CN101212337B - Method for constructing online personal identity database automatically - Google Patents
Method for constructing online personal identity database automatically Download PDFInfo
- Publication number
- CN101212337B CN101212337B CN2006101487250A CN200610148725A CN101212337B CN 101212337 B CN101212337 B CN 101212337B CN 2006101487250 A CN2006101487250 A CN 2006101487250A CN 200610148725 A CN200610148725 A CN 200610148725A CN 101212337 B CN101212337 B CN 101212337B
- Authority
- CN
- China
- Prior art keywords
- network
- network application
- sign
- application service
- uid
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a method for automatically building a network personal identity database, which provides a technical support for an overall and timely network supervision and administration. According to the technical proposal, the method comprises the following steps: information to be processed is prepared; network access information and network application information are screened; the network access information and the network application information are associated processed about address and time to obtain a plurality of collection of network identity; the obtained collection of network identity is inserted into the network personal identity database. The invention is applied to the field of supervising and administrating network safety.
Description
Technical field
The present invention relates to a kind of network security technology, relate in particular to a kind of method of automatic building network personal identity database.
Background technology
Along with Internet development, based on network application and user present explosive growth, and the same network user may use a plurality of different identify labels in heterogeneous networks is used, and this has proposed the challenge sternly completed for network supervision.To this, existing technical scheme is normally Real-name Registration and online personal identity database etc.But because a variety of causes temporarily can't popularize Real-name Registration in an all-round way, the netizen can carry out the behavior of various anonymities on the net, this make trace very difficult.
And online personal identity database has application promise in clinical practice aspect network supervision, but present building network personal identity database still is based on the mode of artificial registration typing.Obviously, a kind of like this mode not only can't be supported on a large scale, the typing and the arrangement of multi-layer network user's mass data, also can't realize the real-time update and the maintenance of online personal identity database, thus also can't satisfy comprehensively, network supervision requirement timely.
Summary of the invention
The objective of the invention is to address the above problem, a kind of method of automatic building network personal identity database be provided, for comprehensively timely network supervision technical support is provided.
Technical scheme of the present invention is: the invention provides a kind of method of automatic building network personal identity database, comprising:
A. the preparation of pending information, information is used in screening network access information and network application;
B. network access information and network application use information are carried out address and temporal association process, obtain the plurality of network identify label and collect;
C. resulting network identity sign is collected and be inserted in the online personal identity database.
The method of above-mentioned automatic building network personal identity database, wherein, step b further comprises:
(1) network access information and network application use information are carried out the address correlation processing, obtain plurality of network application service recorder subclass and plurality of network identify label and collect;
(2) according to network access information the network application service recorder in those network application service recorder subclass being carried out association in time handles;
(3) obtaining the plurality of network identify label from the network application service recorder that is associated collects.
The method of above-mentioned automatic building network personal identity database, wherein, the preliminary treatment of step a is by checking that screening makes every the network insertion record that constitutes those network access informations comprise that at least network access equipment sign, user distribute address and online period of user; Constituting those network applications uses every network application service recorder of information to comprise network application sign, accesses identity sign, reference address and access time at least.
The method of above-mentioned automatic building network personal identity database, wherein, the step among the step b (1) further comprises:
According to reference address all those network application service recorders are divided into groups; For the identical network application service recorder in arbitrary group access address, if exist a user to distribute the address network insertion record identical with this reference address, then this group network is used network application service recorder subclass of service recorder formation; Otherwise the network application sign that each the bar network application service recorder in this group comprises and accesses identity sign constitutes a network identity sign and collects { (AID, UID) }, and wherein AID represents the network application sign, and UID represents the accesses identity sign.
The method of above-mentioned automatic building network personal identity database, wherein, the step among the step b (2) further comprises:
For those network application service recorder subclass, whether the access time of judging per two the network application service recorders in each network application service recorder subclass drops on same the user in the network insertion record between the online period, if then these two network application service recorders are associated, otherwise these two network application service recorders are unconnected.
The method of above-mentioned automatic building network personal identity database, wherein, the step among the step b (3) further comprises:
For every group of network application service recorder that is associated, with the network application sign AID of every network application service recorder
nWith accesses identity sign UID
nConstitute two tuple (AID
n, UID
n), and obtain the network identity sign and collect { (AID through redundant processing of past
n, UID
n) | n 〉=1}.
The method of above-mentioned automatic building network personal identity database, wherein, step c further comprises:
Collect { (AID for each network identity sign
n, UID
n) | n 〉=1}, do following operation and be inserted into online personal identity database:
For first identify label (AID
1, UID
1), if there has been this identify label in the online personal identity database, this network identity sign is collected { (AID
n, UID
n) | the network identity sign that n 〉=1} merges under this identify label in the online personal identity database collects; Otherwise, in online personal identity database, create this network identity sign and collect { (AID
n, UID
n) | n 〉=1};
Check other identify label (AID successively
n, UID
n) (n 〉=2), if identify label (AID
n, UID
n) (n 〉=2) network identity sign of also being present in the online personal identity database other collects, and these two network identities signs under this identify label are collected merging.
The present invention contrasts prior art following beneficial effect: the present invention does association analysis to the network access information and the network application use information that provide through pretreated network monitoring equipment, the identify label that once up and down the pairing all-network in same address is used in the line process is classified as the employed sign of the same network user, realization collects corresponding to the same network user's heterogeneous networks identify label, thereby finishes the automatic structure of online personal identity database.Compared with prior art, not only can support on a large scale, the typing and the arrangement of multi-layer network user's mass data, also realize the real-time update and the maintenance of online personal identity database, for comprehensively, network supervision provides solid technical support timely.
Description of drawings
Fig. 1 is the flow chart of a preferred embodiment of the method for automatic building network personal identity database of the present invention.
Embodiment
The invention will be further described below in conjunction with drawings and Examples.
Fig. 1 shows the flow process of a preferred embodiment of the method for automatic building network personal identity database of the present invention.See also Fig. 1, each step in this method flow is described in detail below in conjunction with an instantiation.
The data source explanation: information and network access information are used in the used network application of the present invention, all can get by existing equipment collection and the preliminary treatment of process prior art.
Suppose that in the present embodiment employed network application uses information to use shown in the information table 1 as network application:
UID | AID | Add | Time |
chenjie518 | hotmail.com | 210.221.85.121 | 2006-05-22 09:31:18 |
shihaina11 | msn.com | 210.56.188.18 | 2006-05-22 09:32:44 |
xiaycn | hotmail.com | 222.217.33.178 | 2006-05-22 09:32:58 |
cuiyu | 208.26.185.5 | ||
93430153 | qq.com | 208.26.185.56 | 2006-05-22 09:33:11 |
48973396 | qq.com | 180.55.86.231 | 2006-05-22 09:33:16 |
11140676 | qq.com | 231.34.71.221 | 2006-05-22 09:33:38 |
yutang | yahoo.com | 202.112.222.22 | |
7208100 | qq.com | 210.221.85.121 | 2006-05-22 09:34:08 |
196621189 | qq.com | 210.56.188.18 | 2006-05-22 09:34:16 |
8169293 | qq.com | 222.217.33.178 | 2006-05-22 09:34:38 |
msn.com | 222.56.32.12 | 2006-05-22 09:34:58 | |
rouzheng | hotmail.com | 210.56.181.155 | 2006-05-22 09:35:25 |
40917195 | qq.com | 210.221.85.121 | 2006-05-22 09:35:53 |
Suppose that in the present embodiment employed network access information is shown in network access information table 2:
AEID | ADD | DUR |
02368327840 | 210.221.85.121 | 2006-05-2209:28:28 |
2006-05-2210:08:18 | ||
02368327840 | 210.221.85.123 | 2006-05-2209:28:28 |
02347524189 | 222.217.33.178 | 2006-05-2209:15:18 2006-05-2209:33:25 |
4f:05:96:0a:00:00 | 203.66.231.82 | 2006-05-2209:31:18 2006-05-2209:31:18 |
4f:05:96:0a:00:00 | 203.66.231.82 | 2006-05-2209:31:18 |
6c:02:96:0a:00:00 | 210.56.188.18 | 2006-05-2209:01:18 2006-05-2211:07:32 |
8613896275678 | 220.221.185.12 | 2006-05-2209:31:18 2006-05-2209:32:18 |
Step S1: check network application use information table 1, the network application service recorder that the deletion record field is incomplete, guarantee that every network application service recorder comprises network application sign AID, accesses identity sign UID, reference address Add and access time Time at least, obtains network application and uses information table 3.Check network access information table 2 simultaneously, the network insertion record that the deletion record field is incomplete guarantees that every network insertion record comprises that at least network access equipment sign AEID, user distribute address ADD and the online period DUR of user, obtain network access information table 4.
According to above-mentioned mode, obtain network application and use information table 3:
UID | AID | Add | Time |
chenjie518 | hotmail.com | 210.221.85.121 | 2006-05-22 09:31:18 |
shihaina11 | msn.com | 210.56.188.18 | 2006-05-22 09:32:44 |
xiaycn | hotmail.com | 222.217.33.178 | 2006-05-22 09:32:58 |
93430153 | qq.com | 208.26.185.56 | 2006-05-22 09:33:11 |
48973396 | qq.com | 180.55.86.231 | 2006-05-22 |
09:33:16 | |||
11140676 | qq.com | 231.34.71.221 | 2006-05-22 09:33:38 |
7208100 | qq.com | 210.221.85.121 | 2006-05-22 09:34:08 |
196621189 | qq.com | 210.56.188.18 | 2006-05-22 09:34:16 |
8169293 | qq.com | 222.217.33.178 | 2006-05-22 09:34:38 |
rouzheng | hotmail.com | 210.56.181.155 | 2006-05-22 09:35:25 |
40917195 | qq.com | 210.221.85.121 | 2006-05-22 09:35:53 |
Obtain network access information table 4 simultaneously:
AEID | ADD | DUR |
02368327840 | 210.221.85.121 | 2006-05-2209:28:28 2006-05-2210:08:18 |
02347524189 | 222.217.33.178 | 2006-05-2209:15:18 2006-05-2209:33:25 |
4f:05:96:0a:00:00 | 203.66.231.82 | 2006-05-2209:31:18 2006-05-2209:31:18 |
6c:02:96:0a:00:00 | 210.56.188.18 | 2006-05-2209:01:18 2006-05-2211:07:32 |
8613896275678 | 220.221.185.12 | 2006-05-2209:31:18 2006-05-2209:32:18 |
Step S2: network access information and network application use information are carried out the address correlation processing.
Specifically, use the all-network application service recorder in the information table 3 to divide into groups according to reference address to network application; For the identical network application service recorder of arbitrary group access address Add, if exist a user to distribute the address ADD network insertion record identical with this reference address Add, then this group network is used network application service recorder subclass of service recorder formation; Otherwise the network application sign that each the bar network application service recorder in this group comprises and accesses identity sign constitutes a network identity sign and collects { (AID, UID) }.
Obtain plurality of network thus and use the service recorder subclass:
Network application service recorder subclass 1:
UID | AID | Add | Time |
chenjie518 | hotmail.com | 210.221.85.121 | 2006-05-22 09:31:18 |
7208100 | qq.com | 210.221.85.121 | 2006-05-22 09:34:08 |
40917195 | qq.com | 210.221.85.121 | 2006-05-22 09:35:53 |
Network application service recorder subclass 2:
UID | AID | Add | Time |
xiaycn | hotmail.com | 222.217.33.178 | 2006-05-22 09:32:58 |
8169293 | qq.com | 222.217.33.178 | 2006-05-22 09:34:38 |
Network application service recorder subclass 3:
UID | AID | Add | Time |
shihaina11 | msn.com | 210.56.188.18 | 2006-05-22 09:32:44 |
196621189 | qq.com | 210.56.188.18 | 2006-05-22 09:34:16 |
And obtain following network identity sign and collect: { (qq.com, 93430153) }, { (qq.com, 48973396) }, { (qq.com, 11140676) } and { (hotmail.com, rouzheng) }.
Step S3: according to network access information the network application service recorder in the network application service recorder subclass is carried out association in time and handle.
Specifically, for network application service recorder subclass 1,2 and 3, whether the access time Time1 and the Time2 that judge per two the network application service recorders in each network application service recorder subclass drop between same the online period DUR of user in the network insertion record, if then these two network application service recorders are associated, otherwise these two network application service recorders are unconnected.
Obtain several associated group of network application service recorder thus:
Associated group 1:
UID | AID | Add | Time |
chenjie518 | hotmail.com | 210.221.85.121 | 2006-05-22 09:31:18 |
7208100 | qq.com | 210.221.85.121 | 2006-05-22 09:34:08 |
40917195 | qq.com | 210.221.85.121 | 2006-05-22 09:35:53 |
Associated group 2:
UID | AID | Add | Time |
xiaycn | hotmail.com | 222.217.33.178 | 2006-05-22 09:32:58 |
Associated group 3:
UID | AID | Add | Time |
8169293 | qq.com | 222.217.33.178 | 2006-05-22 09:34:38 |
Associated group 4:
UID | AID | Add | Time |
shihaina11 | msn.com | 210.56.188.18 | 2006-05-22 09:32:44 |
196621189 | qq.com | 210.56.188.18 | 2006-05-22 09:34:16 |
Step S4: obtain the network identity sign from the network application service recorder that is associated and collect.
Specifically, for every group of network application service recorder that is associated, with the network application sign AID of every network application service recorder
nWith accesses identity sign UID
nConstitute two tuple (AID
n, UID
n), and through redundant processing of past, obtain the network identity sign and collect { (AID
n, UID
n) | n 〉=1}.
Obtaining following network identity sign thus collects:
{ (hotmail.com, chenj ie518), (qq.com, 7208100), (qq.com, 40917195) }, { (hotmail.com, xiaycn) }, { (qq.com, 8169293) } and { (msn.com, shihaina11), (qq.com, 196621189) }.
Step S5: resulting network identity sign collected be inserted in the online personal identity database.
Concrete insertion method is: (1) is for first identify label (AID
1, UID
1), if there has been this identify label in the online personal identity database, this network identity sign is collected { (AID
n, UID
n) | the network identity sign that n 〉=1} merges under this identify label in the online personal identity database collects; Otherwise, in online personal identity database, create this network identity sign and collect { (AID
n, UID
n) | n 〉=1}.
(2) check other identify label (AID successively
n, UID
n) (n 〉=2), if identify label (AID
n, UID
n) (n 〉=2) network identity sign of also being present in the online personal identity database other collects, and these two network identities signs under this identify label are collected merging.
In this example, processing through above-mentioned steps S1~S4, obtaining following network identity sign collects: { (hotmail.com, chenj ie518), (qq.com, 7208100), (qq.com, 40917195) }, { (hotmail.com, xiaycn) }, { (qq.com, 8169293) }, (msn.com, shihainall), (qq.com, 19662ll89) }, { (qq.com, 93430153) }, { (qq.com, 48973396) }, { (qq.com, 11140676) } and { (hotmail.com, rouzheng) }.
Suppose existing online personal identity database, now intercept in this online personal identity database and identify relevant record with above-mentioned network identity, as shown in table 6:
In table 6, all (AID that record is included
n, UID
n) constitute a network identity sign and collect, its corresponding SeqID collects unique number in online personal identity database as this, omits here.In order to save the space, uncorrelated record in the middle of in table 6, having deleted, and make that all records are adjacent.
Collecting { (hotmail.com, chenjie518), (qq.com, 7208100), (qq.com, 40917195) } with network identity sign below is example, introduces this insertion process:
(1) for identify label (hotmail.com, chenjie518), find Already in the online personal identity database, event collects this network identity sign and merges to (hotmail.com in the online personal identity database, chenjie518) the network identity sign under collect (hotmail.com, chenjie518), (yahoo.com.cn, cj8868) }, the record that therefore in online personal identity database, has corresponding newly-generated network identity sign to collect:
SeqID | (AID 1,UID 1) | (AID 2,UID 2) | (AID 3, UID 3) | (AID 4, UID 4) | (AID 5, UID 5) |
?xxxxxxxxxxx | (hotmail.com, chenjie518) | (yahoo.com.cn, cj8868) | (qq.com, 7208100) | (qq.com, 40917195) | nul1 |
(2) check identify label successively, during other network identity of finding all not appear at this online personal identity database collects, so this insertion process that collects end.
Collect for above-mentioned other network identity sign and to finish the similarly insertion process in online personal identity database, obtain new online personal identity database, it is as shown in table 7 to revise part:
From the above embodiments as can be known, from initial pending information check, association process to record, and last network identity identifies the insertion that collects, all can finish automatically, and need not artificial the intervention or operation, this on a large scale, the typing of multi-layer network user's mass data is very effective with arrangement.And, the employed network identity sign of the same network user who causes owing to the not congruent reason of information in the insertion process that network identity sign collects is not included into the same problem such as online personal identity database that collects or do not include in fully, the real-time update of follow-up online personal identity database with safeguard in progressively solved.Therefore, compare with the construction method of manual registration typing online personal identity database, the present invention has substantive distinguishing features and marked improvement.
The foregoing description provides to those of ordinary skills and realizes or use of the present invention; those of ordinary skills can be under the situation that does not break away from invention thought of the present invention; the foregoing description is made various modifications or variation; thereby protection scope of the present invention do not limit by the foregoing description, and should be the maximum magnitude that meets the inventive features that claims mention.
Claims (6)
1. the method for an automatic building network personal identity database comprises:
A. the preparation of pending information, information is used in screening network access information and network application;
B. network access information and network application use information are carried out address and temporal association process, obtaining the plurality of network identify label collects, wherein step b further comprises: (1) carries out the address correlation processing with network access information and network application use information, obtains plurality of network application service recorder subclass and plurality of network identify label and collects; (2) according to network access information the network application service recorder in those network application service recorder subclass being carried out association in time handles; (3) obtaining the plurality of network identify label from the network application service recorder that is associated collects;
C. resulting network identity sign is collected and be inserted in the online personal identity database.
2. the method for automatic building network personal identity database according to claim 1, it is characterized in that the preliminary treatment of step a is by checking that screening makes every the network insertion record that constitutes those network access informations comprise that at least network access equipment sign, user distribute address and online period of user; Constituting those network applications uses every network application service recorder of information to comprise network application sign, accesses identity sign, reference address and access time at least.
3. the method for automatic building network personal identity database according to claim 2 is characterized in that, the step among the step b (1) further comprises:
According to reference address all those network application service recorders are divided into groups; For the identical network application service recorder in arbitrary group access address, if exist a user to distribute the address network insertion record identical with this reference address, then this group network is used network application service recorder subclass of service recorder formation; Otherwise the network application sign that each the bar network application service recorder in this group comprises and accesses identity sign constitutes a network identity sign and collects { (AID, UID) }, and wherein AID represents the network application sign, and UID represents the accesses identity sign.
4. the method for automatic building network personal identity database according to claim 3 is characterized in that, the step among the step b (2) further comprises:
For those network application service recorder subclass, whether the access time of judging per two the network application service recorders in each network application service recorder subclass drops on same the user in the network insertion record between the online period, if then these two network application service recorders are associated, otherwise these two network application service recorders are unconnected.
5. the method for automatic building network personal identity database according to claim 4 is characterized in that, the step among the step b (3) further comprises:
For every group of network application service recorder that is associated, with the network application sign AID of every network application service recorder
nWith accesses identity sign UID
nConstitute two tuple (AID
n, UID
n), and obtain the network identity sign and collect { (AID through redundant processing of past
n, UID
n) | n 〉=1}.
6. the method for automatic building network personal identity database according to claim 5 is characterized in that, step c further comprises:
Collect { (AID for each network identity sign
n, UID
n) | n 〉=1}, do following operation and be inserted into online personal identity database:
For first identify label (AID
1, UID
1), if there has been this identify label in the online personal identity database, this network identity sign is collected { (AID
n, UID
n) | the network identity sign that n 〉=1} merges under this identify label in the online personal identity database collects; Otherwise, in online personal identity database, create this network identity sign and collect { (AID
n, UID
n) | n 〉=1};
Check other identify label (AID successively
n, UID
n) (n 〉=2), if identify label (AID
n, UID
n) (n 〉=2) network identity sign of also being present in the online personal identity database other collects, and these two network identities signs under this identify label are collected merging.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006101487250A CN101212337B (en) | 2006-12-30 | 2006-12-30 | Method for constructing online personal identity database automatically |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN2006101487250A CN101212337B (en) | 2006-12-30 | 2006-12-30 | Method for constructing online personal identity database automatically |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101212337A CN101212337A (en) | 2008-07-02 |
CN101212337B true CN101212337B (en) | 2011-12-28 |
Family
ID=39612038
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2006101487250A Expired - Fee Related CN101212337B (en) | 2006-12-30 | 2006-12-30 | Method for constructing online personal identity database automatically |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101212337B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102186173B (en) * | 2011-04-26 | 2013-08-07 | 广州市动景计算机科技有限公司 | Identity authentication method and system |
CN106982443B (en) * | 2016-01-18 | 2020-10-30 | 中国移动通信集团河北有限公司 | Service distribution method and device |
CN110968584B (en) * | 2019-12-03 | 2023-03-14 | 北京明略软件系统有限公司 | Portrait generation system, method, electronic device and readable storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5878420A (en) * | 1995-08-31 | 1999-03-02 | Compuware Corporation | Network monitoring and management system |
CN1437359A (en) * | 2002-02-07 | 2003-08-20 | 华为技术有限公司 | Control method of network access of user to log on |
-
2006
- 2006-12-30 CN CN2006101487250A patent/CN101212337B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5878420A (en) * | 1995-08-31 | 1999-03-02 | Compuware Corporation | Network monitoring and management system |
CN1437359A (en) * | 2002-02-07 | 2003-08-20 | 华为技术有限公司 | Control method of network access of user to log on |
Also Published As
Publication number | Publication date |
---|---|
CN101212337A (en) | 2008-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110462604A (en) | The data processing system and method for association internet device are used based on equipment | |
US10162880B1 (en) | Cohort selection with privacy protection | |
US8661048B2 (en) | Crime investigation tool and method utilizing DNA evidence | |
CN101178798A (en) | Method for monitoring process flow across business system | |
Al-Janabi | A proposed framework for analyzing crime data set using decision tree and simple k-means mining algorithms | |
CN101212337B (en) | Method for constructing online personal identity database automatically | |
CN113535518A (en) | Distributed real-time dynamic monitoring method and system for user behaviors | |
JP3915011B2 (en) | Skill analysis method, skill analysis program, and skill analysis apparatus | |
Voorhees | Coopetition in IR research | |
CN1347053A (en) | System and method for training and managing basic ability | |
CN113392420A (en) | Intelligent project data management method and system | |
US20080281826A1 (en) | Managing potential clinical trial participants | |
Duskin et al. | Echo Chambers in the Age of Algorithms: An Audit of Twitter’s Friend Recommender System | |
Kalton | Probability vs. nonprobability sampling: from the birth of survey sampling to the present day | |
CN104809547A (en) | Service rating system based on facts and service results, and rating method thereof | |
CN114757805A (en) | Block chain-based convenient government affair service system | |
CN110457309A (en) | A kind of database for metal material characterization parameter | |
Liu et al. | Research on application of data mining in hospital management | |
Azadfallah | A hybrid MCDM approach for ranking suppliers by considering ethical factors | |
Chin et al. | Identifying active subgroups in online communities | |
CN111221906A (en) | Alliance block chain-based plant seed management system and method | |
CN116957521B (en) | Flow approval system capable of being flexibly customized | |
Wang | [Retracted] Internet Entrepreneurship Information Resource Sharing System Based on Improved Deep Learning Algorithm | |
Salahbrahim et al. | Some insight on dynamics of posts and citations in different blog communities | |
Prasetio et al. | The Impact of Traffic Source on Page Views |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20111228 Termination date: 20181230 |