Information processing method and apparatus
An information processing method and a technology for classifying information, applied in the field of information processing methods and devices, can solve problems such as effective coverage, difficult software, and inability to fundamentally reflect users or software.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0085] figure 1 A schematic diagram of the implementation flow of the information processing method provided by the present invention, such as figure 1 As shown, the information processing method mainly includes the following steps:
[0086] Step 101: Collect webpage access logs from the online behavior auditing devices at N sampling points; wherein, N is a positive integer.
[0087] In this embodiment, the online behavior auditing device in step 101 and step 103 can obtain the user's webpage access log by auditing the user's online traffic.
[0088] Step 102: Classify and analyze the domain names of the web page access logs according to a first predetermined period, and generate domain name classification information.
[0089] Preferably, the classifying and analyzing the domain names of the webpage access logs according to the first predetermined period to generate domain name classification information may include:
[0090] For all logs accessing the same domain name,
...
Embodiment 2
[0133] figure 2 A schematic diagram of the implementation flow for classifying and analyzing the domain names of the collected webpage access logs provided by the present invention, as shown in figure 2 As shown, the process mainly includes the following steps:
[0134] Step 201: For all logs that access the same domain name, check whether the number of logs exceeds the first threshold, if it does not exceed the first threshold, it means that the sample is insufficient, and exit the analysis; if it exceeds the first threshold, execute step 202;
[0135] Step 202: check whether the number of users initiating access in the log exceeds the second threshold, if it does not exceed the second threshold, it means that the sample is insufficient, and exit the analysis; if it exceeds the second threshold, execute step 203;
[0136] Step 203: Filter the log of the abnormal topic; then execute step 204;
[0137] Specifically, it is checked whether the subject field of each log contai...
Embodiment 3
[0152] image 3 A schematic diagram of the implementation process for analyzing the webpage access log from the first user's Internet behavior auditing device based on domain name classification information provided by the present invention, as shown in image 3 As shown, the process mainly includes the following steps:
[0153] Step 301: Based on the domain name classification information, analyze the domain names of the web page access logs from the first user's online behavior auditing device, and divide the web page access logs into access to content domain names and access to resource domain names;
[0154] Here, it should be noted that if the domain name of the webpage access log from the first user's online behavior auditing device is not within the range of the domain name classification information obtained in step 102, the log is marked as an access to the content domain name.
[0155] Step 302: Analyzing the subject information of the log of accessing the content-t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 