Method for automatically acquiring user behavior log of network

An automatic acquisition and network user technology, applied in electrical components, transmission systems, etc., can solve the problems of low scalability and portability of log acquisition, and achieve easy deployment, high portability, and easy preprocessing and data mining. Effect

Inactive Publication Date: 2010-02-17
XI AN JIAOTONG UNIV
View PDF0 Cites 47 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] The purpose of the present invention is to solve the defects of poor scalability and portability in the log acquisition of

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for automatically acquiring user behavior log of network
  • Method for automatically acquiring user behavior log of network
  • Method for automatically acquiring user behavior log of network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] In order to understand the present invention more clearly, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0055] Such as figure 1 As shown, a "proxy server" is added between the client and the Web server, and the user sends a request to the Web server through the client; the proxy server intercepts the request and forwards it to the Web server; the Web server returns an HTTP response to the proxy server; The server processes the HTTP response returned by the Web server, and adds a user behavior log collection module to the HTTP response, and then sends it to the client.

[0056]The present invention adopts C / S mode, considers extensibility, these two characteristics of transplanting, the method for user behavior log acquisition mainly comprises the design of two aspects: the data collection end of user behavior log and the data processing end of user behavior log (such as figure 2 shown). To be describ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for automatically acquiring a user behavior log of a network. The invention is characterized in that a proxy server is added between a client and a Web server; the text of a response returned from the Web server and received by the proxy server for the first time is a user response in an HTML (hypertext markup language) format, that is, an HTTP (hyper text transport protocol) response; and a user behavior log acquisition module is added to the HTTP response and sent to the client, wherein, the user behavior log acquisition module serves as a data acquisition terminal for the user behavior log at the client, whereas the proxy server serves as a data processing terminal for the user behavior log. Based on the intermediate strategy of the 'proxy server', the invention focuses on the key technologies, such as log acquisition of clients, strategy deployment of proxy servers, visual configuration of log acquisition and the like. Compared with the conventionallogging scheme, the invention can better the user association and ensure the good expansibility; and by conveniently and flexibly customizing the user behavior log to be acquired by a target system on a visual UI (user interface), the invention can further provide a data foundation for log mining.

Description

technical field [0001] The invention relates to a network resource acquisition method, in particular to an automatic acquisition method of network user behavior logs. Background technique [0002] With the increasing amount of Web information, people have to spend a lot of time searching and browsing the information they need and are interested in. To solve this problem, automatic recognition of user interests and personalized resource recommendation have become a research hotspot in the field of personalized services. Research in this area has also made remarkable achievements. Most of the personalized service research is based on the log data of user access behavior. The log data of user access behavior provides good data support for research on user interest discovery and resource recommendation in personalized service. These studies are very important. The key premise, but the current research on the log acquisition method of user access behavior is still immature, the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/08H04L29/06
Inventor 吴茜媛郑庆华王庆磊王昊刘均田锋
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products