Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for recognizing user access trace

A user and trajectory technology, applied in the Internet field, can solve problems such as the same user ID, increased management costs, and inability to trace historical data, achieving persuasive and accurate statistical results

Inactive Publication Date: 2018-06-01
XIAMEN XINXINTONG TECH
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Under the existing technical means, the associated user ID can only be determined according to the IP address; when wireless networks are popularized in various public places, the same IP address cannot clearly indicate the same user ID
Therefore, it is not possible to accurately identify user access traces
Furthermore, under the existing technical means, the website can also analyze the network log by renting a dedicated third-party statistical server to identify the user's access track, but the third-party statistical server can only keep the network access log for a period of time, and cannot Retrace historical data while increasing management costs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for recognizing user access trace
  • Method and device for recognizing user access trace
  • Method and device for recognizing user access trace

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention will be described in detail below in conjunction with the accompanying drawings and embodiments.

[0019] see figure 1 , is a schematic flowchart of a method for identifying user access traces in an embodiment of the present invention, the method includes:

[0020] Step S10: Obtain the device identifier in the website log file and the IP address associated with the device identifier, and perform md5 verification to obtain the user ID value;

[0021] Wherein, the website log file is the user's log file formed by the web server recording its HTTP log, especially the http_cooki variable when the user accesses the network.

[0022] Taking the nginx server as an example, the settings in the configuration file are as follows:

[0023] log_format super_log`$remote—addr-$server_addr[$time—local]

[0024] $request_method $http—host $request_uri $request_time $status $body bytessent "$http referer" "$http_user_agent" "$http_cookie"';

[0025] Set up in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and device for recognizing user access trace. The method includes: acquiring an equipment identity and an IP address correlated to the equipment identity in a websitelog file, and performing md5 verifying to acquire a user ID value; screening log files according to the user ID value to acquire log files with the same user ID value; inquiring whether each log fileacquired by screening contains a user access identity, excluding the log files not containing the user access identity to determine access log of a same user, and recognizing access trace of the useraccording to the determined log file, wherein the user access identity is automatically generated and stored by a web server when the same user accesses to a network address not for the first time andstored in the log file of the user by the web server when the user accesses to the network address again. By utilizing the method and the device, the access trace of the user can be recognized through the network access log.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and device for identifying user access tracks. Background technique [0002] User behaviors such as video viewing and browsing of specific content by visiting users on video websites will generate log files, in which the user ID and corresponding user behavior and other relevant information are recorded in detail. [0003] Because the user behavior in the log file can reflect the user's hobbies and specific website access habits for specific video files and other content of the website; for this reason, by performing similar calculations on user behaviors corresponding to a large number of user IDs, similar User IDs with higher degrees of accuracy are associated, that is, user IDs are grouped, so that it can be determined that these associated user IDs belong to the same user. Improve the pertinence of video recommendations and advertising. [0004] With the devel...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F17/30
CPCG06F16/95G06F16/9558G06F16/958
Inventor 黄翔
Owner XIAMEN XINXINTONG TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products