CN116452262A - Information processing method and device, equipment and storage medium - Google Patents

Information processing method and device, equipment and storage medium Download PDF

Info

Publication number
CN116452262A
CN116452262A CN202210003159.3A CN202210003159A CN116452262A CN 116452262 A CN116452262 A CN 116452262A CN 202210003159 A CN202210003159 A CN 202210003159A CN 116452262 A CN116452262 A CN 116452262A
Authority
CN
China
Prior art keywords
container
information
target
target object
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210003159.3A
Other languages
Chinese (zh)
Inventor
贾牧
雍兴辉
包勇军
李凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Wodong Tianjun Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Wodong Tianjun Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Wodong Tianjun Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN202210003159.3A priority Critical patent/CN116452262A/en
Publication of CN116452262A publication Critical patent/CN116452262A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0255Targeted advertisements based on user history
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0269Targeted advertisements based on user profile or attribute
    • G06Q30/0271Personalized advertisement

Abstract

The application discloses an information processing method applied to first electronic equipment, comprising the following steps: acquiring attribute information of a target object; the attribute information is used as an input parameter of a group identifier generation rule to obtain a target group identifier; the target group identification is sent to a server, and the target group identification is used for determining a recommended object by the server; and receiving the recommended object sent by the server. The application also discloses a device, equipment and a storage medium for realizing the information processing method.

Description

Information processing method and device, equipment and storage medium
Technical Field
The embodiment of the application relates to the technical field of computers, and relates to an information processing method, an information processing device, information processing equipment and a storage medium.
Background
In the related art, for a user, an advertisement recommendation system records a user's behavior or tag by using a unique Identification (ID) bound to a terminal device, such as an international mobile equipment identification (International Mobile Equipment Identity, IMEI) or an advertiser identifier (Identifier for Advertising, IDFA), and targeted advertisement pushing is performed, so that the advertisement recommendation system can learn the user's behavior based on the ID. This approach violates the privacy of the user.
Disclosure of Invention
The embodiment of the application provides an information processing method, an information processing device, information processing equipment and an information storage medium for solving at least one problem existing in the related art, and information security can be improved.
The technical scheme of the embodiment of the application is realized as follows:
in a first aspect, an embodiment of the present application provides an information processing method, which is applied to a first electronic device, where the method includes:
acquiring attribute information of a target object;
the attribute information is used as an input parameter of a group identifier generation rule to obtain a target group identifier;
the target group identification is sent to a server, and the target group identification is used for determining a recommended object by the server;
and receiving the recommended object sent by the server.
In a second aspect, an embodiment of the present application provides an information processing apparatus, applied to a first electronic device, including:
the acquisition module is used for acquiring attribute information of the target object;
the generation module is used for taking the attribute information as an input parameter of a group identifier generation rule to obtain a target group identifier;
the sending module is used for sending the target group identification to a server, wherein the target group identification is used for determining a recommended object by the server;
And the receiving module is used for receiving the recommended object sent by the server.
In a third aspect, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements steps in an information processing method provided by the client or the server when the processor runs the computer program.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements steps in an information processing method provided by a client or a server as described above.
In an embodiment of the present application, an information processing method, an apparatus, a device, and a storage medium are provided, including: acquiring attribute information of a target object; the attribute information is used as an input parameter of a group identifier generation rule to obtain a target group identifier; the target group identification is sent to a server, and the target group identification is used for determining a recommended object by the server; and receiving the recommended object sent by the server, wherein the group identifier obtained by calculating the attribute information of the target object is sent to the server, so that the server determines the recommended object sent to the first electronic device based on the group identifier, and therefore confirmation of the recommended object is not needed through the attribute information of the user, the attribute information of the target object is prevented from being sent to the server, the attribute information of the target object is protected, and the information safety is improved.
Drawings
FIG. 1 is a schematic diagram of an alternative architecture of an information handling system according to an embodiment of the present application;
FIG. 2 is a schematic diagram of an alternative architecture of an information handling system according to an embodiment of the present application;
FIG. 3 is a schematic flowchart of an alternative information processing method according to an embodiment of the present disclosure;
fig. 4 is an alternative structural schematic diagram of a first electronic device provided in an embodiment of the present application;
FIG. 5 is a schematic diagram of an alternative architecture of an information handling system according to an embodiment of the present application;
FIG. 6 is a schematic diagram of an alternative architecture of an information handling system according to an embodiment of the present application;
FIG. 7 is a schematic diagram of an alternative architecture of an information handling system according to an embodiment of the present application;
fig. 8 is an alternative structural schematic diagram of an information processing apparatus provided in an embodiment of the present application;
fig. 9 is an alternative structural schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application more clear, the specific technical solutions of the present application will be described in further detail below with reference to the accompanying drawings in the embodiments of the present application. The following examples are illustrative of the present application, but are not intended to limit the scope of the present application.
Embodiments of the present application may provide an information processing method, system, and storage medium. In practical applications, the information processing method may be implemented by an information processing system, and each functional entity in the information processing system may be cooperatively implemented by a hardware resource of an electronic device (such as a terminal device or a server), a computing resource such as a processor, and a communication resource (such as for supporting communications in various manners such as implementing an optical cable and a cellular).
Here, some terms involved in the embodiments of the present application will be described.
1) A container, a program unit in an electronic device capable of presenting content to a user, such as: a browser, an application, etc., wherein the application may include: video playing programs, news browsing programs, shopping programs, instant messaging programs, etc., and in the embodiment of the present application, the type of the application program is not limited in any way.
2) A recommendation object, information content recommended to a container in an electronic device, may include: video, news, merchandise information, etc., can be presented to a user based on the container.
The information processing method of the embodiment of the present application is applicable to the information processing system 10 shown in fig. 1, and includes: a client 101 and a server 102, wherein a program capable of displaying pages, such as: a browser or Application (APP), and the client can determine attribute information of the target object based on the running program. The client 101 communicates with the server 102 via a network 103. Wherein the target object may be a user operating the client.
The client 101 can implement the following steps: acquiring attribute information of a target object; the attribute information is used as an input parameter of a group identifier generation rule to obtain a target group identifier; the target group identifier is sent to the server 102, and the target group identifier is used for the server 102 to determine a recommended object and receive the recommended object sent by the server 102.
Here, after receiving the target group identifier, the server 102 determines a recommendation object based on the target group identifier, and sends the recommendation object to the client 101. Wherein, the recommended object may include: commodity information, advertisement, news, application information, and the like.
In this embodiment, the client 101 is running on the first electronic device, and the server 102 is running on the server.
In one example, as shown in FIG. 2, information handling system 100 further includes: the rule storage 104 is configured to store the group identifier generation rule, where the rule storage 104 may actively push the group identifier generation rule to the client 101, or the client 101 may actively obtain the group identifier generation rule from the rule storage 104. Wherein the rule store 104 is implemented on the second electronic device.
In this embodiment of the present application, the first electronic device may be any electronic device with information processing capability, and in one embodiment, the electronic device may be an intelligent terminal, for example, a mobile terminal with wireless communication capability such as a notebook. In another embodiment, the electronic device may also be a terminal device with computing capabilities that is not portable, such as a desktop computer, server, or the like.
In combination with the information processing system shown in fig. 1 or fig. 2, the present embodiment proposes an information processing method, which can protect attribute information of a target object and improve information security.
Next, embodiments of an information processing method, apparatus, device, and storage medium provided in the embodiments of the present application are described with reference to an information processing system shown in fig. 1 or fig. 2.
The embodiment of the application provides an information processing method, and the functions achieved by the method can be achieved by calling program codes by a processor in electronic equipment, and the program codes can be stored in a computer storage medium.
Fig. 3 is a schematic implementation flow chart of an information processing method according to an embodiment of the present application, which is applied to a first electronic device, as shown in fig. 3, and the method may include the following steps:
s301, the first electronic device acquires attribute information of the target object.
Here, the target object may be an object that operates the first electronic device. The attribute information of the target object can be information characterizing the behavior preference of the user. The attribute information of the target object may include one or more of the following: the shared features shared for different containers, the interesting features for usage scenarios of one container, the access features based on user behavior recorded by the container. In this embodiment of the present application, the type of the attribute information of the target object included in the first device is not limited.
In this embodiment of the present invention, the first electronic device includes one or more containers, and the first electronic device may collect characteristics about the target object in each container in the first electronic device, and perform processes such as de-duplication and cleaning on the collected characteristics of each container to obtain attribute information of the target object.
In practical application, an information collection program is arranged in each container, and the first electronic device collects the characteristics about the target object in the corresponding container through the information collection program. The information gathering program may be run in the form of a plug-in the corresponding container.
The information gathering program may be integrated in a different container based on the manner of the software development kit (Software Development Kit, SDK) so that the information gathering program does not need to be repeatedly developed.
When the information collection function is not supported by a container, the information collection function of the container can be realized through the integration of the SDK.
An information protection program can be arranged in the first electronic device, the information protection program is provided with interfaces for interfacing different containers, and the characteristics of each container are collected based on the arranged interfaces.
In this embodiment of the present invention, the information protection program may set a collection setting interface, provide information collection setting of a container supported or operated in the first electronic device based on the interface, collect characteristics of the container when the information collection setting of the container is collection, and not collect the characteristics of the container when the information collection setting of the container is not collection.
In an example, a container supported by a first electronic device includes: and the information protection program sets the information collection settings of the container A, the container B and the container C to be collection, collection and non-collection respectively based on the collection setting interface, so that the information protection program only collects the characteristics of the container A and the container B and does not collect the characteristics of the container C.
S302, the first electronic device uses the attribute information as an input parameter of a group identifier generation rule to obtain a target group identifier.
After the first electronic device obtains the attribute information of the target object, the group identifier is determined through the obtained attribute information and the group identifier generation rule, and the group identifier is the group identifier of the target object, namely the target group identifier. The group identifier generation rule is a rule for determining a group identifier set based on attribute information of an object, and in the embodiment of the present application, specific content of the group identifier generation rule is not limited.
In one example, the attribute information of the target user includes: age, 20-40 years, sex: female, purchased goods: the milk powder, the target user group identification determined based on the attribute information of the user is: a congo child.
In the embodiment of the application, the group identifier generation rule in the first electronic device may include; a first sub-rule for shared features, a second sub-rule for features of interest, and a third sub-rule for access features. And determining that the sub-rule used by the target group identification comprises a sub-rule corresponding to the feature type in the attribute information of the target object.
In one example, the attribute information of the target object includes: sharing the feature and the interest feature, determining that the sub-rule used by the target group identification includes a first sub-rule and a second sub-rule.
In one example, the attribute information of the target object includes: sharing the characteristics and accessing the characteristics, determining that the sub-rules used by the target group identification include a first sub-rule and a third sub-rule.
In one example, the attribute information of the target object includes: sharing the feature, the interest feature, and the access feature, determining that the sub-rules used by the target group identification include a first sub-rule, a second sub-rule, and a third sub-rule.
In this embodiment of the present application, the group identifier generation rule in the first electronic device may be a local configuration rule, or may be acquired from the second electronic device. The second electronic device may periodically update the group identification generation rule in the first electronic device in case the group identification generation rule is acquired from the second electronic device, or may synchronously update the group identification generation rule in the first electronic device in case the local group identification generation rule is updated.
In the case where the first electronic device includes an information protection program, the group identification generation rule may be stored in the information protection program, and the information protection program determines the target group identification by attribute information of the target object and the group identification generation rule.
The information protection program may push the target group identifier to a container in the first electronic device when determining the target group identifier, or may return the target group identifier to the container that sent the group identifier acquisition request when receiving the group identifier acquisition request sent by the container. When a container has a need of displaying recommended objects, the sending of the group identifier acquisition request can be triggered, and the sending of the group identifier acquisition request can be triggered periodically.
S303, the first electronic device sends the target group identification to a server, and the target group identification is used for determining a recommended object by the server.
The first electronic device sends the target group identification to the server, so that the server determines a recommended object to the first electronic device based on the target group identification.
And when a container in the first electronic equipment has the requirement of displaying the recommended object, the target group identification is sent to the server. The container may further integrate an information recommendation program, where the information recommendation program obtains the target group identifier from the information protection program, and sends the target group identifier to the server. The information recommendation program may be run in the form of a plug-in the corresponding container. The information recommendation program can be integrated in different containers based on the SDK mode, so that the information recommendation program does not need to be repeatedly developed.
S304, the first electronic equipment receives the recommended object sent by the server.
And under the condition that the server receives the target group identification, determining a recommended object based on the target group identification, and sending the recommended object to the first electronic equipment. The first electronic device receives the recommended object.
For different first electronic devices, when the sent group identifications are the same, the server sends the same recommended object to the first electronic devices with the same sent group identifications, so that the first electronic devices with the same group identifications can receive the same recommended object.
In the embodiment of the application, the recommended object may be advertisement, video, news and other contents. The embodiment of the application does not limit the type of the recommended object in any way.
In the embodiment of the application, a first electronic device acquires attribute information of a target object; the attribute information is used as an input parameter of a group identifier generation rule to obtain a target group identifier; the target group identification is sent to a server, and the target group identification is used for determining a recommended object by the server; and receiving the recommended object sent by the server, wherein the group identifier obtained by calculating the attribute information of the target object is sent to the server, so that the server determines the recommended object sent to the first electronic device based on the group identifier, and therefore confirmation of the recommended object is not needed through the attribute information of the user, the attribute information of the target object is prevented from being sent to the server, the attribute information of the target object is protected, and the information safety is improved.
In addition, in the embodiment of the application, the first electronic device determines the target group identifier locally through the attribute information of the target object, so that the attribute information of the target object cannot leave the first electronic device, leakage of the attribute information of the target object is further avoided, and information safety is improved.
In some embodiments, as shown in fig. 4, the first electronic device 40 comprises: at least one container 401 and an information protection program 402. The container 401 is a separate program such as a browser, an application program, or the like capable of providing pages. The information protection program 402 is a container-independent program capable of interacting information with each container 401 of the at least one container 401.
The manner in which the information protection program interacts with the container includes:
mode 1, an information protection program and a container communicate locally to a first electronic device.
Mode 2, the information protection program communicates with the container through a third party information transfer service outside the first electronic device.
In the embodiment of the present application, the information protection program may be implemented as an application program of a software layer, and may also be implemented as a component in an operating system.
In some embodiments, attribute information of the target object is obtained by the information protection program 402 based on the first electronic device shown in fig. 4; the target group identification is obtained by using the attribute information as an input parameter of an identification generation rule through an information protection program 402; under the condition that a target container meets information recommendation conditions, acquiring the target group identifier from the information protection program, and sending the target group identifier to a server; the target container is a container 401 in at least one container 401 included in the first electronic device; and receiving the recommended object sent by the server through the target container.
In the process that the container sends the behavior data to the information protection program, the container can verify the identity of the information protection program, the information protection program can verify the identity of the volume, so that the interactive container and the information protection program can be guaranteed to receive illegal attack behaviors, and the behavior data can be sent in an encrypted communication mode, so that the transmitted behavior data is intercepted or stolen.
After the information protection program obtains the attribute information of the target object, the attribute information of the target object is stored in an encrypted mode, so that the risk of leakage of the attribute information of the target object is reduced, and the information safety is improved.
In some embodiments, S301 obtains an implementation of the attribute information of the target object, including at least one of:
obtaining a sharing characteristic of the target object, wherein the sharing characteristic is a characteristic shared by at least one container included in the first electronic device;
acquiring interest characteristics of each container in at least one container corresponding to the target object; the interest feature reflects preferences of the corresponding container definition;
and obtaining the access characteristic of each container in at least one container corresponding to the target object.
Here, the acquired attribute information of the target object includes one of: shared features, interesting features for one container, access features for one container. The sharing feature may include: sex, age, occupation, etc. The features of interest may include: preferred video types for video viewing scenes of a video playback program, preferred news types for news browsing scenes of a news browsing program, shopping preference types for shopping scenes of a shopping program, and the like. The access features may include: user behaviors such as video viewing history, video browsing history, video searching history and the like based on the video playing program, user behaviors such as news browsing history, news collection history, news searching history and the like based on the news browsing program record, consumption record based on the shopping program, commodity browsing record, commodity purchasing record, commodity searching record, store attention record and the like.
In the embodiment of the present application, the features included in the user attribute and the content of each feature are not limited in any way.
In some embodiments, before obtaining the access characteristic of the target object for each of the at least one container, the method further comprises:
Recording behavior data of the target object on each container in at least one container;
and for each container in the at least one container, aggregating behavior data recorded on the container to obtain the access characteristic of the target object corresponding to the container.
Here, aggregation is an operation of integrating behavior data of a plurality of containers together and performing characterization based on the integrated behavior data of the user, and converting the behavior data of the user into an access feature characterizing the distinction of the operation behavior of the current user from the operation behaviors of other users. In one example, the behavior data of the user includes: the behavior data of the advertisement clicked by the user, and the aggregated access characteristic is the click rate of the user for the advertisement.
In some embodiments, based on the first electronic device shown in fig. 4, for each of the at least one container, behavioral data of the target object on the container is recorded by the container; and for each container in the at least one container, aggregating behavior data recorded on the container through an information protection program to obtain the access characteristic of the target object corresponding to the container.
Here, each container records own behavior data, and transmits the recorded behavior data to the information protection program, so that the information protection program integrates the behavior data of the plurality of containers, and determines access characteristics of the target object based on the integrated behavior data.
In an example, a container in a first electronic device includes: the information protection program obtains behavior data A from the information collection program A in the container A, obtains behavior data B from the information collection program B in the container B, obtains behavior data C from the information collection program C in the container C, and determines access characteristics of the target object based on the behavior data A, the behavior data B and the behavior data C.
In some embodiments, before recording the behavior data of the target object on each of at least one container, the information processing method provided in the embodiments of the present application further includes:
for a first container of the at least one container, providing a first setting page for the first container through the first container, the first setting page being provided with a first record control interface; the first record control interface is used for receiving first information indicating that recording is allowed and second information not allowing recording;
Receiving a first operation of a target object through the first recording control interface; wherein, in case the first operation indicates first information, behavior data of the target object on each of the at least one container is recorded.
In the embodiment of the application, the container can be provided with a presentation record control interface so as to set the authority of the information protection program through the record control interface. The information received by the container based on the recording control interface may include first information and second information, and characterizing the container allows recording of behavioral data of the user when the information received by the recording control interface is the first information. When the information received by the recording control interface is the first information, the container is characterized to not allow the behavior data of the user to be recorded.
For a container, the information protection program may collect features of the container when the information protection program is allowed to collect information, and the information protection program may not collect features of the container when the information protection program is not allowed to collect information.
And under the condition that the first operation indicates the second information, the behavior data of the target object on each container in at least one container is not recorded, so that the behavior data is recorded based on the selection of a user, and the control of the user on the behavior data recording is introduced.
In some embodiments, based on the information processing system shown in fig. 2, the information processing method provided in the embodiments of the present application further includes:
and receiving the group identification generation rule sent by the second electronic device to at least one target device, wherein the at least one target device comprises the first electronic device.
In the embodiment of the invention, the group identifier generating rule in the second electronic device can be aimed at a plurality of electronic devices comprising the first electronic device, so that different electronic devices can use the same group identifier generating rule to calculate the group identifier, and the plurality of electronic devices use a common user group generating rule, thereby ensuring that the user group numbers calculated by all the terminal devices are consistent, and facilitating the server to recommend the recommended object.
Here, the second electronic device can provide group identification generation rules to the plurality of first electronic devices, so that different first electronic devices can determine the same group identification based on the same group identification generation rules, where the first electronic devices with the same group identification can be regarded as group members constituting one user group, wherein one group member in one user group may not be aware of the existence of other group members.
Here, when the group identification generation rule in the second electronic device is updated, the group identification generation rule may be transmitted to all the target devices so that the group identification generation rules in different target devices are synchronized.
The information processing method provided in the embodiment of the present application will be further described below by taking a recommended object as an advertisement as an example.
The information processing method provided by the embodiment of the application can be applied to an information processing system, and the information processing system comprises the following steps: one or more terminal devices and a user group generation rule management system.
In an example, as shown in fig. 5, the information processing system includes a terminal device 501 (terminal device 501-1, terminal device 501-2, and terminal device 501-3) and a user group generation rule management system 502.
The terminal device 501 is a device that receives a user operation, and a container capable of receiving a user operation, such as a browser, an application APP, or the like, can be run in the terminal device.
As shown in fig. 5, a plurality of APPs 5011 and one identity protection unit 5012 (corresponding information protection program) are operated in the terminal device 501, and an information collection unit 5111 (corresponding information collection program) and an advertisement delivery unit 5112 (corresponding information recommendation program) are respectively built in each APP 5011. The information collection unit 5111, the advertisement delivery unit 5112, and the identity protection unit 5012 exchange data. The identity protection unit 5012 collects information available for advertisement delivery, such as browsing records of users, application preferences, and the like, through the information collection unit 5111 of each app 5011.
The user group generation rules management system 502 is a user group rules management system operated by one or more third parties, and pushes user group generation rules to all terminal devices periodically (e.g., daily). The user group generation rule can be established based on a public user tag system, an APP tag system, a context system and the like, wherein the public user tag is the same user tag for different APPs, such as gender, age, occupation and the like; the App label is related to the current App scene and is generally defined by App, such as shopping frequency high users, favorite mother and infant products and the like; the context system, i.e. the behavior tags, are related to the user's operation history, such as shopping with merchandise, regular shopping, etc.
The identity protection unit 5012 periodically updates the user group number of the current device according to the received user group generation rule.
The advertisement putting unit 5112 in App5011 applies for querying the user group number of the current terminal device to the identity protection unit 5012 when the advertisement needs to be put.
The identity protection unit 5012 returns the user group number of the current device to the advertisement putting unit 5112. The advertisement putting unit 5112 performs advertisement putting according to the user group number of the current device.
In the embodiment of the application, privacy information (behavior, attribute, identity and the like) of a user is transferred to an identity protection module in a terminal device through an information collection unit in an App, and is locally operated according to a user group generation management system of a user group generation rule management system, so as to obtain a user group number.
In the embodiment of the application, the identity protection module in the APP can aggregate the key accesses of the user, obtain the access characteristics of the user in the APP and encrypt and store the access characteristics. The key access is an access behavior capable of identifying the user, and the access characteristic can be obtained by labeling the behavior of the user through the behavior. The operation of the aggregation for characterizing the access behaviors of the users, such as the click rate of certain advertisements, is that the users click on the advertisements, and the aggregated access is the click rate of the users on the advertisements and does not contain the behavior information of single click. The access feature is a behavior tag that is given to the user.
The user group generation rule management system accesses key access characteristics stored in the APP at a regular, safe and reliable localization interface, and enables the user group generation rule to calculate the user group number of the APP in the equipment and push the user group number to the APP;
It should be noted that, the user group generation rule is downloaded through a network, but all the calculation work is local to the device;
the user group number is a unified ID of a crowd-sourced, by which a group of people can be located, but not a person. The generated expression of the user group number may be identified as F (public user tag, APP tag, access feature).
In this embodiment, the container integrates an information collection unit and an advertising unit, which may be provided in the form of one sdk, and thus integrated in the App.
The identity protection module may be an app or a component integrated in the mobile terminal operating system. A secure communication connection may be established between the app and the identity protection module. One possible way of communication connection between app601 and identity protection unit 602, as shown in fig. 6, is local communication inside the mobile terminal; there is also a possible way, as shown in fig. 7, that there is a secure and reliable third party information transfer service 603 that can provide a communication transfer service to solve the limitation of the mobile terminal to interaction between different apps in some scenarios.
The information collecting unit can collect attribute information, such as information of a user, behaviors, and the like, available for advertisement delivery, which is hereinafter referred to as personal behavior information. Such attribute information includes privacy information of the current user. To ensure the privacy security of the user, the privacy information of the user cannot leave the current terminal device.
The information collection unit sends the personal behavior information of the user to the identity protection module through a communication link with the identity protection module.
Optionally, an application program interface (Application Programming Interface, API) for receiving information by the identity protection module needs to use security means such as identity authentication, encrypted communication, etc. to ensure safe and reliable service.
Optionally, a switch may be added to the App to control whether information is provided to the identity protection module. The user may choose not to send personal behavior information to the "identity protection module" to implement functionality that cannot be tracked by advertisements.
Optionally, the information between the information collecting unit and the identity protection module may be pushed to the identity protection module by the information collecting unit, or the identity protection module may request from the information collecting unit.
The identity protection module operates locally at the terminal device, so that the protected privacy information does not go out of the terminal device. The identity protection module calculates and obtains the user group number of the current user through the personal behavior information of the user collected from different apps. The generation of the user group number depends on a calculation algorithm used by a user group generation rule, namely, the rule, and input parameters required by the calculation algorithm can be fixed in an identity protection module or can be calculation rules obtained from a user group generation rule management system.
The user group number generated by the identity protection module is changed periodically, such as for 2 days, or in real time. The reason for the change is that there is continuous personal behavior information transmitted from the app end, and there is also a possibility that the calculation rule obtained from the user group generation rule management system is changed.
The user group number generated by the identity protection module can be provided to the app as the id of the advertisement placement.
Optionally, the implementation of the identity protection module includes one of the following schemes:
the first scheme and the identity protection module are one app built in the terminal equipment.
The second scheme is that the identity protection module is used as an operating system module and is built in the operating system of the terminal to provide service of the operating system layer.
The user group generation rule management system is a publicly operated system. The user group generation rule in the user group generation rule management system can be an organization established by a national or industry management organization, or can be a unified calculation rule formulated by a terminal manufacturer or a complex formed by a plurality of terminal manufacturers. All the identity protection modules can adopt the same calculation rule, and the terminals with the same user group number can be identified as one user group. Subsequent advertising may be based on a uniform user group number.
In the embodiment of the application, the number of supportable devices is small when the user group generation rule management system is implemented by one terminal manufacturer or a plurality of manufacturer alliances. The more terminal manufacturers the user group generation rule management system aims at, the more terminal devices the user group generation rule management system adapts to, the more terminal devices the user group generation rule management system can be accessed to, the more accurate the calculation of the user group is, and the more accurate advertisement delivery is facilitated.
Optionally, the information processing system may not include a user group generation rule management system, and at this time, the identity protection module calculates the user group number according to an internal preset user group number generation rule.
The advertisement putting unit is used for applying for the user group number of the current terminal equipment from the identity protection module when a new advertisement putting opportunity exists in the app. The identity protection module returns the current user group number to the advertisement putting unit. The App then obtains an ID of the advertisement reflecting its behavior, preferences, of the current terminal device, on the basis of which subsequent advertising can take place.
The information processing method provided by the embodiment of the application has the following technical effects:
1. advertisement delivery is carried out based on the user group number instead of IMEI/IDFA of the terminal equipment, so that the privacy of the user is protected. The IMEI/IDFA is tied to the current terminal device so that the advertiser can know explicitly who the current user is. And the user group number identifies an aggregated group of users and cannot be assigned to a specific user by the user group number.
2. The terminal device processes the personal behavior information of the user by using the identity protection module. User information of all apps under the current device is aggregated.
3. The terminal device uses the identity protection module to calculate the user group number. The whole calculation process of the user group number uses the personal behavior information of the current equipment, and the calculation process does not leave the terminal equipment, so that the privacy information is prevented from being leaked.
4. The information processing system uses a public user group generation rule management system to unify all the calculation rules of the identity protection modules, so that the user group numbers obtained by calculation of all the terminal equipment are ensured to be consistent, and the advertisement delivery system is convenient for advertisement delivery.
Fig. 8 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application, which is applied to a first electronic device, as shown in fig. 8, an information processing apparatus 800 includes:
an obtaining module 801, configured to obtain attribute information of a target object;
a generating module 802, configured to obtain a target group identifier by using the attribute information as an input parameter of a group identifier generating rule;
a sending module 803, configured to send the target group identifier to a server, where the target group identifier is used by the server to determine a recommendation object;
and the receiving module 804 is configured to receive the recommended object sent by the server.
In some embodiments, the obtaining module 801 is further configured to:
acquiring attribute information of a target object through an information protection program;
the attribute information is used as an input parameter of an identification generation rule through an information protection program to obtain the target group identification;
under the condition that a target container meets information recommendation conditions, acquiring the target group identifier from the information protection program, and sending the target group identifier to a server; the target container is one container of at least one container included in the first electronic device;
And receiving the recommended object sent by the server through the target container.
In some embodiments, the obtaining module 801 is further configured to at least one of:
obtaining a sharing characteristic of the target object, wherein at least one container shares the sharing characteristic;
acquiring interest characteristics of each container in at least one container corresponding to the target object; the interest feature reflects preferences of the corresponding container definition;
and obtaining the access characteristic of each container in at least one container corresponding to the target object.
In some embodiments, the apparatus 800 further comprises: a recording module for:
before access characteristics of the target object corresponding to each container in at least one container are acquired, behavior data of the target object on each container in at least one container are recorded;
and for each container in the at least one container, aggregating behavior data recorded on the container to obtain the access characteristic of the target object corresponding to the container.
In some embodiments, the apparatus 800 further comprises: recording module, still be used for:
for each of the at least one container, recording, by the container, behavioral data of the target object on the container;
And for each container in the at least one container, aggregating behavior data recorded on the container through an information protection program to obtain the access characteristic of the target object corresponding to the container.
In some embodiments, the apparatus 800 further comprises: a control module for:
for a first container of the at least one container, providing a first setting page for the first container through the first container, the first setting page being provided with a first record control interface; the first record control interface is used for receiving first information indicating that recording is allowed and second information not allowing recording;
receiving a first operation of a target object through the first recording control interface; wherein, in case the first operation indicates first information, behavior data of the target object on each of the at least one container is recorded.
In some embodiments, the apparatus 800 further comprises: a rule module for:
and receiving the group identification generation rule sent by the second electronic device to at least one target device, wherein the at least one target device comprises the first electronic device.
The description of the apparatus embodiments above is similar to that of the method embodiments above, with similar advantageous effects as the method embodiments. For technical details not disclosed in the system embodiments of the present application, please refer to the description of the method embodiments of the present application for understanding.
In the embodiment of the present application, if the above-described information processing method is implemented in the form of a software functional module, and sold or used as a separate product, it may also be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributing to the related art, and the computer software product may be stored in a storage medium, and include several instructions to cause a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read Only Memory (ROM), a magnetic disk, an optical disk, or other various media capable of storing program codes. Thus, embodiments of the present application are not limited to any specific combination of hardware and software.
The embodiment of the application also provides electronic equipment, which comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the steps in the information processing method of the server are realized when the processor runs the computer program.
Correspondingly, the embodiment of the application provides a storage medium, namely a computer readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the information processing method provided by the service end in the embodiment is implemented.
It should be noted here that: the description of the storage medium embodiments above is similar to that of the method embodiments described above, with similar advantageous effects as the method embodiments. For technical details not disclosed in the storage medium embodiments of the present application, please refer to the description of the method embodiments of the present application for understanding.
It should be noted that fig. 9 is a schematic diagram of a hardware entity of the electronic device (server side), as shown in fig. 9, where the electronic device 900 includes: a processor 901, at least one communication bus 902, at least one external communication interface 904, and memory 905. Wherein the communication bus 902 is configured to enable coupled communication between the components. In an example, the electronic device 900 further includes: the user interface 903, where the user interface 903 may include a display screen and the external communication interface 904 may include standard wired and wireless interfaces.
The memory 905 is configured to store instructions and applications executable by the processor 901, and may also cache data (e.g., image data, audio data, voice communication data, and video communication data) to be processed or processed by each module in the processor 901 and the electronic device, and may be implemented by a FLASH memory (FLASH) or a random access memory (Random Access Memory, RAM).
It should be appreciated that reference throughout this specification to "one embodiment" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present application. Thus, the appearances of the phrases "in one embodiment" or "in some embodiments" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, the particular features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. It should be understood that, in various embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic thereof, and should not constitute any limitation on the implementation process of the embodiments of the present application. The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the several embodiments provided in this application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above described device embodiments are only illustrative, e.g. the division of the units is only one logical function division, and there may be other divisions in practice, such as: multiple units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. In addition, the various components shown or discussed may be coupled or directly coupled or communicatively coupled to each other via some interface, whether indirectly coupled or communicatively coupled to devices or units, whether electrically, mechanically, or otherwise.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units; can be located in one place or distributed to a plurality of network units; some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may be separately used as one unit, or two or more units may be integrated in one unit; the integrated units may be implemented in hardware or in hardware plus software functional units.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware related to program instructions, and the foregoing program may be stored in a computer readable storage medium, where the program, when executed, performs steps including the above method embodiments; and the aforementioned storage medium includes: various media capable of storing program codes, such as a removable storage device, a ROM, a magnetic disk, or an optical disk.
Alternatively, the integrated units described above may be stored in a computer readable storage medium if implemented in the form of software functional modules and sold or used as a stand-alone product. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributing to the related art, and the computer software product may be stored in a storage medium, and include several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a removable storage device, a ROM, a magnetic disk, or an optical disk.
The foregoing is merely an embodiment of the present application, but the protection scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered in the protection scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. An information processing method applied to a first electronic device, the method comprising:
acquiring attribute information of a target object;
the attribute information is used as an input parameter of a group identifier generation rule to obtain a target group identifier;
the target group identification is sent to a server, and the target group identification is used for determining a recommended object by the server;
and receiving the recommended object sent by the server.
2. The method of claim 1, wherein the step of determining the position of the substrate comprises,
acquiring attribute information of a target object through an information protection program;
the attribute information is used as an input parameter of an identification generation rule through an information protection program to obtain the target group identification;
under the condition that a target container meets information recommendation conditions, acquiring the target group identifier from the information protection program, and sending the target group identifier to a server; the target container is one container of at least one container included in the first electronic device;
and receiving the recommended object sent by the server through the target container.
3. The method of claim 1, wherein the obtaining attribute information of the target object includes at least one of:
Obtaining a sharing characteristic of the target object, wherein the sharing characteristic is a characteristic shared by at least one container included in the first electronic device;
acquiring interest characteristics of each container in at least one container corresponding to the target object; the interest feature reflects preferences of the corresponding container definition;
and obtaining the access characteristic of each container in at least one container corresponding to the target object.
4. A method according to claim 3, wherein prior to obtaining access characteristics of the target object for each of the at least one container, the method further comprises:
recording behavior data of the target object on each container in at least one container;
and for each container in the at least one container, aggregating behavior data recorded on the container to obtain the access characteristic of the target object corresponding to the container.
5. The method of claim 4, wherein the step of determining the position of the first electrode is performed,
for each of the at least one container, recording, by the container, behavioral data of the target object on the container;
and for each container in the at least one container, aggregating behavior data recorded on the container through an information protection program to obtain the access characteristic of the target object corresponding to the container.
6. The method according to claim 4, wherein the method further comprises:
for a first container of the at least one container, providing a first setting page for the first container through the first container, the first setting page being provided with a first record control interface; the first record control interface is used for receiving first information indicating that recording is allowed and second information not allowing recording;
receiving a first operation of a target object through the first recording control interface; wherein, in case the first operation indicates first information, behavior data of the target object on each of the at least one container is recorded.
7. The method according to claim 1, wherein the method further comprises:
and receiving the group identification generation rule sent by the second electronic device to at least one target device, wherein the at least one target device comprises the first electronic device.
8. An information processing apparatus, characterized by being applied to a first electronic device, comprising:
the acquisition module is used for acquiring attribute information of the target object;
the generation module is used for taking the attribute information as an input parameter of a group identifier generation rule to obtain a target group identifier;
The sending module is used for sending the target group identification to a server, wherein the target group identification is used for determining a recommended object by the server;
and the receiving module is used for receiving the recommended object sent by the server.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the information processing method according to any of claims 1 to 7 when the computer program is run by the processor.
10. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the information processing method of any one of claims 1 to 7.
CN202210003159.3A 2022-01-04 2022-01-04 Information processing method and device, equipment and storage medium Pending CN116452262A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210003159.3A CN116452262A (en) 2022-01-04 2022-01-04 Information processing method and device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210003159.3A CN116452262A (en) 2022-01-04 2022-01-04 Information processing method and device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116452262A true CN116452262A (en) 2023-07-18

Family

ID=87120657

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210003159.3A Pending CN116452262A (en) 2022-01-04 2022-01-04 Information processing method and device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116452262A (en)

Similar Documents

Publication Publication Date Title
US11049193B1 (en) Selection of advertisements based on social networking system login status
CN102624890B (en) Method for supplying individual webpage content to user terminal of mobile phone and logo system
US10692115B2 (en) Systems and methods for protecting internet advertising data
CN106471539A (en) System and method for obscuring audience measurement
CN108596690B (en) Advertisement processing method and device
CN103620585A (en) Virtual identity manager
CN102077182A (en) Data collection and targeted advertising systems and methods
US11470057B2 (en) Systems and methods for protecting internet advertising data
JP2016505941A (en) Targeted information items in mobile applications
US11601551B2 (en) Methods and systems for providing rich interactive communication services on an electronic device
JP6263547B2 (en) Third-party communication to social networking system users using user descriptors
CN108196902A (en) For showing the method and apparatus for advertisement of spreading its tail
CA2892126C (en) Generating metrics based on client device ownership
JP2014241025A (en) Information processing apparatus, information processing method, program, and information processing system
CN116452262A (en) Information processing method and device, equipment and storage medium
CN106716401A (en) Data interaction processing method, device and system
CN113422826A (en) Information pushing method and device
KR20130126559A (en) System and method for providing purchasing information
CN104144111B (en) Social networks application obtains the method and system of user related information
JP5111330B2 (en) Personal information analyzing apparatus, personal information analyzing method and program
CN113569264A (en) Data security processing method and device and electronic equipment
CN115687748A (en) Message recommendation method and device, electronic equipment and medium
US20160140617A1 (en) Mobile information and advertising system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination