User identity mapping method and user identity mapping device based on operator gateway log

A technology of user identification and operator network, applied in the field of network communication

Active Publication Date: 2017-05-10
CHINA MOBILE COMM GRP CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem that the scope of use of the operator’s data is limited and it is difficult to provide external services due to the inconsistent user identification provided by the operator and the external system platform, and to effectively solve the problem that user privacy is easily leaked, the present invention Provided are a method and device for user identification mapping based on operator gateway logs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identity mapping method and user identity mapping device based on operator gateway log
  • User identity mapping method and user identity mapping device based on operator gateway log
  • User identity mapping method and user identity mapping device based on operator gateway log

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0030] Such as figure 1 As shown, it is a flow chart of the steps of the method for user identification mapping based on operator gateway logs in the first embodiment of the present invention, including the following steps:

[0031] Step 101, receiving a service request sent by the second system platform when the user accesses the second system platform.

[0032]Specifically, when a user accesses the second system platform, the second system platform sends a service request to the first system platform, wherein the service request includes at least the first user ID corresponding to the user and the second system platform and the user's access to the second system platform. First visit information of the platform. In this step, the first system platform receives the service request sent by the second system platform. Optionally, the first system platform may be an operator system platform, and the second system platform is an external system platform interfaced with the oper...

no. 2 example

[0039] Such as figure 2 As shown, it is a flow chart of the steps of the method for user identification mapping based on operator gateway logs in the second embodiment of the present invention, including the following steps:

[0040] Step 201: Receive a service request sent by the second system platform when the user accesses the second system platform, and then enter step 202 or step 203.

[0041] In this step, the first system platform enters step 202 or step 203 after receiving the service request sent by the second system platform. Wherein, the service request includes at least the first user identification corresponding to the user and the second system platform and the first access information for the user to access the second system platform. Specifically, the first access information includes: one or more of the user's access time, the Uniform Resource Locator URL or IP address of the user's access, the user's IP address or location information, the browser used by t...

no. 3 example

[0063] Such as Figure 4 As shown, it is a structural block diagram of the device for user identification mapping based on operator gateway logs in the third embodiment of the present invention, and the device includes:

[0064] The receiving module 301 is configured to receive a service request sent by the second system platform when the user accesses the second system platform, and the service request at least includes: the first user identification corresponding to the user and the second system platform and the user's access to the second system platform first visit information;

[0065] Obtaining module 302, the user determines the second user identifier corresponding to the user and the first system platform according to the first user identifier or the first access information;

[0066] In the processing module 303, the user obtains the user data corresponding to the second user ID from the user database according to the second user ID, and returns the user data to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a user identity mapping method and a user identity mapping device based on an operator gateway log. The method comprises the following steps: receiving a service request sent by a second system platform when a user accesses the second system platform, wherein the service request at least includes a first user identity of the user corresponding to the second system platform and first access information of the user's access to the second system platform; determining a second user identity corresponding to a first system platform according to the first user identity or the first access information; and getting user data of the user corresponding to the second user identity according to the second user identity, and returning the user data to the second system platform. The problem that the data of an operator system platform has a limited range of use and can be hardly used for external service as the operator system platform and an external system platform provide inconsistent user identity is solved, and the problem that user privacy is easy to leak is solved effectively.

Description

technical field [0001] The present invention relates to the technical field of network communication, in particular to a method and device for mapping user identifiers based on operator gateway logs. Background technique [0002] Operators use their gateway devices to collect a large amount of user online behavior data. Operators can analyze user behavior and put some labels on users by combining user online behavior data and other communication behavior data for various purposes such as marketing or advertising. In the actual marketing process, operators often need to interface with external system platforms. For example, in the bidding advertising system, if the operator acts as the Internet advertising demand-side platform DSP role, when the user accesses an external media, the trading platform will give a user ID of its own and request the operator DSP to make a quotation, then Operators need to match the user identification with their own user behavior in order to del...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08G06F17/30
CPCG06F16/955H04L63/10H04L67/146
Inventor 胡可云
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products