CN112217880A - Attribution method, attribution device, attribution medium and electronic equipment for application program activation - Google Patents

Attribution method, attribution device, attribution medium and electronic equipment for application program activation Download PDF

Info

Publication number
CN112217880A
CN112217880A CN202011017094.5A CN202011017094A CN112217880A CN 112217880 A CN112217880 A CN 112217880A CN 202011017094 A CN202011017094 A CN 202011017094A CN 112217880 A CN112217880 A CN 112217880A
Authority
CN
China
Prior art keywords
information
activation
download
target application
extraction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011017094.5A
Other languages
Chinese (zh)
Inventor
苏赛
舒彦博
李育国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Volcano Engine Technology Co Ltd
Original Assignee
Beijing Volcano Engine Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Volcano Engine Technology Co Ltd filed Critical Beijing Volcano Engine Technology Co Ltd
Priority to CN202011017094.5A priority Critical patent/CN112217880A/en
Publication of CN112217880A publication Critical patent/CN112217880A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/53Network services using third party service providers
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/61Installation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0214Referral reward systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The disclosure relates to an attribution method, an attribution device, an attribution medium and electronic equipment for activating application programs, belongs to the technical field of computers, and can improve the success rate and the accuracy rate of attribution. An attribution method of application activation, comprising: acquiring download information related to downloading of a target application program; acquiring activation information related to activation of the target application; extracting first extraction information from the download information, and extracting second extraction information from the activation information, wherein the first extraction information comprises fixed equipment characteristic information of a download terminal downloading the target application program and a network address in an IP address, and the second extraction information comprises fixed equipment characteristic information of an activation terminal activating the target application program and a network address in the IP address; and matching the first extraction information and the second extraction information, and performing attribution analysis on the activation of the target application program according to a matching result.

Description

Attribution method, attribution device, attribution medium and electronic equipment for application program activation
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to an attribution method, an attribution apparatus, a attribution medium, and an electronic device for activating an application.
Background
Developers of applications (e.g., game-like APPs) typically launch launched content related to the application on multiple launch platforms. After a user operates (for example, clicks) the released content displayed on a certain releasing platform, the downloading and installation of the related application program are triggered.
This is due to tracking which launch platform the downloaded installation of the application is contributing to. The attribution results are unique, that is, each APP installation (i.e., activation) is attributed to only one delivery platform, that is, the contribution of the installation is attributed to the delivery platform, which delivery platform's delivery content contributes to the last click or presentation before installation.
However, there is currently no good method to improve the success rate of attribution.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
In a first aspect, the present disclosure provides an attribution method for application activation, comprising: acquiring download information related to downloading of a target application program; acquiring activation information related to activation of the target application; extracting first extraction information from the download information, and extracting second extraction information from the activation information, wherein the first extraction information comprises fixed equipment characteristic information of a download terminal downloading the target application program and a network address in an IP address, and the second extraction information comprises fixed equipment characteristic information of an activation terminal activating the target application program and a network address in the IP address; and matching the first extraction information and the second extraction information, and performing attribution analysis on the activation of the target application program according to a matching result.
In a second aspect, the present disclosure provides an application activation attribution device, comprising: a first acquisition module for acquiring download information related to the download of the target application program; a second acquisition module for acquiring activation information related to activation of the target application; an extraction module, configured to extract first extraction information from the download information, and extract second extraction information from the activation information, where the first extraction information includes fixed device feature information of a download terminal that downloads the target application and a network address in an IP address, and the second extraction information includes fixed device feature information of an activation terminal that activates the target application and a network address in an IP address; and the attribution analysis module is used for matching the first extraction information and the second extraction information and carrying out attribution analysis on the activation of the target application program according to a matching result.
In a third aspect, the present disclosure provides a computer readable medium having stored thereon a computer program which, when executed by a processing apparatus, performs the steps of the method of the first aspect of the present disclosure.
In a fourth aspect, the present disclosure provides an electronic device comprising: a storage device having a computer program stored thereon; processing means for executing the computer program in the storage means to implement the steps of the method of the first aspect of the present disclosure.
By adopting the above technical scheme, since the first extraction information is extracted from the download information and the second extraction information is extracted from the activation information, the first extraction information includes the fixed device characteristic information of the download terminal downloading the target application program and the network address in the IP address, the second extraction information includes the fixed device characteristic information of the activation terminal activating the target application program and the network address in the IP address, then the first extraction information and the second extraction information are matched and the activation of the target application program is attributed and analyzed according to the matching result, that is, if the first extraction information and the second extraction information are matched, it is indicated that the activation operation corresponding to the acquired activation information is caused by the download operation corresponding to the acquired download information, and then it can be determined that the casting platform causing the download operation contributes to the activation operation, therefore, the delivery platform is successfully attributed, if the first extraction information and the second extraction information are not matched, it is indicated that the activation operation corresponding to the acquired activation information is not contributed by the download operation corresponding to the acquired download information, and it can be further determined that the activation operation is not contributed by the delivery platform contributing to the download operation, so that the delivery platform fails to be attributed, and thus the success rate and the accuracy rate of attribution are increased.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale. In the drawings:
fig. 1 is a diagram of an interaction scenario among a delivery platform, a third-party monitoring platform and a terminal.
Fig. 2 is a schematic diagram of data transmission between a delivery platform, a third party monitoring platform and a terminal.
FIG. 3 is a flow diagram of an attribution method of application activation according to one embodiment of the present disclosure.
Fig. 4 shows a flowchart of generating the identification information, taking the generation of the first identification information as an example.
FIG. 5 is yet another flow diagram of an attribution method of application activation according to one embodiment of the present disclosure.
FIG. 6 is a schematic block diagram of an application activated attribution device, according to one embodiment of the present disclosure.
FIG. 7 is a schematic block diagram of an attribution analysis module according to one embodiment of the present disclosure.
FIG. 8 is yet another schematic block diagram of an attribution device according to an embodiment of the present disclosure.
Fig. 9 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but rather are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order, and/or performed in parallel. Moreover, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "include" and variations thereof as used herein are open-ended, i.e., "including but not limited to". The term "based on" is "based, at least in part, on". The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments". Relevant definitions for other terms will be given in the following description.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
Fig. 1 is a diagram of an interaction scenario among the delivery platform 20, the third-party monitoring platform 10 and the terminal 30. In fig. 1, the left delivery platform 20 is a platform in a Server to Server (s 2s) mode, and the right delivery platform 20 is a platform in a Client to Server (c 2s) mode.
The delivery platform 20 is a platform on which a developer of an application delivers delivery content related to the application, and the delivery content may be a presentation video, a presentation animation, a presentation picture, a text introduction, and the like related to the application, or may be a download link, and the like related to the application. Delivery platform 20 may be an application store, a social platform with large traffic, and the like.
The third party monitoring platform 10 is a platform that helps application developers monitor the impression and quality of different delivery platforms 20. The attribution method and the attribution device of the application program according to the embodiment of the disclosure are mainly applied to the third-party monitoring platform 10.
The terminal 30 is a device that downloads and activates (i.e., installs) an application. When the user of the terminal sees the released content related to the application program presented on the releasing platform 20, the user may be attracted and trigger the downloading or even the installation of the application program related to the released content by operating the released content (e.g., clicking, downloading through voice control, etc.).
Fig. 2 is a schematic diagram of data transmission between the delivery platform 20, the third party monitoring platform 10 and the terminal 30.
If the launch platform 20 employs the s2s mode, then: after the terminal 30 downloads the application program, the terminal 30 first transmits download information related to the downloading of the application program to the launching platform 20, and then the launching platform 20 transmits the download information related to the downloading of the application program to the third party monitoring platform 10; the activation information collected when the terminal 30 activates the application is sent by the terminal 30 to the third party monitoring platform 10. In fig. 2, the left launch platform 20 is the platform using the s2s model.
If launch platform 20 employs c2s mode, then: after the terminal 30 downloads the application program, the terminal 30 directly transmits download information related to the downloading of the application program to the third party monitoring platform 10; the activation information collected when the terminal 30 activates the application is sent by the terminal 30 to the third party monitoring platform 10. In fig. 2, the right-hand launch platform 20 is the platform using the c2s model. Of course, for a delivery platform adopting the c2s model, the terminal 30 may also transmit download information related to the download of the application program to the delivery platform, so that the delivery platform optimizes the delivery effect.
FIG. 3 is a flow diagram of an attribution method of application activation according to one embodiment of the present disclosure. As shown in fig. 3, the attribution method includes the following steps S11 to S14.
In step S11, download information related to the download of the target application program is acquired.
The download information is information collected when the target application is downloaded, and may include, for example, a download time of the target application, information of a device that downloads the target application, and the like.
In the case where the delivery platform 20 is a platform adopting the s2s model, download information related to the download of the target application program can be acquired from the delivery platform 20.
In the case where the delivery platform 20 is a platform adopting the c2s model, download information related to the download of the target application program can be acquired from the terminal 30.
In step S12, activation information relating to activation of the target application is acquired.
The activation information is information collected when the target application is activated (i.e., installed), and may include, for example, the activation time of the target application, information of a device that activates the target application, and the like. The activation information may be obtained from a terminal that activates the target application.
In step S13, first extraction information including the fixed device characteristic information of the download terminal downloading the target application and the network address in the Internet Protocol (IP) address is extracted from the download information, and second extraction information including the fixed device characteristic information of the activation terminal activating the target application and the network address in the IP address is extracted from the activation information.
The download terminal refers to a terminal that downloads a target application. The activation terminal refers to a terminal that activates a target application.
The download information and the activation information each contain a large amount of data. Of this large amount of data, some may be helpful in attributing the activation of the target application while others may not.
The download information usually includes some data related to the fixed device feature information of the download terminal, and similarly, the activation information usually includes some data related to the fixed device feature information of the activation terminal. The fixed equipment feature information is information which is stable in value and cannot be changed through client operation, and most of the fixed equipment feature information is associated with the model, that is, the fixed equipment feature values of the same model or the same batch of factory models are the same or have a stable value range. For example, the fixed device characteristic information may include at least one of: model information, brand information, model serial number, operating system version number, screen resolution, screen display density, memory capacity, battery capacity, manufacturer information, disk capacity, first indication information indicating whether a gsm network is supported, second indication information indicating whether a cdma network is supported, bluetooth version number, and the like. Moreover, these fixed device feature information do not relate to the privacy information of the device.
In the above-listed fixed device feature information, the model information represents a unique model terminal under a certain brand, and the screen resolution, the memory capacity, the battery capacity, and the like of different model terminals may be different. Also, although hardware parameters (e.g., memory capacity, battery capacity, screen size, etc.) of the terminal are rarely changed, the model information can generally characterize the hardware parameter characteristics of the terminal. Therefore, the model information is the fixed equipment characteristic information that contributes to attribution analysis. In addition to the model information, the operating system version number, and the like are fixed equipment feature information that can generally characterize the terminal, and also contribute to cause analysis.
In addition, the complete IP address of the terminal changes with the change of the egress host connected to the terminal, but the network address in the IP address does not change with the change of the host number in the same geographic area. For example, if a user has a plurality of routers in a company, and the terminal of the user is switched from router a to router B, the IP address of the terminal of the user will also change due to the difference in host numbers of the two routers, but the network addresses in the IP addresses are the same. Therefore, by adopting the network address in the IP address, not only can a specific geographic area be represented to a certain extent, but also the attribution failure caused by the change of the host number can be avoided.
Therefore, the fixed equipment characteristic information can represent the terminal downloading or activating the application program to a certain extent, and the network address in the IP address can represent the geographical area where the terminal downloading or activating the application program is located to a certain extent. That is, by means of the fixed device feature information and the network address in the IP address, it can be roughly determined which terminal downloads or activates the application program in the geographic area represented by the network address in the IP address, and it can be determined whether the activation operation corresponding to the acquired activation information is caused by the download operation corresponding to the acquired download information, and it can be determined whether the delivery platform causing the download operation contributes to the activation of the target application program, so that the success rate and accuracy rate of attribution are increased.
In one embodiment, the fixed device characteristic information of the downloading terminal is extracted from User Agent (UA) information in the downloading information, and the network address in the IP address of the downloading terminal is extracted from the IP information in the downloading information.
When the delivery platform (i.e., the program source) that facilitates the downloading operation corresponding to the obtained downloading information supports the s2s mode, the user agent information in the downloading information comes from the user agent information carried in the downloading information uploaded by the program source. That is, for the s2s model launch platform 20, the fixed device feature information of the download terminal is extracted from the UA information (if the launch platform 20 supports portability) carried in the download information uploaded to the third party monitoring platform 10 by the launch platform 20, and the network address in the IP address of the download terminal is extracted from the IP information (if the launch platform 20 supports portability) carried in the download information.
In the case that the launch platform (i.e., the program source) that facilitates the downloading operation corresponding to the obtained downloading information supports the c2s mode, the user agent information in the downloading information comes from the user agent information carried in the downloading information uploaded by the downloading terminal. That is, for the delivery platform 20 in c2s mode, the fixed device feature information of the download terminal may be extracted from UA information in the download information uploaded by the terminal 30 to the third party monitoring platform 10, and the network address in the IP address may be extracted from IP information in the download information. For the UA information, if the terminal 30 and the third party monitoring platform 10 communicate via http protocol, the UA information may be obtained from http header; for IP information, the IP information may be acquired from a Transmission Control Protocol (TCP) connection.
In one embodiment, the fixed device feature information of the active terminal is extracted from the UA information in the activation information, and the network address in the IP address of the active terminal is extracted from the IP information in the activation information. For the UA information, if the terminal 30 and the third party monitoring platform 10 communicate via http protocol, the UA information may be obtained from http header; alternatively, the UA information of the active terminal may be acquired through a Software Development Kit (SDK) on the terminal 30. For the IP information, the IP information may be acquired from a Transmission Control Protocol (TCP) connection; alternatively, the IP information of the active terminal may be acquired by the SDK on the terminal 30.
In step S14, the first extraction information and the second extraction information are matched, and attribution analysis is performed on the activation of the target application according to the matching result.
That is, in the case that the matching result indicates that the first extraction information matches the second extraction information, it is determined that the activation of the target application program is due to a program source that facilitates a download operation corresponding to the acquired download information; and determining that the activation of the target application program is not attributed to a program source that facilitates the download operation corresponding to the acquired download information if the matching result indicates that the first extraction information and the second extraction information are not matched in agreement.
In an embodiment, the first extracted information and the second extracted information may be respectively subjected to, for example, a character string comparison, and if the comparison results are consistent, for example, if the fixed device feature information of the downloading terminal is consistent with the fixed device feature information of the activating terminal and the network address in the IP address of the downloading terminal is consistent with the network address in the IP address of the activating terminal, this indicates that the activating operation corresponding to the acquired activating information is caused by the downloading operation corresponding to the acquired downloading information, that is, the launch platform that caused the downloading operation contributes to the activating operation, and then the launch platform is successfully attributed. If any character string is not consistent in comparison, for example, if the network address in the IP address of the downloading terminal is not consistent in comparison with the network address in the IP address of the activating terminal, this indicates that the activating operation corresponding to the acquired activating information is not caused by the downloading operation corresponding to the acquired downloading information, that is, the activating operation is not contributed by the launching platform that caused the downloading operation, the launching platform is considered to be due to failure.
In yet another embodiment, the attribution analysis may also be performed using the following steps, namely: generating first identification information according to the first extraction information; generating second identification information according to the second extraction information; and matching the first identification information with the second identification information, and performing attribution analysis on the activation of the target application program according to a matching result.
Fig. 4 shows a flowchart of generating the identification information, taking the generation of the first identification information as an example. As shown in fig. 4, first, in step S41, the first extracted information is spliced according to a preset splicing rule, and then, in step S42, the spliced data is hashed to generate the first identification information. The generation flow of the second identification information is the same as the generation flow of the first identification information, that is: and splicing the second extracted information according to a preset splicing rule, and performing hash processing on the spliced data to generate second identification information.
Splicing is exemplified below. For example, assuming that the adopted fixed device feature information includes model information, an operating system and an operating system version number, and a preset splicing rule requires splicing in a manner of "network address + operating system version number + model information", the first extracted information is spliced to obtain spliced data, that is, "network address in IP address of download terminal + operating system version number of download terminal + model information of download terminal", and the second extracted information is spliced to obtain spliced data, that is, "network address in IP address of activation terminal + operating system version number of activation terminal + model information of activation terminal". The same splicing rule is adopted to splice the first extracted information and the second extracted information, so that the inconsistency of the Hash processing result caused by the inconsistency of the splicing sequence of the extracted information can be avoided, and the attribution failure is further caused.
The step of generating the first identification information and the step of generating the second identification information may be performed simultaneously, or may be performed sequentially, for example, the first identification information is generated first and then the second identification information is generated, or the second identification information is generated first and then the first identification information is generated.
In addition, if the first identification information matches the second identification information, which indicates that the activation operation corresponding to the acquired activation information is facilitated by the download operation corresponding to the acquired download information, that is, the launch platform that facilitates the download operation contributes to the activation operation, the launch platform is considered to be successful. And if the first identification information is not matched with the second identification information, which indicates that the activation operation corresponding to the acquired activation information is not caused by the download operation corresponding to the acquired download information, that is, the activation operation is not contributed by the delivery platform which causes the download operation, the delivery platform is considered to be unsuccessfully attributed.
By adopting the above technical scheme, since the first extraction information is extracted from the download information and the second extraction information is extracted from the activation information, the first extraction information includes the fixed device characteristic information of the download terminal downloading the target application program and the network address in the IP address, the second extraction information includes the fixed device characteristic information of the activation terminal activating the target application program and the network address in the IP address, then the first extraction information and the second extraction information are matched and the activation of the target application program is attributed and analyzed according to the matching result, that is, if the first extraction information and the second extraction information are matched, it is indicated that the activation operation corresponding to the acquired activation information is caused by the download operation corresponding to the acquired download information, and then it can be determined that the casting platform causing the download operation contributes to the activation operation, therefore, the delivery platform is successfully attributed, if the first extraction information and the second extraction information are not matched, it is indicated that the activation operation corresponding to the acquired activation information is not contributed by the download operation corresponding to the acquired download information, and it can be further determined that the activation operation is not contributed by the delivery platform contributing to the download operation, so that the delivery platform fails to be attributed, and thus the success rate and the accuracy rate of attribution are increased.
In one embodiment, the first extraction information further includes identification information of a first program source, where the first program source facilitates a download operation corresponding to the acquired download information; and the second extraction information further includes identification information of a second program source, wherein the second program source facilitates an activation operation corresponding to the acquired activation information. The first program source and the second program source are the launch platform 20, wherein the first program source contributes to the downloading of the target application program, and the second program source contributes to the activation of the target application program. In addition, the identification information of the first program source and the identification information of the second program source may also participate in the splicing in the aforementioned splicing step.
By means of the identification information of the program source, the success rate of attribution can be improved. For example, assume that a user downloads a target application program from a first program source and a second program source at home in sequence, and finally installs the target application program downloaded from the first program source. Since the user is at home, the network address in the device fixed characteristic information and the IP address is likely to be the same, and if the attribution analysis is performed only by the device fixed characteristic information and the network address in the IP address, it may be impossible to distinguish whether the first program source or the second program source contributes to the activation of the target application program, thereby causing the attribution failure. By adding the identification information of the program source, it can be determined which program source contributes to the final activation of the target application program.
FIG. 5 is yet another flow diagram of an attribution method of application activation according to one embodiment of the present disclosure. As shown in fig. 5, the attribution method includes the following steps S51 to S55.
In step S51, download information related to the download of the target application program is acquired. The downloading information further includes downloading time, that is, time for downloading the target application program.
In step S52, activation information relating to activation of the target application is acquired. The activation information further includes activation time, that is, time when the target application is activated.
In step S53, the download time is compared with the activation time.
In step S54, in a case where the download time is earlier than the activation time and the time difference between the download time and the activation time does not exceed the preset time period, first extraction information including the fixed device characteristic information of the download terminal that downloads the target application and the network address in the IP address is extracted from the download information and second extraction information including the fixed device characteristic information of the activation terminal that activates the target application and the network address in the IP address is extracted from the activation information.
The preset time period may be set according to actual circumstances, and for example, it may be set to be in the range of 1 day to 3 days. The preset duration setting cannot be too large, otherwise the time window limiting function is lost.
In addition, if the download time is later than the activation time, or if the time difference between the download time and the activation time exceeds a preset time length, the subsequent attribution analysis step is not executed.
In step S55, the first extraction information and the second extraction information are matched, and attribution analysis is performed on the activation of the target application according to the matching result.
In one embodiment, the operation of comparing the download time and the activation time in step S53 may be performed before step S54, or after step S54. If it is executed before step S54, since the operation of extracting information from the download information and the activation information that do not satisfy the condition that the "download time is earlier than the activation time and the time difference between the download time and the activation time does not exceed the preset time length" is not executed, the amount of calculation can be greatly reduced and the efficiency of attribution analysis can be improved.
By adopting the technical scheme, the possibility of error attribution caused by IP repetition and other parameter repetition can be reduced. In the case where the device fixed characteristic information and the IP address of the first terminal and the second terminal are the same, if the first terminal clicks on the delivered content related to the target application on the first delivery platform at a certain time t1 but does not install and activate the target application, the second terminal installs and activates the target application through the application mall instead of the first delivery platform at a certain time after t1 plus a preset time period. Then, if there is no time window limit for "the time difference between the download time and the activation time does not exceed the preset time length" when performing the attribution analysis, it is possible to attribute the installation activation of the second terminal to the first delivery platform, resulting in an erroneous attribution. By setting the time window limit that the time difference between the download time and the activation time does not exceed the preset time length, the possibility of such erroneous attribution due to IP duplication and other parameter duplication can be greatly reduced.
FIG. 6 is a schematic block diagram of an application activated attribution device, according to one embodiment of the present disclosure. As shown in fig. 6, the attribution apparatus includes: a first obtaining module 61, configured to obtain download information related to downloading of the target application program; a second acquisition module 62 for acquiring activation information related to activation of the target application; an extracting module 63, configured to extract first extraction information from the download information, and extract second extraction information from the activation information, where the first extraction information includes fixed device feature information of the download terminal that downloads the target application program and a network address in the IP address, and the second extraction information includes fixed device feature information of the activation terminal that activates the target application program and a network address in the IP address; and an attribution analysis module 64 for matching the first extraction information and the second extraction information and performing attribution analysis on the activation of the target application program according to the matching result.
By adopting the above technical scheme, since the first extraction information is extracted from the download information and the second extraction information is extracted from the activation information, the first extraction information includes the fixed device characteristic information of the download terminal downloading the target application program and the network address in the IP address, the second extraction information includes the fixed device characteristic information of the activation terminal activating the target application program and the network address in the IP address, then the first extraction information and the second extraction information are matched and the activation of the target application program is attributed and analyzed according to the matching result, that is, if the first extraction information and the second extraction information are matched, it is indicated that the activation operation corresponding to the acquired activation information is caused by the download operation corresponding to the acquired download information, and then it can be determined that the casting platform causing the download operation contributes to the activation operation, therefore, the delivery platform is successfully attributed, if the first extraction information and the second extraction information are not matched, it is indicated that the activation operation corresponding to the acquired activation information is not contributed by the download operation corresponding to the acquired download information, and it can be further determined that the activation operation is not contributed by the delivery platform contributing to the download operation, so that the delivery platform fails to be attributed, and thus the success rate and the accuracy rate of attribution are increased.
Fig. 7 is a schematic block diagram of the cause analysis module 64 according to one embodiment of the present disclosure. As shown in fig. 7, the attribution analysis module 64 includes: the first generating sub-module 641 is configured to generate first identification information according to the first extraction information; the second generating sub-module 642 is configured to generate second identification information according to the second extraction information; the attribution analysis sub-module 643 is configured to match the first identification information with the second identification information, and perform attribution analysis on activation of the target application according to a matching result.
Optionally, the first generation submodule 641 is configured to: splicing the first extracted information according to a preset splicing rule, and performing hash processing on the spliced data to generate first identification information; the second generation submodule 642 is configured to: and splicing the second extracted information according to a preset splicing rule, and performing hash processing on the spliced data to generate second identification information.
Optionally, attribution analysis module 64 is further operable to: determining that the activation of the target application program is attributed to a program source facilitating a download operation corresponding to the acquired download information if the matching result indicates that the first extraction information matches the second extraction information consistently; and determining that the activation of the target application program is not attributed to a program source that facilitates the download operation corresponding to the acquired download information if the matching result indicates that the first extraction information and the second extraction information are not matched in agreement.
Optionally, the first extraction information further includes identification information of a first program source, where the first program source facilitates a downloading operation corresponding to the acquired downloading information; and the second extraction information further includes identification information of a second program source, wherein the second program source facilitates an activation operation corresponding to the acquired activation information.
FIG. 8 is yet another schematic block diagram of an attribution device according to an embodiment of the present disclosure. The download information further includes a download time, and the activation information further includes an activation time. As shown in fig. 8, the attribution device further comprises a comparing module 65 for comparing the download time with the activation time before the attribution analyzing module 64 performs attribution analysis on the activation of the target application. The attribution analysis module 64 is further configured to match the first extracted information and the second extracted information and perform attribution analysis on the activation of the target application according to a matching result, when the download time is earlier than the activation time and the time difference between the download time and the activation time does not exceed a preset time length. The operation performed by the comparison module 65 may be performed before or after the operation performed by the extraction module 63.
Optionally, the fixed device feature information includes: model information, operating system version number.
Optionally, the fixed device feature information of the download terminal is extracted from the user agent information in the download information; the fixed equipment feature information of the activation terminal is extracted from the user agent information in the activation information.
Optionally, in a case that a program source that facilitates a downloading operation corresponding to the obtained downloading information supports the s2s mode, the user agent information in the downloading information comes from the user agent information carried in the downloading information uploaded by the program source; and under the condition that the program source for facilitating the downloading operation corresponding to the acquired downloading information supports the c2s mode, the user agent information in the downloading information comes from the user agent information carried in the downloading information uploaded by the downloading terminal.
Specific implementation of operations performed by each module in the apparatus according to the embodiment of the present disclosure have been described in detail in the method according to the embodiment of the present disclosure, and are not described herein again.
Referring now to FIG. 9, a schematic diagram of an electronic device (e.g., the third party monitoring platform of FIG. 1) 600 suitable for implementing embodiments of the present disclosure is shown. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in fig. 9 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 9, electronic device 600 may include a processing means (e.g., central processing unit, graphics processor, etc.) 601 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 600 are also stored. The processing device 601, the ROM 602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the electronic device 600 to communicate with other devices wirelessly or by wire to exchange data. While fig. 9 illustrates an electronic device 600 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program carried on a non-transitory computer readable medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring download information related to downloading of a target application program; acquiring activation information related to activation of the target application; extracting first extraction information from the download information, and extracting second extraction information from the activation information, wherein the first extraction information comprises fixed equipment characteristic information of a download terminal downloading the target application program and a network address in an IP address, and the second extraction information comprises fixed equipment characteristic information of an activation terminal activating the target application program and a network address in the IP address; and matching the first extraction information and the second extraction information, and performing attribution analysis on the activation of the target application program according to a matching result.
Computer program code for carrying out operations for the present disclosure may be written in any combination of one or more programming languages, including but not limited to an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present disclosure may be implemented by software or hardware. The name of the module does not limit the module itself in some cases, for example, the first obtaining module and the second obtaining module may be the same module or two different modules.
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Example 1 provides, in accordance with one or more embodiments of the present disclosure, an attribution method of an application, including: acquiring download information related to downloading of a target application program; acquiring activation information related to activation of the target application; extracting first extraction information from the download information, and extracting second extraction information from the activation information, wherein the first extraction information comprises fixed equipment characteristic information of a download terminal downloading the target application program and a network address in an IP address, and the second extraction information comprises fixed equipment characteristic information of an activation terminal activating the target application program and a network address in the IP address; and matching the first extraction information and the second extraction information, and performing attribution analysis on the activation of the target application program according to a matching result.
Example 2 provides the method of example 1, wherein the matching the first extracted information and the second extracted information and performing attribution analysis on the activation of the target application according to a matching result includes: generating first identification information according to the first extraction information; generating second identification information according to the second extraction information; and matching the first identification information with the second identification information, and performing attribution analysis on the activation of the target application program according to a matching result.
Example 3 provides the method of example 2, wherein the generating first identification information according to the first extraction information includes: splicing the first extracted information according to a preset splicing rule, and performing hash processing on the spliced data to generate first identification information; generating second identification information according to the second extraction information, including: and splicing the second extracted information according to the preset splicing rule, and performing hash processing on the spliced data to generate the second identification information.
Example 4 provides the method of example 1, wherein the attribution analysis of the activation of the target application according to the matching result includes: determining that the activation of the target application program is attributed to a program source facilitating a download operation corresponding to the acquired download information if the matching result indicates that the first extraction information matches the second extraction information; and determining that the activation of the target application program is not attributed to a program source that facilitates a download operation corresponding to the obtained download information if the matching result indicates that the first extraction information and the second extraction information are not matched in agreement.
Example 5 provides the method of example 1, wherein the first extraction information further includes identification information of a first program source, wherein the first program source facilitates a download operation corresponding to the acquired download information; and the second extraction information further includes identification information of a second program source, where the second program source facilitates an activation operation corresponding to the acquired activation information.
Example 6 provides the method of any one of examples 1 to 5, wherein the download information further includes a download time; the activation information further includes an activation time; prior to attribution analysis of activation of the target application, the method further comprises: comparing the download time with the activation time; and under the condition that the downloading time is earlier than the activation time and the time difference between the downloading time and the activation time does not exceed the preset time length, performing the steps of matching the first extraction information and the second extraction information and performing attribution analysis on the activation of the target application program according to a matching result.
Example 7 provides the method of example 1, wherein the fixed device characteristic information includes: model information, operating system version number.
Example 8 provides the method of any one of examples 1 to 5 and 7, wherein the fixed device characteristic information of the download terminal is extracted from user agent information in the download information; the fixed equipment feature information of the active terminal is extracted from user agent information in the active information.
Example 9 provides the method of example 8, wherein, in a case that a program source that facilitates a download operation corresponding to the obtained download information supports an s2s mode, the user agent information in the download information is from user agent information carried in download information uploaded by the program source; and under the condition that a program source for facilitating the downloading operation corresponding to the acquired downloading information supports the c2s mode, the user agent information in the downloading information comes from the user agent information carried in the downloading information uploaded by the downloading terminal.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.
Further, while operations are depicted in a particular order, this should not be understood as requiring that such operations be performed in the particular order shown or in sequential order. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single embodiment. Conversely, various features that are described in the context of a single embodiment can also be implemented in multiple embodiments separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims. With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.

Claims (12)

1. An attribution method for application activation, comprising:
acquiring download information related to downloading of a target application program;
acquiring activation information related to activation of the target application;
extracting first extraction information from the download information, and extracting second extraction information from the activation information, wherein the first extraction information comprises fixed equipment characteristic information of a download terminal downloading the target application program and a network address in an IP address, and the second extraction information comprises fixed equipment characteristic information of an activation terminal activating the target application program and a network address in the IP address;
and matching the first extraction information and the second extraction information, and performing attribution analysis on the activation of the target application program according to a matching result.
2. The method of claim 1, wherein the matching the first extracted information and the second extracted information and performing attribution analysis on the activation of the target application according to the matching result comprises:
generating first identification information according to the first extraction information;
generating second identification information according to the second extraction information;
and matching the first identification information with the second identification information, and performing attribution analysis on the activation of the target application program according to a matching result.
3. The method of claim 2, wherein generating first identification information based on the first extracted information comprises:
splicing the first extracted information according to a preset splicing rule, and performing hash processing on the spliced data to generate first identification information;
generating second identification information according to the second extraction information, including:
and splicing the second extracted information according to the preset splicing rule, and performing hash processing on the spliced data to generate the second identification information.
4. The method of claim 1, wherein the attribution analysis of the activation of the target application according to the matching result comprises:
determining that the activation of the target application program is attributed to a program source facilitating a download operation corresponding to the acquired download information if the matching result indicates that the first extraction information matches the second extraction information; and
determining that the activation of the target application program is not due to a program source facilitating a download operation corresponding to the acquired download information if the matching result indicates that the first extraction information and the second extraction information are not matched in a consistent manner.
5. The method of claim 1,
the first extraction information further includes identification information of a first program source, where the first program source facilitates a download operation corresponding to the acquired download information; and
the second extraction information further includes identification information of a second program source, where the second program source facilitates an activation operation corresponding to the acquired activation information.
6. The method according to any of claims 1 to 5, wherein the download information further comprises a download time; the activation information further includes an activation time;
prior to attribution analysis of activation of the target application, the method further comprises:
comparing the download time with the activation time;
and under the condition that the downloading time is earlier than the activation time and the time difference between the downloading time and the activation time does not exceed the preset time length, executing the steps of matching the first extraction information and the second extraction information and performing attribution analysis on the activation of the target application program according to the matching result.
7. The method of claim 1, wherein the fixed device characteristic information comprises: model information, operating system version number.
8. The method according to any one of claims 1 to 5 and 7, wherein the fixed device characteristic information of the download terminal is extracted from user agent information in the download information;
the fixed equipment feature information of the active terminal is extracted from user agent information in the active information.
9. The method of claim 8,
under the condition that a program source which facilitates the downloading operation corresponding to the acquired downloading information supports an s2s mode, the user agent information in the downloading information comes from the user agent information carried in the downloading information uploaded by the program source;
and under the condition that a program source for facilitating the downloading operation corresponding to the acquired downloading information supports the c2s mode, the user agent information in the downloading information comes from the user agent information carried in the downloading information uploaded by the downloading terminal.
10. An application activation attribution apparatus, comprising:
a first acquisition module for acquiring download information related to the download of the target application program;
a second acquisition module for acquiring activation information related to activation of the target application;
an extraction module, configured to extract first extraction information from the download information, and extract second extraction information from the activation information, where the first extraction information includes fixed device feature information of a download terminal that downloads the target application and a network address in an IP address, and the second extraction information includes fixed device feature information of an activation terminal that activates the target application and a network address in an IP address;
and the attribution analysis module is used for matching the first extraction information and the second extraction information and carrying out attribution analysis on the activation of the target application program according to a matching result.
11. A computer-readable medium, on which a computer program is stored, characterized in that the program, when being executed by processing means, carries out the steps of the method of any one of claims 1-9.
12. An electronic device, comprising:
a storage device having a computer program stored thereon;
processing means for executing the computer program in the storage means to carry out the steps of the method according to any one of claims 1 to 9.
CN202011017094.5A 2020-09-24 2020-09-24 Attribution method, attribution device, attribution medium and electronic equipment for application program activation Pending CN112217880A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011017094.5A CN112217880A (en) 2020-09-24 2020-09-24 Attribution method, attribution device, attribution medium and electronic equipment for application program activation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011017094.5A CN112217880A (en) 2020-09-24 2020-09-24 Attribution method, attribution device, attribution medium and electronic equipment for application program activation

Publications (1)

Publication Number Publication Date
CN112217880A true CN112217880A (en) 2021-01-12

Family

ID=74051826

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011017094.5A Pending CN112217880A (en) 2020-09-24 2020-09-24 Attribution method, attribution device, attribution medium and electronic equipment for application program activation

Country Status (1)

Country Link
CN (1) CN112217880A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113434153A (en) * 2021-06-04 2021-09-24 郑州阿帕斯数云信息科技有限公司 Attribution method and attribution device for application installation
CN113641366A (en) * 2021-07-27 2021-11-12 北京达佳互联信息技术有限公司 Attribution method, attribution device, attribution equipment and storage medium for application installation conversion

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001043377A1 (en) * 1999-12-08 2001-06-14 Qualcomm Incorporated Method and system for distributing advertisement to client devices
EP3021217A1 (en) * 2014-11-14 2016-05-18 Semmle Limited Distributed analysis and attribution of source code
US20160366230A1 (en) * 2015-06-14 2016-12-15 Doat Media Ltd. Techniques for identifying source links for application downloads
WO2016202204A1 (en) * 2015-06-16 2016-12-22 阿里巴巴集团控股有限公司 Application download method and device
CN108388655A (en) * 2018-03-02 2018-08-10 北京腾云天下科技有限公司 A kind of the channel monitoring method and computing device of application activating
CN109697624A (en) * 2017-10-23 2019-04-30 北京京东尚科信息技术有限公司 Ad Track method, Ad Track system and electronic equipment
CN110276643A (en) * 2019-06-21 2019-09-24 北京创鑫旅程网络技术有限公司 A kind of popularization advertisement attribution method and device
CN110771126A (en) * 2017-05-08 2020-02-07 梅特里克品牌有限公司 Matching and attribution of user equipment events
CN110875933A (en) * 2018-08-29 2020-03-10 阿里巴巴集团控股有限公司 Information matching confirmation method and device
CN111447298A (en) * 2020-03-24 2020-07-24 北京字节跳动网络技术有限公司 Method, device, equipment and medium for acquiring network address in application program

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001043377A1 (en) * 1999-12-08 2001-06-14 Qualcomm Incorporated Method and system for distributing advertisement to client devices
EP3021217A1 (en) * 2014-11-14 2016-05-18 Semmle Limited Distributed analysis and attribution of source code
US20160366230A1 (en) * 2015-06-14 2016-12-15 Doat Media Ltd. Techniques for identifying source links for application downloads
WO2016202204A1 (en) * 2015-06-16 2016-12-22 阿里巴巴集团控股有限公司 Application download method and device
CN110771126A (en) * 2017-05-08 2020-02-07 梅特里克品牌有限公司 Matching and attribution of user equipment events
CN109697624A (en) * 2017-10-23 2019-04-30 北京京东尚科信息技术有限公司 Ad Track method, Ad Track system and electronic equipment
CN108388655A (en) * 2018-03-02 2018-08-10 北京腾云天下科技有限公司 A kind of the channel monitoring method and computing device of application activating
CN110875933A (en) * 2018-08-29 2020-03-10 阿里巴巴集团控股有限公司 Information matching confirmation method and device
CN110276643A (en) * 2019-06-21 2019-09-24 北京创鑫旅程网络技术有限公司 A kind of popularization advertisement attribution method and device
CN111447298A (en) * 2020-03-24 2020-07-24 北京字节跳动网络技术有限公司 Method, device, equipment and medium for acquiring network address in application program

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113434153A (en) * 2021-06-04 2021-09-24 郑州阿帕斯数云信息科技有限公司 Attribution method and attribution device for application installation
CN113641366A (en) * 2021-07-27 2021-11-12 北京达佳互联信息技术有限公司 Attribution method, attribution device, attribution equipment and storage medium for application installation conversion
CN113641366B (en) * 2021-07-27 2024-08-16 北京达佳互联信息技术有限公司 Attribution method, device, equipment and storage medium for application installation conversion

Similar Documents

Publication Publication Date Title
US11082532B2 (en) Method and apparatus for sending information
US11360834B2 (en) Application interaction method and apparatus
CN112311841B (en) Information pushing method and device, electronic equipment and computer readable medium
CN110377440B (en) Information processing method and device
US20190012138A1 (en) Method and apparatus for providing speech service
CN113254105B (en) Resource processing method and device, storage medium and electronic equipment
CN111930709B (en) Data storage method, apparatus, electronic device, and computer readable medium
CN111459364B (en) Icon updating method and device and electronic equipment
CN111432001B (en) Method, apparatus, electronic device and computer readable medium for jumping scenes
CN111209306A (en) Business logic judgment method and device, electronic equipment and storage medium
CN112217880A (en) Attribution method, attribution device, attribution medium and electronic equipment for application program activation
CN113900721A (en) Operating system starting method and device and electronic equipment
CN115543409A (en) Application installation source determining method and device, readable medium and electronic equipment
CN110221857A (en) The problem of application program restorative procedure, device, electronic equipment and storage medium
CN113144620A (en) Detection method, device, platform, readable medium and equipment for frame synchronization game
CN112083945A (en) NPM installation package update prompting method and device, electronic equipment and storage medium
CN109348298B (en) Method and equipment for pushing and playing multimedia data stream
CN113628097A (en) Image special effect configuration method, image recognition method, image special effect configuration device and electronic equipment
CN115328506A (en) Application package generation method, loading method, device, medium and equipment
CN111198853A (en) Data processing method and device, electronic equipment and computer readable storage medium
CN115134254A (en) Network simulation method, device, equipment and storage medium
CN111628913A (en) Online time length determining method and device, readable medium and electronic equipment
CN111309323A (en) Parameter initialization method and device and electronic equipment
CN112486826B (en) Test method, test device, electronic equipment and computer readable medium
CN113821244B (en) Offline package updating method, device, system, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination