Movatterモバイル変換


[0]ホーム

URL:


CN112463429A - Information processing method and device - Google Patents

Information processing method and device
Download PDF

Info

Publication number
CN112463429A
CN112463429ACN202011401990.1ACN202011401990ACN112463429ACN 112463429 ACN112463429 ACN 112463429ACN 202011401990 ACN202011401990 ACN 202011401990ACN 112463429 ACN112463429 ACN 112463429A
Authority
CN
China
Prior art keywords
client
time period
log
target time
manipulated
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011401990.1A
Other languages
Chinese (zh)
Inventor
刘文军
彭飞
邓竹立
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing 58 Information Technology Co Ltd
Original Assignee
Beijing 58 Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing 58 Information Technology Co LtdfiledCriticalBeijing 58 Information Technology Co Ltd
Priority to CN202011401990.1ApriorityCriticalpatent/CN112463429A/en
Publication of CN112463429ApublicationCriticalpatent/CN112463429A/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Landscapes

Abstract

Translated fromChinese

本申请示出了一种信息处理方法及装置。在本申请中,客户端可以向服务端发送对解决客户端的异常有帮助的操控行为日志即可,例如,客户端可以向服务端发送客户端在目标时间段内被操控的操控行为日志即可,而可以不向服务端发送客户端在非目标时间段内被操控的操控行为日志。如此,可以减少客户端向服务端发送的操控行为日志的数量,进而可以节省网络资源。另外,通过本申请,服务端得到的操控行为日志往往是对技术人员解决客户端的异常有帮助的操控行为日志,相当于已经自动地帮助技术人员筛选好了定位客户端的异常(复现异常的路径)的日志,技术人员直接使用即可,可以不再人工筛选,从而可以降低人工成本。

Figure 202011401990

This application shows an information processing method and apparatus. In this application, the client can send the server a log of manipulation behavior that is helpful for solving the abnormality of the client. For example, the client can send the log of the manipulation behavior that the client is manipulated within the target time period to the server. , and the manipulation behavior log of the client being manipulated within the non-target time period may not be sent to the server. In this way, the number of manipulation behavior logs sent by the client to the server can be reduced, thereby saving network resources. In addition, through this application, the control behavior log obtained by the server is often a control behavior log that is helpful for technicians to solve the abnormality of the client, which is equivalent to automatically helping the technician to screen and locate the abnormality of the client (the path to reproduce the abnormality). ) logs, which can be directly used by technicians, and can no longer be manually screened, thereby reducing labor costs.

Figure 202011401990

Description

Information processing method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to an information processing method and apparatus.
Background
With the popularization of smart phones, clients (application programs) on smart phones are involved in various industries, and people can do various things through the clients.
In order to ensure the stability of the client, behavior logs of users in the process of using the client can be collected, for example, each client can collect behavior logs of a large number of users using the respective client, and send the collected behavior logs to the server in real time after collecting the behavior logs. The server stores the behavior logs sent by the clients and respectively stores the behavior logs sent by the clients, and technicians can solve the client abnormity according to the behavior logs to keep the stability of the clients.
The inventor finds that, in a general case, only a few very individual users have a client exception when using the client, that is, only the control behavior logs of the few very individual users in the process of using the client will have an effect on solving the client exception, and the control behavior logs of other users in the process of using the client will not have an effect on solving the client exception, so that collection of the control behavior logs of other users in the process of using the client is redundant.
Therefore, the above method wastes most of the network traffic of the mobile phone where the client is located.
Disclosure of Invention
In order to solve the technical problem, the present application shows an information processing method and apparatus.
In a first aspect, the present application shows an information processing method applied to a server, where the method includes:
receiving an abnormal indication, wherein the abnormal indication is used for indicating that the client has an abnormality in a target time period;
generating an obtaining request according to the abnormal indication, wherein the obtaining request is used for obtaining a control behavior log controlled by the client in the target time period;
sending the acquisition request to a client;
and receiving a control behavior log which is returned by the client according to the acquisition request and is controlled by the client in the target time period.
In an optional implementation manner, the anomaly indication is further used for indicating that an anomaly exists in a target service line of the client within the target time period; the obtaining request is used for obtaining a control behavior log of the target service line of the client terminal controlled in the target time period;
the receiving of the control behavior log, which is returned by the client according to the acquisition request and is controlled by the client within the target time period, includes:
and receiving a control behavior log of the target service line of the client terminal which is controlled in the target time period.
In an optional implementation manner, the receiving a control behavior log returned by the client according to the acquisition request and controlled by the client within the target time period includes:
receiving an encrypted log returned by the client according to the acquisition request, wherein the encrypted log is obtained by encrypting a control behavior log which is controlled by the client in the target time period by the client;
and decrypting the encrypted log to obtain a control behavior log which is controlled by the client in the target time period.
In a second aspect, the present application shows an information processing method applied to a client, the method including:
receiving an acquisition request sent by a server, wherein the acquisition request is sent to a client by the server after receiving an abnormal indication, the abnormal indication is used for indicating that the client is abnormal in a target time period, and the acquisition request is used for acquiring a control behavior log controlled by the client in the target time period;
acquiring a control behavior log which is controlled by the client in the target time period from a plurality of control behavior logs which are stored in the client and controlled by the client according to the acquisition request;
and sending the control behavior log of the client controlled in the target time period to a server.
In an optional implementation manner, the anomaly indication is further used for indicating that an anomaly exists in a target service line of the client within the target time period;
the obtaining, according to the obtaining request, a manipulated behavior log of the client manipulated in the target time period from a plurality of manipulated behavior logs of the client that have been stored in the client and manipulated by the client includes:
acquiring a control behavior log of the target service line of the client controlled in the target time period according to the acquisition request;
and sending the control behavior log of the client controlled in the target time period to a server, wherein the sending comprises:
and sending a control behavior log of the target service line of the client terminal controlled in the target time period to a server terminal.
In an optional implementation, the method further includes:
acquiring a manipulated behavior log of the client based on a buried point set in the client;
encrypting the collected control behavior log to obtain an encrypted log;
storing the encrypted log in the client.
In an optional implementation manner, the obtaining, according to the obtaining request, a manipulated behavior log that is manipulated by the client within the target time period from a plurality of manipulated behavior logs that are stored by the client and manipulated by the client, includes:
acquiring an encrypted log corresponding to a control behavior log controlled by the client in the target time period from the stored encrypted logs;
and sending the control behavior log of the client controlled in the target time period to a server, wherein the sending comprises:
and sending the acquired encryption log.
In an optional implementation manner, the sending, to the server, the log of the manipulation behavior manipulated by the client within the target time period includes:
encrypting the operation and control behavior log controlled by the client in the target time period to obtain an encrypted log;
and sending the encrypted log to the server.
In an optional implementation, the method further includes:
and deleting at least one control behavior log according to the sequence of the storage time of the control behavior logs in the client from early to late under the condition that the space occupied by the control behavior logs stored in the client is larger than a preset space, so that the space occupied by the rest control behavior logs in the client is smaller than or equal to the preset space.
In a third aspect, the present application shows an information processing apparatus applied to a server, the apparatus comprising:
the client comprises a first receiving module, a second receiving module and a sending module, wherein the first receiving module is used for receiving an abnormal indication which is used for indicating that the client has abnormality in a target time period;
the generating module is used for generating an obtaining request according to the abnormal indication, wherein the obtaining request is used for obtaining a control behavior log controlled by the client in the target time period;
the first sending module is used for sending the acquisition request to a client;
and the second receiving module is used for receiving a control behavior log which is returned by the client according to the acquisition request and is controlled by the client in the target time period.
In an optional implementation manner, the anomaly indication is further used for indicating that an anomaly exists in a target service line of the client within the target time period; the obtaining request is used for obtaining a control behavior log of the target service line of the client terminal controlled in the target time period;
the second receiving module includes:
a first receiving unit, configured to receive a control behavior log that the target service line of the client is controlled in the target time period.
In an optional implementation manner, the second receiving module includes:
a second receiving unit, configured to receive an encrypted log returned by the client according to the acquisition request, where the encrypted log is obtained by encrypting, by the client, a control behavior log that is controlled by the client within the target time period;
and the decryption unit is used for decrypting the encrypted log to obtain the control behavior log which is controlled by the client in the target time period.
In a fourth aspect, the present application shows an information processing apparatus applied to a client, the apparatus comprising:
a third receiving module, configured to receive an acquisition request sent by a server, where the acquisition request is sent to a client by the server after receiving an exception indication, the exception indication is used to indicate that the client has an exception in a target time period, and the acquisition request is used to acquire a control behavior log that the client is controlled in the target time period;
the acquisition module is used for acquiring the operation and control behavior logs operated and controlled by the client in the target time period from a plurality of operation and control behavior logs operated and controlled by the client, which are stored by the client, according to the acquisition request;
and the second sending module is used for sending the control behavior log which is controlled by the client in the target time period to the server.
In an optional implementation manner, the anomaly indication is further used for indicating that an anomaly exists in a target service line of the client within the target time period;
the acquisition module includes:
a first obtaining unit, configured to obtain, according to the obtaining request, a control behavior log that is controlled by the target service line of the client within the target time period;
and the second sending module comprises:
and the first sending unit is used for sending the control behavior log of the target service line of the client controlled in the target time period to a server.
In an optional implementation, the apparatus further comprises:
the acquisition module is used for acquiring a control behavior log controlled by the client based on a buried point set in the client;
the encryption module is used for encrypting the collected control behavior logs to obtain encrypted logs;
and the storage module is used for storing the encrypted log in the client.
In an optional implementation manner, the obtaining module includes:
the second obtaining unit is used for obtaining an encrypted log corresponding to a control behavior log controlled by the client in the target time period from the stored encrypted logs;
and the second sending module comprises:
and a second transmitting unit for transmitting the acquired encryption log.
In an optional implementation manner, the second sending module includes:
the encryption unit is used for encrypting the control behavior log controlled by the client in the target time period to obtain an encrypted log;
and the third sending unit is used for sending the encrypted log to the server.
In an optional implementation, the apparatus further comprises:
and the deleting module is used for deleting at least one control behavior log according to the sequence of the storage time of the control behavior logs in the client from early to late under the condition that the space occupied by the control behavior logs stored in the client is larger than a preset space, so that the space occupied by the rest control behavior logs in the client is smaller than or equal to the preset space.
In a fifth aspect, the present application illustrates an electronic device comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to perform the information processing method according to the first aspect.
In a sixth aspect, the present application shows a non-transitory computer-readable storage medium having instructions which, when executed by a processor of an electronic device, enable the electronic device to perform the information processing method according to the first aspect.
In a seventh aspect, the present application shows a computer program product, wherein instructions of the computer program product, when executed by a processor of an electronic device, enable the electronic device to perform the information processing method according to the first aspect.
In an eighth aspect, the present application illustrates an electronic device comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to execute the information processing method according to the second aspect.
In a ninth aspect, the present application shows a non-transitory computer-readable storage medium having instructions which, when executed by a processor of an electronic device, enable the electronic device to perform the information processing method of the second aspect.
In a tenth aspect, the present application shows a computer program product, in which instructions, when executed by a processor of an electronic device, enable the electronic device to perform the information processing method according to the second aspect.
The technical scheme provided by the application can comprise the following beneficial effects:
in the application, the server receives an abnormal indication, the abnormal indication is used for indicating that the client is abnormal in a target time period, an obtaining request is generated according to the abnormal indication, the obtaining request is used for obtaining a control behavior log controlled by the client in the target time period, and the obtaining request is sent to the client. The client receives the acquisition request, acquires the operation and control behavior log operated and controlled by the client in a target time period from a plurality of operation and control behavior logs operated and controlled by the client stored in the client according to the acquisition request, and sends the operation and control behavior log operated and controlled by the client in the target time period to the server. And the server receives the control behavior log which is controlled by the client in the target time period.
In the application, the client may send, to the server, a control behavior log that is helpful for solving the anomaly of the client, for example, the client may send, to the server, the control behavior log that the client is controlled in the target time period, and may not send, to the server, the control behavior log that the client is controlled in the non-target time period. Therefore, the number of the operation and control behavior logs sent to the server by the client can be reduced, and network resources can be saved.
And secondly, when the client is abnormal, the server can obtain the control behavior log of the client which is controlled, but can not obtain all the control behavior logs of the clients which are controlled. For example, the server may obtain the manipulated behavior log of the client that has the abnormality, and may not obtain the manipulated behavior log of the client that has not the abnormality, so that the client that has the abnormality may send the manipulated behavior log to the server, and the client that has not the abnormality may not send the manipulated behavior log to the server, thereby saving network resources of the terminal where the client that has not the abnormality is located. And the number of the operation and control behavior logs obtained by the server can be reduced, so that the storage resource of the server can be saved.
In addition, through the application, the control behavior log obtained by the server is often a control behavior log helpful for technical staff to solve the abnormity of the client, and is equivalent to a log which automatically helps the technical staff to screen the abnormity (the abnormal path is reproduced) of the positioning client, the technical staff can directly use the log, manual screening can be omitted, and therefore labor cost can be reduced.
Drawings
Fig. 1 is a block diagram of an information processing structure of the present application.
FIG. 2 is a flow chart of steps of an information processing method of the present application.
Fig. 3 is a block diagram of a configuration of an information processing apparatus according to the present application.
Fig. 4 is a block diagram of a configuration of an information processing apparatus according to the present application.
Fig. 5 is a block diagram of an electronic device shown in the present application.
Fig. 6 is a block diagram of an electronic device shown in the present application.
Detailed Description
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, the present application is described in further detail with reference to the accompanying drawings and the detailed description.
Referring to fig. 1, a block diagram of an information processing system according to the present application is shown, where the system includes at least aclient 01 and aserver 02, theclient 01 may include an Application (APP) installed on a terminal, and theclient 01 and theserver 02 are connected in communication. The terminal comprises a mobile phone or a tablet computer and the like.
Theserver 02 includes a background server corresponding to theclient 01, and the like, for example, theclient 01 and theserver 02 may belong to the same vendor, and theserver 02 may provide a data service for theclient 01, for example, theclient 01 may obtain data from theserver 02.
Referring to fig. 2, a flowchart illustrating steps of an information processing method according to the present application is shown, where the method may be applied to the system shown in fig. 1, and the method may specifically include the following steps:
in step S101, the server receives an exception indication, which indicates that the client has an exception within a target time period.
In an embodiment of the application, whether a client is abnormal or not can be monitored based on quality tracking service tools (such as Bugly) such as Crash monitoring and Crash analysis, and when the client is monitored to be abnormal, a target time period in which the time (often lasting for a period of time) when the client is abnormal is determined, and then an abnormal indication can be generated, wherein the abnormal indication carries unique identification information of the client and the target time period, and the abnormal indication is used for indicating that the client is abnormal in the target time period. Then, the abnormal indication may be sent to the server, so that the server may perceive that the client has an abnormality in the target time period according to the abnormal indication, and then step S102 may be executed.
In an embodiment of the application, in a process that a user uses a client, if an application is found to be abnormal, the user may determine a target time period in which a time (often lasting for a period of time) when the client is abnormal, and then manually generate an abnormal indication on the client, where the abnormal indication carries unique identification information of the client and the target time period, and the abnormal indication is used for indicating that the client is abnormal in the target time period. Then, the client is manually controlled to send the abnormal indication to the server, so that the server can perceive that the client has an abnormality in the target time period according to the abnormal indication, and then step S102 can be executed.
Wherein, the unique identification information of different clients is different. The unique identification information of the client may include identification information of a terminal where the client is located, and the identification information of the terminal includes an IMEI (International Mobile Equipment Identity) or an MEID (Mobile Equipment Identity) of the terminal.
In step S102, the server generates an obtaining request according to the abnormal indication, where the obtaining request is used to obtain a control behavior log that is controlled by the client within a target time period.
In order to solve the abnormality, the server needs to acquire a control behavior log of the user control client and provide the control behavior log to the technical staff.
In an embodiment, because the client has an abnormality in the target time period, the client may obtain the control behavior log that the client is controlled in the target time period, and then the client may send the control behavior log that the client is controlled in the target time period to the server, and after sending the control behavior log that the client is controlled in the target time period to the server, a technician may view the control behavior log that the client is controlled in the target time period on the server, and then may locate the abnormality (duplicate the abnormal path) of the client according to the control behavior log that the client is controlled in the target time period, and solve the abnormality.
The control behavior log which is controlled by the client in the non-target time period generally has little help for solving the abnormity of the client, so that the client does not acquire the control behavior log which is controlled by the client in the non-target time period. The control behavior logs which are controlled by the client in the non-target time period are not sent to the server, so that the number of the control behavior logs which need to be sent to the server by the client can be reduced, and the network resources of the terminal where the client is located can be saved.
In this application, when the server needs to obtain the operation and control behavior log that the client is operated and controlled within the target time period, the server may generate an obtaining request, and then execute step S103. The obtaining request carries a target time period, for example, a start time and an end time of the target time period, and the obtaining request is used for obtaining a control behavior log that is controlled by the client in the target time period.
In step S103, the server sends the acquisition request to the client.
In the application, the server may send the obtaining request to the client based on a communication connection with the client.
In step S104, the client receives the acquisition request.
In the present application, the client may receive the obtaining request based on a communication connection with the server.
In step S105, the client acquires, according to the acquisition request, a manipulated behavior log that the client is manipulated within the target time period from a plurality of manipulated behavior logs that the client has manipulated and stored in the client.
In the application, after the client is successfully installed on the terminal, each time the user starts the client on the terminal and controls the client, the client records a control behavior log of each user for controlling the client, and simultaneously records the control time when the user controls the client. For example, a corresponding entry may be formed by a control behavior log of a user controlling the client and a control time when the user controls the client, and the entry may be stored in a corresponding relationship between the control behavior log and the control time.
In this way, in this step, when the client needs to obtain the control behavior log that the client is controlled within the target time period, the client may search for the control time within the target time period in the correspondence between the control behavior log and the control time, and then search for the control behavior log corresponding to the searched control time in the correspondence between the control behavior log and the control time.
In step S106, the client sends, to the server, a control behavior log that the client is controlled in the target time period.
In the application, the client side can send the control behavior log which is controlled by the client side in the target time period to the server side based on the communication connection with the server side.
In step S107, the server receives the handling behavior log that the client is handled within the target time period.
In the application, the server side can receive the control behavior log which is controlled by the client side in the target time period based on the communication connection with the client side.
And then the server can output the control behavior log controlled by the client in the target time period for a technician to check, so that the technician can position the log of the client with the exception (the abnormal path is reproduced) according to the control behavior log controlled by the client in the target time period, and the exception of the client is solved.
In the application, the server receives an abnormal indication, the abnormal indication is used for indicating that the client is abnormal in a target time period, an obtaining request is generated according to the abnormal indication, the obtaining request is used for obtaining a control behavior log controlled by the client in the target time period, and the obtaining request is sent to the client. The client receives the acquisition request, acquires the operation and control behavior log operated and controlled by the client in a target time period from a plurality of operation and control behavior logs operated and controlled by the client stored in the client according to the acquisition request, and sends the operation and control behavior log operated and controlled by the client in the target time period to the server. And the server receives the control behavior log which is controlled by the client in the target time period.
In the application, the client may send, to the server, a control behavior log that is helpful for solving the anomaly of the client, for example, the client may send, to the server, the control behavior log that the client is controlled in the target time period, and may not send, to the server, the control behavior log that the client is controlled in the non-target time period. Therefore, the number of the operation and control behavior logs sent to the server by the client can be reduced, and network resources can be saved.
And secondly, when the client is abnormal, the server can obtain the control behavior log of the client which is controlled, but can not obtain all the control behavior logs of the clients which are controlled. For example, the server may obtain the manipulated behavior log of the client that has the abnormality, and may not obtain the manipulated behavior log of the client that has not the abnormality, so that the client that has the abnormality may send the manipulated behavior log to the server, and the client that has not the abnormality may not send the manipulated behavior log to the server, thereby saving network resources of the terminal where the client that has not the abnormality is located. And the number of the operation and control behavior logs obtained by the server can be reduced, so that the storage resource of the server can be saved.
In addition, through the application, the control behavior log obtained by the server is often a control behavior log helpful for technical staff to solve the abnormity of the client, and is equivalent to a log which automatically helps the technical staff to screen the abnormity (the abnormal path is reproduced) of the positioning client, the technical staff can directly use the log, manual screening can be omitted, and therefore labor cost can be reduced.
In the application, the control behavior log controlled by the client often relates to the privacy of the user, and in order to avoid the situation that the control behavior log is stolen by a lawbreaker and the privacy of the user is leaked in the process of sending the control behavior log from the client to the server, in step S106, the client can encrypt the control behavior log controlled by the client in a target time period to obtain an encrypted log, and then the encrypted log is sent to the server.
When a developer develops a client, an encryption algorithm used for encrypting the control behavior log is built in the client, and a decryption algorithm used for decrypting the encrypted control behavior log is arranged on the server, wherein the decryption algorithm corresponds to the encryption algorithm.
The Encryption algorithm used for encrypting the control behavior log may include a DES (Data Encryption Standard) algorithm, an AES (Advanced Encryption Standard) algorithm, an ECC (Elliptic curve Encryption) algorithm, or an HMAC (Hash-based Message Authentication Code) algorithm.
Therefore, when the control behavior log controlled by the client in the target time period is encrypted, the client can obtain an encryption algorithm built in the client, and then encrypt the control behavior log controlled by the client in the target time period by using the obtained encryption algorithm to obtain an encrypted log.
Through encrypting the control behavior log controlled by the client in the target time period, even if lawless persons obtain the encryption log through packet capturing, the lawless persons cannot know the encryption algorithm and cannot know the decryption algorithm corresponding to the encryption algorithm, and therefore the encryption log cannot be decrypted, so that the control behavior controlled by the client in the target time period can be prevented from being leaked, and further the privacy of users is prevented from being leaked.
In addition, in order to support that the client can encrypt the control behavior log controlled by the client in the target time period to obtain an encrypted log and send the encrypted log to the server, leakage of the control behavior controlled by the client in the target time period is avoided, and further privacy of a user is avoided.
In the application, a technician may set a decryption algorithm for decrypting the encrypted control behavior log on the server in advance, so that after the server receives the encrypted log, the server may obtain the decryption algorithm built in the server, and then decrypt the encrypted log by using the decryption algorithm to obtain the control behavior log controlled by the client within the target time period.
In the embodiment shown in fig. 2 of the present application, in a process that a user uses a client, if an application is found to be abnormal, the user may determine a target time period in which a time (often lasting for a period of time) at which the client is abnormal is located, and then manually generate an abnormal indication on the client, where the abnormal indication carries unique identification information of the client and the target time period, and the abnormal indication is used to indicate that the client has an abnormality in the target time period. And then, manually controlling the client to send the abnormal indication to the server, so that the server can sense that the client has abnormality in the target time period according to the abnormal indication.
However, sometimes the user cannot accurately determine the time when the client is abnormal to be a few minutes, a few seconds or even milliseconds, and the user usually determines which minute of which hour to which minute of which hour the time period is. Thus, the determined target time period includes a time period of 1 minute less and a time period of at least 2 minutes more.
However, within a duration of at least one minute, the client may be sequentially manipulated by the user many times, and the client records the manipulation behavior log after each manipulation, but actually, only part of the manipulated behavior logs may help to solve the abnormality of the client, and other manipulated manipulation behavior logs may not help much to solve the abnormality of the client.
For example, in the present application, there are often a plurality of service lines in the client, for example, a service line for instant messaging, a service line for login, a service line for setting attributes of the client, a service line for games, a service line for placing orders, a service line for payment, a service line for rendering pages, and the like.
Suppose that a user performs control of at least two service lines on a client in a target time period, the client has an abnormality on one of the service lines and does not have an abnormality on the other service line.
Therefore, the client can obtain the operation and control behavior log of the service line of the client, which is operated and controlled in the target time period, and after the operation and control behavior log is sent to the server, a technician can locate the abnormal reproduction path (abnormal reproduction path) of the service line of the client according to the operation and control behavior of the service line of the client, which is operated and controlled in the target time period, and solve the abnormality occurring on the service line. And the client may not acquire a control behavior log that another service line of the client is controlled in the target time period. Therefore, the number of the operation and control behavior logs which need to be sent to the server side by the client side can be reduced, and further network resources of the terminal where the client side is located can be saved.
Specifically, the abnormal indication is further used for indicating that the target service line of the client is abnormal in the target time period, and the obtaining request is used for obtaining a control behavior log that the target service line of the client is controlled in the target time period. In this way, when the operation and control behavior log of the client operated in the target time period is obtained in step S105, the operation and control behavior log of the target service line of the client operated in the target time period may be obtained according to the obtaining request.
In the application, after the client is installed on the terminal, each time the user starts the client on the terminal and operates the client, the client records an operation behavior log of the user for operating the client each time, and records a service line related to the operation and an operation time when the client is operated. For example, a control behavior log for controlling the client, a service line related to the control, and a control time when the client is controlled may be formed into a corresponding entry, and stored in a corresponding relationship among the control behavior log, the service line, and the control time.
Thus, in this step, when the client needs to obtain the operation and control behavior log operated and controlled by the target service line of the client in the target time period according to the obtaining request, the client may search the operation and control time in the target time period in the correspondence relationship among the operation and control behavior log, the service line and the operation and control time, and then search the operation and control behavior log corresponding to the searched operation and control time and the target service line in the correspondence relationship among the operation and control behavior log, the service line and the operation and control time.
Then, when the control behavior log that the client is controlled in the target time period is sent to the server in step S106, the control behavior log that the target service line of the client is controlled in the target time period may be sent to the server.
Accordingly, when the operation behavior log returned by the client according to the acquisition request and operated by the client in the target time period is received in step S107, the operation behavior log operated by the target service line of the client in the target time period may be received.
In the application, after the client is installed on the terminal, each time the user starts the client on the terminal and controls the client, the client records a control behavior log of each user for controlling the client, and simultaneously records the control time when the client is controlled.
The control behavior log controlled by the client often relates to the privacy of a user, in order to avoid the situation that the control behavior log is stolen from the client by lawless persons and the privacy of the user is leaked, after the client collects the control behavior log controlled by the client based on a buried point arranged in the client, the collected control behavior log can be encrypted to obtain an encrypted log, and the encrypted log is stored in the client. For example, the collected control behavior log may be encrypted by using an encryption algorithm built in the client in the foregoing embodiment, so as to obtain an encrypted log.
For example, the encryption log and the control time when the client is controlled may be combined into a corresponding entry, and stored in the corresponding relationship between the encryption log and the control time.
In this way, in step S105, when the client needs to obtain the operation and control behavior log that the client is operated and controlled within the target time period, the client may search the operation and control time within the target time period in the correspondence between the encryption log and the operation and control time, and then search the encryption log corresponding to the searched operation and control time in the correspondence between the encryption log and the operation and control time.
Therefore, when the control behavior log which is controlled by the client in the target time period is sent to the server, the acquired encryption log can be directly sent to the client.
By the method and the device, when the control behavior log controlled by the client in the target time period needs to be sent to the server, the control behavior log controlled by the client in the target time period does not need to be encrypted in real time.
The encrypted log is obtained by encrypting the control behavior log controlled by the client in the target time period, so that the encrypted log obtained by encrypting the control behavior log controlled by the client in the target time period can be directly obtained, the time consumed by encrypting the control behavior log controlled by the client in the target time period is saved, and the efficiency of obtaining the encrypted log can be improved.
Therefore, the efficiency of obtaining the control behavior log by the server is improved on the premise of ensuring that the control behavior log is not stolen (safety).
In the application, after the client is installed on the terminal, each time the user starts the client on the terminal and controls the client, the client records the control behavior log of each control of the client by the user, and simultaneously records the control time when the client is controlled, however, as the number of times of controlling the client by the user is more and more, the control behavior log recorded in the client is more and more, and thus, more storage space is occupied.
Therefore, in order to save the storage space, when the space occupied by the control behavior logs stored in the client is larger than the preset space, at least one control behavior log is deleted according to the sequence of the storage time of the control behavior logs in the client from early to late, so that the space occupied by the remaining control behavior logs in the client is smaller than or equal to the preset space.
The storage time of the control behavior log in the client can also be understood as: the generation time of the control behavior log, or the occurrence time of the control behavior corresponding to the control behavior log on the client (the time when the user controls the client), and the like.
The preset space may be set according to specific situations, and is not described in detail herein.
Or, in another embodiment, in a general case, for any one of the manipulated behavior logs recorded by the client, which are manipulated by the client, if the client sends the manipulated behavior log to the server due to an abnormality of the client, the server may obtain the manipulated behavior log, and then a technician may attempt to solve the abnormality according to the manipulated behavior log.
Since the server has already obtained the control behavior log, the client may not record the control behavior log any more, and therefore, in order to save the storage space, the client may delete the control behavior log.
Therefore, in another embodiment of the present application, after the client sends the handling behavior log that the client is handled within the target time period to the server, the client may delete the handling behavior log that is recorded in the client and that is handled within the target time period by the client.
In one example, after the server receives a control behavior log sent by the client and controlled within a target time period, the server may send a receipt to the client to inform the client that the server has received the control behavior log sent by the client and controlled within the target time period, and after the client receives the receipt, the control behavior log recorded in the client and controlled within the target time period by the client may be deleted.
After the client sends the control behavior log of the client controlled in the target time period to the server, if the receiving receipt is not received for a long time, the server may not receive the control behavior log of the client controlled in the target time period, and the control behavior log of the client controlled in the target time period may be sent to the server again until the receiving receipt returned by the server is received, and then the control behavior log recorded in the client and controlled by the client in the target time period may be deleted.
It is noted that, for simplicity of explanation, the method embodiments are described as a series of acts or combination of acts, but those skilled in the art will appreciate that the present application is not limited by the order of acts, as some steps may, in accordance with the present application, occur in other orders and concurrently. Further, those skilled in the art will also appreciate that the embodiments described in the specification are exemplary and that no action is necessarily required in this application.
Referring to fig. 3, a block diagram of an information processing apparatus according to the present application is shown, and the apparatus is applied to a server, and specifically includes the following modules:
afirst receiving module 11, configured to receive an exception indication, where the exception indication is used to indicate that an exception exists in a target time period at a client;
agenerating module 12, configured to generate an obtaining request according to the abnormal indication, where the obtaining request is used to obtain a control behavior log that is controlled by the client within the target time period;
afirst sending module 13, configured to send the obtaining request to a client;
asecond receiving module 14, configured to receive a control behavior log returned by the client according to the obtaining request, where the control behavior log is controlled by the client within the target time period.
In an optional implementation manner, the anomaly indication is further used for indicating that an anomaly exists in a target service line of the client within the target time period; the obtaining request is used for obtaining a control behavior log of the target service line of the client terminal controlled in the target time period;
the second receiving module includes:
a first receiving unit, configured to receive a control behavior log that the target service line of the client is controlled in the target time period.
In an optional implementation manner, the second receiving module includes:
a second receiving unit, configured to receive an encrypted log returned by the client according to the acquisition request, where the encrypted log is obtained by encrypting, by the client, a control behavior log that is controlled by the client within the target time period;
and the decryption unit is used for decrypting the encrypted log to obtain the control behavior log which is controlled by the client in the target time period.
In the application, the server receives an abnormal indication, the abnormal indication is used for indicating that the client is abnormal in a target time period, an obtaining request is generated according to the abnormal indication, the obtaining request is used for obtaining a control behavior log controlled by the client in the target time period, and the obtaining request is sent to the client. The client receives the acquisition request, acquires the operation and control behavior log operated and controlled by the client in a target time period from a plurality of operation and control behavior logs operated and controlled by the client stored in the client according to the acquisition request, and sends the operation and control behavior log operated and controlled by the client in the target time period to the server. And the server receives the control behavior log which is controlled by the client in the target time period.
In the application, the client may send, to the server, a control behavior log that is helpful for solving the anomaly of the client, for example, the client may send, to the server, the control behavior log that the client is controlled in the target time period, and may not send, to the server, the control behavior log that the client is controlled in the non-target time period. Therefore, the number of the operation and control behavior logs sent to the server by the client can be reduced, and network resources can be saved.
And secondly, when the client is abnormal, the server can obtain the control behavior log of the client which is controlled, but can not obtain all the control behavior logs of the clients which are controlled. For example, the server may obtain the manipulated behavior log of the client that has the abnormality, and may not obtain the manipulated behavior log of the client that has not the abnormality, so that the client that has the abnormality may send the manipulated behavior log to the server, and the client that has not the abnormality may not send the manipulated behavior log to the server, thereby saving network resources of the terminal where the client that has not the abnormality is located. And the number of the operation and control behavior logs obtained by the server can be reduced, so that the storage resource of the server can be saved.
In addition, through the application, the control behavior log obtained by the server is often a control behavior log helpful for technical staff to solve the abnormity of the client, and is equivalent to a log which automatically helps the technical staff to screen the abnormity (the abnormal path is reproduced) of the positioning client, the technical staff can directly use the log, manual screening can be omitted, and therefore labor cost can be reduced.
Referring to fig. 4, a block diagram of an information processing apparatus according to the present application is shown, and the apparatus is applied to a client, and specifically includes the following modules:
athird receiving module 21, configured to receive an acquisition request sent by a server, where the acquisition request is sent by the server to a client after receiving an exception indication, the exception indication is used to indicate that the client has an exception in a target time period, and the acquisition request is used to acquire a control behavior log that the client is controlled in the target time period;
the obtainingmodule 22 is configured to obtain, according to the obtaining request, a manipulated behavior log that is manipulated by the client within the target time period from a plurality of manipulated behavior logs that are stored by the client and manipulated by the client;
and asecond sending module 23, configured to send, to the server, the control behavior log that is controlled by the client within the target time period.
In an optional implementation manner, the anomaly indication is further used for indicating that an anomaly exists in a target service line of the client within the target time period;
the acquisition module includes:
a first obtaining unit, configured to obtain, according to the obtaining request, a control behavior log that is controlled by the target service line of the client within the target time period;
and the second sending module comprises:
and the first sending unit is used for sending the control behavior log of the target service line of the client controlled in the target time period to a server.
In an optional implementation, the apparatus further comprises:
the acquisition module is used for acquiring a control behavior log controlled by the client based on a buried point set in the client;
the encryption module is used for encrypting the collected control behavior logs to obtain encrypted logs;
and the storage module is used for storing the encrypted log in the client.
In an optional implementation manner, the obtaining module includes:
the second obtaining unit is used for obtaining an encrypted log corresponding to a control behavior log controlled by the client in the target time period from the stored encrypted logs;
and the second sending module comprises:
and a second transmitting unit for transmitting the acquired encryption log.
In an optional implementation manner, the second sending module includes:
the encryption unit is used for encrypting the control behavior log controlled by the client in the target time period to obtain an encrypted log;
and the third sending unit is used for sending the encrypted log to the server.
In an optional implementation, the apparatus further comprises:
and the deleting module is used for deleting at least one control behavior log according to the sequence of the storage time of the control behavior logs in the client from early to late under the condition that the space occupied by the control behavior logs stored in the client is larger than a preset space, so that the space occupied by the rest control behavior logs in the client is smaller than or equal to the preset space.
In the application, the server receives an abnormal indication, the abnormal indication is used for indicating that the client is abnormal in a target time period, an obtaining request is generated according to the abnormal indication, the obtaining request is used for obtaining a control behavior log controlled by the client in the target time period, and the obtaining request is sent to the client. The client receives the acquisition request, acquires the operation and control behavior log operated and controlled by the client in a target time period from a plurality of operation and control behavior logs operated and controlled by the client stored in the client according to the acquisition request, and sends the operation and control behavior log operated and controlled by the client in the target time period to the server. And the server receives the control behavior log which is controlled by the client in the target time period.
In the application, the client may send, to the server, a control behavior log that is helpful for solving the anomaly of the client, for example, the client may send, to the server, the control behavior log that the client is controlled in the target time period, and may not send, to the server, the control behavior log that the client is controlled in the non-target time period. Therefore, the number of the operation and control behavior logs sent to the server by the client can be reduced, and network resources can be saved.
And secondly, when the client is abnormal, the server can obtain the control behavior log of the client which is controlled, but can not obtain all the control behavior logs of the clients which are controlled. For example, the server may obtain the manipulated behavior log of the client that has the abnormality, and may not obtain the manipulated behavior log of the client that has not the abnormality, so that the client that has the abnormality may send the manipulated behavior log to the server, and the client that has not the abnormality may not send the manipulated behavior log to the server, thereby saving network resources of the terminal where the client that has not the abnormality is located. And the number of the operation and control behavior logs obtained by the server can be reduced, so that the storage resource of the server can be saved.
In addition, through the application, the control behavior log obtained by the server is often a control behavior log helpful for technical staff to solve the abnormity of the client, and is equivalent to a log which automatically helps the technical staff to screen the abnormity (the abnormal path is reproduced) of the positioning client, the technical staff can directly use the log, manual screening can be omitted, and therefore labor cost can be reduced.
For the device embodiment, since it is basically similar to the method embodiment, the description is simple, and for the relevant points, refer to the partial description of the method embodiment.
Fig. 5 is a block diagram of anelectronic device 800 shown in the present application. For example, theelectronic device 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.
Referring to fig. 5,electronic device 800 may include one or more of the following components: aprocessing component 802, amemory 804, apower component 806, amultimedia component 808, anaudio component 810, an input/output (I/O)interface 812, asensor component 814, and acommunication component 816.
Theprocessing component 802 generally controls overall manipulation of theelectronic device 800, such as manipulations associated with display, telephone calls, data communications, camera manipulations, and recording manipulations. Theprocessing components 802 may include one ormore processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, theprocessing component 802 can include one or more modules that facilitate interaction between theprocessing component 802 and other components. For example, theprocessing component 802 can include a multimedia module to facilitate interaction between themultimedia component 808 and theprocessing component 802.
Thememory 804 is configured to store various types of data to support manipulation at thedevice 800. Examples of such data include instructions for any application or method being manipulated on theelectronic device 800, contact data, phonebook data, messages, images, videos, and so forth. Thememory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
Thepower supply component 806 provides power to the various components of theelectronic device 800. Thepower components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for theelectronic device 800.
Themultimedia component 808 includes a screen that provides an output interface between theelectronic device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide manipulation. In some embodiments, themultimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when thedevice 800 is in a manipulation mode, such as a photographing mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
Theaudio component 810 is configured to output and/or input audio signals. For example, theaudio component 810 includes a Microphone (MIC) configured to receive external audio signals when theelectronic device 800 is in a manipulation mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in thememory 804 or transmitted via thecommunication component 816. In some embodiments,audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between theprocessing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
Thesensor assembly 814 includes one or more sensors for providing various aspects of state assessment for theelectronic device 800. For example, thesensor assembly 814 may detect an open/closed state of thedevice 800, the relative positioning of components, such as a display and keypad of theelectronic device 800, thesensor assembly 814 may also detect a change in the position of theelectronic device 800 or a component of theelectronic device 800, the presence or absence of user contact with theelectronic device 800, orientation or acceleration/deceleration of theelectronic device 800, and a change in the temperature of theelectronic device 800.Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. Thesensor assembly 814 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, thesensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
Thecommunication component 816 is configured to facilitate wired or wireless communication between theelectronic device 800 and other devices. Theelectronic device 800 may access a wireless network based on a communication standard, such as WiFi, a carrier network (such as 2G, 3G, 4G, or 5G), or a combination thereof. In an exemplary embodiment, thecommunication component 816 receives broadcast signals or broadcast handling information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, thecommunication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, theelectronic device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium comprising instructions, such as thememory 804 comprising instructions, executable by theprocessor 820 of theelectronic device 800 to perform the above-described method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
Fig. 6 is a block diagram of anelectronic device 1900 shown in the present application. For example, theelectronic device 1900 may be provided as a server.
Referring to fig. 6,electronic device 1900 includes aprocessing component 1922 further including one or more processors and memory resources, represented bymemory 1932, for storing instructions, e.g., applications, executable byprocessing component 1922. The application programs stored inmemory 1932 may include one or more modules that each correspond to a set of instructions. Further, theprocessing component 1922 is configured to execute instructions to perform the above-described method.
Theelectronic device 1900 may also include apower component 1926 configured to perform power management of theelectronic device 1900, a wired orwireless network interface 1950 configured to connect theelectronic device 1900 to a network, and an input/output (I/O)interface 1958. Theelectronic device 1900 may operate a control system based on information stored inmemory 1932, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, or the like.
The embodiments in the present specification are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, apparatus, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, terminal devices (systems), and computer program products according to the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing terminal to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing terminal, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing terminal to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing terminal to cause a series of operational steps to be performed on the computer or other programmable terminal to produce a computer implemented process such that the instructions which execute on the computer or other programmable terminal provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
Finally, it is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or terminal that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or terminal. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or terminal that comprises the element.
The information processing method and apparatus provided by the present application are introduced in detail, and a specific example is applied in the present application to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (22)

Translated fromChinese
1.一种信息处理方法,其特征在于,应用于服务端,所述方法包括:1. An information processing method, characterized in that, applied to a server, the method comprising:接收异常指示,所述异常指示用于指示客户端在目标时间段内存在异常;receiving an abnormality indication, where the abnormality indication is used to indicate that the client is abnormal within the target time period;根据所述异常指示生成获取请求,所述获取请求用于获取所述客户端在所述目标时间段内被操控的操控行为日志;generating an acquisition request according to the abnormal indication, where the acquisition request is used to acquire the manipulation behavior log of the client being manipulated within the target time period;向客户端发送所述获取请求;sending the acquisition request to the client;接收所述客户端根据所述获取请求返回的、所述客户端在所述目标时间段内被操控的操控行为日志。Receive a manipulation behavior log that is returned by the client according to the obtaining request and that the client is manipulated within the target time period.2.根据权利要求1所述的方法,其特征在于,所述异常指示还用于指示所述客户端的目标业务线在所述目标时间段内存在异常;则所述获取请求用于获取所述客户端的所述目标业务线在所述目标时间段内被操控的操控行为日志;2 . The method according to claim 1 , wherein the abnormality indication is further used to indicate that the target business line of the client is abnormal within the target time period; then the acquisition request is used to acquire the The manipulation behavior log of the target business line of the client being manipulated within the target time period;所述接收所述客户端根据所述获取请求返回的、所述客户端在所述目标时间段内被操控的操控行为日志,包括:The receiving of the manipulation behavior log returned by the client according to the acquisition request and that the client is manipulated within the target time period, includes:接收所述客户端的所述目标业务线在所述目标时间段内被操控的操控行为日志。A manipulation behavior log of the target business line of the client being manipulated within the target time period is received.3.根据权利要求1所述的方法,其特征在于,所述接收所述客户端根据所述获取请求返回的、所述客户端在所述目标时间段内被操控的操控行为日志,包括:3 . The method according to claim 1 , wherein the receiving the manipulation behavior log returned by the client according to the obtaining request and that the client is manipulated within the target time period, comprises: 3 .接收所述客户端根据所述获取请求返回的加密日志,所述加密日志是所述客户端对所述客户端在所述目标时间段内被操控的操控行为日志加密后得到的;receiving an encrypted log returned by the client according to the acquisition request, where the encrypted log is obtained by the client after encrypting the log of manipulation behavior manipulated by the client within the target time period;对所述加密日志解密,得到所述客户端在所述目标时间段内被操控的操控行为日志。Decrypt the encrypted log to obtain a manipulation behavior log of the client being manipulated within the target time period.4.一种信息处理方法,其特征在于,应用于客户端,所述方法包括:4. An information processing method, characterized in that, applied to a client, the method comprising:接收服务端发送的获取请求,所述获取请求是服务端在接收到异常指示之后向客户端发送的,所述异常指示用于指示所述客户端在目标时间段内存在异常,所述获取请求用于获取所述客户端在所述目标时间段内被操控的操控行为日志;Receive the acquisition request sent by the server. The acquisition request is sent by the server to the client after receiving the exception indication. The abnormal indication is used to indicate that the client has an abnormality within the target time period. The acquisition request for obtaining the manipulation behavior log of the client being manipulated within the target time period;根据所述获取请求在所述客户端已存储的所述客户端被操控的多个操控行为日志中,获取所述客户端在所述目标时间段内被操控的操控行为日志;According to the obtaining request, from the plurality of manipulation behavior logs stored by the client that the client is manipulated, obtain the manipulation behavior logs that the client is manipulated within the target time period;向服务端发送所述客户端在所述目标时间段内被操控的操控行为日志。Sending a manipulation behavior log of the client being manipulated within the target time period to the server.5.根据权利要求4所述的方法,其特征在于,所述异常指示还用于指示所述客户端的目标业务线在所述目标时间段内存在异常;5. The method according to claim 4, wherein the abnormality indication is further used to indicate that the target business line of the client is abnormal within the target time period;则所述根据所述获取请求在所述客户端已存储的所述客户端被操控的多个操控行为日志中,获取所述客户端在所述目标时间段内被操控的操控行为日志,包括:Then, according to the obtaining request, from the plurality of manipulation behavior logs that the client has been manipulated and stored by the client, obtain the manipulation behavior logs that the client is manipulated within the target time period, including: :根据所述获取请求获取所述客户端的所述目标业务线在所述目标时间段内被操控的操控行为日志;Obtaining, according to the obtaining request, a log of manipulation behaviors of the target business line of the client being manipulated within the target time period;以及,所述向服务端发送所述客户端在所述目标时间段内被操控的操控行为日志,包括:And, the sending to the server the manipulation behavior log of the client being manipulated within the target time period includes:向服务端发送所述客户端的所述目标业务线在所述目标时间段内被操控的操控行为日志。Sending a manipulation behavior log of the target business line of the client being manipulated within the target time period to the server.6.根据权利要求4所述的方法,其特征在于,所述方法还包括:6. The method according to claim 4, wherein the method further comprises:基于在所述客户端中设置的埋点采集所述客户端被操控的操控行为日志;Collect the manipulation behavior log that the client is manipulated based on the buried point set in the client;对采集的操控行为日志加密,得到加密日志;Encrypt the collected manipulation behavior logs to obtain encrypted logs;在所述客户端中存储所述加密日志。The encrypted log is stored in the client.7.根据权利要求6所述的方法,其特征在于,所述根据所述获取请求在所述客户端已存储的所述客户端被操控的多个操控行为日志中,获取所述客户端在所述目标时间段内被操控的操控行为日志,包括:7 . The method according to claim 6 , wherein, according to the obtaining request, from a plurality of manipulation behavior logs that the client is manipulated and stored by the client, obtain the The log of manipulation behaviors manipulated within the target time period, including:在已存储的加密日志中,获取所述客户端在所述目标时间段内被操控的操控行为日志对应的加密日志;From the stored encrypted log, obtain the encrypted log corresponding to the manipulation behavior log manipulated by the client within the target time period;以及,所述向服务端发送所述客户端在所述目标时间段内被操控的操控行为日志,包括:And, the sending to the server the manipulation behavior log of the client being manipulated within the target time period includes:发送获取的加密日志。Send the obtained encrypted log.8.根据权利要求4所述的方法,其特征在于,所述向服务端发送所述客户端在所述目标时间段内被操控的操控行为日志,包括:8 . The method according to claim 4 , wherein the sending, to the server, a log of manipulation behavior that the client is manipulated within the target time period, comprises: 8 .对所述客户端在所述目标时间段内被操控的操控行为日志加密,得到加密日志;Encrypt the manipulation behavior log that the client is manipulated within the target time period to obtain an encrypted log;向所述服务端发送加密日志。Send encrypted logs to the server.9.根据权利要求4所述的方法,其特征在于,所述方法还包括:9. The method of claim 4, wherein the method further comprises:在所述客户端中存储的操控行为日志所占空间大于预设空间的情况下,按照操控行为日志在所述客户端中的存储时刻由早至晚的顺序,删除至少一个操控行为日志,以使所述客户端中剩余的操控行为日志所占空间小于或等于所述预设空间。In the case where the space occupied by the manipulation behavior logs stored in the client is larger than the preset space, at least one manipulation behavior log is deleted according to the storage time of the manipulation behavior logs in the client from early to late. The space occupied by the remaining manipulation behavior logs in the client is less than or equal to the preset space.10.一种信息处理装置,其特征在于,应用于服务端,所述装置包括:10. An information processing device, characterized in that, applied to a server, the device comprising:第一接收模块,用于接收异常指示,所述异常指示用于指示客户端在目标时间段内存在异常;a first receiving module, configured to receive an abnormality indication, where the abnormality indication is used to indicate that the client is abnormal within the target time period;生成模块,用于根据所述异常指示生成获取请求,所述获取请求用于获取所述客户端在所述目标时间段内被操控的操控行为日志;a generating module, configured to generate an acquisition request according to the abnormal indication, where the acquisition request is used to acquire a manipulation behavior log of the client being manipulated within the target time period;第一发送模块,用于向客户端发送所述获取请求;a first sending module, configured to send the acquisition request to the client;第二接收模块,用于接收所述客户端根据所述获取请求返回的、所述客户端在所述目标时间段内被操控的操控行为日志。The second receiving module is configured to receive the manipulation behavior log returned by the client according to the obtaining request and that the client is manipulated within the target time period.11.根据权利要求10所述的装置,其特征在于,所述异常指示还用于指示所述客户端的目标业务线在所述目标时间段内存在异常;则所述获取请求用于获取所述客户端的所述目标业务线在所述目标时间段内被操控的操控行为日志;11 . The device according to claim 10 , wherein the abnormality indication is further used to indicate that the target business line of the client is abnormal within the target time period; then the acquisition request is used to acquire the The manipulation behavior log of the target business line of the client being manipulated within the target time period;所述第二接收模块包括:The second receiving module includes:第一接收单元,用于接收所述客户端的所述目标业务线在所述目标时间段内被操控的操控行为日志。A first receiving unit, configured to receive a manipulation behavior log of the target business line of the client being manipulated within the target time period.12.根据权利要求10所述的装置,其特征在于,所述第二接收模块包括:12. The apparatus according to claim 10, wherein the second receiving module comprises:第二接收单元,用于接收所述客户端根据所述获取请求返回的加密日志,所述加密日志是所述客户端对所述客户端在所述目标时间段内被操控的操控行为日志加密后得到的;a second receiving unit, configured to receive an encrypted log returned by the client according to the acquisition request, where the encrypted log is the log of the manipulation behavior manipulated by the client within the target time period encrypted by the client obtained after解密单元,用于对所述加密日志解密,得到所述客户端在所述目标时间段内被操控的操控行为日志。A decryption unit, configured to decrypt the encrypted log to obtain a manipulation behavior log of the client being manipulated within the target time period.13.一种信息处理装置,其特征在于,应用于客户端,所述装置包括:13. An information processing device, characterized in that, applied to a client, the device comprising:第三接收模块,用于接收服务端发送的获取请求,所述获取请求是服务端在接收到异常指示之后向客户端发送的,所述异常指示用于指示所述客户端在目标时间段内存在异常,所述获取请求用于获取所述客户端在所述目标时间段内被操控的操控行为日志;The third receiving module is configured to receive an acquisition request sent by the server, where the acquisition request is sent by the server to the client after receiving an abnormal indication, and the abnormal indication is used to indicate that the client is in the memory of the target time period In the case of an exception, the obtaining request is used to obtain the manipulation behavior log of the client being manipulated within the target time period;获取模块,用于根据所述获取请求在所述客户端已存储的所述客户端被操控的多个操控行为日志中,获取所述客户端在所述目标时间段内被操控的操控行为日志;an acquisition module, configured to acquire, according to the acquisition request, a log of the manipulation behavior that the client is manipulated within the target time period from among the multiple manipulation behavior logs that the client has been manipulated and stored by the client ;第二发送模块,用于向服务端发送所述客户端在所述目标时间段内被操控的操控行为日志。The second sending module is configured to send the manipulation behavior log of the client being manipulated within the target time period to the server.14.根据权利要求13所述的装置,其特征在于,所述异常指示还用于指示所述客户端的目标业务线在所述目标时间段内存在异常;The apparatus according to claim 13, wherein the abnormality indication is further used to indicate that the target business line of the client is abnormal within the target time period;所述获取模块包括:The acquisition module includes:第一获取单元,用于根据所述获取请求获取所述客户端的所述目标业务线在所述目标时间段内被操控的操控行为日志;a first obtaining unit, configured to obtain, according to the obtaining request, a log of manipulation behaviors of the target business line of the client being manipulated within the target time period;以及,所述第二发送模块包括:And, the second sending module includes:第一发送单元,用于向服务端发送所述客户端的所述目标业务线在所述目标时间段内被操控的操控行为日志。A first sending unit, configured to send a manipulation behavior log of the target business line of the client being manipulated within the target time period to the server.15.根据权利要求13所述的装置,其特征在于,所述装置还包括:15. The apparatus of claim 13, wherein the apparatus further comprises:采集模块,用于基于在所述客户端中设置的埋点采集所述客户端被操控的操控行为日志;a collection module, configured to collect the manipulation behavior log of the client being manipulated based on the buried point set in the client;加密模块,用于对采集的操控行为日志加密,得到加密日志;The encryption module is used to encrypt the collected manipulation behavior log to obtain the encrypted log;存储模块,用于在所述客户端中存储所述加密日志。A storage module, configured to store the encrypted log in the client.16.根据权利要求15所述的装置,其特征在于,所述获取模块包括:16. The apparatus according to claim 15, wherein the acquiring module comprises:第二获取单元,用于在已存储的加密日志中,获取所述客户端在所述目标时间段内被操控的操控行为日志对应的加密日志;a second obtaining unit, configured to obtain, from the stored encrypted log, the encrypted log corresponding to the manipulation behavior log manipulated by the client within the target time period;以及,所述第二发送模块包括:And, the second sending module includes:第二发送单元,用于发送获取的加密日志。The second sending unit is configured to send the obtained encrypted log.17.根据权利要求13所述的装置,其特征在于,所述第二发送模块包括:17. The apparatus according to claim 13, wherein the second sending module comprises:加密单元,用于对所述客户端在所述目标时间段内被操控的操控行为日志加密,得到加密日志;an encryption unit, configured to encrypt the manipulation behavior log that the client is manipulated within the target time period to obtain an encrypted log;第三发送单元,用于向所述服务端发送加密日志。The third sending unit is configured to send the encrypted log to the server.18.根据权利要求13所述的装置,其特征在于,所述装置还包括:18. The apparatus of claim 13, wherein the apparatus further comprises:删除模块,用于在所述客户端中存储的操控行为日志所占空间大于预设空间的情况下,按照操控行为日志在所述客户端中的存储时刻由早至晚的顺序,删除至少一个操控行为日志,以使所述客户端中剩余的操控行为日志所占空间小于或等于所述预设空间。The deletion module is configured to delete at least one of the manipulation behavior logs in the order from early to late in the order of the storage time of the manipulation behavior logs in the client under the condition that the space occupied by the manipulation behavior logs stored in the client is larger than the preset space. The behavior log is manipulated, so that the space occupied by the remaining manipulation behavior log in the client is less than or equal to the preset space.19.一种电子设备,其特征在于,所述电子设备包括:19. An electronic device, characterized in that the electronic device comprises:处理器;processor;用于存储处理器可执行指令的存储器;memory for storing processor-executable instructions;其中,所述处理器被配置为执行如权利要求1-3任一项所述的信息处理方法。Wherein, the processor is configured to execute the information processing method according to any one of claims 1-3.20.一种非临时性计算机可读存储介质,当所述存储介质中的指令由电子设备的处理器执行时,使得电子设备能够执行如权利要求1-3任一项所述的信息处理方法。20. A non-transitory computer-readable storage medium, when the instructions in the storage medium are executed by a processor of an electronic device, the electronic device can execute the information processing method according to any one of claims 1-3 .21.一种电子设备,其特征在于,所述电子设备包括:21. An electronic device, characterized in that the electronic device comprises:处理器;processor;用于存储处理器可执行指令的存储器;memory for storing processor-executable instructions;其中,所述处理器被配置为执行如权利要求4-9任一项所述的信息处理方法。Wherein, the processor is configured to execute the information processing method according to any one of claims 4-9.22.一种非临时性计算机可读存储介质,当所述存储介质中的指令由电子设备的处理器执行时,使得电子设备能够执行如权利要求4-9任一项所述的信息处理方法。22. A non-transitory computer-readable storage medium, when the instructions in the storage medium are executed by a processor of an electronic device, the electronic device can execute the information processing method according to any one of claims 4-9 .
CN202011401990.1A2020-12-032020-12-03Information processing method and devicePendingCN112463429A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202011401990.1ACN112463429A (en)2020-12-032020-12-03Information processing method and device

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202011401990.1ACN112463429A (en)2020-12-032020-12-03Information processing method and device

Publications (1)

Publication NumberPublication Date
CN112463429Atrue CN112463429A (en)2021-03-09

Family

ID=74806123

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202011401990.1APendingCN112463429A (en)2020-12-032020-12-03Information processing method and device

Country Status (1)

CountryLink
CN (1)CN112463429A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN119544801A (en)*2025-01-132025-02-28武汉锂钠氪锶科技有限公司 Data acquisition method, server, client and data acquisition device

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105868040A (en)*2016-03-292016-08-17Tcl通力电子(惠州)有限公司Log collection method and collection terminal
CN107678869A (en)*2017-07-262018-02-09上海壹账通金融科技有限公司Client exception localization method, device, computer equipment and storage medium
CN108874612A (en)*2017-05-092018-11-23腾讯科技(深圳)有限公司A kind of method of acquisition of information, relevant device and system
CN109710490A (en)*2018-12-202019-05-03网易(杭州)网络有限公司Acquisition method, device, storage medium and the electronic equipment of client log

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN105868040A (en)*2016-03-292016-08-17Tcl通力电子(惠州)有限公司Log collection method and collection terminal
CN108874612A (en)*2017-05-092018-11-23腾讯科技(深圳)有限公司A kind of method of acquisition of information, relevant device and system
CN107678869A (en)*2017-07-262018-02-09上海壹账通金融科技有限公司Client exception localization method, device, computer equipment and storage medium
CN109710490A (en)*2018-12-202019-05-03网易(杭州)网络有限公司Acquisition method, device, storage medium and the electronic equipment of client log

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN119544801A (en)*2025-01-132025-02-28武汉锂钠氪锶科技有限公司 Data acquisition method, server, client and data acquisition device

Similar Documents

PublicationPublication DateTitle
CN104869612B (en)Access the method and device of network
CN107819572B (en)Command transmission method and device and electronic equipment
CN113055169B (en) Data encryption method, device, electronic device and storage medium
EP2961128B1 (en)Method, system, computer program and computer program product for binding a token key to an account
EP3151507A1 (en)Methods and apparatuses for controlling device
US20220382884A1 (en)Method and device for parsing shared password
US20170139944A1 (en)Method, device and computer-readable medium for monitoring a file in system partition
CN104715337A (en)Attendance method, and attendance management method and device
KR101639147B1 (en)Method, device, program and storage medium for sending information in voice service
CN107070654B (en) Information collection method and device
US9723486B2 (en)Method and apparatus for accessing network
CN113868505A (en) Data processing method, device, electronic device, server and storage medium
CN111917728A (en)Password verification method and device
CN112784243A (en)Authorization management method and device, electronic equipment and storage medium
CN105282162A (en)Processing method and device for account management business
CN115333813B (en) Data encryption transmission method, device, electronic device and storage medium
CN104125267A (en)Account protection method, device and terminal equipment
CN114221788B (en)Login method, login device, electronic equipment and storage medium
CN108664216B (en) Data storage method and device
CN112733092B (en)Information processing method and device
US10402562B2 (en)Method and device for encrypting application
CN112463429A (en)Information processing method and device
CN112434339A (en)Information processing method and device
US9674768B2 (en)Method and device for accessing wireless network
CN111050213A (en)Video playing method and device, electronic equipment and storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20210309

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp