User identification method and device

A user identification and user identification technology, applied in the network field, can solve problems such as inability to accurately identify users, achieve the effects of reducing information interaction costs and information interaction volume, accurately identifying users, and improving access experience

Inactive Publication Date: 2013-04-17
BEIJING IZP NETWORK TECH CO LTD
View PDF9 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The present invention provides a user identification method and device to solve the problem that existing solutions cannot accurately identify users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification method and device
  • User identification method and device
  • User identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] refer to figure 1 , shows a flow chart of steps of a user identification method according to Embodiment 1 of the present invention.

[0031] The user identification method in this embodiment includes the following steps:

[0032] Step S102: Obtain from the network access log messages the messages in which the user IDs are the same within a set period of time, and the user IDs correspond to the website cookies of the set website one by one.

[0033] Wherein, the set time period can be appropriately set by those skilled in the art according to the actual situation, such as one day or several hours or several days, which is not limited in the present invention. It is set that websites are usually visited by a large number of users and those websites whose COOKIE field can identify the user's identity can be obtained through statistical analysis methods, such as Baidu, Google, Taobao, etc. These websites have well-known and unique COOKIE , it can be determined whether the...

Embodiment 2

[0045] refer to figure 2 , shows a flow chart of steps of a user identification method according to Embodiment 2 of the present invention.

[0046] The user identification method in this embodiment includes the following steps:

[0047] Step S202: The server obtains from the network access log messages the messages in which the user IDs are the same within a set period of time, and the user IDs correspond to the website cookies of the set website one-to-one.

[0048] In this embodiment, the user identifier includes a user account and a browser version number. User accounts include but are not limited to Internet accounts such as ADSL accounts or ADSL accounts + UA, user mailboxes, and so on.

[0049] Taking a user ID as an example, assuming that the user ID is ADSL1+UA1, the server obtains all packets whose user ID is ADSL1+UA1 from network access log messages. Of course, the user account is not limited to the ADSL account, and other user accounts are also applicable.

[...

Embodiment 3

[0065] refer to image 3 , shows a flow chart of steps of a user identification method according to Embodiment 3 of the present invention.

[0066] The user identification method in this embodiment includes the following steps:

[0067] Step S302: Obtain the COOKIE field that can uniquely identify the user identity of the website.

[0068]The cookie information contains a large number of unmarked cookie field information, such as: YYID=D4A741CDC23704C21D8E99150E94F9C4; SUID=96F7B43C26420A0A4EA94973000407AE, etc. These fields can be used as identity information. Through this step, these fields can be automatically parsed from the cookie, and then it can be determined which cookie fields in each website can uniquely identify the user.

[0069] This step specifically includes:

[0070] Step S3022: Obtain a day's original ptu logs (logs that generate messages), and mark the ADSL ID of each log (log) through the online and offline information.

[0071] Step S3024: Select all si...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user identification method and device, wherein the user identification method comprises the steps of: selecting messages from network access log messages, wherein the messages are same with a user identification within a set time period and are in one-to-one correspondence to website COOKIEs of a set website; obtaining tetrad information from the obtained messages, wherein the tetrad information comprises domain names of user access websites indicated by the user identification, the user identification, COOKIE fields of the user access websites, and values of the COOKITE fields; performing statistics on the tetrad information to obtain access information of each user access website; filtering the access information of each user access website to obtain the COOKIE filed of the identification user of each user access website; and establishing the correspondence of the obtained COOKIE field and the user identification, and identifying the user according to the correspondence. According to the invention, the effect of accurately identifying the user is achieved.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a user identification method and device. Background technique [0002] At present, with the application of Internet technology more and more widely, many of people's daily work and entertainment are carried out on the Internet. In many network application scenarios, when a user accesses the network, the server needs to identify the user. The more widely used user identification methods include identification by IP address, identification by ADSL account and identification by COOKIE on the website. [0003] Among them, when identifying users by IP addresses, due to limited IP resources, there are more and more Internet users. Current broadband users generally use dynamic IPs to avoid users from occupying valuable IP resources even when they are not online. One IP address is used by many different users, and users cannot be accurately identified. [0004] When identifying a use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 罗峰黄苏支李娜
Owner BEIJING IZP NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products