the target front-end visual interaction device, so as to further ensure the credibility of the identity verification of the target front-end visual interaction device. Further, the visualization conversion strategy can be used for instructing related graphical processing on the visualization content to be recognized to output the visualization content to the target front-end visualization interaction device, so that the target front-end visualization interaction device can perform complete and accurate visualization display.
In some possible embodiments, for the step described in step 130, when the verification result of the business object verification is verification pass and the instruction signature authentication operation associated with the business visualization interaction instruction is completed, generating and visualizing a visualization conversion policy with the target front-end visualization interaction device may include the following: and when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visualization interaction instruction is completed, generating a visualization conversion strategy between the visualization conversion strategy and the target front-end visualization interaction equipment, and feeding back a service visualization output result associated with the service object state data to the target front-end visualization interaction equipment according to a service visualization model corresponding to the visualization conversion strategy. Generally, operation verification can be achieved by performing key authentication on an associated instruction signature of a business visualization interaction instruction.
In some other examples, on the basis of the above steps 110 to 130, the method may further include the following steps 141 to 144.
Step 141, acquiring first visual content data from a first cloud data storage log associated with the visual business server according to a business visual interaction instruction, and feeding back the first visual content data as instruction response data corresponding to the business visual interaction instruction to a target front-end visual interaction device, so that the target front-end visual interaction device performs visual output analysis on the first visual content data; the first visual content data has a first visual need representation associated with the visual business server.
For example, the first cloud data storage log may be a database deployed in the cloud, such as a MySQL database or Hive database. The first visual content data can be data for performing visual display test on the target front-end visual interaction device, and the first visual content data has a first visual requirement portrait associated with the visual business server, so that the visual conversion requirement of the visual business server and the visual display requirement of the target front-end visual interaction device can be balanced.
Step 142, receiving a visualization test result sent by the target front-end visualization interaction device based on the first visualization demand image; the visual test result comprises dynamic characteristic information obtained after business visual processing is carried out on the target visual sample by utilizing the first visual demand portrait.
For example, the dynamic feature information may be feature information having dynamic graphical transformation, and the expression manner of the dynamic feature information may be a feature vector or a feature map.
And 143, performing feature recognition on the dynamic feature information through first visualization service information corresponding to the first visualization demand image to obtain a target visualization sample associated with the business visualization interaction instruction.
For example, the first visualization service information may correspond to a visualization server side, the manner of performing feature recognition on the dynamic feature information through the first visualization service information corresponding to the first visualization requirement image may be implemented based on a machine learning model trained in advance, and a target visualization sample associated with the business visualization interaction instruction may be used to establish a business visualization model.
And 144, generating a business visualization model for performing visualization conversion with the target front-end visualization interaction device according to the target visualization sample. Generally, the business visualization model can be a Convolutional Neural Network (CNN) model or a Generative Adaptive Network (GAN).
By such design, the training of the business visualization model can be realized based on the steps 141 to 144, so that the subsequent visualization processing is served, and the visualization interaction efficiency is improved.
For some possible embodiments, the business visualization interaction instruction is configured to instruct the visualization business server to send a visualization content acquisition instruction for acquiring second visualization content data to the target front-end visualization interaction device. Based on this, the "obtaining, according to the service visualization interaction instruction, the to-be-identified visualization content associated with the target service interaction service event corresponding to the target backend visualization processing device, and identifying the visualization output tag of the to-be-identified visualization content" described in the above steps may include the following contents: receiving second visual content data of a target business interaction service event corresponding to the target back-end visual processing equipment, which is fed back by the target front-end visual interaction equipment based on the visual content acquisition instruction; determining visual content to be identified associated with the target business interaction service event according to the second visual content data, and acquiring multidimensional visual feature content for identifying the visual content to be identified from a visual content list of the first cloud data storage log; the multi-dimensional visualization feature content is determined by a visualization content output platform associated with the visualization business server; and identifying the visual output label of the visual content to be identified according to the multi-dimensional visual feature content.
For example, the visual content inventory is used to include visual characteristic content of different dimensions. Such as the visual characteristic content 1 based on the characteristic dimension of the display effect, the visual characteristic content 2 based on the richness dimension of the display content, or the visual characteristic content 3 based on the form dimension. The visual content output platform associated with the visual service server can be generally understood as a service platform with unidirectional output, that is, a platform without service interaction. It can be understood that by implementing the above contents, different dimensions of the visual feature contents can be considered as much as possible, so that the visual output label of the visual content to be identified is accurately and reliably identified according to the multidimensional visual feature contents, and the adaptability of the visual performance of the visual content to be identified and the target front-end visual interaction device is ensured.
In some examples, the to-be-identified visualized content includes a visualized content category and a visualized content priority corresponding to the second visualized content data, and based on this, the step of "identifying the visualized output tag of the to-be-identified visualized content according to the multidimensional visualization feature content" may further include: acquiring a visual content output record associated with the multi-dimensional visual feature content; and if the visual content output record contains second visual content data associated with the visual content category and the visual content priority, and the visual conversion label of the second visual content data is matched with the visual requirement corresponding to the second visual content data, determining that the visual content to be identified has a visual output label.
For the visualized content output record, the visualized content output record can record the visualized content according to a forward order or a reverse order, and the visualized content category and the visualized content priority corresponding to the second visualized content data are respectively used for distinguishing the second visualized content data and judging the importance of the second visualized content data. Therefore, the second visual content data can be positioned by judging whether the second visual content data associated with the visual content category and the visual content priority is contained in the visual content output record, and on the basis, if the visual conversion label of the second visual content data is matched with the visual requirement corresponding to the second visual content data, the visual output label of the visual content to be identified can be identified from the target front-end visual interaction device layer and the server layer, so that the credibility of the identification result of the visual output label is ensured.
In an actual implementation process, the business object state data may include a visual requirement representation of business object information used for representing the target business interaction service event, and on this basis, the above steps "generating a visual conversion policy between the business object state data and the target front-end visual interaction device when a verification result of the business object verification is that the verification passes and an instruction signature authentication operation associated with the business visual interaction instruction is completed, and feeding back a business visual output result associated with the business object state data to the target front-end visual interaction device according to a business visual model corresponding to the visual conversion policy" may include the following steps 131 and 134.
Step 131, when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual conversion strategy between the visual interaction device and the target front-end visual interaction device, and acquiring a digital service event matching instruction sent by the target front-end visual interaction device based on a service visual model corresponding to the visual conversion strategy. For example, the digitized traffic event matching instructions are used to screen the digitized traffic events.
Step 132, determining the digitized business event which is not related to the business object status data and is in the target digitized business log except the first digitized business event as a second digitized business event based on the digitized business event matching instruction. For example, by differentiating digitized traffic events, subsequent targeted analysis can be facilitated.
Step 133, screening the second digital service event in the target digital service log, determining the first digital service event in the screened target digital service log as a related digital service event related to the target service interaction service event, and retrieving the target event content matched with the visual demand representation in the related digital service event. For example, by determining the associated digital business event, the integrity of the target event content can be ensured as much as possible while the visual popularity of the target event content is ensured.
And step 134, performing service visualization processing on the retrieved target event content by using the service visualization model, taking the target event content after the service visualization processing as a service visualization output result, and feeding the service visualization output result back to the target front-end visualization interaction device. For example, the target event content may be input into a business visualization model, and the target event content after business visualization processing may be used as a business visualization output result.
In practical implementation, the target event content may include data1, data2, data3 and data4, and the target event content after the business visualization processing may be data1 (bar chart), data2 (line chart), data3 (video) and data4 (flash), so that it is ensured that the business visualization output result matches the visualization performance of the target front-end visualization interaction device as much as possible. And furthermore, the target front-end visual interaction device is ensured to display the data1 in a bar chart mode, the data2 in a line chart mode, the data3 in a video mode and the data4 in a flash mode, so that the data1, the data2, the data3 and the data4 are prevented from generating deviation in visual output.
In some possible embodiments, the digitized business event matching instruction may include a first event optimization indication, where the first event optimization indication is a global event optimization indication in the event feature information of the remote digitized business event stored in the second cloud data storage log of the target front-end visual interaction device, and accordingly, the method may further include the following: counting event characteristic information of all digital service events in the target digital service log from the remote visual interaction scene based on the digital service event matching instruction, and acquiring a second event optimization instruction from the event characteristic information of all digital service events; wherein the second event optimization indication is a global event optimization indication in the target digital service log; determining event characteristic information of a digital service event to be matched for performing digital service event matching between the target front-end visual interaction device and the visual service server based on the optimization indication comparison result between the second event optimization indication and the first event optimization indication; and determining the service visual output result according to the event characteristic information of the digital service event to be matched, and feeding back the service visual output result to the target front-end visual interaction equipment.
For example, the event characteristic information may be used to describe a digital service event, for example, the event characteristic information of the digital service event 1 may be [ t1, t2, t3, t4, t5, t6,.. ti ], where i is a positive integer. Further, ti may be understood as a feature segment in the event feature information, and obtaining a second event optimization indication from the event feature information of all the digitized service events may be implemented based on attribute contents of different feature segments, and since the second event optimization indication is a global event optimization indication in the target digitized service log, the second event optimization indication may be determined based on an attribute content having a highest content correlation among the attribute contents of different feature segments, and thus, by comparing the second event optimization indication with the first event optimization indication, a service event having an optimization requirement may be calibrated, so as to accurately determine event feature information of a digitized service event to be matched for performing digitized service event matching between the target front-end visualized interaction device and the visualized service server, and then accurately determining the service visual output result through the event characteristic information of the digital service event to be matched so that the target front-end visual interaction equipment can completely and correctly output the service visual output result.
On the basis of the above content, if the verification result of the service object verification is that the verification fails, the method may further include the following content: and generating a visual abnormal prompt corresponding to the business visual interactive instruction, and feeding back the visual abnormal prompt to the target front-end visual interactive equipment so that the target front-end visual interactive equipment can carry out visual demand adjustment based on the visual abnormal prompt. For example, the visualization exception prompt may be "failed authentication" or "visualization permission mismatch", and based on this, the visualization requirement adjustment of the target front-end visualization interaction device may be an adjustment of visualization invocation on some data information, such as a previous intention to implement visualization of data d1, d2, and d3, which is now adjusted to implement visualization of only data d1, so as to avoid a visualization exception condition such as "visualization permission mismatch".
Based on the same or similar inventive concept, please refer to fig. 3 in combination, there is provided a big data based service processing apparatus 20, which includes: the identification module 21 is configured to identify a visual output tag of visual content to be identified of a target business interaction service event based on a business visual interaction instruction sent by a target front-end visual interaction device; the verification module 22 is configured to perform service object verification on a target service interaction service event in combination with the visual content to be identified when the visual content to be identified has a visual output tag; wherein the target business interaction service event is associated with the visual content to be identified; and the visualization module 23 is configured to generate a visualization conversion policy with the target front-end visualization interaction device and perform visualization processing when a verification result of the business object verification is that the verification is passed and the instruction signature authentication operation associated with the business visualization interaction instruction is completed. For further description of the functional modules, reference may be made to the description of the method shown in fig. 2, which is not described herein again.
Based on the same or similar inventive concept, please refer to fig. 4 in combination, a business processing system based on big data is provided, which includes a visual business server 10 and a front-end visual interaction device 30 that communicate with each other, the visual business server 10 can identify a visual output tag of visual content to be identified of a target business interaction service event based on a business visual interaction instruction sent by the target front-end visual interaction device; when the visual content to be identified has a visual output label, performing business object verification on a target business interaction service event by combining the visual content to be identified; wherein the target business interaction service event is associated with the visual content to be identified; and when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual conversion strategy between the visual interaction equipment and the target front-end visual interaction equipment and performing visual processing. For further description of the above system embodiment, reference may be made to the description of the method shown in fig. 2, which is not repeated herein.
On the basis of the above contents, after the service visualization output result associated with the service object state data is fed back to the target front-end visualization interaction device, the content related to service vulnerability detection may also be included. For example, in some alternative embodiments, the method may include the following:
identifying a visual output label of visual content to be identified of a target business interaction service event based on a business visual interaction instruction sent by target front-end visual interaction equipment;
when the visual content to be identified has a visual output label, performing business object verification on a target business interaction service event by combining the visual content to be identified; wherein the target business interaction service event is associated with the visual content to be identified;
when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual conversion strategy between the visual interaction equipment and the target front-end visual interaction equipment and performing visual processing to obtain a visual processing result;
when the target front-end visual interaction equipment performs service interaction based on the visual processing result, determining digital interaction service items corresponding to interaction operation tag information in the digital service interaction data based on the received digital service interaction data uploaded by each target front-end visual interaction equipment, and acquiring multiple groups of digital service interaction data of the digital interaction service items recorded by each target front-end visual interaction equipment in a preset vulnerability detection period;
and determining the service vulnerability classification characteristics of at least one service vulnerability category item of the digital interactive service item according to the information generation time period and the information generation mode in the multiple groups of digital service interactive data of the digital interactive service item, and determining the service vulnerability detection result of the digital interactive service item.
In the above embodiment, regarding "based on a service visualization interaction instruction sent by a target front-end visualization interaction device, a visualization output tag of to-be-identified visualization content of a target service interaction service event is identified; when the visual content to be identified has a visual output label, performing business object verification on a target business interaction service event by combining the visual content to be identified; wherein the target business interaction service event is associated with the visual content to be identified; when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual conversion policy between the visual interaction device and the target front-end visual interaction device and performing visual processing, so as to obtain a visual processing result.
In the above embodiment, "based on the received digitized service interaction data uploaded by each target front-end visual interaction device, the digitized interaction service items corresponding to the interaction operation tag information in the digitized service interaction data are determined, and a plurality of sets of digitized service interaction data of the digitized interaction service items recorded by each target front-end visual interaction device in a preset vulnerability detection period are obtained; the following may be referred to in the following embodiments, which determine the service vulnerability classification characteristic of at least one service vulnerability category item of the digital interactive service item according to the information generation period and the information generation manner in the multiple sets of digital service interactive data of the digital interactive service item, and determine the service vulnerability detection result of the digital interactive service item.
Step 210, determining a digitized interactive service item corresponding to interactive operation tag information in the digitized service interactive data based on the received digitized service interactive data uploaded by each target front-end visual interactive device, and acquiring multiple groups of digitized service interactive data of the digitized interactive service item recorded by each target front-end visual interactive device within a preset vulnerability detection period;
in this embodiment, the method may be applied to a visual business server communicatively connected to a plurality of target front-end visual interaction devices, where the visual business server can provide different digital business services for the target front-end visual interaction devices, and the digital business services may relate to many service fields in daily production life, such as a digital shopping service, a digital cloud office service, a digital cloud education service, a digital cloud game service, a digital government and enterprise service, a digital internet of things service, a digital platform operation and maintenance service, and the like, which is not limited herein.
Generally speaking, the visual service server may be a visual service server or a visual service server cluster, the digital service interaction device may be an intelligent electronic device with a service interaction function (such as a visual interaction function), such as a mobile phone, a tablet computer, a notebook computer, and the like, without limitation, on this basis, the digital service interaction data may be service interaction data generated during communication between target front-end visual interaction devices or during communication between the target front-end visual interaction devices and the visual service server, and the digital service interaction data has bidirectionality and can reflect detailed interaction conditions of both service interaction parties.
Further, the interactive operation label information is used for distinguishing different interactive operations. For example, in the digital shopping service, the interactive operation tag information "a 1" may represent a placing operation, the interactive operation tag information "a 2" may represent a returning operation, and the interactive operation tag information "a 3" may represent a complaint operation. In the digital government and enterprise service, the interactive operation label information 'b 1' can represent a query operation, the interactive operation label information 'b 2' can represent an upload operation, and the interactive operation label information 'b 3' can represent a download operation. In the operation and maintenance service of the digital platform, the interactive operation tag information 'c 1' can represent software testing operation, the interactive operation tag information 'c 2' can represent script repairing operation, and the interactive operation tag information 'c 3' can represent online operation of a product.
It can be understood that different interactive operation tag information may correspond to different interactive operation and digital interactive service items, and therefore, the corresponding digital interactive service items can be accurately positioned through the interactive operation tag information in the digital service interactive data, so that classification processing of vulnerability detection is realized, integrity of vulnerability detection is ensured, and missing detection and false detection are avoided.
In an actual implementation process, the preset vulnerability detection time period may be determined according to vulnerability events recorded by the visual service server, for example, in a past period of time, if the vulnerability events recorded by the visual service server are x1 pieces, the preset vulnerability detection time period may be T1, and if the vulnerability events recorded by the visual service server are x2 pieces, the preset vulnerability detection time period may be T2. By means of the design, the integrity of the digital service interaction data can be ensured based on the visual interactive equipment side of each target front end by acquiring the multiple groups of digital service interaction data of the digital interaction service items recorded by the visual interactive equipment of each target front end in the preset vulnerability detection period.
It can be understood that the digital service interaction data acquired by the visual service server is divided into two types, the first type of data is uploaded by each target front-end visual interaction device, the second type of data is corresponding to the digital service interaction recorded by each target front-end visual interaction device within the preset vulnerability detection period, in a colloquial way, the visual service server can determine the corresponding digital service interaction item m1 according to the uploaded digital service interaction data inter-data1, and determine the corresponding digital service interaction item m1 to acquire a plurality of sets of digital service interaction data inter-data12 of the digital service interaction item m1 recorded by each target front-end visual interaction device within the preset vulnerability detection period based on the digital service interaction data inter-data1, in this embodiment, the digital service interaction data inter-data1 and the plurality of sets of digital service interaction data inter-data12 may or may not overlap, the analysis can be specifically performed based on actual conditions, and is not limited herein.
Based on the above contents, in some possible embodiments, in order to completely obtain multiple sets of digitized service interaction data of a digitized interaction service item so as to implement subsequent service vulnerability detection, the above steps "based on the received digitized service interaction data uploaded by each target front-end visual interaction device, determine the digitized interaction service item corresponding to the interaction operation tag information in the digitized service interaction data, and obtain multiple sets of digitized service interaction data of the digitized interaction service item recorded by each target front-end visual interaction device within a preset vulnerability detection period," may include the following contents: receiving digital service interaction data uploaded by each target front-end visual interaction device, wherein the digital service interaction data comprise interaction operation label information of digital interaction service items and information generation time intervals and information generation modes of the interaction operation label information; and aiming at each group of received digital service interaction data, determining corresponding digital interaction service items according to interaction operation tag information in the digital service interaction data, and acquiring a plurality of groups of digital service interaction data of the digital interaction service items recorded by each target front-end visual interaction device in a preset vulnerability detection period.
For example, the information generation period of the interactive operation tag information may be used to characterize when the interactive operation tag information is generated, and the information generation manner of the interactive operation tag information may be used to distinguish the generation manner of the interactive operation tag information, such as whether the interactive operation tag information is generated in real time or in a delayed manner, and whether the interactive operation tag information is generated in a service interaction process or a non-service interaction process, which is not limited herein.
On the basis of the above contents, the digital interactive service items of each group of digital interactive service data can be positioned, and then a plurality of groups of digital interactive service data of the digital interactive service items recorded by each target front-end visual interactive device in the preset vulnerability detection period are obtained, so that a plurality of groups of digital interactive service data of different digital interactive service items recorded by each target front-end visual interactive device in the preset vulnerability detection period can be completely obtained.
For example, for the digital service interaction data inter-data1, the corresponding digital service interaction item may be a digital service interaction item m1, and further, the multiple sets of digital service interaction data of the digital service interaction item m1 recorded by each target front-end visual interaction device in a preset vulnerability detection period may be data 12. For another example, for the digitized service interaction data inter-data2, the corresponding digitized service interaction item may be a digitized service interaction item m2, and further, the multiple sets of digitized service interaction data of the digitized service interaction item m2, which are recorded by each target front-end visual interaction device within the preset vulnerability detection time period, may be data 22. For another example, for the digitized service interaction data inter-data3, the corresponding digitized service interaction item may be a digitized service interaction item m3, and further, the multiple sets of digitized service interaction data of the digitized service interaction item m3, which are recorded by each target front-end visual interaction device within the preset vulnerability detection time period, may be data 32.
By the design, the corresponding digital interactive service items can be determined based on different digital service interactive data, and the complete multiple groups of digital service interactive data of the digital interactive service items can be further obtained, so that subsequent multi-type service vulnerability analysis and detection can be conveniently carried out, and missing detection and false detection are avoided.
Step 220, determining the service vulnerability classification characteristics of at least one service vulnerability category item of the digital interactive service item according to the information generation time period and the information generation mode in the multiple groups of digital service interactive data of the digital interactive service item, and determining the service vulnerability detection result of the digital interactive service item.
In an actual implementation process, each set of digital service interaction data in the multiple sets of digital service interaction data of the digital interaction service event also includes interaction operation tag information of the corresponding digital interaction service event and an information generation period and an information generation mode of the interaction operation tag information.
For example, the service vulnerability category item may include a variety of items, such as a multi-terminal interaction scenario category item, an associated service category item, an operation behavior category item, and a network delay category item, which are not limited herein. The service vulnerability classification characteristics can be used for describing service vulnerability conditions of different service vulnerability category items, so that a service vulnerability detection result of digital interactive service items can be conveniently carried out subsequently. In the subsequent implementation process, service vulnerability detection can be respectively carried out based on the multi-terminal interaction scene category project, the associated service category project, the operation behavior category project and the network delay category project, so that corresponding service vulnerability detection results are obtained. By the design, the service vulnerability classification characteristics of different service vulnerability category projects of the digital interactive service items can be analyzed, so that the integrity of the service vulnerability detection result of the digital interactive service items is ensured, and the subsequent digital service interaction abnormity caused by the missed detection and the false detection of individual service vulnerabilities is avoided.
On the basis of the above contents, the step "determining the service vulnerability classification characteristic of at least one service vulnerability category item of the digital interaction service transaction according to the information generation period and the information generation mode in the multiple sets of digital service interaction data of the digital interaction service transaction, and determining the service vulnerability detection result of the digital interaction service transaction" may include the following contents: determining a service interaction error reporting log of the digital interaction service item under a preset service vulnerability operation environment according to an information generation time period and an information generation mode in the multiple groups of digital service interaction data of the digital interaction service item, and determining a service vulnerability classification characteristic of at least one service vulnerability category item of the digital interaction service item according to the service interaction error reporting log; and determining a service vulnerability detection result of the digital interactive service item according to the service vulnerability classification characteristic of the at least one service vulnerability category item.
For example, the service vulnerability operating environment may be understood as a digital service interaction scenario in which a service vulnerability is likely to occur, and the service vulnerability operating environment may be different for different service fields. Further, the business interaction error reporting log may be used to record error reporting events related to business service vulnerabilities, for example, in the digital shopping service, the business interaction error reporting log may record "order lost error reporting event", "repeated payment error reporting event", and the like, which is not limited herein. It can be understood that the service vulnerability classification characteristics of at least one service vulnerability category item of the digital interactive service item can be completely determined through the service interaction error report log, and then the service vulnerability detection result of the digital interactive service item is completely determined through the service vulnerability classification characteristics.
In some possible embodiments, the preset service vulnerability operating environment may include a preset multi-terminal interaction scenario, and the at least one service vulnerability category item includes a multi-terminal interaction scenario category item, based on which the steps of "determining a service interaction error report log of the digital interaction service item in the preset service vulnerability operating environment according to an information generation time period and an information generation manner in the multiple sets of digital service interaction data of the digital interaction service item, determining a service vulnerability classification characteristic of the at least one service vulnerability category item of the digital interaction service item according to the service interaction error report log" may include the following contents: the multiple groups of digital service interaction data of the digital interaction service items are sorted according to the information generation time interval; determining a comparison result of information generation time periods of every two groups of adjacent digital service interaction data, and if the comparison result of the information generation time periods reaches a first set time length, judging whether a service vulnerability operating environment of first digital service interaction data in the two groups of adjacent digital service interaction data, of which the information generation time periods are prior, is the preset multi-terminal interaction scene; and if so, determining service vulnerability classification characteristics corresponding to the multi-terminal interaction scene category items of the digital interaction service items based on the preset multi-terminal interaction scene.
For example, the multiple sets of digitized service interaction data of the digitized service interaction may be sorted in a forward or reverse order of the information generation period, such as the digitized service interaction data of the digitized service interaction m1 being digitized service interaction data inter-data12a, digitized service interaction data inter-data12b, digitized service interaction data inter-data12c, digitized service interaction data inter-data12d, and digitized service interaction data inter-data12 e.
For example, after the digitized service interaction data of the digitized interaction service transaction m1 is sorted into the digitized service interaction data inter-data12a, the digitized service interaction data inter-data12b, the digitized service interaction data inter-data12c, the digitized service interaction data inter-data12d, and the digitized service interaction data inter-data12e according to the positive sequence of the information generation time interval, the obtained data sequence may be: digitized service interaction data inter-data12 c-digitized service interaction data inter-data12 a-digitized service interaction data inter-data12 e-digitized service interaction data inter-data12 d-digitized service interaction data inter-data12 b.
For another example, after the digitized service interaction data of the digitized interaction service transaction m1 is sorted into the digitized service interaction data inter-data12a, the digitized service interaction data inter-data12b, the digitized service interaction data inter-data12c, the digitized service interaction data inter-data12d, and the digitized service interaction data inter-data12e according to the reverse order of the information generation time period, the obtained data sequence may be: digitized service interaction data inter-data12 b-digitized service interaction data inter-data12 d-digitized service interaction data inter-data12 e-digitized service interaction data inter-data12 a-digitized service interaction data inter-data12 c.
Further, every two adjacent groups of the digitized service interaction data can be digitized service interaction data inter-data12b and digitized service interaction data inter-data12d, digitized service interaction data inter-data12d and digitized service interaction data inter-data12e, digitized service interaction data inter-data12e and digitized service interaction data inter-data12a, digitized service interaction data inter-data12a and digitized service interaction data inter-data12 c. On the basis of the above, the comparison result of the information generation periods of every two adjacent sets of the digitized service interaction data may be a period difference, and may be generally determined by the intermediate event point of the information generation period.
On the premise that the comparison result of the information generation time interval reaches a first set time interval, the information generation continuity of every two groups of adjacent digital service interaction data can be represented to be affected, and under the condition, whether the service vulnerability running environment of the first digital service interaction data in the information generation time interval in the two groups of adjacent digital service interaction data is the preset multi-terminal interaction scene or not can be judged. If the service vulnerability operating environment of the first digital service interaction data in the information generation time period of the two sets of adjacent digital service interaction data is the preset multi-terminal interaction scene, the service vulnerability classification characteristics corresponding to the multi-terminal interaction scene category items of the digital interaction service items can be determined based on the preset multi-terminal interaction scene and the service interaction error reporting log of the digital interaction service items under the preset service vulnerability operating environment (multi-terminal interaction scene). Therefore, the method and the device can realize the targeted analysis of different service vulnerability operating environments, so that the service vulnerability classification characteristics corresponding to the multi-end interaction scene category items of the digital interaction service items can be accurately extracted.
In some other embodiments, the step of determining a service interaction error report log of the digital interactive service item under a preset service vulnerability operating environment according to an information generation time period and an information generation mode in the multiple sets of digital service interaction data of the digital interactive service item, and determining the service vulnerability classification characteristic of at least one service vulnerability category item of the digital interactive service item according to the service interaction error report log may further include the following steps: acquiring each group of digital service interaction data recorded by each target front-end visual interaction device in the preset vulnerability detection time period, and determining associated digital service interaction content corresponding to a service interaction event record and a service interaction event record of the digital interaction service items according to an information generation time period and an information generation mode in the acquired digital service interaction data; if the correlated digital service interactive content carries bug repair information, determining a first service bug classification characteristic of a correlated service category item of the digital interactive service item according to the bug repair information; judging whether the service vulnerability operating environment of the digital service interaction data is the preset multi-terminal interaction scene or not aiming at each group of digital service interaction data of the associated digital service interaction content, if so, determining a second service vulnerability classification characteristic of the associated service category item of the associated digital service interaction content according to the preset multi-terminal interaction scene; the feature content of the service vulnerability classification feature of the associated service category project is one of the first service vulnerability classification feature, the second service vulnerability classification feature and a feature fusion result of the first service vulnerability classification feature and the second service vulnerability classification feature.
For example, the service interaction event record may be used to record and store different service interaction events, the associated digital service interaction content includes a previous service interaction event corresponding to the digital interaction service event or a service interaction content of a service interaction event having an interaction object transfer relationship, and the associated digital service interaction content may be a visual content, such as a text, an image, and the like, which is not limited herein. Further, if the correlated digital service interaction content carries bug repair information, it indicates that a service bug exists before a service corresponding to the correlated digital service interaction content, in this case, a first service bug classification feature of a correlated service category item of the digital interaction service item may be determined according to the bug repair information, where the correlated service category item corresponds to the correlated digital service interaction content.
Furthermore, for each set of digital service interaction data of the associated digital service interaction content, by judging whether the service vulnerability operating environment of the digital service interaction data is the preset multi-terminal interaction scene or not, the service vulnerability operating environment can be positioned, so that when the service vulnerability operating environment of the digital service interaction data is judged to be the preset multi-terminal interaction scene, the second service vulnerability classification characteristic of the associated service category item of the associated digital service interaction content is determined according to the preset multi-terminal interaction scene. The feature content of the service vulnerability classification feature of the associated service category project is one of the first service vulnerability classification feature, the second service vulnerability classification feature and the feature fusion result of the first service vulnerability classification feature and the second service vulnerability classification feature, so that the global integrity and the scene adaptability of the service vulnerability classification feature can be ensured.
In some other embodiments, the at least one service vulnerability category item further includes an operation behavior category item, based on which the following service vulnerability classification characteristics may relate to characteristic information related to an operation behavior, for example, the steps of "determining a service interaction error report log of the digital interaction service item under a preset service vulnerability operating environment according to an information generation time period and an information generation manner in the multiple sets of digital service interaction data of the digital interaction service item, determining a service vulnerability classification characteristic of at least one service vulnerability category item of the digital interaction service item according to the service interaction error report log" may include the following contents: arranging the digital service interaction data of the associated digital service interaction content according to the information generation time interval; for each two groups of adjacent digital service interaction data of the digital interaction service items in the preset vulnerability detection time period, if the information generation mode in the first digital service interaction data in the information generation time period is the preset multi-terminal interaction scene, determining the operation behavior of the digital interaction service items based on the information generation mode in the second digital service interaction data in the information generation time period; for every two groups of adjacent digital service interaction data of the associated digital service interaction content in the preset vulnerability detection period, if the service vulnerability operating environment in the first digital service interaction data is the preset multi-terminal interaction scene, determining the operation behavior of the associated digital service interaction content based on the information generation mode corresponding to the second digital service interaction data; and if the behavior feature similarity of the operation behavior of the associated digital service interaction content and the operation behavior of the digital interaction service item is within a preset similarity interval, and the comparison result of the information generation time intervals of two groups of second digital service interaction data corresponding to the operation behavior of the associated digital service interaction content and the operation behavior of the digital interaction service item is less than a second set time length, determining the service classification feature corresponding to the operation behavior category item of the digital interaction service item through the operation behavior of the associated digital service interaction content and the operation behavior of the digital interaction service item.
For example, determining the operation behavior of the digital interactive service transaction based on the information generation manner in the second digital business interaction data after the information generation period may be implemented as follows: analyzing the information generation mode in the second digital service interaction data after the information generation time period to obtain operation feedback information corresponding to the information generation mode in the second digital service interaction data after the information generation time period, and determining the operation behavior of the digital interaction service item through the operation feedback information, for example, if the operation feedback information is an image display, the operation behavior may be an image selection behavior.
For example, for every two groups of adjacent digitized service interaction data of the associated digitized service interaction content in the preset vulnerability detection period, one group may be defined as a first digitized service interaction data, and the other group may be defined as a second digitized service interaction data, on this basis, if the service vulnerability operating environment in the first digitized service interaction data is the preset multi-terminal interaction scene, the operating behavior of the associated digitized service interaction content may be determined by an information generation manner corresponding to the second digitized service interaction data, that is, for every two groups of adjacent digitized service interaction data, if the service vulnerability operating environment in one group of digitized service interaction data is the preset multi-terminal interaction scene, the operating behavior of the associated digitized service interaction content may be determined by an information generation manner corresponding to the other group of digitized service interaction data, therefore, the operation behavior of the associated digital service interaction content can be completely and accurately determined according to the time sequence relevance between the adjacent digital service interaction data.
For example, for different operation behaviors, if the behavior feature similarity (for example, cosine similarity of behavior feature vector) of the operation behavior f1 associated with the digital service interaction content and the operation behavior f2 of the digital interaction service transaction is within a preset similarity interval (flexibly adjusted according to actual service conditions), and the comparison result (for example, the time period difference of the information generation time period, specifically, the calculation manner is described in the foregoing description) of the information generation time periods of the two sets of second digital service interaction data corresponding to the operation behavior f1 associated with the digital service interaction content and the operation behavior f2 of the digital interaction service transaction is smaller than a second set time period (set according to actual conditions, which is not limited herein), the operation behavior category of the digital interaction service transaction is determined by the operation behavior f1 associated with the digital service interaction content and the operation behavior f2 of the digital interaction service transaction And (4) service vulnerability classification characteristics corresponding to the projects. Therefore, the behavior feature similarity of different operation behaviors can be analyzed, and the service vulnerability classification features corresponding to the operation behavior category items of the digital interactive service items are determined by combining the comparison result of the information generation time period, so that the comprehensive consideration of the operation behaviors and the time sequence features is realized, and the reliability of the service vulnerability classification features corresponding to the operation behavior category items is ensured.
In some possible embodiments, based on the above, the method may further include: determining the associated operation behaviors of the digital interactive service item and the associated digital service interactive content in a first vulnerability detection time period according to the digital interactive service item and the digital service interactive data of the associated digital service interactive content in the first vulnerability detection time period; and updating the preset multi-terminal interaction scene according to the determined associated operation behavior.
For example, the associated operation behavior may be used to characterize a dynamic service interaction condition of the digital interaction service item and the associated digital service interaction content in the first vulnerability detection period, and the associated operation behavior may include an operation behavior of a service participant corresponding to the digital interaction service item and an interaction behavior corresponding to the associated digital service interaction content, which is not limited herein. Therefore, the multi-terminal interactive scene is updated through the associated operation behaviors, and the timeliness of the multi-terminal interactive scene can be ensured. For example, the scene tag or the scene feature of the multi-terminal interaction scene may be modified and adjusted according to the call path of the behavior function of the associated operation behavior, or the preset multi-terminal interaction scene may be updated in other ways by combining the associated operation behavior, which is not limited herein.
In another embodiment, the at least one service vulnerability category item includes a network latency category item, and the network latency may be understood as a data information transmission latency caused by insufficient communication bandwidth, such as slow page refresh, interaction response latency, and the like, which are not limited herein. Based on this, the above steps "determine a service interaction error reporting log of the digital interactive service item in a preset service vulnerability operating environment according to an information generation time period and an information generation mode in the multiple sets of digital service interaction data of the digital interactive service item, and determine a service vulnerability classification characteristic of at least one service vulnerability category item of the digital interactive service item according to the service interaction error reporting log", may further include the following: determining a service loophole operating environment as a service transmission track of the digital service interaction data of the preset multi-terminal interaction scene from the plurality of groups of digital service interaction data of the digital interaction service items; and determining the service vulnerability classification characteristics corresponding to the network delay category items of the digital interactive service items according to the determined service transmission track.
For example, the service delivery trajectory of the digital service interaction data may be a Knowledge Graph (Knowledge Graph) composed of association conditions between different service events, and an execution logic relationship and a causal relationship between different service events corresponding to the digital service interaction data may be obtained through the service delivery trajectory, so that the service vulnerability classification characteristics corresponding to the network delay category item of the digital interaction service item may be completely determined through the service delivery trajectory. For example, the service vulnerability classification characteristics corresponding to the network delay category item of the digital interactive service item may be determined by the node having the abnormal attribute information in the service delivery trajectory. Generally, the service vulnerability classification characteristics corresponding to the network delay category items may include network parameter characteristics and bandwidth occupation characteristics corresponding to different service interaction events, and may also include other types of characteristics, which are not limited herein.
Based on the above, the preset service vulnerability operating environment may include a preset offline service interaction scenario, and based on this, the method may further include the following two embodiments, which are embodiment 1 and embodiment 2, respectively, where embodiment 1 and embodiment 2 may be alternatively implemented or implemented in parallel according to actual situations.
In embodiment 1, for each digital interactive service item, digital service interaction data of the digital interactive service item recorded by each target front-end visual interactive device in a second vulnerability detection period is acquired, a service interaction error report log of the digital interactive service item in the preset offline service interaction scene is determined according to the acquired digital service interaction data, and a service vulnerability classification feature of a first service state category item of the digital interactive service item is updated according to the service interaction error report log of the digital interactive service item in the preset offline service interaction scene.
In embodiment 1, the second vulnerability detection time period may be adjusted according to an actual situation, for example, the second vulnerability detection time period may be determined according to the received offline service trigger identifier, and on this basis, the service interaction error report log of the digital interaction service item in the preset offline service interaction scenario is determined according to the acquired digital service interaction data, which may be implemented by combining the offline time duration corresponding to the second vulnerability detection time period, and it may be understood that the service interaction error report log in the offline service interaction scenario includes an error report event related to the offline service (offline service). Therefore, the service vulnerability classification characteristic of the first service state category item of the digital interactive service item can be obtained according to the service interaction error report log of the digital interactive service item in the preset offline service interaction scene. In this embodiment, the first service status category item may be understood as a real-time service status category item.
Embodiment 2, for each digital interactive service item, acquiring a service assistant detection record of the digital interactive service item in a third vulnerability detection period, and updating a service vulnerability classification feature of a second service state category item of the digital interactive service item according to the acquired service assistant detection record; the service vulnerability detection result of the digital interactive service item is determined based on the service vulnerability classification characteristics of the at least one service vulnerability category item and the service vulnerability classification characteristics of at least one of the first service state category item and the second service state category item.
In embodiment 2, the third vulnerability detection period may be determined according to an activation period of the service assistant software, and the service assistant detection record is used to record the usage condition of the service assistant software, for example, in the visual interactive service, the service assistant software (remote manual collaboration operation service) may be started to implement a corresponding digital interactive service event. By the design, the service helper detection record of the service helper software can be taken into account, so that the service vulnerability classification characteristics of the second service state category item of the digital interactive service item are updated, and high correlation between the service vulnerability classification characteristics and actual service interaction is ensured.
In some optional embodiments, based on the above, the method may further include: determining the service vulnerability classification characteristics of vulnerability repair category items of the digital interactive service items according to the vulnerability repair information of the digital interactive service items; the service vulnerability detection result of the digital interactive service item is determined based on the service vulnerability classification characteristic of the at least one service vulnerability category item of the digital interactive service item and the service vulnerability classification characteristic of the vulnerability repair category item. By the design, the service vulnerability classification characteristics can be completely and accurately positioned based on the specific vulnerability repair information, so that the accuracy and the reliability of the service vulnerability classification characteristics are ensured.
In some optional embodiments, the service vulnerability detection result of the digital interactive service item is obtained by determining feature content of the obtained service vulnerability classification feature based on the service vulnerability classification feature of each category item of the digital interactive service item, and based on this, the method may further include the following contents: and outputting vulnerability repair prompt information when the content description value of the feature content of the service vulnerability classification feature of the service vulnerability detection result representing the digital interactive service item meets a preset trigger condition, wherein the vulnerability repair prompt information comprises an information generation mode of the latest digital service interactive data of the digital interactive service item.
For example, the feature content of the service vulnerability classification feature may be a feature vector, the content description value may quantitatively express the feature content, the content description value may be any integer between 0 and 10 or 0 and 100, different content description values refer to different feature contents, correspondingly, the preset trigger condition may be a condition for vulnerability repair prompting, for example, if the content description value 8 meets the preset trigger condition (for example, less than 10 and greater than 5), the content description value 8 may represent that a vulnerability repair requirement exists, and at this time, vulnerability repair prompting information may be output. The vulnerability repair prompt information can be output to the target front-end visual interaction device or a third-party operation and maintenance platform, and is not limited herein. Because the vulnerability repair prompt information comprises the information generation mode of the latest digital service interaction data of the digital interaction service items, the latest digital service interaction data can be considered in the subsequent service vulnerability repair, so that the latest digital service interaction data can be rapidly processed after the service vulnerability repair, the interaction efficiency of the digital service is improved, and unnecessary abnormal conditions are avoided as far as possible.
In some optional embodiments, the step of "determining the service vulnerability detection result of the digital interactive service item according to the service vulnerability classification characteristics of the at least one service vulnerability category item" may be implemented by the method described in the following steps (1) to (5).
(1) And acquiring an event category label of each interactive event content block in the interactive service content to be detected corresponding to the digital interactive service item, and classifying the interactive event content blocks according to event categories according to the event category labels. For example, the interactive event content block may be obtained by splitting an event of the interactive service content to be detected, and the event category tag is used to distinguish the interactive event content block.
(2) And obtaining the event category heat distribution and the content validity detection result distribution of the interactive event content block of each event category in the interactive service content to be detected according to the event category label. For example, the event category heat distribution and the content validity detection result distribution may be expressed in the form of a list or a graph, the event category heat distribution is used to record the interaction heat and popularity of different events, and the content validity detection result distribution is used to record the validity of different events. In some specific examples, the step "obtaining, according to the event category tag, event category heat distribution and content validity detection result distribution of the interactivity event content block of each event category in the interactivity service content to be detected" may include the following: obtaining a global relevance description value of the interactive event content block of each event category in the interactive service content to be detected according to the event category label; obtaining an event category heat degree change track of the interactive event content block according to the global relevance description value of the interactive event content block of each event category in the interactive service content to be detected, and taking the event category heat degree change track as the event category heat degree distribution; obtaining the relative word vector distance between each interactive event content block and each preset category label in the interactive service content to be detected according to the event category labels; and obtaining a variation track of the content validity detection result distribution of the interactive event content blocks of each event category in the interactive service content to be detected according to the relative word vector distance, wherein the variation track is used as the content validity detection result distribution. Therefore, the lack of the distribution of the event category heat degree and the distribution of the content validity detection result can be avoided.
Further, the step of obtaining the global relevance description value of the interactive event content block of each event category in the interactive service content to be detected according to the event category tag may include the following steps: obtaining the content block distribution condition of the number of the interactive event content blocks of any event category in the number of all the interactive event content blocks according to the event category labels; according to the event category labels, acquiring the number of interactive service contents to be detected of interactive event content blocks comprising any event category in a pre-stored interactive service content candidate set to be detected; the interactive service content candidate set to be detected comprises at least two interactive service contents to be detected; obtaining a global relevance description value of the interactive event content block of any event category in the interactive service content to be detected according to the distribution condition of the number of the interactive event content blocks of any event category in the content blocks of all the interactive event content blocks, the number of the interactive service content to be detected in the interactive service content candidate set to be detected, and the number of the interactive service content to be detected in the interactive service content candidate set to be detected; and sequentially obtaining the global relevance description value of the interactive event content block of each event category in the interactive service content to be detected. By the design, different global relevance description values can be determined quickly and accurately, and mutual interference among the global relevance description values is avoided.
(3) And obtaining the content correlation coefficient of the interactive service content to be detected and the interactive service content of the preset sample according to the interactive event content block heat distribution and the content validity detection result distribution. For example, the content Correlation Coefficient may be expressed by different types of Correlation coefficients, such as a Pearson Correlation Coefficient (Pearson Correlation Coefficient).
(4) And taking the interactive service content to be detected with the content correlation coefficient larger than the set correlation coefficient as the potential abnormal interactive service content. For example, the set correlation coefficient may be designed according to the actual service condition, which is not described herein.
(5) Determining a content feature map in the potential abnormal interactive service content, and matching the service vulnerability classification features of the at least one service vulnerability category project with the content feature map to obtain a matching result; and determining the service vulnerability detection result of the digital interactive service item according to the matching result. For example, the content feature map may be expressed in a graph Data (graphical Data) form, the service vulnerability classification features of the at least one service vulnerability category item may be matched with the content feature map, the euclidean distance between the service vulnerability classification features of the at least one service vulnerability category item and the content feature map may be calculated, the matching result may include the matching rate between the service vulnerability classification features of the service vulnerability category item and the content feature map, and then the content feature map corresponding to the matching result whose matching rate is within the set interval may be retained, so as to identify the retained content feature map and obtain the service vulnerability detection result of the corresponding digital interaction service item. It can be understood that the service vulnerability detection result may include different types of service vulnerabilities, so that the integrity of service vulnerability detection can be ensured, and the influence of missed detection or false detection on subsequent normal service handling is avoided.
The service vulnerability detection scheme can determine the digital interaction service items corresponding to the interaction operation tag information in the digital service interaction data uploaded by each target front-end visual interaction device, thereby realizing the accurate positioning of the digital interaction service items, further acquiring a plurality of groups of digital service interaction data of the digital interaction service items recorded by each target front-end visual interaction device in the preset vulnerability detection period to complete the collection of the interaction data of the digital interaction service items, completely and comprehensively determining the service vulnerability classification characteristics of at least one service vulnerability classification item of the digital interaction service items based on the information generation period and the information generation mode in the plurality of groups of digital service interaction data of the digital interaction service items, and further ensuring the integrity of the service vulnerability detection results of the digital interaction service items, the method avoids the abnormity of subsequent digital service interaction caused by the missed detection and the false detection of individual service loopholes.
In summary, by implementing the above steps 110 to 130, during visualization processing, visual output tag identification, service object verification, and instruction signature authentication operation can be performed, on one hand, identity validity of the interacted front-end visual interaction device can be ensured through the service object verification and the instruction signature authentication operation, on the other hand, a visual conversion policy can be generated in combination with the visual output tag and visualization processing is performed, so that actual visualization performance of the front-end visual interaction device is considered, phenomena such as screen splash and information confusion occurring when the front-end visual interaction device outputs a visualization result are avoided, a visual interaction effect is improved, and security of visual interaction is ensured.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus and method embodiments described above are illustrative only, as the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention or a part thereof, which essentially contributes to the prior art, can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a visualization service server 10, or a network device, etc.) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A big data based service processing method, wherein the method is performed by a visual service server in a digital service interaction scenario, and the method comprises:
acquiring first visual content data from a first cloud data storage log associated with the visual business server according to a business visual interaction instruction, and feeding the first visual content data back to target front-end visual interaction equipment as instruction response data corresponding to the business visual interaction instruction so as to enable the target front-end visual interaction equipment to perform visual output analysis on the first visual content data; the first visual content data is provided with a first visual demand portrait associated with the visual business server;
receiving a visual test result sent by the target front-end visual interaction device based on the first visual demand image; the visual test result comprises dynamic characteristic information obtained after business visual processing is carried out on a target visual sample by utilizing the first visual demand portrait;
performing feature recognition on the dynamic feature information through first visualization service information corresponding to the first visualization demand image to obtain a target visualization sample associated with the business visualization interaction instruction;
and generating a business visualization model for performing visualization conversion with the target front-end visualization interaction equipment according to the target visualization sample.
2. The method according to claim 1, wherein the business visualization interaction instruction is used to instruct the visualization business server to send a visualization content acquisition instruction for acquiring second visualization content data to the target front-end visualization interaction device; the acquiring visual content to be identified associated with a target business interaction service event corresponding to the target back-end visual processing device according to the business visual interaction instruction, and identifying a visual output tag of the visual content to be identified includes:
receiving second visual content data of a target business interaction service event corresponding to the target back-end visual processing equipment, which is fed back by the target front-end visual interaction equipment based on the visual content acquisition instruction;
determining visual content to be identified associated with the target business interaction service event according to the second visual content data, and acquiring multidimensional visual feature content for identifying the visual content to be identified from a visual content list of the first cloud data storage log; the multi-dimensional visualization feature content is determined by a visualization content output platform associated with the visualization business server;
and identifying the visual output label of the visual content to be identified according to the multi-dimensional visual feature content.
3. The method according to claim 2, wherein the visual content to be identified includes a visual content category and a visual content priority corresponding to the second visual content data; the visual output label for identifying the visual content to be identified according to the multidimensional visual feature content comprises the following steps:
acquiring a visual content output record associated with the multi-dimensional visual feature content;
and if the visual content output record contains second visual content data associated with the visual content category and the visual content priority, and the visual conversion label of the second visual content data is matched with the visual requirement corresponding to the second visual content data, determining that the visual content to be identified has a visual output label.
4. The method of claim 1, further comprising:
identifying a visual output label of visual content to be identified of a target business interaction service event based on a business visual interaction instruction sent by target front-end visual interaction equipment;
when the visual content to be identified has a visual output label, performing business object verification on a target business interaction service event by combining the visual content to be identified; wherein the target business interaction service event is associated with the visual content to be identified;
when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual conversion strategy between the visual interaction equipment and the target front-end visual interaction equipment and performing visual processing;
wherein: the target business interaction service events comprise self-service ordering, self-service government and enterprise cloud business handling, remote video conferences, remote education live broadcasting, remote intelligent medical treatment and service events with visual characteristics monitored in a smart city.
5. The method according to claim 4, wherein the identifying the visual output tag of the visual content to be identified of the target business interaction service event based on the business visual interaction instruction sent by the target front-end visual interaction device comprises:
acquiring a service visual interaction instruction sent by target front-end visual interaction equipment; the target front-end visual interaction equipment is front-end visual interaction equipment which is associated with target rear-end visual processing equipment in the digital service interaction scene;
and acquiring visual contents to be identified associated with a target business interaction service event corresponding to the target back-end visual processing equipment according to the business visual interaction instruction, and identifying a visual output label of the visual contents to be identified.
6. The method according to claim 5, wherein when the visual output tag exists in the visual content to be identified, the business object verification is performed on the target business interaction service event in combination with the visual content to be identified; wherein the target business interaction service event is associated with the visual content to be identified, and comprises:
and when the visual content to be identified has the visual output label, acquiring business object state data associated with the target business interaction service event from the visual content to be identified, and performing business object verification on the target business interaction service event based on the business object state data.
7. The method according to claim 6, wherein when the verification result of the business object verification is that verification is passed and the instruction signature authentication operation associated with the business visual interaction instruction is completed, generating and visually processing a visual conversion policy with the target front-end visual interaction device comprises:
and when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual conversion strategy between the visual interaction device and the target front-end visual interaction device, and feeding back a service visual output result associated with the service object state data to the target front-end visual interaction device according to a service visual model corresponding to the visual conversion strategy.
8. A visual business server comprising a processor, a communication bus, and a memory; the processor and the memory communicate via the communication bus, the processor reading a computer program from the memory and operating to perform the method of any of claims 1-7.
CN202210270287.4A 2021-06-16 2021-06-16 Service processing method and server based on big data Active CN114840286B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210270287.4A CN114840286B (en) 2021-06-16 2021-06-16 Service processing method and server based on big data

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210270287.4A CN114840286B (en) 2021-06-16 2021-06-16 Service processing method and server based on big data
CN202110664415.9A CN113391867B (en) 2021-06-16 2021-06-16 Big data service processing method and service server based on digitization and visualization

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN202110664415.9A Division CN113391867B (en) 2021-06-16 2021-06-16 Big data service processing method and service server based on digitization and visualization

Publications (2)

Publication Number Publication Date
CN114840286A true CN114840286A (en) 2022-08-02
CN114840286B CN114840286B (en) 2023-07-14

Family

ID=77621398

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202110664415.9A Active CN113391867B (en) 2021-06-16 2021-06-16 Big data service processing method and service server based on digitization and visualization
CN202210270287.4A Active CN114840286B (en) 2021-06-16 2021-06-16 Service processing method and server based on big data

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN202110664415.9A Active CN113391867B (en) 2021-06-16 2021-06-16 Big data service processing method and service server based on digitization and visualization

Country Status (1)

Country Link
CN (2) CN113391867B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115203706A (en) * 2021-12-21 2022-10-18 莫晓东 Vulnerability risk analysis method based on digital cloud and server
CN114615342B (en) * 2022-01-29 2023-08-15 江苏方天电力技术有限公司 Service interaction method and device suitable for electricity consumption information acquisition system

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040111627A1 (en) * 2002-12-09 2004-06-10 Evans Glenn F. Methods and systems for maintaining an encrypted video memory subsystem
CN106169143A (en) * 2016-06-29 2016-11-30 北京奇虎科技有限公司 The method for down loading of a kind of data and device
US20170262460A1 (en) * 2016-03-14 2017-09-14 Airmagnet, Inc. System and method to configure distributed measuring devices and treat measurement data
WO2018112799A1 (en) * 2016-12-21 2018-06-28 华为技术有限公司 Visual evoked potential-based identity verification method and device
CN110288001A (en) * 2019-05-28 2019-09-27 西南电子技术研究所(中国电子科技集团公司第十研究所) Target identification method based on the training study of target data feature
CN111565390A (en) * 2020-07-16 2020-08-21 深圳市云盾科技有限公司 Internet of things equipment risk control method and system based on equipment portrait
CN111625922A (en) * 2020-04-15 2020-09-04 中国石油大学(华东) Large-scale oil reservoir injection-production optimization method based on machine learning agent model
CN112131475A (en) * 2020-09-25 2020-12-25 重庆邮电大学 Interpretable and interactive user portrait method and device
CN112162999A (en) * 2020-10-08 2021-01-01 翁海坤 Big data processing method based on interactive cloud computing and artificial intelligence server
CN112163156A (en) * 2020-10-06 2021-01-01 翁海坤 Big data processing method based on artificial intelligence and cloud computing and cloud service center
CN112764620A (en) * 2021-01-25 2021-05-07 北京三快在线科技有限公司 Interactive request processing method and device, electronic equipment and readable storage medium
CN112818023A (en) * 2021-01-26 2021-05-18 龚世燕 Big data analysis method and cloud computing server in associated cloud service scene
CN112820404A (en) * 2021-03-08 2021-05-18 裴炳坤 Information processing method applied to big data intelligent medical treatment and intelligent medical treatment server
CN112948090A (en) * 2021-03-23 2021-06-11 耿赛 Big data analysis and sorting method applied to network service processing and server

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106878043B (en) * 2016-07-05 2020-07-07 阿里巴巴集团控股有限公司 Service processing method and device
CN111405347B (en) * 2020-04-23 2022-04-29 成都极米科技股份有限公司 Picture display method and device, electronic equipment and readable storage medium
CN112256445B (en) * 2020-07-24 2024-06-18 北京沃东天骏信息技术有限公司 Data processing method, device, equipment and storage medium based on application program
CN111858613B (en) * 2020-07-31 2021-09-03 湖北亿咖通科技有限公司 Service data retrieval method
CN112256522A (en) * 2020-09-23 2021-01-22 北京达佳互联信息技术有限公司 Component information acquisition method and device, electronic equipment and storage medium

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040111627A1 (en) * 2002-12-09 2004-06-10 Evans Glenn F. Methods and systems for maintaining an encrypted video memory subsystem
US20170262460A1 (en) * 2016-03-14 2017-09-14 Airmagnet, Inc. System and method to configure distributed measuring devices and treat measurement data
CN106169143A (en) * 2016-06-29 2016-11-30 北京奇虎科技有限公司 The method for down loading of a kind of data and device
WO2018112799A1 (en) * 2016-12-21 2018-06-28 华为技术有限公司 Visual evoked potential-based identity verification method and device
CN110288001A (en) * 2019-05-28 2019-09-27 西南电子技术研究所(中国电子科技集团公司第十研究所) Target identification method based on the training study of target data feature
CN111625922A (en) * 2020-04-15 2020-09-04 中国石油大学(华东) Large-scale oil reservoir injection-production optimization method based on machine learning agent model
CN111565390A (en) * 2020-07-16 2020-08-21 深圳市云盾科技有限公司 Internet of things equipment risk control method and system based on equipment portrait
CN112131475A (en) * 2020-09-25 2020-12-25 重庆邮电大学 Interpretable and interactive user portrait method and device
CN112163156A (en) * 2020-10-06 2021-01-01 翁海坤 Big data processing method based on artificial intelligence and cloud computing and cloud service center
CN112162999A (en) * 2020-10-08 2021-01-01 翁海坤 Big data processing method based on interactive cloud computing and artificial intelligence server
CN112764620A (en) * 2021-01-25 2021-05-07 北京三快在线科技有限公司 Interactive request processing method and device, electronic equipment and readable storage medium
CN112818023A (en) * 2021-01-26 2021-05-18 龚世燕 Big data analysis method and cloud computing server in associated cloud service scene
CN112820404A (en) * 2021-03-08 2021-05-18 裴炳坤 Information processing method applied to big data intelligent medical treatment and intelligent medical treatment server
CN112948090A (en) * 2021-03-23 2021-06-11 耿赛 Big data analysis and sorting method applied to network service processing and server

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
DIETRICH KAMMER ET AL: "VisBIA 2018: workshop on Visual Interfaces for Big Data Environments in Industrial Applications", 《PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON ADVANCED VISUAL INTERFACES》 *
庞文迪等: "市场监管大数据平台架构设计及关键技术探讨", 《信息系统工程》 *
毛华阳: "基于大数据的工业互联网安全初探", 《电信技术》 *

Also Published As

Publication number Publication date
CN114840286B (en) 2023-07-14
CN113391867B (en) 2022-07-01
CN113391867A (en) 2021-09-14

Similar Documents

Publication Publication Date Title
CN110414242B (en) Method, device, equipment and medium for detecting business logic loophole
CN112491611B (en) Fault location system, method, apparatus, electronic device, and computer readable medium
CN111177714B (en) Abnormal behavior detection method and device, computer equipment and storage medium
CN113391867B (en) Big data service processing method and service server based on digitization and visualization
WO2017113677A1 (en) User behavior data processing method and system
KR102399787B1 (en) Recognition of behavioural changes of online services
CN108876213B (en) Block chain-based product management method, device, medium and electronic equipment
CN114840853B (en) Digital business analysis method based on big data and cloud server
CN113051543B (en) Cloud service security verification method and cloud service system in big data environment
CN107784205B (en) User product auditing method, device, server and storage medium
CN109801151B (en) Financial falsification risk monitoring method, device, computer equipment and storage medium
CN110647523B (en) Data quality analysis method and device, storage medium and electronic equipment
CN112115468B (en) Service information detection method based on big data and cloud computing center
CN112162999A (en) Big data processing method based on interactive cloud computing and artificial intelligence server
CN110543506A (en) Data analysis method and device, electronic equipment and storage medium
CN112866261A (en) Flow detection method and storage medium based on cloud computing and user behavior analysis
CN111784462A (en) Transaction processing method, client, processing terminal and system based on block chain
CN115205766A (en) Block chain-based network security abnormal video big data detection method and system
CN114626024A (en) Internet infringement video low-consumption detection method and system based on block chain
CN112231272B (en) Information processing method based on remote online office and computer equipment
CN109478219A (en) For showing the user interface of network analysis
CN103748611B (en) Method for retrieving associated information using image
CN111368128A (en) Target picture identification method and device and computer readable storage medium
CN113037555B (en) Risk event marking method, risk event marking device and electronic equipment
CN115511645A (en) Method, device and equipment for detecting claim settlement picture and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230621

Address after: No. 13, Floor 7, Building 7, Yard 30, Shixing Street, Shijingshan District, Beijing 100043

Applicant after: Industrial and Information Technology (Beijing) Industrial Development Research Institute Co.,Ltd.

Address before: Room 1216, east 12th floor, block B, Haohong Industrial Park, No. 38 Jingjing Road, economic development zone, Kunming, Yunnan 650217

Applicant before: Yang Yongfei

GR01 Patent grant
GR01 Patent grant