WO2019075944A1 - 基于用户行为的信息屏蔽方法、装置、终端和存储介质 - Google Patents

基于用户行为的信息屏蔽方法、装置、终端和存储介质 Download PDF

Info

Publication number
WO2019075944A1
WO2019075944A1 PCT/CN2018/072106 CN2018072106W WO2019075944A1 WO 2019075944 A1 WO2019075944 A1 WO 2019075944A1 CN 2018072106 W CN2018072106 W CN 2018072106W WO 2019075944 A1 WO2019075944 A1 WO 2019075944A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
key
mask
interface
display
Prior art date
Application number
PCT/CN2018/072106
Other languages
English (en)
French (fr)
Inventor
刘开华
王贵玲
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2019075944A1 publication Critical patent/WO2019075944A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/75Indicating network or usage conditions on the user display

Definitions

  • the present invention relates to the field of network communications, and in particular, to an information shielding method, apparatus, terminal, and storage medium based on user behavior.
  • Marketing campaign promotion generally adopts online and offline simultaneous methods. Since offline activities are restricted by the geographical location of the event and the event is held at a high cost, it can only be promoted in a limited scope; online marketing is not limited by geographic location and is promoted. The cost is lower, the marketing campaign promotion platform will target marketing to more network users, but not all online users have the willingness to participate in the marketing activities or the willingness to purchase. The existing online marketing platform cannot accurately exclude the marketing activities. For interested network users, all network users within the marketing promotion scope may be interfered by different sales advertisements, and the user experience is poor, so that complaints can be made, and how to effectively validate the marketing activities in the promotion interface for the user's browsing operation. Ground shielding is a technical problem that needs to be solved urgently.
  • the main object of the present invention is to provide an information shielding method, device, terminal and storage medium based on user behavior, which aims to accurately shield the advertisement information of the push interface according to the operation behavior of the user, so as to improve the user experience.
  • the present invention provides an information shielding method based on user behavior, and the information shielding method based on user behavior includes the following steps:
  • the advertisement push request sent by the third-party platform in the server is detected, based on the blocked log of the user, the advertisement push request is blocked corresponding to the information frame in the push interface.
  • obtaining the display information of the closed information box of the closing operation on the pushing interface, and determining the shielding information based on the displaying information comprises:
  • the display information is parsed to determine the mask information, and the mask information is a key field and/or a key identifier in the display information;
  • the mask information level is set and a corresponding masking strategy is formed.
  • the displaying information is parsed to determine the masking information, and the step of masking the information into the key field and/or the key identifier in the displaying information includes:
  • the display information is parsed, the key fields and/or key identifiers in the display information are obtained, and the closing operation frequency of the key field and/or the key identifier in the preset time period is counted;
  • the key field and/or the key identifier are saved to the mask database as the mask information.
  • the step of saving the key field and/or the key identifier to the mask database as the mask information step further includes:
  • the preset time period is adjusted to form a new preset time period
  • the frequency of closing the key fields and/or key identifiers in the display database in the display database does not exceed the threshold, the existing key fields and/or key identifiers in the mask database are deleted, in real time. Update the blocking information.
  • the step of setting the mask information level and forming a corresponding mask policy includes:
  • the shielding information of the push interface that is not longer than the first time interval is used as the primary shielding information and forms a primary shielding policy
  • the shielding information of the push interface is greater than the shielding information of the first time interval not greater than the second time interval as the secondary shielding information and forms a secondary shielding policy;
  • the mask information of the push interface whose display duration is greater than the second time interval is used as the third-level mask information and forms a three-level masking strategy.
  • the step of blocking the information push box corresponding to the information frame in the push interface based on the blocked log of the user includes:
  • the step of comparing the key field and/or the key identifier in the information to be displayed with the key field and/or the key identifier in the screening database to block the information push box in the corresponding push information interface includes: :
  • the information frame in the push interface corresponding to the advertisement push request is blocked based on the personal information of the user in the mask log.
  • the present invention also provides an information shielding apparatus based on user behavior, and the information shielding apparatus based on user behavior includes:
  • the detection determining module is configured to: when detecting the closing operation based on the terminal pushing interface, obtain display information of the closed information box of the closing operation on the pushing interface, and determine the shielding information based on the display information;
  • a log generation module configured to generate a mask log corresponding to the user based on the mask information and the personal information of the terminal user;
  • the push screening module is configured to block the information frame in the push interface corresponding to the advertisement push request based on the blocked log of the user when detecting the advertisement push request sent by the third-party platform in the server.
  • the present invention further provides a terminal, the terminal comprising: a memory, a processor, and a user behavior based information masking program stored on the memory and operable on the processor, wherein:
  • the advertisement push request sent by the third-party platform in the server is detected, based on the blocked log of the user, the advertisement push request is blocked corresponding to the information frame in the push interface.
  • the present invention further provides a computer storage medium on which a message shielding program based on user behavior is stored, and the information shielding program based on user behavior is implemented by a processor to implement the above-described user behavior based The steps of the information masking method.
  • the information shielding method based on the user behavior proposed by the embodiment of the present invention collects the display information in the push interface closed by the user, analyzes the display information, and obtains the key segment and/or the key identifier in the display information to generate the mask information. And the mask information is generated and the user's personal information is generated into a mask log.
  • the information frame pushed by the interface includes the key segment of the mask information and/or Or the key identifier shields the push interface.
  • the user-based operation behavior is accurately shielded from the marketing campaign advertisement of the push interface, and the user can avoid the interference of the marketing campaign advertisement of the push interface and improve the user experience, and at the same time, organize the planning party for the marketing activity. According to the information shielding situation of each user, the promotion direction of marketing advertisements can be obtained in reverse to improve the effectiveness of marketing activities.
  • FIG. 1 is a schematic structural diagram of a terminal in a hardware operating environment according to an embodiment of the present invention
  • FIG. 2 is a schematic flowchart of an embodiment of an information shielding method based on user behavior according to the present invention
  • step S10 of the information shielding method based on user behavior in FIG. 2;
  • FIG. 4 is a schematic flowchart diagram of another embodiment of an information shielding method based on user behavior according to the present invention.
  • FIG. 5 is a schematic diagram of a specific scenario of an application of an information shielding method based on user behavior according to the present invention
  • FIG. 6 is a schematic diagram of functional modules of an embodiment of an information shielding apparatus based on user behavior according to the present invention.
  • the main solution of the embodiment of the present invention is: extracting display information that the user feels useless based on the user's shutdown operation behavior, and generating a mask log corresponding to the display information and the individual of the terminal user, when the advertisement information of the marketing activity category appears, The advertisement information is compared with the blocked log to block the advertisement information that the customer feels useless.
  • the planner of the marketing activity can inversely derive the marketing advertisements that the user is interested in according to the shielding logs of each user to improve the marketing activities. Results.
  • the information shielding method in the prior art presents two extremes: 1. Regardless of the user's use experience, the marketing activity information is posted to all end users through the push interface, so that the push cost of the activity is high, and the user is also caused. The experience is poor; 2. Some websites or some users are simply and rudely shielded from all the push information because they are afraid of the interference of marketing activities. In this way, from the perspective of the network management side, this may be because there is no advertisement. The delivery reduces some of the revenue. From the perspective of the user, some of the activities of interest may be directly blocked, and the amount of information received may decrease. From the perspective of the organization planner of the marketing campaign, marketing activities may occur. The number of pushes is reduced, but the impact on the revenue is small.
  • the invention provides a solution for the advertisement information in the push interface in the network to reach a balanced state, and the user can accurately shield the advertisement information in the partial push interface according to his own needs, and view the part of interest.
  • the event organizer can promote the marketing campaign to interested end users.
  • FIG. 1 is a schematic structural diagram of a terminal in a hardware operating environment according to an embodiment of the present invention.
  • the terminal in the embodiment of the present invention may be a PC, or may be a smart phone, a tablet computer, an e-book reader, and an MP3 (Moving Picture). Experts Group Audio Layer III, Motion Picture Expert Compress Standard Audio Level 3) Player, MP4 (Moving Picture Experts Group Audio Layer IV, the dynamic image expert compresses the standard audio layer 3) a portable terminal device having a display function such as a player or a portable computer, and it is necessary to additionally explain that the information shielding device based on the user behavior in the present invention is also a part of the terminal, It can be used as a terminal separately.
  • the information shielding device based on user behavior in the present invention can be used by a user as a component of the terminal, and the terminal can communicate with the network server, and the server can acquire related information in the terminal, when the server faces marketing.
  • the server may obtain the shielding log collected by the information shielding device based on the user behavior in the terminal, guide the promotion direction of the marketing activity, and deliver the advertisement information to the interested end user to improve the marketing activity.
  • the effect in combination with Figure 5, the marketing campaign organizer shown in Figure 5 obtains the blocked log of each terminal in the server, corresponding to the terminal that should push the marketing activity interface).
  • the terminal may include a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, and a communication bus 1002.
  • the communication bus 1002 is used to implement connection communication between these components.
  • the user interface 1003 can include a display, an input unit such as a keyboard, and the optional user interface 1003 can also include a standard wired interface, a wireless interface.
  • the network interface 1004 can optionally include a standard wired interface, a wireless interface (such as a WI-FI interface).
  • the memory 1005 may be a high speed RAM memory or a stable memory (non-volatile) Memory), such as disk storage.
  • the memory 1005 can also optionally be a storage device independent of the aforementioned processor 1001.
  • the terminal may further include a camera, RF (Radio) Frequency, RF) circuits, sensors, audio circuits, WiFi modules, and more.
  • sensors such as light sensors, motion sensors, and other sensors.
  • the mobile terminal can also be configured with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, an infrared sensor, and the like, and details are not described herein again.
  • terminal structure shown in FIG. 1 does not constitute a limitation to the terminal, and may include more or less components than those illustrated, or a combination of certain components, or different component arrangements.
  • the computer software product is stored in a storage medium (storage medium: also called computer storage medium, readable storage medium, computer readable storage medium or directly called medium, such as ROM/RAM, disk, optical disc).
  • storage medium also called computer storage medium, readable storage medium, computer readable storage medium or directly called medium, such as ROM/RAM, disk, optical disc.
  • the method includes a plurality of instructions for causing a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method of various embodiments of the present invention, and may be included in the memory 1005 as a computer storage medium.
  • Operating system, network communication module, user interface module, and information shielding application based on user behavior.
  • the network interface 1004 is mainly used to connect to the background server and perform data communication with the background server;
  • the user interface 1003 is mainly used to connect the client (user end), and perform data communication with the client;
  • the processor 1001 may be used to invoke a user behavior based information masking application stored in memory 1005 to perform the steps of the user behavior based information masking method in various embodiments of the present invention.
  • an embodiment of the present invention provides an information shielding method based on user behavior, and an information shielding method based on user behavior includes:
  • Step S10 When the shutdown operation based on the terminal push interface is detected, the display information of the closed information frame on the push interface of the close operation is acquired, and the mask information is determined based on the display information.
  • the terminal When the terminal (application software or website) detects that the user closes the terminal push interface, the terminal acquires the display information of the closed message box on the push interface, that is, the push interface may include one or more advertisement information frames, and the terminal corresponds to Obtaining the display information in the information box closed by the user in the push interface. If there is only one information frame in the push interface, the terminal obtains the display information in the information frame, and parses the obtained display information to determine the key in the display information.
  • Key field and/or key identifier the key field can be a keyword, word, sentence in the display information; key identifier: can be a specific logo image in the display image) to be parsed
  • key field and/or key identifier in the obtained display information is used as the mask information.
  • Step S20 Generate a masked log corresponding to the user based on the mask information and the personal information of the terminal user.
  • the mask information to be determined by the terminal and the personal information of the terminal user includes: device identification information of the terminal, network information browsed by the terminal user, registered login information of the terminal user on a specific page, and web browsing information of the terminal user in advance
  • the information masking method in the present invention is based on a user's individual operation behavior. For example, if no mask log is generated for the end user's personal information, the mask information may be only at the corresponding terminal.
  • the push interface will still be displayed, and the request for effectively blocking the push display information cannot be reached; if there is no personal information for the end user, the information may be only for the specific web page, when the user browses The push interface of other web pages will still be displayed, and the information shielding method is not accurate and efficient.
  • Step S30 When detecting an advertisement push request sent by the third-party platform in the server, block the advertisement push request corresponding to the information frame in the push interface based on the blocked log of the user.
  • the terminal When the terminal (application software or website) detects the push request of the interface, the terminal obtains the display information corresponding to the advertisement push request corresponding to the push interface information box, and obtains the blocked log of the user, and the terminal extracts the push push request corresponding to the push interface information box.
  • the key fields and/or key identifiers in the displayed information are compared with the key fields and/or key identifiers of the masked logs, and the key fields and/or key identifiers in the information to be displayed are determined and the key in the mask database is Whether the field and/or the key identifier match; if the key field and/or the key identifier in the information to be displayed matches the key field and/or the key identifier in the screening database, the advertisement is blocked based on the personal information of the user in the blocked log
  • the push request corresponds to the information box in the push interface; if the key field and/or the key identifier in the information to be displayed does not match the key field and/or the key identifier in the mask database, the information in the push interface corresponding to the push request is displayed. frame.
  • the push interface by collecting the display information in the push interface that is closed by the user, analyzing the display information, obtaining the key segment and/or the key identifier in the display information, and generating the mask information, and generating the mask information and the user's personal information.
  • the log is blocked.
  • the push interface is shielded if the information frame of the interface contains the key fields and/or key identifiers in the mask information.
  • the user-based operation behavior is accurately shielded from the marketing campaign advertisement of the push interface, and the user can avoid the interference of the marketing campaign advertisement of the push interface and improve the user experience, and at the same time, organize the planning party for the marketing activity. According to the information shielding situation of each user, the promotion direction of marketing advertisements can be obtained in reverse to improve the effectiveness of marketing activities.
  • the information shielding method based on user behavior in this embodiment includes:
  • step S11 when the closing operation based on the terminal pushing interface is detected, the display duration of the push interface and the display information of the closed information frame on the push interface of the close operation are acquired.
  • the terminal When the terminal user detects the closing operation of the terminal pushing interface, the terminal obtains the display duration of the push interface (that is, the display duration of the terminal obtaining the push interface corresponds to the time when the terminal user closes the push interface, for example, the display time of the push interface is 3 In seconds, the time when the end user closes the push interface is also 3 seconds) and the display information of the closed message box on the push interface, that is, the content of the information box in the push interface closed by the user, for example, the push that is now available
  • the interface may include one or more information boxes. If there is only one information box in the push interface, the closed information box is closed for the entire push interface. If the push interface includes multiple information frames, the corresponding information is closed based on the user's operation. The information box, the display information in the push interface is partially closed.
  • step S12 the display information is parsed to determine the mask information, and the mask information is a key field and/or a key identifier in the display information.
  • the terminal will display the information for parsing to obtain the key field and/or the key identifier in the display information, and the terminal counts the preset time period (preset time period: according to the frequency of use of the terminal, etc., can be set to one week) to close the operation.
  • the frequency of the key fields and/or key identifiers in the displayed information is turned off on the push interface; if the frequency of the closed operation of the key fields and/or key identifiers exceeds the threshold, the key fields and/or key identifiers are saved to the mask Used as a mask in the database. For example, there are 10 push interfaces closed by users in one week.
  • 5 of the push interface are information about the push interface of the insurance
  • 3 are information related to the push interface of the game
  • 2 are pushes related to the wealth management products.
  • the interface displays information
  • the keyword segment has insurance, games, funds, income, etc.
  • the corresponding frequency is insurance 10 times per week, game 6 times per week, funds 3 times per week, income 2 times per week
  • threshold is 5 times per Week
  • the insurance and games above the threshold are saved to the mask database as the mask information.
  • step S13 according to the display duration of the push interface, the mask information level is set and a corresponding masking strategy is formed.
  • the terminal sets two time intervals correspondingly.
  • the two time intervals set are 0s-3s and 3s-10s.
  • the mask level of the corresponding mask information is set.
  • the masking information of the push interface is not greater than the masking information of the first time interval as the primary masking information and forms a first-level screening strategy;
  • the shielding information of the pushing interface is greater than the shielding information of the first time interval not greater than the second time interval as the secondary shielding
  • the information forms a secondary shielding policy; the shielding information of the push interface whose display duration is greater than the second time interval is used as the tertiary shielding information and forms a three-level shielding strategy.
  • the time for the user to close the game display interface is 1 s, that is, the user has a greater degree of dislike of the game, and the game is used as the primary shielding information, and the next game-related push occurs again.
  • the time for the user to close the insurance display interface is 6s, that is, the user has a certain degree of tolerance to insurance.
  • Use insurance as the secondary shielding information.
  • there is another insurance-related push interface next time if there is other information in the push interface, you can combine other information to selectively block the insurance push interface. If the user closes the wealth management product.
  • the time of the display interface is greater than 10s, that is, the user has certain attention to the wealth management products, and the wealth management product is used as the third-level shielding information.
  • the shielding information and the push interface display shielding scheme are correspondingly set, so that the shielding of the push information is more reasonable.
  • the organization planner of the marketing activities can get the end users interested in the marketing activities according to the shielding log, and not objection, so the corresponding marketing campaign page is more accurate to the corresponding end users. on.
  • the information shielding based on user behavior of the present invention further includes:
  • Step S40 When the node that updates the mask information is reached, the preset time period is adjusted to form a new preset time period.
  • the update node for setting the mask information on the terminal (due to the real-time update of the information displayed on the push interface or the change of the word used by the network, based on the mask information saved in the previous period, the display information of the push interface of the existing update cannot be effectively shielded, thus setting The update node of the mask information is updated once the mask interval is reached.
  • the preset time period for the mask information collection is from July 1, 2017 to July 7, 2017, and the information is blocked. Update the node for three months, then adjust the preset time period to October 1, 2017, and adjust the preset time period from October 1, 2017 to October 7, 2017 to update the mask information.
  • step S50 the frequency of the closing operation of the existing key fields and/or key identifiers in the display information in the database is counted in the new preset time period.
  • the frequency of the closed operation of the existing key fields and/or key identifiers in the display database in the new preset time period is statistically counted (the data information in the original masked database may also be deleted and acquired again).
  • the closing operation is performed on the push interface.
  • the key field and/or key identifier in the closed message box display information is the same as the key field and/or key identifier existing in the mask database.
  • step S60 if the frequency of the closed key operation of the existing key field and/or the key identifier in the display database does not exceed the threshold, the existing key fields and/or key identifiers in the database are deleted. Update the blocking information in real time.
  • the key segment in the mask information is updated in real time, so that the masking operation is more time-efficient, and the pushing of the information displayed on the push interface based on the masked log is more accurate.
  • an embodiment of the present invention further provides an information shielding apparatus based on user behavior, where the information shielding apparatus based on user behavior includes:
  • the detection determining module 10 is configured to: when detecting the closing operation based on the terminal pushing interface, obtain display information of the closed information box of the closing operation on the pushing interface, and determine the shielding information based on the display information;
  • the log generation module 20 is configured to generate a mask log corresponding to the user based on the mask information and the personal information of the terminal user.
  • the push screening module 30 is configured to block the information frame in the push interface corresponding to the advertisement push request based on the blocked log of the user when detecting the advertisement push request sent by the third-party platform in the server.
  • the method implemented by the user in the information shielding apparatus based on the user behavior may refer to various embodiments of the information shielding method based on the user behavior of the present invention, and details are not described herein again.
  • an embodiment of the present invention further provides a computer storage medium.
  • the step of implementing the information shielding method based on the user behavior in the foregoing embodiments in the above embodiments is stored in the computer storage medium, and is not described here.
  • the technical solution of the present invention which is essential or contributes to the prior art, can be embodied in the form of a software product stored in a storage medium as above (such as ROM/RAM, magnetic
  • a storage medium such as ROM/RAM, magnetic
  • the disc includes a number of instructions for causing a terminal device (which may be a cell phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the methods of various embodiments of the present invention.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本发明公开了一种基于用户行为的信息屏蔽方法,包括以下步骤:当检测到基于终端推送界面的关闭操作时,获取关闭操作在推送界面上所关闭信息框的显示信息,并基于显示信息确定屏蔽信息;基于屏蔽信息和终端用户的个人信息,生成该用户对应的屏蔽日志;当检测到服务器中第三方平台发送的广告推送请求时,基于该用户的屏蔽日志,屏蔽所述广告推送请求对应推送界面中的信息框。本发明还公开了一种基于用户行为的信息屏蔽装置、终端和存储介质。本发明根据用户的操作行为对推送界面的广告信息进行准确地屏蔽,以提高用户体验。

Description

基于用户行为的信息屏蔽方法、装置、终端和存储介质
本申请要求于2017年10月16日提交中国专利局、申请号为201710964060.9发明名称为“基于用户行为的信息屏蔽方法、装置、终端和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在申请中。
技术领域
本发明涉及网络通信领域,尤其涉及基于用户行为的信息屏蔽方法、装置、终端和存储介质。
背景技术
随着移动通信和网络技术的日渐成熟,网络电信营销变得普及,线上线下相结合的销售推广策略被不同的销售平台采用。
营销活动推广一般采用线上线下同时进行的方式,由于线下活动受到活动举行地理位置的限制且活动举行成本较高,只能在有限的范围进行推广;线上推销不受地理位置限制且推销成本较低,营销活动推广平台会将营销推广面向更多的网络用户,但并不是所有网络用户都对营销活动存在参与或者购买意愿,现有的线上营销平台不能准确地排除对营销活动不感兴趣的网络用户,在营销推广范围内的所有网络用户都可能受到不同的推销广告受到干扰,用户体验较差从而进行投诉,如何才能针对用户的浏览操作准确地对推广界面中的营销活动进行有效地屏蔽是目前亟待解决的技术问题。
上述内容仅用于辅助理解本发明的技术方案,并不代表承认上述内容是现有技术。
发明内容
本发明的主要目的在于提供一种基于用户行为的信息屏蔽方法、装置、终端和存储介质,旨在根据用户的操作行为对推送界面的广告信息进行准确地屏蔽,以提高用户体验。
为实现上述目的,本发明提供一种基于用户行为的信息屏蔽方法,基于用户行为的信息屏蔽方法包括以下步骤:
当检测到基于终端推送界面的关闭操作时,获取关闭操作在推送界面上所关闭信息框的显示信息,并基于显示信息确定屏蔽信息;
基于屏蔽信息和终端用户的个人信息,生成该用户对应的屏蔽日志;
当检测到服务器中第三方平台发送的广告推送请求时,基于该用户的屏蔽日志,屏蔽广告推送请求对应推送界面中的信息框。
可选地,当检测到基于终端推送界面的关闭操作时,获取关闭操作在推送界面上所关闭信息框的显示信息,并基于显示信息确定屏蔽信息的步骤包括:
当检测到基于终端推送界面的关闭操作时,获取推送界面的显示时长和关闭操作在推送界面上所关闭信息框的显示信息;
将显示信息进行解析确定屏蔽信息,屏蔽信息为显示信息中的关键字段和/或关键标识;
根据推送界面的显示时长,设置屏蔽信息等级并形成对应的屏蔽策略。
可选地,将显示信息进行解析确定屏蔽信息,屏蔽信息为显示信息中的关键字段和/或关键标识的步骤包括:
将显示信息进行解析,获取显示信息中的关键字段和/或关键标识,并统计预设时间段内键字段和/或关键标识的关闭操作频率;
若关键字段和/或关键标识的关闭操作频率超过阈值,则将关键字段和/或关键标识保存至屏蔽数据库中作为屏蔽信息。
可选地,若关键字段和/或关键标识的关闭操作频率超过阈值,则将关键字段和/或关键标识保存至屏蔽数据库中作为屏蔽信息步骤之后还包括:
当到达更新屏蔽信息的节点时,调整预设时间段形成新的预设时间段;
统计新的预设时间段内屏蔽数据库中已有的关键字段和/或关键标识在显示信息中的关闭操作频率;
若屏蔽数据库中已有的关键字段和/或关键标识在显示信息中的关闭操作频率不超过阈值时,则将屏蔽数据库中已有的关键字段和/或关键标识进行删除,以实时地更新屏蔽信息。
可选地,根据推送界面的显示时长,设置屏蔽信息等级并形成对应的屏蔽策略的步骤包括:
将推送界面的显示时长不大于第一时间间隔的屏蔽信息作为一级屏蔽信息并形成一级屏蔽策略;
将推送界面的显示时长大于第一时间间隔不大于第二时间间隔的屏蔽信息作为二级屏蔽信息并形成二级屏蔽策略;
将推送界面的显示时长大于第二时间间隔的屏蔽信息作为三级屏蔽信息并形成三级屏蔽策略。
可选地,当检测到服务器中第三方平台发送的广告推送请求时,基于该用户的屏蔽日志,屏蔽广告推送请求对应推送界面中的信息框的步骤包括:
当检测到服务器中第三方平台发送的广告推送请求时,获取广告推送请求对应推送界面中的信息框中的待显示信息;
提取待显示信息中的关键字段和/或关键标识,将待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识进行比对,以屏蔽广告推送请求对应推送界面中的信息框。
可选地,将待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识进行比对,以屏蔽广告推送请求对应推送界面中的信息框的步骤包括:
将待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识进行比对,判断待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识是否匹配;
若待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识匹配,则基于屏蔽日志中用户的个人信息屏蔽广告推送请求对应推送界面中的信息框。
为实现上述目的,本发明还提供一种基于用户行为的信息屏蔽装置,基于用户行为的信息屏蔽装置包括:
检测确定模块,用于当检测到基于终端推送界面的关闭操作时,获取关闭操作在推送界面上所关闭信息框的显示信息,并基于显示信息确定屏蔽信息;
日志生成模块,用于基于屏蔽信息和终端用户的个人信息,生成该用户对应的屏蔽日志;
推送屏蔽模块,用于当检测到服务器中第三方平台发送的广告推送请求时,基于该用户的屏蔽日志,屏蔽广告推送请求对应推送界面中的信息框。
为实现上述目的,本发明还提供一种终端,终端包括:存储器、处理器及存储在存储器上并可在处理器上运行的基于用户行为的信息屏蔽程序,其中:
基于用户行为的信息屏蔽程序被处理器执行时实现以下步骤:
当检测到基于终端推送界面的关闭操作时,获取关闭操作在推送界面上所关闭信息框的显示信息,并基于显示信息确定屏蔽信息;
基于屏蔽信息和终端用户的个人信息,生成该用户对应的屏蔽日志;
当检测到服务器中第三方平台发送的广告推送请求时,基于该用户的屏蔽日志,屏蔽广告推送请求对应推送界面中的信息框。
此外,为实现上述目的,本发明还提供一种计算机存储介质,计算机存储介质上存储有基于用户行为的信息屏蔽程序,基于用户行为的信息屏蔽程序被处理器执行时实现上述的基于用户行为的信息屏蔽方法的步骤。
本发明实施例提出的一种基于用户行为的信息屏蔽方法,通过采集用户关闭的推送界面中的显示信息,对显示信息进行分析获取显示信息中的关键字段和/或关键标识对应生成屏蔽信息,并将屏蔽信息与用户的个人信息生成屏蔽日志,当该用户再次使用同一终端设备,或者登录相同网页时,出现界面推送时,若界面推送的信息框包含有屏蔽信息中关键字段和/或关键标识则对推送界面进行屏蔽。实现了基于用户的操作行为准确地对推送界面的营销活动广告进行屏蔽,用户可以避免了受到推送界面的营销活动广告的干扰,提高了用户的体验,以此同时,对于营销活动的组织策划方,可以根据各个用户的信息屏蔽情况,反向地得到营销广告的推广方向,以提高营销活动的成效。
附图说明
图1是本发明实施例方案涉及的硬件运行环境的终端结构示意图;
图2为本发明基于用户行为的信息屏蔽方法一实施例的流程示意图;
图3为图2中基于用户行为的信息屏蔽方法的步骤S10的细化流程示意图;
图4为本发明基于用户行为的信息屏蔽方法另一实施例的流程示意图;
图5为本发明基于用户行为的信息屏蔽方法应用的具体场景示意图;
图6为本发明基于用户行为的信息屏蔽装置一实施例的功能模块示意图。
本发明目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
本发明实施例的主要解决方案是:基于用户的关闭操作行为提取客户觉得无用的显示信息,并基于显示信息和终端用户的个人对应地生成屏蔽日志,在出现营销活动类的广告信息时,将广告信息与屏蔽日志进行比对,屏蔽客户觉得无用的广告信息,以此同时,营销活动的策划方可以根据各个用户的屏蔽日志,反向地推导出用户感兴趣的营销广告以提高营销活动的成效。
由于现有技术中对信息屏蔽的方式呈现两个极端:1、不考虑用户的使用体验,将营销活动信息通过推送界面发布至所有的终端用户,这样活动的推送成本较高,还会导致用户的体验较差;2、部分网站中或者部分用户由于怕受到营销活动信息的干扰,将所有的推送信息进行简单粗暴的屏蔽,这样的方式,站在网络管理端的角度,这样可能会因为没有广告的投放,降低了部分收益,站在用户的角度可能会出现部分感兴趣的活动被直接屏蔽,接收到的信息量有所下降,站在营销活动的组织策划者的角度,可能会出现营销活动的推送数量减少,但是对的收益影响不大。
本发明提供一种解决方案,使网络中的推送界面中的广告信息达到一个平衡的状态,用户可以根据自己的需求对部分推送界面中的广告信息进行准确的屏蔽,并查看自己感兴趣的部分,活动的组织策划者可以将营销活动朝感兴趣的终端用户进行推广。
如图1所示,图1是本发明实施例方案涉及的硬件运行环境的终端结构示意图。
本发明实施例终端可以是PC,也可以是智能手机、平板电脑、电子书阅读器、MP3(Moving Picture Experts Group Audio Layer III,动态影像专家压缩标准音频层面3)播放器、MP4(Moving Picture Experts Group Audio Layer IV,动态影像专家压缩标准音频层面3)播放器、便携计算机等具有显示功能的可移动式终端设备,需要补充说明的是本发明中的基于用户行为的信息屏蔽装置也是终端的一个部分,也可以单独地作为终端,当然本发明中的基于用户行为的信息屏蔽装置可以作为终端的一个部件由用户使用,同时终端与网络服务器通信连接,服务器可以获取终端中的相关信息,当服务器面对营销活动中组织策划者时,服务器可以获取终端中的基于用户行为的信息屏蔽装置采集到的屏蔽日志,对营销活动的推广方向进行指导,将广告信息投放到感兴趣的终端用户上,提高营销活动的成效(结合图5,图5所示的营销活动组织策划者在服务器通过获取各个终端的屏蔽日志,对应得到应该推送营销活动界面的终端)。
如图1所示,该终端可以包括:处理器1001,例如CPU,网络接口1004,用户接口1003,存储器1005,通信总线1002。其中,通信总线1002用于实现这些组件之间的连接通信。用户接口1003可以包括显示屏(Display)、输入单元比如键盘(Keyboard),可选用户接口1003还可以包括标准的有线接口、无线接口。网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器。存储器1005可选的还可以是独立于前述处理器1001的存储装置。
可选地,终端还可以包括摄像头、RF(Radio Frequency,射频)电路,传感器、音频电路、WiFi模块等等。其中,传感器比如光传感器、运动传感器以及其他传感器。当然,移动终端还可配置陀螺仪、气压计、湿度计、温度计、红外线传感器等其他传感器,在此不再赘述。
本领域技术人员可以理解,图1中示出的终端结构并不构成对终端的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
如图1所示,该计算机软件产品存储在一个存储介质(存储介质:又叫计算机存储介质、可读存储介质、计算机可读存储介质或者直接叫介质,如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例的方法,作为一种计算机存储介质的存储器1005中可以包括操作系统、网络通信模块、用户接口模块以及基于用户行为的信息屏蔽应用程序。
在图1所示的终端中,网络接口1004主要用于连接后台服务器,与后台服务器进行数据通信;用户接口1003主要用于连接客户端(用户端),与客户端进行数据通信;而处理器1001可以用于调用存储器1005中存储的基于用户行为的信息屏蔽应用程序,以执行本发明各实施例中基于用户行为的信息屏蔽方法的步骤。
参照图2,本发明一实施例提供一种基于用户行为的信息屏蔽方法,基于用户行为的信息屏蔽方法包括:
步骤S10,当检测到基于终端推送界面的关闭操作时,获取关闭操作在推送界面上所关闭信息框的显示信息,并基于显示信息确定屏蔽信息。
在终端(应用软件或者网站)检测到用户关闭终端推送界面时,终端获取关闭操作在推送界面上所关闭信息框的显示信息,即,推送界面上可能包含一个或者多个广告信息框,终端对应获取推送界面中用户所关闭信息框中的显示信息,若推送界面中只有一个信息框,则终端获取一个信息框中的显示信息,并将获取到的显示信息进行解析,确定显示信息中的关键字段和/或关键标识(关键字段和/或关键标识:关键字段可以是显示信息中的关键词,字,句;关键标识:可以是显示图像中的特定标识图像),以将解析得到的显示信息中的关键字段和/或关键标识作为屏蔽信息。
步骤S20,基于屏蔽信息和终端用户的个人信息,生成该用户对应的屏蔽日志。
终端将确定的屏蔽信息和终端用户的个人信息(终端用户的个人信息包括:终端的设备标识信息、终端用户浏览的网络信息、终端用户在特定页的注册登录信息、终端用户前期的网页浏览信息等)进行整理形成屏蔽日志,具体地,本发明中的信息屏蔽方法是基于用户个人单独的操作行为的,例如,若没有针对终端用户的个人信息生成屏蔽日志,屏蔽信息可能只是在对应的终端的上生效,当用户使用不同的终端,推送界面依然会显示,不能到达有效屏蔽推送的显示信息的要求;若没有针对终端用户的个人信息屏蔽信息还可能只是针对该特定的网页,当用户浏览其他网页时推送界面也依然会显示,这样的信息屏蔽方式不够准确高效。
步骤S30,当检测到服务器中第三方平台发送的广告推送请求时,基于该用户的屏蔽日志,屏蔽广告推送请求对应推送界面中的信息框。
在终端(应用软件或者网站)检测到界面的推送请求时,终端获取广告推送请求对应推送界面信息框中的显示信息,并获取该用户的屏蔽日志,终端提取广告推送请求对应推送界面信息框中的显示信息中的关键字段和/或关键标识与屏蔽日志的中关键字段和/或关键标识进行比对,判断待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识是否匹配;若待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识匹配,则基于屏蔽日志中用户的个人信息屏蔽广告推送请求对应推送界面中的信息框;若待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识不匹配,则显示推送请求对应推送界面中的信息框。
在本实施例中通过采集用户关闭的推送界面中的显示信息,对显示信息进行分析获取显示信息中的关键字段和/或关键标识对应生成屏蔽信息,并将屏蔽信息与用户的个人信息生成屏蔽日志,当该用户再次使用同一终端设备,或者登录相同网页时,出现界面推送时,若界面推送的信息框包含有屏蔽信息中关键字段和/或关键标识则对推送界面进行屏蔽。实现了基于用户的操作行为准确地对推送界面的营销活动广告进行屏蔽,用户可以避免了受到推送界面的营销活动广告的干扰,提高了用户的体验,以此同时,对于营销活动的组织策划方,可以根据各个用户的信息屏蔽情况,反向地得到营销广告的推广方向,以提高营销活动的成效。
进一步的,参照图3,本施例中基于用户行为的信息屏蔽方法,在步骤S10包括:
步骤S11,当检测到基于终端推送界面的关闭操作时,获取推送界面的显示时长和关闭操作在推送界面上所关闭信息框的显示信息。
在检测到终端用户基于终端推送界面的关闭操作时,终端获取推送界面的显示时长(即,终端获取推送界面的显示时长对应得到终端用户关闭推送界面的时间,例如,推送界面的显示时间为3秒,终端用户关闭推送界面的时间也为3秒)和关闭操作在推送界面上所关闭信息框的显示信息,即,用户关闭的推送界面中信息框中的内容,例如,现在可有的推送界面中可能包含一个或者多个信息框,若推送界面中只有一个信息框,则关闭信息框对应整个推送界面都进行关闭,若推送界面上包含多个信息框,则基于用户的操作,关闭对应的信息框,推送界面中的显示信息部分关闭。
步骤S12,将显示信息进行解析确定屏蔽信息,屏蔽信息为显示信息中的关键字段和/或关键标识。
终端将显示信息进行解析获取显示信息中的关键字段和/或关键标识,终端统计预设时间段(预设时间段:根据终端的使用频率等信息设置,可以设置为一个星期)内关闭操作在推送界面上所关闭显示信息中的关键字段和/或关键标识的频率;若关键字段和/或关键标识的关闭操作频率超过阈值,则将关键字段和/或关键标识保存至屏蔽数据库中作为屏蔽信息。例如:一个星期中用户关闭的推送界面有10个,其中推送界面中有5个是关于保险的推送界面显示信息的,3个是游戏相关的推送界面显示信息,2个是理财产品相关的推送界面显示信息,关键字段有保险、游戏、资金、收益等,对应的频率为保险10次每周、游戏6次每周、资金3次每周、收益2次每周,阈值为5次每周,则将高于阈值的保险、游戏保存至屏蔽数据库中作为屏蔽信息。
步骤S13,根据推送界面的显示时长,设置屏蔽信息等级并形成对应的屏蔽策略。
终端对应设置两个时间间隔,例如,设置的两个时间间隔为0s-3s、3s-10s,根据推送界面的显示时长(或者用户关闭推送界面的时间)设置对应的屏蔽信息的屏蔽等级,将推送界面的显示时长不大于第一时间间隔的屏蔽信息作为一级屏蔽信息并形成一级屏蔽策略;将推送界面的显示时长大于第一时间间隔不大于第二时间间隔的屏蔽信息作为二级屏蔽信息并形成二级屏蔽策略;将推送界面的显示时长大于第二时间间隔的屏蔽信息作为三级屏蔽信息并形成三级屏蔽策略。不同等级屏蔽策略处理屏蔽信息的方式不同,例如,用户关闭游戏显示界面的时间为1s,即,用户对游戏的反感程度较大,将游戏作为一级屏蔽信息,下一次再出现游戏相关的推送界面时,若推送界面中还有其他的信息,可以直接将不看其他信息,直接将推送界面进行屏蔽;用户关闭保险显示界面的时间为6s,即,用户对保险的具有一定的容忍程度,将保险作为二级屏蔽信息,下一次再出现保险相关的推送界面时,若推送界面中还有其他的信息,可以结合其他信息,选择性地对保险类推送界面进行屏蔽,若用户关闭理财产品显示界面的时间为大于10s,即,用户对理财产品的具有一定关注,将理财产品作为三级屏蔽信息,下一次再出现理财产品相关的推送界面时,可以对理财产品类推送界面不进行屏蔽。
在本实施例中根据用户关闭显示界面的时间和显示信息中内关键字段和/或关键标识被关闭的频率,对应地设置屏蔽信息与推送界面显示屏蔽的方案,使推送信息的屏蔽更加合理,科学,准确,以此同时,营销活动的组织策划者可以根据屏蔽日志,得到哪些终端用户对营销活动感兴趣,不反感,因而将对应的营销活动页面更准确器投送到对应的终端用户上。
参照图4,本发明基于用户行为的信息屏蔽另一实施例中,本发明基于用户行为的信息屏蔽还包括:
步骤S40,当到达更新屏蔽信息的节点时,调整预设时间段形成新的预设时间段。
在终端上设置屏蔽信息的更新节点(由于推送界面显示信息的实时更新,或者网络用词的改变,基于前期保存的屏蔽信息,无法将现有更新的推送界面显示信息进行有效的屏蔽,因而设置屏蔽信息的更新节点),在到达一定时间间隔时,对屏蔽信息进行一次更新,例如:前期屏蔽信息采集的预设时间段为2017年7月1日至2017年7月7日,屏蔽信息的更新节点为三个月,那么到达2017年10月1则调整预设时间段,将预设时间段调整为2017年10月1日至2017年10月7日,进行屏蔽信息的更新。
步骤S50,统计新的预设时间段内屏蔽数据库中已有的关键字段和/或关键标识在显示信息中的关闭操作频率。
具体地,统计新的预设时间段内屏蔽数据库中已有的关键字段和/或关键标识在显示信息中的关闭操作频率(也可以将原始的屏蔽数据库中的数据信息进行删除,再次获取关闭操作在推送界面上所关闭信息框显示信息中的关键字段和/或关键标识,并统计预设时间段内键字段和/或关键标识的关闭操作频率,形成新的屏蔽数据库,还可以统计新的预设时间段内关闭操作在推送界面上所关闭信息框显示信息中的关键字段和/或关键标识与屏蔽数据库中已有的关键字段和/或关键标识是否相同)。
步骤S60,若屏蔽数据库中已有的关键字段和/或关键标识在显示信息中的关闭操作频率不超过阈值时,则将屏蔽数据库中已有的关键字段和/或关键标识进行删除,以实时地更新屏蔽信息。
判断屏蔽数据库中已有的关键字段和/或关键标识在显示信息中的关闭操作频率是否超过阈值,若屏蔽数据库中已有的关键字段和/或关键标识在显示信息中的关闭操作频率不超过阈值时,则将屏蔽数据库中已有的关键字段和/或关键标识进行删除,若屏蔽数据库中已有的关键字段和/或关键标识在显示信息中的关闭操作频率超过阈值时,则将屏蔽数据库中已有的关键字段和/或关键标识保留,实现屏蔽信息的更新。
在本实施例中通过对屏蔽信息中的关键字段进行实时地更新,使得屏蔽操作更具有时效性,针对基于屏蔽日志对推送界面显示信息的推送更加准确。
参考图6,本发明实施例还提出一种基于用户行为的信息屏蔽装置,基于用户行为的信息屏蔽装置包括:
检测确定模块10,用于当检测到基于终端推送界面的关闭操作时,获取关闭操作在推送界面上所关闭信息框的显示信息,并基于显示信息确定屏蔽信息;
日志生成模块20,用于基于屏蔽信息和终端用户的个人信息,生成该用户对应的屏蔽日志;
推送屏蔽模块30,用于当检测到服务器中第三方平台发送的广告推送请求时,基于该用户的屏蔽日志,屏蔽广告推送请求对应推送界面中的信息框。
其中,基于用户行为的信息屏蔽装置中程序被执行时所实现的方法可参照本发明基于用户行为的信息屏蔽方法的各个实施例,此处不再赘述
此外,本发明实施例还提出一种计算机存储介质。
计算机存储介质上存储有基于用户行为的信息屏蔽程序被处理器执行时实现上述各实施例中基于用户行为的信息屏蔽方法的步骤,此处不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者系统不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者系统所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者系统中还存在另外的相同要素。
上述本发明实施例序号仅仅为了描述,不代表实施例的优劣。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体现出来,该计算机软件产品存储在如上的一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本发明各个实施例的方法。
以上仅为本发明的优选实施例,并非因此限制本发明的专利范围,凡是利用本发明说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本发明的专利保护范围内。

Claims (20)

  1. 一种基于用户行为的信息屏蔽方法,其特征在于,所述基于用户行为的信息屏蔽方法包括以下步骤:
    当检测到基于终端推送界面的关闭操作时,获取关闭操作在推送界面上所关闭信息框的显示信息,并基于显示信息确定屏蔽信息;
    基于屏蔽信息和终端用户的个人信息,生成该用户对应的屏蔽日志;
    当检测到服务器中第三方平台发送的广告推送请求时,基于该用户的屏蔽日志,屏蔽所述广告推送请求对应推送界面中的信息框。
  2. 如权利要求1所述的基于用户行为的信息屏蔽方法,其特征在于,所述当检测到基于终端推送界面的关闭操作时,获取关闭操作在推送界面上所关闭信息框的显示信息,并基于显示信息确定屏蔽信息的步骤包括:
    当检测到基于终端推送界面的关闭操作时,获取推送界面的显示时长和关闭操作在推送界面上所关闭信息框的显示信息;
    将显示信息进行解析确定屏蔽信息,所述屏蔽信息为显示信息中的关键字段和/或关键标识;
    根据推送界面的显示时长,设置屏蔽信息等级并形成对应的屏蔽策略。
  3. 如权利要求2所述的基于用户行为的信息屏蔽方法,其特征在于,所述将显示信息进行解析确定屏蔽信息,所述屏蔽信息为显示信息中的关键字段和/或关键标识的步骤包括:
    将显示信息进行解析,获取显示信息中的关键字段和/或关键标识,并统计预设时间段内键字段和/或关键标识的关闭操作频率;
    若关键字段和/或关键标识的关闭操作频率超过阈值,则将关键字段和/或关键标识保存至屏蔽数据库中作为屏蔽信息。
  4. 如权利要求3所述的基于用户行为的信息屏蔽方法,其特征在于,所述若关键字段和/或关键标识的关闭操作频率超过阈值,则将关键字段和/或关键标识保存至屏蔽数据库中作为屏蔽信息的步骤之后,还包括:
    当到达更新屏蔽信息的节点时,调整预设时间段形成新的预设时间段;
    统计新的预设时间段内屏蔽数据库中已有的关键字段和/或关键标识在显示信息中的关闭操作频率;
    若屏蔽数据库中已有的关键字段和/或关键标识在显示信息中的关闭操作频率不超过阈值时,则将屏蔽数据库中已有的关键字段和/或关键标识进行删除,以实时地更新屏蔽信息。
  5. 如权利要求2所述的基于用户行为的信息屏蔽方法,其特征在于,所述根据推送界面的显示时长,设置屏蔽信息等级并形成对应的屏蔽策略的步骤包括:
    将推送界面的显示时长不大于第一时间间隔的屏蔽信息作为一级屏蔽信息并形成一级屏蔽策略;
    将推送界面的显示时长大于第一时间间隔不大于第二时间间隔的屏蔽信息作为二级屏蔽信息并形成二级屏蔽策略;
    将推送界面的显示时长大于第二时间间隔的屏蔽信息作为三级屏蔽信息并形成三级屏蔽策略。
  6. 如权利要求5所述的基于用户行为的信息屏蔽方法,其特征在于,所述当检测到服务器中第三方平台发送的广告推送请求时,基于该用户的屏蔽日志,屏蔽所述广告推送请求对应推送界面中的信息框的步骤包括:
    当检测到服务器中第三方平台发送的广告推送请求时,获取所述广告推送请求对应推送界面中的信息框中的待显示信息;
    提取待显示信息中的关键字段和/或关键标识,将待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识进行比对,以屏蔽所述广告推送请求对应推送界面中的信息框。
  7. 如权利要求6所述的基于用户行为的信息屏蔽方法,其特征在于,所述将待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识进行比对,以屏蔽所述广告推送请求对应推送界面中的信息框的步骤包括:
    将待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识进行比对,判断待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识是否匹配;
    若待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识匹配,则基于屏蔽日志中用户的个人信息屏蔽所述广告推送请求对应推送界面中的信息框。
  8. 一种基于用户行为的信息屏蔽装置,其特征在于,所述基于用户行为的信息屏蔽装置包括:
    检测确定模块,用于当检测到基于终端推送界面的关闭操作时,获取关闭操作在推送界面上所关闭信息框的显示信息,并基于显示信息确定屏蔽信息;
    日志生成模块,用于基于屏蔽信息和终端用户的个人信息,生成该用户对应的屏蔽日志;
    推送屏蔽模块,用于当检测到服务器中第三方平台发送的广告推送请求时,基于该用户的屏蔽日志,屏蔽所述广告推送请求对应推送界面中的信息框。
  9. 一种终端,其特征在于,所述终端包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行的基于用户行为的信息屏蔽程序,其中:
    所述基于用户行为的信息屏蔽程序被所述处理器执行时实现以下步骤:
    当检测到基于终端推送界面的关闭操作时,获取关闭操作在推送界面上所关闭信息框的显示信息,并基于显示信息确定屏蔽信息;
    基于屏蔽信息和终端用户的个人信息,生成该用户对应的屏蔽日志;
    当检测到服务器中第三方平台发送的广告推送请求时,基于该用户的屏蔽日志,屏蔽所述广告推送请求对应推送界面中的信息框。
  10. 如权利要求9所述的终端,其特征在于,所述基于用户行为的信息屏蔽程序被所述处理器执行时实现,所述当检测到基于终端推送界面的关闭操作时,获取关闭操作在推送界面上所关闭信息框的显示信息,并基于显示信息确定屏蔽信息的步骤包括:
    当检测到基于终端推送界面的关闭操作时,获取推送界面的显示时长和关闭操作在推送界面上所关闭信息框的显示信息;
    将显示信息进行解析确定屏蔽信息,所述屏蔽信息为显示信息中的关键字段和/或关键标识;
    根据推送界面的显示时长,设置屏蔽信息等级并形成对应的屏蔽策略。
  11. 如权利要求10所述的终端,其特征在于,所述基于用户行为的信息屏蔽程序被所述处理器执行时实现,所述将显示信息进行解析确定屏蔽信息,所述屏蔽信息为显示信息中的关键字段和/或关键标识的步骤包括:
    将显示信息进行解析,获取显示信息中的关键字段和/或关键标识,并统计预设时间段内键字段和/或关键标识的关闭操作频率;
    若关键字段和/或关键标识的关闭操作频率超过阈值,则将关键字段和/或关键标识保存至屏蔽数据库中作为屏蔽信息。
  12. 如权利要求12所述的终端,其特征在于,所述基于用户行为的信息屏蔽程序被所述处理器执行时实现,所述若关键字段和/或关键标识的关闭操作频率超过阈值,则将关键字段和/或关键标识保存至屏蔽数据库中作为屏蔽信息的步骤之后,还包括:
    当到达更新屏蔽信息的节点时,调整预设时间段形成新的预设时间段;
    统计新的预设时间段内屏蔽数据库中已有的关键字段和/或关键标识在显示信息中的关闭操作频率;
    若屏蔽数据库中已有的关键字段和/或关键标识在显示信息中的关闭操作频率不超过阈值时,则将屏蔽数据库中已有的关键字段和/或关键标识进行删除,以实时地更新屏蔽信息。
  13. 如权利要求10所述的终端,其特征在于,所述基于用户行为的信息屏蔽程序被所述处理器执行时实现,所述根据推送界面的显示时长,设置屏蔽信息等级并形成对应的屏蔽策略的步骤包括:
    将推送界面的显示时长不大于第一时间间隔的屏蔽信息作为一级屏蔽信息并形成一级屏蔽策略;
    将推送界面的显示时长大于第一时间间隔不大于第二时间间隔的屏蔽信息作为二级屏蔽信息并形成二级屏蔽策略;
    将推送界面的显示时长大于第二时间间隔的屏蔽信息作为三级屏蔽信息并形成三级屏蔽策略。
  14. 如权利要求9所述的终端,其特征在于,所述基于用户行为的信息屏蔽程序被所述处理器执行时实现,所述当检测到服务器中第三方平台发送的广告推送请求时,基于该用户的屏蔽日志,屏蔽所述广告推送请求对应推送界面中的信息框的步骤包括:
    当检测到服务器中第三方平台发送的广告推送请求时,获取所述广告推送请求对应推送界面中的信息框中的待显示信息;
    提取待显示信息中的关键字段和/或关键标识,将待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识进行比对,以屏蔽所述广告推送请求对应推送界面中的信息框。
  15. 如权利要求9所述的终端,其特征在于,所述基于用户行为的信息屏蔽程序被所述处理器执行时实现,所述将待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识进行比对,以屏蔽所述广告推送请求对应推送界面中的信息框的步骤包括:
    将待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识进行比对,判断待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识是否匹配;
    若待显示信息中的关键字段和/或关键标识与屏蔽数据库中的关键字段和/或关键标识匹配,则基于屏蔽日志中用户的个人信息屏蔽所述广告推送请求对应推送界面中的信息框。
  16. 一种计算机存储介质,其特征在于,所述计算机存储介质上存储有基于用户行为的信息屏蔽程序,所述基于用户行为的信息屏蔽程序被处理器执行时实现以下步骤:
    当检测到基于终端推送界面的关闭操作时,获取关闭操作在推送界面上所关闭信息框的显示信息,并基于显示信息确定屏蔽信息;
    基于屏蔽信息和终端用户的个人信息,生成该用户对应的屏蔽日志;
    当检测到服务器中第三方平台发送的广告推送请求时,基于该用户的屏蔽日志,屏蔽所述广告推送请求对应推送界面中的信息框。
  17. 如权利要求16所述计算机存储介质,其特征在于,所述基于用户行为的信息屏蔽程序被处理器执行时实现,所述当检测到基于终端推送界面的关闭操作时,获取关闭操作在推送界面上所关闭信息框的显示信息,并基于显示信息确定屏蔽信息的步骤包括:
    当检测到基于终端推送界面的关闭操作时,获取推送界面的显示时长和关闭操作在推送界面上所关闭信息框的显示信息;
    将显示信息进行解析确定屏蔽信息,所述屏蔽信息为显示信息中的关键字段和/或关键标识;
    根据推送界面的显示时长,设置屏蔽信息等级并形成对应的屏蔽策略。
  18. 如权利要求16所述计算机存储介质,其特征在于,所述基于用户行为的信息屏蔽程序被处理器执行时实现,所述将显示信息进行解析确定屏蔽信息,所述屏蔽信息为显示信息中的关键字段和/或关键标识的步骤包括:
    将显示信息进行解析,获取显示信息中的关键字段和/或关键标识,并统计预设时间段内键字段和/或关键标识的关闭操作频率;
    若关键字段和/或关键标识的关闭操作频率超过阈值,则将关键字段和/或关键标识保存至屏蔽数据库中作为屏蔽信息。
  19. 如权利要求16所述计算机存储介质,其特征在于,所述基于用户行为的信息屏蔽程序被处理器执行时实现,所述若关键字段和/或关键标识的关闭操作频率超过阈值,则将关键字段和/或关键标识保存至屏蔽数据库中作为屏蔽信息的步骤之后,还包括:
    当到达更新屏蔽信息的节点时,调整预设时间段形成新的预设时间段;
    统计新的预设时间段内屏蔽数据库中已有的关键字段和/或关键标识在显示信息中的关闭操作频率;
    若屏蔽数据库中已有的关键字段和/或关键标识在显示信息中的关闭操作频率不超过阈值时,则将屏蔽数据库中已有的关键字段和/或关键标识进行删除,以实时地更新屏蔽信息。
  20. 如权利要求16所述计算机存储介质,其特征在于,所述基于用户行为的信息屏蔽程序被处理器执行时实现,所述根据推送界面的显示时长,设置屏蔽信息等级并形成对应的屏蔽策略的步骤包括:
    将推送界面的显示时长不大于第一时间间隔的屏蔽信息作为一级屏蔽信息并形成一级屏蔽策略;
    将推送界面的显示时长大于第一时间间隔不大于第二时间间隔的屏蔽信息作为二级屏蔽信息并形成二级屏蔽策略;
    将推送界面的显示时长大于第二时间间隔的屏蔽信息作为三级屏蔽信息并形成三级屏蔽策略。
PCT/CN2018/072106 2017-10-16 2018-01-10 基于用户行为的信息屏蔽方法、装置、终端和存储介质 WO2019075944A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710964060.9 2017-10-16
CN201710964060.9A CN107911412A (zh) 2017-10-16 2017-10-16 基于用户行为的信息屏蔽方法、装置、终端和存储介质

Publications (1)

Publication Number Publication Date
WO2019075944A1 true WO2019075944A1 (zh) 2019-04-25

Family

ID=61841372

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/072106 WO2019075944A1 (zh) 2017-10-16 2018-01-10 基于用户行为的信息屏蔽方法、装置、终端和存储介质

Country Status (2)

Country Link
CN (1) CN107911412A (zh)
WO (1) WO2019075944A1 (zh)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109617999A (zh) * 2019-01-08 2019-04-12 平安科技(深圳)有限公司 内容推送方法、装置、计算机设备及存储介质
CN110363563A (zh) * 2019-05-28 2019-10-22 成都美美臣科技有限公司 一个电子商务网站自动化营销重定向方法
CN112458703B (zh) * 2019-08-19 2024-03-12 青岛海尔洗衣机有限公司 信息展示的处理方法、装置、洗衣机及存储介质
CN110661925B (zh) * 2019-08-30 2021-10-26 咪咕动漫有限公司 屏蔽方法、服务器及计算机可读存储介质
CN110827061B (zh) * 2019-10-15 2022-12-06 上海连尚网络科技有限公司 一种用于在小说阅读过程中提供呈现信息的方法与设备
CN112287204A (zh) * 2019-12-06 2021-01-29 北京沃东天骏信息技术有限公司 一种搜索方法、装置、设备和存储介质
CN111178942B (zh) * 2019-12-13 2023-06-16 珠海格力电器股份有限公司 广告屏蔽方法、装置、设备及存储介质
CN112307322A (zh) * 2019-12-16 2021-02-02 北京沃东天骏信息技术有限公司 用于展示信息的方法和装置
CN111160965A (zh) * 2019-12-26 2020-05-15 珠海格力电器股份有限公司 一种广告的处理方法、装置、设备及介质
CN112134953B (zh) * 2020-09-22 2021-09-28 掌阅科技股份有限公司 基于推送消息的自适应响应方法、计算设备及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040019523A1 (en) * 2002-07-25 2004-01-29 Barry Christopher J. Method and system for providing filtered and/or masked advertisements over the internet
CN103745152A (zh) * 2013-12-11 2014-04-23 深圳市欧珀通信软件有限公司 一种基于移动终端的广告屏蔽方法及系统
CN105183793A (zh) * 2015-08-24 2015-12-23 成都秋雷科技有限责任公司 网页弹窗快速拦截方法
CN105677877A (zh) * 2016-01-11 2016-06-15 常州大学 基于用户行为的定向信息屏蔽方法
CN107220364A (zh) * 2017-06-07 2017-09-29 深圳天珑无线科技有限公司 一种信息处理的方法及装置

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040019523A1 (en) * 2002-07-25 2004-01-29 Barry Christopher J. Method and system for providing filtered and/or masked advertisements over the internet
CN103745152A (zh) * 2013-12-11 2014-04-23 深圳市欧珀通信软件有限公司 一种基于移动终端的广告屏蔽方法及系统
CN105183793A (zh) * 2015-08-24 2015-12-23 成都秋雷科技有限责任公司 网页弹窗快速拦截方法
CN105677877A (zh) * 2016-01-11 2016-06-15 常州大学 基于用户行为的定向信息屏蔽方法
CN107220364A (zh) * 2017-06-07 2017-09-29 深圳天珑无线科技有限公司 一种信息处理的方法及装置

Also Published As

Publication number Publication date
CN107911412A (zh) 2018-04-13

Similar Documents

Publication Publication Date Title
WO2019075944A1 (zh) 基于用户行为的信息屏蔽方法、装置、终端和存储介质
WO2019218444A1 (zh) 测试报告的生成方法、装置、设备及存储介质
WO2019109520A1 (zh) 视频面签派工方法、装置、设备及可读存储介质
WO2020138928A1 (en) Information processing method, apparatus, electrical device and readable storage medium
WO2019153486A1 (zh) 客户风险测评方法、装置、设备及计算机可读存储介质
WO2019090983A1 (zh) 基于医疗保险的理赔方法、装置及系统
WO2019061611A1 (zh) 营销活动的管理方法、装置、设备及计算机存储介质
WO2010027243A2 (ko) 온라인 광고에 대한 과금을 위한 방법, 시스템 및 컴퓨터 판독 가능한 기록 매체
WO2017041484A1 (zh) 一种实时信息的推荐方法、装置和系统
WO2019218435A1 (zh) 共享单车的投放方法、装置、设备及计算机可读存储介质
WO2018107610A1 (zh) 业务数据处理方法、系统、设备及计算机可读存储介质
WO2014084498A2 (ko) 웹사이트와 어플에서의 회원 간 만남주선 시스템
WO2010024628A2 (ko) 확장 키워드 풀을 사용한 검색 방법 및 시스템
WO2019144585A1 (zh) 虚拟机器人的控制方法、装置、设备及可读存储介质
WO2015131803A1 (en) Application recommending method and system
WO2010030116A2 (ko) 검색 광고에 대한 경매 및 과금을 수행하기 위한 방법, 시스템 및 컴퓨터 판독 가능한 기록 매체
WO2017054463A1 (zh) 事件信息推送方法、事件信息推送装置及存储介质
WO2019104877A1 (zh) 通过网站对接购买保险的方法、装置、设备及介质
WO2010119996A1 (ko) 동영상 관련 광고를 제공하는 방법 및 그 장치
WO2016171367A1 (ko) 리타게팅 광고 상품 추천 사용자 장치와 서비스 제공 장치, 그를 포함하는 광고 상품 추천 시스템, 그의 제어 방법 및 컴퓨터 프로그램이 기록된 기록매체
WO2019019714A1 (zh) 一种微信客户行为反馈方法、设备及存储介质
WO2020080874A1 (ko) 광고 컨텐츠 전송을 위한 디스플레이 장치 및 그 제어방법
WO2020000621A1 (zh) 空调控制方法、空调控制装置、空调设备及存储介质
WO2020224247A1 (zh) 基于区块链的数据溯源方法、装置、设备及可读存储介质
WO2013075613A1 (zh) 网络服务提供方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18867397

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 01.10.2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18867397

Country of ref document: EP

Kind code of ref document: A1