WO2020233067A1 - 基于用户行为的数据共享方法、装置及计算机设备 - Google Patents

基于用户行为的数据共享方法、装置及计算机设备 Download PDF

Info

Publication number
WO2020233067A1
WO2020233067A1 PCT/CN2019/121700 CN2019121700W WO2020233067A1 WO 2020233067 A1 WO2020233067 A1 WO 2020233067A1 CN 2019121700 W CN2019121700 W CN 2019121700W WO 2020233067 A1 WO2020233067 A1 WO 2020233067A1
Authority
WO
WIPO (PCT)
Prior art keywords
keyword
value
data
field
user behavior
Prior art date
Application number
PCT/CN2019/121700
Other languages
English (en)
French (fr)
Inventor
胡省平
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2020233067A1 publication Critical patent/WO2020233067A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Definitions

  • This application belongs to the technical field of user behavior analysis, and in particular relates to a data sharing method, device and computer equipment based on user behavior.
  • the embodiments of the present application provide a data sharing method, device, computer equipment, and storage medium based on user behaviors, so as to solve the problem of mutual users if the same enterprise develops multiple APP applications in the prior art. Data is not effectively shared, which leads to the problem of low utilization of data.
  • a data sharing method based on user behavior including:
  • the value of the sharing control field is a value indicating that sharing is allowed, obtain the user behavior field value, and obtain the keyword combination corresponding to the user behavior field value;
  • the user service data corresponding to the analysis data is sent to the distribution object corresponding to each keyword in the keyword combination.
  • a data sharing device based on user behavior including:
  • the service data analysis unit is configured to receive user service data, analyze the user service data, and obtain the analyzed data;
  • a designated field value obtaining unit for obtaining user behavior field values and shared control field values in the parsed data
  • a keyword combination obtaining unit configured to obtain the user behavior field value if the sharing control field value is a value indicating that sharing is allowed, and obtain the keyword combination corresponding to the user behavior field value;
  • the distribution object obtaining unit is configured to obtain each keyword in the keyword combination, and obtain the distribution object corresponding to each keyword in the keyword combination according to a preset keyword conversion strategy;
  • the distribution unit is configured to send the user service data corresponding to the analysis data to the distribution object corresponding to each keyword in the keyword combination.
  • a computer device which includes a memory, a processor, and computer-readable instructions stored in the memory and executable on the processor.
  • the processor executes the computer-readable instructions
  • the data sharing method based on user behavior described in the first aspect is implemented.
  • a computer-readable storage medium stores computer-readable instructions that, when executed by a processor, implement the user-based behavior described in the first aspect. Data sharing method.
  • FIG. 1 is a schematic diagram of an application scenario of a data sharing method based on user behavior provided by an embodiment of the application;
  • FIG. 2 is a schematic flowchart of a data sharing method based on user behavior provided by an embodiment of the application
  • FIG. 3 is a schematic diagram of a sub-flow of a data sharing method based on user behavior provided by an embodiment of the application;
  • FIG. 4 is a schematic diagram of another sub-flow of the data sharing method based on user behavior provided by an embodiment of the application;
  • FIG. 5 is a schematic diagram of another sub-flow of the data sharing method based on user behavior provided by an embodiment of the application;
  • FIG. 6 is a schematic block diagram of a data sharing device based on user behavior provided by an embodiment of the application
  • FIG. 7 is a schematic block diagram of subunits of a data sharing device based on user behavior provided by an embodiment of the application.
  • FIG. 8 is a schematic block diagram of another subunit of the data sharing device based on user behavior provided by an embodiment of the application.
  • FIG. 9 is a schematic block diagram of another subunit of the data sharing device based on user behavior provided by an embodiment of the application.
  • FIG. 10 is a schematic block diagram of a computer device provided by an embodiment of the application.
  • FIG. 1 is a schematic diagram of an application scenario of a data sharing method based on user behavior provided by an embodiment of this application
  • FIG. 2 is a schematic flowchart of a data sharing method based on user behavior provided by an embodiment of this application.
  • the data sharing method based on user behavior is applied to the server, and the method is executed by application software installed in the server.
  • the method includes steps S110 to S150.
  • S110 Receive user service data, analyze the user service data, and obtain analytical data.
  • the server can be understood as a data sharing platform that is used to receive business data uploaded by various business servers.
  • a group company includes multiple business subsidiaries, and each business subsidiary has developed its own APP application, and users are using These APP applications will generate a large amount of user service data, which is first uploaded to the corresponding service server, and then uploaded to the server by each service server.
  • the user business data of each business subsidiary is isolated from each other, and it is only used for user behavior analysis within the business subsidiary, but the user business data that can generate new business for other business subsidiaries has not been effectively mined.
  • the sharing of user information has not been fully realized under the premise of compliance.
  • the server can receive user business data, analyze the user business data, and obtain analytical data. After analyzing the analytical data, determine whether the shared data can be mined.
  • step S110 includes:
  • the data sharing platform collects the user service data uploaded by the database of each business subsidiary, it needs to analyze the user service data to obtain key information therein.
  • the analysis of the user service data is mainly to analyze the user identity field (can be abstracted as the first field) and user behavior field (can be abstracted as the second field) in the user service data, and whether the data can be shared
  • the shared control field (which can be abstracted as the third field) is extracted to obtain parsed data.
  • the user service data table 1 uploaded to the server by each service server:
  • the server can effectively analyze each piece of user service data to obtain analysis data composed of the first value, the second value, and the third value.
  • step S112 includes:
  • the specific value of the user behavior field can be generated by extracting keywords according to the user's business operation track log after the data sharing platform collects a certain piece of user business data.
  • the business operation track log is: 1. Transfer 310,000 yuan to the user; 2. Check fund products.
  • the data sharing platform can obtain the user behavior field value after extracting keywords from the business operation track log.
  • the business operation track log can be segmented through the word segmentation model based on probability statistics to obtain the word segmentation result corresponding to the business operation track log, and then use the word frequency-inverse text frequency
  • the index model ie TF-IDF model, TF-IDF is the abbreviation of Term Frequency-Inverse Document Frequency
  • the keyword information before the preset ranking value in the word segmentation result is extracted through the TF-IDF model, as follows:
  • IDF i lg[total number of documents in the corpus/(number of documents containing the word segmentation+1)];
  • the denominator is larger, and the inverse document frequency is smaller and closer to 0.
  • the reason for adding 1 to the denominator is to prevent the denominator from being 0 (that is, all documents do not contain the word).
  • TF-IDF is directly proportional to the number of occurrences of a word in the document, and inversely proportional to the number of occurrences of the word in the entire language. Therefore, automatically extracting keywords is to calculate the TF-IDF value of each word segmentation of the document, and then sort them in descending order, and take the top N words as the corresponding user behavior field value.
  • the sharing control field is a value indicating that sharing is allowed (for example, the sharing control field takes a value of 1. If the value of the sharing control field is 0, it means that the data cannot be shared). If the value of the sharing control field is a value that indicates that sharing is allowed, then the user behavior field value can be continuously analyzed.
  • the data sharing platform has obtained the user service data corresponding to Zhang San's serial number 1 in Table 1, where the sharing control field is 1, indicating that Zhang San's user business data can be shared with other business subsidiaries. For accuracy Share the user's business data to a more relevant business subsidiary.
  • the user behavior field value can be analyzed, and the keyword combination corresponding to the user behavior field value can be specifically obtained, for example, a keyword combination composed of transfer + fund
  • the user business data corresponding to this piece of user business data can be determined according to the keyword combination Distribution object.
  • step S140 includes:
  • the preset keyword conversion strategy is to query the strategy table of the distribution object (business subsidiary name) corresponding to the keyword, as shown in Table 2 below:
  • each keyword in the keyword combination has a corresponding conversion item in the keyword conversion strategy. If there is a keyword in the key There is a corresponding conversion item in the word conversion strategy, and the corresponding distribution object in the conversion item corresponding to the keyword is obtained, that is, the distribution object corresponding to the piece of user business data is determined according to the keyword in the keyword combination, and the distribution object is realized Automatic acquisition.
  • the user service data when the distribution object of the user service data is determined, the user service data can be sent to the distribution object corresponding to each keyword in the keyword combination, and when the distribution object receives After the user service data, the user can be contacted according to the user's telephone number, which improves the utilization rate of the user service data.
  • the method before step S150, the method further includes:
  • a data table corresponding to the distribution object is created, and the user service data is written into the data table corresponding to the distribution object.
  • the server after the server determines the distribution object corresponding to a certain piece of user service data, it can create a data table with the same number of distribution objects and one-to-one correspondence, and then write the user service data to each In the data table of the user who distributes the object.
  • the server After the server has completed the determination of the distribution object for multiple pieces of user service data (for example, 10,000 pieces of user service data), it can write each user service data into the data table of the corresponding distribution object, and then assign each distribution object to one Just send a corresponding data table to the corresponding distribution object.
  • the method realizes data sharing of user information on the same platform effectively according to user behavior data, improves data utilization, and avoids data islanding.
  • the embodiment of the present application also provides a data sharing device based on user behavior, and the data sharing device based on user behavior is used to execute any embodiment of the foregoing data sharing method based on user behavior.
  • FIG. 6, is a schematic block diagram of a data sharing device based on user behavior provided in an embodiment of the present application.
  • the data sharing device 100 based on user behavior may be configured in a server.
  • the data sharing device 100 based on user behavior includes a business data analysis unit 110, a designated field value acquisition unit 120, a keyword combination acquisition unit 130, a distribution object acquisition unit 140, and a distribution unit 150.
  • the service data analysis unit 110 is configured to receive user service data, analyze the user service data, and obtain analytical data.
  • the server can be understood as a data sharing platform that is used to receive business data uploaded by various business servers.
  • a group company includes multiple business subsidiaries, and each business subsidiary has developed its own APP application, and users are using These APP applications will generate a large amount of user service data, which is first uploaded to the corresponding service server, and then uploaded to the server by each service server.
  • the user business data of each business subsidiary is isolated from each other, and it is only used for user behavior analysis within the business subsidiary, but the user business data that can generate new business for other business subsidiaries has not been effectively mined.
  • the sharing of user information has not been fully realized under the premise of compliance.
  • the server can receive user business data, analyze the user business data, and obtain the analytical data. After analyzing the analytical data, it is determined whether the shared data can be mined.
  • the business data analysis unit 110 includes:
  • the field locating unit 111 is used to identify the first field used to identify user identity, the second field used to represent user behavior, and the third field used for sharing control in the user service data;
  • the field value obtaining unit 112 is configured to obtain a first value corresponding to the first field, obtain a second value corresponding to the second field, and obtain a third value corresponding to the third field, by The first value, the second value, and the third value constitute analytical data.
  • the data sharing platform collects the user service data uploaded by the database of each business subsidiary, it needs to analyze the user service data to obtain key information therein.
  • the analysis of the user service data is mainly to analyze the user identity field (can be abstracted as the first field) and user behavior field (can be abstracted as the second field) in the user service data, and whether the data can be shared
  • the shared control field (which can be abstracted as the third field) is extracted to obtain parsed data.
  • the server can effectively analyze each piece of user service data to obtain analysis data composed of the first value, the second value, and the third value.
  • the field value obtaining unit 112 includes:
  • the word segmentation unit 1121 is configured to obtain a business operation track log corresponding to the second field, and perform word segmentation on the business operation track log based on a probability statistical word segmentation model to obtain a word segmentation result corresponding to the business operation track log;
  • the keyword combination acquiring unit 1122 is configured to extract keywords that are located before the preset first ranking value in the word segmentation result through the word frequency-inverse text frequency index model, and form a keyword combination as the user corresponding to the business operation track log Behavior field value.
  • the specific value of the user behavior field can be generated by extracting keywords according to the user's business operation track log after the data sharing platform collects a certain piece of user business data.
  • the business operation track log is: 1. Transfer 310,000 yuan to the user; 2. Check fund products.
  • the data sharing platform can obtain the user behavior field value after extracting keywords from the business operation track log.
  • the business operation track log can be segmented through the word segmentation model based on probability statistics to obtain the word segmentation result corresponding to the business operation track log, and then use the word frequency-inverse text frequency
  • the index model ie TF-IDF model, TF-IDF is the abbreviation of Term Frequency-Inverse Document Frequency
  • the designated field value obtaining unit 120 is configured to obtain the user behavior field value and the shared control field value in the parsed data.
  • the sharing control field is a value indicating that sharing is allowed (for example, the sharing control field takes a value of 1. If the value of the sharing control field is 0, it means that the data cannot be shared). If the value of the sharing control field is a value that indicates that sharing is allowed, then the user behavior field value can be continuously analyzed.
  • the keyword combination obtaining unit 130 is configured to obtain the user behavior field value if the sharing control field value is a value indicating that sharing is allowed, and obtain the keyword combination corresponding to the user behavior field value.
  • the data sharing platform has obtained the user service data corresponding to Zhang San's serial number 1 in Table 1, where the sharing control field is 1, indicating that Zhang San's user business data can be shared with other business subsidiaries. For accuracy Share the user's business data to a more relevant business subsidiary.
  • the user behavior field value can be analyzed, and the keyword combination corresponding to the user behavior field value can be specifically obtained, for example, a keyword combination composed of transfer + fund
  • the user business data corresponding to this piece of user business data can be determined according to the keyword combination Distribution object.
  • the distribution object obtaining unit 140 is configured to obtain each keyword in the keyword combination, and obtain a distribution object corresponding to each keyword in the keyword combination according to a preset keyword conversion strategy.
  • the distribution object obtaining unit 140 includes:
  • the conversion item obtaining unit 141 is configured to sequentially obtain each keyword in the keyword combination
  • the conversion item analysis unit 142 is configured to, if each keyword has a corresponding conversion item in the keyword conversion strategy, obtain the corresponding distribution object in the conversion item corresponding to each keyword.
  • the preset keyword conversion strategy is to query the strategy table of the distribution object (business subsidiary name) corresponding to the keyword.
  • the keyword combination corresponding to a certain user’s business data is known, it can be determined whether each keyword in the keyword combination has a corresponding conversion item in the keyword conversion strategy. If there is a keyword in the key There is a corresponding conversion item in the word conversion strategy, and the corresponding distribution object in the conversion item corresponding to the keyword is obtained, that is, the distribution object corresponding to the piece of user business data is determined according to the keyword in the keyword combination, and the distribution object is realized Automatic acquisition.
  • the distributing unit 150 is configured to send the user service data corresponding to the analysis data to the distribution object corresponding to each keyword in the keyword combination.
  • the user service data when the distribution object of the user service data is determined, the user service data can be sent to the distribution object corresponding to each keyword in the keyword combination, and when the distribution object receives After the user service data, the user can be contacted according to the user's telephone number, which improves the utilization rate of the user service data.
  • the data sharing device 100 based on user behavior further includes:
  • the data table writing unit is used to create a data table corresponding to the distribution object one-to-one, and write the user service data into the data table corresponding to the distribution object one-to-one.
  • the server after the server determines the distribution object corresponding to a certain piece of user service data, it can create a data table with the same number of distribution objects and one-to-one correspondence, and then write the user service data to each In the data table of the user who distributes the object.
  • the server After the server has completed the determination of the distribution object for multiple pieces of user service data (for example, 10,000 pieces of user service data), it can write each user service data into the data table of the corresponding distribution object, and then assign each distribution object to one Just send a corresponding data table to the corresponding distribution object.
  • the device realizes effective data sharing of user information on the same platform based on user behavior data, improves data utilization, and avoids data islanding.
  • the foregoing data sharing apparatus based on user behavior may be implemented in the form of computer-readable instructions, and the computer-readable instructions may run on the computer device as shown in FIG. 10.
  • FIG. 10 is a schematic block diagram of a computer device according to an embodiment of the present application.
  • the computer device 500 is a server, and the server may be an independent server or a server cluster composed of multiple servers.
  • the computer device 500 includes a processor 502, a memory, and a network interface 505 connected through a system bus 501, where the memory may include a non-volatile storage medium 503 and an internal memory 504.
  • the non-volatile storage medium 503 can store an operating system 5031 and computer-readable instructions 5032.
  • the processor 502 can execute a data sharing method based on user behavior.
  • the processor 502 is used to provide calculation and control capabilities, and support the operation of the entire computer device 500.
  • the internal memory 504 provides an environment for the operation of the computer-readable instructions 5032 in the non-volatile storage medium 503.
  • the processor 502 can execute the data sharing method based on user behavior. .
  • the network interface 505 is used for network communication, such as providing data information transmission.
  • the structure shown in FIG. 10 is only a block diagram of part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device 500 to which the solution of the present application is applied.
  • the specific computer device 500 may include more or fewer components than shown in the figure, or combine certain components, or have a different component arrangement.
  • the processor 502 is configured to run computer-readable instructions 5032 stored in the memory to implement the following functions: receiving user service data, analyzing the user service data, and obtaining analytical data; obtaining the analytical data The user behavior field value and the sharing control field value of the; if the sharing control field value indicates a value that allows sharing, obtain the user behavior field value, and obtain the keyword combination corresponding to the user behavior field value; obtain keywords For each keyword in the combination, according to a preset keyword conversion strategy, obtain the distribution object corresponding to each keyword in the keyword combination; and send the user service data corresponding to the analytical data to the key The distribution object corresponding to each keyword in the word combination.
  • the processor 502 when the processor 502 executes the step of parsing the user service data to obtain the parsed data, it performs the following operations: identifying the first field in the user service data for identifying the user identity , The second field used to indicate user behavior, the third field used for sharing control; obtain the first value corresponding to the first field, obtain the second value corresponding to the second field, and obtain the The third value corresponding to the third field consists of the first value, the second value, and the third value to form analytical data.
  • the processor 502 when the processor 502 executes the step of acquiring the second value corresponding to the second field, it executes the following operations: acquiring the business operation track log corresponding to the second field, and storing the The business operation trajectory log is segmented based on the probability and statistics word segmentation model to obtain the word segmentation result corresponding to the business operation trajectory log; the word frequency-inverse text frequency index model is used to extract the key of the word segmentation result before the preset first ranking value Words, form a combination of keywords as the user behavior field value corresponding to the business operation track log.
  • the processor 502 executes the step of obtaining the distribution object corresponding to each keyword in the keyword combination according to the preset keyword conversion strategy, the following operations are performed: Each keyword in the keyword combination; if each keyword has a corresponding conversion item in the keyword conversion strategy, obtain the corresponding distribution object in the conversion item corresponding to each keyword.
  • the processor 502 further performs the following operations before performing the step of sending the user service data corresponding to the analysis data to the distribution object corresponding to each keyword in the keyword combination: create The data table corresponding to the distribution object one-to-one, and the user service data is written into the data table corresponding to the distribution object one-to-one.
  • the embodiment of the computer device shown in FIG. 10 does not constitute a limitation on the specific configuration of the computer device.
  • the computer device may include more or less components than shown in the figure. Or combine certain components, or different component arrangements.
  • the computer device may only include a memory and a processor. In such an embodiment, the structures and functions of the memory and the processor are consistent with the embodiment shown in FIG. 10, and will not be repeated here.
  • the processor 502 may be a central processing unit (Central Processing Unit, CPU), and the processor 502 may also be other general-purpose processors, digital signal processors (Digital Signal Processors, DSP), Application Specific Integrated Circuit (ASIC), Field-Programmable Gate Array (FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor.
  • Non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • ROM read only memory
  • PROM programmable ROM
  • EPROM electrically programmable ROM
  • EEPROM electrically erasable programmable ROM
  • Volatile memory may include random access memory (RAM) or external cache memory.
  • RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Channel (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.
  • the computer-readable instructions are executed by the processor to implement the following steps: receive user service data, parse the user service data to obtain parsed data; obtain the user behavior field value and the shared control field value in the parsed data; if The value of the sharing control field is a value indicating that sharing is allowed, the user behavior field value is obtained, and the keyword combination corresponding to the user behavior field value is obtained; each keyword in the keyword combination is obtained according to a preset key
  • the word conversion strategy is to obtain the distribution object corresponding to each keyword in the keyword combination; and send the user service data corresponding to the analysis data to the distribution object corresponding to each keyword in the keyword combination.
  • the parsing of the user service data to obtain the parsed data includes: identifying a first field used to identify user identity and a second field used to indicate user behavior in the user service data , A third field used for sharing control; obtaining a first value corresponding to the first field, obtaining a second value corresponding to the second field, and obtaining a third value corresponding to the third field,
  • the analysis data is composed of the first value, the second value, and the third value.
  • the obtaining the second value corresponding to the second field includes: obtaining a business operation track log corresponding to the second field, and passing the business operation track log through a word segmentation model based on probability statistics Perform word segmentation to obtain the word segmentation result corresponding to the business operation track log; through the word frequency-inverse text frequency index model, extract keywords in the word segmentation result before the preset first ranking value to form a keyword combination as a business operation User behavior field value corresponding to the track log.
  • the obtaining a distribution object corresponding to each keyword in the keyword combination according to a preset keyword conversion strategy includes: sequentially obtaining each keyword in the keyword combination; If each keyword has a corresponding conversion item in the keyword conversion strategy, obtain the corresponding distribution object in the conversion item corresponding to each keyword.
  • the method before sending the user service data corresponding to the analysis data to the distribution object corresponding to each keyword in the keyword combination, the method further includes: creating a one-to-one correspondence with the distribution object The data table writes the user service data into the data table corresponding to the distribution object one-to-one.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本申请公开了基于用户行为的数据共享方法、装置、计算机设备及存储介质。该方法包括:接收用户业务数据,对用户业务数据进行解析,得到解析数据;获取解析数据中的用户行为字段值和共享控制字段值;若共享控制字段值为表示允许共享的数值,获取用户行为字段值,并获取用户行为字段值对应的关键词组合;获取关键词组合中的各关键词,根据预设的关键词转化策略,获取与关键词组合中每一关键词对应的分发对象;以及将解析数据对应的用户业务数据发送至与关键词组合中每一关键词对应的分发对象。该方法采用用户行为画像技术,实现了根据用户行为数据有效的将用户信息在同一平台的数据共享,提高数据的利用率,避免数据孤岛现象。

Description

基于用户行为的数据共享方法、装置及计算机设备
本申请申明享有2019年05月23日递交的申请号为201910433478.6、名称为“基于用户行为的数据共享方法、装置及计算机设备”的中国专利申请的优先权,该中国专利申请的整体内容以参考的方式结合在本申请中。
技术领域
本申请属于用户行为分析技术领域,特别是涉及一种基于用户行为的数据共享方法、装置及计算机设备。
背景技术
目前,针对某一APP应用程序的用户进行行为分析时,一般是基于该APP应用程序采集到的用户数据和行为数据。但是一个企业若开发了多款APP应用程序,相互之间的用户数据是未实现有效共享,这就导致数据的利用率低下。
发明概述
技术问题
有鉴于此,本申请实施例提供了一种基于用户行为的数据共享方法、装置、计算机设备及存储介质,以解决现有技术中同一企业若开发了多款APP应用程序,相互之间的用户数据是未实现有效共享,这就导致数据的利用率低下的问题。
问题的解决方案
技术解决方案
为解决上述技术问题,本申请实施例采用的技术方案是:
第一方面,提供了一种基于用户行为的数据共享方法,包括:
接收用户业务数据,对所述用户业务数据进行解析,得到解析数据;
获取所述解析数据中的用户行为字段值和共享控制字段值;
若所述共享控制字段值为表示允许共享的数值,获取所述用户行为字段值,并获取所述用户行为字段值对应的关键词组合;
获取关键词组合中的各关键词,根据预设的关键词转化策略,获取与所述关键词组合中每一关键词对应的分发对象;以及,
将所述解析数据对应的用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象。
第二方面,提供了一种基于用户行为的数据共享装置,包括:
业务数据解析单元,用于接收用户业务数据,对所述用户业务数据进行解析,得到解析数据;
指定字段值获取单元,用于获取所述解析数据中的用户行为字段值和共享控制字段值;
关键词组合获取单元,用于若所述共享控制字段值为表示允许共享的数值,获取所述用户行为字段值,并获取所述用户行为字段值对应的关键词组合;
分发对象获取单元,用于获取关键词组合中的各关键词,根据预设的关键词转化策略,获取与所述关键词组合中每一关键词对应的分发对象;以及,
分发单元,用于将所述解析数据对应的用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象。
第三方面,提供了一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,所述处理器执行所述计算机可读指令时实现上述第一方面所述的基于用户行为的数据共享方法。
第四方面,提供了一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,所述计算机可读指令被处理器执行时实现上述第一方面所述的基于用户行为的数据共享方法。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其他特征、目的和优点将从说明书、附图以及权利要求书中变得明显。
发明的有益效果
对附图的简要说明
附图说明
图1为本申请实施例提供的基于用户行为的数据共享方法的应用场景示意图;
图2为本申请实施例提供的基于用户行为的数据共享方法的流程示意图;
图3为本申请实施例提供的基于用户行为的数据共享方法的子流程示意图;
图4为本申请实施例提供的基于用户行为的数据共享方法的另一子流程示意图 ;
图5为本申请实施例提供的基于用户行为的数据共享方法的另一子流程示意图;
图6为本申请实施例提供的基于用户行为的数据共享装置的示意性框图;
图7为本申请实施例提供的基于用户行为的数据共享装置的子单元示意性框图;
图8为本申请实施例提供的基于用户行为的数据共享装置的另一子单元示意性框图;
图9为本申请实施例提供的基于用户行为的数据共享装置的另一子单元示意性框图;
图10为本申请实施例提供的计算机设备的示意性框图。
发明实施例
本发明的实施方式
请参阅图1和图2,图1为本申请实施例提供的基于用户行为的数据共享方法的应用场景示意图,图2为本申请实施例提供的基于用户行为的数据共享方法的流程示意图,该基于用户行为的数据共享方法应用于服务器中,该方法通过安装于服务器中的应用软件进行执行。
如图2所示,该方法包括步骤S110~S150。
S110、接收用户业务数据,对所述用户业务数据进行解析,得到解析数据。
在本实施例中,是站在服务器的角度描述技术方案。服务器可以理解为一数据共享平台,该数据共享平台用来接收各业务服务器上传的业务数据,例如一个集团公司包括多个业务子公司,各业务子公司开发了各自的APP应用程序,用户在使用这些APP应用程序时会产生大量用户业务数据,这些用户业务数据是先上传至对应的业务服务器,再由各业务服务器上传至服务器。
目前,各业务子公司的用户业务数据是相互孤立的,只是在本业务子公司内部进行用户行为分析使用,而未有效的挖掘出能对其他业务子公司产生新业务的用户业务数据,在合法合规的前提下未能充分实现用户信息的共享。为了实现对各业务子公司的用户业务数据的共享,可由服务器接收用户业务数据,对所 述用户业务数据进行解析,得到解析数据,通过对解析数据进行分析后,确定是否可以挖掘出共享数据。
在本实施例中,如图3所示,步骤S110包括:
S111、识别所述用户业务数据中用于标识用户身份识别的第一字段、用于表示用户行为的第二字段、用于共享控制的第三字段;
S112、获取所述第一字段对应的第一取值、获取所述第二字段对应的第二取值、及获取所述第三字段对应的第三取值,由所述第一取值、第二取值及第三取值组成解析数据。
在本实施例中,当数据共享平台采集了各业务子公司的数据库上传的用户业务数据后,需对用户业务数据进行解析,获取其中的关键信息。
对所述用户业务数据进行解析,主要是对所述用户业务数据中的用户身份标识字段(可抽象为第一字段)、及用户行为字段(可抽象为第二字段)、及数据是否可共享的共享控制字段(可抽象为第三字段)进行提取,以得到解析数据。
例如,各业务服务器上传至服务器的用户业务数据表1:
表1
[Table 1]
Figure PCTCN2019121700-appb-000001
服务器中通过对每一条用户业务数据均能实现有效解析,以得到由所述第一取值、第二取值及第三取值组成解析数据。
在一实施例中,如图4所示,步骤S112包括:
S1121、获取与所述第二字段对应的业务操作轨迹日志,将所述业务操作轨迹日志通过基于概率统计分词模型进行分词,得到与业务操作轨迹日志对应的分词结果;
S1122、通过词频-逆文本频率指数模型,抽取所述分词结果中位于预设的第一排名值之前的关键词,组成关键词组合以作为业务操作轨迹日志对应的用户行为字段值。
在本实施例中,用户行为这一字段具体取值的产生,可以是数据共享平台采集了某条用户业务数据后,根据用户的业务操作轨迹日志提取关键词而得到。
例如,用户1(张三)登录了APP应用程序后,进行的业务操作轨迹日志为:1、转账给用户31万元;2、查看基金产品。此时,数据共享平台在对该业务操作轨迹日志进行关键词提取后,即可获取用户行为字段值。
更具体的,由业务操作轨迹日志获取用户行为字段值时,可以先将业务操作轨迹日志通过基于概率统计分词模型进行分词,得到与业务操作轨迹日志对应的分词结果,然后采用词频-逆文本频率指数模型(即TF-IDF模型,TF-IDF是Term Frequency-Inverse Document Frequency的简写)抽取所述分词结果中位于所述第一排名值之前的关键词信息,以作为业务操作轨迹对应的用户行为字段值。
通过TF-IDF模型抽取所述分词结果中位于预设的排名值之前的关键词信息,具体如下:
a)计算分词结果中每一分词i的词频,记为TF i
b)计算分词结果中每一分词i的逆文档频率IDF i
在计算每一分词i的逆文档频率IDF i时,需要一个语料库(与分词过程中的字典类似),用来模拟语言的使用环境;
逆文档频率IDF i=lg[语料库的文档总数/(包含该分词的文档数+1)];
如果一个词越常见,那么分母就越大,逆文档频率就越小越接近0。分母之所以要加1,是为了避免分母为0(即所有文档都不包含该词)。
c)根据TF i*IDF i计算分词结果中每一分词i对应的词频-逆文本频率指数TF-IDF i
显然,TF-IDF与一个词在文档中的出现次数成正比,与该词在整个语言中的出现次数成反比。所以,自动提取关键词即是计算出文档的每个分词的TF-IDF值,然后按降序排列,取排在前N位的词作为对应的用户行为字段值。
d)将分词结果中每一分词对应的词频-逆文本频率指数按降序排序,取排名位于预设的第一排名值之前(例如预设的第一排名值为4)的分词组成用户行为字段值。
S120、获取所述解析数据中的用户行为字段值和共享控制字段值。
在本实施例中,当数据共享平台获取了用户业务数据并解析得到了对应的解析数据后,需先判断其中的共享控制字段是否为表示允许共享的数值(例如,共享控制字段取值为1时表示数据可共享,共享控制字段取值为0时表示数据不可共享),若共享控制字段值是表示允许共享的数值,则可继续分析用户行为字段值。
S130、若所述共享控制字段值为表示允许共享的数值,获取所述用户行为字段值,并获取所述用户行为字段值对应的关键词组合。
在本实施例中,例如数据共享平台获取了表1中序号1对应张三的用户业务数据,其中共享控制字段为1,表示张三的用户业务数据可以共享至其他业务子公司,为了精准的将该用户业务数据分享至相关性较强的业务子公司,此时可以分析所述用户行为字段值,具体获取所述用户行为字段值对应的关键词组合,例如转账+基金组成的关键词组合,此时对该条用户业务数据进行共享时,需分析转账对应哪一业务子公司,基金对应哪一业务子公司;当分析完成时,即可根据该关键词组合确定该条用户业务数据对应的分发对象。
S140、获取关键词组合中的各关键词,根据预设的关键词转化策略,获取与所述关键词组合中每一关键词对应的分发对象。
在一实施例中,如图5所示,步骤S140包括:
S141、依序获取所述关键词组合中每一关键词;
S142、若各关键词在所述关键词转化策略中存在对应的转化项,获取每一关键词对应的转化项中对应的分发对象。
在本实施例中,预先设置的关键词转化策略是查询与关键词对应的分发对象(业务子公司名称)的策略表,具体如下表2:
表2
[Table 2]
关键词 分发对象
转账 子公司1
查询余额 子公司1
基金 子公司2
...... ......
车险 子公司3
当获知了某一用户业务数据对应的关键词组合后,即可判断该关键词组合中每一关键词在所述关键词转化策略中是否存在对应的转化项,若有关键词在所述 关键词转化策略中存在对应的转化项,获取该关键词对应的转化项中对应的分发对象,即实现了根据关键词组合中的关键词确定该条用户业务数据对应的分发对象,实现了分发对象的自动获取。
S150、将所述解析数据对应的用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象。
在本实施例中,当确定了所述用户业务数据的分发对象后,即可将所述用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象,当分发对象接收了用户业务数据后,即可根据其中用户的电话号码与用户建立联系,提高了用户业务数据的利用率。
在一实施例中,步骤S150之前还包括:
创建与所述分发对象一一对应的数据表,将所述用户业务数据写入与所述分发对象一一对应的数据表。
在本实施例中,当服务器确定了某一条用户业务数据对应的分发对象后,可创建与所述分发对象个数相同且一一对应的数据表,然后将该用户业务数据写入到每一分发对象的用户的数据表中。当服务器完成了对多条用户业务数据(例如1万条用户业务数据)的分发对象的确定后,即可将每一用户业务数据写入对应的分发对象的数据表,之后将各分发对象一一对应的数据表发送至对应的分发对象即可。
该方法实现了根据用户行为数据有效的将用户信息在同一平台的数据共享,提高数据的利用率,避免数据孤岛现象。
本申请实施例还提供一种基于用户行为的数据共享装置,该基于用户行为的数据共享装置用于执行前述基于用户行为的数据共享方法的任一实施例。具体地,请参阅图6,图6是本申请实施例提供的基于用户行为的数据共享装置的示意性框图。该基于用户行为的数据共享装置100可以配置于服务器中。
如图6所示,基于用户行为的数据共享装置100包括业务数据解析单元110、指定字段值获取单元120、关键词组合获取单元130、分发对象获取单元140、分发单元150。
业务数据解析单元110,用于接收用户业务数据,对所述用户业务数据进行解 析,得到解析数据。
在本实施例中,是站在服务器的角度描述技术方案。服务器可以理解为一数据共享平台,该数据共享平台用来接收各业务服务器上传的业务数据,例如一个集团公司包括多个业务子公司,各业务子公司开发了各自的APP应用程序,用户在使用这些APP应用程序时会产生大量用户业务数据,这些用户业务数据是先上传至对应的业务服务器,再由各业务服务器上传至服务器。
目前,各业务子公司的用户业务数据是相互孤立的,只是在本业务子公司内部进行用户行为分析使用,而未有效的挖掘出能对其他业务子公司产生新业务的用户业务数据,在合法合规的前提下未能充分实现用户信息的共享。为了实现对各业务子公司的用户业务数据的共享,可由服务器接收用户业务数据,对所述用户业务数据进行解析,得到解析数据,通过对解析数据进行分析后,确定是否可以挖掘出共享数据。
在本实施例中,如图7所示,业务数据解析单元110包括:
字段定位单元111,用于识别所述用户业务数据中用于标识用户身份识别的第一字段、用于表示用户行为的第二字段、用于共享控制的第三字段;
字段取值获取单元112,用于获取所述第一字段对应的第一取值、获取所述第二字段对应的第二取值、及获取所述第三字段对应的第三取值,由所述第一取值、第二取值及第三取值组成解析数据。
在本实施例中,当数据共享平台采集了各业务子公司的数据库上传的用户业务数据后,需对用户业务数据进行解析,获取其中的关键信息。
对所述用户业务数据进行解析,主要是对所述用户业务数据中的用户身份标识字段(可抽象为第一字段)、及用户行为字段(可抽象为第二字段)、及数据是否可共享的共享控制字段(可抽象为第三字段)进行提取,以得到解析数据。服务器中通过对每一条用户业务数据均能实现有效解析,以得到由所述第一取值、第二取值及第三取值组成解析数据。
在一实施例中,如图8所示,字段取值获取单元112包括:
分词单元1121,用于获取与所述第二字段对应的业务操作轨迹日志,将所述业务操作轨迹日志通过基于概率统计分词模型进行分词,得到与业务操作轨迹日 志对应的分词结果;
关键词组合获取单元1122,用于通过词频-逆文本频率指数模型,抽取所述分词结果中位于预设的第一排名值之前的关键词,组成关键词组合以作为业务操作轨迹日志对应的用户行为字段值。
在本实施例中,用户行为这一字段具体取值的产生,可以是数据共享平台采集了某条用户业务数据后,根据用户的业务操作轨迹日志提取关键词而得到。
例如,用户1(张三)登录了APP应用程序后,进行的业务操作轨迹日志为:1、转账给用户31万元;2、查看基金产品。此时,数据共享平台在对该业务操作轨迹日志进行关键词提取后,即可获取用户行为字段值。
更具体的,由业务操作轨迹日志获取用户行为字段值时,可以先将业务操作轨迹日志通过基于概率统计分词模型进行分词,得到与业务操作轨迹日志对应的分词结果,然后采用词频-逆文本频率指数模型(即TF-IDF模型,TF-IDF是Term Frequency-Inverse Document Frequency的简写)抽取所述分词结果中位于所述第一排名值之前的关键词信息,以作为业务操作轨迹对应的用户行为字段值。
指定字段值获取单元120,用于获取所述解析数据中的用户行为字段值和共享控制字段值。
在本实施例中,当数据共享平台获取了用户业务数据并解析得到了对应的解析数据后,需先判断其中的共享控制字段是否为表示允许共享的数值(例如,共享控制字段取值为1时表示数据可共享,共享控制字段取值为0时表示数据不可共享),若共享控制字段值是表示允许共享的数值,则可继续分析用户行为字段值。
关键词组合获取单元130,用于若所述共享控制字段值为表示允许共享的数值,获取所述用户行为字段值,并获取所述用户行为字段值对应的关键词组合。
在本实施例中,例如数据共享平台获取了表1中序号1对应张三的用户业务数据,其中共享控制字段为1,表示张三的用户业务数据可以共享至其他业务子公司,为了精准的将该用户业务数据分享至相关性较强的业务子公司,此时可以分析所述用户行为字段值,具体获取所述用户行为字段值对应的关键词组合,例如转账+基金组成的关键词组合,此时对该条用户业务数据进行共享时,需分析 转账对应哪一业务子公司,基金对应哪一业务子公司;当分析完成时,即可根据该关键词组合确定该条用户业务数据对应的分发对象。
分发对象获取单元140,用于获取关键词组合中的各关键词,根据预设的关键词转化策略,获取与所述关键词组合中每一关键词对应的分发对象。
在一实施例中,如图9所示,分发对象获取单元140包括:
转化项获取单元141,用于依序获取所述关键词组合中每一关键词;
转化项解析单元142,用于若各关键词在所述关键词转化策略中存在对应的转化项,获取每一关键词对应的转化项中对应的分发对象。
在本实施例中,预先设置的关键词转化策略是查询与关键词对应的分发对象(业务子公司名称)的策略表。当获知了某一用户业务数据对应的关键词组合后,即可判断该关键词组合中每一关键词在所述关键词转化策略中是否存在对应的转化项,若有关键词在所述关键词转化策略中存在对应的转化项,获取该关键词对应的转化项中对应的分发对象,即实现了根据关键词组合中的关键词确定该条用户业务数据对应的分发对象,实现了分发对象的自动获取。
分发单元150,用于将所述解析数据对应的用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象。
在本实施例中,当确定了所述用户业务数据的分发对象后,即可将所述用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象,当分发对象接收了用户业务数据后,即可根据其中用户的电话号码与用户建立联系,提高了用户业务数据的利用率。
在一实施例中,基于用户行为的数据共享装置100还包括:
数据表写入单元,用于创建与所述分发对象一一对应的数据表,将所述用户业务数据写入与所述分发对象一一对应的数据表。
在本实施例中,当服务器确定了某一条用户业务数据对应的分发对象后,可创建与所述分发对象个数相同且一一对应的数据表,然后将该用户业务数据写入到每一分发对象的用户的数据表中。当服务器完成了对多条用户业务数据(例如1万条用户业务数据)的分发对象的确定后,即可将每一用户业务数据写入对应的分发对象的数据表,之后将各分发对象一一对应的数据表发送至对应的分 发对象即可。
该装置实现了根据用户行为数据有效的将用户信息在同一平台的数据共享,提高数据的利用率,避免数据孤岛现象。
上述基于用户行为的数据共享装置可以实现为计算机可读指令的形式,该计算机可读指令可以在如图10所示的计算机设备上运行。
请参阅图10,图10是本申请实施例提供的计算机设备的示意性框图。该计算机设备500是服务器,服务器可以是独立的服务器,也可以是多个服务器组成的服务器集群。
参阅图10,该计算机设备500包括通过系统总线501连接的处理器502、存储器和网络接口505,其中,存储器可以包括非易失性存储介质503和内存储器504。
该非易失性存储介质503可存储操作系统5031和计算机可读指令5032。该计算机可读指令5032被执行时,可使得处理器502执行基于用户行为的数据共享方法。
该处理器502用于提供计算和控制能力,支撑整个计算机设备500的运行。
该内存储器504为非易失性存储介质503中的计算机可读指令5032的运行提供环境,该计算机可读指令5032被处理器502执行时,可使得处理器502执行基于用户行为的数据共享方法。
该网络接口505用于进行网络通信,如提供数据信息的传输等。本领域技术人员可以理解,图10中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备500的限定,具体的计算机设备500可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
其中,所述处理器502用于运行存储在存储器中的计算机可读指令5032,以实现如下功能:接收用户业务数据,对所述用户业务数据进行解析,得到解析数据;获取所述解析数据中的用户行为字段值和共享控制字段值;若所述共享控制字段值为表示允许共享的数值,获取所述用户行为字段值,并获取所述用户行为字段值对应的关键词组合;获取关键词组合中的各关键词,根据预设的关键词转化策略,获取与所述关键词组合中每一关键词对应的分发对象;以及将 所述解析数据对应的用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象。
在一实施例中,处理器502在执行所述对所述用户业务数据进行解析,得到解析数据的步骤时,执行如下操作:识别所述用户业务数据中用于标识用户身份识别的第一字段、用于表示用户行为的第二字段、用于共享控制的第三字段;获取所述第一字段对应的第一取值、获取所述第二字段对应的第二取值、及获取所述第三字段对应的第三取值,由所述第一取值、第二取值及第三取值组成解析数据。
在一实施例中,处理器502在执行所述获取所述第二字段对应的第二取值的步骤时,执行如下操作:获取与所述第二字段对应的业务操作轨迹日志,将所述业务操作轨迹日志通过基于概率统计分词模型进行分词,得到与业务操作轨迹日志对应的分词结果;通过词频-逆文本频率指数模型,抽取所述分词结果中位于预设的第一排名值之前的关键词,组成关键词组合以作为业务操作轨迹日志对应的用户行为字段值。
在一实施例中,处理器502在执行所述根据预设的关键词转化策略,获取与所述关键词组合中每一关键词对应的分发对象的步骤时,执行如下操作:依序获取所述关键词组合中每一关键词;若各关键词在所述关键词转化策略中存在对应的转化项,获取每一关键词对应的转化项中对应的分发对象。
在一实施例中,处理器502在执行所述将所述解析数据对应的用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象的步骤之前,还执行如下操作:创建与所述分发对象一一对应的数据表,将所述用户业务数据写入与所述分发对象一一对应的数据表。
本领域技术人员可以理解,图10中示出的计算机设备的实施例并不构成对计算机设备具体构成的限定,在其他实施例中,计算机设备可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。例如,在一些实施例中,计算机设备可以仅包括存储器及处理器,在这样的实施例中,存储器及处理器的结构及功能与图10所示实施例一致,在此不再赘述。
应当理解,在本申请实施例中,处理器502可以是中央处理单元(Central  Processing Unit,CPU),该处理器502还可以是其他通用处理器、数字信号处理器(Digital Signal Processor,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现成可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件等。其中,通用处理器可以是微处理器或者该处理器也可以是任何常规的处理器等。
本领域普通技术人员可以理解,实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,所述的计算机可读指令可存储于一非易失性计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其他介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
其中计算机可读指令被处理器执行时实现以下步骤:接收用户业务数据,对所述用户业务数据进行解析,得到解析数据;获取所述解析数据中的用户行为字段值和共享控制字段值;若所述共享控制字段值为表示允许共享的数值,获取所述用户行为字段值,并获取所述用户行为字段值对应的关键词组合;获取关键词组合中的各关键词,根据预设的关键词转化策略,获取与所述关键词组合中每一关键词对应的分发对象;以及将所述解析数据对应的用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象。
在一实施例中,所述对所述用户业务数据进行解析,得到解析数据,包括:识别所述用户业务数据中用于标识用户身份识别的第一字段、用于表示用户行为的第二字段、用于共享控制的第三字段;获取所述第一字段对应的第一取值、 获取所述第二字段对应的第二取值、及获取所述第三字段对应的第三取值,由所述第一取值、第二取值及第三取值组成解析数据。
在一实施例中,所述获取所述第二字段对应的第二取值,包括:获取与所述第二字段对应的业务操作轨迹日志,将所述业务操作轨迹日志通过基于概率统计分词模型进行分词,得到与业务操作轨迹日志对应的分词结果;通过词频-逆文本频率指数模型,抽取所述分词结果中位于预设的第一排名值之前的关键词,组成关键词组合以作为业务操作轨迹日志对应的用户行为字段值。
在一实施例中,所述根据预设的关键词转化策略,获取与所述关键词组合中每一关键词对应的分发对象,包括:依序获取所述关键词组合中每一关键词;若各关键词在所述关键词转化策略中存在对应的转化项,获取每一关键词对应的转化项中对应的分发对象。
在一实施例中,所述将所述解析数据对应的用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象之前,还包括:创建与所述分发对象一一对应的数据表,将所述用户业务数据写入与所述分发对象一一对应的数据表。
以上所述,仅为本申请的具体实施方式,但本申请的保护范围并不局限于此,任何熟悉本技术领域的技术人员在本申请揭露的技术范围内,可轻易想到各种等效的修改或替换,这些修改或替换都应涵盖在本申请的保护范围之内。因此,本申请的保护范围应以权利要求的保护范围为准。

Claims (20)

  1. 一种基于用户行为的数据共享方法,其特征在于,包括:
    接收用户业务数据,对所述用户业务数据进行解析,得到解析数据;
    获取所述解析数据中的用户行为字段值和共享控制字段值;
    若所述共享控制字段值为表示允许共享的数值,获取所述用户行为字段值,并获取所述用户行为字段值对应的关键词组合;
    获取关键词组合中的各关键词,根据预设的关键词转化策略,获取与所述关键词组合中每一关键词对应的分发对象;以及
    将所述解析数据对应的用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象。
  2. 根据权利要求1所述的基于用户行为的数据共享方法,其特征在于,所述对所述用户业务数据进行解析,得到解析数据,包括:
    识别所述用户业务数据中用于标识用户身份识别的第一字段、用于表示用户行为的第二字段、用于共享控制的第三字段;
    获取所述第一字段对应的第一取值、获取所述第二字段对应的第二取值、及获取所述第三字段对应的第三取值,由所述第一取值、第二取值及第三取值组成解析数据。
  3. 根据权利要求2所述的基于用户行为的数据共享方法,其特征在于,所述获取所述第二字段对应的第二取值,包括:
    获取与所述第二字段对应的业务操作轨迹日志,将所述业务操作轨迹日志通过基于概率统计分词模型进行分词,得到与业务操作轨迹日志对应的分词结果;
    通过词频-逆文本频率指数模型,抽取所述分词结果中位于预设的第一排名值之前的关键词,组成关键词组合以作为业务操作轨迹日志对应的用户行为字段值。
  4. 根据权利要求1所述的基于用户行为的数据共享方法,其特征在于,所述根据预设的关键词转化策略,获取与所述关键词组合中每 一关键词对应的分发对象,包括:
    依序获取所述关键词组合中每一关键词;
    若各关键词在所述关键词转化策略中存在对应的转化项,获取每一关键词对应的转化项中对应的分发对象。
  5. 根据权利要求1所述的基于用户行为的数据共享方法,其特征在于,所述将所述解析数据对应的用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象之前,还包括:
    创建与所述分发对象一一对应的数据表,将所述用户业务数据写入与所述分发对象一一对应的数据表。
  6. 一种基于用户行为的数据共享装置,其特征在于,包括:
    业务数据解析单元,用于接收用户业务数据,对所述用户业务数据进行解析,得到解析数据;
    指定字段值获取单元,用于获取所述解析数据中的用户行为字段值和共享控制字段值;
    关键词组合获取单元,用于若所述共享控制字段值为表示允许共享的数值,获取所述用户行为字段值,并获取所述用户行为字段值对应的关键词组合;
    分发对象获取单元,用于获取关键词组合中的各关键词,根据预设的关键词转化策略,获取与所述关键词组合中每一关键词对应的分发对象;以及
    分发单元,用于将所述解析数据对应的用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象。
  7. 根据权利要求6所述的基于用户行为的数据共享装置,其特征在于,所述业务数据解析单元,包括:
    字段定位单元,用于识别所述用户业务数据中用于标识用户身份识别的第一字段、用于表示用户行为的第二字段、用于共享控制的第三字段;
    字段取值获取单元,用于获取所述第一字段对应的第一取值、获 取所述第二字段对应的第二取值、及获取所述第三字段对应的第三取值,由所述第一取值、第二取值及第三取值组成解析数据。
  8. 根据权利要求7所述的基于用户行为的数据共享装置,其特征在于,所述字段取值获取单元,包括:
    分词单元,用于获取与所述第二字段对应的业务操作轨迹日志,将所述业务操作轨迹日志通过基于概率统计分词模型进行分词,得到与业务操作轨迹日志对应的分词结果;
    关键词组合获取单元,用于通过词频-逆文本频率指数模型,抽取所述分词结果中位于预设的第一排名值之前的关键词,组成关键词组合以作为业务操作轨迹日志对应的用户行为字段值。
  9. 根据权利要求6所述的基于用户行为的数据共享装置,其特征在于,所述分发对象获取单元包括:
    转化项获取单元,用于依序获取所述关键词组合中每一关键词;
    转化项解析单元,用于若各关键词在所述关键词转化策略中存在对应的转化项,获取每一关键词对应的转化项中对应的分发对象。
  10. 根据权利要求6所述的基于用户行为的数据共享装置,其特征在于,还包括:
    数据表写入单元,用于创建与所述分发对象一一对应的数据表,将所述用户业务数据写入与所述分发对象一一对应的数据表。
  11. 一种计算机设备,包括存储器、处理器以及存储在所述存储器中并可在所述处理器上运行的计算机可读指令,其特征在于,所述处理器执行所述计算机可读指令时实现如下步骤:
    接收用户业务数据,对所述用户业务数据进行解析,得到解析数据;
    获取所述解析数据中的用户行为字段值和共享控制字段值;
    若所述共享控制字段值为表示允许共享的数值,获取所述用户行为字段值,并获取所述用户行为字段值对应的关键词组合;
    获取关键词组合中的各关键词,根据预设的关键词转化策略,获取与所述关键词组合中每一关键词对应的分发对象;以及
    将所述解析数据对应的用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象。
  12. 根据权利要求11所述的计算机设备,其特征在于,所述处理器执行所述计算机可读指令时还实现如下步骤:
    识别所述用户业务数据中用于标识用户身份识别的第一字段、用于表示用户行为的第二字段、用于共享控制的第三字段;
    获取所述第一字段对应的第一取值、获取所述第二字段对应的第二取值、及获取所述第三字段对应的第三取值,由所述第一取值、第二取值及第三取值组成解析数据。
  13. 根据权利要求12所述的计算机设备,其特征在于,所述处理器执行所述计算机可读指令时还实现如下步骤:
    获取与所述第二字段对应的业务操作轨迹日志,将所述业务操作轨迹日志通过基于概率统计分词模型进行分词,得到与业务操作轨迹日志对应的分词结果;
    通过词频-逆文本频率指数模型,抽取所述分词结果中位于预设的第一排名值之前的关键词,组成关键词组合以作为业务操作轨迹日志对应的用户行为字段值。
  14. 根据权利要求11所述的计算机设备,其特征在于,所述处理器执行所述计算机可读指令时还实现如下步骤:
    依序获取所述关键词组合中每一关键词;
    若各关键词在所述关键词转化策略中存在对应的转化项,获取每一关键词对应的转化项中对应的分发对象。
  15. 根据权利要求11所述的计算机设备,其特征在于,所述处理器执行所述计算机可读指令时还实现如下步骤:
    创建与所述分发对象一一对应的数据表,将所述用户业务数据写入与所述分发对象一一对应的数据表。
  16. 一种计算机可读存储介质,所述计算机可读存储介质存储有计算机可读指令,其特征在于,所述计算机可读指令被处理器执行时实现如下步骤:
    接收用户业务数据,对所述用户业务数据进行解析,得到解析数据;
    获取所述解析数据中的用户行为字段值和共享控制字段值;
    若所述共享控制字段值为表示允许共享的数值,获取所述用户行为字段值,并获取所述用户行为字段值对应的关键词组合;
    获取关键词组合中的各关键词,根据预设的关键词转化策略,获取与所述关键词组合中每一关键词对应的分发对象;以及
    将所述解析数据对应的用户业务数据发送至与所述关键词组合中每一关键词对应的分发对象。
  17. 根据权利要求16所述的计算机可读存储介质,其特征在于,所述计算机可读指令被处理器执行时还实现如下步骤:
    识别所述用户业务数据中用于标识用户身份识别的第一字段、用于表示用户行为的第二字段、用于共享控制的第三字段;
    获取所述第一字段对应的第一取值、获取所述第二字段对应的第二取值、及获取所述第三字段对应的第三取值,由所述第一取值、第二取值及第三取值组成解析数据。
  18. 根据权利要求17所述的计算机可读存储介质,其特征在于,所述计算机可读指令被处理器执行时还实现如下步骤:
    获取与所述第二字段对应的业务操作轨迹日志,将所述业务操作轨迹日志通过基于概率统计分词模型进行分词,得到与业务操作轨迹日志对应的分词结果;
    通过词频-逆文本频率指数模型,抽取所述分词结果中位于预设的第一排名值之前的关键词,组成关键词组合以作为业务操作轨迹日志对应的用户行为字段值。
  19. 根据权利要求16所述的计算机可读存储介质,其特征在于,所述 计算机可读指令被处理器执行时还实现如下步骤:
    依序获取所述关键词组合中每一关键词;
    若各关键词在所述关键词转化策略中存在对应的转化项,获取每一关键词对应的转化项中对应的分发对象。
  20. 根据权利要求16所述的计算机可读存储介质,其特征在于,所述计算机可读指令被处理器执行时还实现如下步骤:
    创建与所述分发对象一一对应的数据表,将所述用户业务数据写入与所述分发对象一一对应的数据表。
PCT/CN2019/121700 2019-05-23 2019-11-28 基于用户行为的数据共享方法、装置及计算机设备 WO2020233067A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910433478.6 2019-05-23
CN201910433478.6A CN110287255A (zh) 2019-05-23 2019-05-23 基于用户行为的数据共享方法、装置及计算机设备

Publications (1)

Publication Number Publication Date
WO2020233067A1 true WO2020233067A1 (zh) 2020-11-26

Family

ID=68002311

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/121700 WO2020233067A1 (zh) 2019-05-23 2019-11-28 基于用户行为的数据共享方法、装置及计算机设备

Country Status (2)

Country Link
CN (1) CN110287255A (zh)
WO (1) WO2020233067A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110287255A (zh) * 2019-05-23 2019-09-27 深圳壹账通智能科技有限公司 基于用户行为的数据共享方法、装置及计算机设备
CN110908575B (zh) * 2019-12-05 2021-05-04 上海斑马来拉物流科技有限公司 数据处理方法、计算机存储介质及电子设备
CN113609427B (zh) * 2021-08-06 2023-09-08 山东鸿业信息科技有限公司 一种无接口情况下的系统数据资源提取方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100131898A1 (en) * 2008-11-25 2010-05-27 Hiraiwa Kenichiro History display apparatus, history display system, history display method, and program
CN102831253A (zh) * 2012-09-25 2012-12-19 北京科东电力控制系统有限责任公司 一种分布式全文检索系统
CN108171075A (zh) * 2017-12-14 2018-06-15 北京金风科创风电设备有限公司 一种数据查询权限管理、查询方法及装置
CN109600349A (zh) * 2018-07-27 2019-04-09 北京字节跳动网络技术有限公司 一种业务数据的共享实现方法、装置、设备和介质
CN110287255A (zh) * 2019-05-23 2019-09-27 深圳壹账通智能科技有限公司 基于用户行为的数据共享方法、装置及计算机设备

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090019103A1 (en) * 2007-07-11 2009-01-15 James Joseph Tommaney Method and system for processing a database query
JP2011154648A (ja) * 2010-01-28 2011-08-11 Kddi Corp 共用対象物に対する予約管理装置、システム、プログラム及び方法
CN101916291B (zh) * 2010-08-26 2012-05-02 北京大学 一种eDonkey网络共享文件及客户端信息爬取方法
CN102694826B (zh) * 2011-03-22 2018-09-07 百度在线网络技术(北京)有限公司 一种用于获取与现实场景相关的共享对象的设备和方法
AU2011226957A1 (en) * 2011-09-29 2013-04-18 Skaffold Pty Limited Systems and methods for providing share assessment data with plain language interpretation
CN105407076A (zh) * 2014-09-15 2016-03-16 上海天脉聚源文化传媒有限公司 一种媒体桥实现方法及系统
CN105786950A (zh) * 2015-12-30 2016-07-20 北京锐安科技有限公司 一种处理数据的方法及装置
CN107357791B (zh) * 2016-05-10 2021-10-15 中兴通讯股份有限公司 一种数据共享方法及装置
KR101918358B1 (ko) * 2016-11-23 2018-11-13 김종우 맞춤형 정보를 제공하는 데이터 센터 시스템
CN108733706B (zh) * 2017-04-20 2022-12-20 腾讯科技(深圳)有限公司 热度信息的生成方法和装置
CN107871198A (zh) * 2017-06-22 2018-04-03 好家联电子科技(上海)有限公司 一种家政员和业务共享的智能化家政服务平台
CN107623714B (zh) * 2017-07-28 2018-08-03 平安科技(深圳)有限公司 数据共享方法、装置及计算机可读存储介质
CN108241732B (zh) * 2017-10-23 2021-08-24 深圳壹账通智能科技有限公司 电子装置、信息处理的方法及存储介质
CN108595614A (zh) * 2018-04-20 2018-09-28 成都智信电子技术有限公司 应用于his系统的数据表映射方法
CN109087191A (zh) * 2018-06-21 2018-12-25 深圳壹账通智能科技有限公司 银行客户资源共享方法、装置、服务器及系统
CN108876310A (zh) * 2018-07-11 2018-11-23 国云科技股份有限公司 用于业务数据按需获取按需收费的数据共享交换系统及方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100131898A1 (en) * 2008-11-25 2010-05-27 Hiraiwa Kenichiro History display apparatus, history display system, history display method, and program
CN102831253A (zh) * 2012-09-25 2012-12-19 北京科东电力控制系统有限责任公司 一种分布式全文检索系统
CN108171075A (zh) * 2017-12-14 2018-06-15 北京金风科创风电设备有限公司 一种数据查询权限管理、查询方法及装置
CN109600349A (zh) * 2018-07-27 2019-04-09 北京字节跳动网络技术有限公司 一种业务数据的共享实现方法、装置、设备和介质
CN110287255A (zh) * 2019-05-23 2019-09-27 深圳壹账通智能科技有限公司 基于用户行为的数据共享方法、装置及计算机设备

Also Published As

Publication number Publication date
CN110287255A (zh) 2019-09-27

Similar Documents

Publication Publication Date Title
US10592386B2 (en) Fully automated machine learning system which generates and optimizes solutions given a dataset and a desired outcome
WO2020057022A1 (zh) 关联推荐方法、装置、计算机设备和存储介质
EP3591586A1 (en) Data model generation using generative adversarial networks and fully automated machine learning system which generates and optimizes solutions given a dataset and a desired outcome
US10002196B2 (en) Systems and methods for paragraph-based document searching
WO2020233067A1 (zh) 基于用户行为的数据共享方法、装置及计算机设备
US20200057958A1 (en) Identification and application of hyperparameters for machine learning
US11956272B2 (en) Identifying legitimate websites to remove false positives from domain discovery analysis
CN109783631B (zh) 社区问答数据的校验方法、装置、计算机设备和存储介质
US10637826B1 (en) Policy compliance verification using semantic distance and nearest neighbor search of labeled content
US20150356091A1 (en) Method and system for identifying microblog user identity
WO2019071959A1 (zh) 增加渠道方法、应用服务器及计算机可读存储介质
US20170220906A1 (en) Label consistency for image analysis
US20180210897A1 (en) Model generation method, word weighting method, device, apparatus, and computer storage medium
US11120143B2 (en) Data analysis server, data analysis system, and data analysis method
WO2019041528A1 (zh) 新闻情感方向判断方法、电子设备及计算机可读存储介质
KR20160071746A (ko) 규칙 기반 로그 데이터 그룹화를 이용한 개인 맞춤형 로그 분석 시스템 및 그 방법
US10559223B2 (en) Food description processing methods and apparatuses
CN111241821B (zh) 确定用户的行为特征的方法和装置
CN110728585A (zh) 核保方法、装置、设备及存储介质
US20200258093A1 (en) Compliance standards mapping
CN115269765A (zh) 账号识别方法、装置、电子设备和存储介质
CN111782967B (zh) 信息处理方法、装置、电子设备和计算机可读存储介质
CN114254112A (zh) 用于敏感信息预分类的方法、系统、装置和介质
CN115051859A (zh) 情报分析方法、情报分析装置、电子设备及介质
CN114218462A (zh) 基于lstm的数据分类方法、装置、设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19929787

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 25/01/2021)

122 Ep: pct application non-entry in european phase

Ref document number: 19929787

Country of ref document: EP

Kind code of ref document: A1