CN112884505A - User behavior prediction method and device, computer equipment and storage medium - Google Patents

User behavior prediction method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN112884505A
CN112884505A CN202110148513.7A CN202110148513A CN112884505A CN 112884505 A CN112884505 A CN 112884505A CN 202110148513 A CN202110148513 A CN 202110148513A CN 112884505 A CN112884505 A CN 112884505A
Authority
CN
China
Prior art keywords
application
target
identification information
sub
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110148513.7A
Other languages
Chinese (zh)
Inventor
杜洪卫
王祖坤
翁胜利
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baijia Technology Group Co ltd
Original Assignee
Beijing Baijia Technology Group Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baijia Technology Group Co ltd filed Critical Beijing Baijia Technology Group Co ltd
Priority to CN202110148513.7A priority Critical patent/CN112884505A/en
Publication of CN112884505A publication Critical patent/CN112884505A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data
    • G06Q30/0202Market predictions or forecasting for commercial activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2465Query processing support for facilitating data mining operations in structured databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • Game Theory and Decision Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Computational Linguistics (AREA)
  • Computer Hardware Design (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present disclosure provides a user behavior prediction method, apparatus, computer device and storage medium, the method comprising: when a target user accesses a target sub-application through a host application deployed with an application platform, acquiring target unique identification information of the target user relative to a service party to which the target sub-application belongs, wherein the target sub-application is deployed on the application platform; determining at least one first sub-application corresponding to at least one first public identification information having a binding mapping relation with the target unique identification information, wherein the first sub-applications are deployed on the same or different application platforms; acquiring behavior data of a target user in at least one first sub-application; and predicting target behaviors of the target user in the target sub-application based on the behavior data. The method accurately, quickly and accurately predicts the target behavior in the target sub-application currently accessed by the target user based on the behavior data of the user in the first sub-application, so as to determine the corresponding coping strategy according to the predicted target behavior.

Description

User behavior prediction method and device, computer equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a user behavior prediction method, an apparatus, a computer device, and a storage medium.
Background
When a user accesses a business application of an enterprise, the enterprise usually expects that the application can determine a corresponding coping strategy in time according to the behavior of the user so as to obtain a better operation effect. However, the conventional strategy has a certain hysteresis with respect to the user, and cannot achieve the desired operation effect.
Disclosure of Invention
The embodiment of the disclosure at least provides a user behavior prediction method, a user behavior prediction device, computer equipment and a storage medium.
In a first aspect, an embodiment of the present disclosure provides a user behavior prediction method, where the method includes:
when a target user accesses a target sub-application through a host application deployed with an application platform, acquiring target unique identification information of the target user relative to a service party to which the target sub-application belongs, wherein the target sub-application is deployed on the application platform;
determining at least one first sub-application corresponding to at least one first public identification information having a binding mapping relation with the target unique identification information, wherein each first sub-application is deployed on the same or different application platforms;
acquiring behavior data of the target user in the at least one first sub-application;
predicting a target behavior of the target user in the target sub-application based on the behavior data.
In a possible embodiment, for any one of the at least one first sub-application, the binding mapping relationship between the target unique identification information and the first public identification information of the target user relative to the first sub-application is determined by:
responding to the consent authorization trigger operation of a target user for any first sub-application, and acquiring first public identification information of the target user relative to the first sub-application from a host server, wherein the host server is a server corresponding to the host application;
obtaining reference public identification information of the target user relative to a silent reference application of a server of the first sub-application from the host server;
determining target unique identification information of the target user relative to the server;
and determining a binding mapping relation between the first public identification information and the target unique identification information based on a first mapping relation between the first public identification information and the reference public identification information and a second mapping relation between the reference public identification information and the target unique identification information.
In one possible embodiment, the silent reference application is deployed to the host application.
In one possible implementation, it is determined that the target user has applied the consent-authorization trigger operation for the first sub-application by:
when receiving an authorization message generated by the authorization operation of the target user on an authorization interface of the first sub-application, determining that the target user applies an authorization approval trigger operation for the first sub-application;
or when receiving an authorization message generated by the interactive operation of the target user on the running interface of the first sub-application, determining that the target user applies the consent authorization trigger operation for the first sub-application.
In a possible implementation manner, the obtaining, from the host server, first public identification information of the target user with respect to the first sub-application includes:
receiving first authorization consent information, sent by a host server, of the target user for the first sub-application;
sending a first identification request to the host server based on a first character string associated with the target user in the first authorization consent information;
and receiving first public identification information, which is sent by the host server in response to the first identification request and is relative to the first sub-application, of the target user, wherein the first public identification information is generated by the host server according to the user information of the target user and the feature information of the first sub-application.
In a possible embodiment, the obtaining, from the host server, reference public identification information of the target user with respect to the silent reference application of the server of the first sub-application includes:
triggering a simulated consent authorization trigger operation of the target user for the service party's silent reference application;
receiving second authorization consent information of the target user for the silence reference application, which is sent by the host server in response to the simulated consent authorization trigger operation;
sending a second identification request to the host server based on a second character string associated with the target user in the second authorization consent information;
and receiving reference public identification information, which is sent by the host server in response to the second identification request and is relative to the silent reference application, of the target user, wherein the reference public identification information is generated by the host server according to the user information of the target user and the characteristic information of the silent reference application.
In a possible embodiment, the determining target unique identification information of the target user relative to the service party includes:
determining whether target unique identification information of the target user relative to the server has been generated;
if the target unique identification information is determined to be generated, calling the generated target unique identification information;
and if the target unique identification information is determined not to be generated, generating the target unique identification information based on the reference public identification information.
In one possible implementation, after determining the binding mapping relationship between the first public identification information and the target unique identification information based on the first mapping relationship between the first public identification information and the reference public identification information and the second mapping relationship between the reference public identification information and the target unique identification information, the method further includes:
acquiring second public identification information of a first user to be verified, wherein the first user is a user who uses a second sub-application of the service party;
determining first unique identification information of the first user bound with the second public identification information in a mapping relation;
and if the first unique identification information is the same as the target unique identification information, determining that the first user and the target user are the same user.
In a second aspect, an embodiment of the present application provides an apparatus for predicting user behavior, where the apparatus includes:
the unique identification determining module is used for acquiring target unique identification information of a target user relative to a service party to which the target sub-application belongs when the target user accesses the target sub-application through a host application deployed with an application platform, wherein the target sub-application is deployed on the application platform;
the sub-application determining module is used for determining at least one first sub-application corresponding to at least one piece of first public identification information which has a binding mapping relation with the target unique identification information, wherein each first sub-application is deployed on the same or different application platforms;
a historical behavior data acquisition module, configured to acquire behavior data of the target user in the at least one first sub-application;
and the target behavior prediction module is used for predicting the target behavior of the target user in the target sub-application based on the behavior data.
In one possible embodiment, the apparatus further includes a user information association module, and the user information association module includes:
a first identifier obtaining unit, configured to obtain, from a host server, first public identifier information of a target user with respect to any first sub-application in response to an authorization-granted trigger operation by the target user for the first sub-application, where the host server is a server corresponding to the host application;
a reference identifier obtaining unit, configured to obtain, from the host server, reference public identifier information of the silent reference application of the target user with respect to the server of the first sub-application;
the unique identification acquisition unit is used for determining the target unique identification information of the target user relative to the server;
and the mapping relation binding unit is used for determining the binding mapping relation between the first public identification information and the target unique identification information based on a first mapping relation between the first public identification information and the reference public identification information and a second mapping relation between the reference public identification information and the target unique identification information.
In one possible embodiment, the silent reference application is deployed to the host application.
In a possible implementation manner, the first identifier obtaining unit is configured to determine that the target user applies the consent-authorization trigger operation for the first sub-application by:
when receiving an authorization message generated by the authorization operation of the target user on an authorization interface of the first sub-application, determining that the target user applies an authorization approval trigger operation for the first sub-application;
or when receiving an authorization message generated by the interactive operation of the target user on the running interface of the first sub-application, determining that the target user applies the consent authorization trigger operation for the first sub-application.
In a possible implementation manner, when the first identifier obtaining unit is configured to obtain, from the host server, the first public identifier information of the target user with respect to the first sub-application, the first identifier obtaining unit is specifically configured to:
receiving first authorization consent information, sent by a host server, of the target user for the first sub-application;
sending a first identification request to the host server based on a first character string associated with the target user in the first authorization consent information;
and receiving first public identification information, which is sent by the host server in response to the first identification request and is relative to the first sub-application, of the target user, wherein the first public identification information is generated by the host server according to the user information of the target user and the feature information of the first sub-application.
In a possible implementation manner, the reference identifier obtaining unit, when configured to obtain, from the host server, reference public identification information of the silent reference application of the target user with respect to the server of the first sub-application, is specifically configured to:
triggering a simulated consent authorization trigger operation of the target user for the service party's silent reference application;
receiving second authorization consent information of the target user for the silence reference application, which is sent by the host server in response to the simulated consent authorization trigger operation;
sending a second identification request to the host server based on a second character string associated with the target user in the second authorization consent information;
and receiving reference public identification information, which is sent by the host server in response to the second identification request and is relative to the silent reference application, of the target user, wherein the reference public identification information is generated by the host server according to the user information of the target user and the characteristic information of the silent reference application.
In a possible implementation manner, the unique identifier obtaining unit, when configured to determine the target unique identifier information of the target user relative to the service provider, is specifically configured to:
determining whether target unique identification information of the target user relative to the server has been generated;
if the target unique identification information is determined to be generated, calling the generated target unique identification information;
and if the target unique identification information is determined not to be generated, generating the target unique identification information based on the reference public identification information.
In a possible implementation manner, the user information association module further includes a verification unit, and the verification unit is configured to:
acquiring second public identification information of a first user to be verified, wherein the first user is a user who uses a second sub-application of the service party;
determining first unique identification information of the first user bound with the second public identification information in a mapping relation;
and if the first unique identification information is the same as the target unique identification information, determining that the first user and the target user are the same user.
In a third aspect, embodiments of the present disclosure provide a computer device, including a processor, a memory, and a bus; the memory stores machine-readable instructions executable by the processor, the processor and the memory communicate via a bus when the computer device is run, and the machine-readable instructions, when executed by the processor, perform the steps of the first aspect, or any one of the possible user behavior prediction methods of the first aspect.
In a fourth aspect, the embodiments of the present disclosure provide a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and the computer program is executed by a processor to perform the steps of the first aspect described above, or any one of the possible user behavior prediction methods in the first aspect.
According to the user behavior prediction method, the user behavior prediction device, the computer equipment and the storage medium, when a target user accesses a target sub-application through a host application with an application platform, target unique identification information of the target user relative to a service party to which the target sub-application belongs is acquired, and the target sub-application is deployed on the application platform; determining at least one first sub-application corresponding to at least one first public identification information having a binding mapping relation with the target unique identification information, wherein the first sub-applications are deployed on the same or different application platforms; acquiring behavior data of a target user in at least one first sub-application; and predicting target behaviors of the target user in the target sub-application based on the behavior data. The method can accurately, quickly and accurately predict the target behavior in the target sub-application currently accessed by the target user based on the behavior data of the user in the first sub-application, so as to determine the corresponding coping strategy according to the predicted target behavior.
In order to make the aforementioned objects, features and advantages of the present disclosure more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings required for use in the embodiments will be briefly described below, and the drawings herein incorporated in and forming a part of the specification illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the technical solutions of the present disclosure. It is appreciated that the following drawings depict only certain embodiments of the disclosure and are therefore not to be considered limiting of its scope, for those skilled in the art will be able to derive additional related drawings therefrom without the benefit of the inventive faculty.
Fig. 1 is a flowchart of a user behavior prediction method according to an embodiment of the present disclosure;
fig. 2 is a flowchart of a user information association sub-method provided in an embodiment of the present disclosure;
fig. 3 is a schematic diagram of user information association in an actual application scenario according to an embodiment of the present disclosure;
fig. 4 is a schematic diagram of a user behavior prediction apparatus according to an embodiment of the present disclosure;
fig. 5 is a second schematic diagram of a user behavior prediction apparatus according to a second embodiment of the disclosure;
fig. 6 is a schematic diagram of a user information association module according to an embodiment of the disclosure;
fig. 7 is a second schematic diagram of a user information association module according to an embodiment of the disclosure;
fig. 8 is a schematic structural diagram of a computer device according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions of the embodiments of the present disclosure will be described clearly and completely with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are only a part of the embodiments of the present disclosure, not all of the embodiments. The components of the embodiments of the present disclosure, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present disclosure, presented in the figures, is not intended to limit the scope of the claimed disclosure, but is merely representative of selected embodiments of the disclosure. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the disclosure without making creative efforts, shall fall within the protection scope of the disclosure.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
The term "and/or" herein merely describes an associative relationship, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of A, B, C, and may mean including any one or more elements selected from the group consisting of A, B and C.
Research shows that when a user accesses business applications of an enterprise, the enterprise usually expects the applications to be able to determine corresponding coping strategies in time according to the user behavior so as to obtain better business effects. However, the conventional strategy has a certain hysteresis with respect to the user, and cannot achieve the desired operation effect.
Based on the research, the present disclosure provides a user behavior prediction method, which can quickly determine a first sub-application used by a user based on target unique identification information of the user when accessing a target sub-application, acquire behavior data of the user in the first sub-application, and accurately, quickly and accurately predict a target behavior in the target sub-application currently accessed by the target user based on the behavior data, so as to determine a corresponding coping strategy according to the predicted target behavior, thereby achieving a better operation effect.
The above-mentioned drawbacks are the results of the inventor after practical and careful study, and therefore, the discovery process of the above-mentioned problems and the solutions proposed by the present disclosure to the above-mentioned problems should be the contribution of the inventor in the process of the present disclosure.
To facilitate understanding of the present embodiment, first, a user behavior prediction method disclosed in the embodiments of the present disclosure is described in detail, where an execution subject of the user behavior prediction method provided in the embodiments of the present disclosure is generally a computer device with certain computing capability, and the computer device includes, for example: terminal devices, which may be User Equipment (UE), mobile devices, User terminal devices, cellular phones, cordless phones, Personal Digital Assistants (PDAs), handheld devices, computing devices, vehicle mounted devices, wearable devices, and the like, servers, and other processing devices. In some possible implementations, the user behavior prediction method may be implemented by a processor invoking computer readable instructions stored in a memory.
The following describes a user behavior prediction method provided by the embodiment of the present disclosure, taking an execution subject as a server as an example. For ease of understanding and description, the execution subject is defined in the disclosed embodiments as a first server, the first server is a server of the service side, and the first server needs to perform information interaction with the host server in the process of executing the user behavior prediction method. Referring to fig. 1, a flowchart of a user behavior prediction method provided in the embodiment of the present disclosure is shown, where the method includes steps S110 to S140, where:
s110: and when the target user accesses the target sub-application through the host application with the application platform, acquiring target unique identification information of the target user relative to a service party to which the target sub-application belongs.
The target sub-applications may be public numbers and applets, etc. that run based on the host application (e.g., WeChat, Payment Bao, Baidu, etc.). Specifically, the application platform is deployed in the host application, the target sub-application is an application operated by the service provider, and the service provider can register in the host server of the host application, so that the target sub-application is deployed in the application platform of the host application, and the target sub-application can run based on the host application. Specifically, the social application may provide an entry of the target sub-application, and the target sub-application may be loaded through the entry, so that the user may access the target sub-application through the host application, and when the target user accesses the target sub-application, the first server may obtain target unique identification information of the target user with respect to a service party to which the target sub-application belongs.
The host application deployment can deploy various types of application platforms, such as education platforms, game platforms, shopping platforms and the like, the server can be an education institution, the target sub-application can push a course applet, drain a public number and the like for a certain subject course of the education institution, a user can perform course registration, course prediction and the like based on the course push applet, the drain public number and the like, and the target sub-application can also be an official public number, a service promotion applet, an online learning applet and the like.
S120: and determining at least one first sub-application corresponding to at least one first public identification information having a binding mapping relation with the target unique identification information.
In this embodiment of the present application, the first sub-application is a sub-application used by a user, and the first sub-application and the target sub-application may belong to the same server and be deployed in the same host application. In addition, each of the first sub-application and the target sub-application may be deployed on the same or different application platforms of the host application described above.
The first sub-application may be a public number and a small program running based on a host application, the target sub-application may be another public number or a small program belonging to the same service party as the first sub-application, for example, a course pushing small program belonging to a certain subject course of an education institution, and the first application may be a course pushing small program and a flow guiding small program belonging to another subjects of the education institution, and the user may perform course registration, course prediction, and the like based on the course pushing small program, and the target sub-application may also be an official public number, a service promotion small program, an online learning small program, and the like.
The target user has a binding mapping relationship with the first public identification information and the target unique identification information relative to the first sub-application, so that the first server can determine at least one piece of first public identification information based on the binding mapping relationship and the target unique identification information, and further determine at least one first sub-application corresponding to the first public identification information. And storing the binding mapping relation in a preset database. The database may be the database of the first server or the database of the host server, but is not limited thereto. Here, the step of determining the binding mapping relationship between the target unique identification information and the first public identification information of the target user relative to the first sub-application will be described in the following.
S130: behavior data of the target user in the at least one first sub-application is obtained.
The behavior data is data generated by the target user accessing the first sub-application. Taking the first sub-application as an example of a subject course pushing applet of an educational institution, the behavior data may include page browsing record data, evaluation data for a course, purchase record data for a course, interaction data with a teacher, interaction data with students, number of free course participation times, number of discount course purchase times, order data generated based on course purchasing behavior, access time length, access number, access frequency, and the like.
S140: and predicting target behaviors of the target user in the target sub-application based on the behavior data.
In the embodiment of the application, the behavior data can be input into a trained behavior prediction model, and the prediction model predicts the target behavior of the target user in the target sub-application. Of course, the target behavior may be predicted by other prediction methods.
The following introduces a process of user behavior prediction in an actual application scenario, and the target subprogram and the first subprogram are small programs of an online education enterprise, wherein the target subprogram is a Chinese course development program, the plurality of first subprograms are a math course development program, an English course development program, a history course development program and a drawing course development program, and the user can make course registration, course prediction and the like based on a course development program.
(a) When a target user accesses a Chinese course deduction program through a host application with an application platform, target unique identification information of the target user relative to an online education enterprise is obtained.
(b) And determining a mathematical course presidential program, an English course presidential program, a historical course presidential program and a drawing course presidential program which are used by the target user according to the target unique identification information and the binding mapping relation.
(c) Behavior data of a target user in a mathematical course president program, an English course president program, a historical course president program and a drawing course president program are respectively acquired. The behavior data can include page browsing record data, evaluation data for courses, purchase record data for courses, interaction data with teachers, interaction data with classmates, times of participation in free courses, times of purchasing discount courses, order data generated based on course purchasing behaviors, access duration, access times, access frequency and the like.
(d) And inputting the behavior data into a trained behavior prediction model, wherein the prediction model predicts whether the target user has course purchasing behavior in the Chinese course deduction program. Such as the act of purchasing a positive or discounted course.
Optionally, after the step (d), the corresponding information may be pushed to the target user based on the result of the behavior prediction. For example, if the prediction result is that the user does not have a course purchasing behavior, discount information or free course information can be pushed to the target user to improve the course purchasing intention of the target user; if the prediction result is that the user will have a course purchasing behavior, the guidance information can be pushed to the target user, and the guidance information is used for indicating course purchasing procedures, cautionary matters and the like.
A user information association sub-method based on a user behavior prediction method is introduced below, by which a binding mapping relationship between the target unique identification information and the first public identification information of the target user with respect to the first sub-application can be determined.
Referring to fig. 2, a flowchart of a user information association sub-method provided in the embodiment of the present disclosure is shown. For any one of at least one first sub-application, determining a binding mapping relationship between the target unique identification information and first public identification information of the target user relative to the first sub-application through steps S1201 to S1204, wherein:
s1201: and acquiring first public identification information of the target user relative to the first sub-application from the host server in response to the target user agreeing to authorize the trigger operation for any first sub-application.
The first sub-application needs to run based on the host application, and the first sub-application can be a public number and an applet, etc. running based on the host application. The host server is a server corresponding to the host application, and the first server is a server of a server side of the first sub-application.
For example, the host application may be a social application and the host server is a server to which the social application corresponds. The server side can be an education institution, the first sub-application can be an official public number, a business promotion applet, an online learning applet and the like of the education institution, and the first server is a server of the education institution. The first sub-application may be deployed in a social application, and the social application may provide a portal to the first sub-application, through which the first sub-application may be loaded.
After the target user agrees to authorize the first sub-application, the host server may generate first public identification information of the target user relative to the first sub-application, and the first server may obtain the first public identification information from the host server in response to an agreement authorization trigger operation of the target user for the first sub-application.
Alternatively, the user may perform an authorization operation on the authorization interface of the first sub-application, and the first server may determine that the target user applies the consent-authorization trigger operation for the first sub-application upon receiving an authorization message generated by the target user performing the authorization operation on the authorization interface of the first sub-application.
Optionally, the user may perform an interactive operation (such as browsing interface contents, sending a message based on the running interface, or the like) on the running interface of the first sub-application, and the first server may determine that the target user applies the consent-authorization trigger operation for the first sub-application when receiving an authorization message generated by the interactive operation of the target user on the running interface of the first sub-application.
In the embodiment of the disclosure, when generating the first public identification information of the target user relative to the first sub-application, the host server may further generate first authorization consent information corresponding to the first public identification information, where the first authorization consent information includes a first character string associated with the target user.
The first public identification information may be generated by the host server according to the user information of the target user and the feature information of the first sub-application. The host server generates the first character string according to the first public identification information, the host server may also randomly generate the first character string, and after the first public identification information and the first character string are generated, a mapping relationship between the first public identification information and the first character string may be established.
The host server may determine a first server of a service party of the first sub-application according to the feature information of the first sub-application, and in order to ensure the security of the first public identification information, the host server may first send the first authorization approval information to the first server; the first server receives first authorization agreement information, sent by the host server, of a target user for the first sub-application, and then sends a first identification request to the host server based on a first character string, associated with the target user, in the first authorization agreement information; after receiving a first identification request sent by a first server, a host server determines corresponding first public identification information according to a first character string in the first identification request, and then sends the first public identification information to the first server; the first server receives first public identification information sent by the host server in response to the first identification request.
S1202: and acquiring reference public identification information of the target user relative to the silent reference application of the server of the first sub-application from the host server.
The silent reference application belongs to the same server as the first sub-application, and the silent reference application may be a virtual application running based on the host application, for example, the silent reference application may be a virtual public number and an applet running based on the host application. After step S12021, the hosting server may generate reference public identification information of the target user with respect to the silent reference application, and the first server may acquire the reference public identification information from the hosting server.
Specifically, after determining that the target user agrees to authorize the first sub-application, the first server may determine a silent reference application among a plurality of sub-applications of a service side of the first sub-application; after the silence reference application is determined, the first server triggers the simulation consent of the target user for the silence reference application to authorize the triggering operation, and completes authorization of the silence reference application. Here, after it is determined that the target user agrees to authorize the first sub-application, the authorization of the silent reference application may be completed by means of the silent authorization.
In the embodiment of the present disclosure, after agreeing to authorize the silent reference application, the host server may generate reference public identification information of the target user with respect to the silent reference application. The host server may further generate second authorization grant information corresponding to the reference public identification information when generating the reference public identification information of the target user relative to the silent reference application, the second authorization grant information including a second character string associated with the target user.
The reference public identification information may be generated by the host server according to the user information of the target user and the feature information of the silent reference application. The host server generates the second character string according to the reference public identification information, the host server may also randomly generate the second character string, and after the reference public identification information and the second character string are generated, a mapping relationship between the reference public identification information and the second character string may be established.
The host server may determine a first server of a service party of the silent reference application according to the feature information of the silent reference application, and in order to ensure the security of the reference public identification information, the host server may respond to the simulated approval triggering operation and send second authorization approval information to the first server; the first server receives second authorization consent information, which is sent by the host server in response to the simulated consent authorization trigger operation and aims at the silence reference application, and then sends a second identification request to the host server based on a second character string associated with the target user in the second authorization consent information; after receiving a second identification request sent by the first server, the host server determines corresponding reference public identification information according to a second character string in the second identification request, and then sends the reference public identification information to the first server; the first server receives the reference public identification information of the host server in response to the second identification request.
In this embodiment of the present application, the first public identification information and the reference public identification information generated by the host server may be openids. OpenID is a user-centric digital identification framework that is open and decentralized. The OpenID is created based on the concept that a unique identity of a website can be authenticated through a Universal Resource Identifier (URI), and similarly, the identity authentication of a user will be performed based on the OpenID.
In the embodiment of the application, the silent reference application is deployed in the host application, the host application is deployed with an application platform, and the first sub-application is deployed in the application platform. For example, the host application is deployed with an education platform, a game platform, a shopping platform and the like, the server can be an education institution, the first sub-applications can be official public numbers, service promotion applets, online learning applets and the like of the education institution, and each first sub-application can be deployed in at least one application platform of the host application.
S1203: target unique identification information of the target user relative to the service party is determined.
It is emphasized here that the target unique identification information is of a different origin than the first public identification information and the reference public identification information described above. The target unique identification information is generated by the first server, that is, the target unique identification information can be regarded as identification information given to the target user by the service party; the first public identification information and the reference public identification information are generated by the host server, that is, the first public identification information and the reference public identification information can be regarded as identification information given to the target user by the host application.
In this step, the first server may determine whether the target unique identification information of the target user with respect to the service party has been generated, and thus determine the target unique identification information in a corresponding manner.
Optionally, if the first server determines that the target unique identification information is not generated, the target unique identification information is generated based on the reference public identification information. And if the first server determines that the target unique identification information is generated, calling the generated target unique identification information.
In this embodiment of the application, if the first server determines that the target unique identification information is not generated, the first server may randomly generate one piece of target unique identification information, and a random function required for randomly generating the target unique identification information may be determined according to actual needs.
In the embodiment of the application, the first server may pre-store a plurality of unique identification information according to the needs of the service party, and if the first server determines that the target unique identification information is not generated, one unique identification information may be determined from the plurality of unique identification information pre-stored, and the determined unique identification information is used as the target unique identification information.
S1204: and determining a binding mapping relation between the first public identification information and the target unique identification information based on a first mapping relation between the first public identification information and the reference public identification information and a second mapping relation between the reference public identification information and the target unique identification information.
After receiving the first public identification information and the reference public identification information, the first server may establish a first mapping relationship between the first public identification information and the reference public identification information; after determining the target unique identification information, the first server may establish a second mapping relationship between the reference public identification information and the target unique identification information. The first server may determine a binding mapping relationship between the first public identification information and the target unique identification information according to the first mapping relationship and the second mapping relationship.
The reference public identification information of the user relative to one silent reference application of the service party and the public identification information of the user relative to other sub-applications of the service party are bound and mapped, so that the uniqueness of the user identity based on the reference public identification information can be realized. Because the silent reference application is not limited to be deployed in a certain application platform of the host application, the public identification information of the sub-application of the user relative to any application platform can be in a binding mapping relationship with the reference public identification information of the user relative to the silent reference application, and for the condition that the user uses the sub-application in the same application platform and the condition that the user uses the sub-application in different application platforms, the verification of the uniqueness of the user identity can be completed by the reference public identification information, so that a plurality of sub-applications used by the user can be quickly determined based on the reference public identification.
As described above, the silent reference application may be deployed in the host application, in this embodiment of the present application, the silent reference application may be specifically deployed outside an application platform of the host application, and a user may not be limited by a rule of the application platform with respect to a deployment position of a sub application corresponding to the open identification information that can be associated with the reference public identification information of the silent reference application. That is, the reference public identity information may be in a binding mapping relationship with the public identity information of the target user with respect to the sub-application of the service provider in any application platform, and therefore, the open identity information of the target user corresponding to the sub-application of different application platforms may be mapped to the same reference public identity information.
In the embodiment of the present application, the same silent reference application may be deployed in a plurality of application platforms in which the sub-applications of the server are deployed, respectively. The public identification information of the target user relative to the sub-application in each application platform of the server side is in binding mapping relation with the reference public identification information of the target user relative to the silent reference application in the corresponding application platform, and because the reference public identification information of the target user relative to the silent reference application in each application platform is the same, the open identification information of the target user relative to the sub-application of different application platforms can be mapped to the same reference public identification information.
In the embodiment of the present disclosure, based on the mapping relationship determined in the above step, it may be determined whether any two users using the sub-application of the service provider are the same user. For example, for a first user who has used a second sub-application of a server, it may be verified whether the first user and the target user are the same user. It is understood that, for the first user, the binding mapping relationship between the second public identification information and the target unique identification information of the first user relative to the second sub-application can be determined through steps S12021 to S1204 as well.
When verifying whether the first user and the target user are the same user, the first server may obtain second public identification information of the first user to be verified, determine first unique identification information of the first user bound with the second public identification information in a mapping relationship, if the first unique identification information is the same as the target unique identification information, indicate that the second public identification information of the first user and the first public identification information of the target user are mapped to the same unique identification information, and determine that the first user and the target user are the same user. It can be understood that if the first unique identification information is different from the target unique identification information, the first user and the target user are determined to be different users.
Referring to fig. 3, a schematic diagram of user behavior prediction in an actual application scenario is provided in the embodiment of the present disclosure. In this embodiment, the first application may be a public number or an applet.
For the first public number, when the user a uses the first public number, determining whether the user a authorizes the first public number, and if the user a does not authorize the first public number, ending the process; if the user a is determined to have authorized the first public number, first public identification information of the user a relative to the first public number is obtained at the host server, then silent authorization is carried out on the reference public number, and reference public identification information of the user a relative to the reference public number is obtained at the host server.
After the reference public identification information is acquired, whether the target unique identification information of the target user a relative to the service party exists or not is determined, and if the target unique identification information exists, the target unique identification information is directly called; if not, generating target unique identification information based on the reference public identification information. After the target unique identification information is determined, a binding mapping relationship between the first public identification information and the target unique identification information is determined based on a first mapping relationship between the first public identification information and the reference public identification information and a second mapping relationship between the reference public identification information and the target unique identification information.
For the first applet, when the user b uses the first applet, determining whether the user b authorizes the first applet, and if the user b does not authorize the first applet, ending the process; if the fact that the user b authorizes the first small program is determined, first public identification information of the user b relative to the first small program is obtained at the host server, then silent authorization is conducted on the reference public number, and reference public identification information of the user b relative to the reference public number is obtained at the host server.
After the reference public identification information is acquired, whether the target unique identification information of the target user b relative to the service party exists or not is determined, and if the target unique identification information exists, the target unique identification information is directly called; if not, generating target unique identification information based on the reference public identification information. After the target unique identification information is determined, a binding mapping relationship between the first public identification information and the target unique identification information is determined based on a first mapping relationship between the first public identification information and the reference public identification information and a second mapping relationship between the reference public identification information and the target unique identification information.
After the above steps, it can be verified whether the user a and the user b are the same user. Specifically, whether the target unique identification information mapped by the first public identification information of the user a relative to the first public number is the same as the target unique identification information mapped by the first public identification information of the user b relative to the first applet or not can be determined, and if the target unique identification information is the same as the target unique identification information mapped by the first public identification information of the user b relative to the first applet, the user a and the user b are determined to be the same user.
Based on the same inventive concept, a user behavior prediction device corresponding to the user behavior prediction method is further provided in the embodiments of the present disclosure, and as the principle of solving the problem of the user behavior prediction device in the embodiments of the present disclosure is similar to that of the user behavior prediction method in the embodiments of the present disclosure, the implementation of the device may refer to the implementation of the method, and repeated details are not repeated.
Referring to fig. 4 and 5, fig. 4 is a schematic diagram of a user behavior prediction apparatus according to an embodiment of the disclosure, and fig. 5 is a second schematic diagram of a user behavior prediction apparatus according to an embodiment of the disclosure. As shown in fig. 4, the user behavior prediction apparatus 400 includes a unique identifier determination module 410, a sub-application determination module 420, a historical behavior data acquisition module 430, and a target behavior prediction module 440.
The unique identifier determining module 410 is configured to, when a target user accesses a target sub-application through a host application deployed with an application platform, obtain target unique identifier information of the target user with respect to a service party to which the target sub-application belongs, where the target sub-application is deployed on the application platform.
The sub-application determining module 420 is configured to determine at least one first sub-application corresponding to at least one first public identification information having a binding mapping relationship with the target unique identification information, where each first sub-application is deployed on the same or different application platforms.
The historical behavior data obtaining module 430 is configured to obtain behavior data of the target user in the at least one first sub-application.
The target behavior prediction module 440 is configured to predict a target behavior of the target user in the target sub-application based on the behavior data.
In one possible implementation, as shown in fig. 5, the user behavior prediction apparatus 400 further includes a user information association module 450. The user information association module 450 is used for executing the user information association sub-method.
Referring to fig. 6 and 7, fig. 6 is a first schematic diagram of a user information association module according to an embodiment of the disclosure, and fig. 7 is a second schematic diagram of a user information association module according to an embodiment of the disclosure. As shown in fig. 6, the user information association module 450 includes a first identifier obtaining unit 4501, a reference identifier obtaining unit 4502, a unique identifier obtaining unit 4503, and a mapping relationship binding unit 4504.
The first identifier obtaining unit 4501 is configured to, in response to a grant authorization trigger operation of a target user for any first sub-application, obtain first public identifier information of the target user relative to the first sub-application from a host server, where the host server is a server corresponding to the host application.
The reference identifier obtaining unit 4502 is configured to obtain, from the host server, reference public identifier information of the silent reference application of the target user with respect to the service side of the first sub application.
The unique identification acquiring unit 4503 is configured to determine target unique identification information of the target user with respect to the service party.
The mapping relationship binding unit 4504 is configured to determine a binding mapping relationship between the first public identification information and the target unique identification information based on a first mapping relationship between the first public identification information and the reference public identification information and a second mapping relationship between the reference public identification information and the target unique identification information.
In one possible implementation, the silent reference application is deployed to the host application.
In a possible implementation, the first identifier obtaining unit 4501 is configured to determine that the target user applies the consent authorization to trigger operation for the first sub-application by:
when receiving an authorization message generated by an authorization operation of a target user on an authorization interface of a first sub-application, determining that the target user applies an authorization approval trigger operation for the first sub-application;
or, when receiving an authorization message generated by the interactive operation of the target user on the running interface of the first sub-application, determining that the target user applies the consent authorization trigger operation for the first sub-application.
In a possible implementation manner, the first identifier obtaining unit 4501, when configured to obtain the first public identifier information of the target user with respect to the first sub-application from the host server, is specifically configured to:
receiving first authorization consent information, sent by a host server, of a target user for a first sub-application;
sending a first identification request to a host server based on a first character string associated with a target user in the first authorization consent information;
and receiving first public identification information of the target user relative to the first sub-application, which is sent by the host server in response to the first identification request, wherein the first public identification information is generated by the host server according to the user information of the target user and the characteristic information of the first sub-application.
In a possible embodiment, the reference identifier obtaining unit 4502, when configured to obtain, from the host server, the reference public identification information of the silent reference application of the target user with respect to the service side of the first sub application, is specifically configured to:
triggering a simulated consent authorization triggering operation of the target user for the silence reference application of the server;
receiving second authorization approval information, which is sent by the host server in response to the simulated approval triggering operation and is aimed at the silence reference application, of the target user;
sending a second identification request to the host server based on a second character string associated with the target user in the second authorization consent information;
and receiving reference public identification information of the target user relative to the silent reference application, which is sent by the host server in response to the second identification request, wherein the reference public identification information is generated by the host server according to the user information of the target user and the characteristic information of the silent reference application.
In a possible embodiment, the unique identifier obtaining unit 4503, when configured to determine the target unique identifier information of the target user relative to the service party, is specifically configured to:
determining whether target unique identification information of a target user relative to a service party is generated;
if the target unique identification information is determined to be generated, the generated target unique identification information is called;
and if the target unique identification information which is not generated is determined, generating the target unique identification information based on the reference public identification information.
In a possible implementation, referring to fig. 7, the user information association module 450 further includes a verification unit 4505, where the verification unit 4505 is configured to:
acquiring second public identification information of a first user to be verified, wherein the first user is a user using a second sub-application of a service party;
determining first unique identification information of a first user bound with the second public identification information and having a mapping relation;
and if the first unique identification information is the same as the target unique identification information, determining that the first user and the target user are the same user.
The description of the processing flow of each module in the device and the interaction flow between the modules may refer to the related description in the above method embodiments, and will not be described in detail here.
Corresponding to the user behavior prediction method in fig. 1, an embodiment of the present disclosure further provides a computer device 800, as shown in fig. 8, for a schematic structural diagram of the computer device provided in the embodiment of the present disclosure, the computer device 800 includes a processor 810, a memory 820, and a bus 830. The memory 820 is used for storing execution instructions and includes a memory 821 and an external memory 822. The memory 821 herein is also referred to as an internal memory, and is used for temporarily storing operation data in the processor 810 and data exchanged with an external memory 822 such as a hard disk, and the processor 810 exchanges data with the external memory 822 through the memory 821, and when the computer apparatus 800 operates, the processor 810 and the memory 820 communicate with each other through the bus 830, so that the processor 810 executes the following instructions:
when a target user accesses a target sub-application through a host application deployed with an application platform, acquiring target unique identification information of the target user relative to a service party to which the target sub-application belongs, wherein the target sub-application is deployed on the application platform;
determining at least one first sub-application corresponding to at least one first public identification information having a binding mapping relation with the target unique identification information, wherein each first sub-application is deployed on the same or different application platforms;
acquiring behavior data of a target user in at least one first sub-application;
and predicting target behaviors of the target user in the target sub-application based on the behavior data.
Responding to the consent authorization triggering operation of the target user aiming at any first sub-application, and acquiring first public identification information of the target user relative to the first sub-application from a host server, wherein the host server is a server corresponding to the host application;
acquiring reference public identification information of a target user relative to a silent reference application of a server of a first sub-application from a host server;
determining target unique identification information of a target user relative to a service party;
and determining a binding mapping relation between the first public identification information and the target unique identification information based on a first mapping relation between the first public identification information and the reference public identification information and a second mapping relation between the reference public identification information and the target unique identification information.
The embodiments of the present disclosure also provide a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program performs the steps of the user behavior prediction method in the foregoing method embodiments. The storage medium may be a volatile or non-volatile computer-readable storage medium.
The embodiments of the present disclosure also provide a computer program product, where the computer program product carries a program code, and instructions included in the program code may be used to execute the steps of the user behavior prediction method in the foregoing method embodiments, which may be referred to specifically in the foregoing method embodiments, and are not described herein again.
The computer program product may be implemented by hardware, software or a combination thereof. In an alternative embodiment, the computer program product is embodied in a computer storage medium, and in another alternative embodiment, the computer program product is embodied in a Software product, such as a Software Development Kit (SDK), or the like.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the apparatus described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. In the several embodiments provided in the present disclosure, it should be understood that the disclosed system, apparatus, and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present disclosure may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present disclosure may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present disclosure. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Finally, it should be noted that: the above-mentioned embodiments are merely specific embodiments of the present disclosure, which are used for illustrating the technical solutions of the present disclosure and not for limiting the same, and the scope of the present disclosure is not limited thereto, and although the present disclosure is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive of the technical solutions described in the foregoing embodiments or equivalent technical features thereof within the technical scope of the present disclosure; such modifications, changes or substitutions do not depart from the spirit and scope of the embodiments of the present disclosure, and should be construed as being included therein. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (11)

1. A method for predicting user behavior, the method comprising:
when a target user accesses a target sub-application through a host application deployed with an application platform, acquiring target unique identification information of the target user relative to a service party to which the target sub-application belongs, wherein the target sub-application is deployed on the application platform;
determining at least one first sub-application corresponding to at least one first public identification information having a binding mapping relation with the target unique identification information, wherein each first sub-application is deployed on the same or different application platforms;
acquiring behavior data of the target user in the at least one first sub-application;
predicting a target behavior of the target user in the target sub-application based on the behavior data.
2. The method according to claim 1, wherein for any of the at least one first sub-application, determining a binding mapping relationship between the target unique identification information and the first public identification information of the target user relative to the first sub-application by:
responding to an authorization-granted trigger operation of a target user for the first sub-application, and acquiring first public identification information of the target user relative to the first sub-application from a host server, wherein the host server is a server corresponding to the host application;
obtaining reference public identification information of the target user relative to a silent reference application of a server of the first sub-application from the host server;
determining target unique identification information of the target user relative to the server;
and determining a binding mapping relation between the first public identification information and the target unique identification information based on a first mapping relation between the first public identification information and the reference public identification information and a second mapping relation between the reference public identification information and the target unique identification information.
3. The method of claim 2, wherein the silent reference application is deployed to the host application.
4. The method of claim 2, wherein determining that the target user has applied the consent authorization to trigger operation with respect to the first sub-application is performed by:
when receiving an authorization message generated by the authorization operation of the target user on an authorization interface of the first sub-application, determining that the target user applies an authorization approval trigger operation for the first sub-application;
or when receiving an authorization message generated by the interactive operation of the target user on the running interface of the first sub-application, determining that the target user applies the consent authorization trigger operation for the first sub-application.
5. The method of claim 2, wherein the obtaining the first public identification information of the target user relative to the first sub-application from the host server comprises:
receiving first authorization consent information, sent by a host server, of the target user for the first sub-application;
sending a first identification request to the host server based on a first character string associated with the target user in the first authorization consent information;
and receiving first public identification information, which is sent by the host server in response to the first identification request and is relative to the first sub-application, of the target user, wherein the first public identification information is generated by the host server according to the user information of the target user and the feature information of the first sub-application.
6. The method of claim 2, wherein the obtaining, from the host server, reference public identification information of the target user with respect to the silent reference application of the server of the first sub-application comprises:
triggering a simulated consent authorization trigger operation of the target user for the service party's silent reference application;
receiving second authorization consent information of the target user for the silence reference application, which is sent by the host server in response to the simulated consent authorization trigger operation;
sending a second identification request to the host server based on a second character string associated with the target user in the second authorization consent information;
and receiving reference public identification information, which is sent by the host server in response to the second identification request and is relative to the silent reference application, of the target user, wherein the reference public identification information is generated by the host server according to the user information of the target user and the characteristic information of the silent reference application.
7. The method of claim 2, wherein determining the target unique identification information of the target user relative to the service party comprises:
determining whether target unique identification information of the target user relative to the server has been generated;
if the target unique identification information is determined to be generated, calling the generated target unique identification information;
and if the target unique identification information is determined not to be generated, generating the target unique identification information based on the reference public identification information.
8. The method of claim 2, wherein after determining the binding mapping relationship between the first public identification information and the target unique identification information based on a first mapping relationship between the first public identification information and the reference public identification information and a second mapping relationship between the reference public identification information and the target unique identification information, the method further comprises:
acquiring second public identification information of a first user to be verified, wherein the first user is a user who uses a second sub-application of the service party;
determining first unique identification information of the first user bound with the second public identification information in a mapping relation;
and if the first unique identification information is the same as the target unique identification information, determining that the first user and the target user are the same user.
9. A user behavior prediction apparatus, the apparatus comprising:
the unique identification determining module is used for acquiring target unique identification information of a target user relative to a service party to which the target sub-application belongs when the target user accesses the target sub-application through a host application deployed with an application platform, wherein the target sub-application is deployed on the application platform;
the sub-application determining module is used for determining at least one first sub-application corresponding to at least one piece of first public identification information which has a binding mapping relation with the target unique identification information, wherein each first sub-application is deployed on the same or different application platforms;
a historical behavior data acquisition module, configured to acquire behavior data of the target user in the at least one first sub-application;
and the target behavior prediction module is used for predicting the target behavior of the target user in the target sub-application based on the behavior data.
10. A computer device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory communicating over the bus when the computer device is run, the machine-readable instructions when executed by the processor performing the steps of the user behavior prediction method according to any one of claims 1 to 8.
11. A computer-readable storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method for user behavior prediction according to any one of claims 1 to 8.
CN202110148513.7A 2021-02-03 2021-02-03 User behavior prediction method and device, computer equipment and storage medium Pending CN112884505A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110148513.7A CN112884505A (en) 2021-02-03 2021-02-03 User behavior prediction method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110148513.7A CN112884505A (en) 2021-02-03 2021-02-03 User behavior prediction method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112884505A true CN112884505A (en) 2021-06-01

Family

ID=76056903

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110148513.7A Pending CN112884505A (en) 2021-02-03 2021-02-03 User behavior prediction method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112884505A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113190599A (en) * 2021-06-30 2021-07-30 平安科技(深圳)有限公司 Processing method, device and equipment for application user behavior data and storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891832A (en) * 2011-07-20 2013-01-23 腾讯科技(深圳)有限公司 ID (Identity) binding method and system
CN105469263A (en) * 2014-09-24 2016-04-06 阿里巴巴集团控股有限公司 Commodity recommendation method and device
CN107241215A (en) * 2017-05-10 2017-10-10 百度在线网络技术(北京)有限公司 User's behavior prediction method and apparatus
CN108134760A (en) * 2016-11-30 2018-06-08 北京国双科技有限公司 Website monitoring data acquisition methods and device
CN108846708A (en) * 2018-06-29 2018-11-20 中国联合网络通信集团有限公司 User's buying behavior prediction technique, device, equipment and storage medium
US20190266622A1 (en) * 2018-02-27 2019-08-29 Thinkcx Technologies, Inc. System and method for measuring and predicting user behavior indicating satisfaction and churn probability
CN110933070A (en) * 2019-11-27 2020-03-27 杭州遥望网络科技有限公司 User identification method, system, equipment and computer readable storage medium
CN111159587A (en) * 2019-12-13 2020-05-15 深圳市思为软件技术有限公司 User access information processing method and device and terminal equipment
CN111475716A (en) * 2020-03-26 2020-07-31 威比网络科技(上海)有限公司 Online course recommendation method, system, equipment and storage medium
CN111553754A (en) * 2020-07-10 2020-08-18 支付宝(杭州)信息技术有限公司 Updating method and device of behavior prediction system
CN111784401A (en) * 2020-06-30 2020-10-16 深圳前海微众银行股份有限公司 Order taking rate prediction method, device, equipment and readable storage medium
CN112241544A (en) * 2020-10-27 2021-01-19 北京百家科技集团有限公司 Business system, access method, device, computer equipment and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891832A (en) * 2011-07-20 2013-01-23 腾讯科技(深圳)有限公司 ID (Identity) binding method and system
CN105469263A (en) * 2014-09-24 2016-04-06 阿里巴巴集团控股有限公司 Commodity recommendation method and device
CN108134760A (en) * 2016-11-30 2018-06-08 北京国双科技有限公司 Website monitoring data acquisition methods and device
CN107241215A (en) * 2017-05-10 2017-10-10 百度在线网络技术(北京)有限公司 User's behavior prediction method and apparatus
US20190266622A1 (en) * 2018-02-27 2019-08-29 Thinkcx Technologies, Inc. System and method for measuring and predicting user behavior indicating satisfaction and churn probability
CN108846708A (en) * 2018-06-29 2018-11-20 中国联合网络通信集团有限公司 User's buying behavior prediction technique, device, equipment and storage medium
CN110933070A (en) * 2019-11-27 2020-03-27 杭州遥望网络科技有限公司 User identification method, system, equipment and computer readable storage medium
CN111159587A (en) * 2019-12-13 2020-05-15 深圳市思为软件技术有限公司 User access information processing method and device and terminal equipment
CN111475716A (en) * 2020-03-26 2020-07-31 威比网络科技(上海)有限公司 Online course recommendation method, system, equipment and storage medium
CN111784401A (en) * 2020-06-30 2020-10-16 深圳前海微众银行股份有限公司 Order taking rate prediction method, device, equipment and readable storage medium
CN111553754A (en) * 2020-07-10 2020-08-18 支付宝(杭州)信息技术有限公司 Updating method and device of behavior prediction system
CN112241544A (en) * 2020-10-27 2021-01-19 北京百家科技集团有限公司 Business system, access method, device, computer equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
吕泽宇;李纪旋;陈如剑;陈东明;: "电商平台用户再购物行为的预测研究", 计算机科学, no. 1, pages 424 *
智健: "小程序如何判断用户是哪个", pages 1, Retrieved from the Internet <URL:https://www.cnblogs.com/szj666/p/11988495.html> *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113190599A (en) * 2021-06-30 2021-07-30 平安科技(深圳)有限公司 Processing method, device and equipment for application user behavior data and storage medium
CN113190599B (en) * 2021-06-30 2021-09-28 平安科技(深圳)有限公司 Processing method, device and equipment for application user behavior data and storage medium

Similar Documents

Publication Publication Date Title
CN108156237B (en) Product information pushing method and device, storage medium and computer equipment
Bonneau Guessing human-chosen secrets
US10740411B2 (en) Determining repeat website users via browser uniqueness tracking
CN106453209B (en) Identity verification method and device
CN106656944B (en) Method and device for sliding verification of handheld mobile equipment
CN106302546A (en) The method and apparatus realizing server access
CN102594817A (en) Password agent method, user terminal equipment and password agent server
CN107451819B (en) Identity verification method and device based on user operation behavior characteristics
CN108718337B (en) Website account login, verification and verification information processing method, device and system
CN112187702A (en) Method and device for verifying client
CN106453205A (en) Identity verification method and identity verification device
CN110516173B (en) Illegal network station identification method, illegal network station identification device, illegal network station identification equipment and illegal network station identification medium
CN109547426B (en) Service response method and server
CN105337739B (en) Safe login method, device, server and terminal
US20230289789A1 (en) Privacy protected consumers identity for centralized p2p network services
CN110113329A (en) A kind of verification method and device of identifying code
CN112446736A (en) Click through rate CTR prediction method and device
CN113569263A (en) Secure processing method and device for cross-private-domain data and electronic equipment
CN109460653A (en) Verification method, verifying equipment, storage medium and the device of rule-based engine
CN112884505A (en) User behavior prediction method and device, computer equipment and storage medium
CN110581835A (en) Vulnerability detection method and device and terminal equipment
CN107679383B (en) Identity verification method and device based on geographic position and touch area
CN110717158A (en) Information verification method, device, equipment and computer readable storage medium
CN109948038B (en) Question pushing method and device
CN107679865B (en) Identity verification method and device based on touch area

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination