Movatterモバイル変換


[0]ホーム

URL:


CN112488246A - Information processing method and system based on network live broadcast and online e-commerce delivery - Google Patents

Information processing method and system based on network live broadcast and online e-commerce delivery
Download PDF

Info

Publication number
CN112488246A
CN112488246ACN202110028380.XACN202110028380ACN112488246ACN 112488246 ACN112488246 ACN 112488246ACN 202110028380 ACN202110028380 ACN 202110028380ACN 112488246 ACN112488246 ACN 112488246A
Authority
CN
China
Prior art keywords
information
label
track
curve
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202110028380.XA
Other languages
Chinese (zh)
Inventor
蔡淦祺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to CN202110028380.XApriorityCriticalpatent/CN112488246A/en
Publication of CN112488246ApublicationCriticalpatent/CN112488246A/en
Withdrawnlegal-statusCriticalCurrent

Links

Images

Classifications

Landscapes

Abstract

According to the information processing method and system based on the network live broadcast and the online E-commerce delivery, the information identification degrees of a plurality of label information and the label similarity rates among the label information are determined according to the first information list and the second information list. And verifying the label information based on the information identification degree of the information and the label similarity rate between different label information, and counting the target label information passing the verification. And acquiring the message of the intelligent terminal and determining a time sequence continuity curve and a keyword queue of the message. And setting an access interception mechanism when judging that the intelligent terminal carries the Trojan horse program based on the time sequence continuity curve and the keyword sequence. Therefore, whether the intelligent terminal carries the Trojan program or not can be timely and accurately detected by carrying out time sequence continuity detection and natural language analysis on the interactive information of the intelligent terminal, so that the intelligent terminal carrying the Trojan program is accessed and intercepted, and the information safety of an e-commerce platform and other intelligent terminals is ensured.

Description

Information processing method and system based on network live broadcast and online e-commerce delivery
Technical Field
The disclosure relates to the technical field of network live broadcast and online e-commerce, in particular to an information processing method and system based on network live broadcast and online e-commerce delivery.
Background
With the development of the internet, the life style of people has changed greatly. Taking shopping as an example, online shopping is now the main way for people to shop. In order to increase the sales volume of products on line, the merchant usually communicates with the user on the e-commerce platform through a live network, so as to realize online goods delivery. The essence of communication between a merchant and a user is information interaction between an e-commerce platform and an intelligent terminal, and therefore, how to ensure the information security of the e-commerce platform and the intelligent terminal is a technical problem to be solved urgently at present.
Disclosure of Invention
In order to solve the technical problems in the related art, the present disclosure provides an information processing method and system based on live webcasting and online e-commerce delivery.
In a first aspect, an information processing method based on live webcasting and online e-commerce delivery is provided, and is applied to a cloud server communicating with a plurality of intelligent terminals, and the method at least comprises the following steps:
for each intelligent terminal, determining information identification degrees of a plurality of label information to be verified, which are used for determining the time sequence continuity of the interactive information and extracting keywords of the interactive information, and label similarity rates among different label information based on a first information list and a second information list which are extracted and used for recording the interactive information of the intelligent terminal;
verifying the plurality of label information based on the determined information identification degrees of the plurality of label information and the label similarity rates among different label information, and counting at least three target label information passing the verification; the information identification degree of the target label information is greater than the set identification degree, and the label similarity rate between the target label information is smaller than the set similarity rate;
acquiring a message of the intelligent terminal in a current time period determined based on an operation log of the cloud server, generating a time sequence continuity curve of the message in the current time period according to the confidence of the message in each target label information, the information identification degree of each target label information and the label similarity rate among the target label information, and extracting a keyword queue of the message in the current time period;
judging whether the intelligent terminal carries a Trojan program or not based on the time sequence continuity curve and the keyword sequence; if so, setting an access interception mechanism for intercepting the intelligent terminal according to the terminal configuration information of the intelligent terminal.
Optionally, determining whether the intelligent terminal carries a trojan program based on the time sequence continuity curve and the keyword sequence includes:
obtaining a critical curve segment in the time sequence continuity curve, wherein the critical curve segment comprises a curve segment with a curve slope larger than a critical point of a set slope; equally dividing the critical curve segment into at least two sub-line segments; calculating the curve slope change coefficient included in each sub-line segment of the at least two sub-line segments in parallel; mapping each calculated curve slope change coefficient to a preset value interval and calculating the weighted sum of the mapping values of each curve slope change coefficient in the preset value interval;
when the weighted sum is larger than a target value, extracting a word vector of each keyword in the keyword sequence; clustering the extracted multiple word vectors based on curve features corresponding to the time sequence continuity curves to obtain at least two clustering sets; calculating the feature difference degree between the word vectors in each cluster set;
when the difference value of each feature difference degree and the set difference degree is smaller than a preset threshold value, selecting a cluster set corresponding to the maximum feature difference degree as a detection set, determining a word vector matrix corresponding to the detection set, and searching whether a target word vector matrix with the matrix similarity between the word vector matrix and the word vector matrix larger than the set similarity exists or not from a preset database; if yes, judging that the intelligent terminal carries the Trojan horse program; and matrix elements in the target word vector matrix are elements corresponding to abnormal keywords.
Optionally, the method further includes clustering the extracted multiple word vectors based on curve features corresponding to the time series continuity curve to obtain at least two cluster sets, and calculating a feature difference between the word vectors in each cluster set, and further includes:
determining the characteristic dimension quantity of the curve characteristic, normalizing the position information of each characteristic value in the characteristic value queue corresponding to the curve characteristic to obtain a relative position coefficient corresponding to each characteristic value, correcting each characteristic value by using the relative position coefficient to obtain a correction value corresponding to each characteristic value, and calculating a characteristic configuration parameter corresponding to the curve characteristic according to the correction value; the characteristic configuration parameters are used for updating model parameters of a preset clustering model, and the preset model parameters are kmeans mean clustering models;
extracting current model parameters of the preset clustering model, and calculating the current clustering accuracy of the preset clustering model according to a correlation coefficient between the current model parameters and the feature configuration parameters; when the current clustering accuracy is lower than a set accuracy, updating the preset clustering model by using the characteristic configuration parameters;
determining a clustering feature number based on the updated preset clustering model, and judging whether the vector dimension number of the word vector is equal to the clustering feature number; if not, adjusting the vector dimension number of the word vector based on the feature configuration parameters so as to enable the vector dimension number of the word vector to be equal to the clustering feature number;
inputting the adjusted word vectors into the updated preset clustering model and obtaining at least two clustering sets output by the updated preset clustering model; and aiming at each cluster set, calculating cosine distances between each word vector in the cluster set and other word vectors, screening the cosine distances according to the clustering weight of each word vector in the cluster set, and calculating the mean value of the cosine distances obtained by screening to obtain the feature difference.
Optionally, determining, based on the extracted first information list and second information list for recording the interactive information of the intelligent terminal, information identification degrees of a plurality of pieces of tag information to be verified, which are used for determining time sequence continuity of the interactive information and for extracting keywords of the interactive information, and tag similarity ratios between different pieces of tag information, further comprising:
listing a first information set used for representing communication records between the intelligent terminal and the cloud server in the first information list according to a time sequence, listing a second information set used for representing communication records between the intelligent terminal and other intelligent terminals in the second information list according to the time sequence, generating a first information flow track of the first information list based on the first information set, and generating a second information flow track of the second information list based on the second information set; the number of first track nodes in the first information flow track is different from the number of second track nodes in the second information flow track, and the first track nodes and the second track nodes have different node information dimensions;
acquiring a time sequence continuous track for representing the interactive information and target information of an information subject of the interactive information, which are represented by a node information dimension corresponding to one first track node in the first information flow track; determining a second track node with the largest node information dimension in the second information flow track as a target track node, and packaging the target information into the target track node according to a time sequence difference value between the first information flow track and the second information flow track so as to obtain configuration information corresponding to the target information in the target track node; determining a time sequence consistency weight between the first information list and the second information list according to the matching degree between the configuration information and the target information;
performing time sequence correction on the first information stream track and the second information stream track by adopting the time sequence consistency weight, and splicing the corrected first information stream track and the corrected second information stream track to obtain a third information stream track; extracting node description information corresponding to each third track node in the third information flow track and classifying the node description information corresponding to each third track node to obtain a first information group and a second information group;
determining a plurality of pieces of first label information to be verified for determining the time sequence continuity of the interactive information based on the node description information in the first information group, determining a plurality of pieces of second label information to be verified for determining the keyword for extracting the interactive information based on the node description information in the second information group, and screening out a plurality of pieces of third label information to be verified for determining the time sequence continuity of the interactive information and extracting the keyword for the interactive information according to the first label information and the second label information; mapping the label index value corresponding to each piece of third label information to a preset numerical value list to obtain the information identification degree corresponding to each piece of third label information; and calculating cosine distances between information vectors of every two pieces of third label information, and weighting the calculated cosine distances to obtain label similarity rates among the plurality of pieces of third label information.
Optionally, the classifying the node description information corresponding to each third trace node to obtain a first information packet and a second information packet specifically includes:
dividing a track curve corresponding to the third information stream track into a plurality of curve segments according to a preset time interval, calculating a curve slope for representing the track stability of each curve segment, and generating a track distribution list corresponding to the third information stream track according to the curve slope; classifying the node description information corresponding to each third track node for the first time based on the information association degree of the list information in the track distribution list to obtain a first initial group and a second initial group;
when it is determined that an information compatibility identifier exists between the node description information under the first initial grouping and the node description information under the second initial grouping, adjusting at least one node description information under the first initial grouping to be under the second initial grouping based on the determined information compatibility between the node description information under the first initial grouping and the node description information under the second initial grouping;
calculating a first information configuration coefficient of the node description information under the first initial grouping after the adjustment and a second information configuration coefficient of the node description information under the second initial grouping after the adjustment are completed, and determining a coefficient difference value between the first information configuration coefficient and the second information configuration coefficient; judging whether the coefficient difference is larger than a set difference or not; when the coefficient difference is larger than the set difference, determining a first initial packet after adjustment as the first information packet and determining a second initial packet after adjustment as the second information packet; and when the coefficient difference is smaller than or equal to the set difference, continuing to adjust at least one piece of node description information under the first initial grouping to the second initial grouping, and returning to the step of calculating a first information configuration coefficient of the adjusted node description information under the first initial grouping and a second information configuration coefficient of the adjusted node description information under the second initial grouping.
Optionally, the method further comprises:
acquiring a modification instruction for modifying the set identification degree and the set similarity rate;
and modifying the set identification degree and the set similarity according to the modification instruction.
In a second aspect, a cloud server is provided, the cloud server being in communication with a plurality of smart terminals, the cloud server being configured to at least:
for each intelligent terminal, determining information identification degrees of a plurality of label information to be verified, which are used for determining the time sequence continuity of the interactive information and extracting keywords of the interactive information, and label similarity rates among different label information based on a first information list and a second information list which are extracted and used for recording the interactive information of the intelligent terminal;
verifying the plurality of label information based on the determined information identification degrees of the plurality of label information and the label similarity rates among different label information, and counting at least three target label information passing the verification; the information identification degree of the target label information is greater than the set identification degree, and the label similarity rate between the target label information is smaller than the set similarity rate;
acquiring a message of the intelligent terminal in a current time period determined based on an operation log of the cloud server, generating a time sequence continuity curve of the message in the current time period according to the confidence of the message in each target label information, the information identification degree of each target label information and the label similarity rate among the target label information, and extracting a keyword queue of the message in the current time period;
judging whether the intelligent terminal carries a Trojan program or not based on the time sequence continuity curve and the keyword sequence; if so, setting an access interception mechanism for intercepting the intelligent terminal according to the terminal configuration information of the intelligent terminal.
Optionally, the determining, by the cloud server, whether the intelligent terminal carries the trojan program based on the time sequence continuity curve and the keyword sequence specifically includes:
obtaining a critical curve segment in the time sequence continuity curve, wherein the critical curve segment comprises a curve segment with a curve slope larger than a critical point of a set slope; equally dividing the critical curve segment into at least two sub-line segments; calculating the curve slope change coefficient included in each sub-line segment of the at least two sub-line segments in parallel; mapping each calculated curve slope change coefficient to a preset value interval and calculating the weighted sum of the mapping values of each curve slope change coefficient in the preset value interval;
when the weighted sum is larger than a target value, extracting a word vector of each keyword in the keyword sequence; clustering the extracted multiple word vectors based on curve features corresponding to the time sequence continuity curves to obtain at least two clustering sets; calculating the feature difference degree between the word vectors in each cluster set;
when the difference value of each feature difference degree and the set difference degree is smaller than a preset threshold value, selecting a cluster set corresponding to the maximum feature difference degree as a detection set, determining a word vector matrix corresponding to the detection set, and searching whether a target word vector matrix with the matrix similarity between the word vector matrix and the word vector matrix larger than the set similarity exists or not from a preset database; if yes, judging that the intelligent terminal carries the Trojan horse program; and matrix elements in the target word vector matrix are elements corresponding to abnormal keywords.
In a third aspect, a cloud server is provided, which includes a processor and a memory, which are in communication with each other, and the processor retrieves a computer program from the memory and runs the computer program, so as to implement the above method.
In a fourth aspect, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when executed, implements the above-described method.
The technical scheme provided by the embodiment of the disclosure can have the following beneficial effects.
Firstly, the information identification degrees of a plurality of label information and the label similarity rate between different label information are determined according to the first information list and the second information list.
And secondly, verifying the plurality of label information based on the determined information identification degrees of the plurality of label information and the label similarity rate among different label information, and counting at least three target label information passing the verification.
And then, acquiring the message of the intelligent terminal in the current time period, generating a time sequence continuity curve of the message according to the confidence of the message in each target label information, the information identification degree of each target label information and the label similarity rate among the target label information, and extracting a keyword queue of the message.
And finally, setting an access interception mechanism when the intelligent terminal is judged to carry the Trojan horse program based on the time sequence continuity curve and the keyword sequence.
Therefore, whether the intelligent terminal carries the Trojan program or not can be timely and accurately detected by carrying out time sequence continuity detection and natural language analysis on the interactive information of the intelligent terminal, so that the intelligent terminal carrying the Trojan program is accessed and intercepted, and the information safety of an e-commerce platform and other intelligent terminals is ensured.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
Fig. 1 is a schematic flow chart of an information processing method based on live webcasting and online e-commerce delivery according to the present disclosure;
FIG. 2 is a block diagram illustrating an information processing apparatus based on live webcasting and online e-commerce delivery, according to an example embodiment;
FIG. 3 is an architectural diagram illustrating an information handling system based on live webcasting and online e-commerce delivery, according to an exemplary embodiment;
fig. 4 is a schematic diagram illustrating a hardware structure of a cloud server according to another exemplary embodiment.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The inventor analyzes the existing online e-commerce delivery technology, and finds that the existing e-commerce platform usually interfaces with a plurality of intelligent terminals, that is, the e-commerce platform and the plurality of intelligent terminals communicate information. Therefore, if one intelligent terminal carries the trojan program, the information security of the e-commerce platform and other intelligent terminals can be affected. Therefore, how to timely and accurately detect the trojan horse of the intelligent terminal is the key for ensuring the information security of the e-commerce platform and the intelligent terminal.
In order to solve the technical problems, embodiments of the present invention provide an information processing method and system based on live webcasting and online e-commerce delivery, which can detect whether an intelligent terminal carries a trojan program timely and accurately by performing time sequence continuity detection and natural language analysis on interactive information of the intelligent terminal, so as to access and intercept the intelligent terminal carrying the trojan program, and ensure information security of an e-commerce platform and other intelligent terminals.
To achieve the above object, please refer to fig. 1, which is a flowchart of an information processing method based on live webcasting and online e-commerce delivery according to an embodiment of the present invention, the method may be applied to a cloud server in communication with a plurality of intelligent terminals, where the cloud server is a server deployed in a cloud by an e-commerce platform, and further, the method may specifically include the contents described in the following steps S110 to S140.
Step S110, aiming at each intelligent terminal, based on the extracted first information list and the second information list for recording the interactive information of the intelligent terminal, determining the information identification degrees of a plurality of label information to be verified, which are used for determining the time sequence continuity of the interactive information and extracting the keywords of the interactive information, and the label similarity rates among different label information.
In step S110, the first information list is used to record interaction information (direct interaction information) between the intelligent terminal and the cloud server, and the second information list is used to record interaction information (indirect interaction information) between the intelligent terminal and other intelligent terminals.
Step S120, verifying the plurality of label information based on the determined information identification degrees of the plurality of label information and the label similarity rates among different label information, and counting at least three target label information passing the verification; the information identification degree of the target label information is larger than the set identification degree, and the label similarity rate between the target label information is smaller than the set similarity rate.
In step S120, the set recognition degree and the set similarity rate are set according to the number of the intelligent terminals, which is not limited herein.
Step S130, obtaining the message of the intelligent terminal in the current time period determined based on the operation log of the cloud server, generating a time sequence continuity curve of the message in the current time period according to the confidence of the message in each target label information, the information identification degree of each target label information and the label similarity rate between the target label information, and extracting the keyword queue of the message in the current time period.
In step S130, the running log is used to record information processing records of the cloud server, the message messages include but are not limited to text messages, voice messages, and picture messages, the time sequence continuity curve is used to represent the reliability of the message messages in time sequence, and the keyword queue is used to record keywords in the message messages.
Step S140, judging whether the intelligent terminal carries a Trojan program or not based on the time sequence continuity curve and the keyword sequence; if so, setting an access interception mechanism for intercepting the intelligent terminal according to the terminal configuration information of the intelligent terminal.
In step S140, the access intercepting mechanism is configured to intercept information sent by the smart terminal to the cloud server and other smart terminals, and is further configured to intercept information sent by the cloud server and other smart terminals to the smart terminal.
By applying the contents described in the above steps S110 to S140, the information identification degrees of a plurality of tag information and the tag similarity rates between different tag information are first determined according to the first information list and the second information list, secondly, verifying the plurality of label information based on the determined information identification degrees of the plurality of label information and the label similarity rate between different label information and counting at least three target label information passing the verification, and then acquiring the message of the intelligent terminal in the current time period, generating a time sequence continuity curve of the message according to the confidence of the message in each target label information, the information identification degree of each target label information and the label similarity rate between the target label information, extracting a keyword queue of the message, and finally setting an access interception mechanism when judging that the intelligent terminal carries the Trojan program based on the time sequence continuity curve and the keyword sequence. Therefore, whether the intelligent terminal carries the Trojan program or not can be timely and accurately detected by carrying out time sequence continuity detection and natural language analysis on the interactive information of the intelligent terminal, so that the intelligent terminal carrying the Trojan program is accessed and intercepted, and the information safety of an e-commerce platform and other intelligent terminals is ensured.
In practical application of the above scheme, the inventor finds that the determined tag information is defective when determining the tag information to be verified. The reason for this is because the consistency in time sequence between the first information list and the second information list is not considered. In order to improve the above technical problem and thus accurately and completely determine the tag information and the corresponding information identification degree and tag similarity ratio thereof, the method described in step S110 may further include determining the information identification degrees of a plurality of tag information to be verified, which are used for determining the time sequence continuity of the interactive information and for extracting the keyword of the interactive information, based on the first information list and the second information list extracted and used for recording the interactive information of the intelligent terminal, and the tag similarity ratio between different tag information, and further include the following steps S111 to S114.
Step S111, listing a first information set used for representing communication records between the intelligent terminal and the cloud server in the first information list according to a time sequence, listing a second information set used for representing communication records between the intelligent terminal and other intelligent terminals in the second information list according to a time sequence, generating a first information flow track of the first information list based on the first information set, and generating a second information flow track of the second information list based on the second information set; the number of first track nodes in the first information flow track is different from the number of second track nodes in the second information flow track, and the first track nodes and the second track nodes have different node information dimensions.
Step S112, acquiring a time sequence continuous track for representing the interactive information and target information of an information subject of the interactive information, which are represented by a node information dimension corresponding to one first track node in the first information flow track; determining a second track node with the largest node information dimension in the second information flow track as a target track node, and packaging the target information into the target track node according to a time sequence difference value between the first information flow track and the second information flow track so as to obtain configuration information corresponding to the target information in the target track node; and determining the time sequence consistency weight between the first information list and the second information list according to the matching degree between the configuration information and the target information.
Step S113, performing time sequence correction on the first information stream track and the second information stream track by adopting the time sequence consistency weight, and splicing the corrected first information stream track and the corrected second information stream track to obtain a third information stream track; and extracting node description information corresponding to each third track node in the third information flow track, and classifying the node description information corresponding to each third track node to obtain a first information group and a second information group.
Step S114, determining a plurality of pieces of first label information to be verified for determining the time sequence continuity of the interactive information based on the node description information in the first information group, determining a plurality of pieces of second label information to be verified for determining the keyword for extracting the interactive information based on the node description information in the second information group, and screening out a plurality of pieces of third label information to be verified for determining the time sequence continuity of the interactive information and extracting the keyword for the interactive information according to the first label information and the second label information; mapping the label index value corresponding to each piece of third label information to a preset numerical value list to obtain the information identification degree corresponding to each piece of third label information; and calculating cosine distances between information vectors of every two pieces of third label information, and weighting the calculated cosine distances to obtain label similarity rates among the plurality of pieces of third label information.
It can be understood that, through the steps S111 to S114, the consistency between the first information list and the second information list in time sequence can be analyzed, so as to avoid the absence of the determined tag information, and further accurately and completely determine the tag information, the information identification degree corresponding to the tag information, and the tag similarity.
On the basis, the classifying the node description information corresponding to each third trace node to obtain the first information packet and the second information packet described in step S113 may specifically include the contents described in the following steps S1131 to S1133.
Step S1131, dividing a track curve corresponding to the third information stream track into a plurality of curve segments according to a preset time interval, calculating a curve slope for representing the track stability of each curve segment, and generating a track distribution list corresponding to the third information stream track according to the curve slope; and classifying the node description information corresponding to each third track node for the first time based on the information association degree of the list information in the track distribution list to obtain a first initial group and a second initial group.
Step S1132, when it is determined that there is an information compatibility identifier between the node description information in the first initial group and the node description information in the second initial group, adjusting at least one node description information in the first initial group to the second initial group based on the determined information compatibility between the node description information in the first initial group and the node description information in the second initial group.
Step S1133, calculating a first information configuration coefficient of the node description information in the first initial group after the adjustment is completed and a second information configuration coefficient of the node description information in the second initial group after the adjustment is completed, and determining a coefficient difference between the first information configuration coefficient and the second information configuration coefficient; judging whether the coefficient difference is larger than a set difference or not; when the coefficient difference is larger than the set difference, determining a first initial packet after adjustment as the first information packet and determining a second initial packet after adjustment as the second information packet; and when the coefficient difference is smaller than or equal to the set difference, continuing to adjust at least one piece of node description information under the first initial grouping to the second initial grouping, and returning to the step of calculating a first information configuration coefficient of the adjusted node description information under the first initial grouping and a second information configuration coefficient of the adjusted node description information under the second initial grouping.
In specific implementation, by applying the steps S1131 to S1133, the node description information corresponding to the third trace node can be accurately classified, so that the first information packet and the second information packet are accurately obtained.
In a specific implementation process, in order to accurately and reliably determine whether the intelligent terminal carries the trojan program and avoid erroneous determination, the determination of whether the intelligent terminal carries the trojan program based on the time sequence continuity curve and the keyword sequence described in step S140 may further include the following contents described in steps S141 to S143.
Step S141, obtaining a critical curve segment in the time sequence continuity curve, wherein the critical curve segment is a curve segment comprising a critical point of which the curve slope is greater than a set slope; equally dividing the critical curve segment into at least two sub-line segments; calculating the curve slope change coefficient included in each sub-line segment of the at least two sub-line segments in parallel; and mapping each calculated curve slope change coefficient to a preset value interval and calculating the weighted sum of the mapping values of each curve slope change coefficient in the preset value interval.
Step S142, when the weighted sum is larger than the target value, extracting a word vector of each keyword in the keyword sequence; clustering the extracted multiple word vectors based on curve features corresponding to the time sequence continuity curve to obtain at least two clustering sets, and calculating feature difference between the word vectors in each clustering set.
Step S143, when the difference value between each feature difference degree and the set difference degree is smaller than a preset threshold value, selecting a cluster set corresponding to the maximum feature difference degree as a detection set, determining a word vector matrix corresponding to the detection set, and searching whether a target word vector matrix with the matrix similarity between the word vector matrix and the word vector matrix larger than the set similarity exists in a preset database; if yes, judging that the intelligent terminal carries the Trojan horse program; and matrix elements in the target word vector matrix are elements corresponding to abnormal keywords.
In practical application, based on the steps S141 to S143, whether the intelligent terminal carries the trojan program can be accurately and reliably determined.
In a more specific embodiment, the clustering, which is described in step S142, the extracted multiple word vectors based on the curve features corresponding to the time series continuity curve to obtain at least two cluster sets, and calculating the feature difference between the word vectors in each cluster set may specifically include the following contents described in step S1421 to step S1424.
Step S1421, determining the feature dimension number of the curve feature, normalizing the position information of each feature value in the feature value queue corresponding to the curve feature to obtain a relative position coefficient corresponding to each feature value, correcting each feature value by using the relative position coefficient to obtain a correction value corresponding to each feature value, and calculating a feature configuration parameter corresponding to the curve feature according to the correction value; the feature configuration parameters are used for updating model parameters of a preset clustering model, and the preset model parameters are kmeans mean clustering models.
Step S1422, extracting the current model parameters of the preset clustering model, and calculating the current clustering accuracy of the preset clustering model according to the correlation coefficient between the current model parameters and the feature configuration parameters; and when the current clustering accuracy is lower than a set accuracy, updating the preset clustering model by using the characteristic configuration parameters.
Step S1423, determining a clustering feature number based on the updated preset clustering model, and judging whether the vector dimension number of the word vector is equal to the clustering feature number; if not, adjusting the vector dimension degree of the word vector based on the feature configuration parameters so that the vector dimension degree of the word vector is equal to the clustering feature number.
Step S1424, inputting the adjusted word vector into the updated preset clustering model and obtaining at least two clustering sets output by the updated preset clustering model; and aiming at each cluster set, calculating cosine distances between each word vector in the cluster set and other word vectors, screening the cosine distances according to the clustering weight of each word vector in the cluster set, and calculating the mean value of the cosine distances obtained by screening to obtain the feature difference.
Thus, by performing the steps S1421 to S1424, the clustering accuracy and the feature difference accuracy can be ensured.
In one possible embodiment, in order to ensure reliable verification of a plurality of tag information, on the basis of step S120, what is described in the following step S121 and step S122 may be further included.
Step S121, acquiring a modification instruction for modifying the set identification degree and the set similarity rate.
And step S122, modifying the set identification degree and the set similarity according to the modification instruction.
Therefore, the set identification degree and the set similarity can be flexibly modified according to different service scenes, and reliable verification of the information of the plurality of labels is ensured.
In an alternative embodiment, the step S130 may specifically include the following steps S131 to S135, which are described in detail below, of generating a time sequence continuity curve of the message in the current time period according to the confidence of the message in each target tag information, the information identification of each target tag information, and the tag similarity between the target tag information, and extracting the keyword queue of the message in the current time period.
Step S131, the confidence degrees of the message under each target label information are sequenced from large to small to obtain a confidence degree sequence, and a plurality of time sequence nodes of the message in the current time period are determined according to the confidence degree sequence and the information identification degree of each target label information.
Step S132, fitting the plurality of time sequence nodes based on the label similarity rate between the target label information to obtain an initial curve, and smoothing the initial curve by adopting the median in the confidence coefficient sequence to obtain the time sequence continuity curve.
Step S133, respectively determining the associated message fields of the information identification degree of each target tag information in the message, and generating the word segmentation identifier of the message according to the field characteristics of each associated message field.
Step S134, splitting the message by using the word segmentation identification to obtain a plurality of message sequences.
Step S135, determining an extraction logic based on the tag similarity between the target tag information, extracting the keyword in each packet sequence through the extraction logic, and combining the keywords according to the generation time information of the corresponding packet sequence to obtain the keyword queue.
When the contents described in the above steps S131 to S135 are applied, the smoothness of the time series continuity curve and the integrity of the keyword queue can be ensured.
Based on the same inventive concept, please refer to fig. 2 in combination, a functional block diagram of aninformation processing apparatus 200 based on live webcasting and online electronic commerce delivery is provided, where theinformation processing apparatus 200 is applied to the cloud server, and specifically includes the following functional blocks:
the taginformation determining module 210 is configured to determine, for each intelligent terminal, information identification degrees of a plurality of tag information to be verified, which are used for determining time sequence continuity of the interactive information and extracting keywords of the interactive information, and tag similarity rates between different tag information, based on the extracted first information list and second information list for recording the interactive information of the intelligent terminal;
a taginformation verification module 220, configured to verify the plurality of tag information based on the determined information identification degrees of the plurality of tag information and tag similarity rates between different tag information, and count at least three pieces of target tag information that pass verification; the information identification degree of the target label information is greater than the set identification degree, and the label similarity rate between the target label information is smaller than the set similarity rate;
amessage processing module 230, configured to obtain a message of the intelligent terminal in a current time period determined based on the operation log of the cloud server, generate a time sequence continuity curve of the message in the current time period according to a confidence of the message in each target tag information, an information identification degree of each target tag information, and a tag similarity rate between the target tag information, and extract a keyword queue of the message in the current time period;
the intelligentterminal detection module 240 is configured to determine whether the intelligent terminal carries a trojan program based on the time sequence continuity curve and the keyword sequence; if so, setting an access interception mechanism for intercepting the intelligent terminal according to the terminal configuration information of the intelligent terminal.
For the description of the functional modules, please refer to the description of the method shown in fig. 1, which is not described herein again.
Based on the same inventive concept, as shown in fig. 3, an architecture diagram of aninformation processing system 300 based on live webcasting and online e-commerce delivery is provided. Theinformation processing system 300 may include acloud server 310 and a plurality ofsmart terminals 320 in communication with thecloud server 310, thecloud server 310 being configured to:
for each intelligent terminal, determining information identification degrees of a plurality of label information to be verified, which are used for determining the time sequence continuity of the interactive information and extracting keywords of the interactive information, and label similarity rates among different label information based on a first information list and a second information list which are extracted and used for recording the interactive information of the intelligent terminal;
verifying the plurality of label information based on the determined information identification degrees of the plurality of label information and the label similarity rates among different label information, and counting at least three target label information passing the verification; the information identification degree of the target label information is greater than the set identification degree, and the label similarity rate between the target label information is smaller than the set similarity rate;
acquiring a message of the intelligent terminal in a current time period determined based on an operation log of the cloud server, generating a time sequence continuity curve of the message in the current time period according to the confidence of the message in each target label information, the information identification degree of each target label information and the label similarity rate among the target label information, and extracting a keyword queue of the message in the current time period;
judging whether the intelligent terminal carries a Trojan program or not based on the time sequence continuity curve and the keyword sequence; if so, setting an access interception mechanism for intercepting the intelligent terminal according to the terminal configuration information of the intelligent terminal.
Further, the determining, by thecloud server 310, whether the intelligent terminal carries the trojan program based on the time sequence continuity curve and the keyword sequence specifically includes:
obtaining a critical curve segment in the time sequence continuity curve, wherein the critical curve segment comprises a curve segment with a curve slope larger than a critical point of a set slope; equally dividing the critical curve segment into at least two sub-line segments; calculating the curve slope change coefficient included in each sub-line segment of the at least two sub-line segments in parallel; mapping each calculated curve slope change coefficient to a preset value interval and calculating the weighted sum of the mapping values of each curve slope change coefficient in the preset value interval;
when the weighted sum is larger than a target value, extracting a word vector of each keyword in the keyword sequence; clustering the extracted multiple word vectors based on curve features corresponding to the time sequence continuity curves to obtain at least two clustering sets; calculating the feature difference degree between the word vectors in each cluster set;
when the difference value of each feature difference degree and the set difference degree is smaller than a preset threshold value, selecting a cluster set corresponding to the maximum feature difference degree as a detection set, determining a word vector matrix corresponding to the detection set, and searching whether a target word vector matrix with the matrix similarity between the word vector matrix and the word vector matrix larger than the set similarity exists or not from a preset database; if yes, judging that the intelligent terminal carries the Trojan horse program; and matrix elements in the target word vector matrix are elements corresponding to abnormal keywords.
On the basis of the above, please refer to fig. 4, which provides acloud server 310, which includes aprocessor 311 and amemory 312, which are in communication with each other, wherein theprocessor 311 retrieves a computer program from thememory 312 and runs the computer program, so as to implement the method shown in fig. 1.
Furthermore, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when running, implements the method as shown in fig. 1.
In summary, based on the method, the apparatus, the system, and the cloud server, the information identification degrees of a plurality of tag information and the tag similarity rates between different tag information are determined according to the first information list and the second information list.
And secondly, verifying the plurality of label information based on the determined information identification degrees of the plurality of label information and the label similarity rate among different label information, and counting at least three target label information passing the verification.
And then, acquiring the message of the intelligent terminal in the current time period, generating a time sequence continuity curve of the message according to the confidence of the message in each target label information, the information identification degree of each target label information and the label similarity rate among the target label information, and extracting a keyword queue of the message.
And finally, setting an access interception mechanism when the intelligent terminal is judged to carry the Trojan horse program based on the time sequence continuity curve and the keyword sequence.
Therefore, whether the intelligent terminal carries the Trojan program or not can be timely and accurately detected by carrying out time sequence continuity detection and natural language analysis on the interactive information of the intelligent terminal, so that the intelligent terminal carrying the Trojan program is accessed and intercepted, and the information safety of an e-commerce platform and other intelligent terminals is ensured.
It is to be understood that the present invention is not limited to what has been described above and shown in the drawings, and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (7)

generating a time sequence continuity curve of the message in the current time period and extracting a keyword queue of the message in the current time period according to the confidence of the message in each target label information, the information identification degree of each target label information and the label similarity rate among the target label information, and the method comprises the following steps: sequencing the confidence degrees of the message under each target label information according to a descending order to obtain a confidence degree sequence, and determining a plurality of time sequence nodes of the message in the current time period according to the confidence degree sequence and the information identification degree of each target label information; fitting the plurality of time sequence nodes based on the label similarity rate between the target label information to obtain an initial curve, and smoothing the initial curve by adopting a median in the confidence coefficient sequence to obtain a time sequence continuity curve; respectively determining the associated message fields of the information identification degree of each target label information in the message, and generating word segmentation identifiers of the message according to the field characteristics of each associated message field; splitting the message by adopting the word segmentation identification to obtain a plurality of message sequences; and determining extraction logic based on the label similarity rate between the target label information, extracting the key words in each message sequence through the extraction logic, and combining the key words according to the generation time information of the corresponding message sequence to obtain the key word queue.
listing a first information set used for representing communication records between the intelligent terminal and the cloud server in the first information list according to a time sequence, listing a second information set used for representing communication records between the intelligent terminal and other intelligent terminals in the second information list according to the time sequence, generating a first information flow track of the first information list based on the first information set, and generating a second information flow track of the second information list based on the second information set; the number of first track nodes in the first information flow track is different from the number of second track nodes in the second information flow track, and the first track nodes and the second track nodes have different node information dimensions;
acquiring a time sequence continuous track for representing the interactive information and target information of an information subject of the interactive information, which are represented by a node information dimension corresponding to one first track node in the first information flow track; determining a second track node with the largest node information dimension in the second information flow track as a target track node, and packaging the target information into the target track node according to a time sequence difference value between the first information flow track and the second information flow track so as to obtain configuration information corresponding to the target information in the target track node; determining a time sequence consistency weight between the first information list and the second information list according to the matching degree between the configuration information and the target information;
determining a plurality of pieces of first label information to be verified for determining the time sequence continuity of the interactive information based on the node description information in the first information group, determining a plurality of pieces of second label information to be verified for determining the keyword for extracting the interactive information based on the node description information in the second information group, and screening out a plurality of pieces of third label information to be verified for determining the time sequence continuity of the interactive information and extracting the keyword for the interactive information according to the first label information and the second label information; mapping the label index value corresponding to each piece of third label information to a preset numerical value list to obtain the information identification degree corresponding to each piece of third label information; and calculating cosine distances between information vectors of every two pieces of third label information, and weighting the calculated cosine distances to obtain label similarity rates among the plurality of pieces of third label information.
calculating a first information configuration coefficient of the node description information under the first initial grouping after the adjustment and a second information configuration coefficient of the node description information under the second initial grouping after the adjustment are completed, and determining a coefficient difference value between the first information configuration coefficient and the second information configuration coefficient; judging whether the coefficient difference is larger than a set difference or not; when the coefficient difference is larger than the set difference, determining a first initial packet after adjustment as the first information packet and determining a second initial packet after adjustment as the second information packet; and when the coefficient difference is smaller than or equal to the set difference, continuing to adjust at least one piece of node description information under the first initial grouping to the second initial grouping, and returning to the step of calculating a first information configuration coefficient of the adjusted node description information under the first initial grouping and a second information configuration coefficient of the adjusted node description information under the second initial grouping.
CN202110028380.XA2020-08-062020-08-06Information processing method and system based on network live broadcast and online e-commerce deliveryWithdrawnCN112488246A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202110028380.XACN112488246A (en)2020-08-062020-08-06Information processing method and system based on network live broadcast and online e-commerce delivery

Applications Claiming Priority (2)

Application NumberPriority DateFiling DateTitle
CN202010781633.6ACN111814909B (en)2020-08-062020-08-06 Information processing method and cloud server based on web live broadcast and online e-commerce delivery
CN202110028380.XACN112488246A (en)2020-08-062020-08-06Information processing method and system based on network live broadcast and online e-commerce delivery

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
CN202010781633.6ADivisionCN111814909B (en)2020-08-062020-08-06 Information processing method and cloud server based on web live broadcast and online e-commerce delivery

Publications (1)

Publication NumberPublication Date
CN112488246Atrue CN112488246A (en)2021-03-12

Family

ID=72863027

Family Applications (3)

Application NumberTitlePriority DateFiling Date
CN202110028380.XAWithdrawnCN112488246A (en)2020-08-062020-08-06Information processing method and system based on network live broadcast and online e-commerce delivery
CN202110028406.0AWithdrawnCN112488247A (en)2020-08-062020-08-06Information processing method combining live webcasting and online e-commerce delivery and cloud server
CN202010781633.6AActiveCN111814909B (en)2020-08-062020-08-06 Information processing method and cloud server based on web live broadcast and online e-commerce delivery

Family Applications After (2)

Application NumberTitlePriority DateFiling Date
CN202110028406.0AWithdrawnCN112488247A (en)2020-08-062020-08-06Information processing method combining live webcasting and online e-commerce delivery and cloud server
CN202010781633.6AActiveCN111814909B (en)2020-08-062020-08-06 Information processing method and cloud server based on web live broadcast and online e-commerce delivery

Country Status (1)

CountryLink
CN (3)CN112488246A (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN113395266B (en)*2020-11-062022-08-19中软数智信息技术(武汉)有限公司Data processing method applied to Internet of things and live broadcast platform and cloud computing center
CN113935617A (en)*2021-10-122022-01-14北京达佳互联信息技术有限公司Live broadcast data analysis method and live broadcast data analysis device

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
JPH09284509A (en)*1996-04-101997-10-31Canon Inc Image processing device
CN101533411B (en)*2009-04-082011-11-02厦门无线创想科技有限公司Network on-line treatment system and method of real-time information
US20140357215A1 (en)*2013-05-302014-12-04Avaya Inc.Method and apparatus to allow a psap to derive useful information from accelerometer data transmitted by a caller's device
CN107211011A (en)*2014-11-252017-09-26恩西洛有限公司System and method for Malicious Code Detection
CN107147627A (en)*2017-04-252017-09-08广东青年职业学院A kind of network safety protection method and system based on big data platform
CN107423613B (en)*2017-06-292020-08-04江苏通付盾信息安全技术有限公司Method and device for determining device fingerprint according to similarity and server
CN108449332A (en)*2018-03-092018-08-24中山大学 A Design Method of Lightweight Mobile Payment Protocol Based on Dual Gateways
CN109861953B (en)*2018-05-142020-08-21新华三信息安全技术有限公司Abnormal user identification method and device
CN109599176B (en)*2018-10-312021-06-25北京春雨天下软件有限公司Method and device for recommending inquiry skills and online auxiliary diagnosis system
CN109635872B (en)*2018-12-172020-08-04上海观安信息技术股份有限公司Identity recognition method, electronic device and computer program product
CN111030969A (en)*2019-02-262020-04-17北京安天网络安全技术有限公司Threat detection method and device based on visible and non-visible data and storage equipment
CN110321479B (en)*2019-05-272021-07-20哈尔滨工业大学(深圳) A privacy-preserving mobile service recommendation method, client, and recommendation system
CN110866899A (en)*2019-10-312020-03-06中国人民解放军国防科技大学Method and device for detecting female parent chip-free hardware Trojan horse based on static heat map
CN110830487A (en)*2019-11-132020-02-21杭州安恒信息技术股份有限公司Abnormal state identification method and device for terminal of Internet of things and electronic equipment
CN111241391A (en)*2020-01-032020-06-05北京三快在线科技有限公司Task recommendation method and device
CN111400758B (en)*2020-03-162020-12-11北京珞安科技有限责任公司 Access authority verification method, device and system applied to the Internet of Things
CN112286977A (en)*2020-03-272021-01-29尹兵Data pushing method, electronic equipment and system based on cloud computing

Also Published As

Publication numberPublication date
CN111814909A (en)2020-10-23
CN112488247A (en)2021-03-12
CN111814909B (en)2021-07-06

Similar Documents

PublicationPublication DateTitle
CN110147726B (en)Service quality inspection method and device, storage medium and electronic device
CN112182098B (en) Information push method and information push server based on cloud computing and big data
CN103117903B (en)Surfing flow method for detecting abnormality and device
CN109871954B (en)Training sample generation method, abnormality detection method and apparatus
CN111259952B (en)Abnormal user identification method, device, computer equipment and storage medium
CN114186626A (en)Abnormity detection method and device, electronic equipment and computer readable medium
CN110991474A (en) A machine learning modeling platform
US20220172112A1 (en)Data processing method and apparatus, and computer device
CN111949720B (en) Data analysis method and cloud data server based on big data and artificial intelligence
CN111814909B (en) Information processing method and cloud server based on web live broadcast and online e-commerce delivery
CN113449011A (en)Big data prediction-based information push updating method and big data prediction system
CN113449012A (en)Internet service mining method based on big data prediction and big data prediction system
CN111444930B (en)Method and device for determining prediction effect of two-classification model
CN112818343B (en)Block chain big data analysis early warning method and system and cloud platform
CN113098884A (en)Network security monitoring method based on big data, cloud platform system and medium
CN113486983A (en)Big data office information analysis method and system for anti-fraud processing
CN107798457B (en)Investment portfolio scheme recommending method, device, computer equipment and storage medium
CN114221991B (en)Session recommendation feedback processing method based on big data and deep learning service system
CN112037052B (en)User behavior detection method and device
CN113920369A (en)Model training method and device and electronic equipment
CN113569957A (en)Object type identification method and device of business object and storage medium
JP2023145767A (en)Vocabulary extraction support system and vocabulary extraction support method
CN112149121A (en)Malicious file identification method, device, equipment and storage medium
CN114528908A (en)Network request data classification model training method, classification method and storage medium
CN111784319A (en) Communication data processing method and big data server based on blockchain payment network

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
WW01Invention patent application withdrawn after publication

Application publication date:20210312

WW01Invention patent application withdrawn after publication

[8]ページ先頭

©2009-2025 Movatter.jp