CN105515914B - A kind of method and device for distributing flow for Push message - Google Patents

A kind of method and device for distributing flow for Push message Download PDF

Info

Publication number
CN105515914B
CN105515914B CN201510992612.8A CN201510992612A CN105515914B CN 105515914 B CN105515914 B CN 105515914B CN 201510992612 A CN201510992612 A CN 201510992612A CN 105515914 B CN105515914 B CN 105515914B
Authority
CN
China
Prior art keywords
push message
ziwen
alternative
user
dimension
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510992612.8A
Other languages
Chinese (zh)
Other versions
CN105515914A (en
Inventor
高云翔
夏剑
王汝金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wireless Living (hangzhou) Mdt Infotech Ltd
Original Assignee
Wireless Living (hangzhou) Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wireless Living (hangzhou) Mdt Infotech Ltd filed Critical Wireless Living (hangzhou) Mdt Infotech Ltd
Priority to CN201510992612.8A priority Critical patent/CN105515914B/en
Publication of CN105515914A publication Critical patent/CN105515914A/en
Application granted granted Critical
Publication of CN105515914B publication Critical patent/CN105515914B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention discloses a kind of method and devices that flow is distributed for Push message, this method comprises: disassembling Push message at least one dimension, contain at least two alternative Ziwen case in each dimension;Hash Round Robin data partition is evenly distributed at least two alternative Ziwen cases;The User ID for obtaining a user in pre-set user group carries out Hash to User ID using hash function, obtains at least one first cryptographic Hash, the quantity of the first cryptographic Hash is identical as the quantity for the dimension that Push message is disassembled;Assignment of traffic address is obtained at least one first cryptographic Hash modulus;The Hash Round Robin data partition of assignment of traffic address and alternative Ziwen case is compared, determines the corresponding alternative Ziwen case in assignment of traffic address;It include the Push message of alternative Ziwen case to user's push.Above-mentioned technical proposal disassembles Push message at least one dimension, and each dimension individually carries out flow rate test, can obtain bigger test flow.

Description

A kind of method and device for distributing flow for Push message
Technical field
The present invention relates to Internet technical field, in particular to a kind of method and device that flow is distributed for Push message.
Background technique
Push is a kind of content distribution mechanism, using the working method of customer end/server mode, it is desirable that server is not required to It wants client to issue specific request to be just distributed required content, be most commonly used in messaging systems.Push service There are following several applications: user's customized information, refers mainly to user by actively subscribing to or operating, given subscription condition is interior Hold provider and appropriate information is actively sent to user according to corresponding subscription condition;Sending bulk message, referring to user, there is no actively The content Push for being subscribed to, but being initiated by third party, for example, the Push that user can receive different application push daily disappears Breath.
Currently, backstage operation personnel can push Push message to user daily, the quality of Push official documents and correspondence will have a direct impact on DAU (day any active ues), operation personnel can only write Push official documents and correspondence in advance at present, and property is sent to total user again.Operation exists Quality can not be predicted in advance when writing Push official documents and correspondence, also lack subsequent comparison, if things go on like this, the quality of Push official documents and correspondence can not It is promoted.
Summary of the invention
In view of the above problems, it proposes on the present invention overcomes the above problem or at least be partially solved in order to provide one kind State a kind of method and device that flow is distributed for Push message of problem.The count protocol is as follows:
The present invention provides a kind of method for distributing flow for Push message, comprising:
The Push message is disassembled as at least one dimension, contains at least two alternative Ziwen case in each dimension;
Hash Round Robin data partition is evenly distributed for described at least two alternative Ziwen cases;
The User ID for obtaining a user in pre-set user group carries out Hash to the User ID using hash function, Obtain at least one first cryptographic Hash, the quantity phase for the dimension that the quantity of first cryptographic Hash is disassembled with the Push message Together;
Assignment of traffic address is obtained at least one described first cryptographic Hash modulus;
The Hash Round Robin data partition of the assignment of traffic address and the alternative Ziwen case is compared, determines the assignment of traffic The corresponding alternative Ziwen case in address;
It include the Push message of the alternative Ziwen case to user push.
In one embodiment, described that assignment of traffic address is obtained at least one described first cryptographic Hash modulus, it can wrap It includes:
Select a prime number as changing pattern respectively for the first cryptographic Hash;
Modulus calculating is carried out to first cryptographic Hash according to first cryptographic Hash corresponding prime number, obtains the second Hash Value;
Kazakhstan to second cryptographic Hash modulus again, in the assignment of traffic address of acquisition and the alternative Ziwen case Uncommon address is corresponding.
In one embodiment, after the Push message comprising the alternative Ziwen case to user push, The method may also include that
Monitor whether the user in the pre-set user group opens the Push message;
Count the opening situation of user's Push message in the pre-set user group;
Disappeared according to the opening situation of Push message in the pre-set user group to the total user of application push Push Breath.
In one embodiment, the opening situation of user's Push message in the statistics pre-set user group, it may include:
The opening rate of the alternative Ziwen case in each dimension of Push message is counted respectively;
The highest alternative Ziwen case of opening rate in each dimension of Push message is determined respectively;
The opening situation according to Push message in the pre-set user group is pushed to the total user of the application Push message, comprising:
The highest alternative Ziwen case of opening rate in each dimension is combined into completely Push message to be pushed;
The Push message to be pushed is pushed to the total user of the application.
The present invention also provides a kind of devices that flow is distributed for Push message, comprising:
Module being disassembled, including at least two in each dimension for disassemble the Push message at least one dimension A alternative Ziwen case;
Distribution module, for evenly distributing Hash Round Robin data partition for described at least two alternative Ziwen cases;
First computing module, for obtaining the User ID of a user in pre-set user group, using hash function to institute It states User ID and carries out Hash, obtain at least one first cryptographic Hash, the quantity of first cryptographic Hash is torn open with the Push message The quantity of the dimension of solution is identical;
Second computing module, for obtaining assignment of traffic address at least one described first cryptographic Hash modulus;
Determining module, for the Hash Round Robin data partition of the assignment of traffic address and the alternative Ziwen case to be compared, really Determine the corresponding alternative Ziwen case in the assignment of traffic address;
First pushing module, for including the Push message of the alternative Ziwen case to user push.
In one embodiment, second computing module, it may include:
Submodule is selected, for selecting a prime number as changing pattern respectively for the first cryptographic Hash;
First computational submodule, for being taken according to the corresponding prime number of first cryptographic Hash to first cryptographic Hash Mould calculates, and obtains the second cryptographic Hash;
Second computational submodule, for second cryptographic Hash modulus again, until acquisition assignment of traffic address with Hash Round Robin data partition in the alternative Ziwen case is corresponding.
In one embodiment, described device may also include that
Monitoring modular, for monitoring whether the user in the pre-set user group opens the Push message;
Statistical module, for counting the opening situation of user's Push message in the pre-set user group;
Second pushing module, for according to the opening situation of Push message in the pre-set user group to the complete of the application Body user pushes Push message.
In one embodiment, the statistical module, it may include:
Statistic submodule, the opening rate of the alternative Ziwen case in each dimension for counting Push message respectively;
Determine submodule, the highest alternative Ziwen case of opening rate in each dimension for determining Push message respectively;
Second pushing module, comprising:
Submodule is combined, for the highest alternative Ziwen case of opening rate in each dimension to be combined into completely wait push Push message;
Submodule is pushed, for pushing the Push message to be pushed to the total user of the application.
The technical solution that the embodiment of the present invention provides can include the following benefits:
Push message, is carried out the dismantling of dimension by the above-mentioned technical proposal of the embodiment of the present invention, and each dimension individually carries out Flow rate test, it is hereby achieved that bigger test flow.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification It obtains it is clear that understand through the implementation of the invention.The objectives and other advantages of the invention can be by written explanation Specifically noted structure is achieved and obtained in book, claims and attached drawing.
Below by drawings and examples, technical scheme of the present invention will be described in further detail.
Detailed description of the invention
Attached drawing is used to provide further understanding of the present invention, and constitutes part of specification, with reality of the invention It applies example to be used to explain the present invention together, not be construed as limiting the invention.In the accompanying drawings:
Fig. 1 be in the embodiment of the present invention it is a kind of be Push message distribution method of flow flow chart;
Fig. 2 is a kind of flow chart for being step S14 in Push message distribution method of flow in the embodiment of the present invention;
Fig. 3 is the flow chart that another kind is Push message distribution method of flow in the embodiment of the present invention;
Fig. 4 be in the embodiment of the present invention it is a kind of be Push message distribution flow apparatus block diagram;
Fig. 5 be in the embodiment of the present invention it is a kind of be Push message distribution flow apparatus in the second computing module 44 block diagram;
Fig. 6 is the block diagram that another kind is Push message distribution flow apparatus in the embodiment of the present invention.
Specific embodiment
Hereinafter, preferred embodiments of the present invention will be described with reference to the accompanying drawings, it should be understood that preferred reality described herein Apply example only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention.
In the present invention, the operation personnel of application gets out multiple alternative official documents and correspondences of Push message in advance, passes through automation This multiple alternative official documents and correspondence is uniformly issued real user, then finds opening rate highest by way of statistics by small flow rate test That official documents and correspondence, opening rate is highest, be exactly naturally it is best, next the highest alternative official documents and correspondence of this opening rate can be sent To remaining all users.
Fig. 1 show a kind of flow chart that method of flow is distributed for Push message in the embodiment of the present invention, as shown in Figure 1, Include the following steps S11-S16:
Step S11 disassembles Push message at least one dimension, contains at least two alternative Ziwen in each dimension Case;
It is shown in Table one, there are three the alternative Ziwen cases of dimension 1, and be respectively: " guessing that you like " " being specific to you ", " pushes away for you It recommends ".
Table one
Scheme 1 Scheme 2 Scheme 3
Dimension 1 Guess that you like It is specific to you For your recommendation
Dimension 2 High popularity It sells out of my mind Selected
Dimension 3 Always there is one to be suitble to you It is bought Deng you It does not take action also
Step S12 evenly distributes Hash Round Robin data partition at least two alternative Ziwen cases;
Hash Round Robin data partition is evenly distributed for the alternative Ziwen case of each of dimension, for example, there are three test dimensions for each dimension Degree, has 100 Hash Round Robin data partitions, is divided into three points, be shown in Table one, 1-33 and belong to scheme 1,34-66 belongs to scheme 2,67-100 Belong to scheme 3.
Step S13 is obtained the User ID of a user in pre-set user group, is breathed out using hash function to User ID It is uncommon, at least one first cryptographic Hash is obtained, the quantity of the first cryptographic Hash is identical as the quantity for the dimension that Push message is disassembled;
Pre-set user group is the user group for testing Push message opening rate, can be a certain using the one of total user Part, for example, 10% or 20%.User ID for example can be the phone number of user.Arbitrary string can be generated, use Hash function carries out Hash to the character string, obtains a basic cryptographic Hash, i.e. the first cryptographic Hash.
Step S14 obtains assignment of traffic address at least one first cryptographic Hash modulus;
The Hash Round Robin data partition of assignment of traffic address and alternative Ziwen case is compared, determines assignment of traffic address by step S15 Corresponding alternative Ziwen case;
Modulo operation is carried out to the first cryptographic Hash and obtains assignment of traffic address, since each dimension there should be an assignment of traffic Address, therefore, the quantity of the assignment of traffic address of acquisition are identical as the quantity for the dimension that Push message is disassembled.
Step S16 includes the Push message of alternative Ziwen case to user's push.
In order to make full use of flow, in step S11, a Push message is disassembled as multiple dimensions, each dimension is independent It is tested.The Push message of one standard includes Push title, Push content etc..For example, a complete Push message is " guessing that you like [sexuality sleeps skirt] of high popularity herein, always have one to be suitble to you ", this Push message can be disassembled is 3 A dimension " guessing that you like ", " high popularity ", " always thering is one to be suitble to you ".Wherein, " guessing that you like " is Push title, " high people Gas ", " always thering is one to be suitble to you " be Push content.Each dimension can have multiple alternative Ziwen cases, select from each dimension Select an alternative Ziwen case, so that it may be combined into the Push message of a completion.
When pushing Push message, the alternative Ziwen case in each dimension can be replaced mutually, for example, title (dimension 1) " guessing that you like " could alternatively be " being specific to you ", " for your recommendation " etc.;Several keywords in content (dimension 2) can also replace It changes, for example " high popularity " could alternatively be " selling out of my mind ", " selected ";Other several keywords in content (dimension 3) It can also replace, for example, " always having one to be suitble to you " could alternatively be " waiting you to buy ", " not taking action also ".
See table one above, these schemes can be freely combined, a shared kind side 3*3*3=27 in example just Case.
Common test can be divided in portion test flow give this 27 schemes, if the flow with 10% is surveyed Examination, then the flow of each scheme distribution are as follows: 10%/27=0.37%.However among real system, 0.37% flow is not It is enough to support significant statistical data.Assuming that sending Push message to 100 general-purpose families daily, each scheme can get 3700 User, calculates according to millesimal opening rate, this scheme only has 3-4 user that can open, it is clear that can not count quasi- in this way The opening rate of this true scheme, it is bad for also can not just assessing this scheme.
The above method of the embodiment of the present invention, the scheme tested using fractional dimension.Each dimension is single in the space of oneself Solely test, to obtain maximum test flow.
For example, Push message has 3 dimensions, the dimension 1 that is obtained in step S14, dimension 2, the assignment of traffic of dimension 3 Location is respectively 28,68,45, then is shown in Table two
Table two
By aforesaid operations, for this user, the consequently recommended official documents and correspondence of Push message are as follows:
" guess that you like
Selected [sexuality sleeps skirt] all herein, waits you to buy "
Above-mentioned steps S11-S16 is carried out to each of pre-set user group user, then each user obtains one A recommendation official documents and correspondence can individually count the effect of official documents and correspondence under each dimension in this way, each dimension is mutually indepedent.Assuming that test stream Amount accounts for the 20% of whole flows in total, then each official documents and correspondence can obtain 6.7% flow.Much larger than 0.37% tested together Flow.
Push message is carried out the dismantling of dimension by the above method of the invention, and each dimension is individually tested, so as to obtain Obtain bigger test flow.
In one embodiment, as shown in Fig. 2, step S14 is implementable for following steps S21-S23:
Step S21 selects a prime number as changing pattern respectively for the first cryptographic Hash;
Step S22 carries out modulus calculating to the first cryptographic Hash according to the corresponding prime number of the first cryptographic Hash, obtains the second Hash Value;
Step S23, the Kazakhstan to the second cryptographic Hash modulus again, in the assignment of traffic address of acquisition and alternative Ziwen case Uncommon address is corresponding.
For example, a first basic cryptographic Hash is calculated to User ID (such as telephone number 13545678901), then take Three different prime numbers greater than 100 are as changing pattern.Certain User ID takes and obtains numerical value 11873465938 after Hash, also with For 3 dimensions, take three big prime number as changing pattern: 49957,49991,49993.Modulus calculating is carried out respectively:
11873465938%49957=35877
11873465938%49991=3546
11873465938%49993=28452
Again to the Numerical-Mode 100 after calculating, assignment of traffic address is obtained.
35877%100=77
3546%100=46
28452%100=52
Since 1-33 belongs to scheme 1,34-66 belongs to scheme 2, and 67-100 belongs to scheme 3, has assignment of traffic known to table three each The assignment of traffic situation of dimension:
Table three
By aforesaid operations, for this user, the consequently recommended official documents and correspondence of Push message are as follows:
" for your recommendation
It sells [sexuality sleeps skirt] out of my mind all herein, waits you to buy "
In one embodiment, as shown in figure 3, after step S16, the above method may also include step S17-S19:
Whether step S17, the user monitored in pre-set user group open Push message;
Step S18 counts the opening situation of user's Push message in pre-set user group;
Step S19 disappears according to the opening situation of Push message in pre-set user group to the total user of application push Push Breath.
After the recommendation official documents and correspondence for determining Push message for each user in pre-set user group, in the present embodiment, this is monitored A little opening situations for recommending official documents and correspondence, according to the opening situation of Push message in pre-set user group to be tested, to the entirety of application User pushes Push message.So as to improve the opening rate for applying Push message.
In one embodiment, it is step A1-A2 that step S18 is implementable:
Step A1 counts the opening rate of the alternative Ziwen case in each dimension of Push message respectively;
Step A2 determines the highest alternative Ziwen case of opening rate in each dimension of Push message respectively;
Step S19 implementable is step A3-A4:
The highest alternative Ziwen case of opening rate in each dimension is combined into completely Push to be pushed and disappeared by step A3 Breath;
Step A4 pushes Push message to be pushed to the total user of application.
For example, the opening rate of alternative Ziwen case " being specific to you " is higher than " guessing that you like " and " for your recommendation " in dimension 1 Opening rate;The opening rate of alternative Ziwen case " selling out of my mind " is higher than the opening rate of " high popularity " and " selected " in dimension 2;Dimension The opening rate of alternative Ziwen case " waiting you to buy " is higher than the opening rate of " always having one to be suitble to you " and " not taking action also " in degree 3. Then Push message finally is pushed to the total user of application are as follows:
" it is specific to you
[classical women's bag] out of my mind is sold, waits you to buy "
The method provided through the invention, it is contemplated that after testing on line, user experience is greatly enhanced, Push message Opening rate improve 30%.
It based on the same inventive concept, is that Push message distributes flow apparatus the embodiment of the invention also provides one kind, due to The principle of the solved problem of the device distributes for Push message that method of flow is similar, therefore the implementation of the device can be joined to aforementioned See the implementation of preceding method, overlaps will not be repeated.
Fig. 4 show a kind of block diagram for the device that flow is distributed for Push message in the embodiment of the present invention, as shown in figure 4, The device includes:
Module 41 being disassembled, for disassembling Push message at least one dimension, being contained at least two in each dimension Alternative Ziwen case;
Distribution module 42, for evenly distributing Hash Round Robin data partition at least two alternative Ziwen cases;
First computing module 43 uses hash function pair for obtaining the User ID of a user in pre-set user group User ID carries out Hash, obtains at least one first cryptographic Hash, the dimension of quantity and Push the message dismantling of the first cryptographic Hash Quantity is identical;
Second computing module 44, for obtaining assignment of traffic address at least one first cryptographic Hash modulus;
Determining module 45 determines flow for the Hash Round Robin data partition of assignment of traffic address and alternative Ziwen case to be compared Distribute address corresponding alternative Ziwen case;
First pushing module 46, for including the Push message of alternative Ziwen case to user's push.
In one embodiment, as shown in figure 5, the second computing module 44, it may include:
Submodule 51 is selected, for selecting a prime number as changing pattern respectively for the first cryptographic Hash;
First computational submodule 52, by being carried out based on modulus according to the corresponding prime number of the first cryptographic Hash to the first cryptographic Hash It calculates, obtains the second cryptographic Hash;
Second computational submodule 53, for the second cryptographic Hash modulus again, until acquisition assignment of traffic address with it is standby Select the Hash Round Robin data partition in Ziwen case corresponding.
In one embodiment, as shown in fig. 6, above-mentioned apparatus may also include that
Whether monitoring modular 47, the user for monitoring in pre-set user group open Push message;
Statistical module 48, for counting the opening situation of user's Push message in pre-set user group;
Second pushing module 49, for the total user according to the opening situation of Push message in pre-set user group to application Push Push message.
In one embodiment, statistical module 48, it may include:
Statistic submodule, the opening rate of the alternative Ziwen case in each dimension for counting Push message respectively;
Determine submodule, the highest alternative Ziwen case of opening rate in each dimension for determining Push message respectively;
Second pushing module 49, comprising:
Submodule is combined, for the highest alternative Ziwen case of opening rate in each dimension to be combined into completely wait push Push message;
Push submodule, for will Push message be pushed to the total user of application push.
The above-mentioned apparatus of the embodiment of the present invention, the scheme tested using fractional dimension.Each dimension is single in the space of oneself Solely test, to obtain maximum test flow.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The shape for the computer program product implemented in usable storage medium (including but not limited to magnetic disk storage and optical memory etc.) Formula.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (6)

1. a kind of method for distributing flow for Push message characterized by comprising
The Push message is disassembled as at least one dimension, contains at least two alternative Ziwen case in each dimension;
Evenly distribute Hash Round Robin data partition for described at least two alternative Ziwen cases, the value range of the Hash Round Robin data partition be 1-100 it Between natural number;
The User ID for obtaining a user in pre-set user group carries out Hash to the User ID using hash function, obtains At least one first cryptographic Hash, the quantity of first cryptographic Hash are identical as the quantity of dimension that the Push message is disassembled;
Assignment of traffic address is obtained at least one described first cryptographic Hash modulus, the range of the assignment of traffic address is 1- Natural number between 100;
The Hash Round Robin data partition of the assignment of traffic address and the alternative Ziwen case is compared, determines the assignment of traffic address Corresponding alternative Ziwen case;
It include the Push message of the alternative Ziwen case to user push;
It is described that assignment of traffic address is obtained at least one described first cryptographic Hash modulus, comprising:
Select a prime number as changing pattern respectively for the first cryptographic Hash;
Modulus calculating is carried out to first cryptographic Hash according to first cryptographic Hash corresponding prime number, obtains the second cryptographic Hash;
To second cryptographic Hash modulus again, until the Hash in the assignment of traffic address of acquisition and the alternative Ziwen case Location is corresponding.
2. the method as described in claim 1, which is characterized in that include the alternative Ziwen case to user push described Push message after, the method also includes:
Monitor whether the user in the pre-set user group opens the Push message;
Count the opening situation of user's Push message in the pre-set user group;
Push message is pushed to the total user of application according to the opening situation of Push message in the pre-set user group.
3. method according to claim 2, which is characterized in that user's Push message in the statistics pre-set user group Opening situation, comprising:
The opening rate of the alternative Ziwen case in each dimension of Push message is counted respectively;
The highest alternative Ziwen case of opening rate in each dimension of Push message is determined respectively;
The opening situation according to Push message in the pre-set user group disappears to the total user of application push Push Breath, comprising:
The highest alternative Ziwen case of opening rate in each dimension is combined into completely Push message to be pushed;
The Push message to be pushed is pushed to the total user of the application.
4. a kind of device for distributing flow for Push message characterized by comprising
Module being disassembled, for disassembling the Push message at least one dimension, being contained at least two in each dimension standby Select Ziwen case;
Distribution module, for evenly distributing Hash Round Robin data partition, the value of the Hash Round Robin data partition for described at least two alternative Ziwen cases Natural number of the range between 1-100;
First computing module, for obtaining the User ID of a user in pre-set user group, using hash function to the use Family ID carries out Hash, obtains at least one first cryptographic Hash, what the quantity of first cryptographic Hash and the Push message were disassembled The quantity of dimension is identical;
Second computing module, for obtaining assignment of traffic address, the flow point at least one described first cryptographic Hash modulus Range with address is the natural number between 1-100;
Determining module determines institute for the Hash Round Robin data partition of the assignment of traffic address and the alternative Ziwen case to be compared State the corresponding alternative Ziwen case in assignment of traffic address;
First pushing module, for including the Push message of the alternative Ziwen case to user push;
Second computing module, comprising:
Submodule is selected, for selecting a prime number as changing pattern respectively for the first cryptographic Hash;
First computational submodule, by being carried out based on modulus according to the corresponding prime number of first cryptographic Hash to first cryptographic Hash It calculates, obtains the second cryptographic Hash;
Second computational submodule, for second cryptographic Hash modulus again, until acquisition assignment of traffic address with it is described Hash Round Robin data partition in alternative Ziwen case is corresponding.
5. device as claimed in claim 4, which is characterized in that described device further include:
Monitoring modular, for monitoring whether the user in the pre-set user group opens the Push message;
Statistical module, for counting the opening situation of user's Push message in the pre-set user group;
Second pushing module, for being pushed away according to the opening situation of Push message in the pre-set user group to the total user of application Send Push message.
6. device as claimed in claim 5, which is characterized in that the statistical module, comprising:
Statistic submodule, the opening rate of the alternative Ziwen case in each dimension for counting Push message respectively;
Determine submodule, the highest alternative Ziwen case of opening rate in each dimension for determining Push message respectively;
Second pushing module, comprising:
Submodule is combined, for the highest alternative Ziwen case of opening rate in each dimension to be combined into completely Push to be pushed Message;
Submodule is pushed, for pushing the Push message to be pushed to the total user of the application.
CN201510992612.8A 2015-12-24 2015-12-24 A kind of method and device for distributing flow for Push message Active CN105515914B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510992612.8A CN105515914B (en) 2015-12-24 2015-12-24 A kind of method and device for distributing flow for Push message

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510992612.8A CN105515914B (en) 2015-12-24 2015-12-24 A kind of method and device for distributing flow for Push message

Publications (2)

Publication Number Publication Date
CN105515914A CN105515914A (en) 2016-04-20
CN105515914B true CN105515914B (en) 2019-01-25

Family

ID=55723573

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510992612.8A Active CN105515914B (en) 2015-12-24 2015-12-24 A kind of method and device for distributing flow for Push message

Country Status (1)

Country Link
CN (1) CN105515914B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997696A (en) * 2009-08-24 2011-03-30 华为终端有限公司 Method and equipment for transmitting and receiving Push message
CN103440139A (en) * 2013-09-11 2013-12-11 北京邮电大学 Acquisition method and tool facing microblog IDs (identitiesy) of mainstream microblog websites
CN104144098A (en) * 2013-05-07 2014-11-12 腾讯科技(深圳)有限公司 Information pushing method and system and pushing server equipment
CN104252458A (en) * 2013-06-25 2014-12-31 博雅网络游戏开发(深圳)有限公司 Data analysis method and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101997696A (en) * 2009-08-24 2011-03-30 华为终端有限公司 Method and equipment for transmitting and receiving Push message
CN104144098A (en) * 2013-05-07 2014-11-12 腾讯科技(深圳)有限公司 Information pushing method and system and pushing server equipment
CN104252458A (en) * 2013-06-25 2014-12-31 博雅网络游戏开发(深圳)有限公司 Data analysis method and device
CN103440139A (en) * 2013-09-11 2013-12-11 北京邮电大学 Acquisition method and tool facing microblog IDs (identitiesy) of mainstream microblog websites

Also Published As

Publication number Publication date
CN105515914A (en) 2016-04-20

Similar Documents

Publication Publication Date Title
US20200401622A1 (en) System and method for streaming individualized media content
CN106899857B (en) Server load adjusting method, device and server
CN111651510A (en) Data processing method and device, electronic equipment and computer readable storage medium
CN103069413A (en) Customizing content displayed for a user based on user preferences of another user
CN106878415B (en) Load balancing method and device for data consumption
CN110990372A (en) Dimensional data processing method and device and data query method and device
US8793236B2 (en) Method and apparatus using historical influence for success attribution in network site activity
CN105320702A (en) Analysis method and device for user behavior data and smart television
JP2022110000A (en) Method for providing content sharing service, device for the same, and computer program for the same
CN106952085B (en) Method and device for data storage and service processing
US20130007290A1 (en) System and method for providing communication service
JP2013105213A (en) Information recommending device and method, and device and program
CN104468330A (en) Data processing method and device of distributed information queue
CN102982112A (en) Ranking list generation method and journal generation method and server
CN108600780A (en) Method for pushed information
CN110048830A (en) A kind of data encryption and decryption method and encrypting and decrypting device
CN105515914B (en) A kind of method and device for distributing flow for Push message
KR20140031429A (en) Item recommend system and method thereof, apparatus supporting the same
CN106933873A (en) A kind of cross-platform data querying method and equipment
US11977556B2 (en) Determination of result data for small multiples based on subsets of a data set
CN109783185B (en) Cloud virtual machine creating method and device and cloud equipment
Bröring et al. Processing real-time sensor data streams for 3D web visualization
CN107613364B (en) Cross-storage-area picture carousel method and system
JP2014222398A (en) Recommendation rule generation device, recommendation rule generation method and recommendation rule generation program
US20130297380A1 (en) Inventory adjustment based on social network data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant