CN110990244A - Target equipment identification determining method and device, electronic equipment and readable storage medium - Google Patents

Target equipment identification determining method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN110990244A
CN110990244A CN201911220279.3A CN201911220279A CN110990244A CN 110990244 A CN110990244 A CN 110990244A CN 201911220279 A CN201911220279 A CN 201911220279A CN 110990244 A CN110990244 A CN 110990244A
Authority
CN
China
Prior art keywords
target
address
stable
monitoring log
enterprise
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911220279.3A
Other languages
Chinese (zh)
Other versions
CN110990244B (en
Inventor
周扬
高雅
刘向东
王柏鑫
刘忠禹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Miaozhen Information Technology Co Ltd
Original Assignee
Miaozhen Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Miaozhen Information Technology Co Ltd filed Critical Miaozhen Information Technology Co Ltd
Priority to CN201911220279.3A priority Critical patent/CN110990244B/en
Publication of CN110990244A publication Critical patent/CN110990244A/en
Application granted granted Critical
Publication of CN110990244B publication Critical patent/CN110990244B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Mathematical Physics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application provides a target device identification determining method and device, an electronic device and a readable storage medium, and relates to the technical field of computers. Firstly, a stable IP address is screened out from an obtained monitoring log according to a preset screening condition. And then screening out a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining the coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address. And finally, obtaining the target equipment identification of the staff of the target enterprise according to the coverage area of each stable IP address, the target geographical area where the target enterprise is located and the obtained monitoring log. Therefore, the target equipment identification of the staff of the target enterprise is determined by combining the coverage area of the IP address, the target geographical area where the target enterprise is actually located and the obtained monitoring log.

Description

Target equipment identification determining method and device, electronic equipment and readable storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for determining a target device identifier, an electronic device, and a readable storage medium.
Background
When relevant information needs to be pushed to employees of a target enterprise (e.g., pushing advertisements), device identifications of the employees of the target enterprise need to be obtained. Currently, the device identifier of the employee of the target enterprise is generally determined through online actions (e.g., browsing the official website of the target enterprise, browsing the advertisement of the target enterprise, etc.).
For example, if a user frequently browses the official website and advertisement of the target enterprise, the user is regarded as the employee of the target enterprise, and the device identifier of the user is regarded as the device identifier of the employee of the target enterprise. However, the user who often browses the official website and advertisement of the target business may not be an employee of the target business, but only someone else interested in the target business. Therefore, the accuracy of the device identification of the employee of the target enterprise determined by the method is low. If the crowd determined by the mode is used as marketing crowd, the problems of unsatisfactory marketing effect, budget waste and the like can be caused.
Disclosure of Invention
In view of the above, an object of the present application is to provide a method and an apparatus for determining a target device identifier, an electronic device, and a readable storage medium.
In order to achieve the above purpose, the embodiments of the present application employ the following technical solutions:
in a first aspect, an embodiment of the present application provides a target device identifier determining method, where the method includes:
screening stable IP addresses from the obtained monitoring logs according to preset screening conditions, wherein each monitoring log comprises an IP address and equipment identification;
screening out a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining the coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address, wherein each first target monitoring log comprises the corresponding stable IP address;
and obtaining the target equipment identification of the staff of the target enterprise according to the coverage area of each stable IP address, the target geographical area where the target enterprise is located and the obtained monitoring log.
In a second aspect, an embodiment of the present application provides an apparatus for determining a target device identifier, where the apparatus includes:
the first determining module is used for screening stable IP addresses from the obtained monitoring logs according to preset screening conditions, wherein each monitoring log comprises the IP addresses and equipment identifiers;
the second determining module is used for screening out a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining the coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address, wherein each first target monitoring log comprises the corresponding stable IP address;
and the third determining module is used for obtaining the target equipment identification of the staff of the target enterprise according to the coverage area of each stable IP address, the target geographical area where the target enterprise is located and the obtained monitoring log.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor and a memory, where the memory stores machine executable instructions that can be executed by the processor, and the processor can execute the machine executable instructions to implement the target device identification determination method described in any one of the foregoing embodiments.
In a fourth aspect, the present application provides a readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the target device identification determining method according to any one of the foregoing embodiments.
According to the target device identification determining method and device, the electronic device and the readable storage medium, firstly, a stable IP address is screened out from an obtained monitoring log according to preset screening conditions. Each monitoring log comprises an IP address and a device identifier. And then screening out a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining the coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address. And each first target monitoring log comprises a corresponding stable IP address. And finally, obtaining the target equipment identification of the staff of the target enterprise according to the coverage area of each stable IP address, the target geographical area where the target enterprise is located and the obtained monitoring log. Therefore, the target equipment identification of the staff of the target enterprise is determined by combining the coverage area of the IP address, the target geographical area where the target enterprise is actually located and the obtained monitoring log, and the accuracy of the obtained target equipment identification is improved.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 is a block schematic diagram of an electronic device provided in an embodiment of the present application;
fig. 2 is a schematic flowchart of a target device identifier determining method provided in an embodiment of the present application;
FIG. 3 is a schematic flow chart of the sub-steps included in step S110 of FIG. 2;
FIG. 4 is a schematic flow chart of the sub-steps included in step S120 of FIG. 2;
FIG. 5 is a schematic flow chart of a sub-step included in step S130 in FIG. 2;
FIG. 6 is a schematic flow chart of another sub-step included in step S130 of FIG. 2;
fig. 7 is a schematic block diagram of a target device identifier determining apparatus according to an embodiment of the present application.
Icon: 100-an electronic device; 110-a memory; 120-a processor; 130-a communication unit; 200-target device identification determining means; 210-a first determination module; 220-a second determination module; 230-third determination module.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments of the present application without making any creative effort, shall fall within the protection scope of the present application.
It is noted that relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Referring to fig. 1, fig. 1 is a block diagram of an electronic device 100 according to an embodiment of the present disclosure. The electronic device 100 may be, but is not limited to, a personal computer, a server, or the like. The electronic device 100 includes a memory 110, a processor 120, and a communication unit 130. The elements of the memory 110, the processor 120 and the communication unit 130 are electrically connected to each other directly or indirectly to realize data transmission or interaction. For example, the components may be electrically connected to each other via one or more communication buses or signal lines.
The memory 110 is used to store programs or data. The Memory 110 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an erasable Read-Only Memory (EPROM), an electrically erasable Read-Only Memory (EEPROM), and the like.
The processor 120 is used to read/write data or programs stored in the memory 110 and perform corresponding functions. For example, the memory 110 stores a target device identification determining apparatus 200, and the target device identification determining apparatus 200 includes at least one software functional module which can be stored in the memory 110 in the form of software or firmware (firmware). The processor 120 executes various functional applications and data processing by running software programs and modules stored in the memory 110, such as the target device identification determination apparatus 200 in the embodiment of the present application, so as to implement the target device identification determination method in the embodiment of the present application.
The communication unit 130 is used for establishing a communication connection between the electronic apparatus 100 and another communication terminal via a network, and for transceiving data via the network.
It should be understood that the structure shown in fig. 1 is only a schematic structural diagram of the electronic device 100, and the electronic device 100 may also include more or fewer components than shown in fig. 1, or have a different configuration than shown in fig. 1. The components shown in fig. 1 may be implemented in hardware, software, or a combination thereof.
Referring to fig. 2, fig. 2 is a schematic flowchart of a target device identifier determining method according to an embodiment of the present application. The method is applied to the electronic device 100. The following describes a specific process of the target device identifier determining method in detail.
And step S110, screening out stable IP addresses from the obtained monitoring logs according to preset screening conditions. Wherein, each monitoring log comprises an IP address and a device identification.
Step S120, screening out a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining the coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address. And each first target monitoring log comprises a corresponding stable IP address.
Step S130, obtaining target equipment identification of the staff of the target enterprise according to the coverage area of each stable IP address, the target geographical area where the target enterprise is located and the obtained monitoring log.
In this embodiment, the electronic device 100 may store a monitoring log within a preset time period (for example, the last month). Each monitoring log may include device identification, IP address, etc. The Device Identifier may be, but is not limited to, an Identifier that can uniquely identify a Device, such as a MAC (Media Access Control) address, an android ID (android ID) or an OAID (open anonymous Device Identifier) of the Device. If one monitoring log comprises the equipment identifier a and the IP address 1, the equipment corresponding to the equipment identifier a can be determined to use the IP address 1 to surf the internet.
The monitoring log may be a log generated according to the internet access behavior of the user. For example, after a user browses an advertisement through a mobile terminal a using a certain IP address to surf the internet, a monitoring log about the advertisement is generated, where the monitoring log includes a device identifier of the mobile terminal a, an IP address used for surfing the internet, and the like.
And when the target equipment identification of the staff of the target enterprise needs to be determined, screening stable IP addresses from the obtained monitoring logs according to preset screening conditions, and then obtaining all first target monitoring logs corresponding to each stable IP address according to the obtained monitoring logs. And the first target monitoring log corresponding to each stable IP address comprises the stable IP address. For example, each first target monitoring log corresponding to the IP address 1 as the stable IP address includes the IP address 1. Further, the monitoring log may further include location information. And then, aiming at each stable IP address, obtaining the coverage area of the stable IP address according to the position information in each first target monitoring log corresponding to the stable IP address. And finally, combining the coverage area of each stable IP address, the target geographic area of the target enterprise and the obtained monitoring log to obtain the target equipment identification of the staff of the target enterprise.
The location information of the target enterprise can be obtained in advance according to the network public information of the target enterprise, and then the target geographical area where the target enterprise is located can be obtained according to the information of the target enterprise. The target geographic area includes a plurality of locations corresponding to the latitude and longitude information.
The monitoring log may include Location Based Services (LBS) information, where the LBS information includes latitude and longitude information (i.e., Location information) of a terminal corresponding to the monitoring log when a behavior corresponding to the monitoring log is generated. The location-based service refers to a value-added service that acquires location Information of a mobile terminal user through a radio communication network or an external positioning mode of a telecommunication mobile operator and provides corresponding services for the user under the support of a GIS (Geographic Information System) platform.
Therefore, a stable area of each stable IP address is obtained from the obtained monitoring logs, and then the target equipment identification of the staff of the target enterprise is obtained by combining the coverage area of the IP address, the target geographical area where the target enterprise is actually located and the obtained monitoring logs. Compared with the mode of determining the target equipment identification of the staff of the target enterprise only according to the online behavior, the method and the system for determining the target equipment identification of the target enterprise improve the accuracy of the obtained target equipment identification by combining the network information with the actual geographic area of the target enterprise.
Wherein the preset screening condition may be set according to a definition of a stable IP address determined based on an actual situation. For example, it is determined that an IP address used in some usage scenarios is a stable IP address, if the corresponding relationship between the IP address and the usage scenario is stored in the electronic device 100, the preset screening condition may include the preset usage scenario, and then, according to the obtained IP address in the monitoring log, the corresponding relationship between the IP address and the usage scenario, an IP address corresponding to the preset usage scenario is screened out, and the IP address is used as the stable IP address. Wherein the usage scenario includes: the system comprises a school institution, an enterprise user, a mobile network and the like, wherein the IP addresses used by the school institution and the enterprise user are generally stable IP addresses, and the mobile network generally uses changeable and unstable mobile IP addresses.
Optionally, the monitoring log further includes a generation time, and the generation time may be used to indicate a time when the monitoring log is generated. In this embodiment, the stable IP address can be screened out as follows. Referring to fig. 3, fig. 3 is a flowchart illustrating sub-steps included in step S110 in fig. 2. Step S110 may include substeps S111 to substep S114.
And a substep S111, aiming at each IP address, obtaining a fifth target monitoring log corresponding to the IP address according to the obtained monitoring log.
And a substep S112, obtaining, according to the fifth target monitoring logs, a first number of devices accessing the internet through the IP address and a second number of fifth target monitoring logs generated within a preset time period, and determining a third number of fifth target monitoring logs corresponding to each device.
And a substep S113, taking the devices of which the third number is greater than the third preset number as the devices to be counted, and obtaining a fourth number of the devices to be counted.
And a substep S114, determining that the IP address is a stable IP address when at least one of the first number is greater than a first preset number, the second number is greater than a second preset number, and the fourth number is greater than a fourth preset number is satisfied.
In this embodiment, the obtained monitoring logs may be classified according to the IP addresses included in each monitoring log, and each type of monitoring log corresponds to the same IP address. Thus, a fifth target monitoring log corresponding to each IP address can be obtained.
Then, based on the fifth target monitoring log corresponding to each IP address, the number of unique device identifiers corresponding to each IP address is obtained, that is, the first number of devices accessing the internet using the IP address is obtained. For example, there are 100 fifth target monitoring logs corresponding to the IP address 1, and a total of 100 device identifiers are included in the 100 fifth target monitoring logs. If there are 50 non-overlapping device identifiers in the 100 device identifiers, it means that 50 devices use the IP address 1 to surf the internet.
After the fifth target monitoring log corresponding to each IP address is determined, for each IP address, according to a preset time period and generation time in the fifth target monitoring log corresponding to the IP address, a second number of the fifth target monitoring logs whose generation time is within the preset time period is obtained. The preset time period can be set according to actual requirements. For example, when determining the target device identifier of the employee of the target enterprise, the preset time period may be determined according to the work hours of the employee of the target enterprise, for example, set as a working day, or set as 9: 00-18: 00, and the like.
For example, the preset time period is a working day, and there are 100 fifth target monitoring logs corresponding to the IP address 1. If the generation time of a total of 40 fifth target monitoring logs in the 100 fifth target monitoring logs is within the working day, the second number of the fifth target monitoring logs of which the generation time corresponding to the IP address is within the preset time period is 40.
After the fifth target monitoring log corresponding to each IP address is determined, the fifth target monitoring logs corresponding to each IP address may be further classified according to the device identifier, so as to obtain a third number of the fifth target monitoring logs corresponding to each device, that is, the number of times each device uses each IP address to surf the internet is obtained. And then, taking the devices with the third number larger than the third preset number as the devices to be counted, so as to obtain a fourth number of the devices to be counted.
For example, there are 100 fifth target monitoring logs corresponding to the IP address 1, and the 100 fifth target monitoring logs are classified according to the device identifier, so as to obtain the fifth target monitoring log corresponding to each device identifier. If there are multiple fifth target monitoring logs corresponding to one device identifier, the multiple fifth target monitoring logs include the same IP address and the same device identifier, and the number of the fifth target monitoring logs corresponding to the device identifier indicates the number of times that the device corresponding to the device identifier uses the IP address to surf the internet.
Assuming that the third number of the fifth target monitoring logs corresponding to the device a1 is 10, the third number of the fifth target monitoring logs corresponding to the device a2 is 15, the third number of the fifth target monitoring logs corresponding to the device A3 is 1, and the third preset number is 2, both the devices a1 and a2 are taken as devices to be counted, and the fourth number of the devices to be counted is determined to be 2, based on the fifth target monitoring logs corresponding to the IP address 1.
When judging whether an IP address is a stable IP address, the judgment may be performed according to the first number, the second number, and the fourth number corresponding to each IP address.
In an implementation manner of this embodiment, the first number corresponding to the IP address may be compared with a first preset number. If the first number is greater than the first preset number, the IP address can be used as a stable IP address. And if the first number is not greater than the first preset number, not taking the IP address as a stable IP address. Thus, an IP address that is often used can be used as the stable IP address.
In another implementation manner of this embodiment, the second number corresponding to the IP address may be compared with a second preset number. If the second number is greater than the second preset number, the IP address can be used as a stable IP address. And if the second number is not greater than the second preset number, not taking the IP address as a stable IP address. Thus, an IP address that is frequently used within a preset time period can be used as the stable IP address. When the preset time period is the working day, the IP address with the internet access characteristic of more monitoring log data volume generated by the working day can be obtained through the method.
In another implementation manner of this embodiment, the fourth number corresponding to the IP address may be compared with a fourth preset number. If the fourth number is greater than the fourth preset number, the IP address may be used as a stable IP address. And if the fourth quantity is not greater than the fourth preset quantity, not taking the IP address as a stable IP address. Therefore, the IP address frequently used by the equipment can be used as the stable IP address, and the Internet access characteristic of the IP address is that the stable relation with a plurality of equipment is kept for a long time.
For example, if it is determined from the obtained monitoring log that: and respectively surfing the internet for more than 3 times by 51 devices through the IP address 1 in one month, wherein the third preset number in the preset screening conditions is 2, and the fourth number in the preset screening conditions is 50, so that the IP address 1 can be determined to be a stable IP address.
In another implementation manner of this embodiment, when at least two of the first number is greater than a first preset number, the second number is greater than a second preset number, and the fourth number is greater than a fourth preset number are satisfied, the IP address may be used as the stable IP address.
The first preset quantity, the second preset quantity, the third preset quantity and the fourth preset quantity can be set according to actual conditions. It is understood that the above-mentioned method of screening out the stable IP address is only an example, and the stable IP address may be determined in other ways.
After the stable IP addresses are determined, the coverage area of each stable IP address can be obtained according to the position information in the first target monitoring log corresponding to each stable IP address. Referring to fig. 4, fig. 4 is a flowchart illustrating sub-steps included in step S120 in fig. 2. Step S120 may include substeps S121 and substep S122.
And a substep S121, aiming at each stable IP address, determining a polygonal area corresponding to the stable IP address according to the position information in the first target monitoring log corresponding to the stable IP address.
And a substep S122, taking the center of gravity of the polygonal area as a circle center, taking the maximum distance value of the distance between the circle center and the position corresponding to the position information in the first target monitoring log corresponding to the stable IP address as a radius, obtaining a circular area, and taking the circular area as a coverage area of the stable IP address.
In this embodiment, a description will be given of a manner of determining a coverage area of a stable IP address, taking the stable IP address as an example.
Firstly, a polygonal area is determined according to the position information in each first target monitoring log corresponding to the stable IP address. The multi-transformation area includes a position corresponding to the position information in each first target monitoring log corresponding to the stable IP address. Optionally, the multi-deformation region may be a minimum multi-deformation region determined according to a position corresponding to the position information in each corresponding first target monitoring log. The multi-deformation zone may also be a larger zone than the minimum multi-deformation zone, determined by the actual requirements.
Then, the distance between the center of gravity of the polygonal area and the position corresponding to the position information in each first target monitoring log corresponding to the stable IP address is determined, and then the maximum distance value in the partial distance is obtained. Then, a circular area is obtained by using the center of gravity of the polygonal area as the center of the circle and the maximum distance as the radius, and the circular area can be used as the coverage area of the stable IP address.
In one implementation of this embodiment, the target device identifier of the employee of the target enterprise may be determined according to the coverage area of each stable IP address, the target geographic area where the target enterprise is located, and the obtained monitoring log in the following manner. Referring to fig. 5, fig. 5 is a flowchart illustrating a sub-step included in step S130 in fig. 2. Step S130 may include substeps S131 to substep S132.
And a substep S131 of judging whether the coverage area of each stable IP address is intersected with the target geographic area, and taking the stable IP address of the coverage area intersected with the target geographic area as the target IP address of the target enterprise when the coverage area of each stable IP address is intersected with the target geographic area.
Substep S132, obtaining a second target monitoring log including the target IP address from the obtained monitoring log, and using the device identifier in the second target monitoring log as the target device identifier of the employee of the target enterprise.
When the target enterprise has only one target geographic area, whether the coverage area with the stable IP address is intersected with the target geographic area of the target enterprise can be judged through area comparison. If so, the stable IP address of the coverage area intersected with the target geographic area of the target enterprise is taken as the target IP address (namely the exit IP address) of the target enterprise. Therefore, the monitoring log is combined with the actual position of the target enterprise to obtain the target IP address of the target enterprise.
And then, according to the obtained monitoring log, obtaining a second target monitoring log of which the monitoring log comprises the target IP address, wherein the equipment identifier in the second target monitoring log can be used as the target equipment identifier of the employee of the target enterprise. Therefore, the device identification of the device which uses the target IP address to surf the internet can be obtained, and the obtained device identification is the device identification of the staff of the target enterprise.
Optionally, after obtaining the second target monitoring log corresponding to each target IP address, for each target IP address, obtaining the number of times that each device uses the target IP address to surf the internet, and then taking the device with the number of times greater than a preset number of times (for example, 2 times) as the device of the target enterprise employee. Therefore, the accuracy of the obtained target device identification can be further improved.
In another implementation manner of this embodiment, if there are multiple target geographic areas where the target enterprise is located and there are no staff meetings in the multiple target geographic areas, the stable IP address where the coverage area intersects with any one of the target geographic areas may be used as the target IP address of the target enterprise in any one of the target geographic areas. For example, the target geographical area where the target enterprise is located has B1, B2, and B3, and if the coverage area of the stable IP address 1 intersects with the target geographical area B2, the stable IP address 1 may be the target IP address of the target enterprise in the target geographical area B2. And then, using the device identification of the device which uses the target IP address to surf the internet as the target device identification of the staff of the target enterprise.
In another implementation manner of this embodiment, if there are a plurality of target geographic areas where the target enterprise is located and staff meetings exist in the plurality of target geographic areas, the target device identifiers of the staff of the target enterprise may be determined in the following manner. Referring to fig. 6, fig. 6 is a flowchart illustrating another sub-step included in step S130 in fig. 2. Step S130 may include sub-step S134 to sub-step S137.
And a substep S134, judging whether the coverage area of each stable IP address is intersected with the target geographic area or not aiming at each target geographic area, and taking the stable IP address of the coverage area intersected with the target geographic area as an alternative IP address of the target enterprise in the target geographic area when the coverage area of each stable IP address is intersected with the target geographic area.
And a substep S135, for each target geographic area, obtaining a third target monitoring log including an alternative IP address of the target geographic area from the obtained monitoring logs, and using the device identifier in the third target monitoring log as an alternative device identifier of the employee of the target enterprise in the target geographic area.
And a substep S136, determining whether there is at least one candidate IP address corresponding to the candidate device identifier in the multiple target geographic areas according to the obtained monitoring log, and if so, using the multiple candidate IP addresses corresponding to the at least one candidate device as the target IP addresses of the corresponding target geographic areas.
And a substep S137, obtaining a fourth target monitoring log including the target IP address from the obtained monitoring log, and using the device identifier in the fourth target monitoring log as the target device identifier of the employee of the target enterprise.
In this embodiment, if a coverage area of a stable IP address intersects with a target geographic area, the stable IP address may be used as an alternative IP address of the target enterprise in the target geographic area. Then, for each target geographic area, obtaining a device identifier of a device that surfs the internet using the alternative IP address of the target geographic area, and using the obtained device identifier as an alternative device identifier of an employee of the target enterprise in the target geographic area. The device for surfing the internet through the alternative IP address can be obtained according to the monitoring log comprising the alternative IP address.
And obtaining the alternative IP address and the target geographical area corresponding to each alternative equipment identifier according to the corresponding relation among the target geographical area, the alternative IP address and the alternative equipment identifier. Based on this, it can be determined whether there is an alternative IP address where one alternative device identifier corresponds to multiple target geographic areas, i.e., whether one device uses alternative IP addresses of at least two target geographic areas to surf the internet. If so, the alternative IP addresses of the at least two target geographic areas may be used as the target IP addresses of the corresponding target geographic areas. And then, according to the obtained monitoring log, obtaining the device identifications of all devices which use the target IP address to surf the internet, wherein the device identifications are the target device identifications of the employees of the target enterprise.
Optionally, a coincidence calculation may be performed according to the candidate device identifier of each target geographic area, so as to obtain candidate device identifiers corresponding to a plurality of target geographic areas, further take the candidate device identifiers as target device identifiers, take the candidate IP addresses corresponding to the target device identifiers (i.e., the candidate IP addresses used by the device to which the target device identifiers belong) as the target IP addresses of the corresponding target geographic areas, and then identify all the target devices based on the target IP addresses.
It may also be determined whether multiple candidate device identifiers correspond to candidate IP addresses of multiple target geographic areas, that is, whether multiple devices use the same candidate IP address in the same multiple target geographic areas to surf the internet, for example, whether the devices a1 and a2 surf the internet using both the candidate IP address 1 in the target geographic area B1 and the candidate IP address 2 in the target geographic area B2. And then the target equipment identification is determined in the same way. Therefore, the accuracy of the obtained target equipment identification can be further improved.
When the device to which the candidate device identifier belongs uses the candidate IP address to surf the internet, it may be considered that the candidate device identifier and the candidate IP address have a corresponding relationship. The above judgment condition may be set according to actual requirements. For example, when at least two candidate device identifications correspond to the same candidate IP addresses of the same at least two target geographic areas, the same candidate IP addresses of the at least two target geographic areas are set as the target IP addresses of the corresponding target geographic areas.
For example, the candidate device identifiers a1, a2, and a3 correspond to the candidate IP address 1 of the target geographic area B1, and the candidate device identifiers a2, a3, and a4 correspond to the candidate IP address 2 of the target geographic area B2. The candidate device identifiers a2 and A3 correspond to the target geographic areas B1 and B2 at the same time, which means that the devices a2 and A3 corresponding to the candidate device identifiers a2 and A3 use the candidate IP address 1 of the target geographic area B1 and the candidate IP address 2 of the target geographic area B2 to surf the internet. If the judgment condition is as follows: when the device corresponding to at least two candidate device identifications uses one candidate IP address of one target geographic area to pass through the network and uses one candidate IP address of another target geographic area to pass through the network, determining that the two candidate IP addresses are respectively the target IP addresses of the corresponding target geographic areas, determining that the personnel using the devices a2 and A3 are the employees of the target enterprise, the candidate IP address 1 is the target IP address of the target geographic area B1, and the candidate IP address 2 is the target IP address of the target geographic area 2.
The above target device identification determination method is exemplified below.
Suppose a customer wants to generalize his new product concept to employees of a given enterprise. Wherein the designated enterprise is the target enterprise. The target enterprise has two points of business: m1, M2. Acquiring longitude and latitude information of two office points through online public information, wherein the M1: 121.417085,31.219017, M1: 116.480639,39.996356. Based on this, two target geographic regions may be determined.
And screening out stable IP addresses from the monitoring logs of one month. And acquiring the coverage area of each stable IP address according to the LBS information in the monitoring log corresponding to each stable IP address. And performing intersection calculation on each target geographic area and the coverage area of each IP address to obtain two groups of alternative IP addresses, wherein one group is the alternative IP address of which the coverage area intersects with the target geographic area of 'M1', and the other group is the alternative IP address of which the coverage area intersects with the target geographic area of 'M2'. These alternative IP addresses may be the internet IP address of the target enterprise. Then, for each alternative IP address, the equipment identification using the alternative IP address is obtained from the monitoring log of the month. Thus, alternate device identifications for each target geographic area may be obtained.
The business trip communication behavior of the employees in two places is simulated, and the business trip behavior is that employee C works at M1, and employees C to M2 go on business because of work reasons. When M1 or M2 works, the monitoring log records the online behavior of employee C, so that employee C actually connects M1 and M2 in series, because he uses both the IP address of M1 and the IP address of M2 to surf the internet.
By performing coincidence calculation on the candidate device identifications of the two target geographic areas, the device identification of the employee who is likely to be a business trip can be found, that is, the device identification of the employee a is found. After the device identification of the employee A is found, the alternative IP address used by the device of the employee A can be obtained, and the alternative IP address corresponds to the target IP address of the target geographic area. The method finds the following IP addresses: 111.200.229.2/180.168.94.250/61.149.7.195/101.231.203.90/106.38.108.234
And finally, finding out the equipment identifications of all the equipment connected with the target IP address through the target IP address, wherein the equipment identifications are the target equipment identifications of the employees of the target enterprise.
In order to execute the corresponding steps in the foregoing embodiments and various possible manners, an implementation manner of the target device identifier determining apparatus 200 is given below, and optionally, the target device identifier determining apparatus 200 may adopt the device structure of the electronic device 100 shown in fig. 1. Further, referring to fig. 7, fig. 7 is a block diagram illustrating an apparatus 200 for determining a target device identifier according to an embodiment of the present application. It should be noted that the basic principle and the generated technical effect of the target device identifier determining apparatus 200 provided in the present embodiment are the same as those of the above embodiments, and for the sake of brief description, no part of the present embodiment is mentioned, and reference may be made to the corresponding contents in the above embodiments. The target device identification determining apparatus 200 may include: a first determination module 210, a second determination module 220, and a third determination module 230.
The first determining module 210 is configured to screen out a stable IP address from the obtained monitoring log according to a preset screening condition. Wherein, each monitoring log comprises an IP address and a device identification.
The second determining module 220 is configured to screen out the first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determine a coverage area of each stable IP address according to the location information in the first target monitoring log corresponding to each stable IP address. And each first target monitoring log comprises a corresponding stable IP address.
The third determining module 230 is configured to obtain the target device identifier of the employee of the target enterprise according to the coverage area of each stable IP address, the target geographic area where the target enterprise is located, and the obtained monitoring log.
Optionally, in this embodiment, the third determining module 230 is specifically configured to:
judging whether the coverage area of each stable IP address is intersected with the target geographic area, and taking the stable IP address of the coverage area intersected with the target geographic area as the target IP address of the target enterprise when the coverage area of each stable IP address is intersected with the target geographic area;
and obtaining a second target monitoring log comprising the target IP address from the obtained monitoring logs, and taking the device identifier in the second target monitoring log as a target device identifier of the employee of the target enterprise.
Optionally, in this embodiment, if there are a plurality of target geographic areas where the target enterprise is located, the third determining module 230 is specifically configured to:
judging whether the coverage area of each stable IP address is intersected with each target geographic area or not aiming at each target geographic area, and taking the stable IP address of the coverage area intersected with the target geographic area as an alternative IP address of the target enterprise in the target geographic area when the coverage area of each stable IP address is intersected with the target geographic area;
for each target geographic area, obtaining a third target monitoring log comprising an alternative IP address of the target geographic area from the obtained monitoring logs, and taking a device identifier in the third target monitoring log as an alternative device identifier of an employee of the target enterprise in the target geographic area;
judging whether at least one alternative equipment identifier corresponds to alternative IP addresses of a plurality of target geographical areas or not according to the obtained monitoring log, and if so, taking the alternative IP addresses corresponding to the at least one alternative equipment identifier as the target IP addresses of the corresponding target geographical areas;
and obtaining a fourth target monitoring log comprising the target IP address from the obtained monitoring logs, and taking the device identifier in the fourth target monitoring log as a target device identifier of the employee of the target enterprise.
Alternatively, the modules may be stored in the memory 110 shown in fig. 1 in the form of software or Firmware (Firmware) or be fixed in an Operating System (OS) of the electronic device 100, and may be executed by the processor 120 in fig. 1. Meanwhile, data, codes of programs, and the like required to execute the above-described modules may be stored in the memory 110.
Embodiments of the present application also provide a readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the target device identification determination method.
In summary, the embodiments of the present application provide a method and an apparatus for determining a target device identifier, an electronic device, and a readable storage medium. Firstly, a stable IP address is screened out from an obtained monitoring log according to a preset screening condition. Each monitoring log comprises an IP address and a device identifier. And then screening out a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining the coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address. And each first target monitoring log comprises a corresponding stable IP address. And finally, obtaining the target equipment identification of the staff of the target enterprise according to the coverage area of each stable IP address, the target geographical area where the target enterprise is located and the obtained monitoring log. Therefore, the target equipment identification of the staff of the target enterprise is determined by combining the coverage area of the IP address, the target geographical area where the target enterprise is actually located and the obtained monitoring log, and the accuracy of the obtained target equipment identification is improved.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. A method for determining a target device identifier, the method comprising:
screening stable IP addresses from the obtained monitoring logs according to preset screening conditions, wherein each monitoring log comprises an IP address and equipment identification;
screening out a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining the coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address, wherein each first target monitoring log comprises the corresponding stable IP address;
and obtaining the target equipment identification of the staff of the target enterprise according to the coverage area of each stable IP address, the target geographical area where the target enterprise is located and the obtained monitoring log.
2. The method of claim 1, wherein obtaining the target device identifier of the employee of the target enterprise according to the coverage area of each stable IP address, the target geographic area where the target enterprise is located, and the obtained monitoring log comprises:
judging whether the coverage area of each stable IP address is intersected with the target geographic area, and taking the stable IP address of the coverage area intersected with the target geographic area as the target IP address of the target enterprise when the coverage area of each stable IP address is intersected with the target geographic area;
and obtaining a second target monitoring log comprising the target IP address from the obtained monitoring logs, and taking the device identifier in the second target monitoring log as a target device identifier of the employee of the target enterprise.
3. The method according to claim 1, wherein if there are a plurality of target geographical areas where the target enterprise is located, obtaining the target device identifier of the employee of the target enterprise according to the coverage area of each stable IP address, the target geographical area where the target enterprise is located, and the obtained monitoring log comprises:
judging whether the coverage area of each stable IP address is intersected with each target geographic area or not aiming at each target geographic area, and taking the stable IP address of the coverage area intersected with the target geographic area as an alternative IP address of the target enterprise in the target geographic area when the coverage area of each stable IP address is intersected with the target geographic area;
for each target geographic area, obtaining a third target monitoring log comprising an alternative IP address of the target geographic area from the obtained monitoring logs, and taking a device identifier in the third target monitoring log as an alternative device identifier of an employee of the target enterprise in the target geographic area;
judging whether at least one alternative equipment identifier corresponds to alternative IP addresses of a plurality of target geographical areas or not according to the obtained monitoring log, and if so, taking the alternative IP addresses corresponding to the at least one alternative equipment identifier as the target IP addresses of the corresponding target geographical areas;
and obtaining a fourth target monitoring log comprising the target IP address from the obtained monitoring logs, and taking the device identifier in the fourth target monitoring log as a target device identifier of the employee of the target enterprise.
4. The method according to any one of claims 1 to 3, wherein the monitoring log further includes a generation time, and the screening out the stable IP address from the obtained monitoring log according to the preset screening condition comprises:
aiming at each IP address, obtaining a fifth target monitoring log corresponding to the IP address according to the obtained monitoring log;
according to the fifth target monitoring logs, acquiring a first number of devices accessing the Internet through the IP address and a second number of the fifth target monitoring logs with generation time within a preset time period, and determining a third number of the fifth target monitoring logs corresponding to each device;
taking the devices with the third number larger than the third preset number as the devices to be counted, and obtaining a fourth number of the devices to be counted;
and when at least one of the first number is larger than a first preset number, the second number is larger than a second preset number, and the fourth number is larger than a fourth preset number is met, determining that the IP address is a stable IP address.
5. The method of claim 1, wherein determining the coverage area of each stable IP address according to the location information in the first target monitoring log corresponding to each stable IP address comprises:
aiming at each stable IP address, determining a polygonal area corresponding to the stable IP address according to the position information in the first target monitoring log corresponding to the stable IP address, wherein the polygonal area comprises a position corresponding to the position information in the first target monitoring log corresponding to the stable IP address;
and taking the center of gravity of the polygonal area as a circle center, taking the maximum distance value of the distance between the circle center and the position corresponding to the position information in the first target monitoring log corresponding to the stable IP address as a radius, obtaining a circular area, and taking the circular area as a coverage area of the stable IP address.
6. An apparatus for determining a target device identity, the apparatus comprising:
the first determining module is used for screening stable IP addresses from the obtained monitoring logs according to preset screening conditions, wherein each monitoring log comprises the IP addresses and equipment identifiers;
the second determining module is used for screening out a first target monitoring log corresponding to each stable IP address from the obtained monitoring logs, and determining the coverage area of each stable IP address according to the position information in the first target monitoring log corresponding to each stable IP address, wherein each first target monitoring log comprises the corresponding stable IP address;
and the third determining module is used for obtaining the target equipment identification of the staff of the target enterprise according to the coverage area of each stable IP address, the target geographical area where the target enterprise is located and the obtained monitoring log.
7. The apparatus of claim 6, wherein the third determining module is specifically configured to:
judging whether the coverage area of each stable IP address is intersected with the target geographic area, and taking the stable IP address of the coverage area intersected with the target geographic area as the target IP address of the target enterprise when the coverage area of each stable IP address is intersected with the target geographic area;
and obtaining a second target monitoring log comprising the target IP address from the obtained monitoring logs, and taking the device identifier in the second target monitoring log as a target device identifier of the employee of the target enterprise.
8. The apparatus of claim 6, wherein if there are multiple target geographic areas in which the target enterprise is located, the third determining module is specifically configured to:
judging whether the coverage area of each stable IP address is intersected with each target geographic area or not aiming at each target geographic area, and taking the stable IP address of the coverage area intersected with the target geographic area as an alternative IP address of the target enterprise in the target geographic area when the coverage area of each stable IP address is intersected with the target geographic area;
for each target geographic area, obtaining a third target monitoring log comprising an alternative IP address of the target geographic area from the obtained monitoring logs, and taking a device identifier in the third target monitoring log as an alternative device identifier of an employee of the target enterprise in the target geographic area;
judging whether at least one alternative equipment identifier corresponds to alternative IP addresses of a plurality of target geographical areas or not according to the obtained monitoring log, and if so, taking the alternative IP addresses corresponding to the at least one alternative equipment identifier as the target IP addresses of the corresponding target geographical areas;
and obtaining a fourth target monitoring log comprising the target IP address from the obtained monitoring logs, and taking the device identifier in the fourth target monitoring log as a target device identifier of the employee of the target enterprise.
9. An electronic device comprising a processor and a memory, the memory storing machine executable instructions executable by the processor to implement the target device identification determination method of any one of claims 1-5.
10. A readable storage medium on which a computer program is stored, which computer program, when being executed by a processor, carries out the target device identification determination method according to any one of claims 1 to 5.
CN201911220279.3A 2019-12-03 2019-12-03 Target equipment identification determining method and device, electronic equipment and readable storage medium Active CN110990244B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911220279.3A CN110990244B (en) 2019-12-03 2019-12-03 Target equipment identification determining method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911220279.3A CN110990244B (en) 2019-12-03 2019-12-03 Target equipment identification determining method and device, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN110990244A true CN110990244A (en) 2020-04-10
CN110990244B CN110990244B (en) 2023-09-01

Family

ID=70089549

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911220279.3A Active CN110990244B (en) 2019-12-03 2019-12-03 Target equipment identification determining method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN110990244B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111752796A (en) * 2020-06-22 2020-10-09 北京明略昭辉科技有限公司 Method and device for determining machine type corresponding to log information
CN111752217A (en) * 2020-06-19 2020-10-09 上海控软网络科技有限公司 Method and device for determining machine tool identification code, electronic equipment and storage medium
CN115378827A (en) * 2022-08-04 2022-11-22 银联智惠信息服务(上海)有限公司 Internet protocol address analysis method and device, server and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090198746A1 (en) * 2008-02-01 2009-08-06 Microsoft Corporation Generating anonymous log entries
US20120265616A1 (en) * 2011-04-13 2012-10-18 Empire Technology Development Llc Dynamic advertising content selection
US20130060633A1 (en) * 2011-09-01 2013-03-07 Nicholas St-Pierre Privacy-enhanced internet advertising system
CN103995907A (en) * 2014-06-13 2014-08-20 北京奇艺世纪科技有限公司 Determining method of access users
CN104965876A (en) * 2015-06-12 2015-10-07 微梦创科网络科技(中国)有限公司 Method and apparatus for carrying out mining on work units of users on basis of position information
CN108390788A (en) * 2018-03-05 2018-08-10 北京奇艺世纪科技有限公司 User identification method, device and electronic equipment
US20180253434A1 (en) * 2017-03-02 2018-09-06 Discovered Intelligence Inc. System for Aggregation and Prioritization of IT Asset Field Values from Real-Time Event Logs and Method thereof
CN110324845A (en) * 2019-07-16 2019-10-11 秒针信息技术有限公司 A kind of method and device of resource allocation

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090198746A1 (en) * 2008-02-01 2009-08-06 Microsoft Corporation Generating anonymous log entries
US20120265616A1 (en) * 2011-04-13 2012-10-18 Empire Technology Development Llc Dynamic advertising content selection
US20130060633A1 (en) * 2011-09-01 2013-03-07 Nicholas St-Pierre Privacy-enhanced internet advertising system
CN103995907A (en) * 2014-06-13 2014-08-20 北京奇艺世纪科技有限公司 Determining method of access users
CN104965876A (en) * 2015-06-12 2015-10-07 微梦创科网络科技(中国)有限公司 Method and apparatus for carrying out mining on work units of users on basis of position information
US20180253434A1 (en) * 2017-03-02 2018-09-06 Discovered Intelligence Inc. System for Aggregation and Prioritization of IT Asset Field Values from Real-Time Event Logs and Method thereof
CN108390788A (en) * 2018-03-05 2018-08-10 北京奇艺世纪科技有限公司 User identification method, device and electronic equipment
CN110324845A (en) * 2019-07-16 2019-10-11 秒针信息技术有限公司 A kind of method and device of resource allocation

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111752217A (en) * 2020-06-19 2020-10-09 上海控软网络科技有限公司 Method and device for determining machine tool identification code, electronic equipment and storage medium
CN111752796A (en) * 2020-06-22 2020-10-09 北京明略昭辉科技有限公司 Method and device for determining machine type corresponding to log information
CN111752796B (en) * 2020-06-22 2024-01-26 北京明略昭辉科技有限公司 Method and device for determining model corresponding to log information
CN115378827A (en) * 2022-08-04 2022-11-22 银联智惠信息服务(上海)有限公司 Internet protocol address analysis method and device, server and storage medium

Also Published As

Publication number Publication date
CN110990244B (en) 2023-09-01

Similar Documents

Publication Publication Date Title
US20210006937A1 (en) Systems and methods for deploying dynamic geo-fences based on content consumption levels in a geographic location
US10841364B2 (en) Using and comparing known and current activity states to determine receptiveness
CN110990244B (en) Target equipment identification determining method and device, electronic equipment and readable storage medium
CN103023718B (en) A kind of user logs in monitoring equipment and method
US10817912B2 (en) Identification of targets for a campaign by referencing a blockchain and/or a distributed system file system
US20170046753A1 (en) Provisioning an interactive feedback service via a network
US9554402B2 (en) Freeing up mobile network for important phone calls in case of disaster
US20100075697A1 (en) Wifi and gsm landmarks and neighborhoods for location based services
WO2019055089A1 (en) Enabling and disabling location sharing based on environmental signals
US20100211516A1 (en) Method and system for matching employers with job-seeking individuals
US20120284333A1 (en) Collection and analysis of location data from location-aware mobile devices on a network
CN107454126B (en) Message pushing method, server and terminal
CN107733786B (en) Friend recommendation method and device
US11483672B2 (en) Dynamic geofence radius
CN105491172B (en) It is a kind of for determining the method and apparatus of the information of home location of network address
US20210258723A1 (en) Intelligent geofence provisioning
US10187262B2 (en) Automated multi-user system detection
US20220043893A1 (en) Methods and apparatus for automatic permission assignment
CN111104598B (en) Method and device for directionally pushing information, electronic equipment and readable storage medium
US11216830B1 (en) Mobile communication device location data analysis supporting build-out decisions
CN108133046B (en) Data analysis method and device
CN113434781A (en) Information processing method, device, electronic equipment and readable storage medium
CN112040024A (en) Data processing method, device, equipment and storage medium
US11900398B1 (en) Call management system
CN110990729A (en) Job and live analysis method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant