CN106028283A - Method and system for analyzing user offline behaviors through wireless network data - Google Patents
Method and system for analyzing user offline behaviors through wireless network data Download PDFInfo
- Publication number
- CN106028283A CN106028283A CN201610357369.7A CN201610357369A CN106028283A CN 106028283 A CN106028283 A CN 106028283A CN 201610357369 A CN201610357369 A CN 201610357369A CN 106028283 A CN106028283 A CN 106028283A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- user
- behavior
- mac
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
- H04W4/025—Services making use of location information using location based information parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W24/00—Supervisory, monitoring or testing arrangements
- H04W24/08—Testing, supervising or monitoring using real traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W64/00—Locating users or terminals or network equipment for network management purposes, e.g. mobility management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2101/00—Indexing scheme associated with group H04L61/00
- H04L2101/60—Types of network addresses
- H04L2101/69—Types of network addresses using geographic information, e.g. room number
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method and a system for analyzing user offline behaviors through wireless network data. The method comprises steps: acquiring identity authentication information registered at a client of a mobile terminal by a user, and a user ID of the user; sending a HTTP request to a wireless access controller AC through the mobile terminal; after receiving the request, returning a terminal MAC back to the mobile terminal initiating the HTTP request by the AC; visiting each wireless access point AP by the mobile terminal; obtaining and recording time information of the mobile terminal, forming user behavior information, and matching the user behavior information with the user identity authentication information; transmitting matched data back to a server, combining the user identity information with the user behavior information to analyze offline behaviors of each user; and recording and performing statistics on the offline behaviors of each user. The method and the system for analyzing the user offline behaviors through the wireless network data, provided by the invention, can identify corresponding users of the mobile terminal connected with a wireless network, and can accurately analyze the offline behaviors of the users.
Description
Technical field
The present invention relates to moving communicating field, particularly relate to data analysis based on mobile Internet.
Background technology
In recent years, along with mobile terminal is to the intelligentized development of high-performance, intelligent mobile terminal has become as city
The main product of field.In addition intelligent mobile terminal can be connected with the Internet whenever and wherever possible, can use the Internet
On almost all functions, intelligent mobile terminal application program development very fast.
Prior art has been able to record the internet behavior of a certain mobile terminal, but can not tell this shifting
Whom the user of dynamic terminal is, therefore specific user (natural person) cannot be carried out behavior analysis under line, from
And obtain behavior analytical data under line accurately.
Additionally, prior art obtains the MAC of a certain mobile terminal, statistics often through the specific network equipment
Resolution later is the behavior of which mobile terminal, can not be obtained by mobile terminal self or APP self
Relevant information, this results in object of statistics and is only limited to pass by or the crowd of this network equipment close or mobile whole
End, so that the quantity of object of statistics is restricted, it is impossible to expand promoted extension.
Summary of the invention
The technical problem to be solved in the present invention is to provide by wireless network number towards crowd without geographical restrictions
According to analyzing the method and system of behavior under subscribers feeder, can be by the visitor on the mobile terminal of mobile interchange network users
Family end carries out the certification of Internet user's identity, closes with the unique corresponding of user according to the authentication information of user
System, may recognize that multiple mobile terminal corresponding be same user, make behavior analysis under acquisition subscribers feeder
Data will not repeat.Make client can not be obtained corresponding mobile terminal by what operating system limited simultaneously
MAC。
For solving above-mentioned technical problem, present invention provide the technical scheme that
First aspect, the present invention provides a kind of user data processing method based on WiFi, comprises the steps:
Step S1, the MAC of network interface card in WiFi probe obtains this region in monitored area, and record this network interface card
The visiting time, formed visiting record;
Step S2, according to the geographical position of WiFi probe and visiting record, add up this network interface card enter and/or from
Open the number of times in monitoring region.
The technical scheme is that the WiFi probe first passed through in monitored area obtains network interface card in this region
MAC, and record the visiting time of this network interface card, form visiting record;Then according to the geographical position of WiFi probe
Put and visit record, the number of times that this network interface card enters and/or leaves monitoring region can be added up.The present invention based on
The user data processing method of WiFi, as long as WiFi probe detects the network interface card in monitored area, will basis
Behavior under the line of the MAC corresponding network interface card of acquisition of network interface card, method is simple, has good using value, example
The pipe of customer resources is carried out as certain restaurant can enter and/or leave the number of times in monitoring region according to this network interface card
Reason.
The present invention provides through wireless network data and analyze the method for behavior under subscribers feeder, comprise the following steps:
Information registering step, obtains user the authentication information of the client registers of mobile terminal and user
ID, and described authentication information and ID are associated;
MAC obtaining step, by described mobile terminal via wireless access point AP to Radio Access Controller
AC sends HTTP request, and described HTTP request is used for accessing any one necessary being and not wireless
Network address in access controller AC white list, described white list represents the network address of the access Internet that directly lets pass
Set;After described Radio Access Controller AC receives above-mentioned request, via described wireless access point AP
Return to the mobile terminal initiating HTTP request and include mobile terminal MAC, wireless access point AP
MAC adds confidential information;Described mobile terminal deciphers the above-mentioned confidential information that adds to obtain described mobile terminal MAC
With wireless access point AP MAC information, and by corresponding with described mobile terminal for described mobile terminal MAC
Authentication information associates;
Behavior record step, each wireless access point AP that described mobile terminal accessing is crossed, all moves end to this
The visiting time of end, Connection Time, turn-off time and whether surfed the Net by this AP, online is when continuing
Between carry out record, form user behavior information, and this user behavior information fed back in each mobile terminal
Client;Client on described mobile terminal is by above-mentioned user behavior information and ID, authentication
Information, mobile terminal MAC and wireless access point AP MAC coupling, and pass the data after coupling back clothes
Business device;
Behavior analysis step, deposits unified for the data after above-mentioned coupling to server database, and according in advance
Wireless access point AP and the AP of storage installs the corresponding relation on ground, and described mobile terminal MAC and use
The corresponding relation at family, in conjunction with user behavior information, analyzes behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning
During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists
Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality
Border crawler behavior;
Statistic record step, records and adds up the above-mentioned behavior of each user.
The technical scheme is that and first obtain user's authentication information at the client registers of mobile terminal
And ID, and described authentication information and ID are associated;By described mobile terminal warp
Being sent HTTP request by wireless access point AP to Radio Access Controller AC, described HTTP request is used
In accessing any one necessary being and the not network address in Radio Access Controller AC white list, described in vain
List represents the network address set of the access Internet that directly lets pass;Described Radio Access Controller AC receives
After stating request, include to the mobile terminal return initiating HTTP request via described wireless access point AP
Mobile terminal MAC, wireless access point AP MAC add confidential information;In the deciphering of described mobile terminal
State and add confidential information to obtain described mobile terminal MAC and wireless access point AP MAC information, and by described
Authentication information association corresponding with described mobile terminal for mobile terminal MAC;Then mobile terminal accessing
The each wireless access point AP crossed, all to visiting time of this mobile terminal, the Connection Time, turn-off time,
And whether carry out record by this AP online, online persistent period, form user behavior information, and will
This user behavior information feeds back to the client in each mobile terminal;Client on described mobile terminal will
Above-mentioned user behavior information and ID, authentication information, mobile terminal MAC and wireless access point AP
MAC mates, and passes the data after coupling back server;Deposit unified for the data after above-mentioned coupling to service
Device data base, and according to the corresponding relation of the wireless access point AP prestored with AP installation ground, Yi Jisuo
State the corresponding relation of mobile terminal MAC and user, in conjunction with user behavior information, analyze the line of each user
Lower behavior:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning
During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists
Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality
Border crawler behavior;
Finally record and add up the above-mentioned behavior of each user.
The present invention analyzes the method for behavior under subscribers feeder by wireless network data, can analyze this user assorted
Local, when, all done a little what.Due to the phone number information of user, ID card information or
Other authentication information and the unique corresponding relation of described user, therefore if same user uses not
Two same mobile terminals are surfed the Net in somewhere, and it is the most corresponding that the method can identify the two mobile terminal
Be same user (natural person), and then the present invention analyzes behavior under subscribers feeder by wireless network data
Method, be possible not only to analyze mobile terminal line under behavior, it is also possible to analyze mobile terminal correspondence user
Line under behavior;It addition, the present invention analyzes under subscribers feeder in the method for behavior by wireless network data, logical
Cross the client on mobile terminal and just can obtain the MAC of mobile terminal, it is not necessary to set by specific network
Standby, as long as there being client on mobile terminal, it is possible to behavior under the line of user to be analyzed, therefore passes through
The present invention can be to more mobile phone users lines by the method for behavior under wireless network data analysis subscribers feeder
Lower behavior is analyzed, so that the quantity of object of statistics is not restricted, expands promoted extension.
It addition, the client on some customer mobile terminal is limited by operating system, it is impossible to obtain mobile whole
The MAC of end, therefore can omit a lot carrying out behavior analysis under Internet user's line by the method when
User, the present invention analyzes the method for behavior under subscribers feeder by wireless network data and passes through by client to wireless
Access controller AC sends HTTP request, and HTTP request is used for accessing any one necessary being and not
Network address in Radio Access Controller AC white list, white list represents the net of the access Internet that directly lets pass
Location is gathered;After Radio Access Controller AC receives above-mentioned request, via described wireless access point AP to
The mobile terminal initiating HTTP request returns the MAC including mobile terminal MAC, wireless access point AP
Add confidential information;The above-mentioned confidential information that adds of mobile terminal deciphering is to obtain described mobile terminal MAC and wireless to connect
Access point AP MAC information, by the method, client would not be limited by operating system, can obtain phase
Answer the MAC of mobile terminal, obtain behavior analytical data under line more accurately.
Further, effective by the method Internet Security, when user wants to be surfed the Net by Wi-Fi, the method can
Accurately to accomplish to authorize by " people ", it is only necessary to user carries out once certification by applications client, so that it may directly
Use WiFi net, and safety, online efficiency are high.
Further, described mobile terminal includes mobile phone, computer and panel computer.The most general mobile end
End has smart mobile phone, computer and panel computer, and user can be connected into wireless network by mobile terminal, enters
Row online.
Further, described authentication information includes: ID card information and cell-phone number information.User to show
The information of registration this user the most recognizable in the client of mobile terminal, therefore, the identity of user is recognized
Card information is unique ID card information or cell-phone number information.
Further, the corresponding relation that described wireless access point AP MAC and AP install ground is AP MAC
Geographical coordinate be AP install ground place position coordinates.Because wireless access point AP is generally fixedly mounted on
Somewhere, AP MAC table shows the geographical position of AP, and therefore, user is connected in wireless network by AP,
Indicate that this user also in AP location, i.e. AP install ground position.
Further, in described behavior record step, described user behavior information also includes that mobile terminal passes through
The info web browsed during the online of this wireless access point AP.Owing to user is surfed the Net by wireless access point AP,
Therefore can know the internet records information of this user, i.e. can obtain the info web that this user is browsed,
As, when Public Security Organs needs to investigate the internet records of suspect, relevant information can be directly obtained,
Can help to Public Security Organs solve a case.
Second aspect, the present invention provides a kind of offer by what wireless network data analyzed behavior under subscribers feeder to be
System, including:
Information registering module, it is for obtaining user's authentication information at the client registers of mobile terminal
And ID, and described authentication information and ID are associated;
MAC acquisition module, its for by described mobile terminal via wireless access point AP to wireless access
Controller AC sends HTTP request, and described HTTP request is used for accessing any one necessary being and not
Network address in Radio Access Controller AC white list, described white list represents the access Internet that directly lets pass
Network address set;After described Radio Access Controller AC receives above-mentioned request, via described wireless access
Point AP returns to the mobile terminal initiating HTTP request and includes mobile terminal MAC, WAP
The MAC of AP adds confidential information;Described mobile terminal deciphers the above-mentioned confidential information that adds to obtain described mobile terminal
MAC and wireless access point AP MAC information, and by described mobile terminal MAC and described mobile terminal
Corresponding authentication information association;
Behavior record module, its each wireless access point AP crossed for making described mobile terminal accessing is the most right
The visiting time of this mobile terminal, Connection Time, turn-off time and whether surfed the Net by this AP, on
The net persistent period carries out record, forms user behavior information, and this user behavior information is fed back to each shifting
Client in dynamic terminal;Client on described mobile terminal by above-mentioned user behavior information and ID,
Authentication information, mobile terminal MAC and wireless access point AP MAC coupling, and by the number after coupling
According to passing server back;
Behavior analysis module, it is for depositing unified for the data after above-mentioned coupling to server database, and root
According to the corresponding relation of the wireless access point AP prestored with AP installation ground, and described mobile terminal MAC
With the corresponding relation of user, in conjunction with user behavior information, analyze behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning
During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists
Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality
Border crawler behavior;
Statistic record module, records and adds up the above-mentioned behavior of each user.
The technical scheme is that first in information registering module, obtain user's client at mobile terminal
The authentication information of registration and ID, and described authentication information and ID are associated;
Then in MAC acquisition module, by described mobile terminal via wireless access point AP to wireless access control
Device AC processed sends HTTP request, and described HTTP request is used for accessing any one necessary being and not existing
Network address in Radio Access Controller AC white list, described white list represents the access Internet that directly lets pass
Network address set;After described Radio Access Controller AC receives above-mentioned request, via described wireless access
Point AP returns to the mobile terminal initiating HTTP request and includes mobile terminal MAC, WAP
The MAC of AP adds confidential information;Described mobile terminal deciphers the above-mentioned confidential information that adds to obtain described mobile terminal
MAC and wireless access point AP MAC information, and by described mobile terminal MAC and described mobile terminal
Corresponding authentication information association;Then in behavior logging modle, each nothing that mobile terminal accessing is crossed
Whether line access point AP, all to visiting time, Connection Time, the turn-off time of this mobile terminal and lead to
Cross this AP online, the online persistent period carries out record, forms user behavior information, and by this user behavior
Information feeds back to the client in each mobile terminal;Client on described mobile terminal is by above-mentioned user's row
Mate with ID, authentication information, mobile terminal MAC and wireless access point AP MAC for information,
And pass the data after coupling back server;Subsequently, in behavior analysis module, after above-mentioned coupling
Data are unified deposits to server database, and installs ground according to the wireless access point AP prestored with AP
Corresponding relation, and the corresponding relation of described mobile terminal MAC and user, in conjunction with user behavior information,
Analyze behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning
During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists
Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality
Border crawler behavior;
Last in statistic record module, record and add up the above-mentioned behavior of each user.
The present invention analyzes the system of behavior under subscribers feeder by wireless network data, can analyze this user assorted
Local, when, all done a little what.Due to the phone number information of user, ID card information or
Other authentication information and the unique corresponding relation of described user, therefore if same user uses not
Two same mobile terminals are surfed the Net in somewhere, and it is the most corresponding that the method can identify the two mobile terminal
Be same user (natural person), and then the present invention analyzes behavior under subscribers feeder by wireless network data
System, be possible not only to analyze mobile terminal line under behavior, it is also possible to analyze mobile terminal correspondence user
Line under behavior;It addition, the present invention analyzes under subscribers feeder in the system of behavior by wireless network data, logical
Cross the client on mobile terminal and just can obtain the MAC of mobile terminal, it is not necessary to set by specific network
Standby, as long as there being client on mobile terminal, it is possible to behavior under the line of user to be analyzed, therefore passes through
The present invention analyzes the system of behavior under subscribers feeder by wireless network data, can be to more mobile phone users
Under line, behavior is analyzed, so that the quantity of object of statistics is not restricted, expands promoted extension.
It addition, the client on some customer mobile terminal is limited by operating system, it is impossible to obtain mobile whole
The MAC of end, therefore can omit a lot carrying out behavior analysis under Internet user's line by this system when
User, the present invention analyzes the system of behavior under subscribers feeder by wireless network data and passes through by client to wireless
Access controller AC sends HTTP request, and HTTP request is used for accessing any one necessary being and not
Network address in Radio Access Controller AC white list, white list represents the net of the access Internet that directly lets pass
Location is gathered;After Radio Access Controller AC receives above-mentioned request, via described wireless access point AP to
The mobile terminal initiating HTTP request returns the MAC including mobile terminal MAC, wireless access point AP
Add confidential information;The above-mentioned confidential information that adds of mobile terminal deciphering is to obtain described mobile terminal MAC and wireless to connect
Access point AP MAC information, by this system, client would not be limited by operating system, can obtain phase
Answer the MAC of mobile terminal, obtain behavior analytical data under line more accurately.
Further, effective by this system Internet Security, when user wants to be surfed the Net by Wi-Fi, this system can
Accurately to accomplish to authorize by " people ", it is only necessary to user carries out once certification by applications client, so that it may directly
Use WiFi net, and safety, online efficiency are high.
Further, described mobile terminal includes mobile phone, computer and panel computer.The most general mobile end
End has smart mobile phone, computer and panel computer, and user can be connected into wireless network by various mobile terminals,
Surf the Net, convenient and swift.
Further, described authentication information includes: ID card information and cell-phone number information.User wants first
The information of registration this user the most recognizable in the client of mobile terminal, therefore, the identity of user is recognized
Card information is unique ID card information or cell-phone number information.
Further, the corresponding relation that described wireless access point AP MAC and AP install ground is AP MAC
Geographical coordinate be AP install ground place position coordinates.Because wireless access point AP is generally fixedly mounted on
Somewhere, AP MAC table shows the geographical position of AP, and therefore, user is connected in wireless network by AP,
Indicate that this user also in AP location, i.e. AP install ground position.
Further, in described behavior record module, described user behavior information also includes that mobile terminal passes through
The info web browsed during the online of this wireless access point AP.Owing to user is surfed the Net by wireless access point AP,
Therefore can know the internet records information of this user, i.e. can obtain the info web that this user is browsed,
As, when Public Security Organs needs to investigate the internet records of suspect, relevant information can be directly obtained,
Public Security Organs is helped to solve a case as early as possible.
Accompanying drawing explanation
In order to be illustrated more clearly that the specific embodiment of the invention or technical scheme of the prior art, below will
The accompanying drawing used required in detailed description of the invention or description of the prior art is briefly described:
Fig. 1 shows a kind of based on WiFi user data processing method that first embodiment of the invention is provided
Flow chart;
It is descending by wireless network data analysis subscribers feeder that Fig. 2 shows that first embodiment of the invention is provided
For the flow chart of method;
It is descending by wireless network data analysis subscribers feeder that Fig. 3 shows that second embodiment of the invention is provided
For method network architecture diagram generally;
It is descending by wireless network data analysis subscribers feeder that Fig. 4 shows that fourth embodiment of the invention is provided
For the structured flowchart of system.
Detailed description of the invention
Below in conjunction with accompanying drawing, the embodiment of technical solution of the present invention is described in detail.Following example
It is only used for clearly illustrating technical scheme, is therefore intended only as example, and can not come with this
Limit the scope of the invention.
Embodiment one
Fig. 1 shows a kind of based on WiFi user data processing method that first embodiment of the invention is provided
Flow chart.As it is shown in figure 1, a kind of based on WiFi user data according to a first embodiment of the present invention processes
Method includes:
Step S1, the MAC of network interface card in WiFi probe obtains this region in monitored area, and record this net
The visiting time of card, form visiting record;
Step S2, according to the geographical position of WiFi probe and visiting record, add up this network interface card enter and/or from
Open the number of times in monitoring region.
The technical scheme is that the WiFi probe first passed through in monitored area obtains network interface card in this region
MAC, and record the visiting time of this network interface card, form visiting record;Then according to the geographical position of WiFi probe
Put and visit record, the number of times that this network interface card enters and/or leaves monitoring region can be added up.The present invention based on
The user data processing method of WiFi, as long as WiFi probe detects the network interface card in monitored area, will basis
Behavior under the line of the MAC corresponding network interface card of acquisition of network interface card, method is simple, has good using value, example
The pipe of customer resources is carried out as certain restaurant can enter and/or leave the number of times in monitoring region according to this network interface card
Reason.
It is descending by wireless network data analysis subscribers feeder that Fig. 2 shows that first embodiment of the invention is provided
For method flow diagram.As in figure 2 it is shown, being analyzed by wireless network data according to a first embodiment of the present invention
Under subscribers feeder, the method for behavior includes:
Information registering step S10, obtain user the client registers of mobile terminal authentication information and
ID, and described authentication information and ID are associated;
MAC obtaining step S20, by mobile terminal via wireless access point AP to Radio Access Controller
AC sends HTTP request, and HTTP request is used for accessing any one necessary being and not in wireless access control
Network address in device AC white list processed, white list represents the network address set of the access Internet that directly lets pass;Wireless
After access controller AC receives above-mentioned request, via wireless access point AP to initiating HTTP request
Mobile terminal return include mobile terminal MAC, wireless access point AP MAC add confidential information;Move
The above-mentioned confidential information that adds of dynamic terminal deciphering is to obtain described mobile terminal MAC and wireless access point AP MAC
Information, and by authentication information association corresponding with mobile terminal for mobile terminal MAC;
Behavior record step S30, each wireless access point AP that mobile terminal accessing is crossed, all moves end to this
The visiting time of end, Connection Time, turn-off time and whether surfed the Net by this A, the online persistent period
Carry out record, form user behavior information, and this user behavior information is fed back in each mobile terminal
Client;Client on mobile terminal by above-mentioned user behavior information and ID, authentication information,
Mobile terminal MAC and wireless access point AP MAC coupling, and pass the data after coupling back server;
Behavior analysis step S40, deposits unified for the data after above-mentioned coupling to server database, and according to
The wireless access point AP prestored and AP install the corresponding relation on ground, and mobile terminal MAC and use
The corresponding relation at family, in conjunction with user behavior information, analyzes behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning
During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists
Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality
Border crawler behavior;
Statistic record step S50, records and adds up the above-mentioned behavior of each user.
The technical scheme is that and first obtain user's authentication information at the client registers of mobile terminal
And ID, and authentication information and ID are associated;Connect via wireless by mobile terminal
Access point AP sends HTTP request to Radio Access Controller AC, and HTTP request is used for accessing any one
Necessary being and the not network address in Radio Access Controller AC white list, white list represents visit of directly letting pass
Ask the network address set of Internet;After Radio Access Controller AC receives above-mentioned request, via wireless access
Point AP returns to the mobile terminal initiating HTTP request and includes mobile terminal MAC, WAP
The MAC of AP adds confidential information;Mobile terminal deciphering above-mentioned add confidential information with obtain mobile terminal MAC and
Wireless access point AP MAC information, and by authentication letter corresponding with mobile terminal for mobile terminal MAC
Breath association;Then each wireless access point AP that mobile terminal accessing is crossed, time all to the visiting of this mobile terminal
Between, Connection Time, turn-off time and whether surfed the Net by this AP, the online persistent period carries out record,
Form user behavior information, and this user behavior information is fed back to the client in each mobile terminal;Move
Client in dynamic terminal is by above-mentioned user behavior information and ID, authentication information, mobile terminal
MAC and wireless access point AP MAC coupling, and pass the data after coupling back server;By above-mentioned
Data after joining are unified deposits to server database, and according to the wireless access point AP prestored and AP
The corresponding relation on ground, and the corresponding relation of mobile terminal MAC and user are installed, believe in conjunction with user behavior
Breath, analyzes behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning
During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists
Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality
Border crawler behavior;
Finally record and add up the above-mentioned behavior of each user.
The present invention analyzes the method for behavior under subscribers feeder by wireless network data, can analyze this user assorted
Local, when, all done a little what.Due to the phone number information of user, ID card information or
Other authentication information and the unique corresponding relation of described user, therefore if same user uses not
Two same mobile terminals are surfed the Net in somewhere, and it is the most corresponding that the method can identify the two mobile terminal
Be same user (natural person), and then this user line in this local (somewhere) can be analyzed
Lower behavior includes that this user is to pass by, stop or user's actual activity behavior.And then the present invention is by wireless
The method of behavior under network data analysis subscribers feeder, is possible not only to behavior under the line of analysis mobile terminal, also may be used
With behavior under the line of analysis mobile terminal correspondence user;It addition, the present invention is analyzed by wireless network data
Under subscribers feeder in the method for behavior, just can be obtained mobile terminal by the client on mobile terminal
MAC, it is not necessary to by the specific network equipment, as long as there being client, it is possible to user's on mobile terminal
Under line, behavior is analyzed, and therefore analyzes the side of behavior under subscribers feeder by the present invention by wireless network data
Behavior under more mobile phone users lines can be analyzed, so that the quantity of object of statistics is the most restricted by method
About, promoted extension is expanded.
It addition, the client on some customer mobile terminal is limited by mobile terminal operating system, it is impossible to obtain
Obtain the MAC of mobile terminal, such as, when i Phone system version is higher than IOS7, will be by Fructus Mali pumilae
The restriction of mobile phone operating system, obtains the MAC less than i Phone by cell-phone customer terminal, therefore cannot
Behavior under the line of this i Phone is analyzed.And common Android mobile phone will not be by its operating system
Limit, the MAC of any edition system mobile terminal can be obtained.Therefore to carry out Internet user's line descending
Can omit a lot of user (user limited by mobile terminal operating system) when of for analyzing, the present invention passes through
Under wireless network data analysis subscribers feeder, the method for behavior is by being sent out to Radio Access Controller AC by client
HTTP request, HTTP request is sent to be used for accessing any one necessary being and not at Radio Access Controller
Network address in AC white list, white list represents the network address set of the access Internet that directly lets pass;Wireless access
After controller AC receives above-mentioned request, via wireless access point AP to the movement initiating HTTP request
Terminal return include mobile terminal MAC, wireless access point AP MAC add confidential information;Mobile whole
The above-mentioned confidential information that adds of end deciphering, to obtain mobile terminal MAC and wireless access point AP MAC information, passes through
The method, client would not be limited by operating system, can obtain the MAC of corresponding mobile terminal, and then
How more user crowd can carry out the analysis of behavior under line, obtain behavior analytical data under line more accurately.
Further, effective by the method Internet Security, when user wants to be surfed the Net by Wi-Fi, the method can
Accurately to accomplish to authorize by " people ", it is only necessary to user carries out once certification by applications client, so that it may directly
Use WiFi net, and safety, online efficiency are high.
Specifically, mobile terminal includes mobile phone, computer and panel computer.The most general mobile terminal has intelligence
Energy mobile phone, computer and panel computer, user can be connected into wireless network by mobile terminal, surf the Net.
Specifically, authentication information includes: ID card information and cell-phone number information.User wants first moving
The information of registration this user the most recognizable in the client of terminal, therefore, the authentication information of user
For unique ID card information or cell-phone number information.
Specifically, wireless access point AP MAC and AP install the geography that corresponding relation is AP MAC on ground
Coordinate is the position coordinates that AP installs place, ground.
AP is equivalent to one and connects wired network and the bridge of wireless network, and Main Function is by each wireless network visitor
Family end connects together, it is achieved on a large scale, the wireless access of multi-user, according to the difference of application scenarios, AP
Being commonly divided into indoor type and outdoor version, under indoor environment, coverage is generally at 30 meters to 100 meters, outdoor
Environment maximum coverage range can reach 800 meters.AC is WLAN access control equipment (wireless routing
Device), effect is will to carry out converging and accessing Internet from the data of different AP, complete AP equipment simultaneously
Configuration management and the certification of wireless user, management, and broadband, access, switch, safety etc. controls merit
Energy.Because wireless access point AP is generally fixedly mounted on somewhere, AP MAC table shows the geographical position of AP,
Therefore, user is connected in wireless network by AP, indicates that this user is also in AP location, i.e. AP
Position, ground is installed.
Specifically, in behavior record step S30, user behavior information also includes that mobile terminal is wireless by this
The info web browsed during access point AP online.Owing to user is surfed the Net by wireless access point AP, therefore
The internet records information of this user can be known, i.e. can obtain the info web that this user is browsed, e.g.,
When Public Security Organs needs to investigate the internet records of suspect, relevant information can be directly obtained.
Embodiment two
See Fig. 3, analyze the method for behavior under subscribers feeder for the present invention by wireless network data and totally surf the Net
Network architecture diagram, the present invention analyzes under subscribers feeder the method for behavior with mobile phone terminal by wireless network data
On APP realize as a example by, the concrete technical scheme of the present invention is illustrated:
Using as a example by two mobile phone terminals by a user, premise is all to pacify on two mobile phone terminals of this user
Opening APP equipped with this APP, first user to register, the information of registration is user's ID authentication information
And ID, including the phone number of user, (Ministry of Public Security's requirement, public WiFi service provider must carry
Phone number for all-network user) or ID (identity number) card No., this user's ID authentication information and ID
The all corresponding natural person's behavior using the registration of this client account of all behaviors in a network, available mobile phone
Number is reviewed, if user is manufacturer, it is impossible to provides phone number, then can use identification card number,
Or other authentication information;Now, this APP obtains the unique user's ID authentication information of this user,
Sending HTTP request via AP to AC by this APP, it is true that HTTP request is used for accessing any one
Real storage and the not network address in Radio Access Controller AC white list, white list represents access of directly letting pass
The network address set of Internet;After Radio Access Controller AC receives above-mentioned request, via WAP
AP returns to the mobile phone terminal initiating HTTP request and includes mobile phone terminal MAC, wireless access point AP
MAC add confidential information;The above-mentioned confidential information that adds of mobile phone terminal deciphering is to obtain mobile phone terminal MAC and wireless
Access point AP MAC information, by the method, this APP would not be limited by mobile phone terminal operating system,
The MAC of any operating system mobile phone terminal can be obtained.
Wherein the implementation method of any operating system mobile phone terminal MAC of concrete acquisition is:
A, send one by the wireless controller AC in WiFi network equipment of the APP on mobile phone terminal
The request of individual HTTP, HTTP request is used for accessing any one necessary being and not at equipment white list
In network address, white list refers to directly to let pass and accesses the address set of Internet;
After B, wireless controller AC accept above-mentioned request, on the counterpart terminal initiating HTTP request
Client return information, return information form is following (example)
<script>self.location.href='http: // 112.124.31.88/auth/servlet/authServlet?S=f202313d
F1f99f2af542a9073a50811c&mac=9807f5c39b0245c82c04859938f b2d0e&port=293
16c3960ee95d8&url=709db9dc9ce334aaea3d4fa878826efd5d8c15 802016713e&ip=
81b0dc1f1e4c5effd8c557e77a2986ae&=8e47f33396baf6de&seria lno=db1ebcf32ebd
0305e016e2afc5767922'</script>
Wherein, what the information of return included mobile terminal MAC and wireless access point AP MAC adds confidential information.
C, APP will<script>,</script>middle content deciphering is extracted, it is thus achieved that mobile phone terminal MAC
With wireless access point AP MAC information.Also obtain simultaneously the visiting time of mobile phone terminal, the Connection Time,
Turn-off time and whether surfed the Net by this AP, the information such as online persistent period.
Finally, APP is by above-mentioned authentication information, ID, terminal MAC, AP MAC, movement
The visiting time of terminal, Connection Time, turn-off time and whether surfed the Net by this AP, online continues
Temporal information passes to server, and server processes behavior analytical data under the line obtaining this user by analysis.
Concrete analysis process is: subscriber identity information passes through APP correspondence mobile phone terminal, by terminal MAC and
AP MAC can obtain the geographical position at this user place, judges this user by the visiting time of mobile phone terminal
Whether for passing by this ground, the time being accessed Wi-Fi by user may determine that this with the time disconnecting network
User is in the time of staying on this ground, it is also possible to whether know this user by this AP online by mobile phone terminal
User's actual activity behavior under the line on this ground, premise is the information that this APP comprises this shop;Therefore this use
Family also can be understood the specifying information in this shop on APP and (include geographical position, merchandise news, information on services
Deng), then carry out consuming under line.Thus the network behavior of user and APP usage behavior can be carried out
Identification is reviewed.
Embodiment three
Owing to network MAC can be corresponded to real user, the therefore application of the method by the method
Widely, such as can be surfed the Net in certain shop a period of time of statistics by the AP in this shop by mobile terminal
Client's visit capacity, embody the method application in terms of data statistics;
The most such as, the work in given range (time, region) of a certain sensitive users is provided to public security department
Series connection behavior under dynamic track or the line in one group of sensitive users a period of time, Public Security Organs can be directly targeted to
Specifically " user ", can be analyzed according to behavior under the line of this user, under line, behavior includes that this sensitive users is assorted
Where time arrived, and in this local residence time, also had to have purchased which kind of commodity at this,
Have accessed what webpage, these information are all very important information, can improve efficiency of solving a case broken with reduction
Case difficulty, embodies the method using value in terms of data analysis;
For example, it is also possible to provide its Very Important Person to the frequency in shop, for the last time to weights such as shop times to restaurant
Want CRM (customer relation management) data, help the customer resources of this restaurant management oneself, by these numbers
According to, resident client can periodically be paid a return visit by this restaurant, improves the service quality in restaurant.
Embodiment four
See Fig. 4, the embodiment of the present invention also provide for by what wireless network data analyzed behavior under subscribers feeder be
System 100, including:
Information registering module 101, it is for obtaining user's authentication at the client registers of mobile terminal
Information and ID, and described authentication information and ID are associated;
MAC acquisition module 102, its for by described mobile terminal via wireless access point AP to wireless
Access controller AC sends HTTP request, and described HTTP request is used for accessing any one necessary being
And the not network address in Radio Access Controller AC white list, described white list represents access of directly letting pass
The network address set of Internet;After described Radio Access Controller AC receives above-mentioned request, via described nothing
Line access point AP returns to the mobile terminal initiating HTTP request and includes mobile terminal MAC, wireless connects
The MAC of access point AP adds confidential information;Described mobile terminal deciphers the above-mentioned confidential information that adds to obtain described movement
Terminal MAC and wireless access point AP MAC information, and by described mobile terminal MAC and described movement
The authentication information association that terminal is corresponding;
Behavior record module 103, its each wireless access point AP crossed for making described mobile terminal accessing,
All to visiting time of this mobile terminal, Connection Time, turn-off time and whether surfed the Net by this AP,
The online persistent period carries out record, forms user behavior information, and feeds back to each by this user behavior information
Client in mobile terminal;Client on described mobile terminal is by above-mentioned user behavior information and user
ID, authentication information, mobile terminal MAC and wireless access point AP MAC coupling, and by after coupling
Data pass server back;
Behavior analysis module 104, it is for depositing unified for the data after above-mentioned coupling to server database,
And according to the corresponding relation of the wireless access point AP prestored with AP installation ground, and described mobile terminal
The corresponding relation of MAC and user, in conjunction with user behavior information, analyzes behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning
During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists
Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality
Border crawler behavior;
Statistic record module 105, records and adds up the above-mentioned behavior of each user.
The technical scheme is that first in information registering module 101, obtain the user visitor at mobile terminal
The authentication information of family end registration and ID, and authentication information and ID are associated;
Then in MAC acquisition module 102, by mobile terminal via wireless access point AP to wireless access control
Device AC processed sends HTTP request, and HTTP request is used for accessing any one necessary being and not wireless
Network address in access controller AC white list, white list represents the network address set of the access Internet that directly lets pass;
After Radio Access Controller AC receives above-mentioned request, ask to initiating HTTP via wireless access point AP
The mobile terminal asked return include mobile terminal MAC, wireless access point AP MAC add confidential information;
The above-mentioned confidential information that adds of mobile terminal deciphering is to obtain described mobile terminal MAC and wireless access point AP MAC
Information, and by described authentication information association corresponding with described mobile terminal for mobile terminal MAC;So
After in behavior logging modle 103, each wireless access point AP that mobile terminal accessing is crossed, all this is moved
The visiting time of terminal, Connection Time, turn-off time and whether surfed the Net by this AP, online continues
Time carries out record, forms user behavior information, and this user behavior information is fed back to each mobile terminal
In client;Client on mobile terminal is by above-mentioned user behavior information and ID, authentication letter
Breath, mobile terminal MAC and wireless access point AP MAC coupling, and pass the data after coupling back service
Device;Subsequently, in behavior analysis module 104, deposit unified for the data after above-mentioned coupling to server count
According to storehouse, and according to the corresponding relation of the wireless access point AP prestored with AP installation ground, and described shifting
Dynamic terminal MAC and the corresponding relation of user, in conjunction with user behavior information, the line analyzing each user is descending
For:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning
During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists
Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality
Border crawler behavior;
Last in statistic record module 105, record and add up the above-mentioned behavior of each user.
The present invention analyzes the system of behavior under subscribers feeder by wireless network data, can analyze this user assorted
Local, when, all done a little what.Due to the phone number information of user, ID card information or
Other authentication information and the unique corresponding relation of described user, therefore if same user uses not
Two same mobile terminals are surfed the Net in somewhere, and it is the most corresponding that the method can identify the two mobile terminal
Be same user (natural person), and then the present invention analyzes behavior under subscribers feeder by wireless network data
System, be possible not only to analyze mobile terminal line under behavior, it is also possible to analyze mobile terminal correspondence user
Line under behavior;It addition, the present invention analyzes under subscribers feeder in the system of behavior by wireless network data, logical
Cross the client on mobile terminal and just can obtain the MAC of mobile terminal, it is not necessary to set by specific network
Standby, as long as there being client on mobile terminal, it is possible to behavior under the line of user to be analyzed, therefore passes through
The present invention analyzes the system of behavior under subscribers feeder by wireless network data, can be to more mobile phone users
Under line, behavior is analyzed, so that the quantity of object of statistics is not restricted, expands promoted extension.
It addition, client can obtain, by the operating system of Android mobile phone, the MAC Address that mobile phone is corresponding,
But the client on some customer mobile terminal is limited by operating system, it is impossible to obtain mobile terminal
The operating system of MAC, such as i Phone, when operating system version is higher than IOS7, client can not be from
Operating system obtains MAC Address.Therefore behavior analysis under Internet user's line is being carried out by this system
Time can omit a lot of user, the present invention analyzes the system of behavior under subscribers feeder by wireless network data and passes through
Being sent HTTP request by client to Radio Access Controller AC, HTTP request is used for accessing any one
Individual necessary being and the not network address in Radio Access Controller AC white list, white list represents directly clearance
Access the network address set of Internet;After Radio Access Controller AC receives above-mentioned request, via described nothing
Line access point AP returns to the mobile terminal initiating HTTP request and includes mobile terminal MAC, wireless connects
The MAC of access point AP adds confidential information;The above-mentioned confidential information that adds of mobile terminal deciphering is to obtain described movement eventually
End MAC and wireless access point AP MAC information, by this system, client would not be by operating system
Limit, the MAC of corresponding mobile terminal can be obtained, obtain behavior analytical data under line more accurately.
Further, effective by this system Internet Security, when user wants to be surfed the Net by Wi-Fi, this system can
Accurately to accomplish to authorize by " people ", it is only necessary to user carries out once certification by applications client, so that it may directly
Use WiFi net, and safety, online efficiency are high.
Embodiment five
The AP that the present invention is analyzed under subscribers feeder in behavior system by wireless network data is typically mounted at indoor,
Install the corresponding relation on ground with it according to AP, AP is arranged on different places, so that it may obtain the ground in this place
Reason position, simultaneously according to the corresponding relation of mobile terminal MAC Yu user, carries out that user is the most collinear descending is
Judgement.
Exceed the scheduled time when AP persistently scans same mobile terminal, or mobile terminal is at this wireless access
Under some AP, online exceedes the scheduled time, then be judged to the behavior of staying;Behavior is stayed based on this, if AP
It is arranged on the classroom of school, it is possible to judge that the behavior of certain student is as the behavior of attending class;If AP is arranged on doctor
In the dental clinic of institute, it is possible to judge that the behavior of certain patient is as medical behavior;If being arranged on cafe,
It is determined that certain user is the consuming behavior buying coffee in the behavior of this cafe;If it addition, when moving
Moving user corresponding to terminal MAC is that public security monitors personnel, and several MAC are concurrently accessed certain WAP
During AP, it is possible to be judged to that public security risk behavior, i.e. this AP location exist public security risk, may the criminal of having
Crime is for occurring.
Therefore, the present invention can be installed according to AP by the system of behavior under wireless network data analysis subscribers feeder
The difference on ground, mobile terminal correspondence user (user) is different, produces different using values, therefore with
On each citing of enumerating be only used as a kind of explanation, be not intended as a kind of restriction.
To sum up, various embodiments above only in order to technical scheme to be described, is not intended to limit;Although
Being described in detail the present invention with reference to foregoing embodiments, those of ordinary skill in the art should manage
Solve: the technical scheme described in foregoing embodiments still can be modified by it, or to wherein part
Or all technical characteristic carries out equivalent;And these amendments or replacement, do not make appropriate technical solution
Essence depart from various embodiments of the present invention technical scheme scope, it all should contain the claim in the present invention
In the middle of the scope of description.
Claims (10)
1. a user data processing method based on WiFi, it is characterised in that comprise the steps:
Step S1, the MAC of network interface card in WiFi probe obtains this region in monitored area, and record this network interface card
The visiting time, formed visiting record;
Step S2, according to the geographical position of WiFi probe and visiting record, add up this network interface card enter and/or from
Open the number of times in monitoring region.
2. analyze the method for behavior under subscribers feeder by wireless network data, it is characterised in that comprise the following steps:
Information registering step, obtains user the authentication information of the client registers of mobile terminal and user
ID, and described authentication information and ID are associated;
MAC obtaining step, by described mobile terminal via wireless access point AP to Radio Access Controller
AC sends HTTP request, and described HTTP request is used for accessing any one necessary being and not wireless
Network address in access controller AC white list, described white list represents the network address of the access Internet that directly lets pass
Set;After described Radio Access Controller AC receives above-mentioned request, via described wireless access point AP
Return to the mobile terminal initiating HTTP request and include mobile terminal MAC, wireless access point AP
MAC adds confidential information;Described mobile terminal deciphers the above-mentioned confidential information that adds to obtain described mobile terminal MAC
With wireless access point AP MAC information, and by corresponding with described mobile terminal for described mobile terminal MAC
Authentication information associates;
Behavior record step, each wireless access point AP that described mobile terminal accessing is crossed, all moves end to this
The visiting time of end, Connection Time, turn-off time and whether surfed the Net by this AP, online is when continuing
Between carry out record, form user behavior information, and this user behavior information fed back in each mobile terminal
Client;Client on described mobile terminal is by above-mentioned user behavior information and ID, authentication
Information, mobile terminal MAC and wireless access point AP MAC coupling, and pass the data after coupling back clothes
Business device;
Behavior analysis step, deposits unified for the data after above-mentioned coupling to server database, and according in advance
Wireless access point AP and the AP of storage installs the corresponding relation on ground, and described mobile terminal MAC and use
The corresponding relation at family, in conjunction with user behavior information, analyzes behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning
During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists
Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality
Border crawler behavior;
Statistic record step, records and adds up the above-mentioned behavior of each user.
The most according to claim 1 by the method for behavior under wireless network data analysis subscribers feeder, its
Being characterised by, described mobile terminal includes mobile phone, computer and panel computer.
The most according to claim 1 by the method for behavior under wireless network data analysis subscribers feeder, its
Being characterised by, described authentication information includes: ID card information and cell-phone number information.
The most according to claim 1 by the method for behavior under wireless network data analysis subscribers feeder, its
Being characterised by, described wireless access point AP MAC installs the ground that corresponding relation is AP MAC on ground with AP
Reason coordinate is the position coordinates that AP installs place, ground.
The most according to claim 1 by the method for behavior under wireless network data analysis subscribers feeder, its
Being characterised by, in described behavior record step, described user behavior information also includes that mobile terminal passes through this nothing
The info web browsed during line access point AP online.
7. analyze the system of behavior under subscribers feeder by wireless network data for one kind, it is characterised in that include with
Lower module:
Information registering module, it is for obtaining user's authentication information at the client registers of mobile terminal
And ID, and described authentication information and ID are associated;
MAC acquisition module, its for by described mobile terminal via wireless access point AP to wireless access
Controller AC sends HTTP request, and described HTTP request is used for accessing any one necessary being and not
Network address in Radio Access Controller AC white list, described white list represents the access Internet that directly lets pass
Network address set;After described Radio Access Controller AC receives above-mentioned request, via described wireless access
Point AP returns to the mobile terminal initiating HTTP request and includes mobile terminal MAC, WAP
The MAC of AP adds confidential information;Described mobile terminal deciphers the above-mentioned confidential information that adds to obtain described mobile terminal
MAC and wireless access point AP MAC information, and by described mobile terminal MAC and described mobile terminal
Corresponding authentication information association;
Behavior record module, its each wireless access point AP crossed for making described mobile terminal accessing is the most right
The visiting time of this mobile terminal, Connection Time, turn-off time and whether surfed the Net by this AP, on
The net persistent period carries out record, forms user behavior information, and this user behavior information is fed back to each shifting
Client in dynamic terminal;Client on described mobile terminal by above-mentioned user behavior information and ID,
Authentication information, mobile terminal MAC and wireless access point AP MAC coupling, and by the number after coupling
According to passing server back;
Behavior analysis module, it is for depositing unified for the data after above-mentioned coupling to server database, and root
According to the corresponding relation of the wireless access point AP prestored with AP installation ground, and described mobile terminal MAC
With the corresponding relation of user, in conjunction with user behavior information, analyze behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning
During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists
Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality
Border crawler behavior;
Statistic record module, records and adds up the above-mentioned behavior of each user.
The most according to claim 6 by the system of behavior under wireless network data analysis subscribers feeder, its
Being characterised by, described mobile terminal includes mobile phone, computer and panel computer.
The most according to claim 6 by the system of behavior under wireless network data analysis subscribers feeder, its
Being characterised by, described authentication information includes: ID card information and cell-phone number information.
The most according to claim 6 by the system of behavior under wireless network data analysis subscribers feeder, its
Being characterised by, described wireless access point AP MAC installs the ground that corresponding relation is AP MAC on ground with AP
Reason coordinate is the position coordinates that AP installs place, ground.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610357369.7A CN106028283A (en) | 2016-05-26 | 2016-05-26 | Method and system for analyzing user offline behaviors through wireless network data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610357369.7A CN106028283A (en) | 2016-05-26 | 2016-05-26 | Method and system for analyzing user offline behaviors through wireless network data |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106028283A true CN106028283A (en) | 2016-10-12 |
Family
ID=57095023
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610357369.7A Pending CN106028283A (en) | 2016-05-26 | 2016-05-26 | Method and system for analyzing user offline behaviors through wireless network data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106028283A (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106951828A (en) * | 2017-02-22 | 2017-07-14 | 清华大学 | A kind of recognition methods of the urban area functional attributes based on satellite image and network |
CN107623898A (en) * | 2017-08-29 | 2018-01-23 | 广州中国科学院计算机网络信息中心 | Method for monitoring instruction, device and equipment |
CN107801202A (en) * | 2017-10-31 | 2018-03-13 | 广东思域信息科技有限公司 | A kind of user's portrait method based on WiFi accesses |
CN108022344A (en) * | 2017-12-06 | 2018-05-11 | 上海麦泽科技有限公司 | The unattended intelligent retail terminal with scene content structure |
CN108347698A (en) * | 2018-02-07 | 2018-07-31 | 山东合天智汇信息技术有限公司 | A kind of on-line off-line event trace analysis method, apparatus and system |
CN108805629A (en) * | 2018-06-20 | 2018-11-13 | 深圳市玛威尔显控科技有限公司 | It is a kind of that surrounding population information content playback method is identified using WiFi probes based on big data |
CN108834075A (en) * | 2018-05-30 | 2018-11-16 | 深信服科技股份有限公司 | A kind of determination method, system, device and the storage medium of personnel motion trail |
CN109429296A (en) * | 2017-08-31 | 2019-03-05 | 中国电信股份有限公司 | For terminal and the associated method, apparatus of internet information and storage medium |
CN109768984A (en) * | 2019-01-25 | 2019-05-17 | 成都西加云杉科技有限公司 | A kind of authorization method and system of WiFi data analysis |
CN110248326A (en) * | 2019-04-30 | 2019-09-17 | 中国联合网络通信集团有限公司 | A kind of data processing method and its device |
CN110491090A (en) * | 2019-09-20 | 2019-11-22 | 苏州智博汇能电子科技股份有限公司 | Mid-aged population monitoring method based on mobile phone terminal |
CN110808845A (en) * | 2018-08-06 | 2020-02-18 | 新疆联海创智信息科技有限公司 | MAC address information acquisition system and method based on WiFi equipment |
CN112399417A (en) * | 2017-10-16 | 2021-02-23 | 安科讯(福建)科技有限公司 | Portal authentication method for guaranteeing smooth internet surfing and wireless access controller |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103365851A (en) * | 2012-03-27 | 2013-10-23 | 深圳市惠尔顿信息技术有限公司 | Method and system for sharing users' surfing behavior on basis of virtual organization |
CN103458456A (en) * | 2013-08-27 | 2013-12-18 | 中国科学院信息工程研究所 | Method and device for user behavior detection based on mobile terminal Wi-Fi data |
US20150025936A1 (en) * | 2013-07-19 | 2015-01-22 | eyeQ Insights | System for monitoring and analyzing behavior and uses thereof |
CN104980412A (en) * | 2014-04-14 | 2015-10-14 | 阿里巴巴集团控股有限公司 | Application client, server and corresponding Portal authentication method |
CN105099690A (en) * | 2014-05-19 | 2015-11-25 | 江苏博智软件科技有限公司 | OTP and user behavior-based certification and authorization method in mobile cloud computing environment |
CN105451219A (en) * | 2015-12-30 | 2016-03-30 | 迈普通信技术股份有限公司 | Data integration method and apparatus |
-
2016
- 2016-05-26 CN CN201610357369.7A patent/CN106028283A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103365851A (en) * | 2012-03-27 | 2013-10-23 | 深圳市惠尔顿信息技术有限公司 | Method and system for sharing users' surfing behavior on basis of virtual organization |
US20150025936A1 (en) * | 2013-07-19 | 2015-01-22 | eyeQ Insights | System for monitoring and analyzing behavior and uses thereof |
CN103458456A (en) * | 2013-08-27 | 2013-12-18 | 中国科学院信息工程研究所 | Method and device for user behavior detection based on mobile terminal Wi-Fi data |
CN104980412A (en) * | 2014-04-14 | 2015-10-14 | 阿里巴巴集团控股有限公司 | Application client, server and corresponding Portal authentication method |
CN105099690A (en) * | 2014-05-19 | 2015-11-25 | 江苏博智软件科技有限公司 | OTP and user behavior-based certification and authorization method in mobile cloud computing environment |
CN105451219A (en) * | 2015-12-30 | 2016-03-30 | 迈普通信技术股份有限公司 | Data integration method and apparatus |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106951828B (en) * | 2017-02-22 | 2020-02-21 | 清华大学 | Urban area function attribute identification method based on satellite images and network |
CN106951828A (en) * | 2017-02-22 | 2017-07-14 | 清华大学 | A kind of recognition methods of the urban area functional attributes based on satellite image and network |
CN107623898A (en) * | 2017-08-29 | 2018-01-23 | 广州中国科学院计算机网络信息中心 | Method for monitoring instruction, device and equipment |
CN109429296B (en) * | 2017-08-31 | 2021-04-30 | 中国电信股份有限公司 | Method, device and storage medium for associating terminal with internet surfing information |
CN109429296A (en) * | 2017-08-31 | 2019-03-05 | 中国电信股份有限公司 | For terminal and the associated method, apparatus of internet information and storage medium |
CN112399417B (en) * | 2017-10-16 | 2023-07-07 | 安科讯(福建)科技有限公司 | Portal authentication method for ensuring smooth internet surfing and wireless access controller |
CN112399417A (en) * | 2017-10-16 | 2021-02-23 | 安科讯(福建)科技有限公司 | Portal authentication method for guaranteeing smooth internet surfing and wireless access controller |
CN107801202A (en) * | 2017-10-31 | 2018-03-13 | 广东思域信息科技有限公司 | A kind of user's portrait method based on WiFi accesses |
CN108022344A (en) * | 2017-12-06 | 2018-05-11 | 上海麦泽科技有限公司 | The unattended intelligent retail terminal with scene content structure |
CN108347698A (en) * | 2018-02-07 | 2018-07-31 | 山东合天智汇信息技术有限公司 | A kind of on-line off-line event trace analysis method, apparatus and system |
CN108347698B (en) * | 2018-02-07 | 2020-11-06 | 山东合天智汇信息技术有限公司 | Online and offline activity track analysis method, device and system |
CN108834075A (en) * | 2018-05-30 | 2018-11-16 | 深信服科技股份有限公司 | A kind of determination method, system, device and the storage medium of personnel motion trail |
CN108805629A (en) * | 2018-06-20 | 2018-11-13 | 深圳市玛威尔显控科技有限公司 | It is a kind of that surrounding population information content playback method is identified using WiFi probes based on big data |
CN110808845A (en) * | 2018-08-06 | 2020-02-18 | 新疆联海创智信息科技有限公司 | MAC address information acquisition system and method based on WiFi equipment |
CN109768984A (en) * | 2019-01-25 | 2019-05-17 | 成都西加云杉科技有限公司 | A kind of authorization method and system of WiFi data analysis |
CN109768984B (en) * | 2019-01-25 | 2021-11-09 | 成都西加云杉科技有限公司 | Authorization method and system for WiFi data analysis |
CN110248326A (en) * | 2019-04-30 | 2019-09-17 | 中国联合网络通信集团有限公司 | A kind of data processing method and its device |
CN110248326B (en) * | 2019-04-30 | 2022-02-25 | 中国联合网络通信集团有限公司 | Data processing method and device |
CN110491090A (en) * | 2019-09-20 | 2019-11-22 | 苏州智博汇能电子科技股份有限公司 | Mid-aged population monitoring method based on mobile phone terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106028283A (en) | Method and system for analyzing user offline behaviors through wireless network data | |
US9876871B2 (en) | User logging of web traffic on non-browser based devices | |
CN106230787B (en) | A kind of authentication method of membership information system for unified management | |
US9953386B2 (en) | Method and system for controlling distribution of composite data of user by aggregation server | |
US20130339270A1 (en) | System and method for business entities to receive comments and feedback in real time | |
CN106296308B (en) | Merchant marketing method and system | |
CN104168316B (en) | A kind of Webpage access control method, gateway | |
Ding et al. | Stalking Beijing from Timbuktu: a generic measurement approach for exploiting location-based social discovery | |
CN104182681A (en) | Hook-based iOS (iPhone operating system) key behavior detection device and detection method thereof | |
CN107862091A (en) | Realize the control method and device of web page access | |
CN106230788A (en) | The reorientation method of a kind of portal certification, radio reception device, portal server | |
Sapiezynski et al. | Offline behaviors of online friends | |
CN103051650A (en) | Recommendation method and recommendation equipment based on address book | |
CN107690140A (en) | WAP authentication method, apparatus and system | |
CN112269562A (en) | Tenant isolation method and terminal in modular product | |
US8787886B2 (en) | Visitor detector | |
CN108345508A (en) | Interface calls test method and device | |
CN104363267B (en) | A kind of load of data, display methods and device | |
Baeta et al. | Tracking users mobility at public transportation | |
CN110278208A (en) | Intelligent home information exchange system and working method based on block chain | |
CN107241461B (en) | MAC Address acquisition methods, gateway, network authentication apparatus and network system | |
CN109885472A (en) | Test and management method and system and computer readable storage medium | |
CN106303904A (en) | For connecting the method and apparatus of wearable device and mobile terminal | |
CN107508838A (en) | A kind of access control method, device and system | |
CN111182474B (en) | Method for determining social relationship and related device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161012 |
|
RJ01 | Rejection of invention patent application after publication |