CN106028283A - Method and system for analyzing user offline behaviors through wireless network data - Google Patents

Method and system for analyzing user offline behaviors through wireless network data Download PDF

Info

Publication number
CN106028283A
CN106028283A CN201610357369.7A CN201610357369A CN106028283A CN 106028283 A CN106028283 A CN 106028283A CN 201610357369 A CN201610357369 A CN 201610357369A CN 106028283 A CN106028283 A CN 106028283A
Authority
CN
China
Prior art keywords
mobile terminal
user
behavior
mac
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610357369.7A
Other languages
Chinese (zh)
Inventor
刘荣名
罗鑫
徐德友
刘正权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Net Number Mdt Infotech Ltd
Original Assignee
Shanghai Net Number Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Net Number Mdt Infotech Ltd filed Critical Shanghai Net Number Mdt Infotech Ltd
Priority to CN201610357369.7A priority Critical patent/CN106028283A/en
Publication of CN106028283A publication Critical patent/CN106028283A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/69Types of network addresses using geographic information, e.g. room number

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a method and a system for analyzing user offline behaviors through wireless network data. The method comprises steps: acquiring identity authentication information registered at a client of a mobile terminal by a user, and a user ID of the user; sending a HTTP request to a wireless access controller AC through the mobile terminal; after receiving the request, returning a terminal MAC back to the mobile terminal initiating the HTTP request by the AC; visiting each wireless access point AP by the mobile terminal; obtaining and recording time information of the mobile terminal, forming user behavior information, and matching the user behavior information with the user identity authentication information; transmitting matched data back to a server, combining the user identity information with the user behavior information to analyze offline behaviors of each user; and recording and performing statistics on the offline behaviors of each user. The method and the system for analyzing the user offline behaviors through the wireless network data, provided by the invention, can identify corresponding users of the mobile terminal connected with a wireless network, and can accurately analyze the offline behaviors of the users.

Description

The method and system of behavior under subscribers feeder are analyzed by wireless network data
Technical field
The present invention relates to moving communicating field, particularly relate to data analysis based on mobile Internet.
Background technology
In recent years, along with mobile terminal is to the intelligentized development of high-performance, intelligent mobile terminal has become as city The main product of field.In addition intelligent mobile terminal can be connected with the Internet whenever and wherever possible, can use the Internet On almost all functions, intelligent mobile terminal application program development very fast.
Prior art has been able to record the internet behavior of a certain mobile terminal, but can not tell this shifting Whom the user of dynamic terminal is, therefore specific user (natural person) cannot be carried out behavior analysis under line, from And obtain behavior analytical data under line accurately.
Additionally, prior art obtains the MAC of a certain mobile terminal, statistics often through the specific network equipment Resolution later is the behavior of which mobile terminal, can not be obtained by mobile terminal self or APP self Relevant information, this results in object of statistics and is only limited to pass by or the crowd of this network equipment close or mobile whole End, so that the quantity of object of statistics is restricted, it is impossible to expand promoted extension.
Summary of the invention
The technical problem to be solved in the present invention is to provide by wireless network number towards crowd without geographical restrictions According to analyzing the method and system of behavior under subscribers feeder, can be by the visitor on the mobile terminal of mobile interchange network users Family end carries out the certification of Internet user's identity, closes with the unique corresponding of user according to the authentication information of user System, may recognize that multiple mobile terminal corresponding be same user, make behavior analysis under acquisition subscribers feeder Data will not repeat.Make client can not be obtained corresponding mobile terminal by what operating system limited simultaneously MAC。
For solving above-mentioned technical problem, present invention provide the technical scheme that
First aspect, the present invention provides a kind of user data processing method based on WiFi, comprises the steps:
Step S1, the MAC of network interface card in WiFi probe obtains this region in monitored area, and record this network interface card The visiting time, formed visiting record;
Step S2, according to the geographical position of WiFi probe and visiting record, add up this network interface card enter and/or from Open the number of times in monitoring region.
The technical scheme is that the WiFi probe first passed through in monitored area obtains network interface card in this region MAC, and record the visiting time of this network interface card, form visiting record;Then according to the geographical position of WiFi probe Put and visit record, the number of times that this network interface card enters and/or leaves monitoring region can be added up.The present invention based on The user data processing method of WiFi, as long as WiFi probe detects the network interface card in monitored area, will basis Behavior under the line of the MAC corresponding network interface card of acquisition of network interface card, method is simple, has good using value, example The pipe of customer resources is carried out as certain restaurant can enter and/or leave the number of times in monitoring region according to this network interface card Reason.
The present invention provides through wireless network data and analyze the method for behavior under subscribers feeder, comprise the following steps:
Information registering step, obtains user the authentication information of the client registers of mobile terminal and user ID, and described authentication information and ID are associated;
MAC obtaining step, by described mobile terminal via wireless access point AP to Radio Access Controller AC sends HTTP request, and described HTTP request is used for accessing any one necessary being and not wireless Network address in access controller AC white list, described white list represents the network address of the access Internet that directly lets pass Set;After described Radio Access Controller AC receives above-mentioned request, via described wireless access point AP Return to the mobile terminal initiating HTTP request and include mobile terminal MAC, wireless access point AP MAC adds confidential information;Described mobile terminal deciphers the above-mentioned confidential information that adds to obtain described mobile terminal MAC With wireless access point AP MAC information, and by corresponding with described mobile terminal for described mobile terminal MAC Authentication information associates;
Behavior record step, each wireless access point AP that described mobile terminal accessing is crossed, all moves end to this The visiting time of end, Connection Time, turn-off time and whether surfed the Net by this AP, online is when continuing Between carry out record, form user behavior information, and this user behavior information fed back in each mobile terminal Client;Client on described mobile terminal is by above-mentioned user behavior information and ID, authentication Information, mobile terminal MAC and wireless access point AP MAC coupling, and pass the data after coupling back clothes Business device;
Behavior analysis step, deposits unified for the data after above-mentioned coupling to server database, and according in advance Wireless access point AP and the AP of storage installs the corresponding relation on ground, and described mobile terminal MAC and use The corresponding relation at family, in conjunction with user behavior information, analyzes behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality Border crawler behavior;
Statistic record step, records and adds up the above-mentioned behavior of each user.
The technical scheme is that and first obtain user's authentication information at the client registers of mobile terminal And ID, and described authentication information and ID are associated;By described mobile terminal warp Being sent HTTP request by wireless access point AP to Radio Access Controller AC, described HTTP request is used In accessing any one necessary being and the not network address in Radio Access Controller AC white list, described in vain List represents the network address set of the access Internet that directly lets pass;Described Radio Access Controller AC receives After stating request, include to the mobile terminal return initiating HTTP request via described wireless access point AP Mobile terminal MAC, wireless access point AP MAC add confidential information;In the deciphering of described mobile terminal State and add confidential information to obtain described mobile terminal MAC and wireless access point AP MAC information, and by described Authentication information association corresponding with described mobile terminal for mobile terminal MAC;Then mobile terminal accessing The each wireless access point AP crossed, all to visiting time of this mobile terminal, the Connection Time, turn-off time, And whether carry out record by this AP online, online persistent period, form user behavior information, and will This user behavior information feeds back to the client in each mobile terminal;Client on described mobile terminal will Above-mentioned user behavior information and ID, authentication information, mobile terminal MAC and wireless access point AP MAC mates, and passes the data after coupling back server;Deposit unified for the data after above-mentioned coupling to service Device data base, and according to the corresponding relation of the wireless access point AP prestored with AP installation ground, Yi Jisuo State the corresponding relation of mobile terminal MAC and user, in conjunction with user behavior information, analyze the line of each user Lower behavior:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality Border crawler behavior;
Finally record and add up the above-mentioned behavior of each user.
The present invention analyzes the method for behavior under subscribers feeder by wireless network data, can analyze this user assorted Local, when, all done a little what.Due to the phone number information of user, ID card information or Other authentication information and the unique corresponding relation of described user, therefore if same user uses not Two same mobile terminals are surfed the Net in somewhere, and it is the most corresponding that the method can identify the two mobile terminal Be same user (natural person), and then the present invention analyzes behavior under subscribers feeder by wireless network data Method, be possible not only to analyze mobile terminal line under behavior, it is also possible to analyze mobile terminal correspondence user Line under behavior;It addition, the present invention analyzes under subscribers feeder in the method for behavior by wireless network data, logical Cross the client on mobile terminal and just can obtain the MAC of mobile terminal, it is not necessary to set by specific network Standby, as long as there being client on mobile terminal, it is possible to behavior under the line of user to be analyzed, therefore passes through The present invention can be to more mobile phone users lines by the method for behavior under wireless network data analysis subscribers feeder Lower behavior is analyzed, so that the quantity of object of statistics is not restricted, expands promoted extension.
It addition, the client on some customer mobile terminal is limited by operating system, it is impossible to obtain mobile whole The MAC of end, therefore can omit a lot carrying out behavior analysis under Internet user's line by the method when User, the present invention analyzes the method for behavior under subscribers feeder by wireless network data and passes through by client to wireless Access controller AC sends HTTP request, and HTTP request is used for accessing any one necessary being and not Network address in Radio Access Controller AC white list, white list represents the net of the access Internet that directly lets pass Location is gathered;After Radio Access Controller AC receives above-mentioned request, via described wireless access point AP to The mobile terminal initiating HTTP request returns the MAC including mobile terminal MAC, wireless access point AP Add confidential information;The above-mentioned confidential information that adds of mobile terminal deciphering is to obtain described mobile terminal MAC and wireless to connect Access point AP MAC information, by the method, client would not be limited by operating system, can obtain phase Answer the MAC of mobile terminal, obtain behavior analytical data under line more accurately.
Further, effective by the method Internet Security, when user wants to be surfed the Net by Wi-Fi, the method can Accurately to accomplish to authorize by " people ", it is only necessary to user carries out once certification by applications client, so that it may directly Use WiFi net, and safety, online efficiency are high.
Further, described mobile terminal includes mobile phone, computer and panel computer.The most general mobile end End has smart mobile phone, computer and panel computer, and user can be connected into wireless network by mobile terminal, enters Row online.
Further, described authentication information includes: ID card information and cell-phone number information.User to show The information of registration this user the most recognizable in the client of mobile terminal, therefore, the identity of user is recognized Card information is unique ID card information or cell-phone number information.
Further, the corresponding relation that described wireless access point AP MAC and AP install ground is AP MAC Geographical coordinate be AP install ground place position coordinates.Because wireless access point AP is generally fixedly mounted on Somewhere, AP MAC table shows the geographical position of AP, and therefore, user is connected in wireless network by AP, Indicate that this user also in AP location, i.e. AP install ground position.
Further, in described behavior record step, described user behavior information also includes that mobile terminal passes through The info web browsed during the online of this wireless access point AP.Owing to user is surfed the Net by wireless access point AP, Therefore can know the internet records information of this user, i.e. can obtain the info web that this user is browsed, As, when Public Security Organs needs to investigate the internet records of suspect, relevant information can be directly obtained, Can help to Public Security Organs solve a case.
Second aspect, the present invention provides a kind of offer by what wireless network data analyzed behavior under subscribers feeder to be System, including:
Information registering module, it is for obtaining user's authentication information at the client registers of mobile terminal And ID, and described authentication information and ID are associated;
MAC acquisition module, its for by described mobile terminal via wireless access point AP to wireless access Controller AC sends HTTP request, and described HTTP request is used for accessing any one necessary being and not Network address in Radio Access Controller AC white list, described white list represents the access Internet that directly lets pass Network address set;After described Radio Access Controller AC receives above-mentioned request, via described wireless access Point AP returns to the mobile terminal initiating HTTP request and includes mobile terminal MAC, WAP The MAC of AP adds confidential information;Described mobile terminal deciphers the above-mentioned confidential information that adds to obtain described mobile terminal MAC and wireless access point AP MAC information, and by described mobile terminal MAC and described mobile terminal Corresponding authentication information association;
Behavior record module, its each wireless access point AP crossed for making described mobile terminal accessing is the most right The visiting time of this mobile terminal, Connection Time, turn-off time and whether surfed the Net by this AP, on The net persistent period carries out record, forms user behavior information, and this user behavior information is fed back to each shifting Client in dynamic terminal;Client on described mobile terminal by above-mentioned user behavior information and ID, Authentication information, mobile terminal MAC and wireless access point AP MAC coupling, and by the number after coupling According to passing server back;
Behavior analysis module, it is for depositing unified for the data after above-mentioned coupling to server database, and root According to the corresponding relation of the wireless access point AP prestored with AP installation ground, and described mobile terminal MAC With the corresponding relation of user, in conjunction with user behavior information, analyze behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality Border crawler behavior;
Statistic record module, records and adds up the above-mentioned behavior of each user.
The technical scheme is that first in information registering module, obtain user's client at mobile terminal The authentication information of registration and ID, and described authentication information and ID are associated; Then in MAC acquisition module, by described mobile terminal via wireless access point AP to wireless access control Device AC processed sends HTTP request, and described HTTP request is used for accessing any one necessary being and not existing Network address in Radio Access Controller AC white list, described white list represents the access Internet that directly lets pass Network address set;After described Radio Access Controller AC receives above-mentioned request, via described wireless access Point AP returns to the mobile terminal initiating HTTP request and includes mobile terminal MAC, WAP The MAC of AP adds confidential information;Described mobile terminal deciphers the above-mentioned confidential information that adds to obtain described mobile terminal MAC and wireless access point AP MAC information, and by described mobile terminal MAC and described mobile terminal Corresponding authentication information association;Then in behavior logging modle, each nothing that mobile terminal accessing is crossed Whether line access point AP, all to visiting time, Connection Time, the turn-off time of this mobile terminal and lead to Cross this AP online, the online persistent period carries out record, forms user behavior information, and by this user behavior Information feeds back to the client in each mobile terminal;Client on described mobile terminal is by above-mentioned user's row Mate with ID, authentication information, mobile terminal MAC and wireless access point AP MAC for information, And pass the data after coupling back server;Subsequently, in behavior analysis module, after above-mentioned coupling Data are unified deposits to server database, and installs ground according to the wireless access point AP prestored with AP Corresponding relation, and the corresponding relation of described mobile terminal MAC and user, in conjunction with user behavior information, Analyze behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality Border crawler behavior;
Last in statistic record module, record and add up the above-mentioned behavior of each user.
The present invention analyzes the system of behavior under subscribers feeder by wireless network data, can analyze this user assorted Local, when, all done a little what.Due to the phone number information of user, ID card information or Other authentication information and the unique corresponding relation of described user, therefore if same user uses not Two same mobile terminals are surfed the Net in somewhere, and it is the most corresponding that the method can identify the two mobile terminal Be same user (natural person), and then the present invention analyzes behavior under subscribers feeder by wireless network data System, be possible not only to analyze mobile terminal line under behavior, it is also possible to analyze mobile terminal correspondence user Line under behavior;It addition, the present invention analyzes under subscribers feeder in the system of behavior by wireless network data, logical Cross the client on mobile terminal and just can obtain the MAC of mobile terminal, it is not necessary to set by specific network Standby, as long as there being client on mobile terminal, it is possible to behavior under the line of user to be analyzed, therefore passes through The present invention analyzes the system of behavior under subscribers feeder by wireless network data, can be to more mobile phone users Under line, behavior is analyzed, so that the quantity of object of statistics is not restricted, expands promoted extension.
It addition, the client on some customer mobile terminal is limited by operating system, it is impossible to obtain mobile whole The MAC of end, therefore can omit a lot carrying out behavior analysis under Internet user's line by this system when User, the present invention analyzes the system of behavior under subscribers feeder by wireless network data and passes through by client to wireless Access controller AC sends HTTP request, and HTTP request is used for accessing any one necessary being and not Network address in Radio Access Controller AC white list, white list represents the net of the access Internet that directly lets pass Location is gathered;After Radio Access Controller AC receives above-mentioned request, via described wireless access point AP to The mobile terminal initiating HTTP request returns the MAC including mobile terminal MAC, wireless access point AP Add confidential information;The above-mentioned confidential information that adds of mobile terminal deciphering is to obtain described mobile terminal MAC and wireless to connect Access point AP MAC information, by this system, client would not be limited by operating system, can obtain phase Answer the MAC of mobile terminal, obtain behavior analytical data under line more accurately.
Further, effective by this system Internet Security, when user wants to be surfed the Net by Wi-Fi, this system can Accurately to accomplish to authorize by " people ", it is only necessary to user carries out once certification by applications client, so that it may directly Use WiFi net, and safety, online efficiency are high.
Further, described mobile terminal includes mobile phone, computer and panel computer.The most general mobile end End has smart mobile phone, computer and panel computer, and user can be connected into wireless network by various mobile terminals, Surf the Net, convenient and swift.
Further, described authentication information includes: ID card information and cell-phone number information.User wants first The information of registration this user the most recognizable in the client of mobile terminal, therefore, the identity of user is recognized Card information is unique ID card information or cell-phone number information.
Further, the corresponding relation that described wireless access point AP MAC and AP install ground is AP MAC Geographical coordinate be AP install ground place position coordinates.Because wireless access point AP is generally fixedly mounted on Somewhere, AP MAC table shows the geographical position of AP, and therefore, user is connected in wireless network by AP, Indicate that this user also in AP location, i.e. AP install ground position.
Further, in described behavior record module, described user behavior information also includes that mobile terminal passes through The info web browsed during the online of this wireless access point AP.Owing to user is surfed the Net by wireless access point AP, Therefore can know the internet records information of this user, i.e. can obtain the info web that this user is browsed, As, when Public Security Organs needs to investigate the internet records of suspect, relevant information can be directly obtained, Public Security Organs is helped to solve a case as early as possible.
Accompanying drawing explanation
In order to be illustrated more clearly that the specific embodiment of the invention or technical scheme of the prior art, below will The accompanying drawing used required in detailed description of the invention or description of the prior art is briefly described:
Fig. 1 shows a kind of based on WiFi user data processing method that first embodiment of the invention is provided Flow chart;
It is descending by wireless network data analysis subscribers feeder that Fig. 2 shows that first embodiment of the invention is provided For the flow chart of method;
It is descending by wireless network data analysis subscribers feeder that Fig. 3 shows that second embodiment of the invention is provided For method network architecture diagram generally;
It is descending by wireless network data analysis subscribers feeder that Fig. 4 shows that fourth embodiment of the invention is provided For the structured flowchart of system.
Detailed description of the invention
Below in conjunction with accompanying drawing, the embodiment of technical solution of the present invention is described in detail.Following example It is only used for clearly illustrating technical scheme, is therefore intended only as example, and can not come with this Limit the scope of the invention.
Embodiment one
Fig. 1 shows a kind of based on WiFi user data processing method that first embodiment of the invention is provided Flow chart.As it is shown in figure 1, a kind of based on WiFi user data according to a first embodiment of the present invention processes Method includes:
Step S1, the MAC of network interface card in WiFi probe obtains this region in monitored area, and record this net The visiting time of card, form visiting record;
Step S2, according to the geographical position of WiFi probe and visiting record, add up this network interface card enter and/or from Open the number of times in monitoring region.
The technical scheme is that the WiFi probe first passed through in monitored area obtains network interface card in this region MAC, and record the visiting time of this network interface card, form visiting record;Then according to the geographical position of WiFi probe Put and visit record, the number of times that this network interface card enters and/or leaves monitoring region can be added up.The present invention based on The user data processing method of WiFi, as long as WiFi probe detects the network interface card in monitored area, will basis Behavior under the line of the MAC corresponding network interface card of acquisition of network interface card, method is simple, has good using value, example The pipe of customer resources is carried out as certain restaurant can enter and/or leave the number of times in monitoring region according to this network interface card Reason.
It is descending by wireless network data analysis subscribers feeder that Fig. 2 shows that first embodiment of the invention is provided For method flow diagram.As in figure 2 it is shown, being analyzed by wireless network data according to a first embodiment of the present invention Under subscribers feeder, the method for behavior includes:
Information registering step S10, obtain user the client registers of mobile terminal authentication information and ID, and described authentication information and ID are associated;
MAC obtaining step S20, by mobile terminal via wireless access point AP to Radio Access Controller AC sends HTTP request, and HTTP request is used for accessing any one necessary being and not in wireless access control Network address in device AC white list processed, white list represents the network address set of the access Internet that directly lets pass;Wireless After access controller AC receives above-mentioned request, via wireless access point AP to initiating HTTP request Mobile terminal return include mobile terminal MAC, wireless access point AP MAC add confidential information;Move The above-mentioned confidential information that adds of dynamic terminal deciphering is to obtain described mobile terminal MAC and wireless access point AP MAC Information, and by authentication information association corresponding with mobile terminal for mobile terminal MAC;
Behavior record step S30, each wireless access point AP that mobile terminal accessing is crossed, all moves end to this The visiting time of end, Connection Time, turn-off time and whether surfed the Net by this A, the online persistent period Carry out record, form user behavior information, and this user behavior information is fed back in each mobile terminal Client;Client on mobile terminal by above-mentioned user behavior information and ID, authentication information, Mobile terminal MAC and wireless access point AP MAC coupling, and pass the data after coupling back server;
Behavior analysis step S40, deposits unified for the data after above-mentioned coupling to server database, and according to The wireless access point AP prestored and AP install the corresponding relation on ground, and mobile terminal MAC and use The corresponding relation at family, in conjunction with user behavior information, analyzes behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality Border crawler behavior;
Statistic record step S50, records and adds up the above-mentioned behavior of each user.
The technical scheme is that and first obtain user's authentication information at the client registers of mobile terminal And ID, and authentication information and ID are associated;Connect via wireless by mobile terminal Access point AP sends HTTP request to Radio Access Controller AC, and HTTP request is used for accessing any one Necessary being and the not network address in Radio Access Controller AC white list, white list represents visit of directly letting pass Ask the network address set of Internet;After Radio Access Controller AC receives above-mentioned request, via wireless access Point AP returns to the mobile terminal initiating HTTP request and includes mobile terminal MAC, WAP The MAC of AP adds confidential information;Mobile terminal deciphering above-mentioned add confidential information with obtain mobile terminal MAC and Wireless access point AP MAC information, and by authentication letter corresponding with mobile terminal for mobile terminal MAC Breath association;Then each wireless access point AP that mobile terminal accessing is crossed, time all to the visiting of this mobile terminal Between, Connection Time, turn-off time and whether surfed the Net by this AP, the online persistent period carries out record, Form user behavior information, and this user behavior information is fed back to the client in each mobile terminal;Move Client in dynamic terminal is by above-mentioned user behavior information and ID, authentication information, mobile terminal MAC and wireless access point AP MAC coupling, and pass the data after coupling back server;By above-mentioned Data after joining are unified deposits to server database, and according to the wireless access point AP prestored and AP The corresponding relation on ground, and the corresponding relation of mobile terminal MAC and user are installed, believe in conjunction with user behavior Breath, analyzes behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality Border crawler behavior;
Finally record and add up the above-mentioned behavior of each user.
The present invention analyzes the method for behavior under subscribers feeder by wireless network data, can analyze this user assorted Local, when, all done a little what.Due to the phone number information of user, ID card information or Other authentication information and the unique corresponding relation of described user, therefore if same user uses not Two same mobile terminals are surfed the Net in somewhere, and it is the most corresponding that the method can identify the two mobile terminal Be same user (natural person), and then this user line in this local (somewhere) can be analyzed Lower behavior includes that this user is to pass by, stop or user's actual activity behavior.And then the present invention is by wireless The method of behavior under network data analysis subscribers feeder, is possible not only to behavior under the line of analysis mobile terminal, also may be used With behavior under the line of analysis mobile terminal correspondence user;It addition, the present invention is analyzed by wireless network data Under subscribers feeder in the method for behavior, just can be obtained mobile terminal by the client on mobile terminal MAC, it is not necessary to by the specific network equipment, as long as there being client, it is possible to user's on mobile terminal Under line, behavior is analyzed, and therefore analyzes the side of behavior under subscribers feeder by the present invention by wireless network data Behavior under more mobile phone users lines can be analyzed, so that the quantity of object of statistics is the most restricted by method About, promoted extension is expanded.
It addition, the client on some customer mobile terminal is limited by mobile terminal operating system, it is impossible to obtain Obtain the MAC of mobile terminal, such as, when i Phone system version is higher than IOS7, will be by Fructus Mali pumilae The restriction of mobile phone operating system, obtains the MAC less than i Phone by cell-phone customer terminal, therefore cannot Behavior under the line of this i Phone is analyzed.And common Android mobile phone will not be by its operating system Limit, the MAC of any edition system mobile terminal can be obtained.Therefore to carry out Internet user's line descending Can omit a lot of user (user limited by mobile terminal operating system) when of for analyzing, the present invention passes through Under wireless network data analysis subscribers feeder, the method for behavior is by being sent out to Radio Access Controller AC by client HTTP request, HTTP request is sent to be used for accessing any one necessary being and not at Radio Access Controller Network address in AC white list, white list represents the network address set of the access Internet that directly lets pass;Wireless access After controller AC receives above-mentioned request, via wireless access point AP to the movement initiating HTTP request Terminal return include mobile terminal MAC, wireless access point AP MAC add confidential information;Mobile whole The above-mentioned confidential information that adds of end deciphering, to obtain mobile terminal MAC and wireless access point AP MAC information, passes through The method, client would not be limited by operating system, can obtain the MAC of corresponding mobile terminal, and then How more user crowd can carry out the analysis of behavior under line, obtain behavior analytical data under line more accurately.
Further, effective by the method Internet Security, when user wants to be surfed the Net by Wi-Fi, the method can Accurately to accomplish to authorize by " people ", it is only necessary to user carries out once certification by applications client, so that it may directly Use WiFi net, and safety, online efficiency are high.
Specifically, mobile terminal includes mobile phone, computer and panel computer.The most general mobile terminal has intelligence Energy mobile phone, computer and panel computer, user can be connected into wireless network by mobile terminal, surf the Net.
Specifically, authentication information includes: ID card information and cell-phone number information.User wants first moving The information of registration this user the most recognizable in the client of terminal, therefore, the authentication information of user For unique ID card information or cell-phone number information.
Specifically, wireless access point AP MAC and AP install the geography that corresponding relation is AP MAC on ground Coordinate is the position coordinates that AP installs place, ground.
AP is equivalent to one and connects wired network and the bridge of wireless network, and Main Function is by each wireless network visitor Family end connects together, it is achieved on a large scale, the wireless access of multi-user, according to the difference of application scenarios, AP Being commonly divided into indoor type and outdoor version, under indoor environment, coverage is generally at 30 meters to 100 meters, outdoor Environment maximum coverage range can reach 800 meters.AC is WLAN access control equipment (wireless routing Device), effect is will to carry out converging and accessing Internet from the data of different AP, complete AP equipment simultaneously Configuration management and the certification of wireless user, management, and broadband, access, switch, safety etc. controls merit Energy.Because wireless access point AP is generally fixedly mounted on somewhere, AP MAC table shows the geographical position of AP, Therefore, user is connected in wireless network by AP, indicates that this user is also in AP location, i.e. AP Position, ground is installed.
Specifically, in behavior record step S30, user behavior information also includes that mobile terminal is wireless by this The info web browsed during access point AP online.Owing to user is surfed the Net by wireless access point AP, therefore The internet records information of this user can be known, i.e. can obtain the info web that this user is browsed, e.g., When Public Security Organs needs to investigate the internet records of suspect, relevant information can be directly obtained.
Embodiment two
See Fig. 3, analyze the method for behavior under subscribers feeder for the present invention by wireless network data and totally surf the Net Network architecture diagram, the present invention analyzes under subscribers feeder the method for behavior with mobile phone terminal by wireless network data On APP realize as a example by, the concrete technical scheme of the present invention is illustrated:
Using as a example by two mobile phone terminals by a user, premise is all to pacify on two mobile phone terminals of this user Opening APP equipped with this APP, first user to register, the information of registration is user's ID authentication information And ID, including the phone number of user, (Ministry of Public Security's requirement, public WiFi service provider must carry Phone number for all-network user) or ID (identity number) card No., this user's ID authentication information and ID The all corresponding natural person's behavior using the registration of this client account of all behaviors in a network, available mobile phone Number is reviewed, if user is manufacturer, it is impossible to provides phone number, then can use identification card number, Or other authentication information;Now, this APP obtains the unique user's ID authentication information of this user, Sending HTTP request via AP to AC by this APP, it is true that HTTP request is used for accessing any one Real storage and the not network address in Radio Access Controller AC white list, white list represents access of directly letting pass The network address set of Internet;After Radio Access Controller AC receives above-mentioned request, via WAP AP returns to the mobile phone terminal initiating HTTP request and includes mobile phone terminal MAC, wireless access point AP MAC add confidential information;The above-mentioned confidential information that adds of mobile phone terminal deciphering is to obtain mobile phone terminal MAC and wireless Access point AP MAC information, by the method, this APP would not be limited by mobile phone terminal operating system, The MAC of any operating system mobile phone terminal can be obtained.
Wherein the implementation method of any operating system mobile phone terminal MAC of concrete acquisition is:
A, send one by the wireless controller AC in WiFi network equipment of the APP on mobile phone terminal The request of individual HTTP, HTTP request is used for accessing any one necessary being and not at equipment white list In network address, white list refers to directly to let pass and accesses the address set of Internet;
After B, wireless controller AC accept above-mentioned request, on the counterpart terminal initiating HTTP request Client return information, return information form is following (example)
<script>self.location.href='http: // 112.124.31.88/auth/servlet/authServlet?S=f202313d F1f99f2af542a9073a50811c&mac=9807f5c39b0245c82c04859938f b2d0e&port=293 16c3960ee95d8&url=709db9dc9ce334aaea3d4fa878826efd5d8c15 802016713e&ip= 81b0dc1f1e4c5effd8c557e77a2986ae&=8e47f33396baf6de&seria lno=db1ebcf32ebd 0305e016e2afc5767922'</script>
Wherein, what the information of return included mobile terminal MAC and wireless access point AP MAC adds confidential information.
C, APP will<script>,</script>middle content deciphering is extracted, it is thus achieved that mobile phone terminal MAC With wireless access point AP MAC information.Also obtain simultaneously the visiting time of mobile phone terminal, the Connection Time, Turn-off time and whether surfed the Net by this AP, the information such as online persistent period.
Finally, APP is by above-mentioned authentication information, ID, terminal MAC, AP MAC, movement The visiting time of terminal, Connection Time, turn-off time and whether surfed the Net by this AP, online continues Temporal information passes to server, and server processes behavior analytical data under the line obtaining this user by analysis. Concrete analysis process is: subscriber identity information passes through APP correspondence mobile phone terminal, by terminal MAC and AP MAC can obtain the geographical position at this user place, judges this user by the visiting time of mobile phone terminal Whether for passing by this ground, the time being accessed Wi-Fi by user may determine that this with the time disconnecting network User is in the time of staying on this ground, it is also possible to whether know this user by this AP online by mobile phone terminal User's actual activity behavior under the line on this ground, premise is the information that this APP comprises this shop;Therefore this use Family also can be understood the specifying information in this shop on APP and (include geographical position, merchandise news, information on services Deng), then carry out consuming under line.Thus the network behavior of user and APP usage behavior can be carried out Identification is reviewed.
Embodiment three
Owing to network MAC can be corresponded to real user, the therefore application of the method by the method Widely, such as can be surfed the Net in certain shop a period of time of statistics by the AP in this shop by mobile terminal Client's visit capacity, embody the method application in terms of data statistics;
The most such as, the work in given range (time, region) of a certain sensitive users is provided to public security department Series connection behavior under dynamic track or the line in one group of sensitive users a period of time, Public Security Organs can be directly targeted to Specifically " user ", can be analyzed according to behavior under the line of this user, under line, behavior includes that this sensitive users is assorted Where time arrived, and in this local residence time, also had to have purchased which kind of commodity at this, Have accessed what webpage, these information are all very important information, can improve efficiency of solving a case broken with reduction Case difficulty, embodies the method using value in terms of data analysis;
For example, it is also possible to provide its Very Important Person to the frequency in shop, for the last time to weights such as shop times to restaurant Want CRM (customer relation management) data, help the customer resources of this restaurant management oneself, by these numbers According to, resident client can periodically be paid a return visit by this restaurant, improves the service quality in restaurant.
Embodiment four
See Fig. 4, the embodiment of the present invention also provide for by what wireless network data analyzed behavior under subscribers feeder be System 100, including:
Information registering module 101, it is for obtaining user's authentication at the client registers of mobile terminal Information and ID, and described authentication information and ID are associated;
MAC acquisition module 102, its for by described mobile terminal via wireless access point AP to wireless Access controller AC sends HTTP request, and described HTTP request is used for accessing any one necessary being And the not network address in Radio Access Controller AC white list, described white list represents access of directly letting pass The network address set of Internet;After described Radio Access Controller AC receives above-mentioned request, via described nothing Line access point AP returns to the mobile terminal initiating HTTP request and includes mobile terminal MAC, wireless connects The MAC of access point AP adds confidential information;Described mobile terminal deciphers the above-mentioned confidential information that adds to obtain described movement Terminal MAC and wireless access point AP MAC information, and by described mobile terminal MAC and described movement The authentication information association that terminal is corresponding;
Behavior record module 103, its each wireless access point AP crossed for making described mobile terminal accessing, All to visiting time of this mobile terminal, Connection Time, turn-off time and whether surfed the Net by this AP, The online persistent period carries out record, forms user behavior information, and feeds back to each by this user behavior information Client in mobile terminal;Client on described mobile terminal is by above-mentioned user behavior information and user ID, authentication information, mobile terminal MAC and wireless access point AP MAC coupling, and by after coupling Data pass server back;
Behavior analysis module 104, it is for depositing unified for the data after above-mentioned coupling to server database, And according to the corresponding relation of the wireless access point AP prestored with AP installation ground, and described mobile terminal The corresponding relation of MAC and user, in conjunction with user behavior information, analyzes behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality Border crawler behavior;
Statistic record module 105, records and adds up the above-mentioned behavior of each user.
The technical scheme is that first in information registering module 101, obtain the user visitor at mobile terminal The authentication information of family end registration and ID, and authentication information and ID are associated; Then in MAC acquisition module 102, by mobile terminal via wireless access point AP to wireless access control Device AC processed sends HTTP request, and HTTP request is used for accessing any one necessary being and not wireless Network address in access controller AC white list, white list represents the network address set of the access Internet that directly lets pass; After Radio Access Controller AC receives above-mentioned request, ask to initiating HTTP via wireless access point AP The mobile terminal asked return include mobile terminal MAC, wireless access point AP MAC add confidential information; The above-mentioned confidential information that adds of mobile terminal deciphering is to obtain described mobile terminal MAC and wireless access point AP MAC Information, and by described authentication information association corresponding with described mobile terminal for mobile terminal MAC;So After in behavior logging modle 103, each wireless access point AP that mobile terminal accessing is crossed, all this is moved The visiting time of terminal, Connection Time, turn-off time and whether surfed the Net by this AP, online continues Time carries out record, forms user behavior information, and this user behavior information is fed back to each mobile terminal In client;Client on mobile terminal is by above-mentioned user behavior information and ID, authentication letter Breath, mobile terminal MAC and wireless access point AP MAC coupling, and pass the data after coupling back service Device;Subsequently, in behavior analysis module 104, deposit unified for the data after above-mentioned coupling to server count According to storehouse, and according to the corresponding relation of the wireless access point AP prestored with AP installation ground, and described shifting Dynamic terminal MAC and the corresponding relation of user, in conjunction with user behavior information, the line analyzing each user is descending For:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality Border crawler behavior;
Last in statistic record module 105, record and add up the above-mentioned behavior of each user.
The present invention analyzes the system of behavior under subscribers feeder by wireless network data, can analyze this user assorted Local, when, all done a little what.Due to the phone number information of user, ID card information or Other authentication information and the unique corresponding relation of described user, therefore if same user uses not Two same mobile terminals are surfed the Net in somewhere, and it is the most corresponding that the method can identify the two mobile terminal Be same user (natural person), and then the present invention analyzes behavior under subscribers feeder by wireless network data System, be possible not only to analyze mobile terminal line under behavior, it is also possible to analyze mobile terminal correspondence user Line under behavior;It addition, the present invention analyzes under subscribers feeder in the system of behavior by wireless network data, logical Cross the client on mobile terminal and just can obtain the MAC of mobile terminal, it is not necessary to set by specific network Standby, as long as there being client on mobile terminal, it is possible to behavior under the line of user to be analyzed, therefore passes through The present invention analyzes the system of behavior under subscribers feeder by wireless network data, can be to more mobile phone users Under line, behavior is analyzed, so that the quantity of object of statistics is not restricted, expands promoted extension.
It addition, client can obtain, by the operating system of Android mobile phone, the MAC Address that mobile phone is corresponding, But the client on some customer mobile terminal is limited by operating system, it is impossible to obtain mobile terminal The operating system of MAC, such as i Phone, when operating system version is higher than IOS7, client can not be from Operating system obtains MAC Address.Therefore behavior analysis under Internet user's line is being carried out by this system Time can omit a lot of user, the present invention analyzes the system of behavior under subscribers feeder by wireless network data and passes through Being sent HTTP request by client to Radio Access Controller AC, HTTP request is used for accessing any one Individual necessary being and the not network address in Radio Access Controller AC white list, white list represents directly clearance Access the network address set of Internet;After Radio Access Controller AC receives above-mentioned request, via described nothing Line access point AP returns to the mobile terminal initiating HTTP request and includes mobile terminal MAC, wireless connects The MAC of access point AP adds confidential information;The above-mentioned confidential information that adds of mobile terminal deciphering is to obtain described movement eventually End MAC and wireless access point AP MAC information, by this system, client would not be by operating system Limit, the MAC of corresponding mobile terminal can be obtained, obtain behavior analytical data under line more accurately.
Further, effective by this system Internet Security, when user wants to be surfed the Net by Wi-Fi, this system can Accurately to accomplish to authorize by " people ", it is only necessary to user carries out once certification by applications client, so that it may directly Use WiFi net, and safety, online efficiency are high.
Embodiment five
The AP that the present invention is analyzed under subscribers feeder in behavior system by wireless network data is typically mounted at indoor, Install the corresponding relation on ground with it according to AP, AP is arranged on different places, so that it may obtain the ground in this place Reason position, simultaneously according to the corresponding relation of mobile terminal MAC Yu user, carries out that user is the most collinear descending is Judgement.
Exceed the scheduled time when AP persistently scans same mobile terminal, or mobile terminal is at this wireless access Under some AP, online exceedes the scheduled time, then be judged to the behavior of staying;Behavior is stayed based on this, if AP It is arranged on the classroom of school, it is possible to judge that the behavior of certain student is as the behavior of attending class;If AP is arranged on doctor In the dental clinic of institute, it is possible to judge that the behavior of certain patient is as medical behavior;If being arranged on cafe, It is determined that certain user is the consuming behavior buying coffee in the behavior of this cafe;If it addition, when moving Moving user corresponding to terminal MAC is that public security monitors personnel, and several MAC are concurrently accessed certain WAP During AP, it is possible to be judged to that public security risk behavior, i.e. this AP location exist public security risk, may the criminal of having Crime is for occurring.
Therefore, the present invention can be installed according to AP by the system of behavior under wireless network data analysis subscribers feeder The difference on ground, mobile terminal correspondence user (user) is different, produces different using values, therefore with On each citing of enumerating be only used as a kind of explanation, be not intended as a kind of restriction.
To sum up, various embodiments above only in order to technical scheme to be described, is not intended to limit;Although Being described in detail the present invention with reference to foregoing embodiments, those of ordinary skill in the art should manage Solve: the technical scheme described in foregoing embodiments still can be modified by it, or to wherein part Or all technical characteristic carries out equivalent;And these amendments or replacement, do not make appropriate technical solution Essence depart from various embodiments of the present invention technical scheme scope, it all should contain the claim in the present invention In the middle of the scope of description.

Claims (10)

1. a user data processing method based on WiFi, it is characterised in that comprise the steps:
Step S1, the MAC of network interface card in WiFi probe obtains this region in monitored area, and record this network interface card The visiting time, formed visiting record;
Step S2, according to the geographical position of WiFi probe and visiting record, add up this network interface card enter and/or from Open the number of times in monitoring region.
2. analyze the method for behavior under subscribers feeder by wireless network data, it is characterised in that comprise the following steps:
Information registering step, obtains user the authentication information of the client registers of mobile terminal and user ID, and described authentication information and ID are associated;
MAC obtaining step, by described mobile terminal via wireless access point AP to Radio Access Controller AC sends HTTP request, and described HTTP request is used for accessing any one necessary being and not wireless Network address in access controller AC white list, described white list represents the network address of the access Internet that directly lets pass Set;After described Radio Access Controller AC receives above-mentioned request, via described wireless access point AP Return to the mobile terminal initiating HTTP request and include mobile terminal MAC, wireless access point AP MAC adds confidential information;Described mobile terminal deciphers the above-mentioned confidential information that adds to obtain described mobile terminal MAC With wireless access point AP MAC information, and by corresponding with described mobile terminal for described mobile terminal MAC Authentication information associates;
Behavior record step, each wireless access point AP that described mobile terminal accessing is crossed, all moves end to this The visiting time of end, Connection Time, turn-off time and whether surfed the Net by this AP, online is when continuing Between carry out record, form user behavior information, and this user behavior information fed back in each mobile terminal Client;Client on described mobile terminal is by above-mentioned user behavior information and ID, authentication Information, mobile terminal MAC and wireless access point AP MAC coupling, and pass the data after coupling back clothes Business device;
Behavior analysis step, deposits unified for the data after above-mentioned coupling to server database, and according in advance Wireless access point AP and the AP of storage installs the corresponding relation on ground, and described mobile terminal MAC and use The corresponding relation at family, in conjunction with user behavior information, analyzes behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality Border crawler behavior;
Statistic record step, records and adds up the above-mentioned behavior of each user.
The most according to claim 1 by the method for behavior under wireless network data analysis subscribers feeder, its Being characterised by, described mobile terminal includes mobile phone, computer and panel computer.
The most according to claim 1 by the method for behavior under wireless network data analysis subscribers feeder, its Being characterised by, described authentication information includes: ID card information and cell-phone number information.
The most according to claim 1 by the method for behavior under wireless network data analysis subscribers feeder, its Being characterised by, described wireless access point AP MAC installs the ground that corresponding relation is AP MAC on ground with AP Reason coordinate is the position coordinates that AP installs place, ground.
The most according to claim 1 by the method for behavior under wireless network data analysis subscribers feeder, its Being characterised by, in described behavior record step, described user behavior information also includes that mobile terminal passes through this nothing The info web browsed during line access point AP online.
7. analyze the system of behavior under subscribers feeder by wireless network data for one kind, it is characterised in that include with Lower module:
Information registering module, it is for obtaining user's authentication information at the client registers of mobile terminal And ID, and described authentication information and ID are associated;
MAC acquisition module, its for by described mobile terminal via wireless access point AP to wireless access Controller AC sends HTTP request, and described HTTP request is used for accessing any one necessary being and not Network address in Radio Access Controller AC white list, described white list represents the access Internet that directly lets pass Network address set;After described Radio Access Controller AC receives above-mentioned request, via described wireless access Point AP returns to the mobile terminal initiating HTTP request and includes mobile terminal MAC, WAP The MAC of AP adds confidential information;Described mobile terminal deciphers the above-mentioned confidential information that adds to obtain described mobile terminal MAC and wireless access point AP MAC information, and by described mobile terminal MAC and described mobile terminal Corresponding authentication information association;
Behavior record module, its each wireless access point AP crossed for making described mobile terminal accessing is the most right The visiting time of this mobile terminal, Connection Time, turn-off time and whether surfed the Net by this AP, on The net persistent period carries out record, forms user behavior information, and this user behavior information is fed back to each shifting Client in dynamic terminal;Client on described mobile terminal by above-mentioned user behavior information and ID, Authentication information, mobile terminal MAC and wireless access point AP MAC coupling, and by the number after coupling According to passing server back;
Behavior analysis module, it is for depositing unified for the data after above-mentioned coupling to server database, and root According to the corresponding relation of the wireless access point AP prestored with AP installation ground, and described mobile terminal MAC With the corresponding relation of user, in conjunction with user behavior information, analyze behavior under the line of each user:
When wireless access point AP scans mobile terminal, and after a predetermined interval of time, it is impossible to enough scanning During to same mobile terminal, then it is judged to pass by behavior;
Exceed the scheduled time when wireless access point AP persistently scans same mobile terminal, or mobile terminal exists Under this wireless access point AP, online exceedes the scheduled time, then be judged to the behavior of staying;
When meeting the above-mentioned condition staying behavior, and AP is arranged on described user and stays place, it is determined that for reality Border crawler behavior;
Statistic record module, records and adds up the above-mentioned behavior of each user.
The most according to claim 6 by the system of behavior under wireless network data analysis subscribers feeder, its Being characterised by, described mobile terminal includes mobile phone, computer and panel computer.
The most according to claim 6 by the system of behavior under wireless network data analysis subscribers feeder, its Being characterised by, described authentication information includes: ID card information and cell-phone number information.
The most according to claim 6 by the system of behavior under wireless network data analysis subscribers feeder, its Being characterised by, described wireless access point AP MAC installs the ground that corresponding relation is AP MAC on ground with AP Reason coordinate is the position coordinates that AP installs place, ground.
CN201610357369.7A 2016-05-26 2016-05-26 Method and system for analyzing user offline behaviors through wireless network data Pending CN106028283A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610357369.7A CN106028283A (en) 2016-05-26 2016-05-26 Method and system for analyzing user offline behaviors through wireless network data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610357369.7A CN106028283A (en) 2016-05-26 2016-05-26 Method and system for analyzing user offline behaviors through wireless network data

Publications (1)

Publication Number Publication Date
CN106028283A true CN106028283A (en) 2016-10-12

Family

ID=57095023

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610357369.7A Pending CN106028283A (en) 2016-05-26 2016-05-26 Method and system for analyzing user offline behaviors through wireless network data

Country Status (1)

Country Link
CN (1) CN106028283A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106951828A (en) * 2017-02-22 2017-07-14 清华大学 A kind of recognition methods of the urban area functional attributes based on satellite image and network
CN107623898A (en) * 2017-08-29 2018-01-23 广州中国科学院计算机网络信息中心 Method for monitoring instruction, device and equipment
CN107801202A (en) * 2017-10-31 2018-03-13 广东思域信息科技有限公司 A kind of user's portrait method based on WiFi accesses
CN108022344A (en) * 2017-12-06 2018-05-11 上海麦泽科技有限公司 The unattended intelligent retail terminal with scene content structure
CN108347698A (en) * 2018-02-07 2018-07-31 山东合天智汇信息技术有限公司 A kind of on-line off-line event trace analysis method, apparatus and system
CN108805629A (en) * 2018-06-20 2018-11-13 深圳市玛威尔显控科技有限公司 It is a kind of that surrounding population information content playback method is identified using WiFi probes based on big data
CN108834075A (en) * 2018-05-30 2018-11-16 深信服科技股份有限公司 A kind of determination method, system, device and the storage medium of personnel motion trail
CN109429296A (en) * 2017-08-31 2019-03-05 中国电信股份有限公司 For terminal and the associated method, apparatus of internet information and storage medium
CN109768984A (en) * 2019-01-25 2019-05-17 成都西加云杉科技有限公司 A kind of authorization method and system of WiFi data analysis
CN110248326A (en) * 2019-04-30 2019-09-17 中国联合网络通信集团有限公司 A kind of data processing method and its device
CN110491090A (en) * 2019-09-20 2019-11-22 苏州智博汇能电子科技股份有限公司 Mid-aged population monitoring method based on mobile phone terminal
CN110808845A (en) * 2018-08-06 2020-02-18 新疆联海创智信息科技有限公司 MAC address information acquisition system and method based on WiFi equipment
CN112399417A (en) * 2017-10-16 2021-02-23 安科讯(福建)科技有限公司 Portal authentication method for guaranteeing smooth internet surfing and wireless access controller

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103365851A (en) * 2012-03-27 2013-10-23 深圳市惠尔顿信息技术有限公司 Method and system for sharing users' surfing behavior on basis of virtual organization
CN103458456A (en) * 2013-08-27 2013-12-18 中国科学院信息工程研究所 Method and device for user behavior detection based on mobile terminal Wi-Fi data
US20150025936A1 (en) * 2013-07-19 2015-01-22 eyeQ Insights System for monitoring and analyzing behavior and uses thereof
CN104980412A (en) * 2014-04-14 2015-10-14 阿里巴巴集团控股有限公司 Application client, server and corresponding Portal authentication method
CN105099690A (en) * 2014-05-19 2015-11-25 江苏博智软件科技有限公司 OTP and user behavior-based certification and authorization method in mobile cloud computing environment
CN105451219A (en) * 2015-12-30 2016-03-30 迈普通信技术股份有限公司 Data integration method and apparatus

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103365851A (en) * 2012-03-27 2013-10-23 深圳市惠尔顿信息技术有限公司 Method and system for sharing users' surfing behavior on basis of virtual organization
US20150025936A1 (en) * 2013-07-19 2015-01-22 eyeQ Insights System for monitoring and analyzing behavior and uses thereof
CN103458456A (en) * 2013-08-27 2013-12-18 中国科学院信息工程研究所 Method and device for user behavior detection based on mobile terminal Wi-Fi data
CN104980412A (en) * 2014-04-14 2015-10-14 阿里巴巴集团控股有限公司 Application client, server and corresponding Portal authentication method
CN105099690A (en) * 2014-05-19 2015-11-25 江苏博智软件科技有限公司 OTP and user behavior-based certification and authorization method in mobile cloud computing environment
CN105451219A (en) * 2015-12-30 2016-03-30 迈普通信技术股份有限公司 Data integration method and apparatus

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106951828B (en) * 2017-02-22 2020-02-21 清华大学 Urban area function attribute identification method based on satellite images and network
CN106951828A (en) * 2017-02-22 2017-07-14 清华大学 A kind of recognition methods of the urban area functional attributes based on satellite image and network
CN107623898A (en) * 2017-08-29 2018-01-23 广州中国科学院计算机网络信息中心 Method for monitoring instruction, device and equipment
CN109429296B (en) * 2017-08-31 2021-04-30 中国电信股份有限公司 Method, device and storage medium for associating terminal with internet surfing information
CN109429296A (en) * 2017-08-31 2019-03-05 中国电信股份有限公司 For terminal and the associated method, apparatus of internet information and storage medium
CN112399417B (en) * 2017-10-16 2023-07-07 安科讯(福建)科技有限公司 Portal authentication method for ensuring smooth internet surfing and wireless access controller
CN112399417A (en) * 2017-10-16 2021-02-23 安科讯(福建)科技有限公司 Portal authentication method for guaranteeing smooth internet surfing and wireless access controller
CN107801202A (en) * 2017-10-31 2018-03-13 广东思域信息科技有限公司 A kind of user's portrait method based on WiFi accesses
CN108022344A (en) * 2017-12-06 2018-05-11 上海麦泽科技有限公司 The unattended intelligent retail terminal with scene content structure
CN108347698A (en) * 2018-02-07 2018-07-31 山东合天智汇信息技术有限公司 A kind of on-line off-line event trace analysis method, apparatus and system
CN108347698B (en) * 2018-02-07 2020-11-06 山东合天智汇信息技术有限公司 Online and offline activity track analysis method, device and system
CN108834075A (en) * 2018-05-30 2018-11-16 深信服科技股份有限公司 A kind of determination method, system, device and the storage medium of personnel motion trail
CN108805629A (en) * 2018-06-20 2018-11-13 深圳市玛威尔显控科技有限公司 It is a kind of that surrounding population information content playback method is identified using WiFi probes based on big data
CN110808845A (en) * 2018-08-06 2020-02-18 新疆联海创智信息科技有限公司 MAC address information acquisition system and method based on WiFi equipment
CN109768984A (en) * 2019-01-25 2019-05-17 成都西加云杉科技有限公司 A kind of authorization method and system of WiFi data analysis
CN109768984B (en) * 2019-01-25 2021-11-09 成都西加云杉科技有限公司 Authorization method and system for WiFi data analysis
CN110248326A (en) * 2019-04-30 2019-09-17 中国联合网络通信集团有限公司 A kind of data processing method and its device
CN110248326B (en) * 2019-04-30 2022-02-25 中国联合网络通信集团有限公司 Data processing method and device
CN110491090A (en) * 2019-09-20 2019-11-22 苏州智博汇能电子科技股份有限公司 Mid-aged population monitoring method based on mobile phone terminal

Similar Documents

Publication Publication Date Title
CN106028283A (en) Method and system for analyzing user offline behaviors through wireless network data
US9876871B2 (en) User logging of web traffic on non-browser based devices
CN106230787B (en) A kind of authentication method of membership information system for unified management
US9953386B2 (en) Method and system for controlling distribution of composite data of user by aggregation server
US20130339270A1 (en) System and method for business entities to receive comments and feedback in real time
CN106296308B (en) Merchant marketing method and system
CN104168316B (en) A kind of Webpage access control method, gateway
Ding et al. Stalking Beijing from Timbuktu: a generic measurement approach for exploiting location-based social discovery
CN104182681A (en) Hook-based iOS (iPhone operating system) key behavior detection device and detection method thereof
CN107862091A (en) Realize the control method and device of web page access
CN106230788A (en) The reorientation method of a kind of portal certification, radio reception device, portal server
Sapiezynski et al. Offline behaviors of online friends
CN103051650A (en) Recommendation method and recommendation equipment based on address book
CN107690140A (en) WAP authentication method, apparatus and system
CN112269562A (en) Tenant isolation method and terminal in modular product
US8787886B2 (en) Visitor detector
CN108345508A (en) Interface calls test method and device
CN104363267B (en) A kind of load of data, display methods and device
Baeta et al. Tracking users mobility at public transportation
CN110278208A (en) Intelligent home information exchange system and working method based on block chain
CN107241461B (en) MAC Address acquisition methods, gateway, network authentication apparatus and network system
CN109885472A (en) Test and management method and system and computer readable storage medium
CN106303904A (en) For connecting the method and apparatus of wearable device and mobile terminal
CN107508838A (en) A kind of access control method, device and system
CN111182474B (en) Method for determining social relationship and related device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20161012

RJ01 Rejection of invention patent application after publication