CN117708141A - Internet user identification method, electronic equipment and storage medium - Google Patents

Internet user identification method, electronic equipment and storage medium Download PDF

Info

Publication number
CN117708141A
CN117708141A CN202311370133.3A CN202311370133A CN117708141A CN 117708141 A CN117708141 A CN 117708141A CN 202311370133 A CN202311370133 A CN 202311370133A CN 117708141 A CN117708141 A CN 117708141A
Authority
CN
China
Prior art keywords
user
user identification
information
element information
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311370133.3A
Other languages
Chinese (zh)
Inventor
李林林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CITIC Aibank Corp Ltd
Original Assignee
CITIC Aibank Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CITIC Aibank Corp Ltd filed Critical CITIC Aibank Corp Ltd
Priority to CN202311370133.3A priority Critical patent/CN117708141A/en
Publication of CN117708141A publication Critical patent/CN117708141A/en
Pending legal-status Critical Current

Links

Abstract

The invention provides an internet user identification method, electronic equipment and a storage medium, wherein the method comprises the following steps: generating or updating an ID Mapping instance by using a data warehouse; generating or updating an ID Mapping instance according to the real-time user behavior, wherein generating or updating the ID Mapping instance using the data warehouse comprises: acquiring user behavior data from a data warehouse and removing repeated user behavior data; filtering the user identification information, and classifying the user identification information as a first user identification or a second user identification respectively; establishing identification aggregation among user identification information according to the user behavior data; and respectively judging whether each first user identifier and each second user identifier in the identifier aggregation have corresponding element information in the ID Mapping example, and if so, updating the element information. The invention has the advantages that: the method solves the problems of different channels, different ecologies and different identity marks of the same user.

Description

Internet user identification method, electronic equipment and storage medium
Technical Field
The present invention relates to the field of data analysis technologies, and in particular, to an internet user identification method, an electronic device, and a storage medium.
Background
With the development of information technology, in order to meet the diverse mental culture requirements of people, more and more application programs are applied inside and outside various organizations, so that massive data are also generated. The data includes behavior data of a plurality of different types of user identifications. These data appear to be isolated, but there is a correlation. How to identify the behavior of the same user or main body from a plurality of data sources and massive data and a complex relation network, and connect the fragmented user behavior characteristics in different application or functional modules in series, thereby completely and accurately describing the user portrait, and being the problem to be solved by the ID Mapping technology.
In the network financial services industry, it is a common model to provide customers with a variety of different services through a variety of different channels. Different channels often have different developers, are maintained by different service providers, and store data on different servers. The same user can use different account numbers and equipment in different channel services, and the problem of the identity identification of the same user cannot be accurately solved in the two prior art, so that the identity of the user cannot be identified by a financial enterprise, and a unique identity identification universal to the whole life cycle of the whole domain cannot be generated for the user. The financial enterprises cannot obtain complete user images, and cannot accurately identify the customer requirements to provide special fixed-value services for the customers.
There is a need in the art to provide an internet user identification method, an electronic device and a storage medium that overcome the drawbacks of the prior art.
Disclosure of Invention
The invention provides an internet user identification method, electronic equipment and a storage medium. It can solve the problem that prior art exists. The aim of the invention is achieved by the following technical scheme.
In a first aspect, an embodiment of the present invention provides an internet user identification method, which includes the steps of:
step 1: generating or updating an ID Mapping instance by using a data warehouse; and
step 2: an ID Mapping instance is generated or updated based on real-time user behavior,
wherein, step 1: generating or updating an ID Mapping instance using a data warehouse includes the steps of:
step 11: acquiring user behavior data from a data warehouse and removing repeated user behavior data, wherein the user behavior data comprises user identification information;
step 12: filtering the user identification information, and classifying the user identification information as a first user identification or a second user identification respectively;
step 13: establishing an identification aggregation among the user identification information according to the user behavior data, wherein the identification aggregation is a set of a first user identification and a second user identification, and the first user identification and the second user identification in the same identification aggregation correspond to the same user;
step 14: judging whether an ID Mapping example corresponding to a first user identifier in the identifier aggregation exists, if yes, executing a step 15;
step 15: judging whether each first user identifier and each second user identifier in the identifier aggregation have corresponding element information in the ID Mapping example, if yes, executing the step 16; and
step 16: the element information is updated.
According to the internet user identification method provided by the embodiment of the invention, the method comprises the following steps: generating or updating an ID Mapping instance according to real-time user behavior comprises the following steps:
step 21: acquiring user identification information from the real-time user behavior, judging whether the user identification information contains identity card information, and executing step 22 if yes;
step 22: filtering the user identification information, and classifying the user identification information as a first user identification or a second user identification respectively;
step 23: judging whether the vid information corresponding to the first user identification in the user identification information exists or not, if yes, executing step 23; and
step 24: the element information is updated.
According to the internet user identification method provided by the embodiment of the invention, the first user identifications have priorities, and the priorities of different first user identifications are different.
According to the internet user identification method provided by the embodiment of the invention, the method comprises the following steps: judging whether each first user identifier and each second user identifier in the identifier aggregation have corresponding element information in the ID Mapping example, if not, executing the step 17;
step 17: and executing element information generation processing, wherein the element information generation processing generates corresponding element information according to the first user identification and the second user identification.
According to the internet user identification method provided in the above-described one embodiment of the present invention, the execution element information generation process includes the steps of:
step 41: generating corresponding xid according to the first user identifier and establishing corresponding element information; and
step 42: and establishing corresponding element information according to the second user identifier.
According to the internet user identification method provided by the above embodiment of the present invention, step 14: judging whether an ID Mapping example corresponding to the first user identifier in the identifier aggregation exists, if not, executing the step 18;
step 18: executing element information generation processing;
step 19: and setting the xid of the first user identifier with the highest priority in the identifier aggregation as the vid and establishing corresponding vid element information.
According to the internet user identification method provided by the above embodiment of the present invention, step 21: acquiring user identification information from the real-time user behavior, judging whether the user identification information contains identity card information, if not, executing step 25;
step 25: judging whether each first user identification and each second user identification in the user identification information have corresponding element information in the ID Mapping example, if yes, executing step 24; if no, go to step 26;
step 26: the element information generation process is executed.
According to the internet user identification method provided by the above embodiment of the present invention, step 23: judging whether the vid information corresponding to the first user identification in the user identification information exists or not, if not, executing step 27;
step 27: executing element information generation processing; and
step 28: and setting xid of the first user identification with the highest priority in the user identification information as vid and establishing corresponding vid element information.
According to the internet user identification method provided by the embodiment of the invention, the repeated user behavior data is removed, and the user identification information is the same and the user behaviors are the same in the user behavior data.
According to the internet user identification method provided by the embodiment of the invention, the first user identification is user identification information associated with the real identity of the user.
According to the internet user identification method provided by the embodiment of the invention, the element information corresponding to the second user identification comprises a reliable value, and the reliable value is set or adjusted according to the user behavior data and the real-time user behavior in the data warehouse.
The method for identifying internet users according to the above embodiment of the present invention, wherein step 42: establishing corresponding element information according to the second user comprises setting a reliable value corresponding to the second user in the element information according to the user behavior of the second user.
In a second aspect, one embodiment of the present invention provides an electronic device, including:
one or more processors;
a storage device having one or more programs stored thereon,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the internet user identification method as described above.
In a third aspect, an embodiment of the present invention provides a computer-readable storage medium having stored thereon a computer program, wherein the computer program, when executed by one or more processors, implements the aforementioned internet user identification method.
The internet user identification method, the electronic equipment and the storage medium according to the embodiment of the invention have the advantages that: the method solves the problems of different channels, different ecologies and different identity marks of the same user, and associates different identity elements (equipment ID, identity card, mobile phone number, micro signal, identity ID of different channels and the like) of the user onto a unique ID (vid), wherein the ID is mapped with the identity elements of the whole channel along with the whole life cycle of the user, and is unique and unchanged; the global ID-Mapping service is provided for the outside, so that a user is provided with a cross-user life cycle, and a powerful support is provided for cross-channel marketing; the identity element can be updated in real time, the reliability value of the identity element can be updated in time, and the user identity recognition accuracy is improved.
Drawings
Other features, objects and advantages of the present invention will become more apparent from the detailed description of non-limiting embodiments of the invention given below with reference to the accompanying drawings.
FIG. 1 shows a flow chart of an Internet user identification method according to one embodiment of the invention;
FIG. 2 shows a flowchart of an example of generating or updating an ID Mapping using a data warehouse, as shown in FIG. 1, according to one embodiment of the present invention;
FIG. 3 shows a flowchart of an example of generating or updating an ID Mapping according to real-time user behavior as shown in FIG. 1 according to one embodiment of the present invention;
FIG. 4 shows a flowchart of an execution element information generation process according to an embodiment of the present invention as shown in FIG. 1;
fig. 5 shows a schematic diagram of a computer system of an electronic device for implementing an embodiment of the invention.
Detailed Description
The following description of the embodiments of the present invention is given by way of illustration and example only, and the technical solution, problems and effects achieved by the present invention will be apparent to those skilled in the art from the description of the present invention. It is to be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. In addition, for convenience of description, only a portion related to the present invention is shown in the drawings.
It should be noted that, the structures, proportions, sizes, etc. shown in the drawings are only used for being matched with those described in the specification for understanding and reading, and are not intended to limit the conditions under which the present invention can be implemented, so that the present invention has no technical significance, and any modification of structures, changes in proportions or adjustment of sizes, without affecting the efficacy and achievement of the present invention, should fall within the scope covered by the technical content disclosed in the present invention.
References to words such as "first," "second," "the," and the like are not intended to be limiting in number, but rather may be singular or plural. The terms "comprising," "including," "having," and any variations thereof, are intended to cover a non-exclusive inclusion; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules is not limited to only those steps or units listed but may include additional steps or units not listed or inherent to such process, method, article, or apparatus. The terms "connected," "coupled," and the like in connection with the present invention are not limited to physical or mechanical connections, but may also include direct or indirect electrical connections.
In a financial business scene, after a business system submits a wind control request, the wind control system performs data integration and message assembly for a rule engine to perform model strategy calculation, so that a wind control conclusion is obtained. Based on the digital twin ideas, mapping the real financial business scene to automatically generated test data, and carrying out conceptual abstraction and representation on data and data relations in the wind control business. The invention adopts a full-element multi-level mapping scheme from real to virtual to divide data in a service scene into three levels of metadata of indexes, entities and cases from bottom to top in sequence by defining data layering, verifying data standard and realizing data algorithm, completes mapping from real to virtual, carries out convergent data derivation, forms test data and constructs data for risk model test.
FIG. 1 shows a flow chart of an Internet user identification method according to one embodiment of the invention;
FIG. 2 shows a flowchart of an example of generating or updating an ID Mapping using a data warehouse, as shown in FIG. 1, according to one embodiment of the present invention; FIG. 3 shows a flowchart of an example of generating or updating an ID Mapping from real-time user behavior according to one embodiment of the present invention as shown in FIG. 1. As shown in fig. 1-3, the internet user identification method includes a plurality of steps:
step 1: generating or updating an ID Mapping instance by using a data warehouse; and
step 2: an ID Mapping instance is generated or updated based on real-time user behavior,
wherein, step 1: generating or updating an ID Mapping instance using a data warehouse includes the steps of:
step 11: acquiring user behavior data from a data warehouse and removing repeated user behavior data, wherein the user behavior data comprises user identification information;
step 12: filtering the user identification information, and classifying the user identification information as a first user identification or a second user identification respectively; wherein the first user identification is user identification information associated with a real identity of the user, and the element of the user identity can be determined through the first user identification, including but not limited to: an identity card, a micro signal; the second user identification is not directly associated with the real identity of the user, from which the user identity cannot be determined, including but not limited to: device number, handset number, network account name. The same user can correspond to a plurality of first user identifications and a plurality of second user identifications; different users cannot correspond to the same first user identification, but can correspond to the same second user identification; for example: different users can simultaneously correspond to the same equipment number and the same mobile phone number, but different users cannot simultaneously correspond to the same identity card number or the same micro signal;
step 13: establishing an identification aggregation among the user identification information according to the user behavior data, wherein the identification aggregation is a set of first user identifications and second user identifications, and the first user identifications and the second user identifications in the same identification aggregation correspond to the same user; for example: in a process of establishing an identification aggregation between user identification information based on user behavior data, the user identification information of one user behavior data contains a first user identification a and a second user identification B, denoted as (a, B), and the user identification information of the other user behavior data contains a second user identification B and a second user identification C, denoted as (B, C), and the identification aggregation (a, B, C) can be established based on the user behavior data;
step 14: judging whether an ID Mapping example corresponding to a first user identifier in the identifier aggregation exists, if yes, executing a step 15;
step 15: judging whether each first user identifier and each second user identifier in the identifier aggregation have corresponding element information in the ID Mapping example, if yes, executing the step 16; and
step 16: the element information is updated.
According to the internet user identification method provided by the embodiment of the invention, the ID Mapping example comprises a plurality of xid and a vid, each user corresponds to a unique vid, each user corresponds to one or a plurality of xid, and each xid corresponds to a first user identification of the user.
According to the internet user identification method provided by the embodiment of the invention, the method comprises the following steps: generating or updating an ID Mapping instance according to real-time user behavior comprises the following steps:
step 21: acquiring user identification information from the real-time user behavior, judging whether the user identification information contains identity card information, and executing step 22 if yes;
step 22: filtering the user identification information, and classifying the user identification information as a first user identification or a second user identification respectively;
step 23: judging whether the vid information corresponding to the first user identification in the user identification information exists or not, if yes, executing step 23; and
step 24: the element information is updated.
According to the internet user identification method provided by the embodiment of the invention, the first user identifications have priorities, different priorities are distinguished, and the priorities of the different first user identifications are different.
According to the internet user identification method provided by the embodiment of the invention, the method comprises the following steps: judging whether each first user identifier and each second user identifier in the identifier aggregation have corresponding element information in the ID Mapping example, if not, executing the step 17;
step 17: and executing element information generation processing, wherein the element information generation processing generates corresponding element information according to the first user identification and the second user identification.
According to the internet user identification method provided by the above embodiment of the present invention, step 14: judging whether an ID Mapping example corresponding to the first user identifier in the identifier aggregation exists, if not, executing the step 18;
step 18: executing element information generation processing;
step 19: and setting the xid of the first user identifier with the highest priority in the identifier aggregation as the vid and establishing corresponding vid element information.
According to the internet user identification method provided by the above embodiment of the present invention, step 21: acquiring user identification information from the real-time user behavior, judging whether the user identification information contains identity card information, if not, executing step 25;
step 25: judging whether each first user identification and each second user identification in the user identification information have corresponding element information in the ID Mapping example, if yes, executing step 24; if no, go to step 26;
step 26: the element information generation process is executed.
According to the internet user identification method provided by the above embodiment of the present invention, step 23: judging whether the vid information corresponding to the first user identification in the user identification information exists or not, if not, executing step 27;
step 27: executing element information generation processing; and
step 28: and setting xid of the first user identification with the highest priority in the user identification information as vid and establishing corresponding vid element information.
According to the internet user identification method provided by the embodiment of the invention, the repeated user behavior data is removed, and the user identification information is the same and the user behaviors are the same in the user behavior data.
According to the internet user identification method provided by the embodiment of the invention, the element information corresponding to the second user identification comprises a reliable value, and the reliable value is set or adjusted according to the user behavior data and the real-time user behavior in the data warehouse.
The method for identifying internet users according to the above embodiment of the present invention, wherein step 42: the element information corresponding to the second user identifier is established according to the second user identifier, and the reliable value corresponding to the second user identifier in the element information is set according to the user behavior of the second user identifier. In one embodiment, the second user identities may be analyzed to derive an unreliable initial value by retrieving the proportion of the first user identities mapped by all the second user identities. Such as: the device number 1 corresponds to two identity card elements at the same time, by inquiring that the behavior data of the corresponding identity card 101 accounts for 90% of the behavior data of all the devices 201, and the behavior data of the corresponding identity card 101 accounts for 10% of the behavior data of all the devices 201, when 2 examples are generated, the reliable value of the element information of the corresponding identity card 101 corresponding to the devices 201 is 90, and the reliable value of the element information of the corresponding identity card 102 corresponding to the devices 201 is 10.
According to the internet user identification method provided by the above embodiment of the present invention, the updating the element information includes updating the reliability value corresponding to the second user identifier, for example: when the user behavior data of the first user identification using device 201 corresponding to the identity card 101 is retrieved, updating the reliable value of the device 201 corresponding to the identity card 101, and adding 10 to the value; while the reliability value of the other identity card 102 bound to this device 201 is subtracted by 10; 100 may be set to a full value of the reliable value, and when the reliable value of a certain second user identifier is 0, the corresponding second user identifier is deleted.
According to the internet user identification method provided by the embodiment of the invention, the correspondence between vid and xid, the first user identification and the second user identification can be recorded or represented by a mapping table, each user corresponds to a unique vid, and each vid can be respectively compared with xid, the first user identification and the second user identification in a ratio of 1:1 or 1: n. For example: 1 vid is mapped with the ID card number in a mode of 1:1; 1 vid can be compared with the number of the mobile phone by 1: n mode mapping; 1 vid can also be a combination of xid and 1: n, where N xid may correspond to an identification card number, a micro signal, etc., respectively.
Fig. 4 shows a flowchart of the execution element information generation process according to an embodiment of the present invention as shown in fig. 1. As shown in fig. 4, the execution element information generation process includes the steps of:
step 41: generating corresponding xid according to the first user identifier and establishing corresponding element information; and
step 42: and establishing corresponding element information according to the second user identifier.
In a second aspect, one embodiment of the present invention provides an electronic device, including:
one or more processors;
a storage device having one or more programs stored thereon,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the internet user identification method as described above.
Fig. 2 shows a schematic diagram of the structure of a computer system of an electronic device for implementing an embodiment of the invention. The computer system 500 shown in fig. 3 is merely an example, and should not be construed as limiting the functionality and scope of use of embodiments of the present invention. As shown in fig. 3, the computer system 500 may include a processing device (e.g., a central processing unit, a graphics processor, etc.) 501 that may perform various suitable actions and processes in accordance with programs stored in a Read Only Memory (ROM) 502 or loaded from a storage device 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data required for the operation of the computer system 500 are also stored. The processing device 501, the ROM 502, and the RAM 503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
In general, the following devices may be connected to the I/O interface 505: input devices 506 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, etc.; an output device 507 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 508 including, for example, magnetic tape, hard disk, etc.; and communication means 509. The communication means 509 may allow the computer system 500 to communicate with other devices wirelessly or by wire to exchange data. While fig. 3 illustrates a computer system 500 having electronic devices with various means, it should be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present invention, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present invention include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowchart of fig. 1. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 509, or from the storage means 508, or from the ROM 502. The above-described functions defined in the method of the embodiment of the present invention are performed when the computer program is executed by the processing means 501.
The computer readable medium of the present invention may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
The computer readable medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to implement a legal repository retrieval method as shown in the embodiment and alternative implementations of fig. 2.
Computer program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Python, java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The internet user identification method, the electronic equipment and the storage medium according to the embodiment of the invention have the advantages that: the method solves the problems of different channels, different ecologies and different identity marks of the same user, and associates different identity elements (equipment ID, identity card, mobile phone number, micro signal, identity ID of different channels and the like) of the user onto a unique ID (vid), wherein the ID is mapped with the identity elements of the whole channel along with the whole life cycle of the user, and is unique and unchanged; the global ID-Mapping service is provided for the outside, so that a user is provided with a cross-user life cycle, and a powerful support is provided for cross-channel marketing; the identity element can be updated in real time, the reliability value of the identity element can be updated in time, and the user identity recognition accuracy is improved.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
While the invention has been described and illustrated with reference to specific embodiments thereof, the description and illustration is not intended to be limiting. It will be apparent to those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the invention as defined in the claims. There may be a distinction between technical reproduction in the present invention and actual equipment due to variables in the manufacturing process, etc. Other embodiments of the invention not specifically illustrated may exist. The specification and figures are to be regarded in an illustrative rather than a restrictive sense, and all such modifications are intended to be included within the scope of the present invention as defined in the appended claims. Although the methods disclosed herein have been described with reference to particular operations being performed in a particular order, it should be understood that these operations may be rearranged, sub-divided, or arranged to form an equivalent method without departing from the teachings of the invention. Thus, the order and grouping of the operations is not a limitation of the present invention unless specifically indicated herein.

Claims (14)

1. An internet user identification method, characterized in that it comprises a plurality of steps:
step 1: generating or updating an ID Mapping instance by using a data warehouse; and
step 2: an ID Mapping instance is generated or updated based on real-time user behavior,
wherein, step 1: generating or updating an ID Mapping instance using a data warehouse includes the steps of:
step 11: acquiring user behavior data from a data warehouse and removing repeated user behavior data, wherein the user behavior data comprises user identification information;
step 12: filtering the user identification information, and classifying the user identification information as a first user identification or a second user identification respectively;
step 13: establishing an identification aggregation among the user identification information according to the user behavior data, wherein the identification aggregation is a set of a first user identification and a second user identification, and the first user identification and the second user identification in the same identification aggregation correspond to the same user;
step 14: judging whether an ID Mapping example corresponding to a first user identifier in the identifier aggregation exists, if yes, executing a step 15;
step 15: judging whether each first user identifier and each second user identifier in the identifier aggregation have corresponding element information in the ID Mapping example, if yes, executing the step 16; and
step 16: the element information is updated.
2. The internet user identification method according to claim 1, wherein step 2: generating or updating an ID Mapping instance according to real-time user behavior comprises the following steps:
step 21: acquiring user identification information from the real-time user behavior, judging whether the user identification information contains identity card information, and executing step 22 if yes;
step 22: filtering the user identification information, and classifying the user identification information as a first user identification or a second user identification respectively;
step 23: judging whether the vid information corresponding to the first user identification in the user identification information exists or not, if yes, executing step 23; and
step 24: the element information is updated.
3. The internet user identification method of claim 2 wherein the first user identifications have priorities and the priorities of the different first user identifications are different.
4. The internet user identification method according to claim 3, wherein step 15: judging whether each first user identifier and each second user identifier in the identifier aggregation have corresponding element information in the ID Mapping example, if not, executing the step 17;
step 17: and executing element information generation processing, wherein the element information generation processing generates corresponding element information according to the first user identification and the second user identification.
5. The internet user identification method according to claim 4, wherein the execution element information generation process includes the steps of:
step 41: generating corresponding xid according to the first user identifier and establishing corresponding element information; and
step 42: and establishing corresponding element information according to the second user identifier.
6. The internet user identification method according to claim 5, wherein step 14: judging whether an ID Mapping example corresponding to the first user identifier in the identifier aggregation exists, if not, executing the step 18;
step 18: executing element information generation processing;
step 19: and setting the xid of the first user identifier with the highest priority in the identifier aggregation as the vid and establishing corresponding vid element information.
7. The internet user identification method according to claim 6, wherein step 21: acquiring user identification information from the real-time user behavior, judging whether the user identification information contains identity card information, if not, executing step 25;
step 25: judging whether each first user identification and each second user identification in the user identification information have corresponding element information in the ID Mapping example, if yes, executing step 24; if no, go to step 26;
step 26: the element information generation process is executed.
8. The internet user identification method as set forth in claim 7, wherein step 23: judging whether the vid information corresponding to the first user identification in the user identification information exists or not, if not, executing step 27;
step 27: executing element information generation processing; and
step 28: and setting xid of the first user identification with the highest priority in the user identification information as vid and establishing corresponding vid element information.
9. The internet user identification method of claim 1, wherein removing duplicate user behavior data means removing data having identical user identification information and identical user behavior from the user behavior data.
10. The internet user identification method of claim 1, wherein the first user identification is user identification information associated with a real identity of the user.
11. The internet user identification method of claim 5, wherein the element information corresponding to the second user identification includes a reliability value, and the reliability value is set or adjusted according to the user behavior data and the real-time user behavior in the data warehouse.
12. The internet user identification method of claim 11, wherein step 42: establishing corresponding element information according to the second user comprises setting a reliable value corresponding to the second user in the element information according to the user behavior of the second user.
13. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon,
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-12.
14. A computer readable storage medium, on which a computer program is stored, which computer program, when being executed by one or more processors, implements the method of any of claims 1-12.
CN202311370133.3A 2023-10-20 2023-10-20 Internet user identification method, electronic equipment and storage medium Pending CN117708141A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311370133.3A CN117708141A (en) 2023-10-20 2023-10-20 Internet user identification method, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311370133.3A CN117708141A (en) 2023-10-20 2023-10-20 Internet user identification method, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117708141A true CN117708141A (en) 2024-03-15

Family

ID=90152211

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311370133.3A Pending CN117708141A (en) 2023-10-20 2023-10-20 Internet user identification method, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117708141A (en)

Similar Documents

Publication Publication Date Title
CN108427939B (en) Model generation method and device
CN110008045B (en) Method, device and equipment for aggregating microservices and storage medium
CN111522927B (en) Entity query method and device based on knowledge graph
CN111813804B (en) Data query method and device, electronic equipment and storage medium
CN110222775A (en) Image processing method, device, electronic equipment and computer readable storage medium
CN113592535B (en) Advertisement recommendation method and device, electronic equipment and storage medium
CN109241722A (en) For obtaining method, electronic equipment and the computer-readable medium of information
CN111563257A (en) Data detection method and device, computer readable medium and terminal equipment
CN111258998A (en) Data verification method, device, medium and electronic equipment
CN113918659A (en) Data operation method and device, storage medium and electronic equipment
CN113282590A (en) Interface joint debugging method and device based on 5G message
CN109840072B (en) Information processing method and device
CN111813685A (en) Automatic testing method and device
WO2023078078A1 (en) Unified data security labeling framework
CN117708141A (en) Internet user identification method, electronic equipment and storage medium
CN114239511A (en) Method and apparatus for filling data
CN111899747B (en) Method and apparatus for synthesizing audio
CN108415849A (en) Method and apparatus for test application
US10185747B2 (en) Presenting publisher data sets in context
CN111581431B (en) Data exploration method and device based on dynamic evaluation
CN110119721B (en) Method and apparatus for processing information
US9412070B2 (en) Automatically deriving context when extracting a business rule
CN112988583A (en) Method and device for testing syntax compatibility of database
CN112131379A (en) Method, device, electronic equipment and storage medium for identifying problem category
CN117435963B (en) Digital asset fraud group determination method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination