WO2014029111A1 - 一种用户行为处理***及方法 - Google Patents

一种用户行为处理***及方法 Download PDF

Info

Publication number
WO2014029111A1
WO2014029111A1 PCT/CN2012/080572 CN2012080572W WO2014029111A1 WO 2014029111 A1 WO2014029111 A1 WO 2014029111A1 CN 2012080572 W CN2012080572 W CN 2012080572W WO 2014029111 A1 WO2014029111 A1 WO 2014029111A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
behavior
behavior information
knowledge base
rule
Prior art date
Application number
PCT/CN2012/080572
Other languages
English (en)
French (fr)
Inventor
许利霞
吴亚冬
张羽
Original Assignee
华为技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 华为技术有限公司 filed Critical 华为技术有限公司
Priority to CN201280001963.2A priority Critical patent/CN103109293B/zh
Priority to PCT/CN2012/080572 priority patent/WO2014029111A1/zh
Publication of WO2014029111A1 publication Critical patent/WO2014029111A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N5/00Computing arrangements using knowledge-based models
    • G06N5/02Knowledge representation; Symbolic representation

Definitions

  • the present invention belongs to the field of cloud computing technologies, and in particular, to a user behavior processing system and method.
  • Server management software for cloud platform servers carries more and more complex management tasks than traditional server in-cabin management software. How to adapt to changing scenarios and bring better operation and maintenance management experience to users is a major issue when designing server management software for cloud platform servers.
  • user behavior analysis has been widely used in search engine, website user behavior analysis, network performance impact analysis, and user security analysis.
  • Traditional user behavior analysis applications include analyzing ad targeting based on audience behavior, etc., which use the collected user access trajectory information to target ads.
  • the application domain of user behavior analysis is closely related to the application scenario.
  • the policy library is designed for user access trajectories and security policies, and the applicable application scenario is limited, and the user experience is relatively poor.
  • the embodiment of the invention provides a user behavior processing system and method, which aims to solve the problem that the application field of the user behavior analysis provided by the prior art has a close relationship with the application scenario and the user experience is poor.
  • a user behavior processing system comprising:
  • a user interface UI module configured to receive behavior information input by the user, and receive a processing result of the behavior information sent by the knowledge base module;
  • a user behavior collection module configured to acquire the behavior information received by the UI module, and send the behavior information to the knowledge base module;
  • the knowledge base module includes: an IO unit, a behavior analysis unit, and a knowledge base ontology;
  • a description of the rule for processing the behavior information is stored in the knowledge base ontology
  • the IO unit is configured to read data in the knowledge base body
  • the behavior analysis unit is configured to: find, by using the data read by the IO unit, a rule description that matches the behavior information sent by the user behavior collection module, and correspondingly describe the rule according to the found rule
  • the processing manner processes the behavior information and sends the processing result to the UI module.
  • a method of processing user behavior comprising:
  • the rule description of the behavior information is stored in the knowledge base ontology.
  • the basic knowledge base and the rule base included in the provided knowledge base body include various basic knowledge and rule policies for processing user behavior, and after the user interface UI module receives the corresponding user behavior information,
  • the knowledge base body can be read, the rule description matching the behavior information of the user line in the rule base is searched, and the behavior information is processed according to the corresponding processing manner of the rule description, and the user behavior information is processed. It can be used to deploy VM commands, create VM commands, and user login commands. It is applicable to different scenarios and provides users with a better operation and maintenance experience.
  • FIG. 1 is a structural block diagram of a user behavior processing system according to Embodiment 1 of the present invention.
  • FIG. 2 is a schematic structural diagram of a knowledge base body according to Embodiment 1 of the present invention.
  • FIG. 3 is a schematic structural diagram of a rule base according to Embodiment 1 of the present invention.
  • FIG. 4 is a flowchart of an implementation of a method for processing user behavior by using a user behavior processing system as shown in FIG. 1 according to Embodiment 2 of the present invention
  • FIG. 5 is a flowchart of an implementation of a method for processing user behavior by using a user behavior processing system as shown in FIG. 1 according to Embodiment 3 of the present invention
  • FIG. 6 is a flowchart of an implementation of deploying a virtual machine by using a user behavior processing system shown in FIG. 1 according to Embodiment 4 of the present invention
  • FIG. 7 is a flowchart of an implementation of creating a virtual machine by using a user behavior processing system shown in FIG. 1 according to Embodiment 5 of the present invention
  • FIG. 8 is a flowchart of implementing user behavior prediction by using the user behavior processing system shown in FIG. 1 according to Embodiment 6 of the present invention.
  • the basic knowledge base and the rule base included in the provided knowledge base body include various basic knowledge and rule policies for processing user behavior, and after the user interface UI module receives the corresponding user behavior information,
  • the knowledge base body can be read, the rule description matching the behavior information of the user line in the rule base is searched, and the behavior information is processed according to the corresponding processing manner of the rule description, and the user behavior information is processed. It can be used to deploy virtual machine commands or create one of the virtual machine commands and user login commands to provide users with a better operation and maintenance experience.
  • FIG. 1 is a structural block diagram of a user behavior processing system according to Embodiment 1 of the present invention. For convenience of description, only parts related to the embodiment of the present invention are shown.
  • the user behavior processing system 1 includes: a user interface (User Interface, UI) module 11, user behavior acquisition module 12 and knowledge base module 13.
  • UI User Interface
  • the UI module 11 is configured to interact with a user, receive behavior information input by the user, and display the behavior information to the user, where the behavior information is a virtual machine command, a virtual machine command, and a user login command.
  • the behavior information is a virtual machine command, a virtual machine command, and a user login command.
  • the virtual machine command, the virtual machine command, and the user login command are configured, and other behavior information is processed and the virtual machine command is deployed.
  • the process of creating a VM command is similar to that of a user login command, and is not described here.
  • the user behavior collection module 12 is configured to acquire behavior information received by the UI module 11 and send the behavior information to the knowledge base module 13;
  • the knowledge base module 13 includes an IO unit 131, a behavior analysis unit 132, and a knowledge base ontology 133.
  • the knowledge base body stores a rule description for processing the behavior information, including a basic knowledge base and a rule base, where the The rule base is also known as the policy library.
  • the knowledge base is as shown in FIG. 2, and the rule base includes the following information: behavior information, a rule description corresponding to the behavior information, and a processing manner corresponding to the rule description; the basic knowledge base includes the following categories.
  • the record may be specifically added according to the user behavior information that the user interacts with the UI module 11.
  • each type of basic knowledge contains multiple attributes, for example, the fault management class includes fault information and a system event log (SEL System). Event Log, SEL) information; user behavior classes include historical operation logs, common functions, and recently used functions; security classes include sensitive function usage records; recommended configuration/operation description classes include optimal recommended configurations and optimal operational paths; The virtual machine priority and the virtual machine actually use the resources.
  • the basic knowledge categories included in the corresponding processing manners are described according to rules in the rule base, and the basic knowledge of the basic knowledge categories in the basic knowledge base is read, and the behavior information is performed. deal with.
  • the rule base stores various rule policies, including a large classification, a small classification, behavior information, a rule description, and a processing manner.
  • the behavior information may also be represented by a code or a number corresponding to the behavior information.
  • the rule description is used to describe the behavior information corresponding to the processing mode. For example, as shown in FIG. 3, the rule description corresponding to the small category “2” is “processing when creating a virtual machine”, and the processing method corresponding to the small category “2” is “recording”.
  • the next virtual machine parameter && see whether the virtual machine && is the same configuration has been created in the last few times. If you create it, you are advised to use the clone virtual machine function.
  • This record indicates that when the user behavior is to create a virtual machine, the behavior is first passed.
  • the analyzing unit reads the rule base, and finds a rule description “Processing when creating a virtual machine” that matches the created virtual machine from the rule base, according to the description in the processing manner corresponding to “Processing when creating a virtual machine” Record the virtual machine parameters && see if you have created the same configured virtual machine && if you have created it, it is recommended to use the clone virtual machine function.
  • the IO unit 131 is configured to perform a read operation on the knowledge base body 133. Further, operations such as modification, addition, deletion, and the like may be performed, and the connection, query, and modification of the database are encapsulated in a function form. New, delete, and other SQL statements can be called by external units, such as by the behavior analysis unit 132 to enrich the database and learn the database; UI modules 11 such as WEB, CLI, GUI, etc. can also call the IO unit 131, the user directly The IO unit 131 is called by the UI module 11 to perform various operations on the knowledge base body 133.
  • the behavior analysis unit 132 is configured to search, from the knowledge base ontology data read by the IO unit 131, a rule description that matches the behavior information received by the user behavior collection module 12, according to the found rule. The corresponding processing manner is described to process the behavior information, and the processing result is sent to the IO unit 131, and finally the processing result is sent by the IO unit 131 to the user interface UI module 11.
  • the behavior analysis unit 132 includes: a matching subunit, a basic knowledge base reading subunit, and a behavior processing subunit.
  • the matching subunit is configured to search, from the rule base of the knowledge base body 133, a rule description that matches the behavior information received by the user behavior collection module 12;
  • the basic knowledge base reading subunit is configured to read the basic knowledge of the corresponding basic knowledge category in the basic knowledge base according to the basic knowledge category included in the corresponding processing manner according to the rule found by the matching subunit;
  • the behavior processing sub-unit is configured to perform corresponding processing on the behavior information according to the basic knowledge read by the basic knowledge base reading subunit.
  • the behavior analysis unit 132 further includes a behavior recording unit, configured to: after the matching subunit searches for the rule description matching the behavior information received by the user behavior collection module 12 from the rule base of the knowledge base body 133 The behavior information is recorded in the historical operation log of the user behavior class basic knowledge of the basic knowledge base.
  • the behavior information received by the knowledge base module 13 is to create a virtual machine
  • the behavior analysis unit 132 may first store the behavior information in a historical operation log of the user behavior basic knowledge of the basic knowledge base, in the historical operation log. Recording the user's current behavior is to create a virtual machine, and to create a virtual machine a few times, and then according to the historical operation log for corresponding processing.
  • the behavior analysis unit 132 obtains three virtual machines having the same configuration by continuously reading the virtual machine operation record field in the history operation log of the user behavior class basic knowledge of the basic knowledge base, according to the rules, Describe "If you create a user, use the clone virtual machine feature" to find the cloned virtual machine operating instructions in the base knowledge base, perform a virtual machine clone operation, and present instructions for use to the user.
  • the user behavior collection module in the user behavior processing system is responsible for collecting behavior information of interaction between the user and the UI module, and sending the behavior information to the knowledge base module, so that the knowledge base module according to the knowledge base thereof
  • the basic knowledge and rule base stored in the ontology process the behavior information accordingly.
  • the rule library stores the corresponding processing method corresponding to the behavior information, and further includes data such as the historical behavior of the user, the user can be instructed to perform the corresponding behaviors more effectively, for example, guiding the user to create a virtual machine in batches and deploy the virtual machine. .
  • the user behavior can be predicted by analyzing the user behavior.
  • the user's recent action tracking is performed, and the user's common operation is to create a virtual machine.
  • the virtual machine is deleted when the user logs out.
  • a virtual machine is prepared for the user in advance.
  • the user can flexibly expand the basic knowledge base in the knowledge base ontology through the IO module, and can also flexibly define the rule base.
  • FIG. 4 is a flowchart showing an implementation process of a method for processing user behavior by using the user behavior processing system shown in FIG. 1 according to Embodiment 2 of the present invention, which is described in detail as follows:
  • step S401 the user interface UI module receives behavior information input by the user.
  • the user interface UI module interacts with the user, receives the behavior information input by the user, and displays the behavior information to the user, where the behavior information is a virtual machine command, a virtual machine command, and a user login.
  • the behavior information is a virtual machine command, a virtual machine command, and a user login.
  • step S402 a rule description matching the behavior information is found in the knowledge base, and the behavior information is processed according to the corresponding processing method of the found rule description, and the processing result is fed back.
  • the knowledge base includes a basic knowledge base and a rule base, wherein the rule base includes the following information: behavior information, a rule description corresponding to the behavior information, and a processing manner corresponding to the rule description;
  • the basic knowledge is A method record for processing behavior information, including basic knowledge of at least one of the following categories: fault management class, user behavior class, security class, recommended configuration class, operation description class, and quality of service class. For details, refer to the description in the first embodiment, and details are not described herein again.
  • the behavior information of the user is received, and the rule description matching the behavior information is found in the knowledge base, and the behavior information is processed correspondingly according to the processing method of the found rule description.
  • the knowledge base module stores data such as processing methods corresponding to the corresponding behavior information, the user can be instructed to perform corresponding behaviors more effectively, and the application scenario is more extensive, which also brings a better operation and maintenance experience for the user.
  • FIG. 5 is a flowchart showing an implementation process of a method for processing user behavior by using the user behavior processing system shown in FIG. 1 according to Embodiment 3 of the present invention, which is described in detail as follows:
  • step S501 the user interface UI module receives behavior information input by the user.
  • the user interface UI module interacts with the user, receives the behavior information input by the user, and displays the behavior information to the user, where the behavior information is a virtual machine command, a virtual machine command, and a user login.
  • the behavior information is a virtual machine command, a virtual machine command, and a user login.
  • step S502 the user behavior collection module acquires behavior information sent by the UI module, and sends the behavior information to the knowledge base module.
  • the user behavior collection module acquires behavior information sent by the UI module, and sends the behavior information to the knowledge base module.
  • the knowledge base module includes: an IO unit, a behavior analysis unit, and a knowledge base ontology, wherein the knowledge base body stores various basic knowledge and rule policies for processing user behavior. For details, refer to the description in the first embodiment, and details are not described herein again.
  • step S503 the knowledge base module searches for a rule description that matches the behavior information sent by the user behavior collection module, and processes the behavior information according to the found rule description corresponding processing manner, and feeds back Process the results to the user.
  • the user behavior collection module is configured to collect behavior information of interaction between the user and the UI module, and send the behavior information to the knowledge base module, where the knowledge base module finds and sends the user behavior collection module.
  • the rule description of the behavior information matching, the corresponding processing manner is described according to the rule description, and the behavior information is processed correspondingly.
  • the knowledge base module stores data such as the processing mode corresponding to the behavior information, the user can be instructed to perform the corresponding behaviors more effectively. For example, the user is instructed to create a virtual machine and deploy a virtual machine in batches.
  • the basic knowledge base stores the user's behavior information
  • the user behavior can be predicted by analyzing the user behavior, for example, by the user's recent motion tracking, it is known that the user's common operation is to create a virtual machine, and then the user logs out. The virtual machine is deleted, and the next time the user logs in, a virtual machine is prepared for the user in advance.
  • the user can flexibly expand the basic knowledge base in the knowledge base ontology through the IO module, and can also flexibly define the rule base.
  • FIG. 6 is a flowchart showing an implementation process of deploying a virtual machine by using the user behavior processing system shown in FIG. 1 according to the fourth embodiment of the present invention.
  • the virtual machine can be deployed through the process, as follows:
  • step S601 the user interface UI module receives the deployment virtual machine command input by the user, and displays the deployed virtual machine command to the user.
  • step S602 the user behavior collection module acquires the deployment virtual machine command sent by the UI module, and sends the deployment virtual machine command to the knowledge base module.
  • step S603 the knowledge base module searches for a record describing the rule as a virtual machine command, processes the deployment virtual machine command according to the processing mode corresponding to the deployment virtual machine command, and feeds back the processing result to the user.
  • the knowledge base module search rule is described as a related processing manner for deploying a virtual machine command. For example, when the processing method corresponding to the deployment of the virtual machine command is found, the alarmed resource cannot be used for deploying the virtual machine and the load. >60% of resources cannot be used to deploy virtual machines, traverse idle resources, and determine which resources are available according to the fault management class and resource load class in the basic knowledge base. For example, the fault management class records CPU1 warning, CPU2 health, and network card Nic1.
  • Health network card Nic2 health
  • resource load class records CPU1 load 30%, CPU2 load 20%, network card Nic1 load 20%, network card Nic2 load 30%; add available resources to the list of available resources, and determine whether the available resources are sufficient to deploy 100 virtual machines, if yes, deploy the virtual machine and feed back and present the deployment results to the user. Otherwise, if the resources are insufficient, return insufficient resources to the user.
  • the user behavior information is a virtual machine command
  • the user behavior collection module sends the information to the knowledge base module, and the knowledge base module searches for a record describing the rule as a virtual machine command.
  • the deployment VM command is processed according to the processing mode of the deployment VM command, and the user is automatically instructed to deploy the VM in batches.
  • FIG. 7 is a flowchart showing an implementation process of creating a virtual machine by using the user behavior processing system shown in FIG. 1 according to the fifth embodiment of the present invention.
  • the virtual machine can be created through the process, as follows:
  • step S701 the user interface UI module receives a create virtual machine command input by the user, and displays the create virtual machine command to the user.
  • the user creates a virtual machine through the web.
  • step S702 the user behavior collection module acquires a create virtual machine command sent by the UI module, and sends the create virtual machine command to the knowledge base module.
  • step S703 the knowledge base module searches for a record describing the rule as a virtual machine command, processes the created virtual machine command according to the processing mode corresponding to the create virtual machine command, and feeds back the processing result to the user.
  • the knowledge base module search rule is described as a related processing manner for creating a virtual machine command. For example, when the processing method corresponding to the virtual machine command is found, the virtual machine parameter is recorded. Whether you have created a virtual machine with the same configuration, if you have created it, you are advised to use the clone virtual machine function.
  • the knowledge base module also has a clone prompt for suggesting that the user use the clone virtual machine function. For example, when the knowledge base module finds the virtual machine operation record field in the historical operation log and obtains that three virtual machines with the same configuration have been created continuously, according to the description in the process, “if the user is created, the user is recommended to use the clone.
  • the virtual machine function "find the cloned virtual machine operation instructions in the basic knowledge base, performs the virtual machine cloning operation, and presents the usage instructions to the user.
  • the user behavior information is a virtual machine creation command
  • the user behavior collection module collects the information
  • the user behavior collection module sends the information to the knowledge base module
  • the knowledge base module searches for a record describing the rule as creating a virtual machine command.
  • the process of creating a virtual machine is processed according to the processing mode corresponding to the command for creating a virtual machine, and the user is automatically instructed to create a virtual machine in batches.
  • FIG. 8 is a flowchart showing an implementation process of behavior prediction using the user behavior processing system shown in FIG. 1 according to Embodiment 6 of the present invention.
  • the user behavior prediction can be performed according to the login command of the user, which is as follows:
  • step S801 the user's usual operations are collected each time the user logs in or logs out.
  • the user behavior processing system collects the user's operation, and records the name and the number of the operation into the basic knowledge base, so that the basic knowledge base stores the user's common usage. operating.
  • step S802 the common operation is stored in the basic knowledge base.
  • step S803 the usual operation is directly executed when the user logs in or logs out next time.
  • the common operation of collecting the user is to create a virtual machine, and the user behavior processing system automatically prepares a virtual machine for the user in advance when the user logs in, when the user logs out, The virtual machine is automatically deleted or if the virtual machine is not deleted when the user logs out, the user is reminded whether the virtual machine needs to be destroyed.
  • each unit included is only divided according to functional logic, but is not limited to the above division, as long as the corresponding function can be implemented; in addition, the specific name of each functional unit It is also for convenience of distinguishing from each other and is not intended to limit the scope of protection of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Evolutionary Computation (AREA)
  • Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Artificial Intelligence (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Debugging And Monitoring (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

本发明适用于云计算技术领域,提供了一种用户行为处理***及方法,所述***包括:用户接口UI模块;用户行为采集模块,用于获取UI模块接收的行为信息,并将该行为信息发送给知识库模块;知识库模块包括:IO单元、行为分析单元和知识库本体;知识库本体中存储有对该行为信息进行处理的规则描述;IO单元,用于读取知识库本体中的数据;行为分析单元从IO单元读取到的数据中查找到与该行为信息匹配的规则描述,按照查找到的规则描述对应的处理方式对该行为信息进行处理,并发送处理结果至UI模块。本发明,可以处理的用户行为信息可以为部署虚拟机命令、创建虚拟机命令和用户登录命令中的一种,为用户带来了更好的运维体验。

Description

一种用户行为处理***及方法 技术领域
本发明属于云计算技术领域,尤其涉及一种用户行为处理***及方法。
背景技术
近来,各大厂商分别推出了用于云计算的基础设施-云平台服务器。用于云平台服务器的服务器管理软件和传统的服务器的柜内管理软件相比,承载着更多更复杂的管理任务。如何适应多变的场景,及为用户带来更好的运维管理体验是设计云平台服务器的服务器管理软件时的一大课题。
目前,用户行为分析在搜索引擎、网站用户行为分析、网络性能影响分析、用户安全分析领域都得到了广泛的应用。传统的用户行为分析应用领域包括基于受众行为分析广告定向等,其利用收集到的用户访问轨迹信息,定向投放广告。但是,这种技术中,用户行为分析的应用领域与应用场景关系比较紧密,如策略库等都是针对用户访问轨迹、安全策略等设计的,应用适用场景受限,用户体验效果比较差。
技术问题
本发明实施例提供了一种用户行为处理***及方法,旨在解决现有技术提供的用户行为分析的应用领域与应用场景关系比较紧密,用户体验差的问题。
技术解决方案
一方面,提供一种用户行为处理***,所述***包括:
用户接口UI模块,用于接收用户输入的行为信息,以及接收知识库模块发送的所述行为信息的处理结果;
用户行为采集模块,用于获取所述UI模块接收的所述行为信息,并将所述行为信息发送给所述知识库模块;
所述知识库模块包括:IO单元、行为分析单元和知识库本体;
所述知识库本体中存储有对所述行为信息进行处理的规则描述;
所述IO单元,用于读取所述知识库本体中的数据;
所述行为分析单元,用于从所述IO单元读取到的所述数据中查找到与所述用户行为采集模块发送的所述行为信息匹配的规则描述,按照所述查找到的规则描述对应的处理方式对所述行为信息进行处理,并发送处理结果至所述UI模块。
另一方面,提供一种处理用户行为的方法,所述方法包括:
接收用户输入的行为信息;
在知识库本体中查找到与所述行为信息匹配的规则描述,按照所述查找到的规则描述对应的处理方式对所述行为信息进行处理,并反馈处理结果;
其中,所述知识库本体中存储有对所述行为信息进行处理的所述规则描述。
有益效果
在本发明实施例中,提供的知识库本体中包括的基础知识库和规则库中包括了对用户行为进行处理的各类基础知识和规则策略,当用户接口UI模块接收相应的用户行为信息后,即可读取所述知识库本体,查找到规则库中与所述用户行行为信息匹配的规则描述,按照所述规则描述对应的处理方式对所述行为信息进行处理,所述用户行为信息可以为部署虚拟机命令、创建虚拟机命令和用户登录命令中的一种,适用于不同场景应用,为用户带来了更好的运维体验。
附图说明
图1是本发明实施例一提供的用户行为处理***的结构框图;
图2是本发明实施例一提供的知识库本体的结构示意图;
图3是本发明实施例一提供的规则库的结构示意图;
图4是本发明实施例二提供的利用如图1所示的用户行为处理***处理用户行为的方法的实现流程图;
图5是本发明实施例三提供的利用如图1所示的用户行为处理***处理用户行为的方法的实现流程图;
图6是本发明实施例四提供的利用如图1所示的用户行为处理***部署虚拟机的实现流程图;
图7是本发明实施例五提供的利用如图1所示的用户行为处理***创建虚拟机的实现流程图;
图8是本发明实施例六提供的利用如图1所示的用户行为处理***进行用户行为预测的实现流程图。
本发明的实施方式
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
在本发明实施例中,提供的知识库本体中包括的基础知识库和规则库中包括了对用户行为进行处理的各类基础知识和规则策略,当用户接口UI模块接收相应的用户行为信息后,即可读取所述知识库本体,查找到规则库中与所述用户行行为信息匹配的规则描述,按照所述规则描述对应的处理方式对所述行为信息进行处理,所述用户行为信息可以为部署虚拟机命令,也可以为创建虚拟机命令和用户登录命令中的一种,为用户带来了更好的运维体验。
以下结合具体实施例对本发明的实现进行详细描述:
实施例一
图1示出了本发明实施例一提供的用户行为处理***的结构框图,为了便于说明,仅示出了与本发明实施例相关的部分。
服务器管理时,会有大量的知识数据产生。如用户操作日志,资源健康状态、资源利用率等。如何将这些知识数据利用起来,支持用户有效的进行服务器管理?同时,作为新一代管理软件,必不可少会有很多新的管理特性,如:批量部署虚拟机等。而对习惯了传统操作方式的用户,如何指导他们高效的使用管理***呢? 作为用户,必然会有一些特征,如开发测试类用户,很有可能每次都是创建一个虚拟机,用完之后销毁退出。如何抓住用户的这些特征,给用户带来更好的运维体验呢?
这是本发明实施例提供的用户行为处理***要解决的问题,所述用户行为处理***1包括:用户接口(User Interface,UI)模块11、用户行为采集模块12和知识库模块13。
其中,所述UI模块11用于与用户进行交互,接收用户输入的行为信息,并显示所述行为信息至用户,其中,所述行为信息为部署虚拟机命令、创建虚拟机命令、用户登录命令、故障处理命令和虚拟机迁移命令等中的一种,在本实施例中只介绍了部署虚拟机命令、创建虚拟机命令和用户登录命令,对其它行为信息的处理与对部署虚拟机命令、创建虚拟机命令和用户登录命令的处理过程类似,在此不再赘述;
用户行为采集模块12用于获取所述UI模块11接收的行为信息,并将所述行为信息发送给知识库模块13;
所述知识库模块13包括IO单元131、行为分析单元132和知识库本体133,所述知识库本体存储有对所述行为信息进行处理的规则描述,包括基础知识库和规则库,其中,该规则库也称为策略库。
具体的,所述知识库本体如图2所示,所述规则库中包括如下信息:行为信息、该行为信息对应的规则描述以及该规则描述对应的处理方式;所述基础知识库包括如下类别中的至少一种的基础知识:故障管理类、用户行为类、安全类、推荐配置类、操作说明类和服务质量类,其中,每种类别的基础知识是对一种行为信息进行处理的方法记录,具体可以根据用户与UI模块11所交互的用户行为信息进行添加。
进一步地,每一类基础知识又包含多个属性,比如,故障管理类包括故障信息和***事件日志(SEL System Event Log,SEL)信息;用户行为类包括历史操作日志、常用功能和最近使用功能;安全类包括敏感功能使用记录;推荐配置/操作说明类包括最优推荐配置和最优操作路径;服务质量类包括虚拟机优先级和虚拟机实际利用资源,具体可以根据规则库中的规则描述对应的处理方式中所包含的基础知识类别,读取基础知识库中该基础知识类别的基础知识,对行为信息进行处理。
所述规则库如图3所示,存储有各类规则策略,具体包括大分类、小分类、行为信息、规则描述和处理方式,其中的行为信息也可以采用行为信息对应的代码或编号来表示。规则描述用于描述处理方式对应的行为信息,比如,如图3所示,小分类“2”对应的规则描述是“创建虚拟机时处理”,小分类“2”对应的处理方式是“记录下虚拟机参数&&查看最近几次是否创建过同样配置的虚拟机&&如果创建过则建议用户使用克隆虚拟机功能”,这一项记录表示,当用户行为是进行创建虚拟机时,先通过行为分析单元读取所述规则库,从所述规则库中查找到与创建虚拟机匹配的规则描述“创建虚拟机时处理”,按照与“创建虚拟机时处理”对应的处理方式中描述的“记录下虚拟机参数&&查看最近几次是否创建过同样配置的虚拟机&&如果创建过则建议用户使用克隆虚拟机功能”进行处理。
所述IO单元131,用于对所述知识库本体133进行读取操作,进一步的,也可以进行修改、新增、删除等操作,其是以函数形式封装对数据库的连接、查询、修改、新增、删除等SQL语句,可被外部单元调用,比如被行为分析单元132调用,来充实数据库,并进行数据库的学习;WEB、CLI、GUI等UI模块11也可调用IO单元131,用户直接通过UI模块11调用IO单元131对知识库本体133进行各种操作。
所述行为分析单元132,用于从所述IO单元131读取到的知识库本体数据中查找到与所述用户行为采集模块12接收的行为信息匹配的规则描述,按照所述查找到的规则描述对应的处理方式对所述行为信息进行处理,并发送处理结果至IO单元131,最后由IO单元131发送所述处理结果至用户接口UI模块11。
进一步的,所述行为分析单元132包括:匹配子单元、基础知识库读取子单元和行为处理子单元。
其中,匹配子单元,用于从所述知识库本体133的规则库中查找到与所述用户行为采集模块12接收的行为信息匹配的规则描述;
基础知识库读取子单元,用于根据所述匹配子单元查找到的规则描述对应的处理方式中包含的基础知识类别读取基础知识库中的相应基础知识类别的基础知识;
行为处理子单元,用于根据所述基础知识库读取子单元读取到的基础知识对所述行为信息进行相应的处理。
另外,所述行为分析单元132还包括行为记录单元,用于在匹配子单元从所述知识库本体133的规则库中查找到与所述用户行为采集模块12接收的行为信息匹配的规则描述后,将所述行为信息记录在基础知识库的用户行为类基础知识的历史操作日志中。
比如,知识库模块13接收到的行为信息是创建虚拟机,行为分析单元132即可先将该行为信息存储在基础知识库的用户行为类基础知识的历史操作日志中,在该历史操作日志中记录用户本次的行为是创建虚拟机,以及是第几次创建虚拟机,再根据所述历史操作日志进行相应的处理。比如,当行为分析单元132通过读取基础知识库的用户行为类基础知识的历史操作日志中的虚拟机操作记录字段获取到已经连续创建三个配置相同的虚拟机,则根据所述规则中的描述“如果创建过则建议用户使用克隆虚拟机功能”查找基础知识库中的克隆虚拟机操作说明,进行虚拟机克隆操作,并呈现使用说明至用户。
本实施例,用户行为处理***中的用户行为采集模块负责采集用户和UI模块之间交互的行为信息,并将所述行为信息发送给知识库模块,以由所述知识库模块根据其知识库本体中存储的基础知识和规则库对所述行为信息进行相应的处理。由于规则库中存储有相应行为信息对应的处理方法,并进一步包括用户的历史行为等数据,因此,可以指导用户更有效的进行相应的行为操作,比如,指导用户批量创建虚拟机、部署虚拟机。另外,由于基础知识库中存储有用户的行为信息,因此,可以通过分析用户行为,预测用户动作,比如,用户登录时,通过用户最近动作跟踪,得知用户的常用操作是创建虚拟机,则在用户登出时将该虚拟机删除,用户下次登录时,替用户提前准备好一个虚拟机。当然,用户可以通过IO模块对知识库本体中的基础知识库进行灵活扩充,也可对规则库进行灵活定义。
实施例二
图4示出了本发明实施例二提供的利用如图1所示的用户行为处理***处理用户行为的方法的实现流程,详述如下:
在步骤S401中,用户接口UI模块接收用户输入的行为信息。
在本实施例中,用户接口UI模块与用户进行交互,接收用户输入的行为信息,并显示所述行为信息至用户,其中,所述行为信息为部署虚拟机命令、创建虚拟机命令和用户登录命令中的一种。
在步骤S402中,在知识库本体中查找到与所述行为信息匹配的规则描述,按照所述查找到的规则描述对应的处理方式对所述行为信息进行处理,并反馈处理结果。
在本实施例中,知识库本体包括基础知识库和规则库,其中,规则库中包括如下信息:行为信息、所述行为信息对应的规则描述以及所述规则描述对应的处理方式;基础知识是对行为信息进行处理的方法记录,包括如下类别中的至少一种类别的基础知识:故障管理类、用户行为类、安全类、推荐配置类、操作说明类和服务质量类。详细介绍,请参见实施例一中的描述,在此不再赘述。
本实施例,接收用户的行为信息,在知识库本体中查找到与所述行为信息匹配的规则描述,按照所述查找到的规则描述对应的处理方式对所述行为信息进行相应的处理。由于知识库模块中存储有相应行为信息对应的处理方式等数据,因此,可以指导用户更有效的进行相应的行为操作,应用场景更加广泛,也为用户带来了更好的运维体验。
实施例三
图5示出了本发明实施例三提供的利用如图1所示的用户行为处理***处理用户行为的方法的实现流程,详述如下:
在步骤S501中,用户接口UI模块接收用户输入的行为信息。
在本实施例中,用户接口UI模块与用户进行交互,接收用户输入的行为信息,并显示所述行为信息至用户,其中,所述行为信息为部署虚拟机命令、创建虚拟机命令和用户登录命令中的一种。
在步骤S502中,用户行为采集模块获取所述UI模块发送的行为信息,并将所述行为信息发送给知识库模块。
在本实施例中,用户行为采集模块获取所述UI模块发送的行为信息,并将所述行为信息发送给知识库模块。其中,所述知识库模块包括:IO单元、行为分析单元和知识库本体,所述知识库本体中存储有对用户行为进行处理的各类基础知识和规则策略。详细介绍,请参见实施例一中的描述,在此不再赘述。
在步骤S503中,所述知识库模块查找到与所述用户行为采集模块发送的行为信息匹配的规则描述,按照所述查找到的规则描述对应的处理方式对所述行为信息进行处理,并反馈处理结果至用户。
本实施例,用户行为采集模块负责采集用户和UI模块之间交互的行为信息,并将所述行为信息发送给知识库模块,以由所述知识库模块查找到与所述用户行为采集模块发送的行为信息匹配的规则描述,按照所述规则描述对应的处理方式对所述行为信息进行相应的处理。由于知识库模块中存储有相应行为信息对应的处理方式等数据,因此,可以指导用户更有效的进行相应的行为操作,比如,指导用户批量创建虚拟机、部署虚拟机。另外,由于基础知识库中存储有用户的行为信息,因此,可以通过分析用户行为,预测用户动作,比如,通过用户最近动作跟踪,得知用户的常用操作是创建虚拟机,则在用户登出时将该虚拟机删除,用户下次登录时,替用户提前准备好一个虚拟机。当然,用户可以通过IO模块对知识库本体中的基础知识库进行灵活扩充,也可对规则库进行灵活定义。
实施例四
图6示出了本发明实施例四提供的利用如图1所示的用户行为处理***部署虚拟机的实现流程,通过该流程可以实现部署虚拟机,详述如下:
在步骤S601中,用户接口UI模块接收用户输入的部署虚拟机命令,并显示所述部署虚拟机命令至用户。
在步骤S602中,用户行为采集模块获取所述UI模块发送的部署虚拟机命令,并将所述部署虚拟机命令发送给知识库模块。
在步骤S603中,所述知识库模块查找到规则描述为部署虚拟机命令的记录,按照所述部署虚拟机命令对应的处理方式对所述部署虚拟机命令进行处理,并反馈处理结果至用户。
在本发明实施例中,知识库模块查找规则描述为部署虚拟机命令的相关处理方式,比如,当查找到与部署虚拟机命令对应的处理方式包括:已预警资源不能用于部署虚拟机和负载>60%的资源不能用于部署虚拟机后,遍历空闲资源,根据基础知识库中的故障管理类和资源负载类来判断哪些资源可用,比如,故障管理类记载CPU1预警、CPU2健康、网卡Nic1健康、网卡Nic2健康;资源负载类记载CPU1负载30%、CPU2负载20%、网卡Nic1负载20%、网卡Nic2负载30%;将可用的资源加入可用资源列表,并判断所述可用资源是否足够部署100个虚拟机,如果是,则部署虚拟机并反馈并呈现部署结果至用户,否则,如果资源不够,则返回资源不够信息至用户。
本实施例,当用户行为信息是部署虚拟机命令时,用户行为采集模块获取到该信息后,发送该信息至知识库模块,所述知识库模块查找到规则描述为部署虚拟机命令的记录,按照所述部署虚拟机命令对应的处理方式对所述部署虚拟机命令进行处理,自动指导用户批量部署虚拟机。
实施例五
图7示出了本发明实施例五提供的利用如图1所示的用户行为处理***创建虚拟机的实现流程,通过该流程可以实现创建虚拟机,详述如下:
在步骤S701中,用户接口UI模块接收用户输入的创建虚拟机命令,并显示所述创建虚拟机命令至用户。
在本实施例中,用户通过web创建虚拟机。
在步骤S702中,用户行为采集模块获取所述UI模块发送的创建虚拟机命令,并将所述创建虚拟机命令发送给知识库模块。
在步骤S703中,所述知识库模块查找到规则描述为创建虚拟机命令的记录,按照所述创建虚拟机命令对应的处理方式对所述创建虚拟机命令进行处理,并反馈处理结果至用户。
在本发明实施例中,所述知识库模块查找规则描述为创建虚拟机命令的相关处理方式,比如,当查找到与创建虚拟机命令对应的处理方式包括:记录下虚拟机参数查看最近几次是否创建过同样配置的虚拟机如果创建过则建议用户使用克隆虚拟机功能。
另外,所述知识库模块还具有克隆提示,用于建议用户使用克隆虚拟机功能。比如,当所述知识库模块查找到历史操作日志中的虚拟机操作记录字段获取到已经连续创建三个配置相同的虚拟机,则根据所述处理中的描述“如果创建过则建议用户使用克隆虚拟机功能”查找基础知识库中的克隆虚拟机操作说明,进行虚拟机克隆操作,并呈现使用说明至用户。
本实施例,当用户行为信息是创建虚拟机命令时,用户行为采集模块采集到该信息后,发送该信息至知识库模块,所述知识库模块查找到规则描述为创建虚拟机命令的记录,按照所述创建虚拟机命令对应的处理方式对所述创建虚拟机命令进行处理,自动指导用户批量创建虚拟机。
实施例六
图8示出了本发明实施例六提供的利用如图1所示的用户行为处理***进行行为预测的实现流程,通过该流程可以根据用户的登录命令进行用户行为预测,详述如下:
在步骤S801中,每次用户登入或登出时,采集用户的常用操作。
在本实施例中,每次用户登入或登出时,用户行为处理***采集用户的操作,并记录所述操作的名称以及次数至基础知识库中,这样基础知识库中就存储有用户的常用操作。
在步骤S802中,存储所述常用操作至基础知识库中。
在步骤S803中,在用户下次登入或登出时,直接执行所述常用操作。
在本发明实施例中,比如,采集到用户的常用操作是创建虚拟机,则用户行为处理***则在用户登入时,用户行为处理***自动提前为用户准备一个虚拟机,在用户登出时,则自动将该虚拟机删除或者如果用户登出时没有删除虚拟机,则提醒用户是否需要将该虚拟机销毁。
本实施例,每次用户登入或登出时,采集用户的常用操作,将用户的常用操作写入基础知识库中,并在用户下次登入或登出时,直接执行所述常用操作,可以有效的对用户的行为进行预测。
具体各个单元的执行情况,可参见实施例一和实施例二中的方法的描述,在此不再赘述。值得注意的是,上述***实施例中,所包括的各个单元只是按照功能逻辑进行划分的,但并不局限于上述的划分,只要能够实现相应的功能即可;另外,各功能单元的具体名称也只是为了便于相互区分,并不用于限制本发明的保护范围。
另外,本领域普通技术人员可以理解实现上述各实施例方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,相应的程序可以存储于一计算机可读取存储介质中,所述的存储介质,如ROM/RAM、磁盘或光盘等。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。

Claims (11)

  1. 一种用户行为处理***,其特征在于,所述***包括:
    用户接口UI模块,用于接收用户输入的行为信息,以及接收知识库模块发送的所述行为信息的处理结果;
    用户行为采集模块,用于获取所述UI模块接收的所述行为信息,并将所述行为信息发送给所述知识库模块;
    所述知识库模块包括:IO单元、行为分析单元和知识库本体;
    所述知识库本体中存储有对所述行为信息进行处理的规则描述;
    所述IO单元,用于读取所述知识库本体中的数据;
    所述行为分析单元,用于从所述IO单元读取到的所述数据中查找到与所述用户行为采集模块发送的所述行为信息匹配的规则描述,按照所述查找到的规则描述对应的处理方式对所述行为信息进行处理,并发送处理结果至所述UI模块。
  2. 如权利要求1所述的用户行为处理***,其特征在于,所述行为信息为部署虚拟机命令、创建虚拟机命令和用户登录命令中的一种。
  3. 如权利要求1或2所述的用户行为处理***,其特征在于,所述知识库本体包括基础知识库和规则库;
    其中,所述规则库中包括如下信息:行为信息、所述行为信息对应的规则描述以及所述规则描述对应的处理方式;所述基础知识库是对行为信息进行处理的方法记录,包括如下类别中的至少一种类别的基础知识:故障管理类、用户行为类、安全类、推荐配置类、操作说明类和服务质量类。
  4. 如权利要求3所述的用户行为处理***,其特征在于,
    所述行为分析单元包括:匹配子单元、基础知识库读取子单元和行为处理子单元;
    所述匹配子单元,用于从所述规则库中查找到与所述用户行为采集模块发送的所述行为信息匹配的规则描述;
    所述基础知识库读取子单元,用于根据所述匹配子单元查找到的所述规则描述对应的处理方式中包含的基础知识类别读取所述基础知识库中所述基础知识类别的基础知识;
    所述行为处理子单元,用于根据所述基础知识库读取子单元读取到的所述基础知识对所述行为信息进行处理。
  5. 如权利要求4所述的用户行为处理***,其特征在于,所述行为分析单元还包括:
    行为记录单元,用于在从所述规则库中查找到与所述用户行为采集模块发送的所述行为信息匹配的规则描述后,将所述行为信息记录在所述基础知识库的用户行为类基础知识的历史操作日志中。
  6. 如权利要求2所述的用户行为处理***,其特征在于,当所述行为信息为创建虚拟机命令时,对所述行为信息进行的处理包括克隆提示,所述克隆提示建议用户使用克隆虚拟机功能。
  7. 一种用户行为处理的方法,其特征在于,所述方法包括:
    接收用户输入的行为信息;
    在知识库本体中查找到与所述行为信息匹配的规则描述,按照所述查找到的规则描述对应的处理方式对所述行为信息进行处理,并反馈处理结果;
    其中,所述知识库本体中存储有对所述行为信息进行处理的所述规则描述。
  8. 如权利要求7所述的方法,其特征在于,所述知识库本体包括基础知识库和规则库,其中,所述规则库中包括如下信息:行为信息、所述行为信息对应的规则描述以及所述规则描述对应的处理方式;所述基础知识是对行为信息进行处理的方法记录,包括如下类别中的至少一种类别的基础知识:故障管理类、用户行为类、安全类、推荐配置类、操作说明类和服务质量类。
  9. 如权利要求7或8所述的方法,其特征在于,所述按照查找到的所述规则描述对应的处理方式对所述行为信息进行处理,具体为:
    根据查找到的所述规则描述对应的处理方式中包含的基础知识类别读取所述基础知识类别的基础知识;
    根据读取到的所述基础知识对所述行为信息进行处理。
  10. 如权利要求7至9任意一项所述的方法,其特征在于,在所述在知识库本体中查找到与所述行为信息匹配的规则描述之后,所述方法还包括:
    将所述行为信息记录在所述知识库本体的用户行为类基础知识的历史操作日志中。
  11. 如权利要求7至10任意一项所述的方法,其特征在于,所述行为信息为部署虚拟机命令、创建虚拟机命令和用户登录命令中的一种。
PCT/CN2012/080572 2012-08-24 2012-08-24 一种用户行为处理***及方法 WO2014029111A1 (zh)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201280001963.2A CN103109293B (zh) 2012-08-24 2012-08-24 一种用户行为处理***及方法
PCT/CN2012/080572 WO2014029111A1 (zh) 2012-08-24 2012-08-24 一种用户行为处理***及方法

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2012/080572 WO2014029111A1 (zh) 2012-08-24 2012-08-24 一种用户行为处理***及方法

Publications (1)

Publication Number Publication Date
WO2014029111A1 true WO2014029111A1 (zh) 2014-02-27

Family

ID=48316005

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2012/080572 WO2014029111A1 (zh) 2012-08-24 2012-08-24 一种用户行为处理***及方法

Country Status (2)

Country Link
CN (1) CN103109293B (zh)
WO (1) WO2014029111A1 (zh)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103902885B (zh) * 2014-03-04 2017-11-17 重庆邮电大学 面向多安全等级虚拟桌面***虚拟机安全隔离***及方法
CN106161062A (zh) * 2015-04-09 2016-11-23 中兴通讯股份有限公司 一种云终端的接口设置方法及装置
CN104879886B (zh) * 2015-04-30 2018-10-02 广东美的制冷设备有限公司 家电设备的控制方法、装置及终端
CN106611347A (zh) * 2015-10-23 2017-05-03 北京国双科技有限公司 一种信息处理方法及装置
CN106294092B (zh) * 2016-08-17 2020-06-09 Tcl移动通信科技(宁波)有限公司 一种基于本体知识库的半自动日志分析方法及***
CN108762885B (zh) * 2018-04-27 2023-01-20 北京奇艺世纪科技有限公司 一种虚拟机创建方法、装置、管理设备及终端设备
CN111966703B (zh) * 2020-06-30 2023-11-03 广州迈安信息科技有限公司 工程造价数据查询方法、装置、服务器和存储介质
CN115829034B (zh) * 2023-01-09 2023-05-30 白杨时代(北京)科技有限公司 一种构建知识规则执行框架的方法及装置

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355504A (zh) * 2008-08-14 2009-01-28 成都市华为赛门铁克科技有限公司 一种用户行为的确定方法和装置
CN101719824A (zh) * 2009-11-24 2010-06-02 北京信息科技大学 一种基于网络行为检测的信任度评估***和方法
CN102438047A (zh) * 2011-12-13 2012-05-02 北京航空航天大学 一种移动互联网环境下的云服务安全动态自适应方法

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102004727A (zh) * 2009-09-01 2011-04-06 中兴通讯股份有限公司 一种知识数据处理***及其方法
CN102346667A (zh) * 2011-09-19 2012-02-08 北京金和软件股份有限公司 一种自动记录用户行为数据的实现方法

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101355504A (zh) * 2008-08-14 2009-01-28 成都市华为赛门铁克科技有限公司 一种用户行为的确定方法和装置
CN101719824A (zh) * 2009-11-24 2010-06-02 北京信息科技大学 一种基于网络行为检测的信任度评估***和方法
CN102438047A (zh) * 2011-12-13 2012-05-02 北京航空航天大学 一种移动互联网环境下的云服务安全动态自适应方法

Also Published As

Publication number Publication date
CN103109293B (zh) 2016-09-28
CN103109293A (zh) 2013-05-15

Similar Documents

Publication Publication Date Title
WO2014029111A1 (zh) 一种用户行为处理***及方法
US11968101B1 (en) Remote custom code pre-loading for hybrid playbook execution
US11922232B2 (en) Responding to incidents identified by an information technology and security operations application using a mobile application
US11880558B1 (en) Interface layout profiles including interface actions in an information technology and security operations application
US11620288B2 (en) Dynamically assigning a search head to process a query
WO2022078345A1 (zh) 多设备间的数据交互方法及相关设备
US6671829B2 (en) Method and apparatus for analyzing performance of data processing system
WO2014035043A1 (ko) 악성 애플리케이션 진단 장치 및 방법
WO2018014582A1 (zh) 保单数据处理方法、装置、服务器和存储介质
WO2018149083A1 (zh) 业务数据流转方法、装置、存储介质和终端
WO2018233037A1 (zh) 数据库集成测试方法、装置、服务器及存储介质
CN105184166A (zh) 基于内核的安卓程序实时行为分析方法及***
US20130111473A1 (en) Passive monitoring of virtual systems using extensible indexing
US11886844B1 (en) Updating reusable custom functions across playbooks
Dwaraki et al. GitFlow: Flow revision management for software-defined networks
WO2022059826A1 (ko) 디지털 트윈 환경 기반의 융합형 스마트-IoT 커넥티드 미들웨어 장치 및 제공 방법
WO2012070900A2 (ko) 개인 장치간 이벤트 및 데이터 공유 시스템
WO2011065660A2 (ko) 계산 시뮬레이션 모사 시스템 및 그 방법
WO2024090932A1 (ko) 수집 데이터 자동 처리를 위한 데이터 적재 프로파일링 장치 및 방법
WO2018043767A1 (ko) 데이터 에이전트 컨테이너를 이용한 데이터 수집 방법 및 이의 시스템
CN115987676A (zh) 跨域数据协同管理方法及装置
Zhang et al. Why do migrations fail and what can we do about it?
CN114443580A (zh) 一种数据清理方法、装置、介质及计算设备
WO2019156271A1 (ko) 데이터 순서를 이용한 원본 데이터 확인 방법 및 시스템
US20190190981A1 (en) Intelligent trace generation from compact transaction runtime data

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 201280001963.2

Country of ref document: CN

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12883330

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 12883330

Country of ref document: EP

Kind code of ref document: A1