Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for deduplication of cookie access

A technology for configuring information and fields, applied in the computer field, can solve problems such as unsatisfactory effect, low processing efficiency, and many invalid data, and achieve ideal and efficient deduplication effect.

Active Publication Date: 2019-08-13
RUN TECH CO LTD BEIJING
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, when deduplicating the accessed cookies, the method of comparing the fields in the cookie one by one is mainly adopted, because only some key fields of cookies in different sessions are consistent, and the key fields of cookies in different websites It may be different, which leads to more invalid data in this processing method, low processing efficiency, and unsatisfactory effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for deduplication of cookie access
  • Method and device for deduplication of cookie access
  • Method and device for deduplication of cookie access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] figure 1 This is a flowchart of the cookie access deduplication method provided in the first embodiment of the present invention. This embodiment can be applied to a scenario where a website collects statistics on user access. The method can be executed by a computing device such as a server, and specifically includes the following steps:

[0043] Step 101: Read configuration information, and construct a mapping linked list K according to the configuration information.

[0044] Among them, the configuration information is used to configure the attributes of the web application. Exemplarily, the configuration information may be an xml configuration file, which may include the following content: environmental parameter initialization, servlet configuration, filter configuration, listener configuration, JNDI configuration, session configuration, JSP web page related configuration, MIME TYPE configuration, welcome file Checklist and error handling, etc. Among them, the mapping ...

Embodiment 2

[0055] figure 2 This is a flowchart of the cookie access deduplication method provided in the second embodiment of the present invention. Based on the first embodiment, this embodiment provides a specific method for deduplication based on the node N and the mapping list K, which specifically includes as follows:

[0056] Step 201: Read configuration information, and construct a mapping linked list K according to the configuration information.

[0057] Step 202: Grab the network card data packet, and parse the cookie field in the network card data packet.

[0058] Step 203: Filter the cookie field based on the configuration information, and generate a node N.

[0059] Step 204: Determine whether the node in the mapping linked list K has the value in the node N, if it exists, execute step 205, otherwise execute step 206.

[0060] Step 205: Compare the timestamp of the node N with the timestamp of the node in the mapping list K to delete the expired node in the mapping list K. Among the...

Embodiment 3

[0065] image 3 Shown is a flowchart of cookie access deduplication provided in the third embodiment of the present invention. Based on the above embodiments, this embodiment provides a specific method for filtering cookie fields through configuration information, which specifically includes as follows:

[0066] Step 301: Read configuration information, and construct a mapping linked list K according to the configuration information.

[0067] Step 302: Grab the network card data packet, and parse the cookie field in the network card data packet.

[0068] Step 303: Split the cookie field into key-value fields, filter the cookie field according to the preset cookie key field in the configuration information, save the filtering result in the memory, and generate node N .

[0069] Among them, the key-value field is the key-value field, key represents the primary key, and value is the value corresponding to the primary key. In this step, after the cookie field is parsed in step 302, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a cookie access de-emphasis method and apparatus. The method comprises the following steps: reading the configuration information; constructing the mapping list K according to the configuration information; grabbing the network card data packets and analyzing the cookie fields in the network card packets; filtering the cookie fields based on the configuration information; generating a node N; and deleting the expired node in the mapping list K according to the node N and the mapping list K. The technical schemes of the invention can conduct cookie data filtering in the process of data packet transmission, which greatly increases the comparison fields in the cookie access de-duplication and reduces the utilization rate of internal memory.

Description

Technical field [0001] The embodiments of the present invention relate to computer technology, in particular to a method and device for deduplication of cookie access. Background technique [0002] Cookie refers to the data stored on the user's local terminal by the website in order to identify the user. Usually, a cookie is saved by a Web site on the user's browser, and it contains information about the user. The Web site can access the cookie information whenever the user links to the server through the client's browser. [0003] When a web site needs to perform traffic analysis and statistics, it is necessary to de-duplicate cookie visits, so as to prevent the same user from visiting the site multiple times and being mistakenly counted as different users, resulting in inaccurate statistical results. In the prior art, when deduplicating the accessed cookie, the method of comparing the fields in the cookie one by one is mainly used. Because only some key fields of the cookie in d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L67/02H04L67/30H04L69/22
Inventor 尧津来
Owner RUN TECH CO LTD BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products