Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for processing application access data

A technology for application access and user equipment, applied in the computer field, can solve the problem of no effective identification method, and achieve the effect of improving and perfecting the application effect and good maintenance.

Active Publication Date: 2020-04-17
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, existing user identification schemes mainly rely on user browser information, such as classifying users based on the cookie information of the user browser, and for user identification corresponding to mobile applications, such as the identification of true and false users of mobile applications, due to There is no reliable user browser behavior, so there is no corresponding effective identification method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for processing application access data
  • A method and device for processing application access data
  • A method and device for processing application access data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0033] In a typical configuration of the present application, the terminal, the device serving the network and the trusted party all include one or more processors (CPUs), input / output interfaces, network interfaces and memory.

[0034] Memory may include non-permanent storage in computer-readable media, in the form of random access memory (RAM) and / or nonvolatile memory, such as read-only memory (ROM) or flash memory (flashRAM). Memory is an example of computer readable media.

[0035] Computer-readable media, including both permanent and non-permanent, removable and non-removable media, can be implemented by any method or technology for storage of information. Information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method and device for processing application access data. The method comprises: acquiring application access data related to a target application in a corresponding user equipment (S501); and processing the application access data on the basis of corresponding event description information to determine event characteristic information of an application access event related to the target application (S502). A network device processes, on the basis of the corresponding event description information, the acquired application access data of the target application in the user equipment to determine the event characteristic information of the application access event of the target application, thereby enabling a targeted acquisition and statistical analysis of the application access data consistent with the event description on the basis of the customized event description information, thus providing an advantageous data basis for the subsequent information processing and application.

Description

technical field [0001] The present application relates to the field of computers, and in particular to a technology for processing application access data. Background technique [0002] In Internet scenarios, it is often desirable to accurately classify target users based on certain purposes. For example, to classify website visitors based on various dimensions, which may include user preferences, user identities, etc. Such information can then be processed and analyzed accordingly based on the segmentation results, such as providing differentiated services for target users. For example, real users and fake users of the website are identified based on the information corresponding to the user's web browsing behavior. However, existing user identification schemes mainly rely on user browser information, such as classifying users based on the cookie information of the user browser, and for user identification corresponding to mobile applications, such as the identification of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/958
CPCG06F16/972G06F16/00
Inventor 贾宇
Owner ALIBABA GRP HLDG LTD