CN114971662A - Data tracking method, device, equipment and storage medium - Google Patents

Data tracking method, device, equipment and storage medium Download PDF

Info

Publication number
CN114971662A
CN114971662A CN202110208459.0A CN202110208459A CN114971662A CN 114971662 A CN114971662 A CN 114971662A CN 202110208459 A CN202110208459 A CN 202110208459A CN 114971662 A CN114971662 A CN 114971662A
Authority
CN
China
Prior art keywords
information
application
target
identification information
resource sharing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110208459.0A
Other languages
Chinese (zh)
Inventor
苟亚明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202110208459.0A priority Critical patent/CN114971662A/en
Publication of CN114971662A publication Critical patent/CN114971662A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0255Targeted advertisements based on user history
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0269Targeted advertisements based on user profile or attribute
    • G06Q30/0271Personalized advertisement

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a data tracking method, a data tracking device, data tracking equipment and a storage medium, wherein the method comprises the steps of responding to an identification acquisition request of a target application to an object to be tracked, and extracting sharing authority information of the target application; determining a resource sharing area of an associated application of the target application based on the sharing permission information of the target application; extracting target identification information from the resource sharing area of the associated application; performing data tracking based on the target identification information to obtain historical advertisement data; the target identification information is obtained in advance by the associated application and stored in a resource sharing area of the associated application. By the technical scheme, the target identification information can be conveniently and quickly obtained, and the efficiency and reliability of data tracking can be improved.

Description

Data tracking method, device, equipment and storage medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a data tracking method, apparatus, device, and storage medium.
Background
IDFA (Identifier For Advertising Identifier) is the unique Advertising Identifier of the iOS system, all IDFAs obtained by the APP are consistent on the same device running the IOS system, historical Advertising data on the device can be tracked by obtaining the IDFA, and subsequent APPs can also utilize the historical Advertising data to pertinently recommend Advertising information meeting user requirements or interests to users, so that the accuracy of information recommendation is improved while the user requirements are met.
In the prior art, when an IDFA needs to be acquired and data tracking is implemented, each APP needs to repeatedly initiate an access request, extract data according to a response request of a user, and once an IDFA value changes (for example, a system is reset), the request needs to be sent back and forth again, which is low in efficiency, unreliable in data tracking, and affects user experience, and therefore, a more reliable and efficient scheme needs to be provided.
Disclosure of Invention
In order to solve the problems in the prior art, the present application provides a data tracking method, apparatus, device and storage medium. The technical scheme is as follows:
one aspect of the present application provides a data tracking method, including:
responding to an identification acquisition request of a target application to-be-tracked object, and extracting sharing authority information of the target application;
determining a resource sharing area of an associated application of the target application based on the sharing permission information of the target application;
extracting target identification information from the resource sharing area of the associated application;
performing data tracking based on the target identification information to obtain historical advertisement data;
the target identification information is obtained in advance by the associated application and stored in a resource sharing area of the associated application.
Another aspect of the present application provides a data tracking apparatus, including:
the system comprises a sharing authority extraction module, a tracking module and a tracking module, wherein the sharing authority extraction module is used for responding to an identification acquisition request of a target application to an object to be tracked and extracting sharing authority information of the target application;
a resource sharing area determining module, configured to determine a resource sharing area of an application associated with the target application based on the sharing permission information of the target application;
the target identification information extraction module is used for extracting target identification information from the resource sharing area of the associated application;
the data tracking module is used for tracking data based on the target identification information to obtain historical advertisement data; the target identification information is obtained in advance by the associated application and stored in a resource sharing area of the associated application.
Another aspect of the present application provides a data tracking device, which includes a processor and a memory, where at least one instruction or at least one program is stored in the memory, and the at least one instruction or the at least one program is loaded by the processor and executed to implement the data tracking method as described above.
Another aspect of the present application provides a computer-readable storage medium, in which at least one instruction or at least one program is stored, and the at least one instruction or the at least one program is loaded and executed by a processor to implement the data tracking method as described above.
The data tracking method, the data tracking device, the data tracking equipment and the data tracking storage medium have the following technical effects:
the method comprises the steps of responding to an identification acquisition request of a target application to-be-tracked object, extracting sharing authority information of the target application, and determining a resource sharing area of an associated application of the target application based on the sharing authority information of the target application; then, extracting target identification information from the resource sharing area of the associated application, and conveniently and quickly obtaining the target identification information; finally, data tracking is carried out based on the target identification information to obtain historical advertisement data; the target identification information is obtained in advance by the associated application and stored in the resource sharing area of the associated application, and the efficiency and reliability of data tracking can be improved by using the technical scheme provided by the embodiment of the application.
Additional aspects and advantages of the present application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the present application.
Drawings
In order to more clearly illustrate the technical solutions and advantages of the embodiments of the present application or the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
FIG. 1 is a schematic diagram of an application environment provided by an embodiment of the present application;
fig. 2 is a schematic flowchart of a data tracking method according to an embodiment of the present application;
FIG. 3 is a schematic flow chart diagram illustrating another data tracking method according to an embodiment of the present application;
FIG. 4 is a schematic flow chart diagram illustrating another data tracking method according to an embodiment of the present application;
FIG. 5 is a schematic flow chart diagram illustrating another data tracking method according to an embodiment of the present application;
FIG. 6 is a schematic flow chart diagram illustrating another data tracking method according to an embodiment of the present application;
FIG. 7 is a schematic flow chart diagram illustrating another data tracking method according to an embodiment of the present application;
FIG. 8 is a schematic flow chart diagram illustrating another data tracking method according to an embodiment of the present application;
FIG. 9 is a schematic diagram of a data tracking device according to an embodiment of the present application;
fig. 10 is a block diagram of a hardware structure of a client for implementing a data tracking method according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application. Examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar function throughout.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Referring to fig. 1, fig. 1 is a schematic diagram of an application environment provided by the present application, and as shown in fig. 1, the application environment may include a server 01 and a client 02.
In this embodiment, the server 01 may be configured to store the developed packages of the applications so that the client 02 obtains and installs the applications, where each developed package of the applications may include corresponding resource sharing area configuration information, so that the client 02 locally configures the resource sharing information of the application according to the corresponding resource sharing area configuration information. Optionally, the server 01 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a CDN (Content Delivery Network), a big data and artificial intelligence platform, and the like.
In this embodiment of the application, the client 02 may run multiple applications (including a target application and an associated application of the target application), and the client 02 may extract, in response to an identifier acquisition request of a target application for an object to be tracked, sharing permission information of the target application; then, determining a resource sharing area of the associated application of the target application based on the sharing authority information of the target application, and extracting target identification information from the resource sharing area of the associated application; finally, data tracking is carried out based on the target identification information to obtain historical advertisement data; the target identification information is obtained in advance by the associated application and stored in a resource sharing area of the associated application. In one embodiment, the plurality of clients 02 may include, but are not limited to, terminal devices such as a smart phone, a smart speaker, a tablet computer, a laptop computer, a desktop computer, a smart watch, a network device, a firewall, and the like.
In the embodiment of the present disclosure, the server 01 and the client 02 may be directly or indirectly connected through a wired or wireless communication manner, and the present disclosure is not limited herein.
Fig. 2 is a flow chart of a data tracking method provided in an embodiment of the present application, and the present specification provides the method operation steps as described in the embodiment or the flow chart, but more or less operation steps can be included based on conventional or non-inventive labor. The order of steps recited in the embodiments is merely one manner of performing the steps in a multitude of orders and does not represent the only order of execution. In practice, the system or server product may be implemented in a sequential or parallel manner (e.g., parallel processor or multi-threaded environment) according to the embodiments or methods shown in the figures. Specifically, as shown in fig. 2, the method may include:
s201: and responding to the identification acquisition request of the target application to the object to be tracked, and extracting the sharing authority information of the target application.
In an embodiment of the present Application, the target Application may be an Application program (APP Application) installed on a target device, and in an embodiment, the target device may include an electronic device for implementing the data tracking method provided in the present Application, and the target device runs an IOS system, and in an actual Application, the target device may include, but is not limited to, a mobile phone, a desktop computer, a notebook computer, and a tablet computer running the IOS system.
In practical application, an IDFA (Identifier For Advertising Identifier) is an Advertising Identifier provided by the IOS system and used For tracking Advertising data, and IDFAs obtained by all applications on the same device operating the IOS system are consistent, so that historical Advertising data on the device can be tracked by obtaining the IDFA, and subsequent applications can also recommend Advertising information meeting user requirements or interests to a user in a targeted manner by using the obtained historical Advertising data, thereby improving the accuracy of information recommendation while meeting the user requirements. In this embodiment of the present application, the object to be tracked may represent an object that needs to be subjected to data tracking, specifically, the object to be tracked may include advertisement data on a target device, and the identifier obtaining request of the target application for the object to be tracked may include an IDFA obtaining request of the target application; in practical applications, the identifier obtaining request of the target application for the object to be tracked may be automatically triggered when the target application is run on a device in which the target application is installed for the first time, or sent when the target application needs to track advertisement data (for example, a page is clicked, and information recommendation needs to be performed on the page), and the application is not limited thereto.
In the embodiment of the present application, the sharing permission information of the target application may represent the resource sharing area access permission information of the target application, and in practical application, the sharing permission information of the target application may include a character string composed of letters, numbers, and the like; in an embodiment, the extracting, in response to the request for obtaining the identifier of the object to be tracked by the target application, the sharing permission information of the target application may include:
1) and determining the resource sharing area of the target application in response to the IDFA acquisition request of the target application.
In the embodiment of the present application, the resource sharing area of the target application may represent a data storage area that is used by the target application for storing the IDFA and can implement IDFA sharing; in an actual application, the resource sharing area of the target application is generated by writing on the device according to preconfigured resource sharing information, the resource sharing information may be IDFA sharing information, and the resource sharing information may be generated according to actual IDFA sharing requirement configuration when the target application is developed.
In the embodiment of the application, when each application is developed, keyhain configuration is performed to generate secure storage area configuration information (keyhain configuration information), when the device installed with the application runs the application for the first time, corresponding information writing is performed locally according to the secure storage area configuration information of the application to generate a secure storage area (keyhain) of the application, and the secure storage area of the application is stored in a local system, so that deleting the application does not affect the secure storage area of the application, and the stability of information storage is improved; the secure storage area of the application can be used for storing information such as passwords and certificates generated in the running process of the application, and different applications are not allowed to access the respective secure storage areas mutually under general conditions, so that data protection is realized. However, resource sharing information may be preconfigured according to actual application requirements when configuring a keychalin of an application, where the resource sharing information may represent resource sharing area configuration information of the application to open a resource sharing area to implement IDFA sharing, and specifically, the resource sharing information may include, but is not limited to, storage information of the resource sharing area of the application (a key is an IDFA, a value is an IDFA value, and a time tag attribute is used to record authorization time or modification time of the IDFA), an authority identifier of the resource sharing area of the application (the IDFA stored in the application can be read by an application whose authority identifier matches that of other resource sharing areas), and attribute information (for example, may include a service type, a security type, and the like) of the resource sharing area of the application. By configuring the resource sharing information in advance, when information is written in the device according to the secure storage area configuration information of the application, the corresponding resource sharing area of the application can be generated on the device according to the resource sharing requirement information, so that other applications can read data in the resource sharing area, and IDFA sharing is realized.
2) And extracting the authority identifier of the resource sharing area of the target application, and taking the authority identifier of the resource sharing area of the target application as the sharing authority information of the target application.
Specifically, the authority identifier of the resource sharing area of each application may be set when resource sharing information is configured in advance in combination with actual application requirements; in one embodiment, the authority identifier of the resource sharing area of an application may include a developer identifier corresponding to the application, so as to implement resource sharing of applications subordinate to the same openers; in another embodiment, the authority identifier of the resource sharing area of one application may also include a service type identifier, and the service type identifier may be set in combination with actual application requirements, so as to implement resource sharing (IDFA sharing) between applications of the same service type, which is not limited in this application.
By responding to the identification acquisition request of the target application for the object to be tracked and extracting the sharing authority information of the target application, the method is beneficial to accurately positioning the accessible resource sharing area by combining the sharing authority information of the target application, and the safety and the reliability of data tracking are improved.
S203: and determining a resource sharing area of the associated application of the target application based on the sharing authority information of the target application.
In this embodiment of the present application, the associated application of the target application may characterize an application that can perform IDFA sharing with the target application (for example, an application of the same service type as the target application, or an application of the same developer as the target application); specifically, the determining the resource sharing area of the application associated with the target application based on the sharing permission information of the target application may include:
extracting authority identification of resource sharing areas of local applications; and when the authority identification of the resource sharing area of any application is matched with the sharing authority information of the target application, taking the resource sharing area of the application as the resource sharing area of the related application. In one embodiment, when the authority identifier of the resource sharing area of any application is consistent with the sharing authority information of the target application, it may be determined that the authority identifier of the resource sharing area of the application matches with the sharing authority information of the target application.
By determining the resource sharing area of the associated application of the target application based on the sharing permission information of the target application, the interference of irrelevant data can be eliminated, the efficiency of acquiring the identification information is improved, and the efficiency of tracking the data is further improved.
S205: and extracting target identification information from the resource sharing area of the associated application.
Specifically, the target identification information may represent information for performing data tracking on the object to be tracked, and in this embodiment, the target identification information may include an IDFA value.
In this embodiment of the application, when there is more than one resource sharing area of the associated application, the extracting the target identification information from the resource sharing area of the associated application may include:
extracting the value of the time tag attribute in the resource sharing area of each associated application; and determining the latest identification information according to the value of the time tag attribute in the resource sharing area of each associated application, and taking the latest identification information as the target identification information.
By extracting the value of the time tag attribute in the resource sharing area of each associated application, determining the latest identification information according to the value of the time tag attribute in the resource sharing area of each associated application, and taking the latest identification information as the target identification information, the efficiency and the reliability of identification information acquisition are improved, and data tracking is efficiently and accurately realized.
In this embodiment of the present application, the target identification information is obtained in advance by the associated application and stored in the resource sharing area of the associated application.
In an embodiment, referring to fig. 3, the method may further include:
s301: and generating identification authorization request information of the associated application in response to the permission access triggering instruction of the associated application.
In this embodiment of the application, the identifier authorization request message may include a shared authorization prompt message, where the shared authorization prompt message may represent an authorization prompt message for sharing identifier information among multiple applications, and is used to prompt a user that an IDFA value obtained by authorization can be shared among the multiple applications, and specifically, the multiple applications at this time may represent applications that can perform IDFA sharing with the associated application (for example, applications that are the same as a service type of the associated application, or applications that are the same as a developer of the associated application). In practical applications, the identifier authorization request information of the associated application may be presented to the target user in a form of a popup window when requesting authorization to read the IDFA value.
S303: the target identification information is acquired in response to the identification authorization permission instruction.
In this embodiment of the application, the identifier authorization permission instruction may be a permission instruction of the target user for the associated authorization request for reading the IDFA, for example, if the user clicks an agreement key under a pop-up window, the identifier authorization permission instruction is issued, and at this time, the target identifier information (IDFA value) may be obtained.
Referring to fig. 4, in some embodiments, the obtaining the target identification information in response to the identification authorization permission instruction may include:
s401: and responding to the identification authorization permission instruction, and acquiring original identification information.
S403: and carrying out data encryption on the original identification information to obtain the target identification information.
In the embodiment of the application, the obtained original identification information can be encrypted, and the encrypted identification information is used as the target identification information, which is beneficial to ensuring data security.
In one embodiment, the above-mentioned obtaining the target identification information in response to the identification authorization permission instruction may include:
1) and monitoring the calling condition of the identification authorization method according to the associated application.
In particular, the above-mentioned identification authorization method may characterize a method function for implementing identification authorization (a method function for implementing IDFA authorization) in the system of the target device.
2) And when the associated application detects that the identification authorization method is called, acquiring the content information corresponding to the identification authorization method.
In an embodiment, the associated application may monitor a calling condition of the identifier authorization method by using a preset authority tracking method, and when it is detected that the identifier authorization method is called, the associated application may modify address information of the identifier authorization method to point to the preset authority tracking method, so as to obtain content information corresponding to the identifier authorization method.
3) And extracting the target identification information from the corresponding content information.
In this embodiment of the application, after the content information corresponding to the identifier authorization method is obtained, the target identifier information may be extracted from the content information. Target identification information is extracted by monitoring the calling condition of the identification authorization method, and the target identification information can be acquired in time.
S305: and storing the target identification information in the resource sharing area of the related application.
In this embodiment of the present application, after the target identification information is obtained in response to the identification authorization permission instruction, the target identification information may be stored in the resource sharing area of the associated application for subsequent other authorized applications to read, so as to implement IDFA sharing. In some embodiments, the identifier update time may be further extracted from the corresponding content information, and the identifier update time is used as a value of the time tag attribute to facilitate IDFA selection when other applications read the time tag attribute.
In some embodiments, method tag information may be further extracted from the corresponding content information, where the method tag information may include an application ID and an IDFA value, and then the method tag information is compared with preset tag information, and when the method tag information matches with the preset tag information, the target identifier information is stored in the resource sharing area of the associated application, which is equivalent to performing an inspection of the acquired information, so that an error in acquiring information due to acquiring content information of an erroneous method function can be avoided, and the reliability in acquiring the target identifier information is improved.
The identification authorization request information of the associated application is generated by responding to the permission access triggering instruction of the associated application, the target identification information is obtained by responding to the identification authorization permission instruction, and then the target identification information is stored in the resource sharing area of the associated application, so that the sharing of the target identification information can be realized, the IDFA can be flexibly and conveniently obtained among the following multiple applications, and the data tracking efficiency is improved.
In this embodiment of the application, the identifier authorization request message may further include an update authorization prompt message, where the update authorization prompt message may represent an update situation of obtaining the identifier information and share the authorization prompt message of the update situation among the multiple applications, and is used to prompt a user that the multiple applications can obtain the update situation of the identifier information after authorizing obtaining the IDFA, and can share the update situation of the identifier information among the multiple applications. The plurality of applications at this time may also characterize an application that is capable of IDFA sharing with the associated application (e.g., an application of the same traffic type as the associated application, or an application of the same developer as the associated application).
In an embodiment of the present application, referring to fig. 5, the method may further include:
s501: and when the associated application detects the identifier updating trigger information, acquiring the updating identifier information.
In practical applications, due to reasons such as system reset, the IDFA value may change, and once the IDFA value changes, the IDFA value originally stored in the resource sharing area will fail, and the application cannot continue to use the IDFA value to implement data tracking and information pushing.
Referring to fig. 6, in an embodiment, when the associated application detects the identifier update trigger information, the acquiring the update identifier information may include:
s601: and monitoring the calling condition of the identifier updating method according to the related application.
In particular, the above-described identity update method may characterize a method function for implementing identity update (method function for implementing IDFA update) in the system of target devices.
S603: and when the associated application detects that the identifier updating method is called, acquiring content information corresponding to the identifier updating method.
In an embodiment, the associated application may monitor a calling condition of the identifier updating method by using a preset authority tracking method, and when it is detected that the identifier updating method is called, the associated application may modify address information of the identifier updating method to point to the preset authority tracking method, so as to obtain content information corresponding to the identifier updating method.
S605: and extracting the updating identification information from the corresponding content information.
In this embodiment of the application, after the content information corresponding to the identifier updating method is obtained, the above-mentioned updated identifier information may be extracted therefrom. The updating identification information is extracted by monitoring the calling condition of the identification updating method, which is beneficial to determining the updating condition of the Identification (IDFA) in real time and updating the IDFA in the resource sharing area in time.
S503: and updating the target identification information in the resource sharing area of the associated application according to the updated identification information.
In this embodiment of the application, updating the target identification information in the resource sharing area of the associated application according to the update identification information may include: covering the target identification information in the resource sharing area of the associated application by using the updated identification information; in some embodiments, the update time identifier may be further extracted from the corresponding content information, and the original value of the time tag attribute is updated so that the IDFA selection is performed when other applications read the update time identifier.
In some embodiments, method tag information may also be extracted from content information corresponding to the identifier updating method, where the method tag information may include an application ID and an IDFA value, and then the method tag information is compared with preset tag information, and when the method tag information matches with the preset tag information, the target identifier information in the resource sharing area of the associated application is updated according to the updated identifier information, which is equivalent to performing an inspection on the acquired information, so that an error in acquiring information caused by monitoring an erroneous method function can be avoided, and the reliability of updating the target identifier information is improved.
When the associated application detects the identifier updating trigger information, the updating identifier information is acquired, and the target identifier information in the resource sharing area of the associated application is updated according to the updating identifier information, so that the target identifier information in the resource sharing area can be updated timely, and the reliability of data tracking is improved.
S207: and tracking data based on the target identification information to obtain historical advertisement data.
In this embodiment of the present application, the target identification information may be an IDFA value; before data tracking is carried out based on the target identification information to obtain historical advertisement data, copying the target identification information by using preset dictionary variables, wherein the preset dictionary variables can comprise preset key value pairs, and the key of each preset key value pair is an IDFA (identity data exchange) value; and then, data tracking can be carried out based on the target identification information to obtain historical advertisement data, and further, data analysis and further information pushing are realized by utilizing the historical advertisement data.
Referring to fig. 7, the method may further include:
s701: performing behavior analysis according to the historical advertisement data to obtain analysis result data;
in this embodiment of the present application, performing behavior analysis according to the historical advertisement data, and obtaining analysis result data may include: and determining the user behavior analysis according to the historical advertisement data, determining the advertisement tendency information of the user, and taking the advertisement tendency information of the user as the analysis result data.
S703: and pushing information in the target application according to the analysis result data.
Extracting advertisement characteristic information from the advertisement tendency information of the user, performing data search in the target application according to the advertisement characteristic information, determining information matched with the advertisement characteristic information, and performing information push (for example, advertisement information push or push of a product in which the user is interested).
The behavior analysis is carried out according to the historical advertisement data to obtain analysis result data, and the information push is carried out in the target application according to the analysis result data, so that the historical advertisement data is favorably utilized to push the advertisement information meeting the user requirements or interests for the user in a targeted mode, the user requirements are met, and meanwhile the accuracy of the information push is improved.
In an embodiment, referring to fig. 8, before extracting the target identification information from the resource sharing area of the associated application, the method may further include:
s801: and detecting the storage condition of the resource sharing area of the related application.
S803: and when the resource sharing area of the associated application is determined to be empty, generating the identification authorization request information of the target application.
In particular, the above-mentioned identification authorization request information may include shared authorization prompt information, which may characterize authorization prompt information for sharing an identifier among a plurality of applications.
In this embodiment of the application, the specific process of generating the identifier authorization request information of the target application when it is determined that the resource sharing area of the associated application is empty is similar to S301, and reference may be made to the related description of S301, but at this time, when it is determined that the resource sharing area of the associated application is empty, the identifier authorization request information of the target application is generated; when the resource sharing area of the related application is determined to be empty, it indicates that no sharable target identification information exists, and at this time, the target application may obtain the IDFA value through a popup request authorization.
S805: the target identification information is acquired in response to the identification authorization permission instruction.
In this embodiment of the application, the specific process of obtaining the target identification information in response to the identification authorization permission instruction is similar to that in S303, and reference may be made to the related description in S303, which is not described herein again.
S807: and storing the target identification information in the resource sharing area of the target application.
In this embodiment of the present application, when it is determined that the resource sharing area of the associated application is empty, the identifier authorization request information of the target application is generated, and after the target identifier information is acquired in response to the identifier authorization permission instruction, the target identifier information may be stored in the resource sharing area of the target application, so that the acquired IDFA value is shared with the associated application of the target application, which is further beneficial to improving the efficiency and flexibility of data tracking.
According to the technical scheme provided by the embodiment of the application, the embodiment of the application extracts the sharing authority information of the target application by responding to the identification acquisition request of the target application for the object to be tracked, so that the resource sharing area of the associated application of the target application is determined based on the sharing authority information of the target application; the method is favorable for accurately positioning the accessible resource sharing area by combining the sharing authority information of the target application, and improves the safety and reliability of data tracking. Then, extracting target identification information from the resource sharing area of the associated application, and conveniently and quickly obtaining the target identification information; finally, data tracking is carried out based on the target identification information to obtain historical advertisement data; the target identification information is obtained in advance by the associated application and stored in the resource sharing area of the associated application, and the efficiency and the reliability of data tracking are improved. When the associated application detects the identifier updating trigger information, the updating identifier information is acquired, and the target identifier information in the resource sharing area of the associated application is updated according to the updating identifier information, so that the target identifier information in the resource sharing area can be updated timely, and the reliability of data tracking is improved. The behavior analysis is carried out according to the historical advertisement data to obtain analysis result data, and the information push is carried out in the target application according to the analysis result data, so that the historical advertisement data is favorably utilized to push the advertisement information meeting the user requirements or interests for the user in a targeted mode, the user requirements are met, and meanwhile the accuracy of the information push is improved. When the resource sharing area of the associated application is determined to be empty, the identifier authorization request information of the target application is generated, after the identifier authorization permission instruction is responded and the target identifier information is obtained, the target identifier information can be stored in the resource sharing area of the target application, the obtained IDFA value is shared with the associated application of the target application, and therefore the efficiency and the flexibility of data tracking are favorably improved.
An embodiment of the present application further provides a data tracking apparatus, as shown in fig. 9, the apparatus may include:
the sharing permission extracting module 910 is configured to, in response to an identifier obtaining request of a target application for an object to be tracked, extract sharing permission information of the target application;
a resource sharing area determining module 920, configured to determine a resource sharing area of an application associated with the target application based on the sharing permission information of the target application;
a target identification information extracting module 930 configured to extract target identification information from the resource sharing region of the associated application;
a data tracking module 940, configured to perform data tracking based on the target identification information to obtain historical advertisement data; the target identification information is obtained in advance by the associated application and stored in a resource sharing area of the associated application.
In some embodiments, the apparatus may further include:
an identifier authorization request information generating module, configured to generate identifier authorization request information of the associated application in response to an authority access trigger instruction of the associated application, where the identifier authorization request information includes shared authorization prompt information, and the shared authorization prompt information represents authorization prompt information for sharing identifier information among multiple applications;
the target identification information acquisition module is used for responding to an identification authorization permission instruction and acquiring the target identification information;
and the first data storage module is used for storing the target identification information in the resource sharing area of the associated application.
In some embodiments, the target identification information obtaining module may include:
an original identification information acquisition unit configured to acquire original identification information in response to the identification authorization permission instruction;
and the data encryption unit is used for carrying out data encryption on the original identification information to obtain the target identification information.
In some embodiments, the identifier authorization request message further includes an update authorization prompt message, where the update authorization prompt message represents an update condition of the identifier information and is shared among a plurality of applications, and the apparatus may further include:
an update identification information obtaining module, configured to obtain update identification information when the associated application detects identification update trigger information;
and the identification updating module is used for updating the target identification information in the resource sharing area of the associated application according to the updated identification information.
Specifically, the update identifier information obtaining module may include:
a method calling condition monitoring unit, configured to monitor a calling condition of the method update identifier according to the associated application;
a content obtaining unit, configured to obtain content information corresponding to the identifier updating method when the associated application detects that the identifier updating method is called;
an update identification extraction unit configured to extract the update identification information from the corresponding content information.
In some embodiments, the apparatus may further include:
before extracting target identification information from the resource sharing area of the associated application, detecting the storage condition of the resource sharing area of the associated application;
an identifier authorization request generating module, configured to generate identifier authorization request information of the target application when it is determined that the resource sharing area of the associated application is empty, where the identifier authorization request information includes shared authorization prompt information, and the shared authorization prompt information represents authorization prompt information for sharing identifier information among multiple applications;
the information acquisition module is used for responding to an identification authorization permission instruction and acquiring the target identification information;
and the second data storage module is used for storing the target identification information in a resource sharing area of the target application.
In this embodiment, the apparatus may further include:
the behavior analysis module is used for performing behavior analysis according to the historical advertisement data to obtain analysis result data;
and the information pushing module is used for pushing information in the target application according to the analysis result data.
The device and method embodiments in the device embodiment are based on the same application concept.
The embodiment of the present application provides a computer device, which includes a processor and a memory, where at least one instruction or at least one program is stored in the memory, and the at least one instruction or the at least one program is loaded and executed by the processor to implement the data tracking method provided by the above method embodiment.
The memory may be used to store software programs and modules, and the processor may execute various functional applications and data processing by operating the software programs and modules stored in the memory. The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system, application programs needed by functions and the like; the storage data area may store data created according to use of the apparatus, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory may also include a memory controller to provide the processor access to the memory.
The method embodiments provided by the embodiments of the present application may be executed in a mobile terminal, a computer terminal, a server, or a similar computing device, that is, the computer device may include a mobile terminal, a computer terminal, a server, or a similar computing device. The server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a network service, cloud communication, middleware service, a domain name service, a security service, a CDN, a big data and artificial intelligence platform, and the like. The terminal may be, but is not limited to, a smart phone, a tablet computer, a laptop computer, a desktop computer, a smart speaker, a smart watch, and the like. Taking the example of the client running on the client, fig. 10 is a schematic structural diagram of a client provided in the embodiment of the present application, and as shown in fig. 10, the client may be used to implement the data tracking method provided in the foregoing embodiment. Specifically, the method comprises the following steps:
the client may include RF (Radio Frequency) circuitry 1010, memory 1020 including one or more computer-readable storage media, input unit 1030, display unit 1040, sensors 1050, audio circuitry 1060, WiFi (wireless fidelity) module 1070, processor 1080 including one or more processing cores, and power source 1090. Those skilled in the art will appreciate that the client architecture shown in fig. 10 does not constitute a limitation on the client, and may include more or fewer components than shown, or some components in combination, or a different arrangement of components. Wherein:
RF circuit 1010 may be used for receiving and transmitting signals during a message transmission or communication process, and in particular, for receiving downlink information from a base station and then processing the received downlink information by one or more processors 1080; in addition, data relating to uplink is transmitted to the base station. In general, RF circuitry 1010 includes, but is not limited to, an antenna, at least one Amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, an LNA (Low Noise Amplifier), a duplexer, and the like. In addition, the RF circuitry 1010 may also communicate with networks and other clients via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to GSM (Global System for Mobile communications), GPRS (General Packet Radio Service), CDMA (Code Division Multiple Access), WCDMA (Wideband Code Division Multiple Access), LTE (Long Term Evolution), email, SMS (Short Messaging Service), and the like.
The memory 1020 may be used to store software programs and modules, and the processor 1080 executes various functional applications and data processing by operating the software programs and modules stored in the memory 1020. The memory 1020 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, application programs required for functions, and the like; the storage data area may store data created according to the use of the client, and the like. Further, the memory 1020 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, memory 1020 may also include a memory controller to provide access to memory 1020 by processor 1080 and input unit 1030.
The input unit 1030 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. In particular, input unit 1030 may include a touch-sensitive surface 1031, as well as other input devices 1032. The touch-sensitive surface 1031, also referred to as a touch display screen or a touch pad, may collect touch operations by a user (such as operations by a user on or near the touch-sensitive surface 1031 using any suitable object or attachment, such as a finger, a stylus, etc.) on or near the touch-sensitive surface 1031 and drive the corresponding connection device according to a preset program. Optionally, the touch sensitive surface 1031 may comprise two parts, a touch detection means and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, sends the touch point coordinates to the processor 1080, and can receive and execute commands sent by the processor 1080. In addition, the touch-sensitive surface 1031 may be implemented using various types of resistive, capacitive, infrared, and surface acoustic waves. The input unit 1030 may also include other input devices 1032 in addition to the touch-sensitive surface 1031. In particular, other input devices 1032 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a track ball, a mouse, a joystick, or the like.
The display unit 1040 may be used to display information input by or provided to a user and various graphical user interfaces of the client, which may be made up of graphics, text, icons, video, and any combination thereof. The Display unit 1040 may include a Display panel 1041, and optionally, the Display panel 1041 may be configured in the form of an LCD (Liquid Crystal Display), an OLED (Organic Light-Emitting Diode), or the like. Further, the touch-sensitive surface 1031 may overlay the display panel 1041, and when a touch operation is detected on or near the touch-sensitive surface 1031, the touch operation is transmitted to the processor 1080 for determining the type of the touch event, and the processor 1080 then provides a corresponding visual output on the display panel 1041 according to the type of the touch event. Touch-sensitive surface 1031 and display panel 1041 may be implemented as two separate components for input and output functions, although in some embodiments touch-sensitive surface 1031 may be integrated with display panel 1041 for input and output functions.
The client may also include at least one sensor 1050, such as a light sensor, motion sensor, and other sensors.
Audio circuitry 1060, speaker 1061, microphone 1062 may provide an audio interface between a user and the client.
WiFi belongs to short-range wireless transmission technology, and the client can help the user send and receive e-mails, browse web pages, access streaming media, etc. through the WiFi module 1070, which provides the user with wireless broadband internet access. Although fig. 10 shows the WiFi module 1070, it is understood that it does not belong to the above-described essential constitution of the client, and may be omitted entirely as needed within a range not changing the essence of the application.
The processor 1080 is a control center of the client, connects various parts of the entire client by using various interfaces and lines, and performs various functions of the client and processes data by running or executing software programs and/or modules stored in the memory 1020 and calling data stored in the memory 1020, thereby performing overall monitoring of the client. Optionally, processor 1080 may include one or more processing cores; preferably, the processor 1080 may integrate an application processor, which primarily handles operating systems, user interfaces, application programs, etc., and a modem processor, which primarily handles wireless communications. It is to be appreciated that the modem processor described above may not be integrated into processor 1080.
The client also includes a power source 1090 (e.g., a battery) for powering the various components, which may preferably be logically coupled to the processor 1080 via a power management system to manage charging, discharging, and power consumption management functions via the power management system. Power supply 1090 may also include any component including one or more DC or AC power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
Although not shown, the client may further include a camera, a bluetooth module, and the like, which are not described herein again. Specifically, in this embodiment, the display unit of the client is a touch screen display, the client further includes a memory, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the one or more processors to execute the instructions in the method embodiments of the present application.
Embodiments of the present application further provide a computer-readable storage medium, where the storage medium may be disposed in a server to store at least one instruction or at least one program for implementing a data tracking method according to the method embodiments, and the at least one instruction or the at least one program is loaded and executed by the processor to implement the data tracking method according to the method embodiments.
Alternatively, in this embodiment, the storage medium may be located in at least one network server of a plurality of network servers of a computer network. Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Embodiments of the present application also provide a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions, so that the computer device executes the method provided in the various alternative implementations described above.
As can be seen from the embodiments of the data tracking method, apparatus, device, storage medium, or computer program provided in the present application, the sharing authority information of the target application is extracted in response to the identification acquisition request of the target application for the object to be tracked, so as to determine the resource sharing area of the associated application of the target application based on the sharing authority information of the target application; the method is favorable for accurately positioning the accessible resource sharing area by combining the sharing authority information of the target application, and improves the safety and reliability of data tracking. Then, extracting target identification information from the resource sharing area of the associated application, and conveniently and quickly obtaining the target identification information; finally, data tracking is carried out based on the target identification information to obtain historical advertisement data; the target identification information is obtained in advance by the associated application and stored in the resource sharing area of the associated application, and the efficiency and the reliability of data tracking are improved. When the associated application detects the identifier update trigger information, the update identifier information is acquired, and the target identifier information in the resource sharing area of the associated application is updated according to the update identifier information, so that the target identifier information in the resource sharing area can be updated timely, and the reliability of data tracking is improved. The behavior analysis is carried out according to the historical advertisement data to obtain analysis result data, and the information push is carried out in the target application according to the analysis result data, so that the historical advertisement data is favorably utilized to push the advertisement information meeting the user requirements or interests for the user in a targeted mode, the user requirements are met, and meanwhile the accuracy of the information push is improved. When the resource sharing area of the associated application is determined to be empty, the identifier authorization request information of the target application is generated, and after the target identifier information is acquired in response to the identifier authorization permission instruction, the target identifier information can be stored in the resource sharing area of the target application, so that the acquired IDFA value is shared with the associated application of the target application, and the efficiency and the flexibility of data tracking are improved.
It should be noted that: the sequence of the embodiments of the present application is only for description, and does not represent the advantages and disadvantages of the embodiments. And specific embodiments thereof have been described above. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
All the embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the apparatus, device and storage medium embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference may be made to some descriptions of the method embodiments for relevant points.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (10)

1. A method for data tracking, the method comprising:
responding to an identification acquisition request of a target application to an object to be tracked, and extracting sharing permission information of the target application;
determining a resource sharing area of an associated application of the target application based on the sharing permission information of the target application;
extracting target identification information from the resource sharing area of the associated application;
performing data tracking based on the target identification information to obtain historical advertisement data;
the target identification information is obtained in advance by the associated application and stored in a resource sharing area of the associated application.
2. The method of claim 1, further comprising:
responding to the authority access triggering instruction of the associated application, and generating identification authorization request information of the associated application, wherein the identification authorization request information comprises shared authorization prompt information, and the shared authorization prompt information represents authorization prompt information for sharing the identification information among a plurality of applications;
responding to an identification authorization permission instruction, and acquiring the target identification information;
and storing the target identification information in a resource sharing area of the associated application.
3. The method of claim 2, wherein the identification authorization request message further includes an update authorization prompt message that characterizes an update to obtain the identification information and shares the authorization prompt message of the update among the plurality of applications, the method further comprising:
when the associated application detects the identifier updating trigger information, acquiring updating identifier information;
and updating the target identification information in the resource sharing area of the associated application according to the updated identification information.
4. The method of claim 1, further comprising:
before extracting target identification information from the resource sharing area of the associated application, detecting the storage condition of the resource sharing area of the associated application;
when the resource sharing area of the associated application is determined to be empty, generating identification authorization request information of the target application, wherein the identification authorization request information comprises shared authorization prompt information, and the shared authorization prompt information represents authorization prompt information for sharing the identification information among a plurality of applications;
responding to an identification authorization permission instruction, and acquiring the target identification information;
and storing the target identification information in a resource sharing area of the target application.
5. The method of claim 1, further comprising:
performing behavior analysis according to the historical advertisement data to obtain analysis result data;
and pushing information in the target application according to the analysis result data.
6. The method of claim 3, wherein when the associated application detects an identification update trigger, obtaining update identification information comprises:
monitoring the calling condition of the updating method according to the associated application;
when the associated application detects that the identification updating method is called, acquiring content information corresponding to the identification updating method;
and extracting the updating identification information from the corresponding content information.
7. The method of claim 2, wherein the obtaining the target identification information in response to the identification authorization permission instruction comprises:
responding to the identification authorization permission instruction, and acquiring original identification information;
and carrying out data encryption on the original identification information to obtain the target identification information.
8. A data tracking apparatus, the apparatus comprising:
the system comprises a sharing authority extraction module, a tracking module and a tracking module, wherein the sharing authority extraction module is used for responding to an identification acquisition request of a target application to an object to be tracked and extracting sharing authority information of the target application;
a resource sharing area determining module, configured to determine a resource sharing area of an application associated with the target application based on the sharing permission information of the target application;
the target identification information extraction module is used for extracting target identification information from the resource sharing area of the associated application;
the data tracking module is used for tracking data based on the target identification information to obtain historical advertisement data; the target identification information is obtained in advance by the associated application and stored in a resource sharing area of the associated application.
9. A data tracking device, characterized in that the device comprises a processor and a memory, in which at least one instruction or at least one program is stored, which is loaded and executed by the processor to implement the data tracking method according to any one of claims 1 to 7.
10. A computer-readable storage medium, wherein at least one instruction or at least one program is stored in the storage medium, and the at least one instruction or the at least one program is loaded and executed by a processor to implement the data tracking method according to any one of claims 1 to 7.
CN202110208459.0A 2021-02-24 2021-02-24 Data tracking method, device, equipment and storage medium Pending CN114971662A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110208459.0A CN114971662A (en) 2021-02-24 2021-02-24 Data tracking method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110208459.0A CN114971662A (en) 2021-02-24 2021-02-24 Data tracking method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114971662A true CN114971662A (en) 2022-08-30

Family

ID=82972818

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110208459.0A Pending CN114971662A (en) 2021-02-24 2021-02-24 Data tracking method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114971662A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117252558A (en) * 2023-11-17 2023-12-19 南京特沃斯清洁设备有限公司 Cleaning equipment management method and system based on face recognition

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117252558A (en) * 2023-11-17 2023-12-19 南京特沃斯清洁设备有限公司 Cleaning equipment management method and system based on face recognition
CN117252558B (en) * 2023-11-17 2024-01-19 南京特沃斯清洁设备有限公司 Cleaning equipment management method and system based on face recognition

Similar Documents

Publication Publication Date Title
KR102105636B1 (en) Installing application remotely
US10200413B1 (en) Selective regulation of information transmission from mobile applications to third-party privacy compliant target systems
US20170180944A1 (en) Adding location names using private frequent location data
US11762979B2 (en) Management of login information affected by a data breach
US9830139B2 (en) Application experience sharing system
US20150032714A1 (en) Method and system for searching for applications respective of a connectivity mode of a user device
CN104850434A (en) Method and apparatus for downloading multimedia resources
US20200228565A1 (en) Systems and methods for enhanced host classification
US20210312040A1 (en) Enhancing security using anomaly detection
CN106776917B (en) Method and device for acquiring resource file
CN107666515B (en) Image processing method and device, computer equipment, computer readable storage medium
CN111222153B (en) Application program authority management method and device and storage medium
US20200021554A1 (en) Automated Connection of Electronic Messaging and Social Networking Services Method and Apparatus
CN113034189A (en) Attribution method, attribution device, computer equipment and storage medium
WO2018210214A1 (en) Device positioning method and apparatus
WO2015065438A1 (en) Contextual content translation system
CN109145182B (en) Data acquisition method and device, computer equipment and system
CN114971662A (en) Data tracking method, device, equipment and storage medium
CN111666567A (en) Detection method, device, computer program and medium for malicious modification of application program
CN113468260B (en) Data analysis method and device, electronic equipment and storage medium
CN114648336A (en) Face payment method and device, electronic equipment and storage medium
CN110856173A (en) Network access method and device and electronic equipment
CN114363406B (en) Push message processing method, device, equipment and storage medium
CN112287373B (en) Data processing method, device, storage medium and network access point equipment
CN117056152B (en) Equipment detection method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination