Method and server for monitoring network user behavior

A network user and server technology, applied in the computer field, can solve problems such as inaccurate network user behavior monitoring and complex user behavior execution, and achieve the effect of reducing impact and ensuring security

Active Publication Date: 2012-08-01
ALIBABA GRP HLDG LTD
View PDF3 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The purpose of this application is to provide a network user behavior monitoring method and server to solve the probl

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and server for monitoring network user behavior
  • Method and server for monitoring network user behavior
  • Method and server for monitoring network user behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] Embodiment 1 of the present application provides a method for monitoring network user behavior, as shown in FIG. 1(a) and FIG. 1(b), the method includes a behavior statistics period and a behavior processing period. The behavior statistics period is the process of collecting statistics on the behavior of network users within the set period of time, and the behavior processing period is the process of processing network users according to the violation information determined within the set period of time after the set period of time ends.

[0032] The specific description of the behavior statistics period is as follows:

[0033] Step 101: The server receives an action execution request including the identifier of the network user within a first set time period.

[0034] In this step, before a network user accesses the network server or sends information to other network users, he needs to first send a behavior execution request containing his own identity to the server. ...

Embodiment 2

[0064] Embodiment 2 of the present application describes the scheme of Embodiment 1 in detail through a specific example.

[0065] Assume that the behavior of the network user in the second embodiment is that the instant messaging client checks the buddy list, such as figure 2 As shown, it is the number of people corresponding to different viewing times within three days. Taking 1 viewing as an example, 26,458 people viewed it once on the first day, 29,567 people viewed it once on the second day, and 25,962 people viewed it on the third day 1 time.

[0066] from figure 2 It can be seen from the figure that the vast majority of network users check the friends list within 14 times a day, and a small number of network users check the friends list 15-19 times a day, but when the number of times they check the friend list is 20 times a day , the number of people suddenly increased, it can be considered that the number of times to check the friends list is 20 times a day is the cr...

Embodiment 3

[0099] As shown in Figure 3 (a), it is a schematic diagram of the server structure of a network user behavior monitoring provided in Embodiment 3 of the present application, including a number determination module 11, a first judgment module 12, a second judgment module 13 and a verification module 14 , wherein: the number of times determination module 11 is used to determine the number of behaviors that the network user corresponding to the identifier has performed in the first set time period when receiving a behavior execution request that includes the network user identifier within the first set duration; the first The judging module 12 is used to judge whether the number of times of the behavior reaches the first threshold, and when the first threshold is reached, record the identification of the network user, and trigger the second judging module 13; the second judging module 13 is used to judge the Whether the execution times reach the second threshold, and trigger the v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a server for monitoring network user behavior, mainly comprising the steps of: taking an executed behavior frequency in a preset time length as a judgment reference for judging whether a verification code needs to be input or not, recording an identifier of the user into a violation list when the executed behavior frequency reaches a first threshold value, and asking the user to input a verification code for indicating legitimacy of the user when the executed behavior frequency reaches a higher second threshold value, and determining whether to respond to the behavior execution request from the user, thereby shielding the user behavior of execution through a robot method, and preventing highly active user from being incorrectly operated. When the user initiates a behavior execution request again, the network user corresponding to the identifier recorded in the violation list needs to input a verification code again for indicating legitimacy thereof, thereby ensuring the security of the user behavior and reducing the impact on user service experience.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a network user behavior monitoring method and server. Background technique [0002] With the continuous development of network technology, more and more users conduct information exchange, shopping, etc. through the network. The unlimited potential of the network also allows criminals to take the opportunity to sneak in. They attack the network server through high-frequency access, or spread advertisements through the network, which threatens the security of the network. [0003] In order to improve network security and prevent high-frequency attacks and malicious dissemination of advertisements, the following two schemes for monitoring the behavior of network users are proposed: [0004] The first network user behavior monitoring solution is to monitor the frequency of user behavior, and its specific content is: [0005] First, the behavior of network users is coun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/26
Inventor 侯雷明
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products