Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched
The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to
Convenient for description, part relevant to related invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase
Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is shown can be using the method for pushed information of the application or the implementation of the device for pushed information
The exemplary architecture 100 of example.
As shown in Figure 1, system architecture 100 may include terminal device 101,102,103, network 104 and server 105.
Network 104 between terminal device 101,102,103 and server 105 to provide the medium of communication link.Network 104 can be with
Including various connection types, such as wired, wireless communication link or fiber optic cables etc..
Terminal device 101,102,103 is interacted by network 104 with server 105, to receive or send message etc..Terminal
Various client applications can be installed in equipment 101,102,103.
Terminal device 101,102,103 can be hardware, be also possible to software.When terminal device 101,102,103 is hard
When part, it can be the various electronic equipments that can install application, including but not limited to smart phone, tablet computer, e-book is read
Read device, pocket computer on knee and desktop computer etc..When terminal device 101,102,103 is software, can install
In above-mentioned cited electronic equipment.Multiple softwares or software module may be implemented into (such as providing distributed clothes in it
The multiple softwares or software module of business), single software or software module also may be implemented into.It is not specifically limited herein.
Server 105 can be to provide the server of various services, such as the various functions for supporting target application
Server.If being equipped with target application on terminal device 101,102,103, then server 105 can support target application to exist
Normal operation on terminal device 101,102,103.At this point, server 105 can be installed on terminal device 101,102,103
Target application pushed information.Correspondingly, terminal device 101,102,103 can be by the target application installed to user's exhibition
Show the pushed information received.
It should be noted that the method provided by the embodiment of the present application for pushed information is generally held by server 105
Row, correspondingly, the device for pushed information is generally positioned in server 105.
It should be noted that server can be hardware, it is also possible to software.When server is hardware, may be implemented
At the distributed server cluster that multiple servers form, individual server also may be implemented into.It, can when server is software
It, can also be with to be implemented as multiple softwares or software module (such as providing multiple softwares of Distributed Services or software module)
It is implemented as single software or software module.It is not specifically limited herein.
It should be understood that the number of terminal device, network and server in Fig. 1 is only schematical.According to realization need
It wants, can have any number of terminal device, network and server.
With continued reference to Fig. 2, it illustrates the processes according to one embodiment of the method for pushed information of the application
200.This for pushed information method the following steps are included:
Step 201, information to be pushed is obtained, and obtains candidate user identification sets.
In the present embodiment, the candidate user mark in candidate user identification sets, which can be, various can be used in identity user
User identifier.It should be appreciated that due to user by using terminal device receive pushed information, it is therefore possible to use
The corresponding user of the mark for marking of terminal device.Different terminal devices can use different marks.
Optionally, user identifier includes but is not limited to: MAC (Media Access Control, media access control)
Location, IMEI (International Mobile Equipment Identity, international mobile equipment identification number), IDFA
(Identifier For Advertising, ad identifier), UDID (Unique Device Identifier, equipment
Unique identifier), UUID (Universally Unique Identifier, Universally Unique Identifier) etc..
Optionally, user identifier can also use the relevant information of user.User identifier includes but is not limited to: user's postal
The account etc. registered in the target application of case, phone number, user on the terminal device.
Wherein, target application can be under concrete application scene it is being installed on specified terminal device, can receive simultaneously
Show the application of information to be pushed.
It in the present embodiment, can be first for the executing subject of the method for pushed information (server 105 as shown in Figure 1)
First be wirelessly connected or the method for wired connection from local or other storage equipment (terminal device 101 as shown in Figure 1,
102,103) information to be pushed is obtained, and obtains candidate user identification sets.Wherein, information to be pushed and candidate user identification sets
Can be obtained from local or a certain storage equipment, can also one of them from local acquisition, another is from a certain storage equipment
It obtains.It is of course also possible to obtain information to be pushed and candidate user identification sets from third party's data source.
In some optional implementations of the present embodiment, candidate user identification sets can be obtained as follows:
Step 1 obtains at least two user identifier collection, and obtains the user identifier that at least two user identifiers are concentrated
Collect corresponding keyword, obtains at least two keywords.
In this step, at least two user identifier collection and two acquired use can be obtained from third-party platform
The corresponding keyword of family identification sets.User's identification sets and user, which have been locally stored, in above-mentioned executing subject indicates that collection is corresponding
When keyword, user identifier collection directly can be obtained from local.
Step 2 obtains the keyword of information to be pushed.
In this step, similarly, the keyword of information to be pushed can also be from third-party platform or above-mentioned executing subject
Local obtain.It is alternatively possible to extract keyword from information to be pushed using existing various natural language processing methods.
Step 3 concentrates at least two user identifiers according to the keyword of at least two keywords and information to be pushed
User identifier collection carry out set operation so that the keyword of obtained operation result collection corresponding keyword and information to be pushed
Meet preset matching condition.
In this step, matching condition can be determined according to actual application scenarios.For example, the pass of two user identifier collection
Key word is respectively automobile, tourism, and the keyword of information to be pushed is love automobile and has a liking for travel.Matching condition is information to be pushed
The keyword similarity of keyword and operation result collection is greater than preset threshold.At this point it is possible to determine the friendship of two user identifier collection
Collection, obtains operation result collection.
Step 4 determines obtained operation result collection as candidate user identification sets.
Step 202, validated user identification sets are obtained.
In the present embodiment, the user of the validated user mark instruction in validated user identification sets can be target application
User.The user of target application can refer to the user that target application is equipped on used terminal device.Validated user mark
It can be any of the above-described kind of user identifier.
The user identifier for being equipped with the user of target application can be stored in advance in above-mentioned executing subject.At this point it is possible to directly
The user identifier for the user for being equipped with target application being locally stored is formed into validated user identification sets.Above-mentioned executing subject may be used also
To obtain validated user identification sets from third-party platform.
Step 203, determine the intersection of candidate user identification sets and validated user identification sets as target user's identification sets.
In the present embodiment, can be by those not only in candidate user identification sets, but also the use in validated user identification sets
Family mark is identified as target user, to obtain target user's identification sets.
It is that can not receive information to be pushed for the user of installation targets non-on used terminal device application
's.Therefore, the candidate user in candidate user identification sets can be identified and is screened, therefrom deleting those can not receive wait push away
The user identifier of user of breath of delivering letters facilitates the cost for saving push information to be pushed to avoid meaningless push.
Step 204, target user's mark is chosen from target user's identification sets, and is identified to selected target user
The target application push information to be pushed that the terminal device used by a user indicated is installed.
In the present embodiment, there is target since target user identifies installing terminal equipment used in the target user of instruction
Using.Therefore, can to target user identify instruction terminal device used by a user be installed target application push to
Pushed information.Target application can show information to be pushed to user after receiving information to be pushed.
According to actual application demand, target user's mark can be chosen from target user's identification sets, by the mesh of selection
Mark push object of the user of user identifier instruction as information to be pushed.
It is alternatively possible to choose all target users mark in target user's identification sets.
It is alternatively possible to the number of the target user to be chosen mark be preset, then from target user's identification sets
Randomly select preset number target user mark.
In some optional implementations of the present embodiment, target user's mark is being chosen from target user's identification sets
Later, selected target user's mark can also be further stored, using the candidate user as information to be pushed later
Mark.
With continued reference to the signal that Fig. 3, Fig. 3 are according to the application scenarios of the method for pushed information of the present embodiment
Figure 30 0.In the application scenarios of Fig. 3, information to be pushed 301 and candidate user identification sets 302 can be first obtained.Wherein, candidate
User identifier collection 302 includes three candidate user marks, is respectively as follows: mark 1, mark 2 and mark 3.
Later, available validated user identification sets 303.Wherein, validated user identification sets 303 include two validated users
Mark is respectively as follows: mark 1 and mark 2.The installing terminal equipment used by a user that mark 1 and mark 2 indicate respectively has target
Using 305, that is, identifies 1 and identify the user that the user that 2 indicate respectively is target application 305.
It is possible to further determine that candidate user identification sets 302 and the intersection of validated user identification sets 303 are used as target
Family identification sets 304.Wherein, target user's identification sets 304 include mark 1 and mark 2 totally two target user's marks.
Later, the target complete user identifier in target user's identification sets can be chosen, and is referred to mark 1 and mark 2
The user shown the target application 305 that used terminal device is installed respectively pushes information to be pushed 301.
The method provided by the above embodiment of the application by the candidate user identification sets in candidate user identification sets into
The candidate user mark of row screening, the user that the user for therefrom choosing instruction belongs to target application is identified as target user, with
And using the user of the candidate user of selection mark instruction as the push object of information to be pushed, so that invalid push is avoided,
Help to mitigate the network load for pushing information to be pushed.
With further reference to Fig. 4, it illustrates the processes 400 of another embodiment of the method for pushed information.The use
In the process 400 of the method for pushed information, comprising the following steps:
Step 401, information to be pushed is obtained, and obtains candidate user identification sets.
Step 402, validated user identification sets are obtained.
Step 403, determine the intersection of candidate user identification sets and validated user identification sets as target user's identification sets.
The specific implementation procedure of above-mentioned steps 401,402 and 403 can refer to step 201 in Fig. 2 corresponding embodiment,
202 and 203 related description, details are not described herein.
Step 404, invalid subscriber identity collection is obtained.
In the present embodiment, the user for the invalid subscriber identity instruction that invalid subscriber identity is concentrated is that information to be pushed is signified
The user of the article shown.Article indicated by information to be pushed can refer to article described in information to be pushed.Wherein, article can
To be the article of entity.Such as automobile, computer, clothes etc..Article is also possible to virtual article.Such as service, discount coupon,
Token, using etc..
The user of article can refer to the user for having preset relation with article.According to specifically application scenarios, preset relation
Can there are many.For example, preset relation can buy article for user when article is the physical items such as automobile.In article
When for discount coupon, preset relation can possess article for user.Article be in application, preset relation can be user downloading or
Registered application etc..
In the present embodiment, invalid subscriber identity collection can be obtained from third-party platform.It is locally deposited in above-mentioned executing subject
When containing invalid subscriber identity collection, invalid subscriber identity collection directly can be obtained from local.
In some optional implementations of the present embodiment, invalid subscriber identity collection can be determined as follows:
Step 1 obtains the user identifier for browsing the user of information to be pushed as candidate invalid subscriber identity, obtains
Candidate invalid subscriber identity collection.
In this step, if installing terminal equipment used by a user has target application, and user browsed target application
The above-mentioned information to be pushed of push.So, the target application that terminal device used by a user is installed can recorde these use
The user identifier at family, and the user identifier of record is sent to above-mentioned executing subject as candidate invalid subscriber identity.Certainly, on
Candidate invalid subscriber identity can also be obtained from third-party platform by stating executing subject.
Step 2 obtains candidate's inactive users for the candidate invalid subscriber identity that candidate invalid subscriber identity is concentrated
Identify the user of instruction, historical behavior data for the information to be pushed browsed;According to the historical behavior data of acquisition
Determine candidate's invalid subscriber identity instruction user whether be article indicated by information to be pushed user;In response to determination
The user of candidate's invalid subscriber identity instruction is the user of article indicated by information to be pushed, by candidate's inactive users mark
Knowledge is added to invalid subscriber identity collection.
In this step, if the installing terminal equipment used by a user of candidate invalid subscriber identity instruction has target to answer
With, and user browsed the above-mentioned information to be pushed of target application push.So, terminal device used by a user is installed
Target application can recorde user to the historical behavior data of the information to be pushed browsed, and by the historical behavior data of user
It is sent to above-mentioned executing subject.Certainly, above-mentioned executing subject can also obtain candidate invalid subscriber identity from third-party platform and refer to
The user shown, historical behavior data for the information to be pushed browsed.
It optionally, can be by determining user whether to browsing wait push by the analysis to historical behavior data
Information executed predetermined registration operation determine user whether be article indicated by information to be pushed user.As an example, if to
The article of pushed information description is an application.So then it can analyze whether user downloaded from the historical behavior data of user
Information to be pushed instruction application come determine if be application user.
It is alternatively possible to be the use of the article of information to be pushed instruction to user by the analysis to historical behavior data
A possibility that family, is estimated.As an example, user's portrait of user according to the historical behavior data of user, can be constructed.And
Estimate that user is the object of information to be pushed instruction according to the degree of association between user's portrait and the article of information to be pushed instruction
A possibility that user of product.
Step 405, the target user's mark for being not belonging to invalid subscriber identity collection is chosen from target user's identification sets, and
The target application that the terminal device used by a user for identifying instruction to selected target user is installed pushes letter to be pushed
Breath.
In the present embodiment, the mesh for belonging to invalid subscriber identity collection can be further screened out from target user's identification sets
Mark user identifier.Since the user that the invalid subscriber identity that invalid subscriber identity is concentrated indicates belongs to the object of information to be pushed instruction
The user of product, therefore, it is not necessary to push information to be pushed to these users again.Thus, it is possible to further avoid meaningless
Push facilitates the cost for saving push information to be pushed.
Figure 4, it is seen that the method for pushed information compared with the corresponding embodiment of Fig. 2, in the present embodiment
Process 400 highlight can be deleted from target user's identification sets the target user for belonging to invalid subscriber identity collection mark, by
This can further avoid to it is some be information to be pushed instruction article user again pushed information the case where, into one
Avoid to step the waste to Internet resources.
With further reference to Fig. 5, as the realization to method shown in above-mentioned each figure, this application provides for pushed information
One embodiment of device, the Installation practice is corresponding with embodiment of the method shown in Fig. 2, which specifically can be applied to
In various electronic equipments.
As shown in figure 5, the device 500 provided in this embodiment for pushed information includes obtaining 501, determination unit 502
With push unit 503.Wherein, acquiring unit 501 is configured to obtain information to be pushed, and obtains candidate user identification sets;
Acquiring unit 501 is further configured to obtain validated user identification sets, wherein the validated user mark in validated user identification sets
The user for knowing instruction is the user of target application, wherein target application is for showing information to be pushed;Determination unit 5025 is matched
The intersection of determining candidate user identification sets and validated user identification sets is set to as target user's identification sets;503 quilt of push unit
It is configured to choose target user's mark from target user's identification sets, and identifies the user of instruction to selected target user
The target application that used terminal device is installed pushes information to be pushed.
In the present embodiment, in the device of pushed information 500: obtaining 501, determination unit 502 and push unit 503
Specific processing and its brought technical effect can be respectively with reference to step 201, step 202 and the step in Fig. 2 corresponding embodiment
Rapid 203 related description, details are not described herein.
In some optional implementations of the present embodiment, above-mentioned push unit 503 is further configured to: from target
User identifier, which is concentrated, chooses target user's mark, comprising: obtains invalid subscriber identity collection, wherein what invalid subscriber identity was concentrated
The user of invalid subscriber identity instruction is the user of article indicated by information to be pushed;It is chosen not from target user's identification sets
Belong to target user's mark of invalid subscriber identity collection.
In some optional implementations of the present embodiment, above-mentioned invalid subscriber identity collection determines as follows:
The user identifier for browsing the user of information to be pushed is obtained as candidate invalid subscriber identity, obtains candidate invalid subscriber identity
Collection;For the candidate invalid subscriber identity that candidate invalid subscriber identity is concentrated, the use of candidate's invalid subscriber identity instruction is obtained
Family, historical behavior data for the information to be pushed browsed;Candidate's nothing is determined according to the historical behavior data of acquisition
Effect user identifier instruction user whether be article indicated by information to be pushed user;In response to determining the candidate without effectiveness
The user of family mark instruction is the user of article indicated by information to be pushed, which is added in vain
User identifier collection.
In some optional implementations of the present embodiment, the above-mentioned device 500 for pushed information further include: storage
Selected target user's mark.
In some optional implementations of the present embodiment, above-mentioned acquiring unit 501 is further configured to: being obtained and is waited
Select family identification sets, comprising: obtain at least two user identifier collection, and obtain user's mark that at least two user identifiers are concentrated
Know and collect corresponding keyword, obtains at least two keywords;Obtain the keyword of information to be pushed;It is closed according at least two
The keyword of key word and information to be pushed carries out set operation to the user identifier collection that at least two user identifiers are concentrated, so that
The keyword of the obtained corresponding keyword of operation result collection and information to be pushed meets preset matching condition;What determination obtained
Operation result collection is as candidate user identification sets.
The device provided by the above embodiment of the application obtains information to be pushed by acquiring unit, and obtains candidate
User identifier collection;Obtain validated user identification sets, wherein the validated user in validated user identification sets identifies the user indicated and is
The user of target application, wherein target application is for showing information to be pushed;Determination unit determines candidate user identification sets and has
The intersection of effectiveness family identification sets is as target user's identification sets;Push unit chooses target user's mark from target user's identification sets
Know, and the target application push installed to the terminal device used by a user that selected target user identifies instruction to
Pushed information, the case where so as to avoid to some user's pushed informations that cannot browse to information to be pushed, to avoid right
The waste of Internet resources.
Below with reference to Fig. 6, it illustrates the computer systems 600 for the server for being suitable for being used to realize the embodiment of the present application
Structural schematic diagram.Server shown in Fig. 6 is only an example, should not function and use scope band to the embodiment of the present application
Carry out any restrictions.
As shown in fig. 6, computer system 600 includes central processing unit (CPU) 601, it can be read-only according to being stored in
Program in memory (ROM) 602 or be loaded into the program in random access storage device (RAM) 603 from storage section 608 and
Execute various movements appropriate and processing.In RAM 603, also it is stored with system 600 and operates required various programs and data.
CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input/output (I/O) interface 605 is also connected to always
Line 604.
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode
The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.;
And the communications portion 609 of the network interface card including LAN card, modem etc..Communications portion 609 via such as because
The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 605 as needed.Detachable media 611, such as
Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon
Computer program be mounted into storage section 608 as needed.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description
Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium
On computer program, which includes the program code for method shown in execution flow chart.In such reality
It applies in example, which can be downloaded and installed from network by communications portion 609, and/or from detachable media
611 are mounted.When the computer program is executed by central processing unit (CPU) 601, limited in execution the present processes
Above-mentioned function.
It should be noted that the computer-readable medium of the application can be computer-readable signal media or computer
Readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but it is unlimited
In system, device or the device of --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or any above combination.It calculates
The more specific example of machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, portable of one or more conducting wires
Formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable programmable read only memory
(EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device or
The above-mentioned any appropriate combination of person.In this application, computer readable storage medium can be it is any include or storage program
Tangible medium, which can be commanded execution system, device or device use or in connection.And in this Shen
Please in, computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to
Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable
Any computer-readable medium other than storage medium, the computer-readable medium can send, propagate or transmit for by
Instruction execution system, device or device use or program in connection.The journey for including on computer-readable medium
Sequence code can transmit with any suitable medium, including but not limited to: wireless, electric wire, optical cable, RF etc. are above-mentioned
Any appropriate combination.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the application, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use
The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse
Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding
The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction
Combination realize.
Being described in unit involved in the embodiment of the present application can be realized by way of software, can also be by hard
The mode of part is realized.Described unit also can be set in the processor, for example, can be described as: a kind of processor, packet
Include acquiring unit, determination unit and push unit.Wherein, the title of these units is not constituted under certain conditions to the unit
The restriction of itself, for example, acquiring unit is also described as " obtaining information to be pushed, and obtaining candidate user identification sets
Unit ".
As on the other hand, present invention also provides a kind of computer-readable medium, which be can be
Included in server described in above-described embodiment;It is also possible to individualism, and without in the supplying server.It is above-mentioned
Computer-readable medium carries one or more program, when said one or multiple programs are executed by the server,
So that the server: obtaining information to be pushed, and obtain candidate user identification sets;Obtain validated user identification sets, wherein have
The user of validated user mark instruction in the identification sets of effectiveness family is the user of target application, wherein target application is for showing
Information to be pushed;Determine the intersection of candidate user identification sets and validated user identification sets as target user's identification sets;From target
User identifier, which is concentrated, chooses target user's mark, and the terminal used by a user of instruction is identified to selected target user
The target application that equipment is installed pushes information to be pushed.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art
Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from foregoing invention design, it is carried out by above-mentioned technical characteristic or its equivalent feature
Any combination and the other technical solutions formed.Such as features described above has similar function with (but being not limited to) disclosed herein
Can technical characteristic replaced mutually and the technical solution that is formed.