CN109412889A - User data statistical analysis technique, equipment and computer readable storage medium - Google Patents
User data statistical analysis technique, equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN109412889A CN109412889A CN201811200800.2A CN201811200800A CN109412889A CN 109412889 A CN109412889 A CN 109412889A CN 201811200800 A CN201811200800 A CN 201811200800A CN 109412889 A CN109412889 A CN 109412889A
- Authority
- CN
- China
- Prior art keywords
- user
- data
- statistical analysis
- user data
- platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
- H04L43/045—Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/142—Network analysis or design using statistical or mathematical methods
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
Abstract
The invention discloses a kind of user data statistical analysis technique, equipment and computer readable storage medium, this method is by acquiring user data in user sharing database;Classified according to user data of the preset standard to acquisition;It is for statistical analysis to the data of classification;The result of statistical analysis is generated into visualized graphs.It is stored by using the Data duplication that method of the invention solves user in each platform, can be avoided and establish huge data system because of data acquisition, reduce the duplicate workload of user.
Description
Technical field
The present invention relates to technical field of data processing more particularly to a kind of user data statistical analysis techniques, equipment and meter
Calculation machine readable storage medium storing program for executing.
Background technique
As internet is using more more and more universal, various platform applications emerge one after another, user when using different platform,
It generally requires to repeat to be registered in multiple and different platforms, i.e., there are very strong flat for current existing user information storage method
Platform specific aim, and user can generate a large number of users data when internet carries out daily routines, cannot achieve multi-platform user
It is shared.Data acquisition is single between internet, and not intercommunication, scalability is not strong, this makes user need repetitive operation.
In view of the foregoing, it is necessary to propose a kind of method that can solve the above problem.
Summary of the invention
The main purpose of the present invention is to provide a kind of user data statistical analysis technique, computer equipment equipment and calculating
Machine readable storage medium storing program for executing, it is intended to propose a kind of method that can solve information accumulation and be easy to cause system processing speed slow.
To achieve the above object, a kind of user data statistical analysis technique provided by the invention, the method includes as follows
Step
Step S10 acquires user data in user sharing database;
Step S20 classifies according to user data of the preset standard to acquisition;
Step S30, it is for statistical analysis to the data of classification;
The result of statistical analysis is generated visualized graphs by step S40.
Preferably, the step S30 includes:
Step S31, the data accounting of each type data in the data of statistical classification.
Preferably, before the step S40 further include:
Step S32 generates data form according to the data accounting of each type data of classification data.
Preferably, the method also includes:
Step S50, interval preset time update user sharing database.
Preferably, the method also includes:
Step S101 collects the data that user logs in each platform and the data in the generation of each platform;
The data of collection are stored in user sharing database by step S102.
It preferably, further include including: after the step S101
Whether abnormal step S1011 detects collected user information;
Step S1012, if so, the user is included in user list to be confirmed to carry out secondary verification.
Preferably, the method also includes:
User data in time control user sharing database.
In addition, to achieve the above object, the present invention also proposes that a kind of computer equipment, the computer equipment include: to deposit
Reservoir, processor and it is stored in the user data statistical analysis program that can be run on the memory and on the processor,
The step of user data statistical analysis program realizes method as described above when being executed by the processor.
In addition, to achieve the above object, the present invention also proposes a kind of computer readable storage medium, which is characterized in that institute
It states and is stored with user data statistical analysis program on computer readable storage medium, the user data statistical analysis program is located
The step of reason device realizes method as described above when executing.
User data statistical analysis technique of the present invention is by acquiring user data in user sharing database;According to default
Standard classifies to the user data of acquisition;It is for statistical analysis to the data of classification;It can by the result generation of statistical analysis
Depending on changing figure.It is stored by using the Data duplication that method of the invention solves user in each platform, can be avoided factor
Huge data system is established according to acquisition, reduces the duplicate workload of user.
Detailed description of the invention
Attached drawing is as a part of the invention, and for providing further understanding of the invention, of the invention is schematic
Examples and descriptions thereof are used to explain the present invention, but does not constitute an undue limitation on the present invention.Obviously, the accompanying drawings in the following description
Only some embodiments to those skilled in the art without creative efforts, can be with
Other accompanying drawings can also be obtained according to these attached drawings.In the accompanying drawings:
Fig. 1 is the flow diagram of an embodiment of user data statistical analysis technique of the present invention;
Fig. 2 is the flow diagram of another embodiment of user data statistical analysis technique of the present invention;
Fig. 3 is the module diagram of computer equipment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
The technical issues of with reference to the accompanying drawing and specific embodiment is solved to the embodiment of the present invention, used technical side
Case and the technical effect of realization carry out clear, complete description.Obviously, described embodiment is only one of the application
Divide embodiment, is not whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not paying creation
Property labour under the premise of, all other equivalent or obvious variant embodiment obtained all falls within protection scope of the present invention
It is interior.The embodiment of the present invention can be embodied according to the multitude of different ways being defined and covered by claim.
It should be noted that in the following description, understanding for convenience, giving many details.But it is very bright
Aobvious, realization of the invention can be without these details.
It should be noted that in the absence of clear limitations or conflicts, each embodiment in the present invention and its
In technical characteristic can be combined with each other and form technical solution.
The present invention proposes a kind of user data statistical analysis technique, it is intended to which the Data duplication for solving user is deposited in each platform
Storage can be avoided and establish huge data system because of data acquisition, reduces the duplicate workload of user.
In one embodiment of the invention, such as Fig. 1, described method includes following steps:
Step S10 acquires user data in user sharing database;
In the present embodiment, shared user sharing database is established for several default platforms, which uses
In storage user basic information.The user basic information include the phone number of user, mailbox, qq, WeChat ID, the age, address,
User ID, user's two dimensional code, user's registration time, user's registration platform, the behavioral data occurred on platform etc..Wherein,
The default platform is determined when building user sharing database, and certainly after user sharing database is built up, others are flat
Platform need to be added user information it is shared when, other platforms can also be added.It should be noted that each default platform has and is somebody's turn to do
The corresponding label of platform.After user's some default platform registration information wherein, registration information will carry the registration and put down
The corresponding label of platform, can be believed according to user after all storing the user information of each platform into user sharing database
Breath, which distinguishes the user, to be registered in which platform, and the number of users of itself is counted convenient for each platform.
Also, during collecting the user basic information of different default platforms, each default platform is needed to user's base
This information is encrypted.Specifically, the transmission of information is carried out using rivest, shamir, adelman.Rivest, shamir, adelman be by
The encryption method of a pair of corresponding unique keys (public-key cryptography and private cipher key) composition.In ciphering process, asymmetric encryption
The most apparent advantage of algorithm is exactly to use two rather than a key value, and one is used to encryption information, another is used to decrypt
Information, two keys are separated.Wherein, it is public-key cryptography for the key of encryption information, is for solving the key of confidential information
Private cipher key.Public-key cryptography is equivalent to the mailbox of each node transmitting information in block chain, and correspondingly, private cipher key is equivalent to letter
The key of case, the talent for only possessing private cipher key can check mail information in mailbox.With the information of public key encryption
It can be decrypted with corresponding private cipher key, private cipher key only has holder to know, and public-key cryptography can pass through safety
Channel sends or issues in catalogue, and this asymmetry greatly improves the safety of information propagation.
User data is acquired in user sharing database, specifically, can according to need a certain of selection acquisition user
Class data, for example, will just acquire the platform when the ratio of the male user and women user that need to count a certain platform
The log-on data of whole users, the log-on data have included user's gender attribute.Alternatively, there is a certain specific mark when needing to count
When user's accounting of label, then the label data of user is acquired in user sharing database.
Data in user sharing database are timed management by system, regularly update user data, user is default
The new behavioral data that platform occurs, updates in user sharing database.The tag along sort of user is managed, user is managed
Permission, grade etc. data.
Step S20 classifies according to user data of the preset standard to acquisition;
Further, the user data acquired in user sharing database is classified according to preset standard.Classification
Standard be it is variable, can be configured according to the requirement of analysis.For example, it is desired to analyze the purchase of shopping website mother and baby's product
Main force user concentrates on the crowd of which age level, then what is acquired in user's sharing data library at this time is shopping website platform
User data, and the preset standard of classification can be set are as follows:
According to user purchase article type be user classify, can be mainly divided into mother and baby's product class user and
Other classes user.
Step S30, it is for statistical analysis to the data of classification;
Further, for statistical analysis to above-mentioned sorted data, the statistical analysis includes calculating mother and baby to produce
The quantity of category user and the total number of users amount of acquisition, are calculated the accounting of mother and baby's product class user.
In addition, data can be handled according to the form of table after each accounting of classification data is calculated, it is raw
It is stored in file at intermediate table, the form of table can refer to the format of Excel.
The result of statistical analysis is generated visualized graphs by step S40.
The data conversion for being obtained analysis by graphic generator is at visualized graphs.It is intuitive by the visualized graphs
Represent the data of different types of user.Specifically, by obtaining the data and accounting of different type user, according to default
Graphical format and requirement generate visualized graphs.The visualized graphs can be pie chart, histogram, three-dimensional figure, arborescence etc..
Using user data statistical analysis technique of the invention, by acquiring user data in user sharing database;
Classified according to user data of the preset standard to acquisition;It is for statistical analysis to the data of classification;By the knot of statistical analysis
Fruit generates visualized graphs.It is stored by using the Data duplication that method of the invention solves user in each platform, it can
It avoids establishing huge data system because data acquire, reduces the duplicate workload of user.
Based on the above embodiment, in another embodiment of the present invention, reference Fig. 2, the method also includes:
Step S101 collects the data that user logs in each platform and the data in the generation of each platform;
The data of collection are stored in user sharing database by step S102.
In the present embodiment, user will in the data of each default platform login and in the data of each platform generation
It is collected and stores in user sharing database.User includes user on each platform in the data that each platform generates
Behavioral data, including buying behavior, trading activity, friend-making behavior etc..According to the behavior that user generates on each platform, also
To be user's setting and the behavior matched behavior label, when so as to subsequent progress data statistics, can according to the label of user into
Row classification etc..
It should be noted that collect user data when, further detect user information whether be abnormal, such as
It says, whether user be put on the blacklist, be complete etc. with the presence or absence of bad credit, user base information.If user believes
There is exception in breath, then the user is included in list to be confirmed, is carrying out secondary verification to data with subsequent.When interval is default
Between, secondary verification is carried out to abnormal user, if abnormal user restores normal, by its information storage to user sharing database
In, if still there is exception, verified to next time.
The present embodiment is same by the way that the user data of each platform and user to be collected into the data that platform generates
In user sharing database, facilitate the statistics of information, information is avoided to repeat to store in each platform.
In addition, the present invention also proposes a kind of computer equipment 100, referring to Fig. 3, the computer equipment 100 includes: storage
The user data statistics that device 101, processor 102 and being stored in can be run on the memory 101 and on the processor 102
Program is analyzed, the user data statistical analysis program realizes following method when being executed by the processor 102:
User data is acquired in user sharing database;
Classified according to user data of the preset standard to acquisition;
It is for statistical analysis to the data of classification;
The result of statistical analysis is generated into visualized graphs.
In the present embodiment, shared user sharing database is established for several default platforms, which uses
In storage user basic information.The user basic information include the phone number of user, mailbox, qq, WeChat ID, the age, address,
User ID, user's two dimensional code, user's registration time, user's registration platform, the behavioral data occurred on platform etc..Wherein,
The default platform is determined when building user sharing database, and certainly after user sharing database is built up, others are flat
Platform need to be added user information it is shared when, other platforms can also be added.It should be noted that each default platform has and is somebody's turn to do
The corresponding label of platform.After user's some default platform registration information wherein, registration information will carry the registration and put down
The corresponding label of platform, can be believed according to user after all storing the user information of each platform into user sharing database
Breath, which distinguishes the user, to be registered in which platform, and the number of users of itself is counted convenient for each platform.
Also, during collecting the user basic information of different default platforms, each default platform is needed to user's base
This information is encrypted.Specifically, the transmission of information is carried out using rivest, shamir, adelman.Rivest, shamir, adelman be by
The encryption method of a pair of corresponding unique keys (public-key cryptography and private cipher key) composition.In ciphering process, asymmetric encryption
The most apparent advantage of algorithm is exactly to use two rather than a key value, and one is used to encryption information, another is used to decrypt
Information, two keys are separated.Wherein, it is public-key cryptography for the key of encryption information, is for solving the key of confidential information
Private cipher key.Public-key cryptography is equivalent to the mailbox of each node transmitting information in block chain, and correspondingly, private cipher key is equivalent to letter
The key of case, the talent for only possessing private cipher key can check mail information in mailbox.With the information of public key encryption
It can be decrypted with corresponding private cipher key, private cipher key only has holder to know, and public-key cryptography can pass through safety
Channel sends or issues in catalogue, and this asymmetry greatly improves the safety of information propagation.
User data is acquired in user sharing database, specifically, can according to need a certain of selection acquisition user
Class data, for example, will just acquire the platform when the ratio of the male user and women user that need to count a certain platform
The log-on data of whole users, the log-on data have included user's gender attribute.Alternatively, there is a certain specific mark when needing to count
When user's accounting of label, then the label data of user is acquired in user sharing database.
Data in user sharing database are timed management by system, regularly update user data, user is default
The new behavioral data that platform occurs, updates in user sharing database.The tag along sort of user is managed, user is managed
Permission, grade etc. data.
Further, the user data acquired in user sharing database is classified according to preset standard.Classification
Standard be it is variable, can be configured according to the requirement of analysis.For example, it is desired to analyze the purchase of shopping website mother and baby's product
Main force user concentrates on the crowd of which age level, then what is acquired in user's sharing data library at this time is shopping website platform
User data, and the preset standard of classification can be set are as follows:
According to user purchase article type be user classify, can be mainly divided into mother and baby's product class user and
Other classes user.
Further, for statistical analysis to above-mentioned sorted data, the statistical analysis includes calculating mother and baby to produce
The quantity of category user and the total number of users amount of acquisition, are calculated the accounting of mother and baby's product class user.
In addition, data can be handled according to the form of table after each accounting of classification data is calculated, it is raw
It is stored in file at intermediate table, the form of table can refer to the format of Excel.
The data conversion for being obtained analysis by graphic generator is at visualized graphs.It is intuitive by the visualized graphs
Represent the data of different types of user.Specifically, by obtaining the data and accounting of different type user, according to default
Graphical format and requirement generate visualized graphs.The visualized graphs can be pie chart, histogram, three-dimensional figure, arborescence etc..
Using user data statistical analysis technique of the invention, by acquiring user data in user sharing database;
Classified according to user data of the preset standard to acquisition;It is for statistical analysis to the data of classification;By the knot of statistical analysis
Fruit generates visualized graphs.It is stored by using the Data duplication that method of the invention solves user in each platform, it can
It avoids establishing huge data system because data acquire, reduces the duplicate workload of user.
In another embodiment, such as lower section is realized when the user data statistical analysis program is executed by the processor
Method:
Collect the data that user logs in each platform and the data in the generation of each platform;
The data of collection are stored in user sharing database.
In the present embodiment, user will in the data of each default platform login and in the data of each platform generation
It is collected and stores in user sharing database.User includes user on each platform in the data that each platform generates
Behavioral data, including buying behavior, trading activity, friend-making behavior etc..According to the behavior that user generates on each platform, also
To be user's setting and the behavior matched behavior label, when so as to subsequent progress data statistics, can according to the label of user into
Row classification etc..
It should be noted that collect user data when, further detect user information whether be abnormal, such as
It says, whether user be put on the blacklist, be complete etc. with the presence or absence of bad credit, user base information.If user believes
There is exception in breath, then the user is included in list to be confirmed, is carrying out secondary verification to data with subsequent.When interval is default
Between, secondary verification is carried out to abnormal user, if abnormal user restores normal, by its information storage to user sharing database
In, if still there is exception, verified to next time.
The present embodiment is same by the way that the user data of each platform and user to be collected into the data that platform generates
In user sharing database, facilitate the statistics of information, information is avoided to repeat to store in each platform.
In addition, the present invention also proposes a kind of computer readable storage medium, stored on the computer readable storage medium
There is user data statistical analysis program, side as described above is realized when the user data statistical analysis program is executed by processor
Method.
Each step of the invention can be realized with general computing device, for example, they can concentrate on it is single
On computing device, such as: personal computer, server computer, handheld device or portable device, laptop device or more
Processor device can also be distributed over a network of multiple computing devices, they can be to be different from sequence herein
Shown or described step is executed, perhaps they are fabricated to each integrated circuit modules or will be more in them
A module or step are fabricated to single integrated circuit module to realize.Therefore, the present invention is not limited to any specific hardware and soft
Part or its combination.
Programmable logic device can be used to realize in method provided by the invention, and it is soft also to may be embodied as computer program
Part or program module (it include routines performing specific tasks or implementing specific abstract data types, programs, objects, component or
Data structure etc.), such as embodiment according to the present invention can be a kind of computer program product, run the computer program
Product executes computer for demonstrated method.The computer program product includes computer readable storage medium, should
It include computer program logic or code section on medium, for realizing the method.The computer readable storage medium can
To be the built-in medium being mounted in a computer or the removable medium (example that can be disassembled from basic computer
Such as: using the storage equipment of hot plug technology).The built-in medium includes but is not limited to rewritable nonvolatile memory,
Such as: RAM, ROM, flash memory and hard disk.The removable medium includes but is not limited to: and optical storage media (such as: CD-
ROM and DVD), magnetic-optical storage medium (such as: MO), magnetic storage medium (such as: tape or mobile hard disk), can with built-in
Rewrite the media (such as: storage card) of nonvolatile memory and the media (such as: ROM box) with built-in ROM.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (9)
1. a kind of user data statistical analysis technique, which is characterized in that described method includes following steps
Step S10 acquires user data in user sharing database;
Step S20 classifies according to user data of the preset standard to acquisition;
Step S30, it is for statistical analysis to the data of classification;
The result of statistical analysis is generated visualized graphs by step S40.
2. user data statistical analysis technique according to claim 1, which is characterized in that the step S30 includes:
Step S31, the data accounting of each type data in the data of statistical classification.
3. user data statistical analysis technique according to claim 2, which is characterized in that also wrapped before the step S40
It includes:
Step S32 generates data form according to the data accounting of each type data of classification data.
4. user data statistical analysis technique according to claim 1, which is characterized in that the method also includes:
Step S50, interval preset time update user sharing database.
5. user data statistical analysis technique according to claim 1, which is characterized in that the method also includes:
Step S101 collects the data that user logs in each platform and the data in the generation of each platform;
The data of collection are stored in user sharing database by step S102.
6. user data statistical analysis technique according to claim 5, which is characterized in that also wrapped after the step S101
It includes and includes:
Whether abnormal step S1011 detects collected user information;
Step S1012, if so, the user is included in user list to be confirmed to carry out secondary verification.
7. user data statistical analysis technique according to claim 1, which is characterized in that the method also includes:
User data in time control user sharing database.
8. a kind of computer equipment, which is characterized in that the computer equipment includes: memory, processor and is stored in described
On memory and the user data statistical analysis program that can run on the processor, the user data statistical analysis program
The step of realizing the method according to claim 1 to 7 when being executed by the processor.
9. a kind of computer readable storage medium, which is characterized in that be stored with number of users on the computer readable storage medium
Program is analyzed according to statistics, is realized when the user data statistical analysis program is executed by processor such as any one of claim 1-7
The step of described method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811200800.2A CN109412889A (en) | 2018-10-16 | 2018-10-16 | User data statistical analysis technique, equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811200800.2A CN109412889A (en) | 2018-10-16 | 2018-10-16 | User data statistical analysis technique, equipment and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109412889A true CN109412889A (en) | 2019-03-01 |
Family
ID=65467198
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811200800.2A Pending CN109412889A (en) | 2018-10-16 | 2018-10-16 | User data statistical analysis technique, equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109412889A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111612548A (en) * | 2020-05-27 | 2020-09-01 | 恩亿科(北京)数据科技有限公司 | Information acquisition method and device, computer equipment and readable storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101901252A (en) * | 2010-06-23 | 2010-12-01 | 中兴通讯股份有限公司 | Method for integrating same user data on multiple websites and integration platform |
CN102999529A (en) * | 2011-09-16 | 2013-03-27 | 腾讯科技(深圳)有限公司 | Information sharing system and method between platforms |
CN105897872A (en) * | 2016-04-04 | 2016-08-24 | 上海大学 | Data sharing system supporting plurality of platforms and operation method thereof |
US20180225317A1 (en) * | 2017-02-07 | 2018-08-09 | Salesforce.Com, Inc. | System and method in a database system for sharing a data item with an entity in another tenant domain |
-
2018
- 2018-10-16 CN CN201811200800.2A patent/CN109412889A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101901252A (en) * | 2010-06-23 | 2010-12-01 | 中兴通讯股份有限公司 | Method for integrating same user data on multiple websites and integration platform |
CN102999529A (en) * | 2011-09-16 | 2013-03-27 | 腾讯科技(深圳)有限公司 | Information sharing system and method between platforms |
CN105897872A (en) * | 2016-04-04 | 2016-08-24 | 上海大学 | Data sharing system supporting plurality of platforms and operation method thereof |
US20180225317A1 (en) * | 2017-02-07 | 2018-08-09 | Salesforce.Com, Inc. | System and method in a database system for sharing a data item with an entity in another tenant domain |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111612548A (en) * | 2020-05-27 | 2020-09-01 | 恩亿科(北京)数据科技有限公司 | Information acquisition method and device, computer equipment and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104657372B (en) | page operation data processing method and device | |
CN108604330A (en) | System and method for the safety of application and risk assessment and test | |
CN110377804A (en) | Method for pushing, device, system and the storage medium of training course data | |
CN103986749A (en) | Resource sharing system and resource sharing method | |
CN108491267A (en) | Method and apparatus for generating information | |
Lu et al. | Show me the money: Dynamic recommendations for revenue maximization | |
CN103324636A (en) | System and method for recommending friend in social network | |
CN109600336A (en) | Store equipment, identifying code application method and device | |
CN103258027A (en) | Context awareness service platform based on intelligent terminal | |
CN109359686A (en) | A kind of user's portrait method and system based on Campus Network Traffic | |
CN109583224A (en) | A kind of privacy of user data processing method, device, equipment and system | |
TW201732655A (en) | Mining method and device for target characteristic data | |
CN104156467B (en) | API recommends method and API recommendation apparatus | |
CN109325357A (en) | Information value calculating method, equipment and readable storage medium storing program for executing based on RSA | |
CN107729924B (en) | Picture review probability interval generation method and picture review determination method | |
CN108268357A (en) | real-time data processing method and device | |
CN109086289A (en) | A kind of media data processing method, client, medium and equipment | |
CN109033190A (en) | A kind of method for pushing of recommendation information, device and equipment | |
Tiwari et al. | Service adaptive broking mechanism using MROSP algorithm | |
CN109412889A (en) | User data statistical analysis technique, equipment and computer readable storage medium | |
CN104166581B (en) | A kind of virtual method towards increment manufacturing equipment | |
CN109033224A (en) | A kind of Risk Text recognition methods and device | |
CN108319595A (en) | A kind of application data analysis method and device | |
Youssef | Online social network internetworking analysis | |
CN109710410A (en) | A kind of internet information resource distribution method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20190719 Address after: Room 202, 2nd floor, F1 Building, Yuanjun Shuyuan International Media Industry Park, No. 8 Gaojing Cultural Park Road, Chaoyang District, Beijing Applicant after: Puhua Yunchuang Technology (Beijing) Co., Ltd. Address before: 100038 No. 141, Gate 1, 3rd Floor, No. 14 Fuxing Road, Haidian District, Beijing Applicant before: Di Hongying |
|
TA01 | Transfer of patent application right | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190301 |
|
RJ01 | Rejection of invention patent application after publication |