CN110990244B - Target equipment identification determining method and device, electronic equipment and readable storage medium - Google Patents

Target equipment identification determining method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN110990244B
CN110990244B CN201911220279.3A CN201911220279A CN110990244B CN 110990244 B CN110990244 B CN 110990244B CN 201911220279 A CN201911220279 A CN 201911220279A CN 110990244 B CN110990244 B CN 110990244B
Authority
CN
China
Prior art keywords
target
address
stable
monitoring log
geographic area
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911220279.3A
Other languages
Chinese (zh)
Other versions
CN110990244A (en
Inventor
周扬
高雅
刘向东
王柏鑫
刘忠禹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Miaozhen Information Technology Co Ltd
Original Assignee
Miaozhen Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Miaozhen Information Technology Co Ltd filed Critical Miaozhen Information Technology Co Ltd
Priority to CN201911220279.3A priority Critical patent/CN110990244B/en
Publication of CN110990244A publication Critical patent/CN110990244A/en
Application granted granted Critical
Publication of CN110990244B publication Critical patent/CN110990244B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Physics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a target device identification determining method and device, electronic equipment and a readable storage medium, and relates to the technical field of computers. Firstly, a stable IP address is screened from the obtained monitoring log according to preset screening conditions. And then screening a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining the coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address. And finally, obtaining the target equipment identification of staff of the target enterprise according to the coverage area of each stable IP address, the target geographical area of the target enterprise and the obtained monitoring log. Therefore, the target equipment identification of the staff of the target enterprise is determined by combining the coverage area of the IP address, the target geographical area where the target enterprise is actually located and the obtained monitoring log.

Description

Target equipment identification determining method and device, electronic equipment and readable storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and apparatus for determining a target device identifier, an electronic device, and a readable storage medium.
Background
When relevant information (e.g., push advertisements) needs to be pushed to employees of the target enterprise, device identification of the employees of the target enterprise needs to be obtained. The device identification of the employee of the target enterprise is currently typically determined by online actions (e.g., browsing the target enterprise's web, browsing advertisements of the target enterprise, etc.).
For example, if a user frequently browses the web and advertisement of the target enterprise, the user is taken as an employee of the target enterprise, and the device identifier of the user is taken as the device identifier of the employee of the target enterprise. However, users who frequently browse the target enterprise's Web and advertisements may not be employees of the target enterprise, but others who are interested in the target enterprise. Therefore, the accuracy of the device identification of the staff of the target enterprise determined in this way is low. If the crowd determined in the mode is used as a marketing crowd, the problems of unsatisfactory marketing effect, budget waste and the like can be caused.
Disclosure of Invention
In view of the above, the present application aims to provide a method, an apparatus, an electronic device and a readable storage medium for determining a target device identifier.
In order to achieve the above object, the technical scheme adopted by the embodiment of the application is as follows:
In a first aspect, an embodiment of the present application provides a method for determining a target device identifier, where the method includes:
screening stable IP addresses from the obtained monitoring logs according to preset screening conditions, wherein each monitoring log comprises an IP address and a device identifier;
screening a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining a coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address, wherein each first target monitoring log comprises the corresponding stable IP address;
and obtaining the target equipment identification of staff of the target enterprise according to the coverage area of each stable IP address, the target geographical area of the target enterprise and the obtained monitoring log.
In a second aspect, an embodiment of the present application provides a target device identifier determining apparatus, where the apparatus includes:
the first determining module is used for screening stable IP addresses from the obtained monitoring logs according to preset screening conditions, wherein each monitoring log comprises an IP address and a device identifier;
the second determining module is used for screening out a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining a coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address, wherein each first target monitoring log comprises a corresponding stable IP address;
And the third determining module is used for obtaining the target equipment identification of the staff of the target enterprise according to the coverage area of each stable IP address, the target geographical area of the target enterprise and the obtained monitoring log.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor and a memory, where the memory stores machine executable instructions executable by the processor, the processor being capable of executing the machine executable instructions to implement the target device identification determination method according to any one of the foregoing embodiments.
In a fourth aspect, an embodiment of the present application provides a readable storage medium having stored thereon a computer program which, when executed by a processor, implements a target device identification determination method as in any of the preceding embodiments.
The target equipment identification determining method, the target equipment identification determining device, the electronic equipment and the readable storage medium provided by the embodiment of the application firstly screen the stable IP address from the obtained monitoring log according to the preset screening condition. Each monitoring log comprises an IP address and a device identifier. And then screening a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining the coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address. Each first target monitoring log comprises a corresponding stable IP address. And finally, obtaining the target equipment identification of staff of the target enterprise according to the coverage area of each stable IP address, the target geographical area of the target enterprise and the obtained monitoring log. Therefore, the target equipment identification of staff of the target enterprise is determined by combining the coverage area of the IP address, the target geographical area where the target enterprise is actually located and the obtained monitoring log, so that the accuracy of the obtained target equipment identification is improved.
In order to make the above objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a block schematic diagram of an electronic device according to an embodiment of the present application;
fig. 2 is a flowchart of a method for determining a target device identifier according to an embodiment of the present application;
FIG. 3 is a flow chart of the sub-steps included in step S110 of FIG. 2;
FIG. 4 is a flow chart of the sub-steps included in step S120 of FIG. 2;
FIG. 5 is a flow chart of a sub-step included in step S130 of FIG. 2;
FIG. 6 is a flow chart of another sub-step included in step S130 of FIG. 2;
fig. 7 is a schematic block diagram of a target device identifier determining apparatus according to an embodiment of the present application.
Icon: 100-an electronic device; 110-memory; a 120-processor; 130-a communication unit; 200-target device identification determining means; 210-a first determination module; 220-a second determination module; 230-a third determination module.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the application, as presented in the figures, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by a person skilled in the art without making any inventive effort, are intended to be within the scope of the present application.
It is noted that relational terms such as "first" and "second", and the like, are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Referring to fig. 1, fig. 1 is a block diagram of an electronic device 100 according to an embodiment of the application. The electronic device 100 may be, but is not limited to, a personal computer, a server, or the like. The electronic device 100 includes a memory 110, a processor 120, and a communication unit 130. The memory 110, the processor 120, and the communication unit 130 are electrically connected directly or indirectly to each other to realize data transmission or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines.
Wherein the memory 110 is used for storing programs or data. The Memory 110 may be, but is not limited to, random access Memory (Random Access Memory, RAM), read Only Memory (ROM), programmable Read Only Memory (Programmable Read-Only Memory, PROM), erasable Read Only Memory (Erasable Programmable Read-Only Memory, EPROM), electrically erasable Read Only Memory (Electric Erasable Programmable Read-Only Memory, EEPROM), etc.
The processor 120 is used to read/write data or programs stored in the memory 110 and perform corresponding functions. For example, the memory 110 stores therein the target device identification determining means 200, and the target device identification determining means 200 includes at least one software function module which may be stored in the memory 110 in the form of software or firmware (firmware). The processor 120 executes various functional applications and data processing by running software programs and modules stored in the memory 110, such as the target device identification determining apparatus 200 in the embodiment of the present application, that is, implements the target device identification determining method in the embodiment of the present application.
The communication unit 130 is configured to establish a communication connection between the electronic device 100 and other communication terminals through a network, and is configured to transmit and receive data through the network.
It should be understood that the structure shown in fig. 1 is merely a schematic diagram of the structure of the electronic device 100, and that the electronic device 100 may further include more or fewer components than those shown in fig. 1, or have a different configuration than that shown in fig. 1. The components shown in fig. 1 may be implemented in hardware, software, or a combination thereof.
Referring to fig. 2, fig. 2 is a flowchart of a method for determining a target device identifier according to an embodiment of the present application. The method is applied to the electronic device 100. The specific flow of the target device identification determination method is explained in detail below.
Step S110, stable IP addresses are screened out from the obtained monitoring logs according to preset screening conditions. Each monitoring log comprises an IP address and a device identifier.
Step S120, a first target monitoring log corresponding to each stable IP address is screened from the obtained monitoring logs, and the coverage area of each stable IP address is determined according to the position information in the first target monitoring log corresponding to each stable IP address. Each first target monitoring log comprises a corresponding stable IP address.
Step S130, obtaining the target equipment identification of staff of the target enterprise according to the coverage area of each stable IP address, the target geographical area of the target enterprise and the obtained monitoring log.
In this embodiment, the electronic device 100 may store a monitoring log for a preset period of time (for example, the last month). Each monitoring log may include a device identification, IP address, etc. The device identifier may be, but is not limited to, a MAC (Media Access Control ) address of the device, an android ID or OAID (Open Anonymous Device Identifier, anonymous device identifier), or the like, which may uniquely identify the device. If one monitoring log includes the equipment identifier a and the IP address 1, it may be determined that the equipment corresponding to the equipment identifier a uses the IP address 1 to surf the internet.
The monitoring log may be a log generated from the user's internet surfing behavior. For example, after a user browses an advertisement by using a mobile terminal a that uses a certain IP address to surf the internet, a monitoring log about the advertisement is generated, where the monitoring log includes the device identifier of the mobile terminal a, the IP address used to surf the internet, and the like.
When the target equipment identification of staff of the target enterprise needs to be determined, stable IP addresses are screened out of the obtained monitoring logs according to preset screening conditions, and then all first target monitoring logs corresponding to each stable IP address are obtained from the obtained monitoring logs. The first target monitoring log corresponding to each stable IP address comprises the stable IP address. For example, each of the first target monitoring logs corresponding to the IP address 1 as the stable IP address includes the IP address 1. Further, the monitoring log may further include location information. And then, aiming at each stable IP address, obtaining the coverage area of the stable IP address according to the position information in each first target monitoring log corresponding to the stable IP address. And finally, combining the coverage area of each stable IP address, the target geographical area of the target enterprise and the obtained monitoring log to obtain the target equipment identification of the staff of the target enterprise.
The location information of the target enterprise can be obtained in advance according to the network public information of the target enterprise, and then the target geographic area where the target enterprise is located can be obtained according to the information of the target enterprise. The target geographic area comprises a plurality of positions corresponding to longitude and latitude information.
The monitoring log may include LBS (Location Based Services, based on location service) information, where LBS information includes longitude and latitude information (i.e., location information) of a terminal corresponding to the monitoring log when a behavior corresponding to the monitoring log is generated. The location-based service is a value-added service for obtaining location information of a mobile terminal user through a radio communication network or an external positioning mode of a telecom mobile operator and providing corresponding service for the user under the support of a GIS (Geographic Information System, GIS platform) platform.
And then combining the coverage area of the IP address, the target geographical area where the target enterprise is actually located and the obtained monitoring log to obtain the target equipment identification of staff of the target enterprise. Compared with the mode of determining the target equipment identification of the staff of the target enterprise only according to the online behavior, the method and the device have the advantages that the network information is combined with the actual geographic area of the target enterprise, and therefore accuracy of the obtained target equipment identification is improved.
Wherein, the preset screening condition may be set according to a definition of a stable IP address determined based on actual conditions. For example, it is determined that the IP address used in some usage scenarios is a stable IP address, if the correspondence between the IP address and the usage scenario is stored in the electronic device 100, the preset screening condition may include a preset usage scenario, and then the IP address corresponding to the preset usage scenario is screened out according to the obtained correspondence between the IP address, the IP address and the usage scenario in the monitoring log, and the IP address is used as the stable IP address. Wherein, the use scenario includes: school institutions, enterprise users, mobile networks, etc., where the IP addresses used by the school institutions and enterprise users are typically stable IP addresses, and the mobile networks typically use mobile IP addresses that are variable and unstable.
Optionally, the monitoring log further includes a generation time, and the generation time may be used to represent the time of generating the monitoring log. In this embodiment, the stable IP address may be screened out as follows. Referring to fig. 3, fig. 3 is a flow chart illustrating the sub-steps included in step S110 in fig. 2. Step S110 may include sub-steps S111 to S114.
And a substep S111, for each IP address, obtaining a fifth target monitoring log corresponding to the IP address according to the obtained monitoring log.
And step S112, according to the fifth target monitoring logs, obtaining the first number of the devices surfing the Internet through the IP address, the second number of the fifth target monitoring logs with the generation time within a preset time period, and determining the third number of the fifth target monitoring logs corresponding to each device.
And step S113, taking the third number of devices larger than the third preset number as devices to be counted, and obtaining a fourth number of the devices to be counted.
Sub-step S114, when at least one of the first number being greater than the first preset number, the second number being greater than the second preset number, and the fourth number being greater than the fourth preset number is satisfied, determines that the IP address is a stable IP address.
In this embodiment, the obtained monitoring logs may be classified according to the IP address included in each monitoring log, where each type of monitoring log corresponds to the same IP address. Thus, a fifth target monitoring log corresponding to each IP address can be obtained.
The number of unique device identifications corresponding to each IP address may then be derived based on the fifth target monitoring log corresponding to each IP address, i.e., the first number of devices that are surfing the internet using that IP address. For example, the total of the fifth target monitoring logs corresponding to the IP address 1 is 100, and the total of 100 device identifiers are included in the 100 fifth target monitoring logs. Of these 100 device ids, if there are 50 non-duplicate device ids, this means that 50 devices are surfing the internet using the IP address 1.
And after determining the fifth target monitoring log corresponding to each IP address, obtaining, for each IP address, a second number of the fifth target monitoring logs with the generation time within the preset time period according to the preset time period and the generation time in the fifth target monitoring log corresponding to the IP address. The preset time period can be set according to actual requirements. For example, when determining the target device identifier of the employee of the target enterprise, the preset time period may be determined according to the time of the employee of the target enterprise going to work, for example, set to a working day, or set to 9 of the working day: 00-18:00, etc.
For example, the preset time period is a working day, and the total of the fifth target monitoring logs corresponding to the IP address 1 is 100. If the total of 40 fifth target monitoring logs in the 100 fifth target monitoring logs are within the working day, the second number of the fifth target monitoring logs with the corresponding generation time of the IP address within the preset time period is 40.
After determining the fifth target monitoring log corresponding to each IP address, the fifth target monitoring log corresponding to each IP address may be further classified according to the device identifier, so as to obtain a third number of fifth target monitoring logs corresponding to each device, that is, obtain the number of surfing the internet with each IP address by each device. And then, taking the third number of devices larger than the third preset number as devices to be counted, thereby obtaining a fourth number of the devices to be counted.
For example, the total of 100 fifth target monitoring logs corresponding to the IP address 1 are classified according to the device identifiers, so as to obtain a fifth target monitoring log corresponding to each device identifier. If there are multiple fifth target monitoring logs corresponding to one device identifier, the multiple fifth target monitoring logs include the same IP address and device identifiers, and the number of the fifth target monitoring logs corresponding to the device identifier indicates the number of times that the device corresponding to the device identifier uses the IP address to surf the internet.
Assuming that based on the fifth target monitoring log corresponding to the IP address 1, it is determined that the third number of the fifth target monitoring logs corresponding to the device A1 is 10, the third number of the fifth target monitoring logs corresponding to the device A2 is 15, the third number of the fifth target monitoring logs corresponding to the device A3 is 1, and the third preset number is 2, both the device A1 and the device A2 are used as devices to be counted, and the fourth number of the devices to be counted is determined to be 2.
When judging whether one IP address is a stable IP address, the judgment can be performed according to the first number, the second number and the fourth number corresponding to each IP address.
In one implementation of this embodiment, the first number corresponding to the IP address may be compared with a first preset number. If the first number is greater than the first preset number, the IP address may be used as a stable IP address. And if the first number is not greater than the first preset number, the IP address is not used as a stable IP address. Thus, an IP address that is frequently used can be taken as the stable IP address.
In another implementation of this embodiment, the second number corresponding to the IP address may be compared with a second preset number. If the second number is greater than the second preset number, the IP address may be used as a stable IP address. And if the second number is not greater than the second preset number, the IP address is not used as the stable IP address. Thereby, the IP address that is frequently used in the preset period of time can be taken as the stable IP address. When the preset time period is a working day, the IP address with the internet surfing characteristic of more monitoring log data quantity generated on the working day can be obtained through the method.
In another implementation of this embodiment, the fourth number corresponding to the IP address may be compared with a fourth preset number. If the fourth number is greater than the fourth preset number, the IP address may be used as a stable IP address. And if the fourth number is not greater than the fourth preset number, the IP address is not used as the stable IP address. Thus, an IP address frequently used by a device can be used as the stable IP address, and the internet surfing of such an IP address is characterized by maintaining a stable relationship with a plurality of devices for a long period of time.
For example, if it is determined from the obtained monitoring log that: and (3) respectively surfing the internet for more than 3 times through the IP address 1 in one month by 51 devices, wherein the third preset number is 2 and the fourth number is 50 in the preset screening conditions, so that the IP address 1 can be determined to be a stable IP address.
In another implementation manner of this embodiment, the IP address may be further used as the stable IP address when at least two of the first number is greater than a first preset number, the second number is greater than a second preset number, and the fourth number is greater than a fourth preset number are satisfied.
The first preset number, the second preset number, the third preset number and the fourth preset number can be set according to actual conditions. It will be understood, of course, that the above manner of screening out stable IP addresses is merely illustrative, and that stable IP addresses may be determined in other manners.
After the stable IP addresses are determined, the coverage area of each stable IP address can be obtained according to the position information in the first target monitoring log corresponding to each stable IP address. Referring to fig. 4, fig. 4 is a flowchart illustrating the sub-steps included in step S120 in fig. 2. Step S120 may include sub-step S121 and sub-step S122.
In the substep S121, for each stable IP address, a polygon area corresponding to the stable IP address is determined according to the location information in the first target monitoring log corresponding to the stable IP address.
And step S122, taking the center of gravity of the polygonal area as a circle center, taking the maximum distance value of the distance between the circle center and the position corresponding to the position information in the first target monitoring log corresponding to the stable IP address as a radius, obtaining a circular area, and taking the circular area as the coverage area of the stable IP address.
In this embodiment, a description will be given of a manner of determining a coverage area of one stable IP address, taking the stable IP address as an example.
Firstly, determining a polygonal area according to the position information in each first target monitoring log corresponding to the stable IP address. The variable region includes positions corresponding to position information in each first target monitoring log corresponding to the stable IP address. Optionally, the variable deformation region may be a minimum multiple deformation region determined according to a position corresponding to the position information in each corresponding first target monitoring log. The variable region may also be a region larger than the minimum variable region, as determined by the actual requirements.
Then, the distance between the center of gravity of the polygonal area and the position corresponding to the position information in each first target monitoring log corresponding to the stable IP address is determined, and the distance maximum value in the partial distance is obtained. Then, a circular area is obtained by taking the center of gravity of the polygonal area as the center of a circle and the maximum distance value as the radius, and the circular area can be used as the coverage area of the stable IP address.
In one implementation of this embodiment, the target device identifier of the employee of the target enterprise may be determined according to the coverage area of each stable IP address, the target geographic area in which the target enterprise is located, and the obtained monitoring log in the following manner. Referring to fig. 5, fig. 5 is a flowchart illustrating a sub-step included in step S130 in fig. 2. Step S130 may include sub-steps S131 to S132.
And a substep S131, determining whether the coverage area of each stable IP address intersects with the target geographic area, and when intersecting, using the stable IP address of the coverage area intersected with the target geographic area as the target IP address of the target enterprise.
Sub-step S132, obtaining a second target monitoring log including the target IP address from the obtained monitoring log, and using the device identifier in the second target monitoring log as a target device identifier of an employee of the target enterprise.
When the target enterprise has only one target geographic area, whether the coverage area with the stable IP address is intersected with the target geographic area of the target enterprise can be judged through area comparison. If so, the stable IP address with the coverage area intersected with the target geographic area of the target enterprise is taken as the target IP address (namely the export IP address) of the target enterprise. Therefore, the monitoring log is combined with the actual position of the target enterprise to obtain the target IP address of the target enterprise.
And then, according to the obtained monitoring log, obtaining a second target monitoring log comprising the target IP address in the monitoring log, wherein the equipment identifier comprising the second target monitoring log can be used as the target equipment identifier of the staff of the target enterprise. Therefore, the device identification of the device which uses the target IP address to access the internet can be obtained, and the obtained device identification is the device identification of the staff of the target enterprise.
Optionally, after obtaining the second target monitoring log corresponding to each target IP address, for each target IP address, the number of times that each device uses the target IP address to surf the internet may be obtained, and then, the device with the number of times greater than the preset number of times (for example, 2 times) may be used as the device of the target enterprise employee. Therefore, the accuracy of the obtained target equipment identification can be further improved.
In another implementation manner of this embodiment, if there are multiple target geographic areas in which the target enterprise is located, and there are no staff members in the multiple target geographic areas, the stable IP address where the coverage area intersects any one of the target geographic areas may be used as the target IP address of the target enterprise in any one of the target geographic areas. For example, the target geographic areas where the target enterprises are located include B1, B2, and B3, and if the coverage area of the stable IP address 1 intersects with the target geographic area B2, the stable IP address 1 may be used as the target IP address of the target enterprise in the target geographic area B2. And then taking the device identification of the device which uses the target IP address to access the internet as the target device identification of the staff of the target enterprise.
In another implementation manner of this embodiment, if there are multiple target geographic areas in which the target enterprise is located, and there are staff members in the multiple target geographic areas, the target device identification of the staff members of the target enterprise may be determined in the following manner. Referring to fig. 6, fig. 6 is a flowchart illustrating another seed step included in step S130 in fig. 2. Step S130 may include sub-steps S134-S137.
In the substep S134, for each target geographic area, it is determined whether the coverage area of each stable IP address intersects with the target geographic area, and when intersecting, the stable IP address of the coverage area intersected with the target geographic area is used as the candidate IP address of the target enterprise in the target geographic area.
In the substep S135, for each target geographic area, a third target monitoring log including an alternative IP address of the target geographic area is obtained from the obtained monitoring logs, and the device identifier in the third target monitoring log is used as an alternative device identifier of the employee of the target enterprise in the target geographic area.
And step S136, judging whether at least one alternative equipment identifier corresponds to a plurality of alternative IP addresses of the target geographic areas according to the obtained monitoring log, and if so, taking the plurality of alternative IP addresses corresponding to the at least one alternative equipment as the target IP addresses of the corresponding target geographic areas.
Sub-step S137, obtaining a fourth target monitoring log including the target IP address from the obtained monitoring log, and using the device identifier in the fourth target monitoring log as the target device identifier of the employee of the target enterprise.
In this embodiment, if a stable IP address intersects a coverage area with a target geographic area, the stable IP address may be used as an alternative IP address for the target enterprise in the target geographic area. Next, for each target geographic area, a device identification of a device that is surfing the internet using an alternative IP address of the target geographic area may be obtained, and the obtained device identification may be used as an alternative device identification for staff of the target enterprise in the target geographic area. The device that is on the internet through the alternative IP address can be obtained from the monitoring log that includes the alternative IP address.
And according to the corresponding relation among the target geographic area, the alternative IP addresses and the alternative equipment identifiers, obtaining the alternative IP address and the target geographic area corresponding to each alternative equipment identifier. Based on this, it may be determined whether there is an alternative IP address for which one alternative device identification corresponds to multiple target geographical areas, i.e., whether one device has used alternative IP addresses for at least two target geographical areas to surf the internet. If so, the alternative IP addresses of the at least two target geographic areas can be used as target IP addresses of the corresponding target geographic areas. And then, according to the obtained monitoring log, obtaining the equipment identifiers of all the equipment which uses the target IP address to access the internet, wherein the equipment identifiers are the target equipment identifiers of the staff of the target enterprise.
Alternatively, the superposition calculation may be performed according to the candidate device identifiers of each target geographic area, so as to obtain candidate device identifiers corresponding to multiple target geographic areas, further, the candidate device identifiers are used as target device identifiers, and the candidate IP address corresponding to the target device identifiers (i.e., the candidate IP address used by the device to which the target device identifier belongs) is used as the target IP address of the corresponding target geographic area, and then all the target device identifiers are based on the target IP address.
It may also be determined whether there are multiple alternative device identifiers corresponding to the alternative IP addresses of multiple target geographic areas, i.e., whether there are multiple devices that use the same alternative IP address in the same multiple target geographic areas to log on, e.g., whether the devices A1, A2 use both the alternative IP address 1 of the target geographic area B1 and the alternative IP address 2 of the target geographic area B2 to log on. The target device identity is then determined in the same way. Therefore, the accuracy of the obtained target equipment identification can be further improved.
When the device to which the alternative device identifier belongs uses the alternative IP address to surf the internet, the alternative device identifier may be considered to have a corresponding relationship with the alternative IP address. The above judgment conditions can be set according to actual requirements. For example, when at least two alternative device identifications correspond to the same alternative IP addresses of the same at least two target geographic areas, the same alternative IP addresses of the at least two target geographic areas are set as target IP addresses of the corresponding target geographic areas.
For example, the candidate device identification corresponding to the candidate IP address 1 of the target geographic area B1 has a1, a2, a3, and the candidate device identification corresponding to the candidate IP address 2 of the target geographic area B2 has a2, a3, a4. The alternative device identifiers A2 and A3 simultaneously correspond to the target geographic areas B1 and B2, which means that the devices A2 and A3 corresponding to the alternative device identifiers A2 and A3 respectively use the alternative IP address 1 of the target geographic area B1 and the alternative IP address 2 of the target geographic area B2 to surf the internet. If the judging conditions are as follows: when at least two alternative equipment identifiers correspond to equipment, not only one alternative IP address of one target geographic area is used for surfing the Internet, but also one alternative IP address of the other target geographic area is used for surfing the Internet, and the two alternative IP addresses are respectively determined to be the target IP addresses of the corresponding target geographic areas, the personnel using the equipment A2 and the equipment A3 can be determined to be staff of the target enterprise, the alternative IP address 1 is the target IP address of the target geographic area B1, and the alternative IP address 2 is the target IP address of the target geographic area 2.
The above-described target device identification determination method is exemplified below.
Suppose a customer wants to promote his new product concept to employees of a given enterprise. The designated enterprise is the target enterprise. The target enterprise has two office points: m1 and M2. Acquiring longitude and latitude information of two office points through online public information, wherein M1:121.417085,31.219017, M1:116.480639,39.996356. Based on this, two target geographic areas may be determined.
And screening out stable IP addresses from the monitoring log of one month. And obtaining the coverage area of each stable IP address according to the LBS information in the monitoring log corresponding to each stable IP address. And (3) performing intersection calculation on each target geographic area and the coverage area of each IP address to obtain two groups of alternative IP addresses, wherein one group is the alternative IP address with the coverage area intersecting with the target geographic area of 'M1', and the other group is the alternative IP address with the coverage area intersecting with the target geographic area of 'M2'. These alternative IP addresses may be the internet IP addresses of the target enterprise. Next, for each alternative IP address, a device identification using the alternative IP address is obtained from the one month monitoring log. Thus, alternative device identifications for each target geographic region may be obtained.
And simulating the business trip communication behavior of the staff at two places, wherein the business trip behavior is that the staff C works at M1, and the staff C goes to M2 for work reasons. When M1 or M2 works, the monitoring log records the surfing behavior of the employee C, and then the employee C effectively connects M1 and M2 in series, because he uses the IP address of M1 to surf the Internet and uses the IP address of M2 to surf the Internet.
By performing coincidence calculation on the candidate device identifiers of the two target geographic areas, the device identifier of the staff who is likely to be the business trip can be found, namely the device identifier of the staff A is found. After the equipment identifier of the staff a is found, an alternative IP address used by the equipment of the staff a can be obtained, and the alternative IP address corresponds to the target IP address of the target geographic area. The method finds the following IP addresses altogether: 111.200.229.2/180.168.94.250/61.149.7.195/101.231.203.90/106.38.108.234
And finally, finding out the equipment identifiers of all the equipment connected with the target IP address through the target IP address, wherein the equipment identifiers are target equipment identifiers of staff of a target enterprise.
In order to perform the corresponding steps in the above embodiments and the various possible ways, an implementation manner of the target device identification determining apparatus 200 is given below, and alternatively, the target device identification determining apparatus 200 may employ the device structure of the electronic device 100 shown in fig. 1 and described above. Further, referring to fig. 7, fig. 7 is a block diagram of a target device identifier determining apparatus 200 according to an embodiment of the present application. It should be noted that, the basic principle and the technical effects of the target device identifier determining apparatus 200 provided in this embodiment are the same as those of the foregoing embodiments, and for brevity, reference may be made to the corresponding contents of the foregoing embodiments. The target device identification determining apparatus 200 may include: the first determination module 210, the second determination module 220, and the third determination module 230.
The first determining module 210 is configured to screen the stable IP address from the obtained monitoring log according to a preset screening condition. Each monitoring log comprises an IP address and a device identifier.
The second determining module 220 is configured to screen a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determine a coverage area of each stable IP address according to position information in the first target monitoring log corresponding to each stable IP address. Each first target monitoring log comprises a corresponding stable IP address.
The third determining module 230 is configured to obtain a target device identifier of an employee of the target enterprise according to the coverage area of each stable IP address, the target geographical area where the target enterprise is located, and the obtained monitoring log.
Optionally, in this embodiment, the third determining module 230 is specifically configured to:
judging whether the coverage area of each stable IP address is intersected with the target geographic area, and taking the stable IP address of the coverage area intersected with the target geographic area as the target IP address of the target enterprise when the coverage area of each stable IP address is intersected with the target geographic area;
and obtaining a second target monitoring log comprising the target IP address from the obtained monitoring log, and taking the equipment identifier in the second target monitoring log as the target equipment identifier of the staff of the target enterprise.
Optionally, in this embodiment, if there are a plurality of target geographic areas in which the target enterprises are located, the third determining module 230 is specifically configured to:
judging whether the coverage area of each stable IP address is intersected with the target geographic area or not according to each target geographic area, and when the coverage area of each stable IP address is intersected with the target geographic area, taking the stable IP address of the coverage area intersected with the target geographic area as an alternative IP address of the target enterprise in the target geographic area;
for each target geographic area, obtaining a third target monitoring log comprising an alternative IP address of the target geographic area from the obtained monitoring logs, and taking the equipment identifier in the third target monitoring log as an alternative equipment identifier of staff of the target enterprise in the target geographic area;
judging whether at least one alternative equipment identifier corresponds to a plurality of alternative IP addresses of a target geographic area according to the obtained monitoring log, and if so, taking the plurality of alternative IP addresses corresponding to the at least one alternative equipment as the target IP addresses of the corresponding target geographic area;
and obtaining a fourth target monitoring log comprising the target IP address from the obtained monitoring log, and taking the equipment identifier in the fourth target monitoring log as the target equipment identifier of the staff of the target enterprise.
Alternatively, the above modules may be stored in the memory 110 shown in fig. 1 or solidified in an Operating System (OS) of the electronic device 100 in the form of software or Firmware (Firmware), and may be executed by the processor 120 in fig. 1. Meanwhile, data, codes of programs, and the like, which are required to execute the above-described modules, may be stored in the memory 110.
The embodiment of the application also provides a readable storage medium, on which a computer program is stored, which when being executed by a processor implements the target device identification determination method.
In summary, the embodiments of the present application provide a method, an apparatus, an electronic device, and a readable storage medium for determining a target device identifier. Firstly, a stable IP address is screened from the obtained monitoring log according to preset screening conditions. Each monitoring log comprises an IP address and a device identifier. And then screening a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining the coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address. Each first target monitoring log comprises a corresponding stable IP address. And finally, obtaining the target equipment identification of staff of the target enterprise according to the coverage area of each stable IP address, the target geographical area of the target enterprise and the obtained monitoring log. Therefore, the target equipment identification of staff of the target enterprise is determined by combining the coverage area of the IP address, the target geographical area where the target enterprise is actually located and the obtained monitoring log, so that the accuracy of the obtained target equipment identification is improved.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. The apparatus embodiments described above are merely illustrative, for example, of the flowcharts and block diagrams in the figures that illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form a single part, or each module may exist alone, or two or more modules may be integrated to form a single part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The above description is only of the preferred embodiments of the present application and is not intended to limit the present application, but various modifications and variations can be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (9)

1. A method for determining a target device identifier, the method comprising:
screening stable IP addresses from the obtained monitoring logs according to preset screening conditions, wherein each monitoring log comprises an IP address and a device identifier;
screening a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining a coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address, wherein each first target monitoring log comprises the corresponding stable IP address;
obtaining target equipment identifiers of staff of a target enterprise according to the coverage area of each stable IP address, the target geographic area of the target enterprise and the obtained monitoring logs;
the monitoring log further includes a generation time, and the screening of the stable IP address from the obtained monitoring log according to a preset screening condition includes:
for each IP address, obtaining a fifth target monitoring log corresponding to the IP address according to the obtained monitoring log;
according to the fifth target monitoring logs, obtaining a first number of devices surfing the Internet through the IP address, a second number of the fifth target monitoring logs with the generation time within a preset time period, and determining a third number of the fifth target monitoring logs corresponding to each device;
Taking the third number of devices larger than a third preset number as devices to be counted, and obtaining a fourth number of the devices to be counted;
and when at least one of the first number being larger than the first preset number, the second number being larger than the second preset number and the fourth number being larger than the fourth preset number is met, determining that the IP address is a stable IP address.
2. The method according to claim 1, wherein the obtaining the target device identifier of the employee of the target enterprise according to the coverage area of each stable IP address, the target geographical area in which the target enterprise is located, and the obtained monitoring log includes:
judging whether the coverage area of each stable IP address is intersected with the target geographic area, and taking the stable IP address of the coverage area intersected with the target geographic area as the target IP address of the target enterprise when the coverage area of each stable IP address is intersected with the target geographic area;
and obtaining a second target monitoring log comprising the target IP address from the obtained monitoring log, and taking the equipment identifier in the second target monitoring log as the target equipment identifier of the staff of the target enterprise.
3. The method according to claim 1, wherein if there are a plurality of target geographical areas in which the target enterprise is located, the obtaining the target device identifier of the employee of the target enterprise according to the coverage area of each stable IP address, the target geographical area in which the target enterprise is located, and the obtained monitoring log includes:
Judging whether the coverage area of each stable IP address is intersected with the target geographic area or not according to each target geographic area, and when the coverage area of each stable IP address is intersected with the target geographic area, taking the stable IP address of the coverage area intersected with the target geographic area as an alternative IP address of the target enterprise in the target geographic area;
for each target geographic area, obtaining a third target monitoring log comprising an alternative IP address of the target geographic area from the obtained monitoring logs, and taking the equipment identifier in the third target monitoring log as an alternative equipment identifier of staff of the target enterprise in the target geographic area;
judging whether at least one alternative equipment identifier corresponds to a plurality of alternative IP addresses of a target geographic area according to the obtained monitoring log, and if so, taking the plurality of alternative IP addresses corresponding to the at least one alternative equipment as the target IP addresses of the corresponding target geographic area;
and obtaining a fourth target monitoring log comprising the target IP address from the obtained monitoring log, and taking the equipment identifier in the fourth target monitoring log as the target equipment identifier of the staff of the target enterprise.
4. The method of claim 1, wherein the determining the coverage area of each stable IP address according to the location information in the first target monitoring log corresponding to each stable IP address comprises:
determining a polygon area corresponding to each stable IP address according to the position information in the first target monitoring log corresponding to the stable IP address, wherein the polygon area comprises the position corresponding to the position information in the first target monitoring log corresponding to the stable IP address;
and taking the center of gravity of the polygonal area as a circle center, taking the maximum distance value of the distance between the circle center and the position corresponding to the position information in the first target monitoring log corresponding to the stable IP address as a radius, obtaining a circular area, and taking the circular area as the coverage area of the stable IP address.
5. A target device identification determining apparatus, the apparatus comprising:
the first determining module is used for screening stable IP addresses from the obtained monitoring logs according to preset screening conditions, wherein each monitoring log comprises an IP address and a device identifier;
the second determining module is used for screening out a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining a coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address, wherein each first target monitoring log comprises a corresponding stable IP address;
The third determining module is used for obtaining target equipment identifiers of staff of the target enterprises according to the coverage area of each stable IP address, the target geographical area of the target enterprises and the obtained monitoring logs;
the monitoring log further includes a generation time, and the first determining module is specifically configured to:
for each IP address, obtaining a fifth target monitoring log corresponding to the IP address according to the obtained monitoring log;
according to the fifth target monitoring logs, obtaining a first number of devices surfing the Internet through the IP address, a second number of the fifth target monitoring logs with the generation time within a preset time period, and determining a third number of the fifth target monitoring logs corresponding to each device;
taking the third number of devices larger than a third preset number as devices to be counted, and obtaining a fourth number of the devices to be counted;
and when at least one of the first number being larger than the first preset number, the second number being larger than the second preset number and the fourth number being larger than the fourth preset number is met, determining that the IP address is a stable IP address.
6. The apparatus of claim 5, wherein the third determining module is specifically configured to:
Judging whether the coverage area of each stable IP address is intersected with the target geographic area, and taking the stable IP address of the coverage area intersected with the target geographic area as the target IP address of the target enterprise when the coverage area of each stable IP address is intersected with the target geographic area;
and obtaining a second target monitoring log comprising the target IP address from the obtained monitoring log, and taking the equipment identifier in the second target monitoring log as the target equipment identifier of the staff of the target enterprise.
7. The apparatus of claim 5, wherein if there are a plurality of target geographical areas in which the target enterprises are located, the third determining module is specifically configured to:
judging whether the coverage area of each stable IP address is intersected with the target geographic area or not according to each target geographic area, and when the coverage area of each stable IP address is intersected with the target geographic area, taking the stable IP address of the coverage area intersected with the target geographic area as an alternative IP address of the target enterprise in the target geographic area;
for each target geographic area, obtaining a third target monitoring log comprising an alternative IP address of the target geographic area from the obtained monitoring logs, and taking the equipment identifier in the third target monitoring log as an alternative equipment identifier of staff of the target enterprise in the target geographic area;
Judging whether at least one alternative equipment identifier corresponds to a plurality of alternative IP addresses of a target geographic area according to the obtained monitoring log, and if so, taking the plurality of alternative IP addresses corresponding to the at least one alternative equipment as the target IP addresses of the corresponding target geographic area;
and obtaining a fourth target monitoring log comprising the target IP address from the obtained monitoring log, and taking the equipment identifier in the fourth target monitoring log as the target equipment identifier of the staff of the target enterprise.
8. An electronic device comprising a processor and a memory, the memory storing machine executable instructions executable by the processor to implement the target device identification determination method of any one of claims 1-4.
9. A readable storage medium having stored thereon a computer program, which when executed by a processor implements the target device identification determination method according to any of claims 1-4.
CN201911220279.3A 2019-12-03 2019-12-03 Target equipment identification determining method and device, electronic equipment and readable storage medium Active CN110990244B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911220279.3A CN110990244B (en) 2019-12-03 2019-12-03 Target equipment identification determining method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911220279.3A CN110990244B (en) 2019-12-03 2019-12-03 Target equipment identification determining method and device, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN110990244A CN110990244A (en) 2020-04-10
CN110990244B true CN110990244B (en) 2023-09-01

Family

ID=70089549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911220279.3A Active CN110990244B (en) 2019-12-03 2019-12-03 Target equipment identification determining method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN110990244B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111752217B (en) * 2020-06-19 2021-09-03 上海控软网络科技有限公司 Method and device for determining machine tool identification code, electronic equipment and storage medium
CN111752796B (en) * 2020-06-22 2024-01-26 北京明略昭辉科技有限公司 Method and device for determining model corresponding to log information
CN115378827A (en) * 2022-08-04 2022-11-22 银联智惠信息服务(上海)有限公司 Internet protocol address analysis method and device, server and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103995907A (en) * 2014-06-13 2014-08-20 北京奇艺世纪科技有限公司 Determining method of access users
CN104965876A (en) * 2015-06-12 2015-10-07 微梦创科网络科技(中国)有限公司 Method and apparatus for carrying out mining on work units of users on basis of position information
CN108390788A (en) * 2018-03-05 2018-08-10 北京奇艺世纪科技有限公司 User identification method, device and electronic equipment
CN110324845A (en) * 2019-07-16 2019-10-11 秒针信息技术有限公司 A kind of method and device of resource allocation

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7937383B2 (en) * 2008-02-01 2011-05-03 Microsoft Corporation Generating anonymous log entries
US20120265616A1 (en) * 2011-04-13 2012-10-18 Empire Technology Development Llc Dynamic advertising content selection
US20130060633A1 (en) * 2011-09-01 2013-03-07 Nicholas St-Pierre Privacy-enhanced internet advertising system
CA2996960C (en) * 2017-03-02 2021-11-23 Discovered Intelligence Inc. System for aggregation and prioritization of it asset field values from real-time event logs and method thereof

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103995907A (en) * 2014-06-13 2014-08-20 北京奇艺世纪科技有限公司 Determining method of access users
CN104965876A (en) * 2015-06-12 2015-10-07 微梦创科网络科技(中国)有限公司 Method and apparatus for carrying out mining on work units of users on basis of position information
CN108390788A (en) * 2018-03-05 2018-08-10 北京奇艺世纪科技有限公司 User identification method, device and electronic equipment
CN110324845A (en) * 2019-07-16 2019-10-11 秒针信息技术有限公司 A kind of method and device of resource allocation

Also Published As

Publication number Publication date
CN110990244A (en) 2020-04-10

Similar Documents

Publication Publication Date Title
CN110990244B (en) Target equipment identification determining method and device, electronic equipment and readable storage medium
US11620684B2 (en) Identification of targets for a campaign by referencing a blockchain and/or a distributed system file system
CN109729131B (en) Application request processing method and device and router
CN107404408B (en) Virtual identity association identification method and device
US7999728B2 (en) Granularity control in publishing information
US9037714B2 (en) Cross-platform application manager
WO2015149650A1 (en) Method, apparatus and server for pushing message
CN107169094B (en) Information aggregation method and device
US20170011113A1 (en) System and Method for Identifying Users on a Network
CN111343301B (en) Positioning method, positioning device, electronic equipment and storage medium
CN107454126B (en) Message pushing method, server and terminal
US20200257749A1 (en) Method and a device for friend recommendation
CN107798552B (en) Activity information pushing method, system, server and medium
US20140335886A1 (en) Network identifier position determining system and method for same
US20180027084A1 (en) Network-Based Probabilistic Device Linking
US10681499B2 (en) Methods and systems for evaluating applications in an application distribution platform
CN112367345A (en) Data processing method, server device and computer readable storage medium
US20120203594A1 (en) Monitoring migration behavior of users of electronic devices and related service providers
CN108684044A (en) A kind of user behavior detecting system, method and device
CN110599278B (en) Method, apparatus, and computer storage medium for aggregating device identifiers
CN111767481B (en) Access processing method, device, equipment and storage medium
CN112804099A (en) Parameter batch configuration method and device, computer equipment and readable storage medium
US10187262B2 (en) Automated multi-user system detection
CN111104598B (en) Method and device for directionally pushing information, electronic equipment and readable storage medium
CN114978856A (en) Multi-cloud computing management platform and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant