CN115941272A - Storage method and storage device for cloud mobile phone behavior data and electronic equipment - Google Patents

Storage method and storage device for cloud mobile phone behavior data and electronic equipment Download PDF

Info

Publication number
CN115941272A
CN115941272A CN202211383438.3A CN202211383438A CN115941272A CN 115941272 A CN115941272 A CN 115941272A CN 202211383438 A CN202211383438 A CN 202211383438A CN 115941272 A CN115941272 A CN 115941272A
Authority
CN
China
Prior art keywords
mobile phone
cloud mobile
address
target
behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211383438.3A
Other languages
Chinese (zh)
Inventor
梁小龙
王嘉
党戈
胡涵
李悦
陈有权
刘利民
曾亮洪
温志阳
谭康才
温海欣
庞永良
贺世凯
廖永清
王罡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Internet Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Internet Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202211383438.3A priority Critical patent/CN115941272A/en
Publication of CN115941272A publication Critical patent/CN115941272A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The application discloses a storage method, a storage device and electronic equipment of cloud mobile phone behavior data, the storage method is applied to a cloud mobile phone ARM server and comprises the following steps: receiving an operation instruction of a cloud mobile phone sent by a terminal, wherein the instruction carries a user identifier of a user corresponding to the terminal and a first IP address corresponding to the terminal; under the condition that an access request for accessing a public network service, sent by the cloud mobile phone through the cloud mobile phone ARM server, is detected, the user identifier, the first IP address and a second IP address are bound to obtain target data, wherein the second IP address is an IP address corresponding to the cloud mobile phone ARM server; and storing the target data into a source tracing database.

Description

Storage method and storage device for cloud mobile phone behavior data and electronic equipment
Technical Field
The application relates to the field of cloud mobile phone traceability, in particular to a storage method and a storage device of cloud mobile phone behavior data and an electronic device.
Background
The cloud mobile phone is a cloud simulation mobile phone built on a cloud server, a user can operate a certain number of virtual cloud mobile phones on the cloud server through a physical mobile phone or a computer, and the cloud simulation cloud mobile phones operate an operating system and have basically the same functions as real mobile phones. With the development of technical means, the cloud mobile phone can realize a normal mobile phone application scene, and can be used for abnormal behaviors by specific people through specific means, but no effective solution is provided for tracing the behavior data of the cloud mobile phone in the related technology.
Disclosure of Invention
The application discloses a storage method and device of cloud mobile phone behavior data and an electronic device, which can trace the source of the cloud mobile phone behavior data.
In order to solve the above problems, the following technical solutions are adopted in the present application:
in a first aspect, an embodiment of the present application discloses a method for storing cloud mobile phone behavior data, which is applied to a cloud mobile phone ARM server, and includes: receiving an operation instruction of a cloud mobile phone sent by a terminal, wherein the instruction carries a user identifier of a user corresponding to the terminal and a first IP address corresponding to the terminal; under the condition that an access request for accessing a public network service, which is sent by the cloud mobile phone through the cloud mobile phone ARM server, is detected, the user identification, the first IP address and a second IP address are bound to obtain target data, wherein the second IP address is an IP address corresponding to the cloud mobile phone ARM server; and storing the target data into a source tracing database.
In a second aspect, an embodiment of the present application discloses a storage device for cloud mobile phone behavior data, including: the cloud mobile phone comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving an operation instruction of the cloud mobile phone sent by a terminal, and the instruction carries a user identifier of a user corresponding to the terminal and a first IP address corresponding to the terminal; the binding module is used for binding the user identifier, the first IP address and a second IP address to obtain target data under the condition that an access request for accessing a public network service, which is sent by the cloud mobile phone through the cloud mobile phone ARM server, is detected, wherein the second IP address is an IP address corresponding to the cloud mobile phone ARM server; and the storage module is used for storing the target data into a source tracing database.
In a third aspect, embodiments of the present application provide an electronic device, which includes a processor and a memory, where the memory stores a program or instructions executable on the processor, and the program or instructions, when executed by the processor, implement the steps of the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a readable storage medium, on which a program or instructions are stored, which when executed by a processor implement the steps of the method according to the first aspect.
The technical scheme who this application adopted can reach following beneficial effect:
the embodiment of the application provides a method for storing behavior data of a cloud mobile phone, which includes the steps of receiving an operation instruction sent by a terminal to the cloud mobile phone, wherein the operation instruction carries a user identifier of a user corresponding to the terminal and a first IP address corresponding to the terminal, binding the user identifier, the first IP address and a second IP address corresponding to an ARM server of the cloud mobile phone under the condition that an access request sent by the cloud mobile phone through the ARM server of the cloud mobile phone for accessing a public network service is detected, obtaining target data, and storing the target data into a source tracing database, so that the tracing of the behavior data of the cloud mobile phone can be realized. Moreover, the technical scheme disclosed by the application establishes an IP tracing mechanism, traces the source end to end, and has short tracing chain and strong operability.
Drawings
Fig. 1 is a schematic flow chart of a method for storing cloud mobile phone behavior data disclosed in an embodiment of the present application;
fig. 2 is a schematic structural diagram of a storage device for cloud mobile phone behavior data disclosed in an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device disclosed in the embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some, but not all, embodiments of the present application. All other embodiments, which can be derived from the embodiments in the present application by a person skilled in the art, are within the scope of protection of the present application.
The terms first, second and the like in the description and in the claims of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that embodiments of the application are capable of operation in sequences other than those illustrated or described herein, and that the terms "first," "second," etc. are generally used in a generic sense and do not limit the number of terms, e.g., a first term can be one or more than one. In the specification and claims, "and/or" indicates at least one of electrically connected objects, and a character "/" generally indicates that the preceding and following related objects are in an "or" relationship.
The method, the device and the electronic device for storing the cloud mobile phone behavior data disclosed in the embodiments of the present application are described in detail below with reference to the accompanying drawings through specific embodiments and application scenarios thereof.
The method for storing the cloud mobile phone behavior data is applied to a cloud mobile phone ARM server, the cloud mobile phone ARM server comprises a cloud mobile phone service processing area and a cloud mobile phone system area, the cloud mobile phone service processing area is responsible for registration, login, verification and the like of users, a virtualized cloud mobile phone running on equipment is controlled by the cloud mobile phone system area, computing power of running of the cloud mobile phone is provided, an interface of the cloud mobile phone is presented in a video stream and instruction stream mode, interaction between the equipment and a cloud end is carried out, and public network service is accessed.
Fig. 1 is a schematic flowchart of a method for storing cloud mobile phone behavior data according to an embodiment of the present application. As shown in fig. 1, the method comprises the steps of:
s120, receiving an operation instruction of the cloud mobile phone sent by a terminal, wherein the instruction carries a user identifier of a user corresponding to the terminal and a first IP address corresponding to the terminal.
In the Application, the cloud mobile phone is built on an ARM server of the cloud mobile phone, and the terminal refers to an intelligent device which has a screen display function and is provided with a cloud mobile phone Application program (APP). The user sends an operation instruction to the cloud mobile phone through the cloud mobile phone APP of the terminal, and when the user sends the operation instruction to the cloud mobile phone through the cloud mobile phone APP of the terminal, the user can access and operate the cloud mobile phone ARM server through an Internet Protocol (IP) address of the terminal. The method comprises the steps that an ARM server of the cloud mobile phone receives an operation instruction of the cloud mobile phone sent by a terminal, wherein the instruction carries a user Identification (ID) of a user corresponding to the terminal and a first IP address corresponding to the terminal.
In an implementation mode, the instruction may also carry port number information, a request timestamp, user authentication information, user terminal geographical location information, and the like, and the cloud mobile phone ARM server may verify a user login state, user information validity, and the like through the user authentication information.
S140, under the condition that an access request for accessing a public network service, sent by the cloud mobile phone through the cloud mobile phone ARM server, is detected, the user identification, the first IP address and the second IP address are bound to obtain target data, wherein the second IP address is an IP address corresponding to the cloud mobile phone ARM server.
In the application, in the process of operating the cloud mobile phone, the cloud mobile phone sends an access request to the public network service through the cloud mobile phone ARM server, and correspondingly, the cloud mobile phone requests a service domain name address, an IP address, a corresponding port number and the like of the public network service through the second IP address of the cloud mobile phone ARM server, and generates information such as a timestamp and the like. The public network service refers to internet services such as APP service, WWW service, e-mail service, file transfer service, etc., which are accessible on the public network.
Under the condition that the cloud mobile phone ARM server detects an access request for accessing the public network service, sent by the cloud mobile phone through the ARM server, the cloud mobile phone ARM server binds the user ID, the first IP address corresponding to the terminal and the second IP address corresponding to the cloud mobile phone ARM server to obtain target data.
And S160, storing the target data into a source tracing database.
In the method, after the user identification, the first IP address and the second IP address are bound to obtain target data, the target data are stored in the source tracing database, the cloud mobile phone behavior data can be traced through the source tracing database subsequently, and the behavior of the user can be analyzed, modeled and managed through the source tracing database. It should be noted that the port number information, the request timestamp, the user authentication information, the user terminal geographical location information, and the like carried in the instruction may also be stored in the source tracing database.
In one implementation, tracing the cloud mobile phone behavior data through a tracing database includes: and determining a first IP address and a user ID bound with a second IP address based on the second IP address of the cloud mobile phone ARM server corresponding to the access request and a source tracing database.
The embodiment of the application provides a method for storing behavior data of a cloud mobile phone, which includes the steps of receiving an operation instruction sent by a terminal to the cloud mobile phone, wherein the operation instruction carries a user identifier of a user corresponding to the terminal and a first IP address corresponding to the terminal, binding the user identifier, the first IP address and a second IP address corresponding to an ARM server of the cloud mobile phone to obtain target data under the condition that an access request sent by the ARM server of the cloud mobile phone for accessing a public network service is detected, and storing the target data into a source tracing database, so that the behavior data of the cloud mobile phone can be traced. In addition, the technical scheme disclosed by the application realizes end-to-end tracing by establishing an IP tracing mechanism, and has short tracing chain and strong operability.
In an implementation manner, the binding the user identifier, the first IP address, and the second IP address to obtain target data when detecting an access request for accessing a public network service, where the access request is sent by the cloud mobile phone through the cloud mobile phone ARM server, may include: judging whether the target behavior corresponding to the operation instruction is a target abnormal behavior or not based on the operation instruction; and under the condition that the target behavior is a target abnormal behavior, binding the user identifier, the first IP address and the second IP address to obtain target data under the condition that an access request for accessing a public network service, which is sent by the cloud mobile phone through the ARM server of the cloud mobile phone, is detected.
In one implementation manner, whether the target behavior corresponding to the operation instruction is the target abnormal behavior may be determined based on the user terminal information and the user terminal geographical location information carried in the operation instruction.
In another implementation manner, the operation instruction further carries an application requested to be downloaded by the user or a domain name requested to be accessed, and the application requested to be downloaded by the user or the domain name requested to be accessed by the user is compared with the application in a preset blacklist or the domain name in the blacklist to determine whether a target behavior corresponding to the operation instruction is a target abnormal behavior.
In another possible implementation scheme, whether the behavior of the user is the target abnormal behavior may also be determined by a means used by the user to send the operation instruction or send the access request, and for example, if the user uses an abnormal means to send the operation instruction or send the access request, it may be determined that the behavior of the user is the target abnormal behavior.
In the application, when the target behavior is a target abnormal behavior, the cloud mobile phone ARM server binds the user ID, the first IP address and the second IP address to obtain target data and stores the target data in the tracing database when detecting an access request for accessing the public network service, which is sent by the cloud mobile phone through the cloud mobile phone ARM server. In this case, after the exception occurs, the exception user can be traced back through the tracing database.
In this embodiment of the application, after the determining whether the target behavior corresponding to the operation instruction is a target abnormal behavior, the method may further include: and under the condition that the target behavior is a target abnormal behavior, recording a behavior log of the user corresponding to the cloud mobile phone, processing the behavior log through an anti-tampering technology, and storing the processed behavior log into an abnormal user behavior evidence obtaining database so as to obtain evidence at a later stage. In the present application, the tamper-resistant technology may include data tamper-resistant technology, tamper-resistant watermarking technology, and the like, and the behavior log of the user includes, but is not limited to, applications installed by the user, websites visited, and requested interfaces. In addition, when the target behavior is a target abnormal behavior, screen recording and frame capturing can be performed on a specific scene, and similarly, the screen recording and frame capturing can be processed through an anti-tampering technology and then stored in an abnormal user behavior forensics database.
In one implementation, the determining, based on the operation instruction, whether a target behavior corresponding to the operation instruction is a target abnormal behavior may include: judging whether a target behavior corresponding to the operation instruction is an abnormal behavior or not based on the operation instruction; and under the condition that the target behavior is the abnormal behavior, continuously judging whether the target behavior is the target abnormal behavior.
In this embodiment of the application, after the determining whether the target behavior corresponding to the operation instruction is a target abnormal behavior, the method may further include: sending a target information acquisition instruction to the terminal under the condition that the target behavior is not a target abnormal behavior; receiving target information sent by the terminal in response to the target information acquisition instruction; verifying the target information based on preset information; and allowing the cloud mobile phone to send an access request for accessing the public network service under the condition that the authentication is passed. For example, when the target behavior is not the target abnormal behavior, the cloud mobile phone ARM server may perform user verification by sending a target information acquisition instruction to the terminal, when the terminal receives the target information acquisition instruction, the terminal acquires target information and sends the target information to the cloud mobile phone ARM server, the cloud mobile phone ARM server receives the target information sent by the terminal in response to the target information acquisition instruction and verifies the target information based on preset information, and when the target information is consistent with the preset information, the cloud mobile phone ARM server passes verification of the target information and allows the cloud mobile phone to send an access request for accessing the public network service.
In one implementation, the target information may include fingerprint information and/or face information. The target information may also include other information that may be used to verify identity, such as specific data information.
In this embodiment of the application, before receiving an operation instruction for the cloud mobile phone sent by a terminal, the method may further include: the method comprises the steps of receiving registration information of the cloud mobile phone sent by a terminal, wherein the registration information can comprise a mobile phone number, a name, identity card information, fingerprint information, face information and the like of a user, and correspondingly, real-name authentication can be carried out on a registration account through the information. It should be noted that the terminal may send the registration information to the cloud mobile ARM server through the cloud mobile APP.
In a possible implementation scheme, the binding the user identifier, the first IP address, and the second IP address to obtain the target data may include: creating an index table based on the user identification, the first IP address and a second IP address corresponding to the cloud mobile phone ARM server; the storing the target data into a source tracing database includes: and storing the index table into a source tracing database. Exemplarily, the second IP address corresponding to the cloud mobile phone ARM server may be used as a key value key, an index table including the second IP address, the first IP address and the user ID is created, and the index table is stored in the source tracing database, so that the effect of joint fast source tracing is achieved.
In an implementation manner, the binding the user identifier, the first IP address, and the second IP address to obtain target data when detecting an access request for accessing a public network service, where the access request is sent by the cloud mobile phone through the cloud mobile phone ARM server, may include: binding the user identification with the first IP address to obtain first data; and under the condition that an access request for accessing the public network service, which is sent by the cloud mobile phone through the ARM server of the cloud mobile phone, is detected, the first data and the second IP address are bound to obtain target data. That is to say, when the cloud mobile phone ARM server receives an operation instruction for the cloud mobile phone sent by the terminal, the user ID and the first IP address may be bound to obtain first data, and then, when an access request for accessing the public network service, which is sent by the cloud mobile phone ARM server, is detected, the first data and the second IP address are bound to obtain target data.
According to the method for storing the cloud mobile phone behavior data, the execution main body can be a storage device of the cloud mobile phone behavior data. In the embodiment of the present application, a method for executing storage of cloud mobile phone behavior data by using a storage device of cloud mobile phone behavior data is taken as an example, and a device of the storage method of cloud mobile phone behavior data provided in the embodiment of the present application is described.
Fig. 2 is a schematic structural diagram of a storage device for cloud mobile phone behavior data disclosed in an embodiment of the present application. As shown in fig. 2, the storage device 200 for cloud phone behavior data includes: a receiving module 210, a binding module 220, and a storing module 230.
In the application, the receiving module 210 is configured to receive an operation instruction for a cloud mobile phone sent by a terminal, where the instruction carries a user identifier of a user corresponding to the terminal and a first IP address corresponding to the terminal; a binding module 220, configured to bind the user identifier, the first IP address, and a second IP address to obtain target data when detecting an access request for accessing a public network service, where the request is sent by the cloud mobile phone through the cloud mobile phone ARM server, where the second IP address is an IP address corresponding to the cloud mobile phone ARM server; the storage module 230 is configured to store the target data into the source database.
In an implementation manner, the binding module 220 binds the user identifier, the first IP address, and the second IP address to obtain target data when detecting that the cloud mobile phone accesses a public network service through an access request sent by the cloud mobile phone ARM server, including: judging whether the target behavior corresponding to the operation instruction is a target abnormal behavior or not based on the operation instruction; and under the condition that the target behavior is a target abnormal behavior, binding the user identifier, the first IP address and the second IP address to obtain target data under the condition that an access request for accessing a public network service, which is sent by the cloud mobile phone through the ARM server of the cloud mobile phone, is detected.
In one implementation manner, after the binding module 220 determines whether the target behavior corresponding to the operation instruction is a target abnormal behavior, the method further includes: and recording a behavior log of the user corresponding to the cloud mobile phone under the condition that the target behavior is a target abnormal behavior, and processing the behavior log by using an anti-tampering technology.
In one implementation manner, after the binding module 220 determines whether the target behavior corresponding to the operation instruction is a target abnormal behavior, the method further includes: sending a target information acquisition instruction to the terminal under the condition that the target behavior is not a target abnormal behavior; receiving target information sent by the terminal in response to the target information acquisition instruction; verifying the target information based on preset information; and allowing the cloud mobile phone to send an access request for accessing the public network service under the condition that the verification is passed.
In one implementation, the target information includes fingerprint information and/or face information.
In an implementation manner, the binding module 220 binds the user identifier, the first IP address, and the second IP address to obtain target data, including: creating an index table based on the user identification, the first IP address and a second IP address corresponding to the cloud mobile phone ARM server; the storage module 230 stores the target data into a source database, including: and storing the index table into a source tracing database.
In an implementation manner, the binding module 220 binds the user identifier, the first IP address, and the second IP address to obtain target data when detecting that the cloud mobile phone accesses a public network service through an access request sent by the cloud mobile phone ARM server, including: binding the user identification with the first IP address to obtain first data; and under the condition that an access request for accessing the public network service, which is sent by the cloud mobile phone through the ARM server of the cloud mobile phone, is detected, the first data and the second IP address are bound to obtain target data.
The storage device for the cloud mobile phone behavior data provided by the embodiment of the application can realize each process realized by the storage method for the cloud mobile phone behavior data, and is not described herein again in order to avoid repetition.
Optionally, as shown in fig. 3, an electronic device 300 is further provided in this embodiment of the present application, and includes a processor 301 and a memory 302, where the memory 302 stores a program or an instruction that can be executed on the processor 301, and when the program or the instruction is executed by the processor 301, the steps of the embodiment of the method for storing behavior data of a cloud mobile phone are implemented, and the same technical effects can be achieved, and are not described herein again to avoid repetition.
It should be noted that the electronic devices in the embodiments of the present application include mobile electronic devices and non-mobile electronic devices.
The embodiment of the present application further provides a readable storage medium, where a program or an instruction is stored on the readable storage medium, and when the program or the instruction is executed by a processor, the program or the instruction implements each process of the embodiment of the storage method for cloud mobile phone behavior data, and can achieve the same technical effect, and in order to avoid repetition, details are not repeated here.
The processor is the processor in the electronic device described in the above embodiment. The readable storage medium includes a computer readable storage medium, such as a computer read only memory ROM, a random access memory RAM, a magnetic or optical disk, and the like.
In the embodiments of the present application, the difference between the embodiments is described in detail, and different optimization features between the embodiments can be combined to form a better embodiment as long as the differences are not contradictory, and further description is omitted here in view of brevity of the text.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A storage method of cloud mobile phone behavior data is applied to a cloud mobile phone ARM server and comprises the following steps:
receiving an operation instruction of a cloud mobile phone sent by a terminal, wherein the instruction carries a user identifier of a user corresponding to the terminal and a first IP address corresponding to the terminal;
under the condition that an access request for accessing a public network service, sent by the cloud mobile phone through the cloud mobile phone ARM server, is detected, the user identifier, the first IP address and a second IP address are bound to obtain target data, wherein the second IP address is an IP address corresponding to the cloud mobile phone ARM server;
and storing the target data into a source tracing database.
2. The method of claim 1, wherein the binding the user identifier, the first IP address, and the second IP address to obtain target data when detecting an access request for accessing a public network service, the access request being sent by the cloud handset through the cloud handset ARM server, comprises:
judging whether the target behavior corresponding to the operation instruction is a target abnormal behavior or not based on the operation instruction;
and under the condition that the target behavior is a target abnormal behavior, under the condition that an access request for accessing a public network service, which is sent by the cloud mobile phone through the ARM server of the cloud mobile phone, is detected, the user identifier, the first IP address and the second IP address are bound to obtain target data.
3. The method according to claim 2, wherein after the determining whether the target behavior corresponding to the operation instruction is a target abnormal behavior, the method further comprises:
and recording the behavior log of the user corresponding to the cloud mobile phone under the condition that the target behavior is a target abnormal behavior, and processing the behavior log by using an anti-tampering technology.
4. The method according to claim 2, wherein after the determining whether the target behavior corresponding to the operation instruction is a target abnormal behavior, the method further comprises:
sending a target information acquisition instruction to the terminal under the condition that the target behavior is not a target abnormal behavior;
receiving target information sent by the terminal in response to the target information acquisition instruction;
verifying the target information based on preset information;
and allowing the cloud mobile phone to send an access request for accessing the public network service under the condition that the verification is passed.
5. The method of claim 4, wherein the target information comprises fingerprint information and/or face information.
6. The method of claim 1, wherein the binding the user identifier, the first IP address, and the second IP address to obtain the target data comprises:
creating an index table based on the user identification, the first IP address and a second IP address corresponding to the cloud mobile phone ARM server;
the storing the target data into a source tracing database includes:
and storing the index table into a source tracing database.
7. The method of claim 1, wherein the binding the user identifier, the first IP address, and the second IP address to obtain target data when detecting an access request for accessing a public network service, the access request being sent by the cloud mobile phone through the cloud mobile phone ARM server, comprises:
binding the user identification with the first IP address to obtain first data;
and under the condition that an access request for accessing the public network service, sent by the cloud mobile phone through the cloud mobile phone ARM server, is detected, the first data and the second IP address are bound to obtain target data.
8. A storage device of cloud mobile phone behavior data is characterized by comprising:
the cloud mobile phone comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving an operation instruction of the cloud mobile phone sent by a terminal, and the instruction carries a user identifier of a user corresponding to the terminal and a first IP address corresponding to the terminal;
the binding module is used for binding the user identifier, the first IP address and a second IP address to obtain target data under the condition that an access request for accessing a public network service, which is sent by the cloud mobile phone through the cloud mobile phone ARM server, is detected, wherein the second IP address is an IP address corresponding to the cloud mobile phone ARM server;
and the storage module is used for storing the target data into a source tracing database.
9. An electronic device comprising a processor and a memory, the memory storing a program or instructions executable on the processor, the program or instructions when executed by the processor implementing the steps of the method of cloud phone behavior data storage of any of claims 1-7.
10. A readable storage medium, on which a program or instructions are stored, which when executed by a processor, implement the steps of the storage method of cloud handset behavior data according to any one of claims 1 to 7.
CN202211383438.3A 2022-11-07 2022-11-07 Storage method and storage device for cloud mobile phone behavior data and electronic equipment Pending CN115941272A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211383438.3A CN115941272A (en) 2022-11-07 2022-11-07 Storage method and storage device for cloud mobile phone behavior data and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211383438.3A CN115941272A (en) 2022-11-07 2022-11-07 Storage method and storage device for cloud mobile phone behavior data and electronic equipment

Publications (1)

Publication Number Publication Date
CN115941272A true CN115941272A (en) 2023-04-07

Family

ID=86554703

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211383438.3A Pending CN115941272A (en) 2022-11-07 2022-11-07 Storage method and storage device for cloud mobile phone behavior data and electronic equipment

Country Status (1)

Country Link
CN (1) CN115941272A (en)

Similar Documents

Publication Publication Date Title
CN110300133B (en) Cross-domain data transmission method, device, equipment and storage medium
CN106357609B (en) A kind of method and system, public network server and private clound equipment creating user
US8914864B1 (en) Temporary virtual identities in a social networking system
CN109413096B (en) A kind of login method and device more applied
CN110351269A (en) The method for logging in open platform by third-party server
CN111176794B (en) Container management method, device and readable storage medium
US9973513B2 (en) Method and apparatus for communication number update
CN109802919B (en) Web page access intercepting method and device
CN103220344A (en) Method and system for using microblog authorization
CN107133516B (en) Authority control method and system
US20110060789A1 (en) File transfer security system and method
CN113938886B (en) Identity authentication platform testing method, device, equipment and storage medium
CN111367821B (en) Software testing method and system
CN115225707A (en) Resource access method and device
CN110197075A (en) Resource access method, calculates equipment and storage medium at device
CN111241523B (en) Authentication processing method, device, equipment and storage medium
CN114139135B (en) Equipment login management method, device and storage medium
CN114189553B (en) Flow playback method, system and computing device
CN112241544B (en) Service system, access method, access device, computer equipment and storage medium
CN113852639A (en) Data processing method and device, electronic equipment and computer readable storage medium
US11700280B2 (en) Multi-tenant authentication framework
CN112699034A (en) Virtual login user construction method, device, equipment and storage medium
CN115941272A (en) Storage method and storage device for cloud mobile phone behavior data and electronic equipment
CN114428737A (en) Communication method, device, equipment and storage medium based on micro service system
CN114201494A (en) Cloud document data processing method, device, equipment, storage medium and product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination