WO2019071966A1 - Crawler data-based user behavior analysis method, application server and readable storage medium - Google Patents

Crawler data-based user behavior analysis method, application server and readable storage medium Download PDF

Info

Publication number
WO2019071966A1
WO2019071966A1 PCT/CN2018/089707 CN2018089707W WO2019071966A1 WO 2019071966 A1 WO2019071966 A1 WO 2019071966A1 CN 2018089707 W CN2018089707 W CN 2018089707W WO 2019071966 A1 WO2019071966 A1 WO 2019071966A1
Authority
WO
WIPO (PCT)
Prior art keywords
crawler
user behavior
data
user
application
Prior art date
Application number
PCT/CN2018/089707
Other languages
French (fr)
Chinese (zh)
Inventor
蔡俊
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019071966A1 publication Critical patent/WO2019071966A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • G06F16/285Clustering or classification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques

Definitions

  • the present application relates to the field of communications technologies, and in particular, to a user behavior analysis method based on crawler data, an application server, and a readable storage medium.
  • Big data enables companies to easily access a wider range of feedback from users over the Internet, providing an adequate data base for further accurate and rapid analysis of important business information such as user behavior habits and spending habits.
  • User Profile a perfect abstraction of a user's information, can be seen as the foundation of enterprise application big data.
  • the application provides a user behavior analysis method and an application server based on crawler data, which preliminarily delimits the scope of user data, and simultaneously labels the user data in a clustering process to obtain user behavior and improve the accuracy of data analysis. To help business decisions and improve marketing efficiency.
  • the first aspect of the present application provides a user behavior analysis method based on crawler data, which is applied to an application server, and the method includes:
  • the crawler application is used to obtain crawler information
  • a second aspect of the present application provides an application server, where the application server includes a memory, a processor, and a crawler data-based user behavior analysis program executable on the processor, the crawler data is stored on the memory
  • the user behavior analysis program is implemented by the processor to implement the following steps:
  • the crawler application is used to obtain crawler information
  • a third aspect of the present application provides a computer readable storage medium storing a user behavior analysis program based on crawler data, the crawler data-based user behavior analysis program being executable by at least one processor, Taking the at least one processor to perform the following steps:
  • the crawler application is used to obtain crawler information
  • the application server, the crawler data-based user behavior analysis method, and the computer readable storage medium proposed by the present application firstly configure a crawler application first; secondly, detect whether the crawler application is enabled; Then, after the crawler application is opened, again, the crawler application is used to acquire crawler information; then, the crawler information is analyzed and keywords are extracted; further, the keyword is used to tag the user; finally, User behavior statistics are performed based on the tags.
  • the large amount of data acquired by the big data in the prior art can be avoided, and the preliminary range delineation of the data cannot be performed, thereby affecting the drawbacks of the accuracy of subsequent user behavior analysis.
  • 1 is a schematic diagram of an optional hardware architecture of an application server
  • FIG. 2 is a program block diagram of a first embodiment of a user behavior analysis program based on crawler data of the present application
  • FIG. 3 is a flowchart of a first embodiment of a user behavior analysis method based on crawler data according to the present application
  • FIG. 4 is a flowchart of a second embodiment of a user behavior analysis method based on crawler data according to the present application.
  • FIG. 1 it is a schematic diagram of an optional hardware architecture of the application server 1.
  • the application server 1 may be a computing device such as a rack server, a blade server, a tower server, or a rack server.
  • the application server 1 may be a stand-alone server or a server cluster composed of multiple servers.
  • the application server 1 may include, but is not limited to, the memory 11, the processor 12, and the network interface 13 being communicably connected to each other through a system bus.
  • the application server 1 connects to the network through the network interface 13 to obtain information.
  • the network may be an intranet, an Internet, a Global System of Mobile communication (GSM), a Wideband Code Division Multiple Access (WCDMA), a 4G network, or a 5G network.
  • Wireless or wired networks such as networks, Bluetooth, Wi-Fi, and call networks.
  • Figure 1 shows only the application server 1 with components 11-13, but it should be understood that not all illustrated components may be implemented and that more or fewer components may be implemented instead.
  • the memory 11 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (eg, SD or DX memory, etc.), and a random access memory (RAM). , static random access memory (SRAM), read only memory (ROM), electrically erasable programmable read only memory (EEPROM), programmable read only memory (PROM), magnetic memory, magnetic disk, optical disk, and the like.
  • the memory 11 may be an internal storage unit of the application server 1, such as a hard disk or memory of the application server 1.
  • the memory 11 may also be an external storage device of the application server 1, such as a plug-in hard disk equipped with the application server 1, a smart memory card (SMC), and a secure digital ( Secure Digital, SD) cards, flash cards, etc.
  • the memory 11 can also include both the internal storage unit of the application server 1 and its external storage device.
  • the memory 11 is generally used to store an operating system installed on the application server 1 and various types of application software, such as program code of the crawler data-based user behavior analysis program 200. Further, the memory 11 can also be used to temporarily store various types of data that have been output or are to be output.
  • the processor 12 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments.
  • the processor 12 is typically used to control the overall operation of the application server 1, such as performing data interaction or communication related control and processing, and the like.
  • the processor 12 is configured to run program code or process data stored in the memory 11, such as running the crawler data-based user behavior analysis program 200 and the like.
  • the network interface 13 may comprise a wireless network interface or a wired network interface, which is typically used to establish a communication connection between the application server 1 and other electronic devices.
  • the user behavior analysis program 200 based on the crawler data is installed and run in the application server 1.
  • the application server 1 firstly configures the crawler in advance. An application; secondly, detecting whether the crawler application is turned on; then, after opening the crawler application, again, using the crawler application to obtain crawler information; then, analyzing the crawler information and extracting keywords; Further, the user is tagged by the keyword; finally, user behavior statistics are performed according to the tag.
  • the large amount of data acquired by the big data in the prior art can be avoided, and the preliminary range delineation of the data cannot be performed, thereby affecting the drawbacks of the accuracy of subsequent user behavior analysis.
  • the present application proposes a user behavior analysis program 200 based on crawler data.
  • FIG. 2 it is a program module diagram of the first embodiment of the user behavior analysis program 200 based on the crawler data of the present application.
  • the crawler data-based user behavior analysis program 200 includes a series of computer program instructions stored in the memory 11, and when the computer program instructions are executed by the processor 12, the embodiments of the present application may be implemented. Analytical operations based on user behavior of crawler data.
  • the crawler data based user behavior analysis program 200 can be divided into one or more modules based on the particular operations implemented by the various portions of the computer program instructions. For example, in FIG. 2, the crawler data-based user behavior analysis program 200 can be divided into a pre-configuration module 201, a detection module 202, an acquisition module 203, an analysis extraction module 204, a label module 205, and a statistics module 206. among them:
  • the pre-configuration module 201 is configured to pre-configure a crawler application. Specifically, the pre-configuration module 201 configures a crawl rule of the crawler application by preset the crawler application setting window.
  • the crawling rule includes a crawled website, content, a crawled file format (text, picture, audio, video), frequency of crawling, and the like, that is, the pre-configuration module 201 can By configuring the crawler application, the big data information of the specified scope is obtained, thereby improving the accuracy of subsequent user behavior analysis.
  • the detecting module 202 is configured to detect whether the crawler application is enabled.
  • the obtaining module 203 is configured to obtain crawler information by using the crawler application after the crawler application is started.
  • the crawler information includes a combination of one or more of a website crawled by the user, a file format crawled by the user, a content crawled by the user, a user's access IP, a user crawl time, and a user crawl time.
  • the crawler application can collect a lot of crawler information. such as:
  • crawl rule information crawled website, content, crawled file format (text, picture, audio, video), frequency of crawling;
  • crawling data extraction information time, extraction amount, and extraction range of data extracted by the user.
  • the analysis extraction module 204 is configured to analyze the crawler information and extract keywords.
  • the keyword includes a combination of one or more of a website address, a website type, a crawl content property, a format of a crawl file, an IP, a crawl time period, a crawl frequency, and a crawl amount. .
  • the website address or the type of the corresponding website may be extracted as a keyword; if the crawl information has the user's access IP, the IP may be used as a keyword; if crawling The information is the crawl time, then the time range of a certain range is used as the keyword; if the crawling information is the content crawled by the user, the nature of the content is used as a keyword, such as video, music, picture, etc.; If the crawl information is the file format of the crawl, the corresponding format is the keyword; if the crawl information is the number of crawls, the crawl frequency or the number of crawls can be used as the keyword.
  • the tag module 205 is configured to tag the user by using the keyword.
  • the user tag can be divided into an investor, a depositor, or an insured according to the URL accessed by the user.
  • the keyword is IP
  • the user tag can be classified into schools according to the IP, and the hospital. , banks, etc., when the keywords are video, music, pictures, user tags can be divided into musicians, screenwriters, fans, etc. according to the frequency of access to video, music, and pictures.
  • the statistic module 206 is configured to perform user behavior statistics on the tags that are tagged by the user according to the tag module 205.
  • the label module 205 collects statistics on user behaviors by using the following manners: the label module 205 clusters users who have the labels according to preset indicators, and collects user behaviors according to the collected data of the users. .
  • the preset indicator includes: a proximity, a frequency, and a quota.
  • the user behavior is also counted as a User Profile.
  • the bottom layer of the user image is machine learning. Then, whether it is to do customer grouping or precision marketing, the user data must be processed regularly. Converted into feature vectors of the same dimension, many gorgeous algorithms can be useful, so-called regular processing such as clustering, regression, correlation, various classifiers and so on.
  • the user is first tagged by the above scheme to define multiple dimensions. Then count the number of users based on the same dimension to analyze user behavior.
  • the recency in the preset indicator refers to the first or last crawl time of the user; the frequency refers to the user's crawl frequency; the amount (Monetory) ) refers to the number of crawls by the user.
  • other indicators may also be selected as clustering indicators.
  • the crawling information refers to the rating content, then the label may be a rating, the clustering indicator may select a crawling content rating, or the number of users may be selected as a clustering indicator. Wait.
  • clustering the tagged data as described above it is possible to obtain some websites or contents with high user attention, and also to obtain distribution of users who use the crawler program. According to the user behavior obtained by the above clustering, it can assist business decision-making and improve marketing efficiency.
  • the crawler data-based user behavior analysis program 200 proposed by the present application firstly pre-configures the crawler application; secondly, detects whether the crawler application is turned on; and then, opens the crawler After the application, again, using the crawler application to obtain crawler information; then, analyzing the crawler information and extracting keywords; further, using the keyword to tag the user; and finally, performing user behavior according to the tag statistics.
  • the large amount of data acquired by the big data in the prior art can be avoided, and the preliminary range delineation of the data cannot be performed, thereby affecting the drawbacks of the accuracy of subsequent user behavior analysis.
  • preliminarily delineating the scope of user data, and simultaneously tagging user data in cluster processing obtaining user behavior, improving the accuracy of data analysis, contributing to business decisions and improving marketing efficiency.
  • the present application also proposes a user behavior analysis method based on crawler data.
  • FIG. 3 it is a flowchart of the first embodiment of the user behavior analysis method based on crawler data in the present application.
  • the order of execution of the steps in the flowchart shown in FIG. 3 may be changed according to different requirements, and some steps may be omitted.
  • step S301 the crawler application is pre-configured. Specifically, the application server 1 configures a crawl rule of the crawler application by preset the crawler application setting window.
  • the crawling rule includes a crawled website, content, a crawled file format (text, picture, audio, video), frequency of crawling, and the like, that is, the application server 1 can pass Configure the crawler application to obtain the specified range of big data information, thereby improving the accuracy of subsequent user behavior analysis.
  • Step S302 detecting whether the crawler application is enabled.
  • step S303 is performed, otherwise, the flow is ended.
  • Step S303 acquiring crawler information by using the crawler application.
  • the crawler information includes a combination of one or more of a website crawled by the user, a file format crawled by the user, a content crawled by the user, a user's access IP, a user crawl time, and a user crawl time.
  • the crawler application can collect a lot of crawler information. such as:
  • crawl rule information the crawled website, content, crawled file format (text, image, audio, video), the frequency of crawling.
  • crawling data extraction information time, extraction amount, and extraction range of data extracted by the user.
  • Step S304 analyzing the crawler information and extracting keywords.
  • the keyword includes a combination of one or more of a website address, a website type, a crawl content property, a format of a crawl file, an IP, a crawl time period, a crawl frequency, and a crawl amount. .
  • the website address or the type of the corresponding website may be extracted as a keyword; if the crawl information has the user's access IP, the IP may be used as a keyword; if crawling The information is the crawl time, then the time range of a certain range is used as the keyword; if the crawling information is the content crawled by the user, the nature of the content is used as a keyword, such as video, music, picture, etc.; If the crawl information is the file format of the crawl, the corresponding format is the keyword; if the crawl information is the number of crawls, the crawl frequency or the number of crawls can be used as the keyword.
  • Step S305 the user is tagged by using the keyword.
  • the user tag can be divided into an investor, a depositor, or an insured according to the URL accessed by the user.
  • the keyword is IP
  • the user tag can be classified into schools according to the IP, and the hospital. , banks, etc., when the keywords are video, music, pictures, user tags can be divided into musicians, screenwriters, fans, etc. according to the frequency of access to video, music, and pictures.
  • Step S306 performing user behavior statistics according to the tag. Specifically, the specific step of performing user behavior statistics according to the label is described in detail in the second embodiment (FIG. 4) of the user behavior analysis method based on the crawler data in the present application.
  • the application server 1 firstly pre-configures the crawler application; secondly, detecting whether the crawler application is turned on; and then, turning on After the crawler application, again, using the crawler application to acquire crawler information; then, analyzing the crawler information and extracting keywords; further, using the keyword to tag the user; and finally, according to the tag Perform user behavior statistics.
  • the large amount of data acquired by the big data in the prior art can be avoided, and the preliminary range delineation of the data cannot be performed, thereby affecting the drawbacks of the accuracy of subsequent user behavior analysis.
  • preliminarily delineating the scope of user data, and simultaneously tagging user data in cluster processing obtaining user behavior, improving the accuracy of data analysis, contributing to business decisions and improving marketing efficiency.
  • FIG. 4 it is a flowchart of a second embodiment of a user behavior analysis method based on crawler data in the present application.
  • the order of execution of the steps in the flowchart shown in FIG. 4 may be changed according to different requirements, and some steps may be omitted.
  • the step of performing user behavior statistics according to the label specifically includes:
  • Step S401 Cluster the users who are tagged according to the preset indicator.
  • the application server 1 tags the user by using the keyword, including the website address, the website type, the nature of the crawled content, the format of the crawled file, the IP, the crawling time period, and the crawling. Take a combination of one or more of the frequency and the number of crawls.
  • the website address or the type of the corresponding website may be extracted as a keyword; if the crawl information has the user's access IP, the IP may be used as a keyword; if crawling The information is the crawl time, then the time range of a certain range is used as the keyword; if the crawling information is the content crawled by the user, the nature of the content is used as a keyword, such as video, music, picture, etc.; If the crawl information is the file format of the crawl, the corresponding format is the keyword; if the crawl information is the number of crawls, the crawl frequency or the number of crawls can be used as the keyword.
  • the user tag when the URL is extracted or the type of the corresponding website is used as a keyword, the user tag can be divided into an investor, a depositor, or an insured according to the URL accessed by the user.
  • the keyword is IP
  • the user tag can be classified into schools according to the IP. , hospitals, banks, etc., when the keywords are video, music, pictures, user tags can be divided into musicians, screenwriters, fans, etc. according to the frequency of access to video, music, and pictures.
  • the preset indicator includes: a proximity, a frequency, and a quota.
  • Step S402 the user behavior is calculated according to the data of the clustered user.
  • the user behavior is also counted as a User Profile.
  • the bottom layer of the user image is machine learning. Then, whether it is to do customer grouping or precision marketing, the user data must be processed regularly. Converted into feature vectors of the same dimension, many gorgeous algorithms can be useful, so-called regular processing such as clustering, regression, correlation, various classifiers and so on.
  • the user is first tagged to define multiple dimensions. Then count the number of users based on the same dimension to analyze user behavior.
  • the recency in the preset indicator refers to the first or last crawl time of the user; the frequency refers to the user's crawl frequency; the amount (Monetory) ) refers to the number of crawls by the user.
  • other indicators may also be selected as clustering indicators.
  • the crawling information refers to the rating content, then the label may be a rating, the clustering indicator may select a crawling content rating, or the number of users may be selected as a clustering indicator. Wait.
  • clustering the tagged data as described above it is possible to obtain some websites or contents with high user attention, and also to obtain distribution of users who use the crawler program. According to the user behavior obtained by the above clustering, it can assist business decision-making and improve marketing efficiency.
  • the user behavior analysis method based on the crawler data proposed by the present application can obtain some websites or contents with high user attention by clustering the tagged data, and can also obtain the use of the crawler program. User distribution, etc. Moreover, based on the user behavior derived from clustering, it can assist business decisions and improve marketing efficiency. .
  • the foregoing embodiment method can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases, the former is better.
  • Implementation Based on such understanding, the technical solution of the present application, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk,
  • the optical disc includes a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods described in various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

Disclosed in the present application is a crawler data-based user behavior analysis method, the method comprising: pre-configuring a crawler application program; detecting whether the crawler application program is started; after the crawler application program is started, using the crawler application program to acquire crawler information; analyzing the crawler information and extracting a keyword; using the keyword to tag a user; and performing statistics on user behavior according to the tag. The present application further provides an application server and a computer readable storage medium. In the application server and crawler data-based user behavior analysis method provided by the present application, the range of user data is preliminarily delimited; in addition, tagging of the user data is processed in clustering, so as to acquire the user behavior, thereby improving the accuracy of data analysis, facilitating the business decision-making, and improving the marketing efficiency.

Description

基于爬虫数据的用户行为分析方法、应用服务器及可读存储介质User behavior analysis method based on crawler data, application server and readable storage medium
本申请基于巴黎公约申明享有2017年10月13日递交的申请号为CN 201710951681.3、名称为“基于爬虫数据的用户行为分析方法、应用服务器及计算机可读存储介质”中国专利申请的优先权,该中国专利申请的整体内容以参考的方式结合在本申请中。This application is based on the priority of the Paris Convention on the application of the Chinese Patent Application No. CN 201710951681.3 filed on October 13, 2017, entitled "User Behavior Analysis Method Based on Reptile Data, Application Server and Computer Readable Storage Media", The entire contents of the Chinese patent application are incorporated herein by reference.
技术领域Technical field
本申请涉及通信技术领域,尤其涉及基于爬虫数据的用户行为分析方法、应用服务器及可读存储介质。The present application relates to the field of communications technologies, and in particular, to a user behavior analysis method based on crawler data, an application server, and a readable storage medium.
背景技术Background technique
大数据使得企业能够通过互联网便利地获取用户更为广泛的反馈信息,为进一步精准、快速地分析用户行为习惯、消费习惯等重要商业信息,提供了足够的数据基础。伴随着对人的了解逐步深入,一个概念悄然而生:用户画像(User Profile),完美地抽象出一个用户的信息全貌,可以看作企业应用大数据的根基。Big data enables companies to easily access a wider range of feedback from users over the Internet, providing an adequate data base for further accurate and rapid analysis of important business information such as user behavior habits and spending habits. Along with the deepening of people's understanding, a concept emerges quietly: User Profile, a perfect abstraction of a user's information, can be seen as the foundation of enterprise application big data.
然目前的大数据获取,数据量大而杂,无法做到数据的初步范围划定,进而影响后续用户行为分析的准确性。However, the current big data acquisition, the amount of data is large and complex, can not achieve the initial scope of the data, and thus affect the accuracy of subsequent user behavior analysis.
发明内容Summary of the invention
本申请提供一种基于爬虫数据的用户行为分析方法及应用服务器,通过初步的划定用户数据的范围,同时对用户数据的标签化在聚类处理,获取用户行为,提高了数据分析的准确性,有助于商业决策,提高营销效率。The application provides a user behavior analysis method and an application server based on crawler data, which preliminarily delimits the scope of user data, and simultaneously labels the user data in a clustering process to obtain user behavior and improve the accuracy of data analysis. To help business decisions and improve marketing efficiency.
本申请第一方面提供一种基于爬虫数据的用户行为分析方法,应用于应用服务器,所述方法包括:The first aspect of the present application provides a user behavior analysis method based on crawler data, which is applied to an application server, and the method includes:
预先配置爬虫应用程序;Pre-configure the crawler application;
侦测所述爬虫应用程序是否开启;Detecting whether the crawler application is enabled;
在开启所述爬虫应用程序后,利用所述爬虫应用程序获取爬虫信息;After the crawler application is opened, the crawler application is used to obtain crawler information;
分析所述爬虫信息并提取关键字;Analyzing the crawler information and extracting keywords;
利用所述关键字对用户打上标签;及Using the keywords to tag users; and
根据所述标签进行用户行为统计。User behavior statistics are performed based on the tags.
本申请第二方面提供一种应用服务器,所述应用服务器包括存储器、处理器,所述存储器上存储有可在所述处理器上运行的基于爬虫数据的用户行为分析程序,所述基于爬虫数据的用户行为分析程序被所述处理器执行时实现如下步骤:A second aspect of the present application provides an application server, where the application server includes a memory, a processor, and a crawler data-based user behavior analysis program executable on the processor, the crawler data is stored on the memory The user behavior analysis program is implemented by the processor to implement the following steps:
预先配置爬虫应用程序;Pre-configure the crawler application;
侦测所述爬虫应用程序是否开启;Detecting whether the crawler application is enabled;
在开启所述爬虫应用程序后,利用所述爬虫应用程序获取爬虫信息;After the crawler application is opened, the crawler application is used to obtain crawler information;
分析所述爬虫信息并提取关键字;Analyzing the crawler information and extracting keywords;
利用所述关键字对用户打上标签;及Using the keywords to tag users; and
根据所述标签进行用户行为统计。User behavior statistics are performed based on the tags.
本申请第三方面提供一种计算机可读存储介质,所述计算机可读存储介质存储有基于爬虫数据的用户行为分析程序,所述基于爬虫数据的用户行为分析程序可被至少一个处理器执行,以使所述至少一个处理器执行以下步骤:A third aspect of the present application provides a computer readable storage medium storing a user behavior analysis program based on crawler data, the crawler data-based user behavior analysis program being executable by at least one processor, Taking the at least one processor to perform the following steps:
预先配置爬虫应用程序;Pre-configure the crawler application;
侦测所述爬虫应用程序是否开启;Detecting whether the crawler application is enabled;
在开启所述爬虫应用程序后,利用所述爬虫应用程序获取爬虫信息;After the crawler application is opened, the crawler application is used to obtain crawler information;
分析所述爬虫信息并提取关键字;Analyzing the crawler information and extracting keywords;
利用所述关键字对用户打上标签;及Using the keywords to tag users; and
根据所述标签进行用户行为统计。User behavior statistics are performed based on the tags.
相较于现有技术,本申请所提出的应用服务器、基于爬虫数据的用户行为分析方法及计算机可读存储介质,首先,预先配置爬虫应用程序;其次,侦测所述爬虫应用程序是否开启;然后,在开启所述爬虫应用程序后,再次,利用所述爬虫应用程序获取爬虫信息;接着,分析所述爬虫信息并提取关键字;进一步地,利用所述关键字对用户打上标签;最后,根据所述标签进行用户行为统计。这样,可以避免现有技术中大数据获取数据量大而杂,无法做到数据的初步范围划定,进而影响后续用户行为分析的准确性的弊端。通过初步的划定用户数据的范围,同时对用户数据的标签化在聚类处理,获取用户行为,提高了数据分析的准确性,有助于商业决策,提高营销效率。Compared with the prior art, the application server, the crawler data-based user behavior analysis method, and the computer readable storage medium proposed by the present application firstly configure a crawler application first; secondly, detect whether the crawler application is enabled; Then, after the crawler application is opened, again, the crawler application is used to acquire crawler information; then, the crawler information is analyzed and keywords are extracted; further, the keyword is used to tag the user; finally, User behavior statistics are performed based on the tags. In this way, the large amount of data acquired by the big data in the prior art can be avoided, and the preliminary range delineation of the data cannot be performed, thereby affecting the drawbacks of the accuracy of subsequent user behavior analysis. By preliminarily delineating the scope of user data, and simultaneously tagging user data in cluster processing, obtaining user behavior, improving the accuracy of data analysis, contributing to business decisions and improving marketing efficiency.
附图说明DRAWINGS
图1是应用服务器一可选的硬件架构的示意图;1 is a schematic diagram of an optional hardware architecture of an application server;
图2是本申请基于爬虫数据的用户行为分析程序第一实施例的程序模块图;2 is a program block diagram of a first embodiment of a user behavior analysis program based on crawler data of the present application;
图3为本申请基于爬虫数据的用户行为分析方法第一实施例的流程图;3 is a flowchart of a first embodiment of a user behavior analysis method based on crawler data according to the present application;
图4为本申请基于爬虫数据的用户行为分析方法第二实施例的流程图。FIG. 4 is a flowchart of a second embodiment of a user behavior analysis method based on crawler data according to the present application.
附图标记:
Figure PCTCN2018089707-appb-000001
Reference mark:
Figure PCTCN2018089707-appb-000001
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。The implementation, functional features and advantages of the present application will be further described with reference to the accompanying drawings.
具体实施方式Detailed ways
以下结合附图对本申请的原理和特征进行描述,所举实例只用于解释本申请,并非用于限定本申请的范围。The principles and features of the present application are described in the following with reference to the accompanying drawings, which are only used to explain the present application and are not intended to limit the scope of the application.
参阅图1所示,是应用服务器1一可选的硬件架构的示意图。Referring to FIG. 1, it is a schematic diagram of an optional hardware architecture of the application server 1.
所述应用服务器1可以是机架式服务器、刀片式服务器、塔式服务器或机柜式服务器等计算设备,该应用服务器1可以是独立的服务器,也可以是多个服务器所组成的服务器集群。The application server 1 may be a computing device such as a rack server, a blade server, a tower server, or a rack server. The application server 1 may be a stand-alone server or a server cluster composed of multiple servers.
本实施例中,所述应用服务器1可包括,但不仅限于,可通过系统总线相互通信连接存储器11、处理器12、网络接口13。In this embodiment, the application server 1 may include, but is not limited to, the memory 11, the processor 12, and the network interface 13 being communicably connected to each other through a system bus.
所述应用服务器1通过网络接口13连接网络,获取资讯。所述网络可以是企业内部网(Intranet)、互联网(Internet)、全球移动通讯系统(Global System of Mobile communication,GSM)、宽带码分多址(Wideband Code Division Multiple Access,WCDMA)、4G网络、5G网络、蓝牙(Bluetooth)、Wi-Fi、通话网络等无线或有线网络。The application server 1 connects to the network through the network interface 13 to obtain information. The network may be an intranet, an Internet, a Global System of Mobile communication (GSM), a Wideband Code Division Multiple Access (WCDMA), a 4G network, or a 5G network. Wireless or wired networks such as networks, Bluetooth, Wi-Fi, and call networks.
需要指出的是,图1仅示出了具有组件11-13的应用服务器1,但是应理解的是,并不要求实施所有示出的组件,可以替代的实施更多 或者更少的组件。It is to be noted that Figure 1 shows only the application server 1 with components 11-13, but it should be understood that not all illustrated components may be implemented and that more or fewer components may be implemented instead.
其中,所述存储器11至少包括一种类型的可读存储介质,所述可读存储介质包括闪存、硬盘、多媒体卡、卡型存储器(例如,SD或DX存储器等)、随机访问存储器(RAM)、静态随机访问存储器(SRAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、可编程只读存储器(PROM)、磁性存储器、磁盘、光盘等。在一些实施例中,所述存储器11可以是所述应用服务器1的内部存储单元,例如该应用服务器1的硬盘或内存。在另一些实施例中,所述存储器11也可以是所述应用服务器1的外部存储设备,例如该应用服务器1配备的插接式硬盘,智能存储卡(Smart Media Card,SMC),安全数字(Secure Digital,SD)卡,闪存卡(Flash Card)等。当然,所述存储器11还可以既包括所述应用服务器1的内部存储单元也包括其外部存储设备。本实施例中,所述存储器11通常用于存储安装于所述应用服务器1的操作系统和各类应用软件,例如所述基于爬虫数据的用户行为分析程序200的程序代码等。此外,所述存储器11还可以用于暂时地存储已经输出或者将要输出的各类数据。The memory 11 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (eg, SD or DX memory, etc.), and a random access memory (RAM). , static random access memory (SRAM), read only memory (ROM), electrically erasable programmable read only memory (EEPROM), programmable read only memory (PROM), magnetic memory, magnetic disk, optical disk, and the like. In some embodiments, the memory 11 may be an internal storage unit of the application server 1, such as a hard disk or memory of the application server 1. In other embodiments, the memory 11 may also be an external storage device of the application server 1, such as a plug-in hard disk equipped with the application server 1, a smart memory card (SMC), and a secure digital ( Secure Digital, SD) cards, flash cards, etc. Of course, the memory 11 can also include both the internal storage unit of the application server 1 and its external storage device. In this embodiment, the memory 11 is generally used to store an operating system installed on the application server 1 and various types of application software, such as program code of the crawler data-based user behavior analysis program 200. Further, the memory 11 can also be used to temporarily store various types of data that have been output or are to be output.
所述处理器12在一些实施例中可以是中央处理器(Central Processing Unit,CPU)、控制器、微控制器、微处理器、或其他数据处理芯片。该处理器12通常用于控制所述应用服务器1的总体操作,例如执行数据交互或者通信相关的控制和处理等。本实施例中,所述处理器12用于运行所述存储器11中存储的程序代码或者处理数据,例如运行所述的基于爬虫数据的用户行为分析程序200等。The processor 12 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 12 is typically used to control the overall operation of the application server 1, such as performing data interaction or communication related control and processing, and the like. In this embodiment, the processor 12 is configured to run program code or process data stored in the memory 11, such as running the crawler data-based user behavior analysis program 200 and the like.
所述网络接口13可包括无线网络接口或有线网络接口,该网络接口13通常用于在所述应用服务器1与其他电子设备之间建立通信连接。The network interface 13 may comprise a wireless network interface or a wired network interface, which is typically used to establish a communication connection between the application server 1 and other electronic devices.
本实施例中,所述应用服务器1内安装并运行有基于爬虫数据的用户行为分析程序200,当所述基于爬虫数据的用户行为分析程序200运行时,所述应用服务器1首先,预先配置爬虫应用程序;其次,侦测所述爬虫应用程序是否开启;然后,在开启所述爬虫应用程序后,再次,利用所述爬虫应用程序获取爬虫信息;接着,分析所述爬虫信息并提取关键字;进一步地,利用所述关键字对用户打上标签;最后,根据所述标签进行用户行为统计。这样,可以避免现有技术中大数据获取数据量大而杂,无法做到数据的初步范围划定,进而影响后续用户行为分析的准确性的弊端。通过初步的划定用户数据的范围,同时对用户数据的标签化在聚类处理,获取用户行为,提高了数据分析的准确性,有助于商业决策,提高营销效率。In this embodiment, the user behavior analysis program 200 based on the crawler data is installed and run in the application server 1. When the crawler data-based user behavior analysis program 200 is run, the application server 1 firstly configures the crawler in advance. An application; secondly, detecting whether the crawler application is turned on; then, after opening the crawler application, again, using the crawler application to obtain crawler information; then, analyzing the crawler information and extracting keywords; Further, the user is tagged by the keyword; finally, user behavior statistics are performed according to the tag. In this way, the large amount of data acquired by the big data in the prior art can be avoided, and the preliminary range delineation of the data cannot be performed, thereby affecting the drawbacks of the accuracy of subsequent user behavior analysis. By preliminarily delineating the scope of user data, and simultaneously tagging user data in cluster processing, obtaining user behavior, improving the accuracy of data analysis, contributing to business decisions and improving marketing efficiency.
至此,己经详细介绍了本申请各个实施例的应用环境和相关设备 的硬件结构和功能。下面,将基于上述应用环境和相关设备,提出本申请的各个实施例。So far, the application environment of the various embodiments of the present application and the hardware structure and functions of related devices have been described in detail. Hereinafter, various embodiments of the present application will be proposed based on the above-described application environment and related devices.
首先,本申请提出一种基于爬虫数据的用户行为分析程序200。First, the present application proposes a user behavior analysis program 200 based on crawler data.
参阅图2所示,是本申请基于爬虫数据的用户行为分析程序200第一实施例的程序模块图。Referring to FIG. 2, it is a program module diagram of the first embodiment of the user behavior analysis program 200 based on the crawler data of the present application.
本实施例中,所述的基于爬虫数据的用户行为分析程序200包括一系列的存储于存储器11上的计算机程序指令,当该计算机程序指令被处理器12执行时,可以实现本申请各实施例的基于爬虫数据的用户行为的分析操作。在一些实施例中,基于该计算机程序指令各部分所实现的特定的操作,所述基于爬虫数据的用户行为分析程序200可以被划分为一个或多个模块。例如,在图2中,所述的基于爬虫数据的用户行为分析程序200可以被分割成预先配置模块201、侦测模块202、获取模块203、分析提取模块204、标签模块205及统计模块206。其中:In this embodiment, the crawler data-based user behavior analysis program 200 includes a series of computer program instructions stored in the memory 11, and when the computer program instructions are executed by the processor 12, the embodiments of the present application may be implemented. Analytical operations based on user behavior of crawler data. In some embodiments, the crawler data based user behavior analysis program 200 can be divided into one or more modules based on the particular operations implemented by the various portions of the computer program instructions. For example, in FIG. 2, the crawler data-based user behavior analysis program 200 can be divided into a pre-configuration module 201, a detection module 202, an acquisition module 203, an analysis extraction module 204, a label module 205, and a statistics module 206. among them:
所述预先配置模块201,用于预先配置爬虫应用程序。具体地,所述预先配置模块201通过预设所述爬虫应用程序设置窗口,配置所述爬虫应用程序的爬取规则。The pre-configuration module 201 is configured to pre-configure a crawler application. Specifically, the pre-configuration module 201 configures a crawl rule of the crawler application by preset the crawler application setting window.
在本实施例中,所述爬取规则包括爬取的网站、内容、爬取的文件格式(文字、图片、音频、视频)、爬取的频次等等,即,所述预先配置模块201可以通过配置爬虫应用程序,获取指定范围的大数据信息,进而提高后续用户行为分析的准确性。In this embodiment, the crawling rule includes a crawled website, content, a crawled file format (text, picture, audio, video), frequency of crawling, and the like, that is, the pre-configuration module 201 can By configuring the crawler application, the big data information of the specified scope is obtained, thereby improving the accuracy of subsequent user behavior analysis.
所述侦测模块202,用于侦测所述爬虫应用程序是否开启。The detecting module 202 is configured to detect whether the crawler application is enabled.
所述获取模块203,用于在开启所述爬虫应用程序后,利用所述爬虫应用程序获取爬虫信息。具体地,所述爬虫信息包括用户爬取的网站、用户爬取的文件格式、用户爬取的内容、用户的访问IP、用户爬取时间、用户爬取次数中一种或多种的组合。The obtaining module 203 is configured to obtain crawler information by using the crawler application after the crawler application is started. Specifically, the crawler information includes a combination of one or more of a website crawled by the user, a file format crawled by the user, a content crawled by the user, a user's access IP, a user crawl time, and a user crawl time.
在本实施例中,爬虫应用程序可以收集到很多爬虫信息。比如:In this embodiment, the crawler application can collect a lot of crawler information. such as:
第一,人员注册的信息:昵称、电话号码、公司名称、注册地址、注册的IP地址First, information about personnel registration: nickname, phone number, company name, registered address, registered IP address
第二,爬取规则信息:爬取的网站、内容、爬取的文件格式(文字、图片、音频、视频)、爬取的频次;Second, crawl rule information: crawled website, content, crawled file format (text, picture, audio, video), frequency of crawling;
第三,爬取数据提取信息:用户提取数据的时间、提取量、提取范围。Third, crawling data extraction information: time, extraction amount, and extraction range of data extracted by the user.
所述分析提取模块204,用于分析所述爬虫信息并提取关键字。本实施例中,所述关键字包括网站地址、网站类型、爬取内容性质、爬取文件的格式、IP、爬取时间段、爬取频率、爬取数量中的一种或多种的组合。The analysis extraction module 204 is configured to analyze the crawler information and extract keywords. In this embodiment, the keyword includes a combination of one or more of a website address, a website type, a crawl content property, a format of a crawl file, an IP, a crawl time period, a crawl frequency, and a crawl amount. .
在本实施例中,如果爬取信息中有网站信息,那么可以提取其中 的网址或者相应网站的类型作为关键字;如果爬取信息有用户的访问IP,那么IP可以作为关键字;如果爬取信息是爬取时间,那么以该时间左右一定范围的时间段为关键字;如果爬取信息为用户爬取的内容,那么以该内容的性质为关键字,比如视频、音乐、图片等等;如果爬取信息是爬取的文件格式,那么以相应格式为关键字;如果爬取信息是爬取次数,则可以爬取频率或爬取数量为关键字。In this embodiment, if there is website information in the crawl information, the website address or the type of the corresponding website may be extracted as a keyword; if the crawl information has the user's access IP, the IP may be used as a keyword; if crawling The information is the crawl time, then the time range of a certain range is used as the keyword; if the crawling information is the content crawled by the user, the nature of the content is used as a keyword, such as video, music, picture, etc.; If the crawl information is the file format of the crawl, the corresponding format is the keyword; if the crawl information is the number of crawls, the crawl frequency or the number of crawls can be used as the keyword.
所述标签模块205,用于利用所述关键字对用户打上标签。例如,提取网址或者相应网站的类型作为关键字时,用户标签可以根据用户访问的网址分为投资客,储户,或者投保人,当关键字为IP时,用户标签可以根据IP分为学校,医院,银行等,当关键字为视频、音乐、图片时,用户标签可以根据视频、音乐、图片的访问频率分为音乐人,编剧,粉丝等。The tag module 205 is configured to tag the user by using the keyword. For example, when the URL is extracted or the type of the corresponding website is used as a keyword, the user tag can be divided into an investor, a depositor, or an insured according to the URL accessed by the user. When the keyword is IP, the user tag can be classified into schools according to the IP, and the hospital. , banks, etc., when the keywords are video, music, pictures, user tags can be divided into musicians, screenwriters, fans, etc. according to the frequency of access to video, music, and pictures.
所述统计模块206,用于根据所述标签模块205对用户打上的标签进行用户行为统计。The statistic module 206 is configured to perform user behavior statistics on the tags that are tagged by the user according to the tag module 205.
具体地,所述标签模块205主要通过以下方式对用户行为进行统计:所述标签模块205根据预设指标对打上所述标签的用户进行聚类;并根据聚类后的用户的数据统计用户行为。Specifically, the label module 205 collects statistics on user behaviors by using the following manners: the label module 205 clusters users who have the labels according to preset indicators, and collects user behaviors according to the collected data of the users. .
具体地,所述预设指标包括:近度、频度、额度。Specifically, the preset indicator includes: a proximity, a frequency, and a quota.
本实施例中,统计用户行为,也可以称之为用户画像(User Profile),用户画像的底层是机器学习,那么无论是要做客户分群还是精准营销,都先要将用户数据进行规整处理,转化为相同维度的特征向量,诸多华丽的算法才可以有用武之地,所谓的规整处理比如聚类,回归,关联,各种分类器等等。In this embodiment, the user behavior is also counted as a User Profile. The bottom layer of the user image is machine learning. Then, whether it is to do customer grouping or precision marketing, the user data must be processed regularly. Converted into feature vectors of the same dimension, many gorgeous algorithms can be useful, so-called regular processing such as clustering, regression, correlation, various classifiers and so on.
在本实施例中,通过上述方案首先对用户进行了标签化处理,定义多种维度。然后基于同一维度去统计用户数,进而分析用户行为。在本实施方式中,所述预设指标中的近度(Recency)指的是用户第一次或最后一次的爬取时间;频度(Frequency)指的是用户的爬取频率;额度(Monetory)指的是用户的爬取数量。当然在其他实施例中,还可以选择其他指标作为聚类指标,比如爬取信息涉及评分内容,那么标签可以是评分,聚类指标可以选择爬取内容评分,或者选择用户数量作为聚类指标等等。In this embodiment, the user is first tagged by the above scheme to define multiple dimensions. Then count the number of users based on the same dimension to analyze user behavior. In this embodiment, the recency in the preset indicator refers to the first or last crawl time of the user; the frequency refers to the user's crawl frequency; the amount (Monetory) ) refers to the number of crawls by the user. In other embodiments, other indicators may also be selected as clustering indicators. For example, the crawling information refers to the rating content, then the label may be a rating, the clustering indicator may select a crawling content rating, or the number of users may be selected as a clustering indicator. Wait.
通过上述对标签化的数据进行聚类,可以获取用户关注度高的一些网站或者内容、也可以获取使用爬虫程序的用户分布情况等等。根据上述聚类得出的用户行为,可以辅助商业决策,提高营销效率。By clustering the tagged data as described above, it is possible to obtain some websites or contents with high user attention, and also to obtain distribution of users who use the crawler program. According to the user behavior obtained by the above clustering, it can assist business decision-making and improve marketing efficiency.
通过上述程序模块201-206,本申请所提出的基于爬虫数据的用户行为分析程序200,首先,预先配置爬虫应用程序;其次,侦测所述爬虫应用程序是否开启;然后,在开启所述爬虫应用程序后,再次, 利用所述爬虫应用程序获取爬虫信息;接着,分析所述爬虫信息并提取关键字;进一步地,利用所述关键字对用户打上标签;最后,根据所述标签进行用户行为统计。这样,可以避免现有技术中大数据获取数据量大而杂,无法做到数据的初步范围划定,进而影响后续用户行为分析的准确性的弊端。通过初步的划定用户数据的范围,同时对用户数据的标签化在聚类处理,获取用户行为,提高了数据分析的准确性,有助于商业决策,提高营销效率。Through the above program modules 201-206, the crawler data-based user behavior analysis program 200 proposed by the present application firstly pre-configures the crawler application; secondly, detects whether the crawler application is turned on; and then, opens the crawler After the application, again, using the crawler application to obtain crawler information; then, analyzing the crawler information and extracting keywords; further, using the keyword to tag the user; and finally, performing user behavior according to the tag statistics. In this way, the large amount of data acquired by the big data in the prior art can be avoided, and the preliminary range delineation of the data cannot be performed, thereby affecting the drawbacks of the accuracy of subsequent user behavior analysis. By preliminarily delineating the scope of user data, and simultaneously tagging user data in cluster processing, obtaining user behavior, improving the accuracy of data analysis, contributing to business decisions and improving marketing efficiency.
此外,本申请还提出一种基于爬虫数据的用户行为分析方法。In addition, the present application also proposes a user behavior analysis method based on crawler data.
参阅图3所示,是本申请基于爬虫数据的用户行为分析方法第一实施例的流程图。在本实施例中,根据不同的需求,图3所示的流程图中的步骤的执行顺序可以改变,某些步骤可以省略。Referring to FIG. 3, it is a flowchart of the first embodiment of the user behavior analysis method based on crawler data in the present application. In this embodiment, the order of execution of the steps in the flowchart shown in FIG. 3 may be changed according to different requirements, and some steps may be omitted.
步骤S301,预先配置爬虫应用程序。具体地,所述应用服务器1通过预设所述爬虫应用程序设置窗口,配置所述爬虫应用程序的爬取规则。In step S301, the crawler application is pre-configured. Specifically, the application server 1 configures a crawl rule of the crawler application by preset the crawler application setting window.
在本实施例中,所述爬取规则包括爬取的网站、内容、爬取的文件格式(文字、图片、音频、视频)、爬取的频次等等,即,所述应用服务器1可以通过配置爬虫应用程序,获取指定范围的大数据信息,进而提高后续用户行为分析的准确性。In this embodiment, the crawling rule includes a crawled website, content, a crawled file format (text, picture, audio, video), frequency of crawling, and the like, that is, the application server 1 can pass Configure the crawler application to obtain the specified range of big data information, thereby improving the accuracy of subsequent user behavior analysis.
步骤S302,侦测所述爬虫应用程序是否开启。当所述爬虫应用程序开启时,执行步骤S303,否则,结束流程。Step S302, detecting whether the crawler application is enabled. When the crawler application is started, step S303 is performed, otherwise, the flow is ended.
步骤S303,利用所述爬虫应用程序获取爬虫信息。Step S303, acquiring crawler information by using the crawler application.
具体地,所述爬虫信息包括用户爬取的网站、用户爬取的文件格式、用户爬取的内容、用户的访问IP、用户爬取时间、用户爬取次数中一种或多种的组合。Specifically, the crawler information includes a combination of one or more of a website crawled by the user, a file format crawled by the user, a content crawled by the user, a user's access IP, a user crawl time, and a user crawl time.
在本实施例中,爬虫应用程序可以收集到很多爬虫信息。比如:In this embodiment, the crawler application can collect a lot of crawler information. such as:
第一,人员注册的信息:昵称、电话号码、公司名称、注册地址、注册的IP地址。First, information about personnel registration: nickname, phone number, company name, registered address, registered IP address.
第二,爬取规则信息:爬取的网站、内容、爬取的文件格式(文字、图片、音频、视频)、爬取的频次。Second, crawl rule information: the crawled website, content, crawled file format (text, image, audio, video), the frequency of crawling.
第三,爬取数据提取信息:用户提取数据的时间、提取量、提取范围。Third, crawling data extraction information: time, extraction amount, and extraction range of data extracted by the user.
步骤S304,分析所述爬虫信息并提取关键字。Step S304, analyzing the crawler information and extracting keywords.
本实施例中,所述关键字包括网站地址、网站类型、爬取内容性质、爬取文件的格式、IP、爬取时间段、爬取频率、爬取数量中的一种或多种的组合。In this embodiment, the keyword includes a combination of one or more of a website address, a website type, a crawl content property, a format of a crawl file, an IP, a crawl time period, a crawl frequency, and a crawl amount. .
在本实施例中,如果爬取信息中有网站信息,那么可以提取其中的网址或者相应网站的类型作为关键字;如果爬取信息有用户的访问 IP,那么IP可以作为关键字;如果爬取信息是爬取时间,那么以该时间左右一定范围的时间段为关键字;如果爬取信息为用户爬取的内容,那么以该内容的性质为关键字,比如视频、音乐、图片等等;如果爬取信息是爬取的文件格式,那么以相应格式为关键字;如果爬取信息是爬取次数,则可以爬取频率或爬取数量为关键字。In this embodiment, if there is website information in the crawl information, the website address or the type of the corresponding website may be extracted as a keyword; if the crawl information has the user's access IP, the IP may be used as a keyword; if crawling The information is the crawl time, then the time range of a certain range is used as the keyword; if the crawling information is the content crawled by the user, the nature of the content is used as a keyword, such as video, music, picture, etc.; If the crawl information is the file format of the crawl, the corresponding format is the keyword; if the crawl information is the number of crawls, the crawl frequency or the number of crawls can be used as the keyword.
步骤S305,利用所述关键字对用户打上标签。例如,提取网址或者相应网站的类型作为关键字时,用户标签可以根据用户访问的网址分为投资客,储户,或者投保人,当关键字为IP时,用户标签可以根据IP分为学校,医院,银行等,当关键字为视频、音乐、图片时,用户标签可以根据视频、音乐、图片的访问频率分为音乐人,编剧,粉丝等。Step S305, the user is tagged by using the keyword. For example, when the URL is extracted or the type of the corresponding website is used as a keyword, the user tag can be divided into an investor, a depositor, or an insured according to the URL accessed by the user. When the keyword is IP, the user tag can be classified into schools according to the IP, and the hospital. , banks, etc., when the keywords are video, music, pictures, user tags can be divided into musicians, screenwriters, fans, etc. according to the frequency of access to video, music, and pictures.
步骤S306,根据所述标签进行用户行为统计。具体地,所述根据所述标签进行用户行为统计的具体步骤将在本申请基于爬虫数据的用户行为分析方法第二实施例(图4)进行详述。Step S306, performing user behavior statistics according to the tag. Specifically, the specific step of performing user behavior statistics according to the label is described in detail in the second embodiment (FIG. 4) of the user behavior analysis method based on the crawler data in the present application.
通过上述步骤S301-306,本申请所提出的基于爬虫数据的用户行为分析方法,所述应用服务器1首先,预先配置爬虫应用程序;其次,侦测所述爬虫应用程序是否开启;然后,在开启所述爬虫应用程序后,再次,利用所述爬虫应用程序获取爬虫信息;接着,分析所述爬虫信息并提取关键字;进一步地,利用所述关键字对用户打上标签;最后,根据所述标签进行用户行为统计。这样,可以避免现有技术中大数据获取数据量大而杂,无法做到数据的初步范围划定,进而影响后续用户行为分析的准确性的弊端。通过初步的划定用户数据的范围,同时对用户数据的标签化在聚类处理,获取用户行为,提高了数据分析的准确性,有助于商业决策,提高营销效率。Through the above steps S301-306, the crawler data-based user behavior analysis method proposed by the present application, the application server 1 firstly pre-configures the crawler application; secondly, detecting whether the crawler application is turned on; and then, turning on After the crawler application, again, using the crawler application to acquire crawler information; then, analyzing the crawler information and extracting keywords; further, using the keyword to tag the user; and finally, according to the tag Perform user behavior statistics. In this way, the large amount of data acquired by the big data in the prior art can be avoided, and the preliminary range delineation of the data cannot be performed, thereby affecting the drawbacks of the accuracy of subsequent user behavior analysis. By preliminarily delineating the scope of user data, and simultaneously tagging user data in cluster processing, obtaining user behavior, improving the accuracy of data analysis, contributing to business decisions and improving marketing efficiency.
参阅图4所示,是本申请基于爬虫数据的用户行为分析方法第二实施例的流程图。在本实施例中,根据不同的需求,图4所示的流程图中的步骤的执行顺序可以改变,某些步骤可以省略。Referring to FIG. 4, it is a flowchart of a second embodiment of a user behavior analysis method based on crawler data in the present application. In this embodiment, the order of execution of the steps in the flowchart shown in FIG. 4 may be changed according to different requirements, and some steps may be omitted.
在本实施例中,所述根据标签进行用户行为统计的步骤,具体包括:In this embodiment, the step of performing user behavior statistics according to the label specifically includes:
步骤S401,根据预设指标对打上标签的用户进行聚类。Step S401: Cluster the users who are tagged according to the preset indicator.
本实施例中,所述应用服务器1利用所述关键字对用户打上标签,所述关键字包括网站地址、网站类型、爬取内容性质、爬取文件的格式、IP、爬取时间段、爬取频率、爬取数量中的一种或多种的组合。In this embodiment, the application server 1 tags the user by using the keyword, including the website address, the website type, the nature of the crawled content, the format of the crawled file, the IP, the crawling time period, and the crawling. Take a combination of one or more of the frequency and the number of crawls.
在本实施例中,如果爬取信息中有网站信息,那么可以提取其中的网址或者相应网站的类型作为关键字;如果爬取信息有用户的访问 IP,那么IP可以作为关键字;如果爬取信息是爬取时间,那么以该时间左右一定范围的时间段为关键字;如果爬取信息为用户爬取的内容,那么以该内容的性质为关键字,比如视频、音乐、图片等等;如果爬取信息是爬取的文件格式,那么以相应格式为关键字;如果爬取信息是爬取次数,则可以爬取频率或爬取数量为关键字。In this embodiment, if there is website information in the crawl information, the website address or the type of the corresponding website may be extracted as a keyword; if the crawl information has the user's access IP, the IP may be used as a keyword; if crawling The information is the crawl time, then the time range of a certain range is used as the keyword; if the crawling information is the content crawled by the user, the nature of the content is used as a keyword, such as video, music, picture, etc.; If the crawl information is the file format of the crawl, the corresponding format is the keyword; if the crawl information is the number of crawls, the crawl frequency or the number of crawls can be used as the keyword.
其中,例如,提取网址或者相应网站的类型作为关键字时,用户标签可以根据用户访问的网址分为投资客,储户,或者投保人,当关键字为IP时,用户标签可以根据IP分为学校,医院,银行等,当关键字为视频、音乐、图片时,用户标签可以根据视频、音乐、图片的访问频率分为音乐人,编剧,粉丝等。具体地,所述预设指标包括:近度、频度、额度。For example, when the URL is extracted or the type of the corresponding website is used as a keyword, the user tag can be divided into an investor, a depositor, or an insured according to the URL accessed by the user. When the keyword is IP, the user tag can be classified into schools according to the IP. , hospitals, banks, etc., when the keywords are video, music, pictures, user tags can be divided into musicians, screenwriters, fans, etc. according to the frequency of access to video, music, and pictures. Specifically, the preset indicator includes: a proximity, a frequency, and a quota.
步骤S402,根据聚类后的用户的数据统计用户行为。本实施例中,统计用户行为,也可以称之为用户画像(User Profile),用户画像的底层是机器学习,那么无论是要做客户分群还是精准营销,都先要将用户数据进行规整处理,转化为相同维度的特征向量,诸多华丽的算法才可以有用武之地,所谓的规整处理比如聚类,回归,关联,各种分类器等等。Step S402, the user behavior is calculated according to the data of the clustered user. In this embodiment, the user behavior is also counted as a User Profile. The bottom layer of the user image is machine learning. Then, whether it is to do customer grouping or precision marketing, the user data must be processed regularly. Converted into feature vectors of the same dimension, many gorgeous algorithms can be useful, so-called regular processing such as clustering, regression, correlation, various classifiers and so on.
在本实施例中,通过上述方案,首先对用户进行了标签化处理,定义多种维度。然后基于同一维度去统计用户数,进而分析用户行为。在本实施方式中,所述预设指标中的近度(Recency)指的是用户第一次或最后一次的爬取时间;频度(Frequency)指的是用户的爬取频率;额度(Monetory)指的是用户的爬取数量。当然在其他实施例中,还可以选择其他指标作为聚类指标,比如爬取信息涉及评分内容,那么标签可以是评分,聚类指标可以选择爬取内容评分,或者选择用户数量作为聚类指标等等。In this embodiment, through the above solution, the user is first tagged to define multiple dimensions. Then count the number of users based on the same dimension to analyze user behavior. In this embodiment, the recency in the preset indicator refers to the first or last crawl time of the user; the frequency refers to the user's crawl frequency; the amount (Monetory) ) refers to the number of crawls by the user. In other embodiments, other indicators may also be selected as clustering indicators. For example, the crawling information refers to the rating content, then the label may be a rating, the clustering indicator may select a crawling content rating, or the number of users may be selected as a clustering indicator. Wait.
通过上述对标签化的数据进行聚类,可以获取用户关注度高的一些网站或者内容、也可以获取使用爬虫程序的用户分布情况等等。根据上述聚类得出的用户行为,可以辅助商业决策,提高营销效率。By clustering the tagged data as described above, it is possible to obtain some websites or contents with high user attention, and also to obtain distribution of users who use the crawler program. According to the user behavior obtained by the above clustering, it can assist business decision-making and improve marketing efficiency.
通过上述步骤S401-402,本申请所提出的基于爬虫数据的用户行为分析方法,通过对标签化的数据进行聚类,可以获取用户关注度高的一些网站或者内容、也可以获取使用爬虫程序的用户分布情况等。而且,根据聚类得出的用户行为,可以辅助商业决策,提高营销效率。。Through the above steps S401-402, the user behavior analysis method based on the crawler data proposed by the present application can obtain some websites or contents with high user attention by clustering the tagged data, and can also obtain the use of the crawler program. User distribution, etc. Moreover, based on the user behavior derived from clustering, it can assist business decisions and improve marketing efficiency. .
上述本申请实施例序号仅仅为了描述,不代表实施例的优劣。The serial numbers of the embodiments of the present application are merely for the description, and do not represent the advantages and disadvantages of the embodiments.
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这 样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。Through the description of the above embodiments, those skilled in the art can clearly understand that the foregoing embodiment method can be implemented by means of software plus a necessary general hardware platform, and of course, can also be through hardware, but in many cases, the former is better. Implementation. Based on such understanding, the technical solution of the present application, which is essential or contributes to the prior art, may be embodied in the form of a software product stored in a storage medium (such as ROM/RAM, disk, The optical disc includes a number of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods described in various embodiments of the present application.
以上所述仅为本申请的优选实施例,并非因此限制本申请的专利范围,凡是在本申请的申请构思下,利用本申请说明书及附图内容所作的等效结构变换,或直接/间接运用在其他相关的技术领域均包括在本申请的专利保护范围内。The above description is only a preferred embodiment of the present application, and is not intended to limit the scope of the patent application, and the equivalent structural transformation, or direct/indirect use, of the present application and the contents of the drawings is used in the application of the present application. All other related technical fields are included in the patent protection scope of the present application.

Claims (20)

  1. 一种基于爬虫数据的用户行为分析方法,应用于应用服务器,其特征在于,所述方法包括:A user behavior analysis method based on crawler data is applied to an application server, and the method includes:
    预先配置爬虫应用程序;Pre-configure the crawler application;
    侦测所述爬虫应用程序是否开启;Detecting whether the crawler application is enabled;
    在开启所述爬虫应用程序后,利用所述爬虫应用程序获取爬虫信息;After the crawler application is opened, the crawler application is used to obtain crawler information;
    分析所述爬虫信息并提取关键字;Analyzing the crawler information and extracting keywords;
    利用所述关键字对用户打上标签;及Using the keywords to tag users; and
    根据所述标签进行用户行为统计。User behavior statistics are performed based on the tags.
  2. 如权利要求1所述的基于爬虫数据的用户行为分析方法,其特征在于,所述根据所述标签进行用户行为统计的步骤,具体包括:The method for analyzing user behavior based on the crawler data according to claim 1, wherein the step of performing user behavior statistics according to the label comprises:
    根据预设指标对打上所述标签的用户进行聚类;及Clustering users who tag the tags according to preset criteria; and
    根据聚类后的用户的数据统计用户行为。User behavior is counted based on the data of the clustered users.
  3. 如权利要求2所述的基于爬虫数据的用户行为分析方法,其特征在于,所述预设指标包括:近度、频度、额度。The crawler data-based user behavior analysis method according to claim 2, wherein the preset indicator comprises: a proximity, a frequency, and a quota.
  4. 如权利要求1所述的基于爬虫数据的用户行为分析方法,其特征在于,所述预先配置爬虫程序的步骤,具体包括:The reptile data-based user behavior analysis method according to claim 1, wherein the step of pre-configuring the crawler program comprises:
    通过预设所述爬虫应用程序设置窗口,配置所述爬虫应用程序的爬取规则。The crawling rules of the crawler application are configured by presetting the crawler application settings window.
  5. 如权利要求4所述的基于爬虫数据的用户行为分析方法,其特征在于,所述根据所述标签进行用户行为统计的步骤,具体包括:The reptile data-based user behavior analysis method according to claim 4, wherein the step of performing user behavior statistics according to the label comprises:
    根据预设指标对打上所述标签的用户进行聚类;及Clustering users who tag the tags according to preset criteria; and
    根据聚类后的用户的数据统计用户行为。User behavior is counted based on the data of the clustered users.
  6. 如权利要求1所述的基于爬虫数据的用户行为分析方法,其特征在于,所述爬虫信息包括用户爬取的网站、用户爬取的文件格式、用户爬取的内容、用户的访问IP、用户爬取时间、用户爬取次数中一种或多种的组合。The crawler data-based user behavior analysis method according to claim 1, wherein the crawler information comprises a website crawled by a user, a file format crawled by the user, a content crawled by the user, a user access IP, and a user. A combination of one or more of crawl time and user crawl times.
  7. 如权利要求6所述的基于爬虫数据的用户行为分析方法,其特征在于,所述根据所述标签进行用户行为统计的步骤,具体包括:The reptile data-based user behavior analysis method according to claim 6, wherein the step of performing user behavior statistics according to the label comprises:
    根据预设指标对打上所述标签的用户进行聚类;及Clustering users who tag the tags according to preset criteria; and
    根据聚类后的用户的数据统计用户行为。User behavior is counted based on the data of the clustered users.
  8. 如权利要求1所述的基于爬虫数据的用户行为分析方法,其特征在于,所述关键字包括网站地址、网站类型、爬取内容性质、爬取文件的格式、IP、爬取时间段、爬取频率、爬取数量中的一种或多种的组合。The crawler data-based user behavior analysis method according to claim 1, wherein the keyword includes a website address, a website type, a crawl content property, a format of a crawl file, an IP, a crawl time period, and a crawl. Take a combination of one or more of the frequency and the number of crawls.
  9. 如权利要求8所述的基于爬虫数据的用户行为分析方法,其特征在于,所述根据所述标签进行用户行为统计的步骤,具体包括:The reptile data-based user behavior analysis method according to claim 8, wherein the step of performing user behavior statistics according to the label comprises:
    根据预设指标对打上所述标签的用户进行聚类;及Clustering users who tag the tags according to preset criteria; and
    根据聚类后的用户的数据统计用户行为。User behavior is counted based on the data of the clustered users.
  10. 一种应用服务器,其特征在于,所述应用服务器包括存储器、处理器,所述存储器上存储有可在所述处理器上运行的基于爬虫数据的用户行为分析程序,所述基于爬虫数据的用户行为分析程序被所述处理器执行时实现如下步骤:An application server, comprising: a memory, a processor, wherein the memory stores a crawler data-based user behavior analysis program executable on the processor, the crawler data-based user The behavior analysis program is implemented by the processor to implement the following steps:
    预先配置爬虫应用程序;Pre-configure the crawler application;
    侦测所述爬虫应用程序是否开启;Detecting whether the crawler application is enabled;
    在开启所述爬虫应用程序后,利用所述爬虫应用程序获取爬虫信息;After the crawler application is opened, the crawler application is used to obtain crawler information;
    分析所述爬虫信息并提取关键字;Analyzing the crawler information and extracting keywords;
    利用所述关键字对用户打上标签;及Using the keywords to tag users; and
    根据所述标签进行用户行为统计。User behavior statistics are performed based on the tags.
  11. 如权利要求10所述的应用服务器,其特征在于,所述根据所述标签进行用户行为统计的步骤,具体包括:The application server according to claim 10, wherein the step of performing user behavior statistics according to the label comprises:
    根据预设指标对打上所述标签的用户进行聚类;及Clustering users who tag the tags according to preset criteria; and
    根据聚类后的用户的数据统计用户行为。User behavior is counted based on the data of the clustered users.
  12. 如权利要求11所述的应用服务器,其特征在于,所述预设指标包括:近度、频度、额度。The application server according to claim 11, wherein the preset indicator comprises: proximity, frequency, and credit.
  13. 如权利要求10所述的应用服务器,其特征在于,所述预先配置爬虫程序的步骤,具体包括:The application server according to claim 10, wherein the step of pre-configuring the crawler program comprises:
    通过预设所述爬虫应用程序设置窗口,配置所述爬虫应用程序的爬取规则。The crawling rules of the crawler application are configured by presetting the crawler application settings window.
  14. 如权利要求13所述的应用服务器,其特征在于,所述根据所述标签进行用户行为统计的步骤,具体包括:The application server according to claim 13, wherein the step of performing user behavior statistics according to the label comprises:
    根据预设指标对打上所述标签的用户进行聚类;及Clustering users who tag the tags according to preset criteria; and
    根据聚类后的用户的数据统计用户行为。User behavior is counted based on the data of the clustered users.
  15. 如权利要求10所述的应用服务器,其特征在于,所述爬虫信息包括用户爬取的网站、用户爬取的文件格式、用户爬取的内容、用户的访问IP、用户爬取时间、用户爬取次数中一种或多种的组合。The application server according to claim 10, wherein the crawler information comprises a website crawled by the user, a file format crawled by the user, a content crawled by the user, a user's access IP, a user crawl time, and a user crawl. A combination of one or more of the number of times taken.
  16. 如权利要求15所述的应用服务器,其特征在于,所述根据所述标签进行用户行为统计的步骤,具体包括:The application server according to claim 15, wherein the step of performing user behavior statistics according to the label comprises:
    根据预设指标对打上所述标签的用户进行聚类;及Clustering users who tag the tags according to preset criteria; and
    根据聚类后的用户的数据统计用户行为。User behavior is counted based on the data of the clustered users.
  17. 如权利要求10所述的应用服务器,其特征在于,所述关键字包括网站地址、网站类型、爬取内容性质、爬取文件的格式、IP、爬取时间段、爬取频率、爬取数量中的一种或多种的组合。The application server according to claim 10, wherein the keywords include a website address, a website type, a crawl content property, a format of a crawl file, an IP, a crawl time period, a crawl frequency, and a crawl amount. a combination of one or more of them.
  18. 如权利要求17所述的应用服务器,其特征在于,所述根据所述标签进行用户行为统计的步骤,具体包括:The application server according to claim 17, wherein the step of performing user behavior statistics according to the label comprises:
    根据预设指标对打上所述标签的用户进行聚类;及Clustering users who tag the tags according to preset criteria; and
    根据聚类后的用户的数据统计用户行为。User behavior is counted based on the data of the clustered users.
  19. 一种计算机可读存储介质,其特征在于,所述计算机可读存储介质存储有基于爬虫数据的用户行为分析程序,所述基于爬虫数据的用户行为分析程序可被至少一个处理器执行,以使所述至少一个处理器执行以下步骤:A computer readable storage medium, characterized in that the computer readable storage medium stores a user behavior analysis program based on crawler data, and the crawler data based user behavior analysis program can be executed by at least one processor to enable The at least one processor performs the following steps:
    预先配置爬虫应用程序;Pre-configure the crawler application;
    侦测所述爬虫应用程序是否开启;Detecting whether the crawler application is enabled;
    在开启所述爬虫应用程序后,利用所述爬虫应用程序获取爬虫信息;After the crawler application is opened, the crawler application is used to obtain crawler information;
    分析所述爬虫信息并提取关键字;Analyzing the crawler information and extracting keywords;
    利用所述关键字对用户打上标签;及Using the keywords to tag users; and
    根据所述标签进行用户行为统计。User behavior statistics are performed based on the tags.
  20. 如权利要求19所述的计算机可读存储介质,其特征在于,所述根据所述标签进行用户行为统计的步骤,具体包括:The computer readable storage medium according to claim 19, wherein the step of performing user behavior statistics according to the label comprises:
    根据预设指标对打上所述标签的用户进行聚类;及Clustering users who tag the tags according to preset criteria; and
    根据聚类后的用户的数据统计用户行为。User behavior is counted based on the data of the clustered users.
PCT/CN2018/089707 2017-10-13 2018-06-03 Crawler data-based user behavior analysis method, application server and readable storage medium WO2019071966A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710951681.3 2017-10-13
CN201710951681.3A CN107870986A (en) 2017-10-13 2017-10-13 User behavior analysis method, application server and computer-readable recording medium based on reptile data

Publications (1)

Publication Number Publication Date
WO2019071966A1 true WO2019071966A1 (en) 2019-04-18

Family

ID=61753056

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/089707 WO2019071966A1 (en) 2017-10-13 2018-06-03 Crawler data-based user behavior analysis method, application server and readable storage medium

Country Status (2)

Country Link
CN (1) CN107870986A (en)
WO (1) WO2019071966A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107870986A (en) * 2017-10-13 2018-04-03 平安科技(深圳)有限公司 User behavior analysis method, application server and computer-readable recording medium based on reptile data
CN109933502B (en) * 2019-01-23 2022-05-20 平安科技(深圳)有限公司 Electronic device, user operation record processing method and storage medium
CN109918558A (en) * 2019-03-14 2019-06-21 云南电网有限责任公司信息中心 A kind of big data acquisition interface and acquisition method based on the technology that crawls
CN110069686A (en) * 2019-03-15 2019-07-30 平安科技(深圳)有限公司 User behavior analysis method, apparatus, computer installation and storage medium
CN110443632A (en) * 2019-07-05 2019-11-12 中国平安人寿保险股份有限公司 User management method, device, computer equipment and the storage medium of user's portrait
CN110515792B (en) * 2019-07-23 2022-11-25 平安科技(深圳)有限公司 Monitoring method and device based on web version task management platform and computer equipment
CN110601890B (en) * 2019-09-17 2023-03-31 深圳市网心科技有限公司 Network performance analysis method, device, equipment and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110258198A1 (en) * 2010-02-12 2011-10-20 Microsoft Corporation Using behavior data to quickly improve search ranking
CN106844588A (en) * 2017-01-11 2017-06-13 上海斐讯数据通信技术有限公司 A kind of analysis method and system of the user behavior data based on web crawlers
CN106940705A (en) * 2016-12-20 2017-07-11 上海掌门科技有限公司 A kind of method and apparatus for being used to build user's portrait
CN107870986A (en) * 2017-10-13 2018-04-03 平安科技(深圳)有限公司 User behavior analysis method, application server and computer-readable recording medium based on reptile data

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102143224A (en) * 2011-01-25 2011-08-03 张金海 Mobile phone Internet accessing-based user behavior analysis method and device
CN106503015A (en) * 2015-09-07 2017-03-15 国家计算机网络与信息安全管理中心 A kind of method for building user's portrait
US10681088B2 (en) * 2015-09-30 2020-06-09 International Business Machines Corporation Data security system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110258198A1 (en) * 2010-02-12 2011-10-20 Microsoft Corporation Using behavior data to quickly improve search ranking
CN106940705A (en) * 2016-12-20 2017-07-11 上海掌门科技有限公司 A kind of method and apparatus for being used to build user's portrait
CN106844588A (en) * 2017-01-11 2017-06-13 上海斐讯数据通信技术有限公司 A kind of analysis method and system of the user behavior data based on web crawlers
CN107870986A (en) * 2017-10-13 2018-04-03 平安科技(深圳)有限公司 User behavior analysis method, application server and computer-readable recording medium based on reptile data

Also Published As

Publication number Publication date
CN107870986A (en) 2018-04-03

Similar Documents

Publication Publication Date Title
WO2019071966A1 (en) Crawler data-based user behavior analysis method, application server and readable storage medium
WO2019085335A1 (en) Method for discovering investment objects with new words, device and storage medium
WO2019218514A1 (en) Method for extracting webpage target information, device, and storage medium
WO2021073271A1 (en) Public opinion analysis method and device, computer device and storage medium
US8412665B2 (en) Action prediction and identification temporal user behavior
US20230376527A1 (en) Generating congruous metadata for multimedia
CN109636582B (en) Credit information management method, apparatus, device and storage medium
CN105634855B (en) The abnormality recognition method and device of network address
WO2019062081A1 (en) Salesman profile formation method, electronic device and computer readable storage medium
WO2019047849A1 (en) News processing method, apparatus, storage medium and computer device
CN102077201A (en) System and method for dynamic and real-time categorization of webpages
WO2023024670A1 (en) Device clustering method and apparatus, and computer device and storage medium
US20140244241A1 (en) Automated classification of business rules from text
US9372916B2 (en) Document template auto discovery
CN108924381B (en) Image processing method, image processing apparatus, and computer readable medium
WO2021068681A1 (en) Tag analysis method and device, and computer readable storage medium
CN111859093A (en) Sensitive word processing method and device and readable storage medium
CN112162965A (en) Log data processing method and device, computer equipment and storage medium
US9665574B1 (en) Automatically scraping and adding contact information
CN111371757B (en) Malicious communication detection method and device, computer equipment and storage medium
US20240095289A1 (en) Data enrichment systems and methods for abbreviated domain name classification
CN112347457A (en) Abnormal account detection method and device, computer equipment and storage medium
WO2019242156A1 (en) Method and device for controlling application in terminal, and computer readable storage medium
CN114330240A (en) PDF document analysis method and device, computer equipment and storage medium
EP3564833B1 (en) Method and device for identifying main picture in web page

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 29/09/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18865781

Country of ref document: EP

Kind code of ref document: A1