CN114840286B - Service processing method and server based on big data - Google Patents

Service processing method and server based on big data Download PDF

Info

Publication number
CN114840286B
CN114840286B CN202210270287.4A CN202210270287A CN114840286B CN 114840286 B CN114840286 B CN 114840286B CN 202210270287 A CN202210270287 A CN 202210270287A CN 114840286 B CN114840286 B CN 114840286B
Authority
CN
China
Prior art keywords
visual
interaction
service
business
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210270287.4A
Other languages
Chinese (zh)
Other versions
CN114840286A (en
Inventor
杨永飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial And Information Technology Beijing Industrial Development Research Institute Co ltd
Original Assignee
Industrial And Information Technology Beijing Industrial Development Research Institute Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial And Information Technology Beijing Industrial Development Research Institute Co ltd filed Critical Industrial And Information Technology Beijing Industrial Development Research Institute Co ltd
Priority to CN202210270287.4A priority Critical patent/CN114840286B/en
Publication of CN114840286A publication Critical patent/CN114840286A/en
Application granted granted Critical
Publication of CN114840286B publication Critical patent/CN114840286B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • G06F18/241Classification techniques relating to the classification model, e.g. parametric or non-parametric approaches
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N3/00Computing arrangements based on biological models
    • G06N3/02Neural networks
    • G06N3/04Architecture, e.g. interconnection topology
    • G06N3/045Combinations of networks

Abstract

The invention relates to a business processing method and a server based on big data, wherein first visual content data is acquired from a first cloud data storage log associated with a visual business server according to business visual interaction instructions, and is fed back to target front-end visual interaction equipment as instruction response data corresponding to the business visual interaction instructions, so that the target front-end visual interaction equipment performs visual output analysis on the first visual content data; receiving a visual test result sent by the target front-end visual interaction device based on the first visual requirement portrait; performing feature recognition on the dynamic feature information through first visual service information corresponding to the first visual requirement image to obtain a target visual sample associated with the business visual interaction instruction; and generating a service visualization model for performing visualization conversion with the target front-end visualization interaction equipment according to the target visualization sample.

Description

Service processing method and server based on big data
Technical Field
The embodiment of the invention relates to the technical field of big data digitization, in particular to a business processing method and a server based on big data.
Background
The goal of both visual analysis of data and data mining is to obtain information and knowledge from the data, but the means are different. Visual analysis of data is the presentation of data to a user for easy perceivable graphical symbols, allowing the user to interactively understand the data. Data mining is the automatic or semi-automatic acquisition of knowledge of data hiding by a computer and the direct presentation of the acquired knowledge to the user. That is, the data visualization may see an interactive interface, which is more suitable for exploratory analysis of data.
With the digitalized transformation of various industries, large data service processing based on a visual level has received much attention. Related big data visualization tools include Datawrapier, tableau Public, smartbi, chart. Js, raw, and the like. These big data visualization tools can realize the visual output of business data information, thereby facilitating the understanding of data by users. However, most of the big data visualization technologies are realized based on a single side, and have the technical problems of poor visual interaction effect and low security.
Disclosure of Invention
In view of the above, the embodiment of the invention provides a business processing method and a business server based on big data.
The embodiment of the invention provides a business processing method based on big data, which is executed by a visual business server in a digital business interaction scene, and comprises the following steps: based on a service visual interaction instruction sent by target front-end visual interaction equipment, identifying a visual output tag of visual contents to be identified of a target service interaction service event; when the visual output label exists in the visual content to be identified, carrying out service object verification on the target service interaction service event by combining the visual content to be identified; wherein the target business interaction service event is associated with the visual content to be identified; and when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual conversion strategy between the service object verification and the target front-end visual interaction equipment and performing visual processing.
The embodiment of the invention also provides a service server, which comprises a processor, a communication bus and a memory; the processor and the memory communicate via the communication bus, and the processor reads the computer program from the memory and runs to perform the method described above.
The embodiment of the invention also provides a readable storage medium for a computer, wherein the readable storage medium stores a computer program, and the computer program realizes the method when running.
Compared with the prior art, the business processing method and the server based on big data provided by the embodiment of the invention have the following technical effects: the method has the advantages that the method can perform visual output tag identification, service object verification and instruction signature authentication operation during visual processing, on one hand, identity legitimacy of the interactive front-end visual interaction equipment can be ensured through the service object verification and the instruction signature authentication operation, on the other hand, a visual conversion strategy can be generated by combining the visual output tag and the visual processing is performed, so that actual visual performance of the front-end visual interaction equipment is considered, phenomena of screen display, information disorder and the like of the front-end visual interaction equipment during visual result output are avoided, visual interaction effect is improved, and visual interaction safety is ensured.
In the following description, other features will be partially set forth. Upon review of the ensuing disclosure and the accompanying figures, those skilled in the art will in part discover these features or will be able to ascertain them through production or use thereof. The features of the present application may be implemented and obtained by practicing or using the various aspects of the methods, tools, and combinations that are set forth in the detailed examples described below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a block diagram of a visual service server according to an embodiment of the present invention.
Fig. 2 is a flowchart of a service processing method based on big data according to an embodiment of the present invention.
Fig. 3 is a block diagram of a service processing device based on big data according to an embodiment of the present invention.
Fig. 4 is a schematic diagram of a service processing system based on big data according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, but not all embodiments of the present invention. The components of the embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures.
The inventor finds that the related online service visualization processing technology does not consider the visualization performance of the front-end visualization interaction device, so that the phenomena of screen display, information disorder and the like of the front-end visualization interaction device are usually caused when the front-end visualization interaction device outputs a visualization result. In addition, the related art does not consider the security of the service data information in the visualization processing process, which may lead to malicious theft of the related service data information by the illegal front-end visualization interaction device. In summary, the related visualization technology has the problems of poor visual interaction effect and low safety.
The above prior art solutions have all the drawbacks that the inventors have obtained after practice and careful study, and thus the discovery process of the above problems and the solutions presented below by the embodiments of the present invention for the above problems should be all contributions to the present invention by the inventors during the present invention.
Based on the above study, the embodiment of the invention provides a business processing method and a server based on big data, which can perform visual output label identification, business object verification and instruction signature authentication operation when performing visual processing, on one hand, the identity legitimacy of the interactive front-end visual interaction equipment can be ensured through the business object verification and the instruction signature authentication operation, and on the other hand, a visual conversion strategy can be generated and the visual processing can be performed by combining the visual output label, so that the actual visual performance of the front-end visual interaction equipment is considered, the phenomena of screen display, information disorder and the like of the front-end visual interaction equipment when outputting visual results are avoided, the visual interaction effect is improved, and the safety of visual interaction is ensured.
Fig. 1 shows a block schematic diagram of a visualization business server 10 according to an embodiment of the present invention. The visualization service server 10 in the embodiment of the present invention may be a server with data storage, transmission and processing functions, as shown in fig. 1, where the visualization service server 10 includes: a memory 11, a processor 12, a communication bus 13 and a big data based service processing device 20.
The memory 11, the processor 12 and the communication bus 13 are electrically connected directly or indirectly to enable transmission or interaction of data. For example, the components may be electrically connected to each other by one or more communication buses or signal lines. The memory 11 stores therein a big data based service processing device 20, the big data based service processing device 20 includes at least one software functional module stored in the memory 11 in the form of software or firmware, and the processor 12 executes various functional applications and data processing by running software programs and modules stored in the memory 11, for example, the big data based service processing device 20 in the embodiment of the present invention, that is, implements the big data based service processing method in the embodiment of the present invention.
The Memory 11 may be, but is not limited to, a random access Memory (Random Access Memory, RAM), a Read Only Memory (ROM), a programmable Read Only Memory (Programmable Read-Only Memory, PROM), an erasable Read Only Memory (Erasable Programmable Read-Only Memory, EPROM), an electrically erasable Read Only Memory (Electric Erasable Programmable Read-Only Memory, EEPROM), etc. The memory 11 is used for storing a program, and the processor 12 executes the program after receiving an execution instruction.
The processor 12 may be an integrated circuit chip having data processing capabilities. The processor 12 may be a general-purpose processor including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc. The methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The communication bus 13 is used for establishing communication connection between the visual service server 10 and other communication terminal devices through a network, and realizing the transceiving operation of network signals and data. The network signals may include wireless signals or wired signals.
It will be appreciated that the architecture shown in fig. 1 is merely illustrative, and that the visualization business server 10 may also include more or fewer components than those shown in fig. 1, or have a different configuration than that shown in fig. 1. The components shown in fig. 1 may be implemented in hardware, software, or a combination thereof.
The embodiment of the invention also provides a readable storage medium for a computer, wherein the readable storage medium stores a computer program, and the computer program realizes the method when running.
Fig. 2 shows a flowchart of a service processing method based on big data according to an embodiment of the present invention. The method steps defined by the flow related to the method, which are applied to the visualization service server 10 and can be implemented by the processor 12, include the following steps 110-130.
Step 110: and identifying the visual output label of the visual content to be identified of the target business interaction service event based on the business visual interaction instruction sent by the target front-end visual interaction device.
It is understood that front-end visual interaction devices include, but are not limited to, VR (Virtual Reality) devices, AR (Augmented Reality) devices, intelligent electronic devices (cell phones, tablet computers, notebook computers), or closet interaction devices, among others. The front-end visual interaction device is generally in communication with a visual service server and other visual interaction devices, so that visual interaction of data information is realized.
In popular terms, visualization (Visualization) is a theory, method and technique that uses computer graphics and image processing techniques to convert data into graphics or images to be displayed on a screen, and then performs interactive processing. With the development of digitization, big data and cloud computing, the visual interaction can improve the readability of related service information, so that the service processing efficiency is improved. Thus, in practical application, the visualization service server generally performs corresponding visualization processing based on the received service visualization interaction instruction.
In general, the service visual interaction instruction may be uploaded to the visual service server by the target front-end visual interaction device, and is used for requesting the visual service server to perform related service visual processing. Accordingly, the target business interaction service event may be a business interaction service event that is associated with the target front-end visualization interaction device presence. For example, the target business interaction service event can be various self-service services (such as self-service order making and self-service government and enterprise cloud business handling), can be a remote video conference or remote education live broadcast, can be remote smart medical service, and can also comprise a service event with a visual characteristic related to smart city monitoring.
On the basis, the visual content to be identified of the target business interaction service event can be related content to be subjected to visual output, such as text content, image content or voice content. Further, the visual output label is used for distinguishing visual output indexes (such as device video memory requirements and the like) of visual contents to be identified, so that subsequent visual processing can be performed by combining the visual performance of the front-end visual interaction device.
In some possible embodiments, for the "identifying the visual output tag of the visual content to be identified of the target business interaction service event" described in step 110 based on the business visual interaction instruction sent by the target front end visual interaction device, this may be achieved by: acquiring a service visual interaction instruction sent by target front-end visual interaction equipment; the target front-end visual interaction device is front-end visual interaction device associated with target back-end visual processing equipment in the digital business interaction scene; and acquiring the visual content to be identified associated with the target service interaction service event corresponding to the target back-end visual processing equipment according to the service visual interaction instruction, and identifying the visual output label of the visual content to be identified.
In popular terms, the front-end visual interaction device and the back-end visual processing device both have visual output functions, and the difference is that the back-end visual processing device belongs to the visual processing device inside the visual service server, and can be generally used for testing and checking the visual content to be output. Thus, the digitized business interaction scenario typically includes a visualization business server, a back-end visualization processing device, and a front-end visualization interaction device.
In addition, the target front-end visual interaction device is associated with the target back-end visual processing device, which can be understood as that the visual performance parameters of the target front-end visual interaction device and the target back-end visual processing device are the same or similar, such as screen resolution, refresh rate and the like. In this way, the visual content to be identified, which is associated with the target business interaction service event corresponding to the target back-end visual processing device and obtained through the business visual interaction instruction, can be used as a basis for detecting the visual performance of the target front-end visual interaction device.
It can be appreciated that, based on step 110, the visual output tag of the visual content to be identified can be identified, so as to realize detection of the visual performance of the target front-end visual interaction device, and avoid that the visual performance of the target front-end visual interaction device is too low to normally display related visual content.
Step 120: and when the visual output label exists in the visual content to be identified, carrying out service object verification on the target service interaction service event by combining the visual content to be identified. Wherein the target business interaction service event is associated with the visual content to be identified.
When the visual output label exists in the visual content to be identified, the visual performance adaptation of the visual content to be identified and the visual interaction equipment at the front end can be characterized, and on the basis, identity verification can be further carried out, so that the safety of service data information of visual processing is ensured. For example, business object verification may be performed based on business object state data, and may further include the following: and when the visual output label exists in the visual content to be identified, acquiring service object state data associated with the target service interaction event from the visual content to be identified, and performing service object verification on the target service interaction event based on the service object state data. For example, the business object state data may be state data of other front-end visual interaction devices associated with the target business interaction service event during the visual interaction, including display content data, user feedback data, and the like. By checking the business object, the identity validity of the visual interaction equipment at the front end of the target can be checked, so that the safety of the business data information of the visual processing is ensured.
In some possible embodiments, the visual content to be identified may include business object status data related to the target business interaction service event; the step of obtaining the service object state data associated with the target service interaction event from the visual content to be identified when the visual output tag exists in the visual content to be identified, and performing service object verification on the target service interaction event based on the service object state data can be achieved through the following steps a-c.
And a step a of extracting the business object state data from the visual content to be identified when the visual output label exists in the visual content to be identified. It can be understood that the premise of extracting the service object state data is that the visual output label exists in the visual content to be identified, namely, the visual content to be identified is matched with the performance of the target front-end visual interaction device. That is, the visual output tag is a first layer judgment (visual performance adaptation), and after passing through the first layer judgment, a subsequent identity verification judgment is performed.
And b, acquiring a target digitized service log from a different-place visual interaction scene associated with the visual service server, and inquiring the digitized service event in the target digitized service log. In general, the off-site visual interaction scenario may be a visual interaction scenario where the front-end visual interaction device is located different from the visual business server. For example, the location of the front-end visual interaction device is z1, and the location of the visual service server is z2, so that the visual interaction scenes corresponding to the front-end visual interaction device and the visual service server can be different-location visual interaction scenes. The target digitized business log is used for recording interaction records of the visual digital business, and the digitized business events in the target digitized business log can comprise different types of digitized business events.
And c, if the digital business event related to the business object state data is inquired in the target digital business log, determining the digital business event related to the inquired business object state data as a first digital business event, determining that the business object verification of the target business interaction service event is completed, and setting the verification result of the business object verification as verification pass. The digitized business event associated with the business object state data can be understood as that the mapping relation of the same event type label exists between the digitized business event and the business object state data, so that the business object identity of the target front-end visual interaction device corresponding to the target business interaction service event can be ensured to be legal by utilizing the risk conduction thought, and the verification result of the business object verification is judged to be verification passing.
Step 130: and when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual conversion strategy between the service object verification and the target front-end visual interaction equipment and performing visual processing.
For example, the instruction signature authentication operation may be used to perform operation verification on the target front-end visual interaction device, thereby further ensuring the credibility of identity verification of the target front-end visual interaction device. Further, the visual conversion strategy can be used for indicating relevant graphic processing of the visual content to be identified to be output to the target front-end visual interaction device, so that the target front-end visual interaction device can perform complete and accurate visual display.
In some possible embodiments, when the verification result of the verification of the business object in the step 130 is that the verification passes and the instruction signature authentication operation associated with the business visual interaction instruction is completed, the step of generating a visual transformation policy between the target front-end visual interaction device and performing visual processing may include the following steps: and when the verification result of the business object verification is that the verification is passed and the instruction signature authentication operation associated with the business visual interaction instruction is completed, generating a visual conversion strategy between the target front-end visual interaction equipment, and feeding back a business visual output result associated with the business object state data to the target front-end visual interaction equipment according to a business visual model corresponding to the visual conversion strategy. In general, operation verification may be achieved by key authentication of an associated instruction signature of a business visualization interaction instruction.
In other examples, the method may further include the following steps 141-144 described above in addition to the steps 110-130.
Step 141, obtaining first visual content data from a first cloud data storage log associated with the visual service server according to a service visual interaction instruction, and feeding back the first visual content data to a target front-end visual interaction device as instruction response data corresponding to the service visual interaction instruction, so that the target front-end visual interaction device performs visual output analysis on the first visual content data; the first visual content data has a first visual requirements portrait associated with the visual business server.
For example, the first cloud data storage log may be a database deployed in the cloud, such as a MySQL database or a Hive database. The first visual content data can be data for performing visual display testing on the visual interaction device at the front end of the target, and the visual conversion requirement of the visual service server and the visual display requirement of the visual interaction device at the front end of the target can be balanced because the first visual content data has the first visual requirement portrait associated with the visual service server.
Step 142, receiving a visual test result sent by the target front-end visual interaction device based on the first visual requirement portrait; and the visual test result is provided with dynamic characteristic information after service visualization processing is carried out on the target visual sample by utilizing the first visual requirement portrait.
For example, the dynamic feature information may be feature information having a dynamic graphical transformation, and the expression of the dynamic feature information may be a feature vector or a feature map.
And step 143, performing feature recognition on the dynamic feature information through the first visual service information corresponding to the first visual requirement image to obtain a target visual sample associated with the service visual interaction instruction.
For example, the first visual service information may correspond to a visual server side, and the manner of performing feature recognition on the dynamic feature information through the first visual service information corresponding to the first visual requirement image may be implemented based on pre-training to complete a machine learning model, and a target visual sample associated with the business visual interaction instruction may be used to perform establishment of a business visual model.
And 144, generating a service visualization model for performing visualization conversion with the target front-end visualization interaction equipment according to the target visualization sample. In general, the traffic visualization model may be a convolutional neural network model (Convolutional Neural Networks, CNN) or a generative antagonism network (Generative Adversarial Networks, GAN).
By the design, training of the service visualization model can be achieved based on the steps 141-144, so that subsequent visualization processing is served, and the visualization interaction efficiency is improved.
For some possible embodiments, the service visual interaction instruction is configured to instruct the visual service server to send a visual content acquisition instruction for acquiring second visual content data to the target front-end visual interaction device. Based on this, the "obtaining, according to the business visual interaction instruction, the visual content to be identified associated with the target business interaction service event corresponding to the target backend visual processing device, and identifying the visual output tag of the visual content to be identified" described in the above steps may include the following contents: receiving second visual content data of a target business interaction service event corresponding to target back-end visual processing equipment, which is fed back by the target front-end visual interaction equipment based on the visual content acquisition instruction; determining visual contents to be identified which are associated with the target business interaction service event according to the second visual content data, and acquiring multidimensional visual characteristic contents for identifying the visual contents to be identified from a visual content list of the first cloud data storage log; the multi-dimensional visual characteristic content is determined by a visual content output platform associated with the visual business server; and identifying the visual output label of the visual content to be identified according to the multidimensional visual characteristic content.
For example, the visual content list is used for recording visual characteristic content of different dimensions. Such as visual feature content 1 based on the presentation effect feature dimension, visual feature content 2 based on the presentation content richness dimension, or visual feature content 3 based on the form dimension. The visual content output platform associated with the visual service server can be generally understood as a service platform outputting in one direction, that is, a platform where no service interaction exists. It can be understood that by implementing the above-mentioned content, different dimensions of the visual feature content can be considered as much as possible, so that the visual output tag of the visual content to be identified can be accurately and reliably identified according to the multi-dimensional visual feature content, so as to ensure the suitability of the visual performance of the visual content to be identified and the target front-end visual interaction device.
In some examples, the visual content to be identified includes a visual content category and a visual content priority corresponding to the second visual content data, based on which the step of identifying the visual output tag of the visual content to be identified according to the multi-dimensional visual feature content may further include the following steps: obtaining a visual content output record associated with the multi-dimensional visual characteristic content; and if the visual content output record contains second visual content data associated with the visual content category and the visual content priority, and the visual conversion label of the second visual content data is matched with the visual requirement corresponding to the second visual content data, determining that the visual content to be identified has the visual output label.
For the visual content output record, the visual content output record can record visual content in a positive order or a reverse order, and the visual content category and the visual content priority corresponding to the second visual content data are respectively used for distinguishing the second visual content data and judging the importance of the second visual content data. In this way, whether the visual content output record contains the second visual content data associated with the visual content category and the visual content priority can be judged, and on the basis, if the visual conversion label of the second visual content data is matched with the visual requirement corresponding to the second visual content data, the identification of the visual output label of the visual content to be identified can be carried out from the target front-end visual interaction equipment layer and the server layer, so that the reliability of the identification result of the visual output label can be ensured.
In an actual implementation process, the service object state data may include a visualization requirement portrait of service object information for representing the target service interaction event, and on this basis, when a verification result of service object verification is that the verification is passed and an instruction signature authentication operation associated with the service visualization interaction instruction is completed, a visualization conversion policy between the target front-end visualization interaction devices is generated, and a service visualization output result associated with the service object state data is fed back to the target front-end visualization interaction devices according to a service visualization model corresponding to the visualization conversion policy, which may include the following steps 131 and 134.
And 131, when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual conversion strategy between the target front-end visual interaction equipment, and acquiring a digital service event matching instruction sent by the target front-end visual interaction equipment based on a service visual model corresponding to the visual conversion strategy. For example, the digitized business event matching instructions are used to screen the digitized business events.
Step 132, determining a digitized business event which is not related to the business object state data except the first digitized business event in the target digitized business log as a second digitized business event based on the digitized business event matching instruction. For example, by differentiating digitized business events, subsequent targeted analysis can be facilitated.
Step 133, screening the second digitized business event in the target digitized business log, determining the first digitized business event in the screened target digitized business log as an associated digitized business event associated with the target business interaction service event, and retrieving target event content matched with the visual demand portrait in the associated digitized business event. For example, by determining the associated digitized business event, the integrity of the target event content can be ensured as much as possible while ensuring the visualization heat of the target event content.
And 134, carrying out service visualization processing on the retrieved target event content by using the service visualization model, taking the target event content after service visualization processing as a service visualization output result, and feeding back the service visualization output result to the target front-end visualization interaction device. For example, the target event content may be input into a service visualization model, and the target event content after service visualization processing is used as a service visualization output result.
In practical implementation, the target event content may include data1, data2, data3 and data4, and the target event content after service visualization processing may be data1 (histogram), data2 (line graph), data3 (video) and data4 (flash), so that the service visualization output result can be ensured to be matched with the visualization performance of the target front end visualization interaction device as much as possible. And then guarantee that visual interaction device of target front end can demonstrate data1 in the form of histogram, demonstrate data2 in the form of line graph, demonstrate data3 in the form of video, demonstrate data4 in the form of flash, can avoid data1, data2, data3 and data4 to appear the deviation when visual output like this.
In some possible embodiments, the digitized business event matching instruction may include a first event optimization instruction, where the first event optimization instruction is a global event optimization instruction in event feature information of a remote digitized business event stored in a second cloud data storage log of the target front end visualization interaction device, and accordingly, the method may further include: counting event feature information of all the digital business events in the target digital business log from the remote visual interaction scene based on the digital business event matching instruction, and acquiring a second event optimization instruction from the event feature information of all the digital business events; wherein the second event optimization indication is a global event optimization indication in the target digitized service log; determining event feature information of to-be-matched digital service events for matching the digital service events between the target front-end visual interaction device and the visual service server based on an optimization indication comparison result between the second event optimization indication and the first event optimization indication; and determining the service visual output result according to the event characteristic information of the digital service event to be matched, and feeding back the service visual output result to the target front-end visual interaction device.
For example, the event characteristic information may be used to describe a digitized business event, e.g., the event characteristic information for digitized business event 1 may be [ t1, t2, t3, t4, t5, t6,..ti ], i being a positive integer. Further, ti may be understood as a feature segment in the event feature information, and the obtaining of the second event optimization indication from the event feature information of all the digitized service events may be implemented based on attribute contents of different feature segments, and since the second event optimization indication is a global event optimization indication in the target digitized service log, the second event optimization indication may be determined based on attribute contents with highest content correlation in attribute contents of different feature segments, so by comparing the second event optimization indication with the first event optimization indication, a service event with optimization requirements may be calibrated, so as to accurately determine event feature information of a digitized service event to be matched for matching the digitized service event between the target front-end visual interaction device and the visual service server, and further accurately determine the service visual output result through the event feature information of the digitized service event to be matched, so that the target front-end visual interaction device may output the service visual output result completely and without errors.
On the basis of the above content, if the verification result of the service object verification is that the verification fails, the method may further include the following content: generating a visual abnormal prompt corresponding to the service visual interaction instruction, and feeding the visual abnormal prompt back to the visual interaction equipment at the front end of the target so that the visual interaction equipment at the front end of the target can adjust visual requirements based on the visual abnormal prompt. For example, the visualization anomaly prompt may be "identity verification disqualification" or "visualization authority mismatch", based on which the visualization requirement adjustment of the target front-end visualization interaction device may be an adjustment of a visualization call for some data information, such as the previous visualization of the data d1, d2 and d3, and is now adjusted to only implement the visualization of the data d1, so as to avoid the visualization anomaly condition such as "visualization authority mismatch".
Based on the same or similar inventive concept as described above, referring to fig. 3 in combination, there is provided a big data based service processing apparatus 20, the apparatus comprising: the identification module 21 is configured to identify a visual output tag of the visual content to be identified of the target service interaction service event based on a service visual interaction instruction sent by the target front-end visual interaction device; the verification module 22 is configured to perform service object verification on a target service interaction event in combination with the visual content to be identified when the visual output tag exists in the visual content to be identified; wherein the target business interaction service event is associated with the visual content to be identified; and the visualization module 23 is configured to generate a visualization conversion policy between the visualization conversion policy and the target front-end visualization interaction device and perform visualization processing when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visualization interaction instruction is completed. For further description of the above functional modules, reference may be made to the description of the method shown in fig. 2, which is not repeated here.
Based on the same or similar inventive concept, please refer to fig. 4 in combination, a big data based service processing system is provided, which includes a visual service server 10 and a front-end visual interaction device 30 that communicate with each other, wherein the visual service server 10 can identify a visual output tag of a visual content to be identified of a target service interaction event based on a service visual interaction instruction sent by the target front-end visual interaction device; when the visual output label exists in the visual content to be identified, carrying out service object verification on the target service interaction service event by combining the visual content to be identified; wherein the target business interaction service event is associated with the visual content to be identified; and when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual conversion strategy between the service object verification and the target front-end visual interaction equipment and performing visual processing. For further description of the above system embodiments, reference may be made to the description of the method shown in fig. 2, which is not repeated here.
Based on the content, after feeding back the service visual output result associated with the service object state data to the target front-end visual interaction device, the method can further comprise content related to service vulnerability detection. For example, in some alternative embodiments, the method may include the following:
Based on a service visual interaction instruction sent by target front-end visual interaction equipment, identifying a visual output tag of visual contents to be identified of a target service interaction service event;
when the visual output label exists in the visual content to be identified, carrying out service object verification on the target service interaction service event by combining the visual content to be identified; wherein the target business interaction service event is associated with the visual content to be identified;
when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual conversion strategy between the service object verification and the target front-end visual interaction equipment, and performing visual processing to obtain a visual processing result;
when target front-end visual interaction equipment performs service interaction based on the visual processing result, based on received digital service interaction data uploaded by each target front-end visual interaction equipment, determining digital interaction service items corresponding to interaction operation label information in the digital service interaction data, and acquiring a plurality of groups of digital service interaction data of the digital interaction service items recorded by each target front-end visual interaction equipment in a preset vulnerability detection period;
And determining business vulnerability classification characteristics of at least one business vulnerability category item of the digital interaction service item according to information generation time periods and information generation modes in the plurality of groups of digital business interaction data of the digital interaction service item, and determining a business vulnerability detection result of the digital interaction service item.
In the above embodiment, regarding the "service visual interaction instruction sent by the target front-end visual interaction device", the visual output tag of the visual content to be identified of the target service interaction service event is identified; when the visual output label exists in the visual content to be identified, carrying out service object verification on the target service interaction service event by combining the visual content to be identified; wherein the target business interaction service event is associated with the visual content to be identified; when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, a visual conversion strategy between the service object verification and the target front-end visual interaction device is generated and visual processing is performed, and the embodiment of obtaining a visual processing result can be referred to the description of the method shown in fig. 2.
In the above embodiment, regarding the received digital service interaction data uploaded by each target front-end visual interaction device, digital interaction service items corresponding to the interaction operation tag information in the digital service interaction data are determined, and multiple groups of digital service interaction data of the digital interaction service items recorded by each target front-end visual interaction device in a preset vulnerability detection period are obtained; the embodiment of determining the business vulnerability classification characteristic of at least one business vulnerability category item of the digital interaction service item according to the information generation time period and the information generation mode in the plurality of groups of digital business interaction data of the digital interaction service item and determining the business vulnerability detection result of the digital interaction service item can be referred to as follows.
Step 210, determining digital interaction service items corresponding to the interaction operation label information in the digital service interaction data based on the received digital service interaction data uploaded by each target front-end visual interaction device, and obtaining a plurality of groups of digital service interaction data of the digital interaction service items recorded by each target front-end visual interaction device in a preset vulnerability detection period;
In this embodiment, the method may be applied to a visual service server communicatively connected to a plurality of target front-end visual interaction devices, where the visual service server may provide different digital service services for the target front-end visual interaction devices, and the digital service services may relate to a plurality of service fields in daily production and life, such as digital shopping service, digital cloud office service, digital cloud education service, digital cloud game service, digital government and enterprise service, digital internet of things service, digital platform operation and maintenance service, and the like, and are not limited herein.
In general, the visual service server may be a visual service server or a visual service server cluster, the digital service interaction device may be an intelligent electronic device with a service interaction function (such as a visual interaction function), such as a mobile phone, a tablet computer, a notebook computer, etc., which is not limited herein, and on the basis, the digital service interaction data may be service interaction data generated in a communication process between the target front-end visual interaction devices or between the target front-end visual interaction devices and the visual service server, where the digital service interaction data has bi-directionality, and can reflect detailed interaction situations of both service interaction parties.
Further, the interactive operation tag information is used for distinguishing different interactive operations. For example, in the digital shopping service, the interactive operation tag information "a1" may represent a ordering operation, the interactive operation tag information "a2" may represent a return operation, and the interactive operation tag information "a3" may represent a complaint operation. In the digital government enterprise service, the interactive operation tag information "b1" may represent a query operation, the interactive operation tag information "b2" may represent an upload operation, and the interactive operation tag information "b3" may represent a download operation. In the digital platform operation and maintenance service, the interactive operation label information 'c 1' can represent software testing operation, the interactive operation label information 'c 2' can represent script repairing operation, and the interactive operation label information 'c 3' can represent product online operation.
It can be understood that different interactive operation tag information may correspond to different interactive operation and digital interactive service items, so that the corresponding digital interactive service items can be accurately positioned through the interactive operation tag information in the digital business interactive data, thereby realizing classification processing of vulnerability detection, ensuring integrity of vulnerability detection, and avoiding omission and false detection.
In the actual implementation process, the preset vulnerability detection period may be determined according to the vulnerability event recorded by the visual service server, for example, in a past period of time, if the vulnerability event recorded by the visual service server is x1 pieces, the preset vulnerability detection period may be T1, and if the vulnerability event recorded by the visual service server is x2 pieces, the preset vulnerability detection period may be T2. By means of the design, the integrity of the digital business interaction data can be ensured based on the visual interaction device side of each target front end by acquiring the plurality of groups of digital business interaction data of the digital interaction service matters recorded by the visual interaction device of each target front end in the preset vulnerability detection period.
It may be understood that the digitized service interaction data acquired by the visual service server is divided into two types, the first type of data is uploaded by each target front-end visual interaction device, the second type of data is corresponding to the digitized service interaction items recorded by each target front-end visual interaction device in the preset vulnerability detection period, in colloquially speaking, the visual service server may determine the corresponding digitized service item m1 according to the uploaded digitized service interaction data inter-data1, and determine the corresponding digitized service item m1 based on the digitized service interaction data inter-data1 to acquire multiple groups of digitized service interaction data inter-data12 of the digitized service item m1 recorded by each target front-end visual interaction device in the preset vulnerability detection period, in this embodiment, the digitized service interaction data inter-data1 and the multiple groups of digitized service interaction data inter-data12 may or may not overlap, and may specifically perform analysis based on the actual conditions, and are not limited.
Based on the foregoing, in some possible embodiments, in order to completely obtain multiple sets of digitized service interaction data of digitized interaction service items so as to implement subsequent service vulnerability detection, the foregoing step of determining, based on the received digitized service interaction data uploaded by each target front-end visual interaction device, the digitized interaction service item corresponding to the interaction operation tag information in the digitized service interaction data, and obtaining multiple sets of digitized service interaction data of the digitized interaction service item recorded by each target front-end visual interaction device in a preset vulnerability detection period may include the following contents: receiving digital business interaction data uploaded by each target front-end visual interaction device, wherein the digital business interaction data comprises interaction operation label information of digital interaction service items, and an information generation period and an information generation mode of the interaction operation label information; and determining corresponding digital interaction service items according to the interaction operation label information in the received digital service interaction data aiming at each group of digital service interaction data, and obtaining a plurality of groups of digital service interaction data of the digital interaction service items recorded by each target front-end visual interaction device in a preset vulnerability detection period.
For example, the information generating period of the interactive operation tag information may be used to indicate when the interactive operation tag information is generated, and the information generating manner of the interactive operation tag information may be used to distinguish the generating manner of the interactive operation tag information, such as whether the interactive operation tag information is generated in real time or delayed, and whether the interactive operation tag information is generated in a business interaction process or a non-business interaction process, which is not limited herein.
On the basis of the above, the digital interaction service items of each group of digital service interaction data can be positioned, and then multiple groups of digital service interaction data of the digital interaction service items recorded by each target front-end visual interaction device in a preset vulnerability detection period are acquired, so that multiple groups of digital service interaction data of different digital interaction service items recorded by each target front-end visual interaction device in the preset vulnerability detection period can be ensured to be acquired completely.
For example, for the digitized business interaction data inter-data1, the corresponding digitized interaction service item may be the digitized interaction service item m1, and further, multiple sets of digitized business interaction data of the digitized interaction service item m1 recorded by each target front end visual interaction device in the preset vulnerability detection period may be data12. For another example, for the digitized business interaction data inter-data2, the corresponding digitized interaction service item may be the digitized interaction service item m2, and further, multiple sets of digitized business interaction data of the digitized interaction service item m2 recorded by each target front end visual interaction device in the preset vulnerability detection period may be data22. For another example, for the digitized business interaction data inter-data3, the corresponding digitized interaction service item may be the digitized interaction service item m3, and further, multiple sets of digitized business interaction data of the digitized interaction service item m3 recorded by each target front end visual interaction device in the preset vulnerability detection period may be data32.
By the design, corresponding digital interaction service items can be determined based on different digital service interaction data, and complete multiple groups of digital service interaction data of the digital interaction service items can be further obtained, so that multiple types of service vulnerability analysis and detection can be conveniently carried out subsequently, and missing detection and false detection are avoided.
Step 220, determining business vulnerability classification characteristics of at least one business vulnerability category item of the digital interaction service item according to information generation time periods and information generation modes in the plurality of groups of digital business interaction data of the digital interaction service item, and determining a business vulnerability detection result of the digital interaction service item.
In the actual implementation process, each set of digital business interaction data in the plurality of sets of digital business interaction data of the digital interaction service item also comprises the corresponding interactive operation label information of the digital interaction service item, and the information generation period and the information generation mode of the interactive operation label information, and as each digital interaction service item corresponds to the plurality of sets of digital business interaction data, the business vulnerability classification characteristics of at least one business vulnerability category item of the digital interaction service item can be determined.
For example, business vulnerability category items may include a wide variety of items, such as, but not limited to, multi-terminal interaction scenario category items, associated business category items, operational behavior category items, and network delay category items. The business vulnerability classification features can be used for describing business vulnerability situations of different business vulnerability category items, so that the business vulnerability detection results of digital interaction service items can be conveniently carried out later. In the subsequent implementation process, business vulnerability detection can be respectively performed based on the multi-terminal interaction scene category item, the associated business category item, the operation behavior category item and the network delay category item, so that a corresponding business vulnerability detection result is obtained. By the design, business vulnerability classification characteristics of different business vulnerability category items of the digital interaction service items can be analyzed, so that the integrity of business vulnerability detection results of the digital interaction service items is ensured, and abnormal subsequent digital service interaction caused by missing detection and false detection of individual business vulnerabilities is avoided.
Based on the above, the step of determining the business vulnerability classification characteristic of at least one business vulnerability category item of the digital interactive service item according to the information generation period and the information generation mode in the plurality of sets of digital business interactive data of the digital interactive service item and determining the business vulnerability detection result of the digital interactive service item may include the following steps: determining a business interaction error report log of the digital interaction service item in a preset business vulnerability running environment according to information generation time periods and information generation modes in the plurality of groups of digital business interaction data of the digital interaction service item, and determining business vulnerability classification characteristics of at least one business vulnerability category item of the digital interaction service item according to the business interaction error report log; and determining a business vulnerability detection result of the digital interaction service item according to the business vulnerability classification characteristics of the at least one business vulnerability category item.
For example, the business vulnerability running environment may be understood as a digital business interaction scenario where business service vulnerabilities easily occur, and the business vulnerability running environment may be different for different business fields. Further, the business interaction error reporting log may be used to record error reporting events related to business service vulnerabilities, for example, in the digital shopping service, the business interaction error reporting log may record "order loss error reporting event", "repeated payment error reporting event", and the like, which are not limited herein. It can be understood that the business vulnerability classification characteristic of at least one business vulnerability category item of the digital interaction service item can be completely determined through the business interaction error reporting log, and then the business vulnerability detection result of the digital interaction service item can be completely determined through the business vulnerability classification characteristic.
In some possible embodiments, the preset business vulnerability running environment may include a preset multi-terminal interaction scene, the at least one business vulnerability category item includes a multi-terminal interaction scene category item, based on which the step of determining a business vulnerability classification feature of the at least one business vulnerability category item of the digital interaction service item according to the information generation period and the information generation mode in the plurality of sets of digital business interaction data of the digital interaction service item may include the following steps: the multiple groups of digital business interaction data of the digital interaction service items are arranged according to an information generation period; determining a comparison result of information generation time periods of every two groups of adjacent digital business interaction data, and judging whether a business vulnerability running environment of a first digital business interaction data in which the information generation time periods are prior in the two groups of adjacent digital business interaction data is the preset multi-terminal interaction scene or not if the comparison result of the information generation time periods reaches a first set duration; and if the service vulnerability is the preset multi-terminal interaction scene, determining the service vulnerability classification characteristic corresponding to the multi-terminal interaction scene category item of the digital interaction service item based on the preset multi-terminal interaction scene.
For example, the sets of digitized business interaction data of the digitized interaction service item may be sorted according to a positive sequence or a reverse sequence of the information generation period, such as digitized business interaction data inter-data12a, digitized business interaction data inter-data12b, digitized business interaction data inter-data12c, digitized business interaction data inter-data12d, and digitized business interaction data inter-data12e of the digitized interaction service item m 1.
For example, after the digitized business interaction data of the digitized interaction service item m1 is the digitized business interaction data inter-data12a, the digitized business interaction data inter-data12b, the digitized business interaction data inter-data12c, the digitized business interaction data inter-data12d and the digitized business interaction data inter-data12e are sorted according to the positive sequence of the information generation period, the obtained data sequence may be: the digital business interaction data inter-data12 c-the digital business interaction data inter-data12 a-the digital business interaction data inter-data12 e-the digital business interaction data inter-data12 d-the digital business interaction data inter-data12b.
For another example, after the digitized business interaction data of the digitized interaction service item m1 is the digitized business interaction data inter-data12a, the digitized business interaction data inter-data12b, the digitized business interaction data inter-data12c, the digitized business interaction data inter-data12d and the digitized business interaction data inter-data12e are sorted according to the reverse order of the information generation period, the obtained data sequence may be: the digital business interaction data inter-data12 b-the digital business interaction data inter-data12 d-the digital business interaction data inter-data12 e-the digital business interaction data inter-data12 a-the digital business interaction data inter-data12c.
Further, every two sets of adjacent digitized business interaction data may be digitized business interaction data inter-data12b and digitized business interaction data inter-data12d, digitized business interaction data inter-data12d and digitized business interaction data inter-data12e, digitized business interaction data inter-data12e and digitized business interaction data inter-data12a, digitized business interaction data inter-data12a and digitized business interaction data inter-data12c. On the basis of the above, the comparison result of the information generation periods of every two adjacent groups of digital business interaction data can be a period difference value, and can be generally determined by an intermediate event point of the information generation period.
On the premise that the comparison result of the information generation time period reaches the first set duration, the information generation continuity of every two groups of adjacent digital business interaction data can be represented to be influenced, and in this case, whether the business vulnerability running environment of the first digital business interaction data in the information generation time period in the two groups of adjacent digital business interaction data is the preset multi-terminal interaction scene can be judged. If the business vulnerability running environment of the first digital business interaction data with the previous information generation period in the two sets of adjacent digital business interaction data is the preset multi-terminal interaction scene, the business vulnerability classification feature corresponding to the multi-terminal interaction scene category item of the digital interaction service item can be determined based on the preset multi-terminal interaction scene and the business interaction fault report log of the digital interaction service item under the preset business vulnerability running environment (multi-terminal interaction scene). Therefore, the targeted analysis of different business vulnerability running environments can be realized, and the business vulnerability classification features corresponding to the multi-terminal interaction scene category items of the digital interaction service items can be accurately extracted.
In some other embodiments, the at least one business vulnerability category item may include an associated business category item, on the basis of which, the step of determining a business interaction fault log of the digital interaction service item in a preset business vulnerability running environment according to an information generation period and an information generation mode in the plurality of sets of digital business interaction data of the digital interaction service item, and determining a business vulnerability classification feature of the at least one business vulnerability category item of the digital interaction service item according to the business interaction fault log may further include the following contents: acquiring each group of digital business interaction data recorded by each target front-end visual interaction device in the preset vulnerability detection period, and determining associated digital business interaction content corresponding to the business interaction event record of the digital interaction service item according to the information generation period and the information generation mode in the acquired digital business interaction data; if the associated digital business interaction content carries vulnerability restoration information, determining a first business vulnerability classification characteristic of an associated business category item of the digital interaction service item according to the vulnerability restoration information; judging whether a business vulnerability running environment of the digital business interaction data is the preset multi-terminal interaction scene according to each group of digital business interaction data of the associated digital business interaction content, if so, determining a second business vulnerability classification characteristic of an associated business category item of the associated digital business interaction content according to the preset multi-terminal interaction scene; the feature content of the business vulnerability classification feature of the associated business category item is one of the first business vulnerability classification feature, the second business vulnerability classification feature and a feature fusion result of the first business vulnerability classification feature and the second business vulnerability classification feature.
For example, the business interaction event record may be used to record and store different business interaction events, and the associated digital business interaction content includes business interaction content of a prior business interaction event corresponding to the digital interaction service item or a business interaction event having an interaction object delivery relationship, and the associated digital business interaction content may be visual content, such as text, image, etc., which is not limited herein. Further, if the associated digital business interaction content carries vulnerability restoration information, it indicates that a business service vulnerability exists before a business service corresponding to the associated digital business interaction content, in this case, a first business vulnerability classification feature of an associated business category item of the digital interaction service item may be determined according to the vulnerability restoration information, where the associated business category item corresponds to the associated digital business interaction content.
Further, for each group of digital business interaction data of the related digital business interaction content, by judging whether the business vulnerability running environment of the digital business interaction data is the preset multi-terminal interaction scene, the positioning of the business vulnerability running environment can be realized, so that when the business vulnerability running environment of the digital business interaction data is judged to be the preset multi-terminal interaction scene, the second business vulnerability classification characteristic of the related business category item of the related digital business interaction content is determined according to the preset multi-terminal interaction scene. Because the feature content of the business vulnerability classification feature of the associated business category item is one of the first business vulnerability classification feature, the second business vulnerability classification feature and the feature fusion result of the first business vulnerability classification feature and the second business vulnerability classification feature, the global integrity and the scene suitability of the business vulnerability classification feature can be ensured.
In some other embodiments, the at least one business vulnerability category item further includes an operation behavior category item, based on which the following business vulnerability classification feature may relate to feature information related to operation behavior, for example, the step of determining a business vulnerability classification feature of the at least one business vulnerability category item of the digital interaction service item according to an information generation period and an information generation manner in the plurality of sets of digital business interaction data of the digital interaction service item may include: according to the information generation time period, the digital business interaction data of the related digital business interaction content are tidied; for every two groups of adjacent digital business interaction data of the digital interaction service items in the preset vulnerability detection period, if the information generation mode in the first digital business interaction data of the preceding information generation period is the preset multi-terminal interaction scene, determining the operation behavior of the digital interaction service items based on the information generation mode in the second digital business interaction data of the following information generation period; for every two groups of adjacent digital business interaction data of the related digital business interaction content in the preset vulnerability detection period, if the business vulnerability running environment in the first digital business interaction data is the preset multi-terminal interaction scene, determining the operation behavior of the related digital business interaction content based on the information generation mode corresponding to the second digital business interaction data; if the similarity of the operational behaviors of the associated digital business interaction content and the behavior characteristics of the operational behaviors of the digital interaction service items is within a preset similarity interval, and the comparison result of the information generation periods of two groups of second digital business interaction data corresponding to the operational behaviors of the associated digital business interaction content and the operational behaviors of the digital interaction service items is smaller than a second set period, determining the business vulnerability classification characteristics corresponding to the operational behavior category items of the digital interaction service items through the operational behaviors of the associated digital business interaction content and the operational behaviors of the digital interaction service items.
For example, determining the operation behavior of the digital interactive service item based on the information generation manner in the second digital business interactive data after the information generation period may be achieved by: analyzing the information generation mode in the second digital business interaction data after the information generation period to obtain operation feedback information corresponding to the information generation mode in the second digital business interaction data after the information generation period, and determining the operation behavior of the digital interaction service item through the operation feedback information, wherein the operation behavior can be image selection behavior if the operation feedback information is image display.
For example, for every two sets of adjacent digital business interaction data of the related digital business interaction content within the preset vulnerability detection period, one set of adjacent digital business interaction data can be defined as first digital business interaction data, and the other set of adjacent digital business interaction data can be defined as second digital business interaction data.
For example, for different operation behaviors, if the similarity of the behavior characteristics (such as cosine similarity of the behavior characteristic vector) of the operation behavior f1 of the related digital service interaction content and the operation behavior f2 of the digital interaction service item is within a preset similarity interval (flexibly adjusted according to the actual service situation), and the comparison result (such as the time interval difference of the information generation time interval) of the information generation time interval of the two sets of second digital service interaction data corresponding to the operation behavior f1 of the related digital service interaction content and the operation behavior f2 of the digital interaction service item is smaller than the second set time interval (set according to the actual situation, without limitation), the service vulnerability classification feature corresponding to the operation behavior category item of the digital interaction service item is determined through the operation behavior f1 of the related digital service interaction content and the operation behavior f2 of the digital interaction service item. In this way, the behavioral feature similarity of different operation behaviors can be analyzed, and the business vulnerability classification features corresponding to the operation behavior category items of the digital interaction service items are determined by combining the comparison results of the information generation time periods, so that comprehensive consideration of the operation behaviors and the time sequence features is realized, and the credibility of the business vulnerability classification features corresponding to the operation behavior category items is ensured.
In some possible embodiments, based on the above, the method may further include: determining associated operation behaviors of the digital interaction service matters and the associated digital business interaction content in a first vulnerability detection period according to the digital business interaction data of the digital interaction service matters and the associated digital business interaction content in the first vulnerability detection period; and updating the preset multi-terminal interaction scene according to the determined associated operation behavior.
For example, the associated operation behavior may be used to characterize the digital interaction service item and the dynamic service interaction condition of the associated digital service interaction content in the first vulnerability detection period, and the associated operation behavior may include an operation behavior of a service participant corresponding to the digital interaction service item and an interaction behavior corresponding to the associated digital service interaction content, which is not limited herein. In this way, the multi-terminal interaction scene is updated through the associated operation behaviors, so that timeliness of the multi-terminal interaction scene can be ensured. For example, the scene tag or scene feature of the multi-terminal interaction scene may be modified and adjusted according to the call path of the behavior function of the related operation behavior, or the preset multi-terminal interaction scene may be updated in combination with the related operation behavior in other manners, which is not limited herein.
In yet another embodiment, the at least one business hole category item includes a network delay category item, where network delay may be understood as a data information transmission delay caused by insufficient communication bandwidth, such as slow page refresh, interaction response delay, etc., which is not limited herein. Based on this, the step of determining a business interaction fault report log of the digital interaction service item in a preset business fault running environment according to an information generation period and an information generation mode in the plurality of sets of digital business interaction data of the digital interaction service item, and determining a business fault classification feature of at least one business fault category item of the digital interaction service item according to the business interaction fault report log may further include the following contents: determining a business vulnerability running environment as a business transfer track of the digital business interaction data of the preset multi-terminal interaction scene from the plurality of groups of digital business interaction data of the digital interaction service items; and determining the business vulnerability classification characteristics corresponding to the network delay category items of the digital interaction service items according to the determined business transfer track.
For example, the service transmission track of the digitized service interaction data may be a Knowledge Graph (knowledgegraph) formed by association conditions between different service events, and the execution logic relationship and the causal relationship between different service events corresponding to the digitized service interaction data may be obtained through the service transmission track, so that the service vulnerability classification feature corresponding to the network delay category item of the digitized service interaction event may be completely determined through the service transmission track. For example, the business vulnerability classification feature corresponding to the network delay class item of the digital interaction service item can be determined through the node with abnormal attribute information in the business transfer track. In general, the business vulnerability classification features corresponding to the network delay class items may include network parameter features and bandwidth occupation features corresponding to different business interaction events, and may also include other types of features, which are not limited herein.
Based on the foregoing, the preset business vulnerability operating environment may include a preset offline business interaction scenario, and based on this, the method may further include the following two embodiments, which are embodiment 1 and embodiment 2, respectively, where embodiment 1 and embodiment 2 may be implemented alternatively or in parallel according to actual situations.
In embodiment 1, for each digital interaction service item, digital service interaction data of the digital interaction service item recorded by each target front-end visual interaction device in a second vulnerability detection period is obtained, a service interaction fault log of the digital interaction service item in the preset offline service interaction scene is determined according to the obtained digital service interaction data, and a service vulnerability classification feature of a first service state category item of the digital interaction service item is updated according to the service interaction fault log of the digital interaction service item in the preset offline service interaction scene.
In embodiment 1, the second vulnerability detection period may be adjusted according to the actual situation, for example, the second vulnerability detection period may be determined according to the received offline service trigger identifier, on this basis, the service interaction fault report log of the digital interaction service item in the preset offline service interaction scene is determined according to the obtained digital service interaction data, and the fault report event related to the offline service (offline service) is realized in combination with the offline time period corresponding to the second vulnerability detection period. In this way, the business vulnerability classification feature of the first business state category item of the digital interaction service item can be performed according to the business interaction error report log of the digital interaction service item in the preset offline business interaction scene. In this embodiment, the first traffic state category item may be understood as a real-time traffic state category item.
Embodiment 2, for each digital interaction service item, acquiring a service assistant detection record of the digital interaction service item in a third vulnerability detection period, and updating a service vulnerability classification feature of a second service state category item of the digital interaction service item according to the acquired service assistant detection record; the business vulnerability detection result of the digital interaction service item is determined based on the business vulnerability classification characteristic of the at least one business vulnerability category item and the business vulnerability classification characteristic of at least one of the first business state category item and the second business state category item.
In embodiment 2, the third vulnerability detection period may be determined according to the activation period of the service assistant software, and the service assistant detection record is used to record the service assistant software usage, for example, in the visual interactive service, the corresponding digital interactive service item may be implemented by starting the service assistant software (remote manual collaboration operation service). By the design, the business assistant detection record of the business assistant software can be taken into consideration, so that the business vulnerability classification characteristic of the second business state category item of the digital interaction service item is updated, and high correlation between the business vulnerability classification characteristic and actual business interaction is ensured.
In some alternative embodiments, based on the foregoing, the method may further include: determining business vulnerability classification characteristics of vulnerability restoration category items of the digital interaction service items according to vulnerability restoration information of the digital interaction service items; the business vulnerability detection result of the digital interaction service item is determined based on the business vulnerability classification characteristic of the at least one business vulnerability category item of the digital interaction service item and the business vulnerability classification characteristic of the vulnerability restoration category item. By the design, the business vulnerability classification features can be completely and accurately positioned based on specific vulnerability restoration information, so that the accuracy and reliability of the business vulnerability classification features are ensured.
In some alternative embodiments, the business vulnerability detection result of the digital interaction service item is obtained by determining the feature content of the business vulnerability classification feature based on the business vulnerability classification feature of each category item of the digital interaction service item, based on which the method may further include the following: and outputting vulnerability restoration prompt information when the content description value of the characteristic content of the business vulnerability classification characteristic of the business vulnerability detection result representing the digital interaction service item meets a preset trigger condition, wherein the vulnerability restoration prompt information comprises an information generation mode of the latest digital business interaction data of the digital interaction service item.
For example, the feature content of the business vulnerability classification feature may be a feature vector, the content description value may quantitatively express the feature content, the content description value may be any integer between 0 to 10 or 0 to 100, different content description values refer to different feature content, and correspondingly, the preset triggering condition may be a condition for vulnerability restoration prompt, for example, the content description value 8 satisfies the preset triggering condition (for example, less than 10 and greater than 5), and then the content description value 8 may represent that vulnerability restoration needs exist, and at this time, vulnerability restoration prompt information may be output. The vulnerability restoration prompt information can be output to the target front-end visual interaction device or can be output to a third-party operation and maintenance platform, and is not limited herein. Because the bug fix prompt information comprises the information generation mode of the latest digital business interaction data of the digital interaction service item, the follow-up business service bug fix can be ensured to consider the latest digital business interaction data, so that the processing of the latest digital business interaction data can be realized quickly after the business service bug fix, the interaction efficiency of the digital service is improved, and the occurrence of unnecessary abnormal conditions is avoided as far as possible.
In some alternative embodiments, the step of determining the business vulnerability detection result of the digital interaction service item according to the business vulnerability classification feature of the at least one business vulnerability category item may be implemented by a method described in the following steps (1) - (5).
(1) And acquiring event type labels of each interactive event content block in the to-be-detected interactive service content corresponding to the digital interactive service items, and classifying the interactive event content blocks according to event types according to the event type labels. For example, the interactive event content blocks can be obtained by event splitting the interactive service content to be detected, and the event category labels are used for distinguishing the interactive event content blocks.
(2) And obtaining the event category heat distribution and the content validity detection result distribution of the interactive event content blocks of each event category in the interactive service content to be detected according to the event category labels. For example, the event category popularity distribution and the content validity detection result distribution may be expressed in a list or a graph, where the event category popularity distribution is used to record interaction popularity and popularity of different events, and the content validity detection result distribution is used to record validity of different events. In some specific examples, the step of obtaining the event category popularity distribution and the content validity detection result distribution of the interactive event content block of each event category in the interactive service content to be detected according to the event category label may include the following: obtaining global relevance description values of the interactive event content blocks of each event category in the interactive service content to be detected according to the event category labels; according to the global relevance description value of the interactive event content blocks of each event category in the interactive service content to be detected, an event category heat change track of the interactive event content blocks is used as the event category heat distribution; obtaining the relative word vector distance between each interactive event content block and each preset category label in the interactive service content to be detected according to the event category label; and obtaining the change track of the content validity detection result distribution of the interactive event content block of each event category in the interactive service content to be detected according to the relative word vector distance, and taking the change track as the content validity detection result distribution. Therefore, the occurrence of missing of event category heat distribution and content validity detection result distribution can be avoided.
Still further, the step of obtaining the global relevance description value of the interactivity event content block of each event category in the interactivity service content to be detected according to the event category label may include the following steps: obtaining the content block distribution condition of the number of the interactive event content blocks of any event category in the number of all the interactive event content blocks according to the event category label; according to the event category labels, acquiring the number of the to-be-detected interactive service contents of the interactive event content blocks of any event category from a pre-stored to-be-detected interactive service content candidate set; the candidate set of the interactive service contents to be detected comprises at least two interactive service contents to be detected; obtaining a global relevance description value of the interactive event content blocks of any event category in the interactive service content to be detected according to the content block distribution condition of the interactive event content blocks of any event category in all the interactive event content blocks, the number of the interactive service content to be detected of the interactive event content blocks of any event category in the candidate set of the interactive service content to be detected, and the number of the interactive service content to be detected in the candidate set of the interactive service content to be detected; and sequentially obtaining the global relevance description value of the interactive event content block of each event category in the interactive service content to be detected. By the design, different global relevance description values can be determined rapidly and accurately, and mutual interference among the global relevance description values is avoided.
(3) And obtaining the content correlation coefficients of the to-be-detected interactive service content and the preset sample interactive service content according to the content block heat distribution of the interactive event and the content validity detection result distribution. For example, the content correlation coefficient may be expressed by a different type of correlation coefficient, such as pearson correlation coefficient (Pearson Correlation Coefficient).
(4) And taking the interaction service content to be detected, of which the content correlation coefficient is larger than the set correlation coefficient, as the potential abnormal interaction service content. For example, the set correlation coefficient may be designed according to the actual service situation, which is not described herein.
(5) Determining a content feature map in the potential abnormal interaction service content, and matching the business vulnerability classification feature of the at least one business vulnerability category item with the content feature map to obtain a matching result; and determining a business vulnerability detection result of the digital interaction service item according to the matching result. For example, the content feature map may be expressed in a form of map Data (Graphic Data), the business vulnerability classification feature of the at least one business vulnerability category item and the content feature map may be matched by calculating a euclidean distance between the business vulnerability classification feature of the at least one business vulnerability category item and the content feature map, the matching result may include a matching rate between the business vulnerability classification feature of the business vulnerability category item and the content feature map, and then the content feature map corresponding to the matching result with the matching rate in the set interval may be retained, so that the retained content feature map is identified, and a business vulnerability detection result of the corresponding digital interaction service item is obtained. It can be appreciated that the business vulnerability detection result may include different types of business service vulnerabilities, so that the integrity of business vulnerability detection can be ensured, and the influence of missed detection or false detection on subsequent normal business handling is avoided.
According to the business vulnerability detection scheme, the received digital interaction service items corresponding to the interaction operation label information in the digital business interaction data uploaded by each target front-end visual interaction device can be determined, so that the digital interaction service items are accurately positioned, multiple groups of digital business interaction data of the digital interaction service items recorded by each target front-end visual interaction device in a preset vulnerability detection period are further obtained to perfect collection of the interaction data of the digital interaction service items, business vulnerability classification characteristics of at least one business vulnerability category item of the digital interaction service items can be completely and comprehensively determined based on information generation periods and information generation modes in the multiple groups of digital business interaction data of the digital interaction service items, the integrity of business detection results of the digital interaction service items is further ensured, and subsequent abnormal digital service interaction caused by missed detection and false detection of individual business vulnerabilities is avoided.
In summary, by implementing the steps 110-130, the visual output tag identification, the service object verification and the instruction signature authentication operation can be performed during the visual processing, so that on one hand, the identity validity of the front-end visual interaction device interacted can be ensured through the service object verification and the instruction signature authentication operation, and on the other hand, the visual conversion strategy can be generated and the visual processing can be performed by combining with the visual output tag, so that the actual visual performance of the front-end visual interaction device is considered, the phenomena of screen display, information disorder and the like of the front-end visual interaction device when the visual result is output are avoided, the visual interaction effect is improved, and the security of visual interaction is ensured.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other manners. The apparatus and method embodiments described above are merely illustrative, for example, flow diagrams and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present invention may be integrated together to form a single part, or each module may exist alone, or two or more modules may be integrated to form a single part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a visualization service server 10, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes. It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only of the preferred embodiments of the present invention and is not intended to limit the present invention, but various modifications and variations can be made to the present invention by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (8)

1. A business processing method based on big data, characterized in that the method is performed by a visual business server in a digital business interaction scene, the method comprising:
acquiring first visual content data from a first cloud data storage log associated with the visual service server according to a service visual interaction instruction, and feeding the first visual content data back to target front-end visual interaction equipment as instruction response data corresponding to the service visual interaction instruction so as to enable the target front-end visual interaction equipment to perform visual output analysis on the first visual content data; the first visual content data has a first visual requirement portrait associated with the visual business server;
receiving a visual test result sent by the target front-end visual interaction device based on the first visual requirement portrait; the visual test result is provided with dynamic characteristic information after service visualization processing is carried out on the target visual sample by utilizing the first visual requirement portrait;
Performing feature recognition on the dynamic feature information through first visual service information corresponding to the first visual requirement image to obtain a target visual sample associated with the business visual interaction instruction;
and generating a service visualization model for performing visualization conversion with the target front-end visualization interaction equipment according to the target visualization sample.
2. The method according to claim 1, wherein the service visual interaction instruction is configured to instruct the visual service server to send a visual content acquisition instruction for acquiring second visual content data to the target front-end visual interaction device; the step of obtaining the visual content to be identified associated with the target business interaction service event corresponding to the target back-end visual processing equipment according to the business visual interaction instruction, and identifying the visual output tag of the visual content to be identified comprises the following steps:
receiving second visual content data of a target business interaction service event corresponding to target back-end visual processing equipment, which is fed back by the target front-end visual interaction equipment based on the visual content acquisition instruction;
Determining visual contents to be identified which are associated with the target business interaction service event according to the second visual content data, and acquiring multidimensional visual characteristic contents for identifying the visual contents to be identified from a visual content list of the first cloud data storage log; the multi-dimensional visual characteristic content is determined by a visual content output platform associated with the visual business server;
and identifying the visual output label of the visual content to be identified according to the multidimensional visual characteristic content.
3. The method according to claim 2, wherein the visual content to be identified includes a visual content category and a visual content priority corresponding to the second visual content data; the identifying the visual output tag of the visual content to be identified according to the multidimensional visual characteristic content comprises the following steps:
obtaining a visual content output record associated with the multi-dimensional visual characteristic content;
and if the visual content output record contains second visual content data associated with the visual content category and the visual content priority, and the visual conversion label of the second visual content data is matched with the visual requirement corresponding to the second visual content data, determining that the visual content to be identified has the visual output label.
4. The method according to claim 1, wherein the method further comprises:
based on a service visual interaction instruction sent by target front-end visual interaction equipment, identifying a visual output tag of visual contents to be identified of a target service interaction service event;
when the visual output label exists in the visual content to be identified, carrying out service object verification on the target service interaction service event by combining the visual content to be identified; wherein the target business interaction service event is associated with the visual content to be identified;
when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual conversion strategy between the service object verification and the target front-end visual interaction equipment and performing visual processing;
wherein: the target business interaction service event comprises a self-service order, a self-service government enterprise cloud business transaction, a remote video conference, a remote education live broadcast, a remote intelligent medical service and a service event with a visual characteristic for intelligent city monitoring.
5. The method according to claim 4, wherein the identifying the visual output tag of the visual content to be identified of the target business interaction service event based on the business visual interaction instruction sent by the target front-end visual interaction device includes:
Acquiring a service visual interaction instruction sent by target front-end visual interaction equipment; the target front-end visual interaction device is front-end visual interaction device associated with target back-end visual processing equipment in the digital business interaction scene;
and acquiring the visual content to be identified associated with the target service interaction service event corresponding to the target back-end visual processing equipment according to the service visual interaction instruction, and identifying the visual output label of the visual content to be identified.
6. The method according to claim 5, wherein when the visual output tag exists in the visual content to be identified, performing service object verification on the target service interaction event in combination with the visual content to be identified; wherein the target business interaction service event is associated with the visual content to be identified, comprising:
and when the visual output label exists in the visual content to be identified, acquiring service object state data associated with the target service interaction event from the visual content to be identified, and performing service object verification on the target service interaction event based on the service object state data.
7. The method according to claim 6, wherein when the verification result of the service object verification is that the verification is passed and the instruction signature authentication operation associated with the service visual interaction instruction is completed, generating a visual transformation policy between the service object verification and the target front-end visual interaction device and performing visual processing, including:
and when the verification result of the business object verification is that the verification is passed and the instruction signature authentication operation associated with the business visual interaction instruction is completed, generating a visual conversion strategy between the target front-end visual interaction equipment, and feeding back a business visual output result associated with the business object state data to the target front-end visual interaction equipment according to a business visual model corresponding to the visual conversion strategy.
8. A visual business server, which is characterized by comprising a processor, a communication bus and a memory; the processor and the memory communicate via the communication bus, the processor reading a computer program from the memory and running to perform the method of any of claims 1-7.
CN202210270287.4A 2021-06-16 2021-06-16 Service processing method and server based on big data Active CN114840286B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210270287.4A CN114840286B (en) 2021-06-16 2021-06-16 Service processing method and server based on big data

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110664415.9A CN113391867B (en) 2021-06-16 2021-06-16 Big data service processing method and service server based on digitization and visualization
CN202210270287.4A CN114840286B (en) 2021-06-16 2021-06-16 Service processing method and server based on big data

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN202110664415.9A Division CN113391867B (en) 2021-06-16 2021-06-16 Big data service processing method and service server based on digitization and visualization

Publications (2)

Publication Number Publication Date
CN114840286A CN114840286A (en) 2022-08-02
CN114840286B true CN114840286B (en) 2023-07-14

Family

ID=77621398

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202210270287.4A Active CN114840286B (en) 2021-06-16 2021-06-16 Service processing method and server based on big data
CN202110664415.9A Active CN113391867B (en) 2021-06-16 2021-06-16 Big data service processing method and service server based on digitization and visualization

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202110664415.9A Active CN113391867B (en) 2021-06-16 2021-06-16 Big data service processing method and service server based on digitization and visualization

Country Status (1)

Country Link
CN (2) CN114840286B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114168973A (en) * 2021-12-21 2022-03-11 江西省锐华互联网科技有限公司 APP security vulnerability analysis method based on cloud computing and server
CN114615342B (en) * 2022-01-29 2023-08-15 江苏方天电力技术有限公司 Service interaction method and device suitable for electricity consumption information acquisition system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112162999A (en) * 2020-10-08 2021-01-01 翁海坤 Big data processing method based on interactive cloud computing and artificial intelligence server
CN112163156A (en) * 2020-10-06 2021-01-01 翁海坤 Big data processing method based on artificial intelligence and cloud computing and cloud service center
CN112818023A (en) * 2021-01-26 2021-05-18 龚世燕 Big data analysis method and cloud computing server in associated cloud service scene
CN112948090A (en) * 2021-03-23 2021-06-11 耿赛 Big data analysis and sorting method applied to network service processing and server

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7293178B2 (en) * 2002-12-09 2007-11-06 Microsoft Corporation Methods and systems for maintaining an encrypted video memory subsystem
US10394759B2 (en) * 2016-03-14 2019-08-27 Airmagnet, Inc. System and method to configure distributed measuring devices and treat measurement data
CN106169143A (en) * 2016-06-29 2016-11-30 北京奇虎科技有限公司 The method for down loading of a kind of data and device
CN106878043B (en) * 2016-07-05 2020-07-07 阿里巴巴集团控股有限公司 Service processing method and device
WO2018112799A1 (en) * 2016-12-21 2018-06-28 华为技术有限公司 Visual evoked potential-based identity verification method and device
CN110288001B (en) * 2019-05-28 2023-09-05 西南电子技术研究所(中国电子科技集团公司第十研究所) Target recognition method based on target data feature training learning
CN111625922B (en) * 2020-04-15 2022-04-12 中国石油大学(华东) Large-scale oil reservoir injection-production optimization method based on machine learning agent model
CN111405347B (en) * 2020-04-23 2022-04-29 成都极米科技股份有限公司 Picture display method and device, electronic equipment and readable storage medium
CN111565390B (en) * 2020-07-16 2020-12-15 深圳市云盾科技有限公司 Internet of things equipment risk control method and system based on equipment portrait
CN112256445A (en) * 2020-07-24 2021-01-22 北京沃东天骏信息技术有限公司 Data processing method, device and equipment based on application program and storage medium
CN111858613B (en) * 2020-07-31 2021-09-03 湖北亿咖通科技有限公司 Service data retrieval method
CN112256522A (en) * 2020-09-23 2021-01-22 北京达佳互联信息技术有限公司 Component information acquisition method and device, electronic equipment and storage medium
CN112131475B (en) * 2020-09-25 2023-10-10 重庆邮电大学 Interpretable and interactive user portrayal method and device
CN112764620B (en) * 2021-01-25 2022-06-21 北京三快在线科技有限公司 Interactive request processing method and device, electronic equipment and readable storage medium
CN112820404A (en) * 2021-03-08 2021-05-18 裴炳坤 Information processing method applied to big data intelligent medical treatment and intelligent medical treatment server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112163156A (en) * 2020-10-06 2021-01-01 翁海坤 Big data processing method based on artificial intelligence and cloud computing and cloud service center
CN112162999A (en) * 2020-10-08 2021-01-01 翁海坤 Big data processing method based on interactive cloud computing and artificial intelligence server
CN112818023A (en) * 2021-01-26 2021-05-18 龚世燕 Big data analysis method and cloud computing server in associated cloud service scene
CN112948090A (en) * 2021-03-23 2021-06-11 耿赛 Big data analysis and sorting method applied to network service processing and server

Also Published As

Publication number Publication date
CN113391867B (en) 2022-07-01
CN114840286A (en) 2022-08-02
CN113391867A (en) 2021-09-14

Similar Documents

Publication Publication Date Title
CN109816397B (en) Fraud discrimination method, device and storage medium
CN111917740B (en) Abnormal flow alarm log detection method, device, equipment and medium
CN109510737A (en) Protocol interface test method, device, computer equipment and storage medium
CN114840286B (en) Service processing method and server based on big data
US11221904B2 (en) Log analysis system, log analysis method, and log analysis program
CN103685307A (en) Method, system, client and server for detecting phishing fraud webpage based on feature library
CN113051543B (en) Cloud service security verification method and cloud service system in big data environment
CN114840853B (en) Digital business analysis method based on big data and cloud server
CN112162999A (en) Big data processing method based on interactive cloud computing and artificial intelligence server
CN112115468B (en) Service information detection method based on big data and cloud computing center
CN109801151B (en) Financial falsification risk monitoring method, device, computer equipment and storage medium
CN110598008B (en) Method and device for detecting quality of recorded data and storage medium
CN110543506A (en) Data analysis method and device, electronic equipment and storage medium
CN115205766A (en) Block chain-based network security abnormal video big data detection method and system
CN113486983A (en) Big data office information analysis method and system for anti-fraud processing
CN110647523B (en) Data quality analysis method and device, storage medium and electronic equipment
CN114626024A (en) Internet infringement video low-consumption detection method and system based on block chain
CN111368128B (en) Target picture identification method, device and computer readable storage medium
CN112231272B (en) Information processing method based on remote online office and computer equipment
CN115511645A (en) Method, device and equipment for detecting claim settlement picture and storage medium
CN114996080A (en) Data processing method, device, equipment and storage medium
CN113449506A (en) Data detection method, device and equipment and readable storage medium
WO2024045064A1 (en) Playing content monitoring method, main unit, system, apparatus, medium and device
CN111131322A (en) Network behavior detection method and device, computer equipment and storage medium
CN116821523B (en) Personnel matching logic verification method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20230621

Address after: No. 13, Floor 7, Building 7, Yard 30, Shixing Street, Shijingshan District, Beijing 100043

Applicant after: Industrial and Information Technology (Beijing) Industrial Development Research Institute Co.,Ltd.

Address before: Room 1216, east 12th floor, block B, Haohong Industrial Park, No. 38 Jingjing Road, economic development zone, Kunming, Yunnan 650217

Applicant before: Yang Yongfei

GR01 Patent grant
GR01 Patent grant