CN113114770A - User identification method, electronic device, and computer-readable storage medium - Google Patents

User identification method, electronic device, and computer-readable storage medium Download PDF

Info

Publication number
CN113114770A
CN113114770A CN202110401126.XA CN202110401126A CN113114770A CN 113114770 A CN113114770 A CN 113114770A CN 202110401126 A CN202110401126 A CN 202110401126A CN 113114770 A CN113114770 A CN 113114770A
Authority
CN
China
Prior art keywords
user
target user
information
app
shared
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110401126.XA
Other languages
Chinese (zh)
Other versions
CN113114770B (en
Inventor
王晨沐
俞锋锋
尹祖勇
吕繁荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Merit Interactive Co Ltd
Original Assignee
Merit Interactive Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Merit Interactive Co Ltd filed Critical Merit Interactive Co Ltd
Priority to CN202110401126.XA priority Critical patent/CN113114770B/en
Publication of CN113114770A publication Critical patent/CN113114770A/en
Application granted granted Critical
Publication of CN113114770B publication Critical patent/CN113114770B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/021Services related to particular areas, e.g. point of interest [POI] services, venue services or geofences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a user identification method, electronic equipment and a computer readable storage medium, wherein the method comprises the following steps: acquiring user information sets of a plurality of geographical areas related to a target user; determining shared users other than target users among the plurality of geographic areas based on respective user information sets of the plurality of geographic areas; determining the intimacy between the shared users and the target users based on the associated information of the target users and the associated information of the shared users, wherein the associated information comprises one or more of Wi-Fi connection information, position reporting information and APP use information; and determining that the shared user and the target user are the same user when the intimacy degree is greater than or equal to the designated intimacy degree. The technical scheme of the invention is beneficial to flexibly and intelligently providing the required service information for a plurality of accounts or a plurality of electronic devices of the same person, and improving the user experience.

Description

User identification method, electronic device, and computer-readable storage medium
[ technical field ] A method for producing a semiconductor device
The present invention relates to the field of computer technologies, and in particular, to a user identification method, an electronic device, and a computer-readable storage medium.
[ background of the invention ]
Based on actual needs, the same user may register multiple accounts with the same APP, or may use multiple mobile phones. However, the contents of interest of a plurality of accounts of the same person are not completely the same, and the operation contents and usage habits of the same person in a plurality of mobile phones are not completely the same, and in the related art, the plurality of accounts or the plurality of mobile phones are often identified as different users. However, service information such as push content obtained by different users is different, which causes that the same person cannot obtain the same service information required by the same person after a plurality of accounts or a plurality of mobile phones are identified as different users.
Therefore, how to effectively identify the same user becomes a technical problem to be solved urgently at present.
[ summary of the invention ]
The embodiment of the invention provides a user identification method, electronic equipment and a computer readable storage medium, and aims to solve the technical problem that the same user cannot be identified in the related technology.
In a first aspect, an embodiment of the present invention provides a user identification method, including: acquiring user information sets of a plurality of geographical areas related to a target user; determining common users other than the target user among the plurality of geographic areas based on respective user information sets of the plurality of geographic areas; determining the intimacy between the shared user and the target user based on the associated information of the target user and the associated information of the shared user, wherein the associated information comprises one or more of Wi-Fi connection information, position reporting information and APP use information; determining that the shared user and the target user are the same user if the affinity is greater than or equal to a specified affinity.
In a second aspect, an embodiment of the present invention provides an electronic device, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor, the instructions being arranged to perform the method of any of the first aspects above.
In a third aspect, an embodiment of the present invention provides a computer-readable storage medium, which stores computer-executable instructions for executing the method flow described in any one of the first aspect.
According to the technical scheme, the same user belonging to the same person as the target user is quickly and effectively identified through the intimacy between the target user and the shared user among the multiple geographic areas related to the target user, so that the required service information can be flexibly and intelligently provided for multiple accounts or multiple electronic devices of the same person, and the user experience is favorably improved.
[ description of the drawings ]
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 shows a flow diagram of a user identification method according to an embodiment of the invention.
[ detailed description ] embodiments
For better understanding of the technical solutions of the present invention, the following detailed descriptions of the embodiments of the present invention are provided with reference to the accompanying drawings.
It should be understood that the described embodiments are only some embodiments of the invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terminology used in the embodiments of the invention is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the examples of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
Example one
Fig. 1 shows a flow diagram of a user identification method according to an embodiment of the invention.
As shown in fig. 1, a flow of a user identification method according to an embodiment of the present invention includes:
step 102, obtaining respective user information sets of a plurality of geographic areas related to the target user.
The target user includes, but is not limited to, an account number and an electronic device of the client, that is, the present application may be used to identify whether a plurality of account numbers of the client are account numbers of the same person, and may also be used to identify whether a plurality of electronic devices are electronic devices of the same person.
The plurality of geographic regions to which the target user relates refers to geographic regions in which the person to which the target user belongs appears, including but not limited to the person's workplace, home, etc. The manner of identifying the geographical areas is various, for example, based on Wi-Fi connection information on the side of the electronic device a, or based on a connected device list reported by the Wi-Fi device b of the x company and the Wi-Fi device c of the y apartment 101, it is determined that the electronic device a is connected with the Wi-Fi device b of the x company and the Wi-Fi device c of the y apartment 101 today, and therefore, it is determined that the x company and the y apartment 101 are the geographical area where the electronic device a belongs, that is, the geographical area involved by the electronic device a.
For the same person, who is present in multiple geographic areas such as houses and workplaces, multiple accounts or multiple electronic devices may also be present in these multiple geographic areas. For example, the xiaoming places a working standby mobile phone f in a company and uses a mobile phone e carried by the user, the working standby mobile phone f relates to the geographical area of the xiaoming company, and the geographical area of the xiaoming mobile phone c also comprises the xiaoming company. For another example, xiaoming has two social APP accounts, and during a company and a residence, xiaoming continuously switches two accounts to log in to the social APP, so that the geographic areas involved by the two accounts include the company and the residence of xiaoming.
In other words, for any of a plurality of geographic areas that the target user is involved in, the users that appear in the geographic area include not only the target user but also other users, and the other users are likely to include the same user belonging to the same person as the target user. Thus, respective sets of user information for a plurality of geographical areas involved by the target user may be obtained to identify the same user of the target user among the sets of user information.
And 104, determining shared users except the target user among the plurality of geographic areas based on the user information sets of the plurality of geographic areas.
The user information set includes, but is not limited to, a user name, a user identification code, and the like, which can distinguish different users, so that users related to a plurality of geographical areas other than the target user can be screened out, i.e., users shared by the target user among the plurality of geographical areas can be screened out. The common user and the person to whom the target user belongs are present in the plurality of geographical areas, and therefore, the common user may have the same user as the person to which the target user belongs.
And 106, determining the intimacy between the shared user and the target user based on the associated information of the target user and the associated information of the shared user, wherein the associated information comprises one or more of Wi-Fi connection information, position reporting information and APP use information.
The user characteristics are reflected by the associated information such as the Wi-Fi connection information, the position reporting information, the APP use information and the like of the user, and the similarity degree of the user characteristics of the target user and the shared user is effectively reflected on the basis of the intimacy of the target user and the shared user. The intimacy of the similarity degree of the user characteristics of the two users is effectively reflected, and a basis is provided for further and accurately judging whether the two users are the same user.
And 108, determining that the shared user and the target user are the same user when the intimacy degree is greater than or equal to a specified intimacy degree.
The designated affinity reflects the minimum degree of similarity of the user characteristics of the target user and the shared user when the target user and the shared user are the same user, so that if the affinity of the target user and the shared user is greater than or equal to the designated affinity, the user characteristics of the target user and the shared user reach the minimum degree of similarity required by the target user and the shared user to be identified as the same user. At this time, the target user and the shared user can be considered to be the same user.
According to the technical scheme, the same user belonging to the same person as the target user is quickly and effectively identified through the intimacy between the target user and the shared user among the multiple geographic areas related to the target user, so that the required service information can be flexibly and intelligently provided for multiple accounts or multiple electronic devices of the same person, and the user experience is favorably improved.
Example two
On the basis of the first embodiment, the flow of the user identification method according to another embodiment of the present invention includes:
step 202, for each geographic area related to the target user, acquiring an external device MAC address set of the Wi-Fi device in the geographic area within a first specified time period as a user information set of the geographic area.
Wi-Fi equipment is arranged in each geographical area related to a target user, information such as an MAC address (physical address) and connection time of external equipment connected with the Wi-Fi equipment is recorded in the Wi-Fi equipment, and the MAC address can be used for distinguishing different external equipment due to the fact that each external equipment has the unique MAC address.
The first designated period refers to a sample period for detecting whether the target user has the same user, and then, the MAC address set of the external device of the Wi-Fi device in the geographic area within the first designated period may be acquired as the user information set of the geographic area. The set of MAC addresses of the external devices for each geographic area reflects which external devices are involved in the geographic area during the first specified time period.
Step 204, in the external device MAC address set corresponding to each of the plurality of geographic areas, determining a common MAC address other than the MAC address of the target user among the plurality of geographic areas, and determining a user to which the common MAC address belongs as a common user other than the target user among the plurality of geographic areas.
Since the target user relates to a plurality of geographic areas, the MAC address of the device to which the target user belongs is provided in the MAC address set of the external device in each geographic area. Similarly, if a plurality of geographical areas also have a common MAC address other than the MAC address of the target user, the external device to which the common MAC address belongs may also be related to the plurality of geographical areas, and may be the same user belonging to the same person as the target user. Thus, the user to which the common MAC address belongs can be determined as a common user among the plurality of geographical areas other than the target user.
And step 206, determining the intimacy between the shared user and the target user based on the associated information of the target user and the associated information of the shared user, wherein the associated information comprises one or more of Wi-Fi connection information, position reporting information and APP use information.
And step 208, determining that the shared user and the target user are the same user when the intimacy degree is greater than or equal to the designated intimacy degree.
The process and effect of the above steps are the same as those in the first embodiment, and are not described herein again.
EXAMPLE III
On the basis of the first embodiment and the second embodiment, when the association information includes Wi-Fi connection information, a flow of the user identification method of an embodiment of the present invention includes:
step 302, user information sets of a plurality of geographic areas related to a target user are obtained.
Step 304, determining shared users other than the target user among the plurality of geographic areas based on the respective user information sets of the plurality of geographic areas.
Step 306, determining that the target user and the shared user have connected with the same historical Wi-Fi device in a plurality of second designated time periods based on the Wi-Fi connection information of the target user and the Wi-Fi connection information of the shared user.
The Wi-Fi connection information comprises historical Wi-Fi devices which are connected and time periods during which the historical Wi-Fi devices are connected. If the target user and the shared user are connected to the same historical Wi-Fi device for a sufficient period of time, the target user and the shared user are likely to be the same user. For example, the second designated period may be set to 24h, and a plurality of second designated periods may be set for 30 consecutive days, and then it may be determined that both connect to the same historical Wi-Fi device for several days of the 30 consecutive days based on the historical Wi-Fi device connected by the target user and the period of connecting to the historical Wi-Fi device, and the historical Wi-Fi device connected by the common user and the period of connecting to the historical Wi-Fi device.
And 308, determining the intimacy degree of the shared user and the target user based on the number of the second designated time periods, wherein the greater the number is, the higher the intimacy degree is.
In the example above, the target user and the common user are both connected to the same historical Wi-Fi device each day for 30 consecutive days, which is more likely to be the same user than the target user and the common user are connected to the same historical Wi-Fi device for some 5 of the 30 consecutive days. That is, the more days the target user and the shared user connect to the same historical Wi-Fi device, the more times the target user and the shared user appear in the same geographic area, and the more likely the target user and the shared user are the same person. The intimacy of the two can be reflected by the number of several second designated periods. The greater the number of the second designated periods, i.e., the greater the number of times the person belonging to the two appears in the same geographic area, the greater the intimacy between the two, and the more likely it is that the same person.
And 310, determining that the shared user and the target user are the same user when the intimacy degree is greater than or equal to a specified intimacy degree.
Example four
On the basis of the first embodiment and the second embodiment, when the association information includes the location reporting information, the flow of the user identification method of an embodiment of the present invention includes:
step 402, acquiring user information sets of a plurality of geographical areas related to a target user.
Step 404, determining common users other than the target user among the plurality of geographic areas based on the respective user information sets of the plurality of geographic areas.
Step 406, determining that the target user and the shared user report the positions in the same geographic area in a plurality of third designated time periods based on the position reporting information of the target user and the position reporting information of the shared user.
The target user and the common user can provide position reporting information, and the reporting position information comprises a position and the reporting time of the position. If the time periods that the position reporting information of the target user and the position reporting information of the shared user are in the same geographic area are enough, the target user and the shared user are likely to be the same user. For example, the third designated time period may be set to 24h, and a plurality of third designated time periods may be set to 30 consecutive days, so that it may be determined that both report the location in the same geographic area on several days of the consecutive 30 days based on the locations in the reported location information provided by both the target user and the common user and the reporting time of the locations.
Step 408, determining the intimacy degree of the shared user and the target user based on the number of the third designated time periods, wherein the greater the number, the higher the intimacy degree.
In the above example, the target user and the common user report the location in the same geographic area each day for 30 consecutive days, which is more likely to be the same user than the target user and the common user report the location in the same geographic area for 7 days out of 30 consecutive days. That is, the more days the target user and the common user report the positions in the same geographic area, the more times the target user and the common user appear in the same geographic area, and the more likely the target user and the common user are the same person. The intimacy of the two can be reflected by the number of the third specified periods. The greater the number of the third designated time periods, that is, the greater the number of times the persons belonging to the two persons appear in the same geographic area, the greater the intimacy between the two persons, and the more likely the persons are the same person.
And step 410, determining that the shared user and the target user are the same user when the intimacy degree is greater than or equal to a specified intimacy degree.
As can be seen from a combination of example three and example four, in another possible design, it may be determined that the target user and the shared user have connected to the same historical Wi-Fi device for several of a plurality of second specified time periods, and that the target user and the shared user have reported locations within the same geographic area for several of a plurality of third specified time periods. And then, carrying out weighted calculation on the number of the plurality of second designated time periods and the number of the plurality of third designated time periods to obtain the intimacy between the shared user and the target user. Wherein the weights of the number of the second specified periods and the number of the third specified periods may be set based on actual user identification needs.
EXAMPLE five
On the basis of the first embodiment and the second embodiment, when the associated information includes APP usage information, the flow of the user identification method of an embodiment of the present invention includes:
step 502, obtaining respective user information sets of a plurality of geographic areas related to the target user.
Step 504, determining shared users other than the target user among the plurality of geographic areas based on the respective user information sets of the plurality of geographic areas.
Step 506, when the APP usage information includes the active period of the designated APP, determining that the active period of the designated APP corresponding to the target user does not intersect with the active period of the designated APP corresponding to the shared user in a plurality of fourth designated periods.
If the target user and the shared user are the same user, the belongings of the target user and the shared user generally only operate the target user or only operate the shared user at the same time. For example, the real-time battle game j is installed in both the small mobile phone h and the mobile phone i, so that when the small mobile phone h runs the real-time battle game j, the real-time battle game j is also run in the mobile phone i by a pure time, that is, the active time periods of the real-time battle game j in the mobile phone h and the mobile phone i do not intersect.
Based on the principle, the fourth designated time interval can be set to be 24h, and a plurality of fourth designated time intervals can be set to be 30 consecutive days, so that the active time intervals of the real-time fighting games j in the mobile phone h and the mobile phone i can be determined to have no intersection in a plurality of consecutive 30 days. The more the number of the fourth designated time periods without intersection is, the higher the possibility that the mobile phone h and the mobile phone i belong to the same person is.
Step 508, determining the intimacy degree of the shared user and the target user based on the actual number of the fourth specified time periods, wherein the greater the number, the higher the intimacy degree.
The greater the number of the fourth designated periods, i.e. the greater the number of days without intersection of the activity periods of the designated APPs of the two, the greater the intimacy of the two, and the more likely the two are the same person. By this, the intimacy of the two can be reflected by the number of the fourth specified periods. As can be seen from the above example, the target user and the common user do not intersect each day in the activity period of the designated APP in 30 consecutive days, and the intimacy of the two is the highest.
Step 510, determining that the shared user and the target user are the same user when the affinity is greater than or equal to a specified affinity.
EXAMPLE six
On the basis of the first embodiment and the second embodiment, when the associated information includes APP usage information, a flow of the user identification method of another embodiment of the present invention includes:
step 602, obtaining respective user information sets of a plurality of geographic areas related to the target user.
Step 604, determining shared users other than the target user among the plurality of geographic areas based on the respective user information sets of the plurality of geographic areas.
Step 606, when the APP usage information specifies the active period of the APP, obtaining the time intersection of the active period of the specified APP corresponding to the target user and the active period of the specified APP corresponding to the common user.
Step 608, determining an affinity of the shared user and the target user based on the time intersection, wherein the affinity is lower when the range of the time intersection is larger.
Similar to the principle described in the fifth embodiment, the less the time intersection of the active periods of the designated APPs corresponding to the target user and the common user is, the more likely the target user and the common user belong to the same person, and the same person has no time to operate the designated APP corresponding to the target user and the designated APP corresponding to the common user at the same time. Conversely, the more time intersections of the activity periods of the designated APPs corresponding to the target user and the common user, the lower the probability that the target user and the common user belong to the same person. Therefore, the time intersection of the activity period of the designated APP corresponding to the target user and the activity period of the designated APP corresponding to the shared user reflects the intimacy degree of the target user and the shared user.
Step 610, determining that the shared user and the target user are the same user when the intimacy degree is greater than or equal to a specified intimacy degree.
EXAMPLE seven
On the basis of the first embodiment and the second embodiment, the associated information includes APP usage information, and the APP usage information includes a specific APP set, where the specific APP set includes, but is not limited to, an APP set with an activity higher than a specific activity in a fifth specific period, a newly added APP set in a sixth specific period, or an uninstalled APP set in the sixth specific period, and then the flow of the user identification method according to another embodiment of the present invention includes:
step 702, obtaining respective user information sets of a plurality of geographic areas related to a target user.
Step 704, determining shared users other than the target user among the plurality of geographic areas based on the respective user information sets of the plurality of geographic areas.
Step 706, when the association information includes the designated APP set, determining an association value between the designated APP set of the target user and the designated APP set of the shared user.
Step 708, determining the intimacy between the common user and the target user based on the correlation value.
In one possible design, if the target user and the shared user are the same user, even if the time periods for the shared user to use the target user and the shared user are different, the user habit is determined, and the frequently used APPs are the same batch regardless of the target user or the shared user. Based on this, the associated values include: the target user and the common user have a higher activity in the fifth specified period than a common number of APPs of a set of APPs of a specified activity, that is, a number of APPs sufficiently active for the target user and the common user to share in the same period. The fifth designated period may be selected as 24h, and at this time, the association value includes the number of common APPs of the APP set in which the activity of the target user and the common user within 24h is higher than the designated activity. The larger the number of common APPs is, the more common APPs indicating that the person belonging to the target user is the same as the person belonging to the common user, and the more likely it is that the same person is.
Wherein, the specified activity is the lowest activity required by the APP to become the active APP, in other words, the specified activity reflects the lowest frequency of using the common APP by the user.
In one possible design, the total APP numbers of the new APP set of the target user in the sixth specified period and the uninstall APP set of the common user in the sixth specified period. In an actual scenario, in the case that the target user is an electronic device, a person belonging to the electronic device may replace the electronic device with a new one, or after obtaining a standby electronic device, install an APP in the original electronic device to the standby electronic device based on a confidential requirement or a practical requirement. In this case, it may happen that the owner installs an APP in another electronic device after uninstalling the APP in one electronic device, and therefore, if the number of the common APPs of the new APP set of the target user in the sixth specified period and the uninstalled APP set of the common user in the sixth specified period is larger, the possibility that the target user and the common user are different devices of the same person is higher.
In yet another possible design, the total APP numbers of the uninstalled APP set of the target user in the sixth specified period and the newly added APP set of the shared user in the sixth specified period. In the same way as in the above scheme, the higher the total APP number of the uninstalled APP set of the target user in the sixth specified period and the newly added APP set of the shared user in the sixth specified period is, the higher the possibility that the target user and the shared user are different devices of the same person is.
In another possible design, any two or three of the APP sets with higher activity in the fifth specified period, the newly added APP set in the sixth specified period, or the uninstalled APP set in the sixth specified period may be combined as the basis for calculating the correlation value. For example, the correlation value is set as a weighted sum or weighted average of the total APP numbers of the APP sets of which the activity degrees of the target user and the common user in the fifth specified period are higher than the specified activity degree, and the total APP numbers of the uninstalled APP set of the target user in the sixth specified period and the newly added APP set of the common user in the sixth specified period.
Step 710, determining that the shared user and the target user are the same user when the affinity is greater than or equal to a specified affinity.
In addition, in the above embodiments, the first designated time period, the second designated time period, the third designated time period, the fourth designated time period, the fifth designated time period, and the sixth designated time period may all be set based on actual requirements, and are not limited by examples in this application.
It should be added that the correlation information for calculating the intimacy given in the third to seventh embodiments: Wi-Fi connection information, reported position information, an activity period of a specified APP, an APP set with activity higher than the specified activity in a fifth specified period, a newly added APP set in a sixth specified period or an uninstalled APP set in the sixth specified period and the like. For example, the two affinities calculated in example three and example five may be weighted and averaged, and the average may be used as the final affinity.
The electronic device 800 of one embodiment of the invention includes at least one memory 802; and a processor 804 communicatively coupled to the at least one memory 802; wherein the memory stores instructions executable by the at least one processor 804, the instructions being configured to perform the scheme described in any of the embodiments above. Therefore, the electronic device 800 has the same technical effects as any of the above embodiments, and will not be described herein again.
The electronic device of embodiments of the present invention exists in a variety of forms, including but not limited to:
(1) mobile communication devices, which are characterized by mobile communication capabilities and are primarily targeted at providing voice and data communications. Such terminals include smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) Portable entertainment devices such devices may display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, as well as smart toys and portable car navigation devices.
(4) The server is similar to a general computer architecture, but has higher requirements on processing capability, stability, reliability, safety, expandability, manageability and the like because of the need of providing highly reliable services.
(5) And other electronic devices with data interaction functions.
In addition, an embodiment of the present invention provides a computer-readable storage medium, which stores computer-executable instructions for executing the method flow described in any of the above embodiments.
The technical scheme of the invention is described in detail in the above with reference to the drawings, and through the technical scheme of the invention, the same user belonging to the same person as the target user can be quickly and effectively identified through the intimacy between the target user and the shared user in a plurality of geographic areas related to the target user, so that the required service information can be flexibly and intelligently provided for a plurality of accounts or a plurality of electronic devices of the same person, and the improvement of user experience is facilitated.
It should be understood that the term "and/or" as used herein is merely one type of association that describes an associated object, meaning that three relationships may exist, e.g., a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
It should be understood that although the terms first, second, etc. may be used to describe specified periods in embodiments of the present invention, these specified periods should not be limited by these terms. These terms are only used to distinguish specified periods from each other. For example, the first specified time period may also be referred to as the second specified time period, and similarly, the second specified time period may also be referred to as the first specified time period, without departing from the scope of embodiments of the present invention.
The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
In the embodiments provided in the present invention, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and there may be other divisions in actual implementation, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device) or a Processor (Processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like made within the spirit and principle of the present invention should be included in the scope of the present invention.

Claims (9)

1. A method for identifying a user, comprising:
acquiring user information sets of a plurality of geographical areas related to a target user;
determining common users other than the target user among the plurality of geographic areas based on respective user information sets of the plurality of geographic areas;
determining the intimacy between the shared user and the target user based on the associated information of the target user and the associated information of the shared user, wherein the associated information comprises one or more of Wi-Fi connection information, position reporting information and APP use information;
determining that the shared user and the target user are the same user if the affinity is greater than or equal to a specified affinity.
2. The method according to claim 1, wherein the step of obtaining the user information sets of the respective geographic areas related to the target user comprises:
for each geographic area related to the target user, acquiring an MAC (media access control) address set of external equipment of Wi-Fi equipment in the geographic area within a first specified time period as a user information set of the geographic area;
the step of determining a common user other than the target user among the plurality of geographic areas based on the respective sets of user information of the plurality of geographic areas includes:
and in the external equipment MAC address set corresponding to each of the plurality of geographic areas, determining a common MAC address except the MAC address of the target user among the plurality of geographic areas, and determining the user to which the common MAC address belongs as a common user except the target user among the plurality of geographic areas.
3. The user identification method according to claim 1 or 2,
the Wi-Fi connection information comprises connected historical Wi-Fi devices and time periods of connection of the historical Wi-Fi devices;
when the association information includes the Wi-Fi connection information, the step of determining an affinity of the shared user with the target user based on the association information of the target user and the association information of the shared user includes:
determining that the target user and the shared user have connected to the same historical Wi-Fi device within a number of second designated time periods based on the Wi-Fi connection information of the target user and the Wi-Fi connection information of the shared user;
determining an affinity of the shared user with the target user based on a number of the number of second designated time periods, wherein the greater the number, the higher the affinity.
4. The user identification method according to claim 1 or 2,
the reported position information comprises a position and the reported time of the position;
when the associated information includes the location reporting information, the step of determining the intimacy between the common user and the target user based on the associated information of the target user and the associated information of the common user includes:
determining positions of the target user and the shared user in the same geographic area reported in a plurality of third designated time periods based on the position reporting information of the target user and the position reporting information of the shared user;
determining an affinity of the shared user with the target user based on a number of the number of third specified time periods, wherein the greater the number, the higher the affinity.
5. The user identification method according to claim 1 or 2,
the APP usage information includes an activity period specifying an APP;
the step of determining the intimacy degree of the shared user with the target user based on the association information of the target user and the association information of the shared user includes:
when the associated information includes the active periods of the designated APPs, determining that the active periods of the designated APPs corresponding to the target user and the active periods of the designated APPs corresponding to the shared users do not intersect in a plurality of fourth designated periods;
determining an affinity of the shared user with the target user based on an actual number of the fourth specified periods, wherein the greater the number, the greater the affinity.
6. The user identification method according to claim 1 or 2,
the APP usage information includes an activity period specifying an APP;
the step of determining the intimacy degree of the shared user with the target user based on the association information of the target user and the association information of the shared user includes:
when the associated information includes the active period of the specified APP, acquiring a time intersection of the active period of the specified APP corresponding to the target user and the active period of the specified APP corresponding to the shared user;
determining an affinity of the common user with the target user based on the time intersection, wherein the greater the range of the time intersection, the lower the affinity.
7. The user identification method according to claim 1 or 2,
the APP use information comprises a designated APP set, wherein the designated APP set comprises an APP set with the activity higher than the designated activity in a fifth designated period, a newly added APP set in a sixth designated period or an uninstalled APP set in the sixth designated period;
the step of determining the intimacy degree of the shared user with the target user based on the association information of the target user and the association information of the shared user includes:
when the association information comprises the appointed APP set, determining an association value of the appointed APP set of the target user and the appointed APP set of the shared user;
determining an affinity of the common user with the target user based on the correlation value, wherein the correlation value comprises:
a total number of APPs of the set of APPs for which the target user and the common user have a higher activity than a specified activity during the fifth specified period; or
The total APP number of the newly added APP set of the target user in the sixth specified time period and the uninstalled APP set of the common user in the sixth specified time period; or
The total APP numbers of the uninstalled APP sets of the target user in the sixth specified time period and the newly added APP sets of the common users in the sixth specified time period.
8. An electronic device, comprising: at least one processor; and a memory communicatively coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor, the instructions being arranged to perform the method of any of the preceding claims 1 to 7.
9. A computer-readable storage medium having stored thereon computer-executable instructions for performing the method flow of any of claims 1-7.
CN202110401126.XA 2021-04-14 2021-04-14 User identification method, electronic device, and computer-readable storage medium Active CN113114770B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110401126.XA CN113114770B (en) 2021-04-14 2021-04-14 User identification method, electronic device, and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110401126.XA CN113114770B (en) 2021-04-14 2021-04-14 User identification method, electronic device, and computer-readable storage medium

Publications (2)

Publication Number Publication Date
CN113114770A true CN113114770A (en) 2021-07-13
CN113114770B CN113114770B (en) 2022-08-09

Family

ID=76717043

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110401126.XA Active CN113114770B (en) 2021-04-14 2021-04-14 User identification method, electronic device, and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN113114770B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113840392A (en) * 2021-09-17 2021-12-24 杭州云深科技有限公司 Method and device for determining user intimacy, computer equipment and storage medium
CN117573951A (en) * 2024-01-16 2024-02-20 每日互动股份有限公司 Target user screening method, device, medium and equipment

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140279003A1 (en) * 2013-03-14 2014-09-18 Bank Of America Corporation Enhancement of user affinity experience based on messaging related to a geographic area
US20150341453A1 (en) * 2014-05-21 2015-11-26 Aol Advertising Inc. Systems and methods for matching online users across devices
CN106960143A (en) * 2017-03-23 2017-07-18 网易(杭州)网络有限公司 The recognition methods of user account and device, storage medium, electronic equipment
CN108491424A (en) * 2018-02-07 2018-09-04 链家网(北京)科技有限公司 User ID correlating method and device
CN109284380A (en) * 2018-09-25 2019-01-29 平安科技(深圳)有限公司 Illegal user's recognition methods and device, electronic equipment based on big data analysis
CN110166287A (en) * 2019-05-05 2019-08-23 南京邮电大学 A kind of same user identification method based on cum rights hypergraph
CN110611689A (en) * 2018-06-15 2019-12-24 中移信息技术有限公司 Information identification method and device and computer readable storage medium
CN110750681A (en) * 2018-07-05 2020-02-04 武汉斗鱼网络科技有限公司 Account similarity calculation method, storage medium, electronic device and system
CN110807068A (en) * 2019-10-08 2020-02-18 北京百度网讯科技有限公司 Equipment switching user identification method and device, computer equipment and storage medium
CN112199652A (en) * 2020-10-23 2021-01-08 网易(杭州)网络有限公司 Login method, terminal, server, system, medium and equipment of application program

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140279003A1 (en) * 2013-03-14 2014-09-18 Bank Of America Corporation Enhancement of user affinity experience based on messaging related to a geographic area
US20150341453A1 (en) * 2014-05-21 2015-11-26 Aol Advertising Inc. Systems and methods for matching online users across devices
CN106960143A (en) * 2017-03-23 2017-07-18 网易(杭州)网络有限公司 The recognition methods of user account and device, storage medium, electronic equipment
CN108491424A (en) * 2018-02-07 2018-09-04 链家网(北京)科技有限公司 User ID correlating method and device
CN110611689A (en) * 2018-06-15 2019-12-24 中移信息技术有限公司 Information identification method and device and computer readable storage medium
CN110750681A (en) * 2018-07-05 2020-02-04 武汉斗鱼网络科技有限公司 Account similarity calculation method, storage medium, electronic device and system
CN109284380A (en) * 2018-09-25 2019-01-29 平安科技(深圳)有限公司 Illegal user's recognition methods and device, electronic equipment based on big data analysis
CN110166287A (en) * 2019-05-05 2019-08-23 南京邮电大学 A kind of same user identification method based on cum rights hypergraph
CN110807068A (en) * 2019-10-08 2020-02-18 北京百度网讯科技有限公司 Equipment switching user identification method and device, computer equipment and storage medium
CN112199652A (en) * 2020-10-23 2021-01-08 网易(杭州)网络有限公司 Login method, terminal, server, system, medium and equipment of application program

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113840392A (en) * 2021-09-17 2021-12-24 杭州云深科技有限公司 Method and device for determining user intimacy, computer equipment and storage medium
CN113840392B (en) * 2021-09-17 2023-09-22 杭州云深科技有限公司 User intimacy determination method, device, computer equipment and storage medium
CN117573951A (en) * 2024-01-16 2024-02-20 每日互动股份有限公司 Target user screening method, device, medium and equipment
CN117573951B (en) * 2024-01-16 2024-04-12 每日互动股份有限公司 Target user screening method, device, medium and equipment

Also Published As

Publication number Publication date
CN113114770B (en) 2022-08-09

Similar Documents

Publication Publication Date Title
CN113114770B (en) User identification method, electronic device, and computer-readable storage medium
CN106155789B (en) Application freezing method and mobile terminal
CN101882090B (en) Linking software users sharing common traits
CN112365367B (en) Regional portrait method and device based on device electric quantity and storage medium
CN106713290B (en) Method for identifying main user account and server
CN108062692B (en) Recording recommendation method, device, equipment and computer readable storage medium
CN113412607B (en) Content pushing method and device, mobile terminal and storage medium
CN111931048A (en) Artificial intelligence-based black product account detection method and related device
CN106657062B (en) User identification method and device
CN111062027A (en) Method and device for preventing bad HID equipment from invading, electronic equipment and storage medium
CN108966340B (en) Equipment positioning method and device
CN110688319B (en) Application keep-alive capability test method and related device
CN112364222B (en) Regional portrait method of user age, computer equipment and storage medium
CN111147600A (en) Service execution method and terminal under cluster environment
CN111030974A (en) APT attack event detection method, device and storage medium
CN113852510A (en) Network security situation prediction method and device, electronic equipment and storage medium
CN108540582A (en) A kind of processing method of terminal iidentification, server and terminal
CN107450951B (en) Application processing method and device, storage medium and terminal
CN110719367A (en) Cloud mobile phone friend recommendation method, device, equipment and storage medium
CN107291543B (en) Application processing method and device, storage medium and terminal
CN113891323B (en) WiFi-based user tag acquisition system
CN112190950B (en) Method and device for detecting abnormal player account
CN110801630B (en) Method, device, equipment and storage medium for determining cheating program
CN114338102A (en) Security detection method and device, electronic equipment and storage medium
CN114338109A (en) Flow detection method and device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant