CN117573951B - Target user screening method, device, medium and equipment - Google Patents

Target user screening method, device, medium and equipment Download PDF

Info

Publication number
CN117573951B
CN117573951B CN202410057424.5A CN202410057424A CN117573951B CN 117573951 B CN117573951 B CN 117573951B CN 202410057424 A CN202410057424 A CN 202410057424A CN 117573951 B CN117573951 B CN 117573951B
Authority
CN
China
Prior art keywords
target
wifi
candidate
users
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202410057424.5A
Other languages
Chinese (zh)
Other versions
CN117573951A (en
Inventor
董霖
方宏源
宋彤彤
段永康
李峤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Merit Interactive Co Ltd
Original Assignee
Merit Interactive Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Merit Interactive Co Ltd filed Critical Merit Interactive Co Ltd
Priority to CN202410057424.5A priority Critical patent/CN117573951B/en
Publication of CN117573951A publication Critical patent/CN117573951A/en
Application granted granted Critical
Publication of CN117573951B publication Critical patent/CN117573951B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/9035Filtering based on additional data, e.g. user or group profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The invention relates to the field of data processing, in particular to a target user screening method, a device, a medium and equipment, comprising the following steps: according to the wifi interaction set, a first type of key users are screened, a first type of target IP is screened according to an IP list corresponding to the first type of key users, a second type of key users are screened according to a user list corresponding to the first type of target IP, an N type of target IP is screened according to an IP list corresponding to the N type of key users, an N+1 type of key users are screened according to a user list corresponding to the N type of target IP, when the number of the N+1 type of key users is equal to the number of the N type of key users, the N+1 type of key users are determined to be target users, and the screening accuracy of the key users and the target IP is improved through multiple correlations between the target IP and the key users, multiple expansions of the target IP and the key users are completed, so that the screening accuracy of the target users is improved.

Description

Target user screening method, device, medium and equipment
Technical Field
The present invention relates to the field of data processing, and in particular, to a method, an apparatus, a medium, and a device for screening a target user.
Background
With the popularization of intelligent equipment and the rapid development of networks, the daily work and daily life of staff of a company are closely related to the intelligent equipment and the networks, so that the association relationship between staff and networks and between staff and staff can be analyzed depending on the network information connected with the staff in screening staff man-hour, thereby screening staff belonging to a corresponding company.
The user screening method at the present stage can obtain an employee organization relation graph according to the working conditions and organization relations of a plurality of employees, and inquire candidate employees meeting the conditions in the employee organization relation graph as target employees, but because the employee information of a company is always in the dynamic change process and one employee node in the employee organization graph can influence a plurality of or all employee nodes, in order to improve the screening accuracy of the target employees, the employee organization relation graph generated in the method needs to be updated in real time along with the change of the employee information, and a great deal of time and calculation resources are consumed, so that the screening accuracy of the target employees is lower when the employee screening is carried out in low-cost requirements.
Therefore, how to improve screening accuracy of target staff in low cost requirements is a problem to be solved.
Disclosure of Invention
Aiming at the technical problems, the technical scheme adopted by the invention is a target user screening method, which comprises the following steps:
and acquiring first candidate users corresponding to the target object and wifi interaction sets corresponding to each first candidate user.
And screening and obtaining first-class key users corresponding to the target object from all the first candidate users according to the wifi interaction set.
The method comprises the steps of obtaining an IP list corresponding to each first type key user and a user list corresponding to each candidate IP, wherein the IP list comprises a plurality of candidate IPs corresponding to each first type key user, and the user list comprises a plurality of second candidate users corresponding to each candidate IP.
And screening the first type target IP corresponding to the target object from all the candidate IPs according to the IP lists corresponding to all the first type key users.
And screening and obtaining second-type key users corresponding to the target objects from all second candidate users according to the user list corresponding to all first-type target IPs, wherein the number of the second-type key users is greater than or equal to that of the first-type key users.
And screening and obtaining N-type target IPs corresponding to the target objects from all candidate IPs according to IP lists corresponding to all N-type key users, wherein the number of the N-type target IPs is greater than or equal to that of the N-1-th type target IPs, N is an integer greater than 1, and when N=2, the N-type key users are consistent with the second-type key users.
And screening and obtaining N+1th type key users corresponding to the target object from all second candidate users according to user lists corresponding to all N type target IPs, wherein the number of the N+1th type key users is greater than or equal to that of the N type key users.
And when the number of the N+1th class key users is equal to the number of the N class key users, determining the N+1th class key users as target users.
The invention also provides a target user screening device, which comprises:
the first data acquisition module is used for acquiring first candidate users corresponding to the target object and wifi interaction sets corresponding to each first candidate user.
And the first key user screening module is used for screening and obtaining first key users corresponding to the target object from all first candidate users according to the wifi interaction set.
The second data acquisition module is used for acquiring an IP list corresponding to each first type key user and a user list corresponding to each candidate IP, wherein the IP list comprises a plurality of candidate IPs corresponding to each first type key user, and the user list comprises a plurality of second candidate users corresponding to each candidate IP.
And the first target IP screening module is used for screening the first type target IP corresponding to the target object from all the candidate IPs according to the IP lists corresponding to all the first type key users.
And the second key user screening module is used for screening and obtaining second type key users corresponding to the target objects from all second candidate users according to the user lists corresponding to all first type target IPs, wherein the number of the second type key users is greater than or equal to that of the first type key users.
And the second target IP screening module is used for screening the N type target IP corresponding to the target object from all the candidate IPs according to the IP lists corresponding to all the N type key users, wherein the number of the N type target IPs is greater than or equal to the number of the N-1 type target IPs, N is an integer greater than 1, and when N=2, the N type key users are consistent with the second type key users.
And the third key user screening module is used for screening and obtaining the N+1th type key users corresponding to the target objects from all second candidate users according to the user list corresponding to all N type target IPs, wherein the number of the N+1th type key users is greater than or equal to that of the N type key users.
And the first target user screening module is used for determining the N+1th type key user as a target user when the number of the N+1th type key users is equal to the number of the N type key users.
The present invention also provides a non-transitory computer readable storage medium having at least one instruction or at least one program stored therein, the at least one instruction or the at least one program loaded and executed by a processor to implement the above-described target user screening method.
The invention also provides an electronic device comprising a processor and the non-transitory computer readable storage medium described above.
The invention has at least the following beneficial effects: according to the wifi interaction set, screening and obtaining first type key users corresponding to the target objects from all first candidate users, screening and obtaining first type target IPs corresponding to the target objects from all candidate IPs according to IP lists corresponding to all first type key users, screening and obtaining second type key users corresponding to the target objects from all second candidate users according to user lists corresponding to all first type target IPs, and taking the second type key users as bases for further updating the target IPs and further updating the key users, so that screening accuracy of the key users and the target IPs is improved; according to the IP lists corresponding to all N-th key users, N-th target IP corresponding to the target object is obtained through screening from all candidate IPs, and according to the user lists corresponding to all N-th target IPs, N+1-th key users corresponding to the target object are obtained through screening from all second candidate users, and the N+1-th key users are used as the basis for further updating the target IP and further updating the key users, so that the screening accuracy of the key users and the target IP is further improved, and the expansion of the target IP and the key users is completed again; when the number of the N+1st type key users is equal to the number of the N type key users, the N+1st type key users are determined to be target users, and when the number of the key users reaches the upper limit, the corresponding target users are obtained, so that the screening accuracy of the target users is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a flowchart of a target user screening method according to a first embodiment of the present invention;
fig. 2 is a flowchart of a target wifi screening method according to a second embodiment of the present invention;
fig. 3 is a flowchart of a target object screening method according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a target user screening apparatus according to a fourth embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to fall within the scope of the invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
The first embodiment provides a target user screening method, which includes the following steps, as shown in fig. 1:
s1, obtaining first candidate users corresponding to target objects and wifi interaction sets corresponding to the first candidate users.
The target object may be an object with a certain number of employees, such as a company, an enterprise, a studio, a factory, etc. which need to perform employee screening; the wifi interaction set can comprise a plurality of target wifi, wherein the target wifi refers to wifi which is used by a target object, and each target wifi uniquely corresponds to the target object; the first candidate user may be a user having an interaction behavior with a target wifi corresponding to a target object, the interaction behavior may be a scanning behavior or a connection behavior, and the target user screening method is used for screening staff corresponding to the target object from the first candidate user and taking the staff as the target user.
For each wifi, the user may scan for the wifi within a certain range, so the first candidate user to scan for the target wifi may be an employee of the target object, may be an employee of other objects near the target object, or may be other users near the geographic location past the target object; meanwhile, each employee of the target object can scan and connect to the target wifi, and can scan but not connect to the target wifi.
The screening of the target user in the target object cannot be accurately completed according to the scanning interaction behavior between the first candidate user and the target wifi alone or according to the connection interaction behavior between the first candidate user and the target wifi alone, so that in order to improve the screening accuracy of the target user, the embodiment acquires the wifi interaction set corresponding to each first candidate user, and completes the screening of the target user by combining the scanning interaction behavior and the connection interaction behavior between the first candidate user and the target wifi.
In a specific embodiment, the wifi interaction set comprises a wifi scanning subset and a wifi connection subset, the wifi scanning subset comprises a plurality of target wifi scanned by the corresponding first candidate user and scanning times between the wifi scanning subset and each target wifi scanned, and the wifi connection subset comprises a plurality of target wifi connected by the corresponding first candidate user and connection times between the wifi scanning subset and each target wifi connected by the corresponding first candidate user.
The more the number of scanning times and the number of connection times between the first candidate users and the target wifi are, the more compact the association relationship between the first candidate users and the target object is, so that in addition to the plurality of target wifi scanned by each first candidate user and the plurality of connected target wifi, the number of scanning times between each first candidate user and each scanned target wifi and the number of connection times between each scanned target wifi and each connected target wifi are also obtained, so that the interaction relationship between the first candidate users and the target wifi is fully represented.
According to the method, the wifi interaction set corresponding to each first candidate user is obtained to represent the scanning interaction behavior and the connection interaction behavior between the first candidate users and the target wifi, the scanning interaction behavior and the connection interaction behavior are used as a basis for analyzing the association relationship between the first candidate users and the target object, a data basis is provided for screening the target users, and therefore screening accuracy of the target users is improved.
S2, screening and obtaining first-type key users corresponding to the target object from all first candidate users according to the wifi interaction set.
In a specific embodiment, S2 further comprises the following steps:
acquiring a first quantity of target wifi scanned by each first candidate user according to the wifi scanning subset corresponding to each first candidate user;
Obtaining a second number of target wifi connected by each first candidate user according to the wifi connection subset corresponding to each first candidate user;
obtaining the selection probability corresponding to each first candidate user according to the first duty ratio of the first quantity corresponding to each first candidate user in the total quantity of the target wifi, the second duty ratio of the second quantity in the total quantity of the target wifi, the sum of the corresponding scanning times, the sum of the corresponding connection times, the first weight corresponding to the first duty ratio, the second weight corresponding to the second duty ratio, the third weight corresponding to the scanning times and the fourth weight corresponding to the connection times;
and when the selection probability is larger than a preset selection probability threshold value, determining the first candidate users corresponding to the selection probability as the first type key users.
The more the number of scanning times and the number of connection times between the first candidate users and the target wifi are, the closer the association relationship between the first candidate users and the target object is, so that the probability that each first candidate user is selected as the first key user of the target object is represented by combining a preset selection probability formula and obtaining the selection probability corresponding to each first candidate user according to the first duty ratio of the first number in the total number of the target wifi, the second duty ratio of the second number in the total number of the target wifi, the sum of the scanning times, the sum of the connection times and the corresponding weight.
In one embodiment, the predetermined probability formula is p=γ 1 (x 1 /x 0 )+γ 2 />(x 2 /x 0 )+γ 3 />y 14 />y 2 Wherein x is 1 Refers to a first number, x, of first candidate users 1 Refers to the second number, x, corresponding to the first candidate user 0 Refers to the total number of target wifi, y 1 Refers to the sum, y of the scanning times corresponding to the first candidate user 2 Refers to the sum, gamma of the connection times corresponding to the first candidate user 1 Refers to a first weight, gamma 2 Refers to the second weight, gamma 3 Refers to the third weight, gamma 4 Refers to the fourth weight.
As can be appreciated, γ 1 <γ 2 ,γ 3 <γ 4 ,γ 1 、γ 2 、γ 3 And gamma 4 The specific values of (2) may be set by the practitioner according to the actual situation.
According to the wifi interaction set, the probability of selecting each first candidate user to be selected as the first key user of the target object is obtained based on the first duty ratio of the first number of target wifi scanned by each candidate user in the total number of target wifi, the second duty ratio of the second number of target wifi connected by each candidate user in the total number of target wifi, the sum of scanning times, the sum of connection times and the corresponding weight, so that the probability of selecting each first candidate user as the first key user of the target object is represented, and the accuracy of the screened first key users is improved.
S3, acquiring an IP list corresponding to each first type key user and a user list corresponding to each candidate IP, wherein the IP list comprises a plurality of candidate IPs corresponding to each first type key user, and the user list comprises a plurality of second candidate users corresponding to each candidate IP.
The candidate IP corresponding to the first type key user may identify a device corresponding to the first key user, and the candidate IP may be used as an identity of the corresponding first type key user.
The second candidate user refers to a user related to the corresponding candidate IP, and a user consistent with the first candidate user may exist in the second candidate user.
Through acquiring the IP list corresponding to each first type key user and the user list corresponding to each candidate IP, the association relation between the first type key user and the candidate IP can be analyzed, so that candidate IP with close association relation with a target object is screened as a target IP according to the known first type key user, the first type key user with close association relation with the target object is screened as a second type key user according to the known target IP, and the like until the screening condition of the screening target user is met, and the screening task of the target user is completed.
And S4, screening out the first type target IP corresponding to the target object from all the candidate IPs according to the IP lists corresponding to all the first type key users.
The first type of target IP is the IP which is screened from the candidate IP and has a close association relationship with the target object.
In a specific embodiment, S4 further includes the following steps:
acquiring a third number of the first type key users corresponding to each candidate IP according to the IP list corresponding to all the first type key users;
obtaining a third duty ratio of a third number in the total number of the first type key users;
and when the third duty ratio is larger than a preset first quantity duty ratio threshold value, determining the candidate IP corresponding to the third duty ratio as the first type target IP.
The larger the third duty ratio of the third number of the first type key users corresponding to each candidate IP in the total number of the first type key users is, the closer the association relation between the corresponding candidate IP and the target object is represented, so that the first type target IP is obtained through screening according to the comparison of the third duty ratio and the preset first number duty ratio threshold.
According to the third duty ratio of the third number of the first type key users corresponding to each candidate IP in the total number of the first type key users, and the comparison of the third duty ratio and the preset first number duty ratio threshold, the first type target IP is obtained through screening, and is used as a basis for updating the key users and further updating the target IP, so that screening accuracy of the key users and the target IP is improved.
S5, screening and obtaining second type key users corresponding to the target objects from all second candidate users according to user lists corresponding to all first type target IPs, wherein the number of the second type key users is greater than or equal to that of the first type key users.
The second type key users are users screened from the second candidate users and have close association relation with the target object, and the second type key users comprise all first type key users.
In a specific embodiment, S5 further includes the following steps:
acquiring a fourth number of first type target IPs corresponding to each second candidate user except the first type key user according to the user list corresponding to all the first type target IPs;
acquiring a fourth duty ratio of a fourth number in the total number of the first type target IPs;
when the fourth duty ratio is larger than a preset second quantity duty ratio threshold value, determining second candidate users corresponding to the fourth duty ratio as first class intermediate candidate users;
and determining the first type key users and the first type intermediate candidate users as the second type key users.
The larger the fourth duty ratio of the fourth number of the first type target IPs corresponding to each second candidate user in the total number of the first type target IPs, the closer the association relationship between the corresponding second candidate user and the target object is represented, so that the first type intermediate candidate users are obtained through screening according to the comparison of the fourth duty ratio and a preset second number duty ratio threshold value, the second type key users are obtained through further combination with the first type key users, and the number of the second type key users is larger than or equal to that of the first type key users.
According to the fourth duty ratio of the fourth number of the first type target IPs corresponding to each second candidate user in the total number of the first type target IPs, the fourth duty ratio is compared with the preset second number duty ratio threshold value, the first type intermediate candidate users are obtained through screening, and serve as bases for updating the target IPs and further updating the key users, so that screening accuracy of the key users and the target IPs is improved, the expansion of the key users is completed, and screening accuracy of the target users is improved.
S6, according to IP lists corresponding to all N-th type key users, N-th type target IPs corresponding to target objects are obtained through screening from all candidate IPs, wherein the number of the N-th type target IPs is greater than or equal to that of the N-1-th type target IPs, N is an integer greater than 1, and when N=2, the N-th type key users are consistent with the second type key users.
In a specific embodiment, S6 further includes the following steps:
acquiring a fifth number of N-th type key users corresponding to each candidate IP except the N-1-th type target IP according to the IP list corresponding to all N-th type key users;
obtaining a fifth duty ratio of a fifth number in the total number of the N-th type key users;
When the fifth duty ratio is larger than a preset first quantity duty ratio threshold value, determining candidate IPs corresponding to the fifth duty ratio as N-1 class intermediate target IPs;
and determining the N-1 type target IP and the N-1 type intermediate target IP as the N type target IP.
After the N-type key users are obtained, the N-type target IP corresponding to the target object is screened from all the candidate IPs by further combining with the IP list corresponding to the N-type key users, so that the target IP is updated again, the key users are updated and the target IP is updated further, the screening accuracy of the key users and the target IP is further improved, and meanwhile, the target IP expansion is finished, so that the screening accuracy of the target users is improved.
S7, screening and obtaining N+1th type key users corresponding to the target object from all second candidate users according to user lists corresponding to all N type target IPs, wherein the number of the N+1th type key users is greater than or equal to that of the N type key users.
In a specific embodiment, S7 further includes the following steps:
acquiring a sixth number of N-type target IPs corresponding to each second candidate user except the N-type key user according to the user list corresponding to all N-type target IPs;
Obtaining a sixth duty ratio of the sixth number in the total number of the nth class of target IPs;
when the sixth duty ratio is larger than a preset second quantity duty ratio threshold value, determining a second candidate user corresponding to the sixth duty ratio as an N-th intermediate candidate user;
and determining the N-type key users and the N-type intermediate candidate users as N+1-type key users.
After the N-type target IP is obtained, the N+1-type key users corresponding to the target object are screened from all the second candidate users by further combining with the user list corresponding to the N-type target IP, so that the key users are updated again, the key users are used as the basis for updating the target IP and further updating the key users, the screening accuracy of the key users and the target IP is further improved, and the expansion of the key users is finished again, so that the screening accuracy of the target users is improved.
S8, when the number of the N+1th type key users is equal to the number of the N type key users, determining the N+1th type key users as target users.
When the number of the n+1th type key users is equal to the number of the N type key users, the number of the corresponding key users expansion is zero when the n+1th type key users are acquired, and the number of the represented key users reaches an upper limit, so that the n+1th type key users are all key users corresponding to the target users, and the n+1th type key users are determined to be the target users.
And when the screening condition is met, the quantity of the characterization key users reaches the upper limit, so that the target users are acquired, and the acquisition accuracy of the target users is improved.
In a specific embodiment, the target user screening method further includes the following steps:
acquiring the number of intermediate users of a target object;
acquiring the corresponding spreading efficiency of the N+1th type key users according to the number of the N+1th type key users, the number of the N+1th type key users and the number of intermediate users;
and when the number of the N+1th class key users is larger than the number of the N class key users and the expansion efficiency is smaller than a preset efficiency threshold, determining the N+1th class key users as target users.
When N is larger, the number of the key users is smaller when the key users are expanded each time, so in order to improve the screening efficiency of the target users, the screening cost is saved, according to the number of the N-th type key users, the number of the n+1-th type key users and the number of intermediate users, the corresponding expansion efficiency of the n+1-th type key users is calculated by combining a preset expansion efficiency calculation formula, and the expansion of the key users is stopped when the expansion efficiency is smaller than a preset efficiency threshold, and the n+1-th type key users are determined as the target users.
The intermediate user may refer to a participating user in the target object.
The preset efficiency threshold may be set by an implementer according to actual situations.
In one embodiment, the preset spreading efficiency calculation formula is η= (Q) N+1 -Q N )/(2θ), wherein Q N+1 Refers to the number of N+1 key users, Q N Refers to the number of N-th key users, and θ refers to the number of intermediate users of the target object.
According to the number of the N-th type key users, the number of the N+1-th type key users and the number of the intermediate users, the corresponding expansion efficiency of the N+1-th type key users is calculated, and when the expansion efficiency is smaller than the preset efficiency threshold, the expansion of the key users is stopped, so that the screening efficiency of target users is improved, and the screening cost is saved.
According to the wifi interaction set, the first type key users corresponding to the target objects are obtained through screening from all the first candidate users, the first type target IPs corresponding to the target objects are obtained through screening from all the candidate IPs according to the IP lists corresponding to all the first type key users, and the second type key users corresponding to the target objects are obtained through screening from all the second candidate users according to the user lists corresponding to all the first type target IPs, so that the screening accuracy of the key users and the target IPs is improved as a basis for further updating the target IPs and further updating the key users; according to the IP lists corresponding to all N-th key users, N-th target IP corresponding to the target object is obtained through screening from all candidate IPs, and according to the user lists corresponding to all N-th target IPs, N+1-th key users corresponding to the target object are obtained through screening from all second candidate users, and the N+1-th key users are used as the basis for further updating the target IP and further updating the key users, so that the screening accuracy of the key users and the target IP is further improved, and the expansion of the target IP and the key users is completed again; when the number of the N+1st type key users is equal to the number of the N type key users, the N+1st type key users are determined to be target users, and when the number of the key users reaches the upper limit, the corresponding target users are obtained, so that the screening accuracy of the target users is improved.
Example two
On the basis of the first embodiment, the second embodiment provides a target wifi screening method, where the target wifi screening method includes the following steps, as shown in fig. 2:
s10, acquiring a target information list corresponding to a target object, wherein the target information comprises target name information, target mailbox address information, target website address information and target address information.
The target object may be an object with a certain number of employees, such as a company, an enterprise, a studio, a factory, etc. needing to perform employee screening, and the target name information may be a name in the form of a chinese name, an english name, etc. of the target object; the target mailbox address information may refer to address information of a dedicated mailbox of the target object; the target website information may refer to website information of a dedicated website of the target object; the target address information may refer to location information of a geographic location where the target object is located. The target name information, the target mailbox address information, the target website information and the target address information are uniquely corresponding to the target object and can be used as the identity of the target object, so that the association relationship between the target object and the wifi can be represented by analyzing the association relationship among the target name information, the target mailbox address information, the target website information, the target address information and the wifi, and further the screening task of the target wifi corresponding to the target object is completed.
The target name information, the target mailbox address information, the target website address information and the target address information are used as the identity of the target object, the task of analyzing the association relationship between the target object and the wifi is converted into the task of analyzing the association relationship between the target name information, the target mailbox address information, the target website address information and the wifi, and the screening accuracy of the target wifi is improved.
In one embodiment, the target information list is obtained by:
acquiring a preset information list corresponding to a target object, wherein the preset information list comprises preset name information, preset mailbox address information, preset website information and preset address information;
and cleaning data of the preset information list to obtain a target information list corresponding to the target object.
The method comprises the steps of carrying out data cleaning on a preset information list in order to improve screening accuracy of target wifi, so that similarity analysis is conveniently carried out on the target wifi, and characterization accuracy of association relation between a target object and the wifi is improved.
In a specific embodiment, the step of performing data cleaning on the preset information list to obtain the target information list corresponding to the target object further includes the following steps:
acquiring a preset first name keyword list, a preset mailbox keyword list, a preset website keyword list and preset characters, wherein the preset name keyword list comprises a plurality of preset first name keywords, the preset mailbox keyword list comprises a plurality of preset mailbox keywords, and the preset website keyword list comprises a plurality of preset website keywords;
all first name keywords appearing are removed from preset name information, and intermediate name information is obtained;
performing character conversion on the intermediate name information according to a preset character conversion form to obtain target name information;
removing all the mailbox keywords from preset mailbox address information, and obtaining intermediate mailbox address information;
and replacing the corresponding preset character in the intermediate mailbox address information with a null character to obtain the target mailbox address information.
Removing all website keywords from preset website information to obtain intermediate website information;
And replacing the corresponding preset character in the intermediate website information with a null character to obtain the target website information.
The first name keyword may refer to a keyword related to a company name preset such as "limited company", "limited liability company", "stock limited company", "office", "studio", "store", "center", "factory", "department", etc.; the mailbox keywords may refer to keywords related to mailbox names preset such as "qq", "163", "126", "gmail", "vip", etc.; the website keywords may refer to preset keywords related to network addresses, such as "http", "https", "com", "cn", etc.; the preset character may refer to a character preset of "_", "-", "//", etc.
The first name keyword, the mailbox keyword, the website keyword and the preset character can be set by an implementer according to actual conditions.
By eliminating the keywords in the preset name information, the preset mailbox address information and the preset website information and replacing the preset characters, the normalization of the name information, the mailbox address information and the website information is improved, and the interference of the corresponding keywords and the corresponding preset characters can be reduced when the similarity calculation is performed with wifi information, so that the characterization accuracy of the association relationship between the target object and wifi is improved.
In one embodiment, the target address information and the preset address information may be identical.
S20, acquiring a geohash character string corresponding to the target object according to the target name information and the target address information.
When the distance between the wifi and the target object is relatively short, the corresponding wifi can be regarded as a candidate wifi which possibly has an association relationship with the target object, so that in order to obtain all candidate wifi which possibly has an association relationship with the target object and screen to obtain the corresponding target wifi, in this embodiment, the geohash character string corresponding to the target object is obtained by combining the target name information and the target address information to characterize the position information of the target object, and the position information is used as a basis for obtaining the candidate wifi.
In a specific embodiment, S20 further includes the following steps:
acquiring the number of intermediate users corresponding to the target object according to the target name information;
acquiring target name keywords in the target name information according to a preset keyword extraction algorithm;
when the target name keywords are consistent with the preset second name keywords or the number of the intermediate users is smaller than or equal to a preset first number threshold value, determining that the geohash level corresponding to the target object is 7;
When the target name keywords are consistent with the preset third name keywords or the number of the intermediate users is greater than or equal to a preset second number threshold, determining that the geohash level corresponding to the target object is 5;
when the target name keyword is inconsistent with the preset second name keyword, the target name keyword is inconsistent with the preset third name keyword, the number of intermediate users is greater than a preset first number threshold value, and the number of intermediate users is smaller than a preset second number threshold value, determining that the geohash level corresponding to the target object is level 6;
and acquiring a geohash character string corresponding to the target object according to the level of the geohash and the target address information.
The geohash is an address coding method, which can divide the whole geographic area into areas and code two-dimensional space longitude and latitude data into a character string, and the larger the length of the geohash character string is, the smaller the range of each divided area is, and the higher the corresponding area division precision is.
Therefore, in order to improve accuracy of the geohash character string, the embodiment measures the level of the geohash corresponding to the target object according to the target name information and the target address information, thereby improving accuracy of obtaining the candidate wifi.
Specifically, the target name keyword may refer to a keyword that may represent the size of the target object to a certain extent in target name information such as "company", "store", "center", "factory", "department", etc., correspondingly, the second name keyword may refer to a keyword that may represent the corresponding target object to a smaller extent in "store", etc., and the third name keyword may refer to a keyword that may represent the corresponding target object to a larger extent in "factory", etc., and meanwhile, the number of intermediate users corresponding to the target object may represent the size of the target object to a certain extent, so, in combination with the number of intermediate users corresponding to the target object, and the target name keyword extracted from the target name information based on the keyword extraction algorithm, the level of geohash corresponding to the target object is determined.
The target name keyword, the second name keyword and the third name keyword can be set by an implementer according to actual situations.
One skilled in the art knows that any keyword extraction algorithm in the prior art falls within the protection scope of the present invention, and is not described herein.
The above-mentioned number of intermediate users corresponding to the target object and the target name keyword are obtained to represent the size of the target object, so that the level number of the geohash corresponding to the target object and the length of the geohash character string are determined, the accuracy of the geohash character string is matched with the size of the target object, and the accuracy of the geohash character string obtained according to the level of the geohash and the target address information is improved.
S30, determining wifi in the geographical area range corresponding to the geohash character string as candidate wifi.
Wherein, the scope size that different wifi information can cover is different, in order to reduce the different adverse effect that produces wifi screening result of wifi coverage, this embodiment all confirm as candidate wifi with the geographic area within range that geohash character string corresponds to all target wifi that the target object corresponds all cover in candidate wifi within range as far as possible, thereby when further screening out target wifi from candidate wifi, can improve the acquisition accuracy of target wifi.
S40, obtaining a similarity list set between the target object and each candidate wifi according to the target information list and the names of all candidate wifi, wherein the similarity list set comprises a first similarity list between the target name information and the names of the corresponding candidate wifi, a second similarity list between the target mailbox address information and the names of the corresponding candidate wifi, and a third similarity list between the target website information and the names of the corresponding candidate wifi.
Above-mentioned, obtain the first similarity between the name of target name information and each candidate wifi, the second similarity between the name of target mailbox address information and each candidate wifi, and the third similarity between the name of target website information and each candidate wifi respectively, from the similarity between the target object and each candidate wifi in three aspects, comprehensive characterization target object and each candidate wifi's association, improved target object and candidate wifi's association's characterization accuracy.
In a specific embodiment, S40 further includes the following steps:
acquiring a first editing distance and a first public character string length between the target name information and the name of each candidate wifi according to the target name information and the name of each candidate wifi;
according to the first editing distance, obtaining first editing distance similarity between the target name information and the corresponding candidate wifi names;
acquiring first public character string similarity between the target name information and the names of the corresponding candidate wifi according to the first public character string length, the character string length corresponding to the names of the corresponding candidate wifi and the character string length corresponding to the target name information;
and acquiring a first similarity list between the target name information and the corresponding candidate wifi according to the first editing distance similarity and the first public character string similarity.
The editing distance refers to the number of steps required to be passed when changing from one character string to another, and the similarity between two character strings can be represented; the common string length refers to the length of a common string between two strings, and may also characterize the degree of similarity between the two strings.
Therefore, the embodiment converts the target name information into the corresponding target name character, obtains the editing distance and the common character string length between the target name character and the name of each candidate wifi, and determines the first editing distance and the first common character string length between the corresponding target name information and the name of each candidate wifi.
In one embodiment, the first edit distance similarity_lev meets the following condition:
similarity_lev=1/(edit distance+1), where edit distance refers to the corresponding first edit distance.
In one embodiment, the first common string similarity_common meets the following condition:
Similarity_common=(LengthO)/(max(Length1,Length2))。
wherein Length1 refers to the Length of the string corresponding to the corresponding target name information, length2 refers to the Length of the string corresponding to the name of the corresponding candidate wifi, length o refers to the Length of the corresponding first common string, and max () refers to the maximum function.
In one embodiment, the first Similarity1 meets the following conditions:
Similarity1=ψ 1 Similarity_lev+ψ 2 />similarity_common, wherein ψ 1 Refers to the weight, psi, corresponding to the edit distance similarity 2 Refers to the weight corresponding to the similarity of the common character strings.
Above-mentioned, combine edit distance and public string length to represent the first similarity between target name information and the corresponding candidate wifi, improved the accuracy of first similarity.
In a specific embodiment, S40 further includes the following steps:
acquiring a second editing distance and a second public character string length between the target mailbox address information and the name of each candidate wifi according to the target mailbox address information and the name of each candidate wifi;
obtaining second editing distance similarity between the target mailbox address information and the corresponding name of the candidate wifi according to the second editing distance;
obtaining second public character string similarity between the target mailbox address information and the names of the corresponding candidate wifi according to the second public character string length, the character string length corresponding to the names of the corresponding candidate wifi and the character string length corresponding to the target mailbox address information;
and acquiring a second similarity list between the target mailbox address information and the corresponding candidate wifi according to the second edit distance similarity and the second public character string similarity.
In a specific embodiment, S40 further includes the following steps:
acquiring a third editing distance and a third public character string length between the target website information and the name of each candidate wifi according to the target website information and the name of each candidate wifi;
According to the third editing distance, obtaining third editing distance similarity between the target website information and the corresponding name of the candidate wifi;
obtaining the third public character string similarity between the target website information and the names of the corresponding candidate wifi according to the third public character string length, the character string length corresponding to the names of the corresponding candidate wifi and the character string length corresponding to the target website information;
and obtaining a third similarity list between the target website information and the corresponding candidate wifi according to the third editing distance similarity and the third public character string similarity.
S50, obtaining the target similarity between the target object and each candidate wifi according to the similarity list set and a preset priority list.
The preset priority list includes a first priority corresponding to the first similarity, a second priority corresponding to the second similarity, and a third priority corresponding to the third similarity, and the association degree between the target object and each candidate wifi may be represented by obtaining the target similarity between the target object and each candidate wifi according to the similarity list set and the preset priority list.
The specific values of the first priority, the second priority and the third priority can be set by an implementer according to actual situations.
According to the method, the first similarity corresponding to the target name information, the second similarity corresponding to the target mailbox address information and the importance degree of the target website information and the corresponding third similarity in the process of measuring the association degree between the target object and the corresponding candidate wifi are considered, the preset priority is taken as the weight of the corresponding similarity, the target similarity between the target object and each candidate wifi is obtained, and the accuracy of the target similarity is improved.
S60, determining the candidate wifi with the corresponding target similarity larger than a preset similarity threshold as the target wifi.
The larger the target similarity is, the higher the association degree between the characterization target object and the corresponding candidate wifi is, so that the candidate wifi with the corresponding target similarity larger than the preset similarity threshold value is determined as the target wifi.
The specific value of the preset similarity threshold may be set by the implementer according to the actual situation.
According to the target name information and the target address information, the number of intermediate users corresponding to the target object and the target name keyword are obtained to represent the size of the target object, so that the level number of the geohash corresponding to the target object and the length of the geohash character string are determined, the accuracy of the geohash character string is matched with the size of the target object, and the accuracy of the geohash character string obtained according to the level of the geohash and the target address information is improved; determining wifi in a geographical area range corresponding to the geohash character string as candidate wifi, respectively acquiring first similarity between the target name information and the name of each candidate wifi, second similarity between the target mailbox address information and the name of each candidate wifi and third similarity between the target website information and the name of each candidate wifi according to the target information list and the names of all candidate wifi, comprehensively characterizing the association relation between the target object and each candidate wifi from the similarity between the target object and each candidate wifi in three dimensions, and improving the characterization accuracy of the association relation between the target object and the candidate wifi; according to the similarity list and the preset priority list, the target similarity between the target object and each candidate wifi is obtained, the candidate wifi with the corresponding target similarity being larger than the preset similarity threshold value is determined to be the target wifi, and therefore screening accuracy of the target wifi is improved.
Example III
On the basis of the first embodiment and the second embodiment, the third embodiment provides a target object screening method, where the target object screening method includes the following steps, as shown in fig. 3:
s100, obtaining wifi connection information corresponding to a target userList a= { a 1 ,A 2 ,……,A i ,……,A m (wherein A) i ={A i1 ,A i2 ,……,A ij ,……,A in(i) },A ij ={A ij 1 ,A ij 2 ,A ij 3 },A ij 1 Refers to the j-th preset wifi, A connected with the i-th target user ij 2 ={A ij 21 ,A ij 22 ,……,A ij 2h ,……,A ij 2r(ij) },A ij 2h Meaning that the ith target user is at the h time and A ij 1 Corresponding connection time point A during connection ij 3 ={A ij 31 ,A ij 32 ,……,A ij 3h ,……,A ij 3r(ij) },A ij 3h Meaning that the ith target user is at the h time and A ij 1 The corresponding connection duration in connection is i=1, 2, … …, m, m refers to the number of target users, j=1, 2, … …, n (i), n (i) refers to the number of wifi connected by the ith target user, h=1, 2, … …, r (ij), and r (ij) refers to the number of times that the ith target user connects the jth wifi.
The target user may refer to an employee of an initial target object, the initial target object may refer to a company, an enterprise, a studio, a factory, and the like needing to perform object screening, the preset wifi refers to wifi connected by the target user in a period of time, the preset object refers to an object having a certain association relationship with the target object, for example, when the initial target object is a company, the preset object may refer to a subsidiary of the target object, or refer to other companies having frequent business transactions with the target object, and the target object screening method may screen out a subsidiary corresponding to the target object and other companies having business transactions.
The connection time point and the connection duration between the target user and the preset wifi can be used for representing the incidence relation between the target user and the preset wifi, the incidence relation between the target user and the preset wifi can be a relation in daily life or an incidence relation in work, therefore, the preset wifi can be screened according to the incidence relation between the target user and the preset wifi, wifi with the work incidence relation with the target user is screened out, and accordingly all preset objects can be further classified according to the screened wifi, and the screening task of the target object is completed.
Above-mentioned, wifi connection information list that target user corresponds provides the data basis for screening the target object.
S200, according to A, a preset first working time range [ b ] 1 ,c 1 ]And a preset second operating time range [ b ] 2 ,c 2 ]Obtaining a target connection times list B= { B corresponding to A 1 ,B 2 ,……,B i ,……,B m }, wherein B is i ={B i1 ,B i2 ,……,B ij ,……,B in(i) },A ij 1 Corresponding target connection times B ij The method comprises the following steps of:
s210, when A ij 2h In [ b ] 1 ,c 1 ]Either in [ b ] 2 ,c 2 ]In the inner time, the ith target user is connected with A ij 1 Is determined as A by the h connection of (2) ij 1 Corresponding target connection behavior.
S220, traversing A ij 2 Obtaining B (ij) =S (ij), wherein S (ij) refers to A ij 1 The total number of corresponding target connection actions.
Wherein, by judging whether the connection time point of the target user and the preset wifi is in the preset first working time range [ b ] 1 ,c 1 ]Or a preset second operating time range [ b ] 2 ,c 2 ]In the method, whether the corresponding connection behavior of the target user and the preset wifi is the target connection behavior related to the work can be judged, so as to screen the wifi connection behavior of the target user, reject the wifi connection behavior irrelevant to the work, screen out the target connection behavior and obtain the total number of the target connection behaviors,as a basis for representing the work association relationship between the preset wifi and the target staff, the business association wifi is found out to finish screening of the target object, and further screening accuracy of the target object is improved.
Wherein the preset first working time range [ b ] 1 ,c 1 ]And a preset second operating time range [ b ] 2 ,c 2 ]The setting can be performed by the practitioner according to the actual situation. For example, the connection time point may be a time point with a period of 24 hours, b 1 May be referred to as 8:00, c 1 May be referred to as 12:00, b 2 May be referred to as 14:00, c 2 May be referred to as 18:00.
By connecting the target user with the preset wifi at the time point [ b ] 1 ,c 1 ]And [ b ] 2 ,c 2 ]The method comprises the steps of screening out target connection behaviors related to work from all connection behaviors of a target user and preset wifi, obtaining the total number of the target connection behaviors, eliminating adverse effects of the wifi connection behaviors irrelevant to the work on screening target objects, and accordingly improving screening accuracy of the target objects.
S300, according to A and all target connection behaviors, acquiring a target connection duration list C= { C corresponding to A 1 ,C 2 ,……,C i ,……,C m }, wherein C i ={C i1 ,C i2 ,……,C ij ,……,C in(i) },A ij 1 Corresponding target connection duration C ij Equal to A ij 1 The sum of the corresponding S (ij) connection durations of the corresponding S (ij) target connection behaviors.
According to the target connection behaviors between each target user and each preset wifi and the connection time length corresponding to each target connection behavior, the target connection time length between each target user and each preset wifi can be counted and obtained, the work association degree between each target user and each preset wifi is used for representing, adverse effects of the connection time length of the wifi connection behaviors irrelevant to work on screening target objects are eliminated, and therefore screening accuracy of the target objects is improved.
S400, according to B and C, obtaining a service association wifi list D= { D 1 ,D 2 ,……,D i ,……,D m }, wherein D i ={D i 1 ,D i 2 ,……,D i v ,……,D i t(i) },D i v The method is characterized in that the method comprises the steps of enabling a ith service association wifi corresponding to an ith target user to be v=1, 2 … …, t (i), and t (i) is the total number of the service associations wifi corresponding to the ith target user.
The service association wifi refers to wifi which has service association with a target user and a target object, and is used as a basis for determining a service association company.
In one embodiment, D i The method comprises the following steps of:
s410, according to B ij And C ij Acquiring a service association degree E corresponding to a j preset wifi connected with an i target user ij1 B ij2 />C ij Wherein alpha is 1 Refers to a first preset priority, alpha 2 Refers to a second preset priority;
s420, if E ij >E 0 Will A ij 1 Determining service association wifi corresponding to the ith target user, wherein E 0 The method refers to a preset service association degree threshold;
s430, traversing B i And C i Obtain D i ={D i 1 ,D i 2 ,……,D i v ,……,D i t(i) }。
The more the number of target connection times between the target user and the preset wifi is, the longer the target connection time between the target user and the preset wifi is, and the corresponding service association between the preset wifi and the target user and the target object is carried outThe higher the degree. Thus, according to B ij And C ij In combination with a preset alpha 1 And alpha 2 Acquiring a service association degree E ij And at E ij >E 0 At the time, A ij 1 And determining the service association wifi corresponding to the ith target user, and completing screening of all the service association wifi according to the service association wifi, wherein the service association wifi is used as a basis for further screening the service association wifi.
Wherein, a preset service association degree threshold E 0 The specific values of (2) may be set by the practitioner according to the actual situation.
Above-mentioned, combine target connection number of times and the target connection duration between target user and the presupposed wifi, the business association degree between presupposed wifi and target user and the target object is characterized to according to business association degree and business association degree between the threshold value size comparison, select the wifi that has business association with target user and target object from all presupposed wifi, improved business association wifi's screening accuracy, and then improved target object's screening accuracy.
S500, classifying the preset object corresponding to each service association wifi into a first target object or a second target object according to D.
The first target object refers to a subsidiary of the target object, and the second target object refers to a company which has frequent business trips to the target object except the subsidiary.
In a specific embodiment, S500 further includes the following steps:
s510, according to D, obtaining the number of target users corresponding to each service association wifi;
s520, classifying each service association wifi as a first service association wifi or a second service association wifi according to the number of target users corresponding to each service association wifi;
S530, determining a preset object corresponding to the first service association wifi as a first target object;
s540, determining a preset object corresponding to the second service association wifi as a second target object.
In a specific embodiment, S520 further includes the following steps:
s521, when the number of target users corresponding to the service association wifi is larger than a first target user number threshold, classifying the corresponding service association wifi as a first service association wifi;
s522, when the number of the target users corresponding to the service association wifi is smaller than or equal to the first target user number threshold and is larger than the second target user number threshold, classifying the corresponding service association wifi as a second service association wifi.
Wherein the second target user number threshold is less than the first target user number threshold.
By connecting the target user with the preset wifi at the time point [ b ] 1 ,c 1 ]And [ b ] 2 ,c 2 ]The method comprises the steps that target connection behaviors related to work are screened out from all connection behaviors of a target user and preset wifi, the total number of the target connection behaviors is obtained, and adverse effects of the wifi connection behaviors unrelated to the work on screening target objects are eliminated; according to the target connection behaviors and the connection time length corresponding to each target connection behavior, the target connection time length between each target user and each preset wifi is counted to represent the work association degree between each target user and each preset wifi, and adverse effects of the connection time length of the wifi connection behaviors irrelevant to work on screening target objects are eliminated; the service association degree between the preset wifi and the target user and the service association degree between the preset wifi and the target object are represented by combining the target connection times and the target connection time between the target user and the preset wifi, and the wifi which has service association with the target user and the target object is screened out from all the preset wifi according to the comparison between the service association degree and the service association degree threshold, so that the screening accuracy of the service association wifi is improved; and classifying the preset object corresponding to each service association wifi as a first target object or a second target object, thereby improving the screening accuracy of the target objects.
Example IV
The fourth embodiment provides a target user screening apparatus, where the target user screening apparatus includes, as shown in fig. 4:
the first data obtaining module 41 is configured to obtain first candidate users corresponding to the target object, and wifi interaction sets corresponding to each first candidate user.
And the first key user screening module 42 is configured to screen and obtain a first type of key user corresponding to the target object from all the first candidate users according to the wifi interaction set.
The second data obtaining module 43 is configured to obtain an IP list corresponding to each first type of key user and a user list corresponding to each candidate IP, where the IP list includes a plurality of candidate IPs corresponding to each first type of key user, and the user list includes a plurality of second candidate users corresponding to each candidate IP.
The first target IP screening module 44 is configured to screen, according to the IP lists corresponding to all the first type key users, a first type target IP corresponding to the target object from all the candidate IPs.
And the second key user filtering module 45 is configured to filter and obtain second type key users corresponding to the target objects from all second candidate users according to the user lists corresponding to all first type target IPs, where the number of the second type key users is greater than or equal to the number of the first type key users.
The second target IP screening module 46 is configured to screen out an nth class target IP corresponding to the target object from all candidate IPs according to the IP lists corresponding to all nth class key users, where the number of nth class target IPs is greater than or equal to the number of nth-1 class target IPs, N is an integer greater than 1, and when n=2, the nth class key users are consistent with the second class key users.
And a third key user filtering module 47, configured to filter and obtain the n+1th type key users corresponding to the target object from all the second candidate users according to the user list corresponding to all the N-th type target IPs, where the number of the n+1th type key users is greater than or equal to the number of the N-th type key users.
A first target user filtering module 48, configured to determine the n+1th class of key users as target users when the number of the n+1th class of key users is equal to the number of the N class of key users.
In a specific embodiment, the wifi interaction set includes a wifi scanning subset and a wifi connection subset, the wifi scanning subset includes a plurality of target wifi scanned by the corresponding first candidate user and a scanning number of times between the wifi scanning subset and each target wifi scanned, the wifi connection subset includes a plurality of target wifi connected by the corresponding first candidate user and a connection number of times between the wifi scanning subset and each target wifi connected by the corresponding first candidate user, and the first key user screening module 42 includes the following sub-modules:
The first quantity obtaining sub-module is used for obtaining the first quantity of target wifi scanned by each first candidate user according to the wifi scanning sub-set corresponding to each first candidate user.
And the second number acquisition sub-module is used for acquiring the second number of the target wifi connected by each first candidate user according to the wifi connection sub-set corresponding to each first candidate user.
The selection probability obtaining sub-module is used for obtaining the selection probability corresponding to each first candidate user according to the first duty ratio of the first quantity corresponding to each first candidate user in the total quantity of the target wifi, the second duty ratio of the second quantity in the total quantity of the target wifi, the sum of corresponding scanning times, the sum of corresponding connection times, the first weight corresponding to the first duty ratio, the second weight corresponding to the second duty ratio, the third weight corresponding to the scanning times and the fourth weight corresponding to the connection times.
And the first key user screening sub-module is used for determining the first candidate users corresponding to the selection probability as the first type key users when the selection probability is larger than a preset selection probability threshold value.
In one embodiment, the first target IP screening module 44 includes the following sub-modules:
And the third number acquisition sub-module is used for acquiring the third number of the first type key users corresponding to each candidate IP according to the IP lists corresponding to all the first type key users.
And the third duty ratio acquisition sub-module is used for acquiring a third duty ratio of a third number in the total number of the first type key users.
And the first target IP screening sub-module is used for determining candidate IPs corresponding to the third duty ratio as first type target IPs when the third duty ratio is larger than a preset first quantity duty ratio threshold value.
In one embodiment, the second critical user screening module 45 includes the following sub-modules:
the fourth number obtaining sub-module is configured to obtain, according to the user lists corresponding to all the first type target IPs, a fourth number of first type target IPs corresponding to each second candidate user except the first type key user.
And the fourth duty ratio acquisition sub-module is used for acquiring a fourth duty ratio of a fourth number in the total number of the first type target IPs.
And the first type intermediate candidate user screening sub-module is used for determining the second candidate users corresponding to the fourth duty ratio as the first type intermediate candidate users when the fourth duty ratio is larger than a preset second quantity duty ratio threshold value.
And the second key user screening sub-module is used for determining the first type key users and the first type intermediate candidate users as the second type key users.
In a specific embodiment, the target user screening apparatus further includes:
and the intermediate user quantity acquisition module is used for acquiring the intermediate user quantity of the target object.
The system comprises a spreading efficiency acquisition module, a spreading efficiency judgment module and a spreading efficiency judgment module, wherein the spreading efficiency acquisition module is used for acquiring the spreading efficiency corresponding to the N+1th type key users according to the number of the N type key users, the number of the N+1th type key users and the number of intermediate users.
And the second target user screening module is used for determining the N+1th type key user as the target user when the number of the N+1th type key users is larger than that of the N type key users and the expansion efficiency is smaller than a preset efficiency threshold.
It should be noted that, because the content of information interaction and execution process between the modules and the embodiment of the method of the present invention are based on the same concept, specific functions and technical effects thereof may be referred to in the method embodiment section, and details thereof are not repeated herein.
Example five
A fifth embodiment of the present invention provides a non-transitory computer readable storage medium having at least one instruction or at least one program stored therein, the at least one instruction or the at least one program loaded and executed by a processor to implement the steps of:
S1, obtaining first candidate users corresponding to target objects and wifi interaction sets corresponding to the first candidate users.
S2, screening and obtaining first-type key users corresponding to the target object from all first candidate users according to the wifi interaction set.
S3, acquiring an IP list corresponding to each first type key user and a user list corresponding to each candidate IP, wherein the IP list comprises a plurality of candidate IPs corresponding to each first type key user, and the user list comprises a plurality of second candidate users corresponding to each candidate IP.
And S4, screening out the first type target IP corresponding to the target object from all the candidate IPs according to the IP lists corresponding to all the first type key users.
S5, screening and obtaining second type key users corresponding to the target objects from all second candidate users according to user lists corresponding to all first type target IPs, wherein the number of the second type key users is greater than or equal to that of the first type key users.
S6, according to the IP lists corresponding to all the N-th type key users, N-th type target IPs corresponding to the target objects are obtained through screening from all the candidate IPs, wherein the number of the N-th type target IPs is greater than or equal to that of the N-1-th type target IPs, N is an integer greater than 1, and when N=2, the N-th type key users are consistent with the second type key users.
S7, screening and obtaining N+1th type key users corresponding to the target object from all second candidate users according to user lists corresponding to all N type target IPs, wherein the number of the N+1th type key users is greater than or equal to that of the N type key users.
S8, when the number of the N+1th type key users is equal to the number of the N type key users, determining the N+1th type key users as target users.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above functional units and the division of the modules are illustrated, and in practical application, the above functions may be allocated to different functional units and modules according to needs, that is, the internal structure of the apparatus is divided into different functional units or modules to complete all or part of the functions described above.
Example six
A sixth embodiment of the present invention provides an electronic device including a processor and a non-transitory computer-readable storage medium in the fifth embodiment of the present invention.
The present invention is not limited to the above-mentioned embodiments, but is not limited to the above-mentioned embodiments, and any person skilled in the art can make some changes or modifications to the equivalent embodiments without departing from the scope of the present invention, but all the simple modifications, equivalent changes and modifications according to the technical matter of the present invention fall within the scope of the technical solution of the present invention.

Claims (8)

1. The target user screening method is characterized by comprising the following steps of:
acquiring a first candidate user corresponding to a target object and a wifi interaction set corresponding to each first candidate user, wherein the wifi interaction set comprises a wifi scanning subset and a wifi connection subset, the wifi scanning subset comprises a plurality of targets wifi scanned by the corresponding first candidate user and scanning times between the targets wifi scanned by the corresponding first candidate user and the wifi connection subset comprises a plurality of targets wifi connected by the corresponding first candidate user and connection times between the targets wifi connected by the corresponding first candidate user, and the targets wifi are acquired through the following steps:
acquiring a target information list corresponding to the target object, wherein the target information comprises target name information, target mailbox address information, target website information and target address information;
acquiring a geohash character string corresponding to the target object according to the target name information and the target address information;
determining wifi in a geographical area range corresponding to the geohash character string as candidate wifi;
acquiring a similarity list set between the target object and each candidate wifi according to the target information list and the names of all candidate wifi, wherein the similarity list set comprises a first similarity list between the target name information and the names of the corresponding candidate wifi, a second similarity list between the target mailbox address information and the names of the corresponding candidate wifi, and a third similarity list between the target website information and the names of the corresponding candidate wifi;
Acquiring target similarity between the target object and each candidate wifi according to the similarity list set and a preset priority list;
determining candidate wifi with the corresponding target similarity larger than a preset similarity threshold as a target wifi;
and screening and obtaining first-class key users corresponding to the target object from all first candidate users according to the wifi interaction set, wherein the step of screening and obtaining the first-class key users corresponding to the target object from all first candidate users according to the wifi interaction set further comprises the following steps:
acquiring a first number of target wifi scanned by each first candidate user according to the wifi scanning subset corresponding to each first candidate user;
obtaining a second number of target wifi connected by each first candidate user according to the wifi connection subset corresponding to each first candidate user;
obtaining the selection probability corresponding to each first candidate user according to the first duty ratio of the first quantity corresponding to each first candidate user in the total quantity of the target wifi, the second duty ratio of the second quantity in the total quantity of the target wifi, the sum of corresponding scanning times, the sum of corresponding connection times, and the first weight corresponding to the first duty ratio, the second weight corresponding to the second duty ratio, the third weight corresponding to the scanning times and the fourth weight corresponding to the connection times;
When the selection probability is larger than a preset selection probability threshold, determining a first candidate user corresponding to the selection probability as a first type key user;
acquiring an IP list corresponding to each first type key user and a user list corresponding to each candidate IP, wherein the IP list comprises a plurality of candidate IPs corresponding to each first type key user, and the user list comprises a plurality of second candidate users corresponding to each candidate IP;
according to the IP lists corresponding to all the first-class key users, screening all the candidate IPs to obtain first-class target IPs corresponding to the target objects;
screening and obtaining second-type key users corresponding to the target objects from all second candidate users according to user lists corresponding to all first-type target IPs, wherein the number of the second-type key users is greater than or equal to that of the first-type key users;
according to the IP lists corresponding to all N-th type key users, N-th type target IPs corresponding to the target objects are obtained through screening from all candidate IPs, wherein the number of the N-th type target IPs is greater than or equal to that of N-1-th type target IPs, N is an integer greater than 1, and when N=2, the N-th type key users are consistent with the second type key users;
According to the user list corresponding to all N-th target IP, screening and obtaining N+1th key users corresponding to the target object from all second candidate users, wherein the number of the N+1th key users is greater than or equal to that of the N-th key users;
and when the number of the N+1th class key users is equal to the number of the N class key users, determining the N+1th class key users as target users.
2. The target user screening method according to claim 1, wherein the target information list is obtained by:
acquiring a preset information list corresponding to a target object, wherein the preset information list comprises preset name information, preset mailbox address information, preset website information and preset address information;
and cleaning the data of the preset information list to obtain a target information list corresponding to the target object.
3. The method for screening target users according to claim 1, wherein the step of screening the first type of target IP corresponding to the target object from all candidate IPs according to the IP list corresponding to all first type of key users further comprises the steps of:
Acquiring a third number of the first type key users corresponding to each candidate IP according to the IP list corresponding to all the first type key users;
obtaining a third duty ratio of the third number in the total number of the first type key users;
and when the third duty ratio is larger than a preset first quantity duty ratio threshold value, determining the candidate IP corresponding to the third duty ratio as a first type target IP.
4. The method for screening target users according to claim 1, wherein the step of screening and obtaining second type key users corresponding to the target object from all second candidate users according to all first type target IPs and all user lists further comprises the steps of:
acquiring a fourth number of first type target IPs corresponding to each second candidate user except the first type key user according to the user list corresponding to all the first type target IPs;
acquiring a fourth duty ratio of the fourth number in the total number of the first type target IPs;
when the fourth duty ratio is larger than a preset second quantity duty ratio threshold value, determining a second candidate user corresponding to the fourth duty ratio as a first class intermediate candidate user;
and determining the first type key users and the first type intermediate candidate users as second type key users.
5. The target user screening method according to claim 1, further comprising the steps of:
acquiring the number of intermediate users of the target object, wherein the number of intermediate users refers to the number of participating users in the target object;
according to the number of the N-th type key users, the number of the N+1-th type key users and the number of the intermediate users, obtaining the corresponding expansion efficiency of the N+1-th type key users, wherein the corresponding expansion efficiency of the N+1-th type key users meets the following conditions:
η=(Q N+1 -Q N )/(2θ), wherein η refers to the spreading efficiency, Q, corresponding to the n+1st class of key users N+1 Refers to the number, Q, of the N+1st class key users N The number of the N-th key users is referred, and the number of the intermediate users is referred to as theta;
and when the number of the N+1th class key users is larger than the number of the N class key users and the expansion efficiency is smaller than a preset efficiency threshold, determining the N+1th class key users as target users.
6. A target user screening apparatus, the target user screening apparatus comprising:
the system comprises a first data acquisition module, a first candidate user corresponding to a target object and a wifi interaction set corresponding to each first candidate user, wherein the wifi interaction set comprises a wifi scanning subset and a wifi connection subset, the wifi scanning subset comprises a plurality of targets wifi corresponding to the first candidate user and scanning times between the wifi scanning subset and each scanned target wifi, the wifi connection subset comprises a plurality of targets wifi corresponding to the first candidate user and connecting times between the wifi scanning subset and each connected target wifi, and the targets wifi are acquired through the following steps:
Acquiring a target information list corresponding to the target object, wherein the target information comprises target name information, target mailbox address information, target website information and target address information;
acquiring a geohash character string corresponding to the target object according to the target name information and the target address information;
determining wifi in a geographical area range corresponding to the geohash character string as candidate wifi;
acquiring a similarity list set between the target object and each candidate wifi according to the target information list and the names of all candidate wifi, wherein the similarity list set comprises a first similarity list between the target name information and the names of the corresponding candidate wifi, a second similarity list between the target mailbox address information and the names of the corresponding candidate wifi, and a third similarity list between the target website information and the names of the corresponding candidate wifi;
acquiring target similarity between the target object and each candidate wifi according to the similarity list set and a preset priority list;
determining candidate wifi with the corresponding target similarity larger than a preset similarity threshold as a target wifi;
The first key user screening module is used for screening and obtaining first key users corresponding to the target object from all first candidate users according to the wifi interaction set, wherein the first key user screening module comprises the following sub-modules:
the first quantity acquisition sub-module is used for acquiring the first quantity of target wifi scanned by each first candidate user according to the wifi scanning sub-set corresponding to each first candidate user;
the second number obtaining sub-module is used for obtaining a second number of target wifi connected by each first candidate user according to the wifi connection sub-set corresponding to each first candidate user;
the selection probability acquisition sub-module is used for acquiring the selection probability corresponding to each first candidate user according to a first duty ratio of the first quantity corresponding to each first candidate user in the total quantity of the target wifi, a second duty ratio of the second quantity in the total quantity of the target wifi, a corresponding sum of scanning times, a corresponding sum of connection times, a first weight corresponding to the first duty ratio, a second weight corresponding to the second duty ratio, a third weight corresponding to the scanning times and a fourth weight corresponding to the connection times;
The first key user screening sub-module is used for determining a first candidate user corresponding to the selection probability as a first type key user when the selection probability is larger than a preset selection probability threshold value;
the second data acquisition module is used for acquiring an IP list corresponding to each first type key user and a user list corresponding to each candidate IP, wherein the IP list comprises a plurality of candidate IPs corresponding to each first type key user, and the user list comprises a plurality of second candidate users corresponding to each candidate IP;
the first target IP screening module is used for screening and obtaining first type target IP corresponding to the target object from all candidate IP according to the IP lists corresponding to all first type key users;
the second key user screening module is used for screening and obtaining second type key users corresponding to the target objects from all second candidate users according to user lists corresponding to all first type target IPs, wherein the number of the second type key users is greater than or equal to that of the first type key users;
the second target IP screening module is used for screening and obtaining N type target IPs corresponding to the target objects from all candidate IPs according to IP lists corresponding to all N type key users, wherein the number of the N type target IPs is greater than or equal to the number of N-1 type target IPs, N is an integer greater than 1, and when N=2, the N type key users are consistent with the second type key users;
The third key user screening module is used for screening and obtaining the N+1th type key users corresponding to the target object from all second candidate users according to the user list corresponding to all N type target IPs, wherein the number of the N+1th type key users is greater than or equal to that of the N type key users;
and the first target user screening module is used for determining the N+1th type key user as a target user when the number of the N+1th type key users is equal to the number of the N type key users.
7. A non-transitory computer readable storage medium having at least one instruction or at least one program stored therein, wherein the at least one instruction or the at least one program is loaded and executed by a processor to implement the target user screening method of any one of claims 1-5.
8. An electronic device comprising a processor and the non-transitory computer readable storage medium of claim 7.
CN202410057424.5A 2024-01-16 2024-01-16 Target user screening method, device, medium and equipment Active CN117573951B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410057424.5A CN117573951B (en) 2024-01-16 2024-01-16 Target user screening method, device, medium and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410057424.5A CN117573951B (en) 2024-01-16 2024-01-16 Target user screening method, device, medium and equipment

Publications (2)

Publication Number Publication Date
CN117573951A CN117573951A (en) 2024-02-20
CN117573951B true CN117573951B (en) 2024-04-12

Family

ID=89864718

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410057424.5A Active CN117573951B (en) 2024-01-16 2024-01-16 Target user screening method, device, medium and equipment

Country Status (1)

Country Link
CN (1) CN117573951B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105447044A (en) * 2014-09-02 2016-03-30 阿里巴巴集团控股有限公司 Method and device for determining user relationship
CN107896235A (en) * 2016-09-29 2018-04-10 腾讯科技(深圳)有限公司 Information-pushing method, device, network access equipment, terminal and social interaction server device
CN110335070A (en) * 2019-06-21 2019-10-15 北京淇瑀信息科技有限公司 A kind of method, apparatus and electronic equipment of the user group extension based on WIFI
CN110796488A (en) * 2019-10-22 2020-02-14 北京奇艺世纪科技有限公司 User extension method and device, electronic equipment and computer readable storage medium
CN111695047A (en) * 2020-04-27 2020-09-22 汉海信息技术(上海)有限公司 User clustering method and device, electronic equipment and storage medium
CN111814067A (en) * 2020-06-30 2020-10-23 北京百度网讯科技有限公司 Friend recommendation method, device, equipment and storage medium
CN112311612A (en) * 2019-07-29 2021-02-02 腾讯科技(深圳)有限公司 Family portrait construction method and device and storage medium
CN113114770A (en) * 2021-04-14 2021-07-13 每日互动股份有限公司 User identification method, electronic device, and computer-readable storage medium
CN114722290A (en) * 2022-04-15 2022-07-08 石河子大学 Trust-relationship-fused ranking learning POI recommendation algorithm
CN115115322A (en) * 2021-03-18 2022-09-27 腾讯科技(深圳)有限公司 Target group identification method, risk assessment method, apparatus, device and medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10304069B2 (en) * 2009-07-29 2019-05-28 Shopkick, Inc. Method and system for presentment and redemption of personalized discounts
CN106557942B (en) * 2015-09-30 2020-07-10 百度在线网络技术(北京)有限公司 User relationship identification method and device
US10540374B2 (en) * 2016-05-03 2020-01-21 Microsoft Technology Licensing, Llc Detecting social relationships from user activity logs
CN108446281B (en) * 2017-02-13 2021-03-12 北京嘀嘀无限科技发展有限公司 Method, device and storage medium for determining user intimacy

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105447044A (en) * 2014-09-02 2016-03-30 阿里巴巴集团控股有限公司 Method and device for determining user relationship
CN107896235A (en) * 2016-09-29 2018-04-10 腾讯科技(深圳)有限公司 Information-pushing method, device, network access equipment, terminal and social interaction server device
CN110335070A (en) * 2019-06-21 2019-10-15 北京淇瑀信息科技有限公司 A kind of method, apparatus and electronic equipment of the user group extension based on WIFI
CN112311612A (en) * 2019-07-29 2021-02-02 腾讯科技(深圳)有限公司 Family portrait construction method and device and storage medium
CN110796488A (en) * 2019-10-22 2020-02-14 北京奇艺世纪科技有限公司 User extension method and device, electronic equipment and computer readable storage medium
CN111695047A (en) * 2020-04-27 2020-09-22 汉海信息技术(上海)有限公司 User clustering method and device, electronic equipment and storage medium
CN111814067A (en) * 2020-06-30 2020-10-23 北京百度网讯科技有限公司 Friend recommendation method, device, equipment and storage medium
CN115115322A (en) * 2021-03-18 2022-09-27 腾讯科技(深圳)有限公司 Target group identification method, risk assessment method, apparatus, device and medium
CN113114770A (en) * 2021-04-14 2021-07-13 每日互动股份有限公司 User identification method, electronic device, and computer-readable storage medium
CN114722290A (en) * 2022-04-15 2022-07-08 石河子大学 Trust-relationship-fused ranking learning POI recommendation algorithm

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
利用数据分析关联用户信息的系统及实现方法;田丰;马晓亮;;电信技术;20180925(第09期);第24-28页 *

Also Published As

Publication number Publication date
CN117573951A (en) 2024-02-20

Similar Documents

Publication Publication Date Title
CN110377667B (en) Correlation map display method, device, computer equipment and storage medium
CN109992601B (en) To-do information pushing method and device and computer equipment
CN112765235A (en) Human resource intelligent management system based on feature recognition and big data analysis and cloud management server
CN114511019A (en) Sensitive data classification and grading identification method and system
CN111191123A (en) Business information pushing method and device, readable storage medium and computer equipment
CN110569321A (en) grid division processing method and device based on urban map and computer equipment
CN111177217A (en) Data preprocessing method and device, computer equipment and storage medium
CN110310127B (en) Recording acquisition method, recording acquisition device, computer equipment and storage medium
CN117573951B (en) Target user screening method, device, medium and equipment
CN114398315A (en) Data storage method, system, storage medium and electronic equipment
CN112419124B (en) Method and device for quickly identifying low-efficiency industrial land and storage medium thereof
CN117896771A (en) Target object screening method, device, medium and equipment
CN117896717A (en) Target wifi screening method, device, medium and equipment
CN115935231A (en) Data classification method, device, equipment and storage medium
CN111460268B (en) Method and device for determining database query request and computer equipment
CN111340580B (en) Method and device for determining house type, computer equipment and storage medium
CN109919811B (en) Insurance agent culture scheme generation method based on big data and related equipment
CN113660345A (en) Rapid positioning method, system, device and computer readable storage medium
CN113742344A (en) Method and device for indexing power system data
CN113010310A (en) Job data processing method and device and server
CN112532414A (en) Method, device and equipment for determining ISP attribution and computer storage medium
CN117574177B (en) Data processing method, device, medium and equipment for user wire expansion
CN113354004B (en) Sewage treatment method and system based on Internet and big data
CN110633430A (en) Event discovery method, device, equipment and computer readable storage medium
CN113313095B (en) User information matching method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant