CN110796500A - Information monitoring method and device, electronic equipment and storage medium - Google Patents

Information monitoring method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN110796500A
CN110796500A CN201911082951.7A CN201911082951A CN110796500A CN 110796500 A CN110796500 A CN 110796500A CN 201911082951 A CN201911082951 A CN 201911082951A CN 110796500 A CN110796500 A CN 110796500A
Authority
CN
China
Prior art keywords
access
information
target
identifier
sub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911082951.7A
Other languages
Chinese (zh)
Other versions
CN110796500B (en
Inventor
杨春雪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Miaozhen Systems Information Technology Co Ltd
Original Assignee
Miaozhen Systems Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Miaozhen Systems Information Technology Co Ltd filed Critical Miaozhen Systems Information Technology Co Ltd
Priority to CN201911082951.7A priority Critical patent/CN110796500B/en
Publication of CN110796500A publication Critical patent/CN110796500A/en
Application granted granted Critical
Publication of CN110796500B publication Critical patent/CN110796500B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0242Determining effectiveness of advertisements
    • G06Q30/0245Surveys
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0631Item recommendations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/142Network analysis or design using statistical or mathematical methods
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services

Abstract

The application provides an information monitoring method, an information monitoring device, electronic equipment and a storage medium, wherein the information monitoring method comprises the following steps: acquiring access information aiming at target information in a target area; the access information comprises an access identifier, an identifier type corresponding to the access identifier and access time; selecting effective access identifications from the access identifications based on the identification types and/or the access time corresponding to each access identification; determining the number of access objects for accessing the target information in the target area based on the number of the effective access identifiers; and generating monitoring information aiming at the target information in the target area based on the target parameter values prestored in the target area and the number of the access objects, and sending the monitoring information to the target client. According to the method and the device, the effective access identification is selected from the multiple access identifications, and the monitoring information is generated based on the effective access identification and the pre-stored target parameter value, so that the accuracy of the monitoring information is improved, and the efficiency of the analysis process is also improved.

Description

Information monitoring method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of network information technologies, and in particular, to an information monitoring method and apparatus, an electronic device, and a storage medium.
Background
In recent years, with the high popularization of internet technology, network information push has become an effective means for improving the popularity of products. After the push information corresponding to the product is released in a plurality of regions, the number of users browsing the push information in each region needs to be monitored so as to analyze the push effect of the product.
The push effect analysis method used at the present stage is to acquire the number of terminal devices used by users in different areas to browse push information, and determine the area with the largest number of terminal devices as the area with the best product push effect.
However, when the same user uses a plurality of computers or a plurality of browsers of the same computer to browse the pushed information, the user is counted for a plurality of times, the population base numbers of the users using the internet in different areas are different, and the small number of the users browsing the pushed information does not represent that the target product is not popular locally, so that the accuracy of the statistical result is reduced and the efficiency of the analysis process is also reduced based on the number statistical mode of the terminal equipment.
Disclosure of Invention
In view of this, an object of the embodiments of the present application is to provide an information monitoring method, an information monitoring apparatus, an electronic device, and a storage medium, in which an effective access identifier is selected from a plurality of access identifiers, and monitoring information is generated based on the effective access identifier and a pre-stored target parameter value, so that accuracy of the monitoring information is improved, and efficiency of an analysis process is also improved.
In a first aspect, an embodiment of the present application provides an information monitoring method, where the information monitoring method includes:
acquiring access information aiming at target information in a target area; the access information comprises an access identifier, an identifier type corresponding to the access identifier and access time;
selecting effective access identifications from the access identifications based on identification types and/or access time corresponding to each access identification;
determining the number of access objects accessing the target information in the target area based on the number of the effective access identifications;
and generating monitoring information aiming at the target information in the target area based on target parameter values prestored in the target area and the number of the access objects, and sending the monitoring information to a target client.
In an optional implementation manner, the access information further includes an access area corresponding to the access identifier;
aiming at any sub-area in the target area, selecting an effective access identifier in the sub-area from effective access identifiers aiming at the target information in the target area according to an access area corresponding to the access identifier;
determining the number of access objects accessing the target information in the sub-region based on the number of the effective access identifications in the sub-region;
and generating monitoring information aiming at the target information in the sub-area based on the target parameter values and the number of the access objects prestored in the sub-area and the target parameter values and the number of the access objects prestored in the target area, and sending the monitoring information to the target client.
In an optional implementation manner, the accessing identifier includes an equipment identifier and a user identity identifier, and selecting an effective accessing identifier from the accessing identifiers based on an identifier type and/or an accessing time corresponding to each accessing identifier includes:
selecting the equipment identifier matched with the equipment identifier type from the access identifiers, and determining the equipment identifier as the effective access identifier;
and selecting the user identity identification matched with the user identity identification type from the access identification, and selecting the effective access identification from the user identity identification based on the access time corresponding to the user identity identification.
In an optional embodiment, the selecting the valid access identifier from the user identifier based on the access time corresponding to the user identifier includes:
and aiming at each user identity, determining the number of the user identities included in a preset time length to meet a preset condition based on the access time corresponding to the user identity, and determining the user identity as the effective access identity.
In an optional implementation manner, the monitoring information for the target information in the sub-area is generated by the following method:
determining a first ratio of the number of access objects in the sub-region to the number of access objects in the target region;
determining a second ratio of the target parameter value prestored in the sub-area to the target parameter value prestored in the target area;
and determining the ratio of the first ratio to the second ratio as the monitoring information aiming at the target information in the sub-area.
In a second aspect, an embodiment of the present application provides an information monitoring apparatus, including:
the acquisition module is used for acquiring access information aiming at the target information in the target area; the access information comprises an access identifier, an identifier type corresponding to the access identifier and access time;
the first selection module is used for selecting effective access identifiers from the access identifiers based on the identifier types and/or the access time corresponding to each access identifier;
a first determining module, configured to determine, based on the number of the valid access identifiers, the number of access objects in the target area, where the access objects access the target information;
the first generation module is used for generating monitoring information aiming at the target information in the target area based on target parameter values prestored in the target area and the number of the access objects;
and the first sending module is used for sending the monitoring information to the target client.
In an optional implementation manner, the access information further includes an access area corresponding to the access identifier; the information monitoring device further comprises:
a second selection module, configured to select, for any sub-region in the target region, an effective access identifier in the sub-region from effective access identifiers in the target region for the target information according to an access region corresponding to the access identifier;
the second determining module is used for determining the number of access objects accessing the target information in the sub-region based on the number of the effective access identifications in the sub-region;
the second generation module is used for generating monitoring information aiming at the target information in the sub-area based on target parameter values and the number of the access objects which are prestored in the sub-area and the target parameter values and the number of the access objects which are prestored in the target area;
and the second sending module is used for sending the monitoring information to the target client.
In an optional implementation manner, the access identifier includes an equipment identifier and a user identity identifier, and the first selecting module, when selecting a valid access identifier from the access identifiers based on an identifier type and/or an access time corresponding to each access identifier, includes:
selecting the equipment identifier matched with the equipment identifier type from the access identifiers, and determining the equipment identifier as the effective access identifier;
and selecting the user identity identification matched with the user identity identification type from the access identification, and selecting the effective access identification from the user identity identification based on the access time corresponding to the user identity identification.
In a third aspect, an embodiment of the present application provides an electronic device, including: a processor, a memory and a bus, wherein the memory stores machine-readable instructions executable by the processor, the processor and the memory communicate with each other through the bus when the electronic device runs, and the processor executes the machine-readable instructions to execute the steps of the information monitoring method according to any one of the first aspect.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to perform the steps of the information monitoring method according to any one of the first aspect.
According to the information monitoring method and device, the electronic device and the storage medium, the effective access identification is selected from the multiple access identifications related to the target information, the number of the access objects in the target area is determined based on the number of the effective access identifications, and the monitoring information of the target area is generated based on the number of the access objects in the target area and the pre-stored target parameter value, so that the accuracy of the monitoring information is improved, and meanwhile, the efficiency of an analysis process is also improved.
Further, according to the information monitoring method, the information monitoring device, the electronic device and the storage medium provided by the embodiment of the application, the number of the access objects in the sub-region can be selected based on the access region corresponding to the access identifier, and then the monitoring information of the sub-region is generated based on the number of the access objects in the sub-region and the pre-stored target parameter value, so that the information monitoring range is improved, and the efficiency of an analysis process is further improved.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a flowchart illustrating an information monitoring method according to an embodiment of the present application;
fig. 2 is a flowchart illustrating a method for generating sub-region monitoring information in an information monitoring method provided in an embodiment of the present application;
fig. 3 is a flowchart illustrating a method for selecting an effective access identifier based on an identifier type in an information monitoring method provided in an embodiment of the present application;
fig. 4 is a flowchart illustrating a method for calculating sub-area monitoring information in an information monitoring method provided in an embodiment of the present application;
FIG. 5 is a schematic diagram of an information monitoring apparatus provided in an embodiment of the present application;
fig. 6 shows a schematic diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
The monitoring information generation method used at present is to acquire the number of access identifiers generated when the access object in different sub-regions accesses the target information, and determine the sub-region with the largest number of access identifiers as the sub-region in which the access object is most interested in the target information.
However, when the same access object uses a plurality of computers or a plurality of browsers of the same computer to browse the target information, one access object is counted for a plurality of times, the population base numbers of the users using the internet in different sub-areas are different, and the access objects accessing the target information are few and do not represent that the product corresponding to the target information is not popular in the sub-area, so that the accuracy of monitoring information is reduced and the efficiency of the analysis process is also reduced based on the number counting mode of the access identifiers.
Based on the above problems, embodiments of the present application provide an information monitoring method, apparatus, electronic device, and storage medium, where effective access identifiers are selected from a plurality of access identifiers related to target information, the number of access objects is determined based on the effective access identifiers in a target area, and monitoring information is generated based on the number of access objects in the target area and a pre-stored target parameter value, so that accuracy of the monitoring information is improved, and meanwhile, efficiency of an analysis process is also improved.
The above-mentioned drawbacks are the results of the inventor after practical and careful study, and therefore, the discovery process of the above-mentioned problems and the solution proposed by the present application to the above-mentioned problems in the following should be the contribution of the inventor to the present application in the process of the present application.
The technical solutions in the present application will be described clearly and completely with reference to the drawings in the present application, and it should be understood that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. The components of the present application, as generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
To facilitate understanding of the present embodiment, first, an information monitoring method disclosed in the embodiments of the present application is described in detail, and an execution subject of the information monitoring method provided in the embodiments of the present application may be a server. The following describes an information monitoring method provided by an embodiment of the present application with an execution subject as a server.
Referring to fig. 1, a flowchart of an information monitoring method provided in an embodiment of the present application is shown, where the information monitoring method includes the following steps:
s101, acquiring access information aiming at target information in a target area; the access information comprises an access identifier, an identifier type corresponding to the access identifier and access time.
In the embodiment of the application, an access object sends a request instruction for accessing target information to a server based on terminal equipment, the server responds to the request instruction for the target information and sends the target information to the terminal equipment, so that the terminal equipment displays the target information, and the access object realizes access to the target information; here, the terminal device includes: mobile terminal equipment, panel computer, portable computer, desktop computer.
In the embodiment of the application, after an access object in a target area accesses target information based on terminal equipment, access information corresponding to the access behavior is generated, and a server can acquire the access information in real time; here, the access information includes an access identifier, an identifier type corresponding to the access identifier, and an access time; the access object generates access identifiers of different identifier types when accessing the target information based on different terminal equipment, wherein the identifier types comprise an equipment identifier type and a user identity identifier type; and the time for the server to acquire the access information is the access time corresponding to the access identifier.
S102, based on the identification type and/or the access time corresponding to each access identification, selecting effective access identifications from the access identifications.
In the embodiment of the application, when the access object accesses the target information based on different terminal devices, the identification types of the generated access identification are different; the access object and the access identifiers of different identifier types have different mapping relations, and if the access object and the access identifier of a certain identifier type have one-to-one mapping relation, the access identifier of the identifier type is determined as an effective access identifier; and if the access object has a one-to-many mapping relation with the access identifier of a certain identifier type, selecting an effective access identifier having a one-to-one mapping relation with the access object from the access identifiers of the identifier type based on the access time.
For example, when an access object accesses target information by using a mobile terminal device, an access identifier of a device identifier type is generated, and when the access object accesses the target information by using the same mobile terminal device for multiple times, only an access identifier of one device identifier type is generated; when the access object accesses the target information by using a computer, generating access marks of user identity mark types, and when the access object accesses the target information for multiple times by using different computers or different browsers on one computer, generating access marks of a plurality of user identity mark types; generally, one access object corresponds to one common mobile terminal device, one access object can correspond to a plurality of computers, and each computer can be provided with a plurality of browsers for accessing target information; therefore, the access object and the access identifier of the equipment identifier type have a one-to-one mapping relation, and the access object and the access identifier of the user identity identifier type have a one-to-many mapping relation; and determining the access identifier of the equipment identifier type as an effective access identifier, and selecting the effective access identifier from the access identifiers of the user identity identifier type based on the access time.
S103, determining the number of access objects accessing the target information in the target area based on the number of the effective access identifications.
In the embodiment of the application, the access information acquired by the server is access information generated based on an access behavior of an access object in the target area to the target information, so that an effective access identifier selected from the access identifiers included in the access information has a one-to-one mapping relationship with the access object in the target area, and further, the number of the effective access identifiers is equal to the number of the access objects in the target area to access the target information.
S104, based on target parameter values prestored in the target area and the number of the access objects, generating monitoring information aiming at the target information in the target area, and sending the monitoring information to a target client.
In the embodiment of the application, a target parameter value of a target area is prestored in a server, and the target parameter value is the total number of people who can use the internet in the target area, namely the total number of people who can access target information in the target area; the number of the access objects is the total number of people who have accessed the target information in the target area.
In the embodiment of the application, calculating the ratio of the number of access objects which have accessed the target information in the target area to the number of access objects which can access the target information, namely the ratio of the number of access objects in the target area to the pre-stored target parameter value in the target area, wherein the ratio is the monitoring information aiming at the target information in the target area and reflects the proportion of the access objects which have accessed the target information in the target area; the server sends the generated monitoring information to the target client so that the target client displays the monitoring information, and monitoring personnel know the condition that the target information is accessed in the target area according to the monitoring information displayed by the target client.
In the embodiment of the application, the effective access identification is selected from the multiple access identifications related to the target information, the number of the access objects in the target area is determined based on the number of the effective access identifications, and the monitoring information of the target area is generated based on the number of the access objects in the target area and the pre-stored target parameter value, so that the accuracy of the monitoring information is improved, and meanwhile, the efficiency of the analysis process is also improved.
In this embodiment of the present application, the access information further includes an access area corresponding to the access identifier, and based on the access area corresponding to the access identifier, not only the situation that the target information is accessed in the target area but also the situation that the target information is accessed in the sub-area can be monitored, as shown in fig. 2, a flowchart of a method for generating sub-area monitoring information provided in this embodiment is shown, where the information monitoring method includes the following steps:
s201, aiming at any sub-area in the target area, according to the access area corresponding to the access identifier, selecting an effective access identifier in the sub-area from effective access identifiers aiming at the target information in the target area.
In the embodiment of the present application, the target area includes a plurality of sub-areas, for example, the target area is china, and the sub-area corresponding to china may be other areas such as beijing city, tianjin city, north river province, and shandong province; the access identifier corresponds to an access area, where the access area is an area where the access object is located, for example, if the access object uses a desktop computer of beijing city where the base station is located to access the target information, the access area corresponding to the access identifier generated based on the access behavior of the access object to the target information is beijing city; and setting a target sub-region, and selecting the access region as an effective access identifier of the target sub-region from the effective access identifiers of the access region which is subordinate to the target region.
S202, determining the number of access objects accessing the target information in the sub-area based on the number of the effective access identifications in the sub-area.
In the embodiment of the present application, the access area is a one-to-one mapping relationship between the effective access identifier of the sub-area and the access object accessing the target information in the sub-area, and therefore, the number of the effective access identifiers in the sub-area is equal to the number of the access objects accessing the target information in the sub-area.
S203, generating monitoring information aiming at the target information in the sub-area based on the target parameter values and the number of the access objects pre-stored in the sub-area and the target parameter values and the number of the access objects pre-stored in the target area, and sending the monitoring information to the target client.
In the embodiment of the application, a target parameter value of a target area and target parameter values of a plurality of sub-areas are prestored in a server, wherein the plurality of sub-areas are all affiliated to the target area; the pre-stored target parameter values of the sub-regions are the number of access objects which can access the target information in the sub-regions, and the pre-stored target parameter values of the target regions are the number of access objects which can access the target information in the target regions, wherein any target parameter value of the sub-regions is smaller than the target parameter value of the target region to which the sub-region belongs; the number of access objects in a sub-region is the number of access objects that have accessed the target information in the sub-region, and the number of access objects in a target region is the number of access objects that have accessed the target information in the target region, where the number of access objects in any sub-region is less than the number of access objects in the target region of the target region to which the sub-region belongs.
In the embodiment of the application, a target sub-region is selected, monitoring information aiming at the target information in the target sub-region is generated based on a mathematical relation among pre-stored target parameter values of the target sub-region, pre-stored target parameter values of the target region, the number of access objects in the target sub-region and the number of access objects in the target region, the server sends the generated monitoring information to a target client side, so that the target client side displays the monitoring information, and monitoring personnel know the condition that the target information is accessed in the target sub-region according to the monitoring information displayed by the target client side.
In the embodiment of the application, the number of the access objects in the sub-region is selected based on the access region corresponding to the access identifier, so that the monitoring information of the sub-region is generated, the information monitoring range is improved, and the efficiency of the analysis process is further improved.
In this embodiment of the present application, the access identifier includes an equipment identifier and a user identity identifier, and an effective access identifier is selected from the access identifiers based on an identifier type and/or access time corresponding to each access identifier, as shown in fig. 3, for a flowchart of a method for selecting an effective access identifier based on an identifier type provided in this embodiment, the information monitoring method includes the following steps:
s301, selecting the device identifier matched with the device identifier type from the access identifiers, and determining the device identifier as the effective access identifier.
In the embodiment of the application, the access identifier comprises an equipment identifier and a user identity identifier, and the identifier type corresponding to the access identifier comprises an equipment identifier type and a user identity identifier type, wherein the equipment identifier is matched with the equipment identifier type, and the user identity identifier is matched with the user identity identifier type; and comparing the identifier type corresponding to the access identifier with the equipment identifier type, and if the identifier type corresponding to the access identifier is the equipment identifier type, determining the access identifier as an effective access identifier.
S302, selecting the user identity identification matched with the user identity identification type from the access identification, and selecting the effective access identification from the user identity identification based on the access time corresponding to the user identity identification.
In the embodiment of the application, the identification type corresponding to the access identification is compared with the user identity identification type, if the identification type corresponding to the access identification is the user identity identification type, the access time corresponding to the user identity identification is obtained, and if the access time corresponding to the user identity identification meets the preset condition, the user identity identification is determined to be an effective access identification.
In the embodiment of the application, based on the access time corresponding to the user identity, the effective access identifier is selected from the user identity, and the information monitoring method comprises the following steps:
and aiming at each user identity, determining the number of the user identities included in a preset time length to meet a preset condition based on the access time corresponding to the user identity, and determining the user identity as the effective access identity.
In the embodiment of the application, when an access object accesses target information based on a browser of a target terminal device, an access identifier of a user identity identifier type, namely a user identity identifier, is generated, the time for acquiring the user identity identifier by a server is the access time corresponding to the user identity identifier, when the access object accesses the target information for multiple times based on the same browser of a certain target terminal device, the generated user identity identifiers are the same, the server acquires the same user identity identifier for multiple times, and the user identity identifier corresponds to multiple access times; within a preset time length, if the user identity acquired by the server only corresponds to one access time, the user identity is not an effective access identity; if the user identification acquired by the server corresponds to a plurality of access times, arranging the access times according to a time sequence, calculating the time difference between any two adjacent access times, wherein one user identification can correspond to the time differences of the access times, and if the time difference of any access time corresponding to the user identification is smaller than a preset threshold value, determining the user identification as an effective access identification; here, the target terminal device includes a desktop computer, a laptop computer, a tablet computer, and the like.
For example, the user identification identifies a corresponding access time including: 30 minutes (access time one) at 08 points in 09/month and 20 days in 2019, 45 minutes (access time two) at 21/month and 10 points in 21/day in 2019 and 12 points in 00 minutes (access time three) at 09/month and 21/day in 2019, the user identity corresponds to three access times, the time difference between the access time one and the access time two is 26 hours and 15 minutes, the time difference between the access time two and the access time three is 1 hour and 15 minutes, the preset threshold value is 24 hours, namely, the time difference between the access time one and the access time two is greater than the preset threshold value, the time difference between the access time two and the access time three is less than the preset threshold value, and for the user identity one, if the time difference between the access time one and the preset threshold value is less than the preset threshold value, the user identity one is determined as an.
In this embodiment of the present application, based on a target parameter value and a number of access objects pre-stored in a sub-region and a target parameter value and a number of access objects pre-stored in a target region, monitoring information for target information in the sub-region is generated, referring to fig. 4, which is a flowchart of a method for calculating sub-region monitoring information provided in this embodiment, the information monitoring method includes the following steps:
s401, determining a first ratio of the number of the access objects in the sub-area to the number of the access objects in the target area.
In the embodiment of the application, the sub-region belongs to the target region, and the ratio of the number of the access objects in the sub-region to the number of the access objects in the target region is calculated to obtain the ratio of the number of the access objects in the sub-region.
As an optional implementation manner, if the multiple sub-regions belong to the target region, the ratio of the number of the access objects in the multiple sub-regions to the number of the access objects in the target region is respectively calculated, so as to obtain the ratio of the number of the access objects in the multiple sub-regions.
S402, determining a second ratio of the target parameter value pre-stored in the sub-area to the target parameter value pre-stored in the target area.
In the embodiment of the application, the ratio of the target parameter value prestored in the sub-region to the target parameter value prestored in the target region is calculated to obtain the ratio of the target parameter value of the sub-region; the target parameter values pre-stored in the sub-areas are the total number of people who can use the internet in the sub-areas, the target parameter values pre-stored in the target areas are the total number of people who can use the internet in the target areas, and the target parameter values pre-stored in the different areas can be obtained through query in the statistical departments of the corresponding areas.
As an optional implementation manner, ratios of target parameter values pre-stored in the multiple sub-regions to target parameter values pre-stored in the target region are respectively calculated, so as to obtain the ratios of the target parameter values of the multiple sub-regions.
And S403, determining the ratio of the first ratio to the second ratio as the monitoring information aiming at the target information in the sub-area.
In the embodiment of the application, the ratio of the number of the sub-region access objects to the ratio of the sub-region target parameter values is calculated, and the ratio is determined as the monitoring information of the access objects in the sub-region on the target information access condition.
As an optional implementation manner, ratios of the numbers of the plurality of sub-region access objects to the corresponding sub-region target parameter values are respectively calculated, and the obtained ratios are determined as monitoring information of the access objects in the plurality of sub-regions on the target information access condition.
Based on the same inventive concept, an information monitoring device corresponding to the information monitoring method is also provided in the embodiments of the present application, and because the principle of solving the problem of the device in the embodiments of the present application is similar to the information monitoring method in the embodiments of the present application, the implementation of the device can refer to the implementation of the method, and repeated details are not repeated.
Referring to fig. 5, which is a schematic diagram of an information monitoring apparatus according to an embodiment of the present application, the information monitoring apparatus 500 includes:
an obtaining module 501, configured to obtain access information for target information in a target area; the access information comprises an access identifier, an identifier type corresponding to the access identifier and access time;
a first selecting module 502, configured to select an effective access identifier from the access identifiers based on an identifier type and/or access time corresponding to each access identifier;
a first determining module 503, configured to determine, based on the number of the valid access identifiers, the number of access objects in the target area, which access the target information;
a first generating module 504, configured to generate monitoring information for the target information in the target area based on a target parameter value and the number of the access objects, where the target parameter value and the number of the access objects are pre-stored in the target area;
a first sending module 505, configured to send the monitoring information to the target client.
In a possible implementation manner, the access information further includes an access area corresponding to the access identifier; the information monitoring apparatus 500 further includes:
a second selection module, configured to select, for any sub-region in the target region, an effective access identifier in the sub-region from effective access identifiers in the target region for the target information according to an access region corresponding to the access identifier;
the second determining module is used for determining the number of access objects accessing the target information in the sub-region based on the number of the effective access identifications in the sub-region;
the second generation module is used for generating monitoring information aiming at the target information in the sub-area based on target parameter values and the number of the access objects which are prestored in the sub-area and the target parameter values and the number of the access objects which are prestored in the target area;
and the second sending module is used for sending the monitoring information to the target client.
In a possible implementation manner, the access identifier includes a device identifier and a user identity identifier, and the first selecting module 502, when selecting a valid access identifier from the access identifiers based on an identifier type and/or an access time corresponding to each access identifier, includes:
selecting the equipment identifier matched with the equipment identifier type from the access identifiers, and determining the equipment identifier as the effective access identifier;
and selecting the user identity identification matched with the user identity identification type from the access identification, and selecting the effective access identification from the user identity identification based on the access time corresponding to the user identity identification.
In a possible implementation manner, the first selecting module 502, when selecting the valid access identifier from the user identifiers based on the access time corresponding to the user identifier, includes:
and aiming at each user identity, determining the number of the user identities included in a preset time length to meet a preset condition based on the access time corresponding to the user identity, and determining the user identity as the effective access identity.
In a possible implementation manner, the second generating module, when generating the monitoring information for the target information in the sub-area based on the target parameter value and the number of the access objects pre-stored in the sub-area and the target parameter value and the number of the access objects pre-stored in the target area, includes:
determining a first ratio of the number of access objects in the sub-region to the number of access objects in the target region;
determining a second ratio of the target parameter value prestored in the sub-area to the target parameter value prestored in the target area;
and determining the ratio of the first ratio to the second ratio as the monitoring information aiming at the target information in the sub-area.
The information monitoring device provided by the embodiment of the application selects the effective access identification from the plurality of access identifications related to the target information, determines the number of the access objects in the target area based on the number of the effective access identifications, and generates the monitoring information of the target area based on the number of the access objects in the target area and the pre-stored target parameter value, so that the accuracy of the monitoring information is improved, and meanwhile, the efficiency of an analysis process is also improved.
As shown in fig. 6, an electronic device 600 provided for the embodiment of the present application includes: a processor 601, a memory 602 and a bus, wherein the memory 602 stores machine-readable instructions executable by the processor 601, when the electronic device runs, the processor 601 and the memory 602 communicate with each other through the bus, and the processor 601 executes the machine-readable instructions to execute the steps of the information monitoring method.
Specifically, the memory 602 and the processor 601 can be general-purpose memories and processors, which are not limited in particular, and the information monitoring method can be executed when the processor 601 runs a computer program stored in the memory 602.
Corresponding to the information monitoring method, an embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and the computer program is executed by a processor to perform the steps of the information monitoring method.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the system and the apparatus described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. The above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical division, and there may be other divisions in actual implementation, and for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or modules through some communication interfaces, and may be in an electrical, mechanical or other form.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a non-volatile computer-readable storage medium executable by a processor. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
Finally, it should be noted that: the above-mentioned embodiments are only specific embodiments of the present application, and are used for illustrating the technical solutions of the present application, but not limiting the same, and the scope of the present application is not limited thereto, and although the present application is described in detail with reference to the foregoing embodiments, those skilled in the art should understand that: any person skilled in the art can modify or easily conceive the technical solutions described in the foregoing embodiments or equivalent substitutes for some technical features within the technical scope disclosed in the present application; such modifications, changes or substitutions do not depart from the spirit and scope of the exemplary embodiments of the present application, and are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An information monitoring method, characterized in that the information monitoring method comprises:
acquiring access information aiming at target information in a target area; the access information comprises an access identifier, an identifier type corresponding to the access identifier and access time;
selecting effective access identifications from the access identifications based on identification types and/or access time corresponding to each access identification;
determining the number of access objects accessing the target information in the target area based on the number of the effective access identifications;
and generating monitoring information aiming at the target information in the target area based on target parameter values prestored in the target area and the number of the access objects, and sending the monitoring information to a target client.
2. The information monitoring method according to claim 1, wherein the access information further includes an access area corresponding to the access identifier;
aiming at any sub-area in the target area, selecting an effective access identifier in the sub-area from effective access identifiers aiming at the target information in the target area according to an access area corresponding to the access identifier;
determining the number of access objects accessing the target information in the sub-region based on the number of the effective access identifications in the sub-region;
and generating monitoring information aiming at the target information in the sub-area based on the target parameter values and the number of the access objects prestored in the sub-area and the target parameter values and the number of the access objects prestored in the target area, and sending the monitoring information to the target client.
3. The information monitoring method according to claim 1, wherein the access identifier includes an equipment identifier and a user identity identifier, and selecting a valid access identifier from the access identifiers based on an identifier type and/or access time corresponding to each access identifier includes:
selecting the equipment identifier matched with the equipment identifier type from the access identifiers, and determining the equipment identifier as the effective access identifier;
and selecting the user identity identification matched with the user identity identification type from the access identification, and selecting the effective access identification from the user identity identification based on the access time corresponding to the user identity identification.
4. The information monitoring method according to claim 3, wherein the selecting the valid access identifier from the user identifier based on the access time corresponding to the user identifier comprises:
and aiming at each user identity, determining the number of the user identities included in a preset time length to meet a preset condition based on the access time corresponding to the user identity, and determining the user identity as the effective access identity.
5. The information monitoring method according to claim 2, wherein the monitoring information for the target information in the sub-area is generated by:
determining a first ratio of the number of access objects in the sub-region to the number of access objects in the target region;
determining a second ratio of the target parameter value prestored in the sub-area to the target parameter value prestored in the target area;
and determining the ratio of the first ratio to the second ratio as the monitoring information aiming at the target information in the sub-area.
6. An information monitoring apparatus, characterized by comprising:
the acquisition module is used for acquiring access information aiming at the target information in the target area; the access information comprises an access identifier, an identifier type corresponding to the access identifier and access time;
the first selection module is used for selecting effective access identifiers from the access identifiers based on the identifier types and/or the access time corresponding to each access identifier;
a first determining module, configured to determine, based on the number of the valid access identifiers, the number of access objects in the target area, where the access objects access the target information;
the first generation module is used for generating monitoring information aiming at the target information in the target area based on target parameter values prestored in the target area and the number of the access objects;
and the first sending module is used for sending the monitoring information to the target client.
7. The information monitoring device according to claim 6, wherein the access information further includes an access area corresponding to the access identifier; the information monitoring device further comprises:
a second selection module, configured to select, for any sub-region in the target region, an effective access identifier in the sub-region from effective access identifiers in the target region for the target information according to an access region corresponding to the access identifier;
the second determining module is used for determining the number of access objects accessing the target information in the sub-region based on the number of the effective access identifications in the sub-region;
the second generation module is used for generating monitoring information aiming at the target information in the sub-area based on target parameter values and the number of the access objects which are prestored in the sub-area and the target parameter values and the number of the access objects which are prestored in the target area;
and the second sending module is used for sending the monitoring information to the target client.
8. The information monitoring apparatus according to claim 6, wherein the access identifier includes a device identifier and a user identifier, and the first selecting module, when selecting a valid access identifier from the access identifiers based on an identifier type and/or an access time corresponding to each access identifier, includes:
selecting the equipment identifier matched with the equipment identifier type from the access identifiers, and determining the equipment identifier as the effective access identifier;
and selecting the user identity identification matched with the user identity identification type from the access identification, and selecting the effective access identification from the user identity identification based on the access time corresponding to the user identity identification.
9. An electronic device, comprising: a processor, a memory and a bus, the memory storing machine-readable instructions executable by the processor, the processor and the memory communicating via the bus when the electronic device is operating, the processor executing the machine-readable instructions to perform the steps of the information monitoring method according to any one of claims 1 to 5.
10. A computer-readable storage medium, characterized in that a computer program is stored on the computer-readable storage medium, which computer program, when being executed by a processor, performs the steps of the information monitoring method according to any one of claims 1 to 5.
CN201911082951.7A 2019-11-07 2019-11-07 Information monitoring method and device, electronic equipment and storage medium Active CN110796500B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911082951.7A CN110796500B (en) 2019-11-07 2019-11-07 Information monitoring method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911082951.7A CN110796500B (en) 2019-11-07 2019-11-07 Information monitoring method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110796500A true CN110796500A (en) 2020-02-14
CN110796500B CN110796500B (en) 2023-08-29

Family

ID=69443445

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911082951.7A Active CN110796500B (en) 2019-11-07 2019-11-07 Information monitoring method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110796500B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113535823A (en) * 2021-07-26 2021-10-22 北京天融信网络安全技术有限公司 Abnormal access behavior detection method and device and electronic equipment

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145937A (en) * 2006-09-15 2008-03-19 腾讯科技(深圳)有限公司 Method for displaying access traffic data and its transmission device
CN102693501A (en) * 2012-05-31 2012-09-26 刘志军 Method for analyzing Internet advertisement popularizing effect
CN103970752A (en) * 2013-01-25 2014-08-06 北京思博途信息技术有限公司 Estimating method and system for amount of unique visitors
CN104199849A (en) * 2014-08-08 2014-12-10 亿赞普(北京)科技有限公司 Advertisement injecting method and device
CN105869020A (en) * 2016-04-05 2016-08-17 深圳职业技术学院 Business circle attractive power evaluation method and apparatus based on big data
CN106611346A (en) * 2015-10-22 2017-05-03 北京国双科技有限公司 Visitor screening method and device
CN108182253A (en) * 2017-12-29 2018-06-19 百度在线网络技术(北京)有限公司 For generating the method and apparatus of information
CN108876464A (en) * 2018-06-27 2018-11-23 珠海市君天电子科技有限公司 A kind of cheating detection method, device, service equipment and storage medium
CN110276650A (en) * 2019-06-28 2019-09-24 秒针信息技术有限公司 Advertisement arrival rate determines method, advertisement delivery method and device
CN110298711A (en) * 2019-07-12 2019-10-01 秒针信息技术有限公司 Advertisement arrival rate determines method, apparatus, storage medium and advertisement delivery method

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101145937A (en) * 2006-09-15 2008-03-19 腾讯科技(深圳)有限公司 Method for displaying access traffic data and its transmission device
CN102693501A (en) * 2012-05-31 2012-09-26 刘志军 Method for analyzing Internet advertisement popularizing effect
CN103970752A (en) * 2013-01-25 2014-08-06 北京思博途信息技术有限公司 Estimating method and system for amount of unique visitors
CN104199849A (en) * 2014-08-08 2014-12-10 亿赞普(北京)科技有限公司 Advertisement injecting method and device
CN106611346A (en) * 2015-10-22 2017-05-03 北京国双科技有限公司 Visitor screening method and device
CN105869020A (en) * 2016-04-05 2016-08-17 深圳职业技术学院 Business circle attractive power evaluation method and apparatus based on big data
CN108182253A (en) * 2017-12-29 2018-06-19 百度在线网络技术(北京)有限公司 For generating the method and apparatus of information
CN108876464A (en) * 2018-06-27 2018-11-23 珠海市君天电子科技有限公司 A kind of cheating detection method, device, service equipment and storage medium
CN110276650A (en) * 2019-06-28 2019-09-24 秒针信息技术有限公司 Advertisement arrival rate determines method, advertisement delivery method and device
CN110298711A (en) * 2019-07-12 2019-10-01 秒针信息技术有限公司 Advertisement arrival rate determines method, apparatus, storage medium and advertisement delivery method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113535823A (en) * 2021-07-26 2021-10-22 北京天融信网络安全技术有限公司 Abnormal access behavior detection method and device and electronic equipment
CN113535823B (en) * 2021-07-26 2023-11-10 北京天融信网络安全技术有限公司 Abnormal access behavior detection method and device and electronic equipment

Also Published As

Publication number Publication date
CN110796500B (en) 2023-08-29

Similar Documents

Publication Publication Date Title
CN106506705B (en) Crowd classification method and device based on location service
CN105657003B (en) Information processing method and server
JP5571145B2 (en) Advertisement distribution apparatus and advertisement distribution method
CN108833453B (en) Method and device for determining application account
CN110110201B (en) Content recommendation method and system
CN107203462B (en) Data generation method and device
CN111163072B (en) Method and device for determining characteristic value in machine learning model and electronic equipment
CN106357514B (en) Offer information processing method, device and system
CN111078742B (en) User classification model training method, user classification method and device
CN106911554B (en) Historical information display method and device
CN110796500A (en) Information monitoring method and device, electronic equipment and storage medium
CN106933905B (en) Method and device for monitoring webpage access data
CN113434762A (en) Association pushing method, device and equipment based on user information and storage medium
JP6695987B2 (en) Advertisement generation method, computer-readable storage medium and system
CN113692014B (en) APP flow analysis method, apparatus, computer device and storage medium
US20220398244A1 (en) Query method and device and storage medium
CN111104598B (en) Method and device for directionally pushing information, electronic equipment and readable storage medium
CN106844504B (en) A kind of method and apparatus for sending song and singly identifying
CN111127094B (en) Account matching method and device, electronic equipment and storage medium
CN105653645B (en) Network information attention degree evaluation method and device
CN115119197A (en) Wireless network risk analysis method, device, equipment and medium based on big data
CN110033351B (en) Method and device for determining similarity
CN111951351A (en) Position thermodynamic diagram generation method and device, electronic equipment and storage medium
WO2016029705A1 (en) Method and device for inserting webpage toolbar, and storage medium
JP6300984B1 (en) Information processing apparatus, information processing method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant