WO2014046934A1 - Determining a uniform user identifier for a visiting user - Google Patents
Determining a uniform user identifier for a visiting user Download PDFInfo
- Publication number
- WO2014046934A1 WO2014046934A1 PCT/US2013/059186 US2013059186W WO2014046934A1 WO 2014046934 A1 WO2014046934 A1 WO 2014046934A1 US 2013059186 W US2013059186 W US 2013059186W WO 2014046934 A1 WO2014046934 A1 WO 2014046934A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access
- user
- information loss
- loss rate
- access set
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/2866—Architectures; Arrangements
- H04L67/30—Profiles
- H04L67/306—User profiles
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/535—Tracking the activity of the user
Definitions
- the present application relates to the field of Internet technology.
- the present application relates to techniques for determining identifying information associated with users.
- the various websites need to determine a unique identifier for each unique user and use the unique identifier as a basis for exchanging the user data of this particular user.
- requests may be sent to a central server to request unique identifiers for the users.
- the central server generates unique identifiers corresponding to the users based on user information included in the requests sent by the websites and sends these generated unique identifiers back to the various websites.
- the websites then write these unique identifiers into user client cookies.
- the websites then exchange user data on the basis of the unique identifiers.
- the central servers that generate unique identifiers corresponding to the users are operated by third parties, which could make the user information that is sent and/or received from the third party central servers vulnerable to security intrusions.
- FIG. 1 is a diagram showing an embodiment of a system for determining a uniform user identifier for a user.
- FIG. 2 is a flow diagram showing an embodiment of a process for determining a uniform user identifier for a user.
- FIG. 3 is a flow diagram showing an example of determining the information loss rate for an access set.
- FIG. 4 shows a diagram of correspondences between preliminary user identifiers Bl, B2, and B3 and access subsets [Al, CI, IP1] and [Al, C2, IP1] of an example.
- FIG. 5 is a diagram showing an embodiment of a system for determining a uniform user identifier for a visiting user.
- the invention can be implemented in numerous ways, including as a process; an apparatus; a system; a composition of matter; a computer program product embodied on a computer readable storage medium; and/or a processor, such as a processor configured to execute instructions stored on and/or provided by a memory coupled to the processor.
- these implementations, or any other form that the invention may take, may be referred to as techniques.
- the order of the steps of disclosed processes may be altered within the scope of the invention.
- a component such as a processor or a memory described as being configured to perform a task may be implemented as a general component that is temporarily configured to perform the task at a given time or a specific component that is manufactured to perform the task.
- the term 'processor' refers to one or more devices, circuits, and/or processing cores configured to process data, such as computer program instructions.
- Access requests submitted by various visiting users are received.
- the access requests may be received by a website from one or more visiting users.
- An access request includes a header field and the header field includes various elements and corresponding values.
- Access sets are generated based on different combinations of one or more header field elements and a network address identifier (e.g., an Internet Protocol address).
- a number of access requests (e.g., associated with a specified data flow range) associated with each access set is examined to determine the associated information loss rate.
- a particular access set (e.g., associated with the lowest information loss rate) is used to determine a uniform user identifier for each unique visiting user.
- a "uniform user identifier" comprises a unique user identifier for a visiting user that can be used to identify that visiting user across one or more websites.
- different types of user data may be stored for the same user by different websites. For example, there may be keyword search data associated with a user stored at a search website, there may be access data for various channel pages associated with the user stored at a portal website, and there may be browsing, bookmarking, and transaction data associated with the user stored at an e-business website. Therefore, each website may separately store different data on the same user, but different websites may keep different identifying information on the same user. Therefore, it would be desirable to determine a uniform user identifier that uniquely identifies the same user across multiple websites. After a uniform user identifier is determined for each user, the uniform user identifier can be used by the various websites to identify and exchange the different data stored by different websites for the same user.
- the data aggregated across various websites creates a more complete profile of the user's preferences and/or historical activities. After such exchanging of data, the various websites can then optimize searches, personalize page pushing, optimize advertisement pushing, and/or otherwise customize interaction with a particular user based on the different data aggregated on the user from various websites.
- FIG. 1 is a diagram showing an embodiment of a system for determining a uniform user identifier for a user.
- system 100 includes client device 102, network 104, and website servers 106, 108, and 110.
- Network 104 includes high-speed data networks and/or telecommunications networks.
- Client device 102 is configured to communicate to each of website servers 106, 108, and 110 over network 104.
- Website servers 106, 108, and 110 are configured to communicate to each other over network 104.
- Each website server such as website servers 106, 108, and 110, for example, is associated with hosting a different website.
- Examples of websites include an e-commerce website, a search engine, and/or a news website.
- Users may visit the websites associated with one or more of website servers 106, 108, and 110 using client devices such as client device 102.
- client device 102 is shown to be a laptop computer, other examples of client device 102 include a desktop computer, a smart phone, a mobile device, a tablet device and any other type of computing device.
- a user may open a web browser application executing at a client device and direct the browser application to a web address associated with such a website.
- a user's interaction with each website may cause the user's client device to send one or more access requests for the desired data to the appropriate website server.
- One or more users may use the same client device or different client devices to send access requests to the website server(s).
- Each of website servers 106, 108, and 110 is configured to store user data (e.g., associated with the user's historical activities at the website) associated with the visiting users within a database, for example, corresponding to that website server. However, each of website servers 106, 108, and 110 may assign a different identifier (for example, a preliminary user identifier) to the same user (e.g., based on a naming scheme that is configured for that website).
- website servers 106, 108, and 110 assign identifiers to users, it is difficult for website servers 106, 108, and 110 to exchange the user data that it has stored with other website servers. This is because the different naming schemes make it difficult to determine which user data stored by a first website server corresponds to the same user whose user data is stored by another website server.
- each of website servers 106, 108, and 110 might send at least some user data to a third party server that is associated with generating a unique identifier for a user. However, sending and receiving information with the third party server may not be secure.
- one or more website servers such as website servers 106, 108, and 110, is enabled to determine a uniform user identifier for each visiting user that is recognized by multiple website servers without the use of a third party unique identifier generating server.
- a determined uniform user identifier may be recognized by multiple website servers to uniquely represent one visiting user. Therefore, each of multiple website servers may store user data associated with a user's uniform user identifier and exchange stored data with each other based on the user's uniform user identifier.
- each such website may provide a better, more customized/optimized user experience for a visiting user based on data collected by other websites.
- FIG. 2 is a flow diagram showing an embodiment of a process for determining a uniform user identifier for a user.
- process 200 may be implemented at one or more website servers 106, 108, and 110 of system 100.
- Process 200 is used to determine a uniform user identifier for each of at least a subset of visiting users that have submitted access requests.
- a uniform user identifier associated with a user comprises a combination of a network address identifier and the respective value(s) corresponding to at least one access request header field elements.
- process 200 is implemented for one or more websites that exchange stored user data with each other.
- stored user data may include data associated with historical user activities and user preferences.
- process 200 is implemented by each website such that each website would determine the same uniform user identifier for the same visiting user.
- a website may store data and associate it with a particular user if the data matches the uniform user identifier associated with the user.
- access requests submitted by a plurality of visiting users are received, wherein each access request includes a preliminary user identifier, a network address identifier, and a plurality of header field elements, as will be described below.
- An example of an access request is a Hypertext Transfer Protocol (HTTP) request that is sent from a client device associated with one or more users.
- HTTP Hypertext Transfer Protocol
- an access request includes a preliminary user identifier of the visiting user associated with the access request, a network address identifier, and various values corresponding to the various elements of the header field of the access request.
- the preliminary user identifier of the user can be the user cookie identifier.
- the preliminary user identifier is not necessarily the same as the uniform user identifier of a user because the uniform user identifier may identify the same user across different websites, while the same user may be associated with a different preliminary user identifier (e.g., cookie identifier) at each website.
- the network address identifier can be the Internet Protocol (IP) address corresponding to the visiting user.
- the header field of the access request may include at least one of the following elements: Accept-Language (user-accepted language) information, Accept-Encoding (user-accepted encoding) information, User- Agent (user client) information, and one or more types of user client information.
- Accept-Language user-accepted language
- Accept-Encoding user-accepted encoding
- User- Agent user client
- Example types of user client information include: UA-Pixels (user client pixels) information, UA-Color (user client color) information, UA-OS (user client operating system) information, and UA-CPU (user client central processing unit) information.
- an access request may be associated with a protocol different than HTTP.
- a plurality of access sets is generated based at least in part on the network address identifier and the plurality of header field elements, wherein an access request includes the network address identifier and at least some of the plurality of header field elements.
- An access set comprises a network address identifier and at least one header field element.
- Multiple access sets may be generated based on a network address identifier and one or more different combinations of one or more header field elements. In some embodiments, at least a subset of all possible header field elements is selected from which to form such combinations to include in various access sets.
- A, B, C and D are used to respectively represent the four selected header field elements of Accept-Language, Accept-Encoding, User-Agent, and user client information of an access request.
- IPl network address identifier
- the determined access sets include: [A, IPl], [B, IPl], [C, IPl], [D, IPl], [A, B, IPl], [A, C, IPl], [A, D, IPl], [B, C, IPl], [B, D, IPl], [C, D, IPl], [A, B, C, IPl], [A, B, D, IPl], [A, C, D, IPl], [B, C, D, IPl], [A, B, C, D, IPl], [A, B, C, D, IPl], [A, B, C, D, IPl], [A, B, C, D, IPl].
- information loss rates corresponding to respective ones of at least a subset of the plurality of access sets are determined based at least in part on the access requests.
- a data flow range is specified (e.g., by a system
- the specified data flow range comprises a number of access requests that is received over a specified interval of time to use to determine the information loss rate corresponding to the access set.
- the specified data flow range can be configured as the number of access requests that are received within an interval of one day.
- Data flows received at an e-commerce website may include one or more of the following example types: data flows associated with interactions between the logon page and users, data flows associated with interactions between product browsing pages and users, and data flows associated with product transaction pages and users.
- a different data flow range may be specified for each different type of data flow.
- the information loss rate determined for an access set using the specified data flow range may represent the predicted accuracy or confidence level of using this access set to determine a uniform user identifier for each of various visiting users. That is, the lower the information loss rate that is determined for this access set, the greater the predicted accuracy of using this access set to determine uniform user identifiers to uniquely represent various visiting users. Conversely, the higher the information loss rate that is determined for this access set, the lower the predicted accuracy of using this access set to determine uniform user identifiers to uniquely represent various visiting users. As will be described in further detail below, the information loss rate represents the predicted loss of accuracy associated with using the corresponding access set to determine uniform user identifiers for the visiting users.
- an access set from the plurality of access sets is selected based at least in part on the respective information loss rate to use to determine a uniform user identifier corresponding to a visiting user of the plurality of visiting users.
- an access set is selected to use to determine uniform user identifiers corresponding to various visiting users.
- the access set associated with the lowest loss information rate (and therefore the highest predicted accuracy that the access set will yield uniform user identifiers that uniquely represent various visiting users) is selected.
- one or more access subsets may be determined based on the access set.
- An access subset includes the network address identifier of the access set and a combination of value(s) corresponding to the header field elements of the access set.
- the selected access set is used to determine one or more access subsets, where each access subset is determined as a uniform user identifier that represents a unique visiting user.
- the uniform user identifier may be used by different websites to identify a unique visiting user.
- each website may associate the uniform user identifier with stored user data (e.g., received access requests and/or other stored user information) associated with that visiting user.
- stored user data e.g., received access requests and/or other stored user information
- various different websites may attribute stored user data to the same user based on the user's uniform user identifier and use the uniform user identifier as a basis for correctly exchanging stored user data for the same user.
- FIG. 3 is a flow diagram showing an example of determining the information loss rate for an access set.
- process 300 is implemented at one or more of website servers 106, 108, and 110 of FIG. 1.
- 206 of process 200 is implemented at least in part using process 300.
- Process 300 is an example process of determining the information loss rate for one access set.
- an access set that is associated with access subset(s) that have the greatest one-to-one correspondence with preliminary user identifiers associated with the access set is selected to use to determine uniform user identifiers.
- a plurality of access subsets are determined from an access set, wherein an access subset includes a network address identifier associated with the access set and a value corresponding to a header field element associated with the access set.
- One or more access subsets are determined from an access set.
- the access set may be generated from at least a subset of available header field elements.
- the contents of an access subset are the network address identifier of the access set and the value(s) corresponding to the header field element(s) of the access set.
- the header field elements of an access set include Accept-
- the received access requests are associated with three different preliminary users (i.e., three different user identifiers assigned by different websites) and all the access requests are associated with the same network address identifier.
- the preliminary user identifiers corresponding to these three users are represented as Bl, B2 and B3.
- these three users associated with the three preliminary user identifiers all have the same network address identifier that is represented by IPl .
- the specified data flow range is 50 (i.e., 50 is the number of access requests that were received within the specified interval of time associated with the data flow range).
- the access set may also be represented as [Accept-Language information, Accept-Coding information, IPl].
- the access set [Accept-Language information, Accept-Coding information, IPl] for these three users who have the same network address identifier IPl may be processed into the following two access subsets: [Chinese, Encoding 1, IP1] and [Chinese, Encoding 2, IP1].
- Al is used to represent the value of "Chinese” for the Accept-
- CI and C2 are used to respectively represent the values of "Encoding 1" and "Encoding 2" for the Accept-Coding information element.
- IP1 Language information, Accept-Coding information, IP1] may be represented as: [Al, CI, IP1] and [Al, C2, IP1].
- a number of data flows associated with a plurality of preliminary user identifiers associated with the access set is determined.
- the elements of the header field included in each of the access requests are based on standard protocols, the contents of the header field included in access requests submitted by different visiting users may sometimes include some of the same header field elements.
- the header field information included in different access requests submitted by the same visiting user may sometimes include at least some different header field elements. Put another way, more than one unique visiting user may correspond to the same access subset or rather, one access subset may correspond to multiple unique visiting users.
- access requests submitted by the visiting user corresponding to preliminary user identifier B 1 there are access requests that were submitted with the value of "Chinese” for the Accept-Language information element, the value of "Encoding 1" for the Accept-Coding information element, and IP1 as the network address identifier, as well as access requests that were submitted with the value of "Chinese” for the Accept-Language information element, the value of "Encoding 2" for the Accept-Coding information element, and IP1 as the network address identifier.
- access requests submitted by the visiting user corresponding to preliminary user identifier B2 there are access requests that were submitted with the value of "Chinese” for the Accept-Language information element, the value of "Encoding 1" for the Accept-Coding information element, and IP1 as the network address identifier, as well as access requests that were submitted with the value of "Chinese” for the Accept-Language information element, the value of "Encoding 2" for the Accept-Coding information element, and IP1 as the network address identifier.
- FIG. 4 shows a diagram of correspondences between preliminary user identifiers Bl , B2, and B3 and access subsets [Al, CI, IP1] and [Al, C2, IP1] of the example.
- the access subset [Al, CI, IP1] corresponds to the preliminary user identifiers Bl, B2, and B3
- the access subset [Al, C2, IP1] corresponds to the preliminary user identifiers Bl and B2 but not B3.
- an example technique of determining a number of an access subset's data flows for all of the preliminary user identifiers is as follows: within the specified data flow range associated with the access set, count the number of data flows that correspond to each access subset, the number of preliminary user identifiers corresponding to each access subset, and the number of access subsets corresponding to each preliminary user identifier; determine, for each preliminary user identifier corresponding to the access subset, the data flow of the access subset that is associated with the preliminary user identifier; use the sum of the access subset's data flows that are associated with each preliminary user identifier to determine the total number of access subset's data flows that correspond to all the preliminary user identifiers.
- the formula 7 ⁇ 7 can be used to determine a number of a particular access subset's data flows associated with one preliminary user identifier, where N is the number of data flows associated with that particular access subset, i is the total number of preliminary user identifiers corresponding to that access subset, and j is the number of access subsets corresponding to that particular preliminary user identifier.
- an information loss rate is determined for the access set based at least in part on respective numbers of data flows associated with the plurality of preliminary user identifiers.
- the formula 1 can be used to determine the information loss rate corresponding to the access set, where R represents the sum associated with each access subset's data flows that are associated with all the preliminary user identifiers that are associated with the access set; W represents the specified data flow range.
- determining a uniform user identifier for each visiting user using the selected access set includes determining that each different access subset determined from the selected access set is a uniform user identifier for a different visiting user.
- [Accept-Language information, Accept-Coding information, IPl] is the lowest of all other possible access sets, then the access subset [Al, CI, IPl] determined from the access set [Accept-Language information, Accept-Coding information, IPl] is determined as a first uniform user identifier for a first visiting user and access subset [Al, C2, IPl] is determined from the access set [Accept-Language information, Accept-Coding information, IPl] is determined as a second uniform user identifier for a second visiting user.
- the accuracy of such identification may be limited.
- the extent of the limitation on accuracy of identification of visiting users by the access subsets associated with a certain access set is represented by the information loss rate that is determined for that access set.
- the access set associated with the lowest information loss rate (and therefore, is predicted to be associated with access subsets that have the highest accuracy in uniquely representing all the visiting users associated with the access requests) is selected to use to determine uniform user identifiers corresponding to visiting users.
- An optimal case of determining uniform user identifiers would be to determine an access set for which each associated access subset would correspond to only one preliminary user identifier. Therefore, in the optimal case, each the access subset determined from an access set would have a one-to-one correspondence with a preliminary user identifier associated with the access set. In this optimal case, the accuracy of using the access subsets associated with this access set to identify different visiting users is 100%. However, in actual practice, such an optimal access set is almost impossible to find. That is, in the likely event that an access subset associated with one access set is not in a one-to-one correspondence with each preliminary user identifier, the accuracy of using the access set to determine uniform user identifiers will be less than 100%. There are two kinds of situations that lead to this decreased accuracy or information loss rate:
- the data flows of the same visiting user may be associated with different access subsets.
- the various access subsets were used as uniform user identifiers, the data flows of this same visiting user will be identified as data flows associated with different users.
- Bl is a preliminary user identifier. This visiting user uses both access subsets [Al, CI, IPl] and [Al, C2, IPl] to carry data flows.
- the information loss rate determined above for an access set within a specified data flow range is the decrease in accuracy caused by one or both of the first and second situations described above when an access subset associated with the access set is used to identify each visiting user.
- identifier Bl is - x -. Likewise, the accuracy of using [Al, C2, IPl] to identify the visiting
- an access set that is associated with access subset(s) that have the greatest one-to-one correspondence with each preliminary user identifier associated with the access set, and therefore the lowest information loss rate, is used to determine uniform user identifiers.
- an information loss rate threshold value may be configured (e.g., by a system administrator).
- the information loss rate threshold value may be used as follows: when the information loss rate corresponding to the access set with the lowest information loss rate fails to exceed the preset threshold value, the access subsets associated with that access set with the lowest information loss rate are used as uniform user identifiers to uniquely identify visiting users. However, when the information loss rate corresponding to the access set with the lowest information loss rate does not exceed the preset threshold value, that means that the accuracy of using the access subsets associated with the access set with the lowest information loss rate to identify visiting users is too low and therefore, the access subsets associated with that access set with the lowest information loss rate are not used as uniform user identifiers to uniquely identify visiting users.
- FIG. 5 is a diagram showing an embodiment of a system for determining a uniform user identifier for a visiting user.
- system 500 includes receiving unit 501, selecting unit 502, determining unit 503, and data exchange unit 504.
- Determining unit 503 includes composing sub-unit 5031, counting sub-unit 5032, and determining sub-unit 5033.
- Counting sub-unit 5032 includes counting module 50321, first determining module 50322, and second determining module 50323.
- components executing on one or more processors, as hardware such as programmable logic devices and/or Application Specific Integrated Circuits designed to elements can be embodied by a form of software products which can be stored in a nonvolatile storage medium (such as optical disk, flash storage device, mobile hard disk, etc.), including a number of instructions for making a computer device (such as personal computers, servers, network equipment, etc.) implement the methods described in the embodiments of the present invention.
- the units, sub-units, and modules may be implemented on a single device or distributed across multiple devices.
- Receiving unit 501 is configured to receive access requests submitted by various visiting users.
- An access request is associated with a preliminary user identifier of the visiting user, a network address identifier, and at least one header field element.
- Selecting unit 502 is configured to select at least one header field element from the header field elements included in each access request and a network address identifier corresponding to the visiting users to generate multiple access sets.
- Determining unit 503 is configured to determine, using a specified data flow range, the information loss rate corresponding to each access set.
- Data exchange unit 504 is configured to select an access set (e.g., the access set with the lowest information loss rate) to use to determine a uniform user identifier to represent each unique visiting user.
- the uniform user identifier for each visiting user is used as a basis for different websites to identify stored user data that corresponds to the same visiting user.
- determining unit 503 includes:
- Composing sub-unit 5031 which is configured to determine one or more access subsets from each access set.
- An access subset includes the network address identifier from the access set and value(s) corresponding to respective ones of the header field elements that were associated with the access set.
- Counting sub-unit 5032 which is configured to determine, using specified data flow range, each access subset's data flows associated with all the preliminary user identifiers that are associated with the access set.
- Determining sub-unit 5033 which is configured to use the determined number of data flows associated with each access subset that are associated with all the preliminary user identifiers as a basis for determining the information loss rate corresponding to the access set.
- Determining sub-unit 5033 which is configured to determine the information loss rate of an access set, according to the formula 1—— , where R represents the sum associated with each access subset's data flows that are associated with all the preliminary user identifiers that are associated with the access set; W represents the specified data flow range.
- counting sub-unit 5032 includes:
- Counting module 5032 which is configured to determine, using the specified data flow range, the number of data flows associated with each access subset, the number of preliminary user identifiers corresponding to each access subset, and the number of access subsets corresponding to each preliminary user identifier associated with the access set.
- First determining module 50322 which is configured to determine, for each preliminary user identifier associated with the access set, the number of data flows of the access subset that is associated with the preliminary user identifier.
- Second determining module 50323 which is configured to determine the sum of an access subset's data flows that are associated with each preliminary user identifier to determine the access subset's data flows that are associated with all the preliminary user identifiers.
- First determining module 50322 which is configured to determine an access subset's data flow associated with a preliminary user identifier according to the formula as follows: ⁇ - , where N is the number data flows associated with that particular access subset, i is the total number of preliminary user identifiers corresponding to that access subset, j is the number of access subsets corresponding to that particular preliminary user identifier.
- Data exchange unit 504 which is configured to determine that the information loss rate corresponding to the access set with the lowest information loss rate exceeds a preset threshold value.
- Data exchange unit 504 which is configured to determine that each of the different access subsets determined from the access set with the lowest information loss rate comprises a uniform user identifier for unique visiting users.
- the embodiments of the present application can be provided as methods, systems or computer software products. Therefore, the present application can take the form of embodiments consisting entirely of hardware, embodiments consisting entirely of software, and embodiments which combine software and hardware. In addition, the present application can take the form of computer program products implemented on one or more computer-operable storage media (including but not limited to magnetic disk storage devices, CD-ROMs, and optical storage devices) containing computer operable program codes.
- computer-operable storage media including but not limited to magnetic disk storage devices, CD-ROMs, and optical storage devices
- These computer program commands can also be stored on specially-operating computer-readable storage devices that can guide computers or other programmable data processing equipment, with the result that the commands stored on these computer-readable devices give rise to products that include command devices.
- These command devices realize the functions designated in one or more processes in a flow chart and/or one or more blocks in a block diagram.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| JP2015533107A JP5922848B2 (ja) | 2012-09-21 | 2013-09-11 | 訪問ユーザのための統一ユーザ識別子の決定 |
Applications Claiming Priority (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201210356956.6A CN103685198B (zh) | 2012-09-21 | 2012-09-21 | 一种交互用户数据的方法和装置 |
| CN201210356956.6 | 2012-09-21 | ||
| US14/023,060 US9525744B2 (en) | 2012-09-21 | 2013-09-10 | Determining a uniform user identifier for a visiting user |
| US14/023,060 | 2013-09-10 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2014046934A1 true WO2014046934A1 (en) | 2014-03-27 |
Family
ID=50321524
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/US2013/059186 Ceased WO2014046934A1 (en) | 2012-09-21 | 2013-09-11 | Determining a uniform user identifier for a visiting user |
Country Status (5)
| Country | Link |
|---|---|
| US (1) | US9525744B2 (enExample) |
| JP (1) | JP5922848B2 (enExample) |
| CN (1) | CN103685198B (enExample) |
| TW (1) | TWI579708B (enExample) |
| WO (1) | WO2014046934A1 (enExample) |
Families Citing this family (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107104928B (zh) * | 2016-02-23 | 2020-06-12 | 阿里巴巴集团控股有限公司 | 业务实现方法及装置 |
| US10348745B2 (en) | 2017-01-05 | 2019-07-09 | Cisco Technology, Inc. | Associating a user identifier detected from web traffic with a client address |
| US11783087B1 (en) * | 2019-10-15 | 2023-10-10 | Shape Security, Inc. | Facilitating secure client data transfer |
| CN116776310B (zh) * | 2023-08-23 | 2024-01-05 | 深圳红途科技有限公司 | 用户账号自动识别方法、装置、计算机设备及存储介质 |
Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7761558B1 (en) * | 2006-06-30 | 2010-07-20 | Google Inc. | Determining a number of users behind a set of one or more internet protocol (IP) addresses |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6141778A (en) * | 1998-06-29 | 2000-10-31 | Mci Communications Corporation | Method and apparatus for automating security functions in a computer system |
| US8490168B1 (en) | 2005-10-12 | 2013-07-16 | At&T Intellectual Property I, L.P. | Method for authenticating a user within a multiple website environment to provide secure access |
| EP1873673A4 (en) * | 2006-03-29 | 2011-05-18 | Bank Of Tokyo Mitsubishi Ufj | USER VERIFICATION DEVICE, METHOD, AND PROGRAM |
| US8620896B2 (en) * | 2007-12-06 | 2013-12-31 | Yahoo! Inc. | Reverse matching relationships in networks of existing identifiers |
| US8626926B2 (en) * | 2008-02-26 | 2014-01-07 | Qualcomm Incorporated | Method and apparatus for performing session info query for user plane location |
| US8352319B2 (en) | 2009-03-10 | 2013-01-08 | Google Inc. | Generating user profiles |
| US8204833B2 (en) | 2009-05-27 | 2012-06-19 | Softroute Corporation | Method for fingerprinting and identifying internet users |
| JP2012014652A (ja) * | 2010-07-05 | 2012-01-19 | Zenrin Datacom Co Ltd | コンテンツ配信システム及びコンテンツ配信方法 |
| US8913553B2 (en) * | 2010-07-23 | 2014-12-16 | Htc Corporation | Method of handling close subscriber group list synchronization |
| CN102143091B (zh) * | 2010-08-06 | 2014-07-16 | 华为技术有限公司 | 跨域操作的实现方法、系统、服务器和浏览器 |
| US8429160B2 (en) | 2010-10-12 | 2013-04-23 | Robert Osann, Jr. | User preference correlation for web-based selection |
| JP5596578B2 (ja) * | 2011-01-26 | 2014-09-24 | ビッグローブ株式会社 | アドレス帳作成システム、アドレス帳作成方法およびプログラム |
-
2012
- 2012-09-21 CN CN201210356956.6A patent/CN103685198B/zh active Active
- 2012-12-12 TW TW101146891A patent/TWI579708B/zh not_active IP Right Cessation
-
2013
- 2013-09-10 US US14/023,060 patent/US9525744B2/en active Active
- 2013-09-11 JP JP2015533107A patent/JP5922848B2/ja active Active
- 2013-09-11 WO PCT/US2013/059186 patent/WO2014046934A1/en not_active Ceased
Patent Citations (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7761558B1 (en) * | 2006-06-30 | 2010-07-20 | Google Inc. | Determining a number of users behind a set of one or more internet protocol (IP) addresses |
Also Published As
| Publication number | Publication date |
|---|---|
| US20140089499A1 (en) | 2014-03-27 |
| US9525744B2 (en) | 2016-12-20 |
| CN103685198A (zh) | 2014-03-26 |
| TWI579708B (zh) | 2017-04-21 |
| JP5922848B2 (ja) | 2016-05-24 |
| JP2015537282A (ja) | 2015-12-24 |
| CN103685198B (zh) | 2017-03-01 |
| TW201413468A (zh) | 2014-04-01 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9060031B1 (en) | Anonymized personalization of network content | |
| US10496994B2 (en) | Enhanced authentication with dark web analytics | |
| EP3231133B1 (en) | Providing selective access to resources | |
| US8943079B2 (en) | Apparatus and methods for anonymizing a data set | |
| US10778680B2 (en) | Method and apparatus for accessing website | |
| US10142308B1 (en) | User authentication | |
| US9639689B1 (en) | User authentication | |
| WO2012092196A1 (en) | Recommendation of search keywords based on indication of user intention | |
| US8370908B2 (en) | Decreasing login latency | |
| EP2652700A2 (en) | Aggregated profile and online concierge | |
| CN112487456B (zh) | 联邦学习模型训练方法、系统、电子设备及可读存储介质 | |
| WO2015002739A1 (en) | Providing a query results page | |
| WO2013131237A1 (en) | System and method for detecting and preventing attacks against a server in a computer network | |
| US9525744B2 (en) | Determining a uniform user identifier for a visiting user | |
| CN108228864B (zh) | 网络爬虫识别方法、装置、计算机设备和存储介质 | |
| CN108023867A (zh) | 移动端网页广告过滤的方法、网关服务器及过滤服务器 | |
| US8910281B1 (en) | Identifying malware sources using phishing kit templates | |
| WO2012062107A1 (zh) | 基于手机用户上网行为的数据处理方法及装置 | |
| US20190102534A1 (en) | Single sign-on management for multiple independent identity providers | |
| CN105528352B (zh) | 建立移动通信用户与其网络账户信息的对应关系的方法 | |
| EP2725538A1 (en) | Privacy protected dynamic clustering of end users | |
| CN107483565B (zh) | 一种服务后台识别方法、代理服务器及计算机存储介质 | |
| US10154076B2 (en) | Identifying users through a proxy | |
| CN106878438A (zh) | 一种https环境下用户行为分析的方法和系统 | |
| JP7134963B2 (ja) | サービスデータ処理方法及びデバイス |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 13766816 Country of ref document: EP Kind code of ref document: A1 |
|
| ENP | Entry into the national phase |
Ref document number: 2015533107 Country of ref document: JP Kind code of ref document: A |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 13766816 Country of ref document: EP Kind code of ref document: A1 |