CN104951538B - A kind of acquisition methods and device of application message - Google Patents
A kind of acquisition methods and device of application message Download PDFInfo
- Publication number
- CN104951538B CN104951538B CN201510342336.0A CN201510342336A CN104951538B CN 104951538 B CN104951538 B CN 104951538B CN 201510342336 A CN201510342336 A CN 201510342336A CN 104951538 B CN104951538 B CN 104951538B
- Authority
- CN
- China
- Prior art keywords
- application
- candidate
- temporal information
- usage time
- installation source
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Stored Programmes (AREA)
- Information Transfer Between Computers (AREA)
Abstract
An embodiment of the present invention provides a kind of acquisition methods of application message and devices.On the one hand, the embodiment of the present invention obtains the first application newly increased in the terminal and described first using most recently used candidate application before newly increasing, to be applied as second by the historical data and corresponding temporal information according to candidate's application in terminal;To according to the usage time section of the temporal information of the first application described in the terminal and second application, obtain the installation source of first application.Therefore, technical solution provided in an embodiment of the present invention is solving the problems, such as can not to obtain the installation source of the application newly increased in the prior art.
Description
【Technical field】
The present invention relates to the acquisition methods and device of technical field of internet application more particularly to a kind of application message.
【Background technology】
It is popularized with the continuous intelligence and the continuous of development of Mobile Internet technology of terminal, a large amount of application, user occurs
The daily most of the time is all occupied by the various applications in terminal.Currently, application installation source mainly include application shop,
Other application or browser.Required application is done and downloads for example, being searched in application shop;Alternatively, for another example opening
Search dog input method in obtain and be mounted with recommend application, such as sogou browser, then the installation source of sogou browser is to search
Dog input method.
The installation source of application can be used for carrying out data statistics, and then can be carried out to the distribution channel applied at present whole
Body is held, and data support is provided for the operational decisions of application.Therefore, the installation source of the application newly increased in terminal is obtained very
It is necessary to.However, the application in the installation source as other application is very more, it also cannot achieve obtained by technological means at present
The installation source of the application newly increased in terminal.
【Invention content】
In view of this, an embodiment of the present invention provides a kind of acquisition methods of application message and device, it is existing to solve
The problem of installation source of the application newly increased can not be obtained in technology.
The one side of the embodiment of the present invention provides a kind of acquisition methods of application message, including:
According to the historical data and corresponding temporal information of candidate application in terminal, the newly increased in the terminal is obtained
Most recently used candidate applies before one application and first application newly increase, to be applied as second;
According to the usage time section of the temporal information of the first application described in the terminal and second application, obtain
The installation source of first application.
The aspect and any possible implementation manners as described above, it is further provided a kind of realization method, it is described according to end
The historical data and corresponding temporal information of candidate application in end obtain the first application newly increased in the terminal, including:
According to the temporal information, the historical data of the candidate application is ranked up, it is described to obtain ranking results
The historical data of candidate's application includes the delta data using data and candidate application of candidate application;
According to the delta data of the ranking results and the candidate application, obtains the corresponding candidate of the delta data and answer
The candidate application newly increased in, to be applied as described first.
The aspect and any possible implementation manners as described above, it is further provided a kind of realization method, it is described according to institute
The usage time section for stating the temporal information of the first application described in terminal and second application obtains first application
Source is installed, including:
Judge whether the temporal information of first application is located in the usage time section of second application;
If the temporal information of first application is not in the usage time section of second application, and described the
Two applications belong to preset white list, the installation source by second application as first application;The white list packet
Common installation source containing application.
The aspect and any possible implementation manners as described above, it is further provided a kind of realization method, the method is also
Including:
If the temporal information of first application is located in the usage time section of second application, and described first answers
Temporal information is not equal to the boundary value in the usage time section, judges whether second application is installation described first
Using when used plug-in unit;
If second application is not used plug-in unit when installing first application, and second application is not belonging to
Preset blacklist, the installation source by second application as first application.
The aspect and any possible implementation manners as described above, it is further provided a kind of realization method, the method is also
Including:
If used plug-in unit when second application is installs first application, before acquisition second application most
The candidate application closely used, using as third application;
If the third application belongs to the white list, the installation as first application is applied the third
Source.
The aspect and any possible implementation manners as described above, it is further provided a kind of realization method, the method is also
Including:
If the temporal information of first application is equal to the boundary value in the usage time section, second application is obtained
Classification;
If second application belongs to the white list, the installation by second application as first application comes
Source;
If used plug-in unit when second application is installs first application, before obtaining second application
Most recently used candidate applies, using as third application, if the third application belongs to the white list, by the third application
Installation source as first application.
The one side of the embodiment of the present invention provides a kind of acquisition device of application message, including:
Preprocessing module, for the historical data and corresponding temporal information according to candidate application in terminal, described in acquisition
Most recently used candidate applies before the first application and first application newly increased in terminal newly increases, using as the
Two applications;
Data obtaining module, for what is applied according to the temporal information of the first application described in the terminal and described second
Usage time section obtains the installation source of first application.
The aspect and any possible implementation manners as described above, it is further provided a kind of realization method, the pretreatment
Module is specifically used for:
According to the temporal information, the historical data of the candidate application is ranked up, it is described to obtain ranking results
The historical data of candidate's application includes the delta data using data and candidate application of candidate application;
According to the delta data of the ranking results and the candidate application, obtains the corresponding candidate of the delta data and answer
The candidate application newly increased in, to be applied as described first.
The aspect and any possible implementation manners as described above, it is further provided a kind of realization method, described information obtain
Modulus block, is specifically used for:
Judge whether the temporal information of first application is located in the usage time section of second application;
If the temporal information of first application is not in the usage time section of second application, and described the
Two applications belong to preset white list, the installation source by second application as first application;The white list packet
Common installation source containing application.
The aspect and any possible implementation manners as described above, it is further provided a kind of realization method, described information obtain
Modulus block, is additionally operable to:
If the temporal information of first application is located in the usage time section of second application, and described first answers
Temporal information is not equal to the boundary value in the usage time section, judges whether second application is installation described first
Using when used plug-in unit;
If second application is not used plug-in unit when installing first application, and second application is not belonging to
Preset blacklist, the installation source by second application as first application.
The aspect and any possible implementation manners as described above, it is further provided a kind of realization method, described information obtain
Modulus block, is additionally operable to:
If used plug-in unit when second application is installs first application, before acquisition second application most
The candidate application closely used, using as third application;
If the third application belongs to the white list, the installation as first application is applied the third
Source.
The aspect and any possible implementation manners as described above, it is further provided a kind of realization method, described information obtain
Modulus block, is additionally operable to:
If the temporal information of first application is equal to the boundary value in the usage time section, second application is obtained
Classification;
If second application belongs to the white list, the installation by second application as first application comes
Source;
If used plug-in unit when second application is installs first application, before obtaining second application
Most recently used candidate applies, using as third application, if the third application belongs to the white list, by the third application
Installation source as first application.
As can be seen from the above technical solutions, the embodiment of the present invention has the advantages that:
Technical solution provided in an embodiment of the present invention can utilize historical data and the time of candidate application, obtain terminal
In the installation source of application that newly increases, obtain the installation source of application automatically using technological means, the prior art can be solved
In the problem of can not obtaining the installation source of the application newly increased.
【Description of the drawings】
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached
Figure is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this field
For those of ordinary skill, without having to pay creative labor, it can also be obtained according to these attached drawings other attached
Figure.
Fig. 1 is the flow diagram of the acquisition methods for the application message that the embodiment of the present invention is provided;
Fig. 2 is the exemplary plot of the specific implementation process of the acquisition methods for the application message that the embodiment of the present invention is provided;
Fig. 3 is the actual effect exemplary plot of the acquisition methods for the application message that the embodiment of the present invention is provided;
Fig. 4 is the functional block diagram of the acquisition device for the application message that the embodiment of the present invention is provided.
【Specific implementation mode】
For a better understanding of the technical solution of the present invention, being retouched in detail to the embodiment of the present invention below in conjunction with the accompanying drawings
It states.
It will be appreciated that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.Base
Embodiment in the present invention, those of ordinary skill in the art obtained without creative efforts it is all its
Its embodiment, shall fall within the protection scope of the present invention.
The term used in embodiments of the present invention is the purpose only merely for description specific embodiment, is not intended to be limiting
The present invention.In the embodiment of the present invention and "an" of singulative used in the attached claims, " described " and "the"
It is also intended to including most forms, unless context clearly shows that other meanings.
It should be appreciated that term "and/or" used herein is only a kind of incidence relation of description affiliated partner, indicate
There may be three kinds of relationships, for example, A and/or B, can indicate:Individualism A, exists simultaneously A and B, individualism B these three
Situation.In addition, character "/" herein, it is a kind of relationship of "or" to typically represent forward-backward correlation object.
It will be appreciated that though may describe to apply using term first, second etc. in embodiments of the present invention, but these
Using should not necessarily be limited by these terms.These terms, which are only used for apply, to be distinguished from each other out.For example, not departing from the embodiment of the present invention
In the case of range, the first application can also be referred to as the second application, and similarly, the second application can also be referred to as first and answer
With.
Depending on context, word as used in this " if " can be construed to " ... when " or " when ...
When " or " in response to determination " or " in response to detection ".Similarly, depend on context, phrase " if it is determined that " or " if detection
(condition or event of statement) " can be construed to " when determining " or " in response to determination " or " when the detection (condition of statement
Or event) when " or " in response to detection (condition or event of statement) ".
Embodiment one
The embodiment of the present invention provides a kind of acquisition methods of application message, referring to FIG. 1, it is carried by the embodiment of the present invention
The flow diagram of the acquisition methods of the application message of confession, as shown, this approach includes the following steps:
S101 is obtained in the terminal and is increased newly according to the historical data and corresponding temporal information of candidate application in terminal
Most recently used candidate applies before the first application and first application added newly increases, to be applied as second.
S102, according to the usage time area of the temporal information of the first application described in the terminal and second application
Between, obtain the installation source of first application.
It should be noted that terminal involved in the embodiment of the present invention can include but is not limited to personal computer
(Personal Computer, PC), personal digital assistant (Personal Digital Assistant, PDA), wireless handheld
Equipment, tablet computer (Tablet Computer), mobile phone, MP3 player, MP4 players etc..
It should be noted that the executive agent of S101~S102 can be the acquisition device of application message, which can be with
Positioned at server side.
It is understood that the application can be mounted in the application program (nativeApp) in terminal, or may be used also
To be a web page program (webApp) of browser in terminal, the embodiment of the present invention is to this without limiting.
Embodiment two
Acquisition methods based on the application message that above-described embodiment one is provided, the embodiment of the present invention in S101 according to end
The historical data and corresponding temporal information of candidate application in end, obtain the first application newly increased in the terminal, Yi Jisuo
It states most recently used candidate before the first application newly increases to apply, be specifically described in the method as the second application.The step
Suddenly it can specifically include:
For example, in the embodiment of the present invention, according to the historical data of candidate application and corresponding time in the terminal
Information, the method for obtaining the first application newly increased in terminal can include but is not limited to:
First, according to temporal information, the historical data of the candidate application is ranked up, to obtain ranking results, institute
The historical data for stating candidate application includes the delta data using data and candidate application of candidate application.Then, according to described
The delta data of ranking results and the candidate application obtains the candidate newly increased in the corresponding candidate application of delta data and answers
With to be applied as described first.
Referring to FIG. 2, the specific implementation process of the acquisition methods of its application message provided by the embodiment of the present invention
Exemplary plot, as shown, during a concrete implementation, server can be with pre-loaded white list, blacklist and installation
Program (Installer) list.
Preferably, the white list can include the common installation source of application, for example, through the peace frequently as other application
Fill the packet name of the application in source.
Preferably, the Installer lists can include the plugin name in the operating system of terminal, pacify in the terminal
The plug-in unit in the operating system of these terminals can be used when dress application.
Preferably, the blacklist can include the non-installation source of application, for example, non-installation source refers to it not being it
The packet name of the application in the installation source that he applies, such as the communication class application installed in terminal, this kind of application can frequently be made by user
With but not can be as the application in the installation source of other application.In the embodiment of the present invention, need using blacklist to this
A little applications are filtered and differentiate.
During a concrete implementation, the server by utilizing Software Development Kit (Software
Development Kit, SDK) it records the use data (app_trace data) for the candidate application installed in terminal and uses number
According to corresponding temporal information, and when the delta data (app_change data) and corresponding delta data of the candidate application of record
Between information.
It is understood that the opening number that can include but is not limited to candidate application in terminal using data of candidate application
According to close data.Correspondingly, candidate application includes opening candidate application in terminal using the corresponding temporal information of data
At the time of moment and closing candidate's application.
It is understood that the delta data of candidate application can include but is not limited to updating the data, unloading for candidate application
Carry data or installation data.Correspondingly, candidate apply corresponding temporal information to may include the renewable time of candidate application, unload
Carry moment or time of installation.
As shown in Fig. 2, during a concrete implementation, the server can by use the data of candidate's application with
Historical data of the delta data of candidate's application as candidate's application, and further according to temporal information, it is suitable according to time order and function
Sequence is ranked up the historical data of candidate's application, i.e., by candidate's application using data and the delta data of candidate application into
Row ordering by merging, to obtain ranking results.
It should be noted that due to that can include to open candidate to answer in the corresponding temporal information of use data of candidate's application
With at the time of and at the time of closing candidate application, so server is when the historical data to candidate's application is ranked up, for
The use data of candidate's application can be subject at the time of opening candidate applies and be ranked up.
As shown in Fig. 2, during a concrete implementation, the server traverses the ranking results of acquisition,
If the data traversed are the use data of candidate application, continue to traverse in ranking results.If the data traversed are to wait
The delta data for selecting application, then suspend traversal, and obtains the corresponding candidate application of the delta data.Then, according to the variation number
The data for including in judge whether candidate application is the candidate application newly increased;If it is judged that candidate application is new
Candidate application is applied appC, if it is judged that candidate application is not newly-increased by increased candidate application as described first
The candidate application added, then continue to traverse, to obtain the corresponding candidate application of next delta data.
As shown in Fig. 2, during a concrete implementation, when the candidate application for judging currently to traverse is to newly increase
Candidate in application, candidate application then according to the ranking results, is found and come as described first using appC
A candidate application before the first application appC, candidate application be described first newly increased using appC before it is nearest
The candidate application used will come a candidate application before the first application appC as the in the embodiment of the present invention
Two apply appB.
Embodiment three
Acquisition methods and embodiment two based on the application message that above-described embodiment one is provided, the embodiment of the present invention pair
According to the usage time section of the temporal information of the first application described in the terminal and second application in S102, institute is obtained
The method for stating the installation source of the first application is specifically described.The step can specifically include:
For example, in the embodiment of the present invention, the server is believed according to the time of the first application described in the terminal
The usage time section of breath and second application, the method for obtaining the installation source of first application may include but unlimited
In:
First, it is determined that whether the temporal information of the first application appC is located at the usage time of the second application appB
In section;Then, if judging, the temporal information of the first application appC is not at the use of the second application appB
In time interval, and described second belongs to preset white list using appB, using the second application appB as described first
Using the installation source of appC.
As shown in Fig. 2, during a concrete implementation, according to the temporal information of the first application appC and described
Second application appB usage time section, with it is described first application appC the variation moment, such as renewable time, unloading the moment and
Time of installation, subtract second application uses the moment, as described in closing at the time of the second application appB, to obtain the time difference
Value;If the difference is more than 0, after indicating that the variation moment of the first application appC is located at the time of closing the second application appB, then
Judge that the temporal information of the first application appC is not in the usage time section of the second application appB.
As shown in Fig. 2, during a concrete implementation, when judging that the temporal information of the first application appC do not have
When having in the usage time section of the second application appB, according to pre-loaded white list, judge that described second answers
Whether belong to the white list with appB.If described second belongs to the white list using appB, described second is applied
Installation sources of the appB as the first application appC.Conversely, if described second is not belonging to the white list using appB,
The server continues to traverse according to the ranking results, to obtain the corresponding candidate application of next delta data.
It should be noted that if at the time of the variation moment of the first application appC is with the second application appB is closed
Difference be more than 0, indicate that the second application of operation appB is followed by operated to first using appC, the second application may be
The installation source of first application appC.Then, applying whether appB is the first peace for applying appC using white list pair second
Dress source is confirmed, if second belongs to white list using appB, that is, is belonged to common installation source, then can be determined that second answers
It is the installation source of the first application appC with appB.
Further, if closing second application as shown in Fig. 2, being subtracted with the variation moment of the first application appC
At the time of appB, to obtain time difference, which is less than 0, illustrates that the temporal information of the first application appC is located at
In the usage time section of the second application appB, and the temporal information of first application is not equal to the usage time area
Between boundary value continue to judge whether the second application appB is installation institute then according to pre-loaded Installer lists
State used plug-in unit when the first application appC.
As shown in Fig. 2, during a concrete implementation, if judging, described second is not belonging to using appB
Installer lists, it is determined that the second application appB is not used plug-in unit when installing the first application appC, so
First judge whether described second belong to preset blacklist using appB afterwards, if described second belongs to preset black name using appB
It is single, then continue to traverse the ranking results, to obtain the corresponding candidate application of next delta data.If conversely, described second
It is not belonging to preset blacklist using appB, then is come the second application appB as the installation of the first application appC
Source.
As shown in Fig. 2, further, if judging, described second belongs to Installer lists using appB, it is determined that institute
It is used plug-in unit when installing the first application appC to state the second application appB;Then, according to ranking results, described in acquisition
Most recently used candidate applies before second application appB, using as third application appA.Finally, judge the third application
Whether appA belongs to the white list, if the third application appA belongs to the white list, the third application appA is made
For the installation source of the first application appC.If conversely, the third application appA is not belonging to the white list, continuation time
The ranking results are gone through, to obtain the corresponding candidate application of next delta data.
As shown in Fig. 2, during a concrete implementation, institute is closed if being subtracted with the variation moment of first application
At the time of stating the second application, to obtain time difference, which is equal to 0, indicates the temporal information etc. of first application
Boundary value in the usage time section then obtains the classification of the second application appB.
Wherein, if described second belongs to the white list using appB, described second appB will be applied as described the
The installation source of one application appC.
Alternatively, if described second belongs to Installer lists using appB, according to ranking results, described second is obtained
It is applied using most recently used candidate before appB, using as third application appA.Finally, judging the third application appA is
It is no to belong to the white list, if the third application appA belongs to the white list, using the third application appA as described in
The installation source of first application appC.If conversely, the third application appA is not belonging to the white list, continue described in traversal
Ranking results, to obtain the corresponding candidate application of next delta data.
Alternatively, if described second is both not belonging to white list using appB, Installer lists are also not belonging to, then continuation time
The ranking results are gone through, to obtain the corresponding candidate application of next delta data.
It is understood that after the above-mentioned technical proposal that the embodiment of the present invention is provided is disposed in related platform, obtain
Application installation source accuracy rate it is relatively high.Referring to FIG. 3, its application message provided by the embodiment of the present invention obtains
The actual effect exemplary plot of method is taken, as shown, when installation source of the search dog input method as other application, there are in figure 8 sections
Application of the new increment 50 or more, and this 8 sections applications are popular application of the search dog input method in the interior recommendation of application really.
The embodiment of the present invention, which further provides, realizes the device embodiment of each step and method in above method embodiment.
Referring to FIG. 4, the functional block diagram of the acquisition device of its application message provided by the embodiment of the present invention.Such as figure
Shown, which includes:
Preprocessing module 40 obtains institute for the historical data and corresponding temporal information according to candidate application in terminal
State newly increased in terminal first application and it is described first application newly increase before most recently used candidate apply, using as
Second application;
Data obtaining module 41, for according to the temporal information of the first application described in the terminal and second application
Usage time section, obtain it is described first application installation source.
Preferably, the preprocessing module 40, is specifically used for:
According to the temporal information, the historical data of the candidate application is ranked up, it is described to obtain ranking results
The historical data of candidate's application includes the delta data using data and candidate application of candidate application;
According to the delta data of the ranking results and the candidate application, obtains the corresponding candidate of the delta data and answer
The candidate application newly increased in, to be applied as described first.
Preferably, described information acquisition module 41, is specifically used for:
Judge whether the temporal information of first application is located in the usage time section of second application;
If the temporal information of first application is not in the usage time section of second application, and described the
Two applications belong to preset white list, the installation source by second application as first application;The white list packet
Common installation source containing application.
Further, described information acquisition module 41, is additionally operable to:
If the temporal information of first application is located in the usage time section of second application, and described first answers
Temporal information is not equal to the boundary value in the usage time section, judges whether second application is installation described first
Using when used plug-in unit;
If second application is not used plug-in unit when installing first application, and second application is not belonging to
Preset blacklist, the installation source by second application as first application.
Further, described information acquisition module 41, is additionally operable to:
If used plug-in unit when second application is installs first application, before acquisition second application most
The candidate application closely used, using as third application;
If the third application belongs to the white list, the installation as first application is applied the third
Source.
Further, described information acquisition module 41, is additionally operable to:
If the temporal information of first application is equal to the boundary value in the usage time section, second application is obtained
Classification;
If second application belongs to the white list, the installation by second application as first application comes
Source;
If used plug-in unit when second application is installs first application, before obtaining second application
Most recently used candidate applies, using as third application, if the third application belongs to the white list, by the third application
Installation source as first application.
Method shown in FIG. 1 is able to carry out by each unit in this present embodiment, the part that the present embodiment is not described in detail,
It can refer to the related description to Fig. 1.
The technical solution of the embodiment of the present invention has the advantages that:
In the embodiment of the present invention, by the historical data and corresponding temporal information according to candidate application in terminal, obtain
Most recently used candidate applies before the first application and first application newly increased in the terminal newly increases, to make
For the second application;To according to the usage time of the temporal information of the first application described in the terminal and second application
Section obtains the installation source of first application.
Technical solution provided in an embodiment of the present invention can utilize historical data and the time of candidate application, obtain terminal
In the installation source of application that newly increases, obtain the installation source of application automatically using technological means, the prior art can be solved
In the problem of can not obtaining the installation source of the application newly increased.
In addition, in the embodiment of the present invention, application is filtered and is verified in such a way that blacklist and white list are set,
It can ensure the accuracy and reliability in installation source obtained.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided by the present invention, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of division of logic function, formula that in actual implementation, there may be another division manner, for example, multiple units or group
Part can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown
Or the mutual coupling, direct-coupling or communication connection discussed can be by some interfaces, device or unit it is indirect
Coupling or communication connection can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.Above-mentioned integrated list
The form that hardware had both may be used in member is realized, can also be realized in the form of hardware adds SFU software functional unit.
The above-mentioned integrated unit being realized in the form of SFU software functional unit can be stored in one and computer-readable deposit
In storage media.Above-mentioned SFU software functional unit is stored in a storage medium, including some instructions are used so that a computer
It is each that device (can be personal computer, server or network equipment etc.) or processor (Processor) execute the present invention
The part steps of embodiment the method.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (Read-
Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic disc or CD etc. it is various
The medium of program code can be stored.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention
With within principle, any modification, equivalent substitution, improvement and etc. done should be included within the scope of protection of the invention god.
Claims (10)
1. a kind of acquisition methods of application message, which is characterized in that the method includes:
According to the historical data and corresponding temporal information of candidate application in terminal, obtains first newly increased in the terminal and answer
With and it is described first application newly increase before most recently used candidate apply, using as second application;
According to the usage time section of the temporal information of the first application described in the terminal and second application, described in acquisition
The installation source of first application;
The usage time section according to the temporal information of the first application described in the terminal and second application obtains
The installation source of first application, including:
Judge whether the temporal information of first application is located in the usage time section of second application;
If the temporal information of first application is not in the usage time section of second application, and described second answers
With preset white list is belonged to, by described second using the installation source as first application;The white list includes to answer
Common installation source.
2. according to the method described in claim 1, it is characterized in that, described according to the historical data of candidate application in terminal and right
The temporal information answered obtains the first application newly increased in the terminal, including:
According to the temporal information, the historical data of the candidate application is ranked up, to obtain ranking results, the candidate
The historical data of application includes the delta data using data and candidate application of candidate application;
According to the delta data of the ranking results and the candidate application, obtain in the corresponding candidate application of the delta data
The candidate application newly increased, to be applied as described first.
3. according to the method described in claim 1, it is characterized in that, the method further includes:
If the temporal information of first application is located in the usage time section of second application, and first application
Temporal information is not equal to the boundary value in the usage time section, judges whether second application is installation first application
When used plug-in unit;
If second application is not used plug-in unit when installing first application, and second application is not belonging to preset
Blacklist, by it is described second application as it is described first apply installation source.
4. according to the method described in claim 3, it is characterized in that, the method further includes:
If used plug-in unit when second application is installs first application, makes recently before obtaining second application
Candidate's application, using as third application;
If the third application belongs to the white list, the third is applied into the installation source as first application.
5. according to the method described in claim 3, it is characterized in that, the method further includes:
If the temporal information of first application is equal to the boundary value in the usage time section, the class of second application is obtained
Not;
If second application belongs to the white list, the installation source by second application as first application;
If used plug-in unit when second application is installs first application, nearest before obtaining second application
The candidate application used, using as third application, if the third application belongs to the white list, using the third application as
The installation source of first application.
6. a kind of acquisition device of application message, which is characterized in that described device includes:
Preprocessing module obtains the terminal for the historical data and corresponding temporal information according to candidate application in terminal
In newly increase first application and it is described first application newly increase before most recently used candidate apply, to be answered as second
With;
Data obtaining module, for the use according to the temporal information of the first application described in the terminal and second application
Time interval obtains the installation source of first application;
Described information acquisition module, is specifically used for:
Judge whether the temporal information of first application is located in the usage time section of second application;
If the temporal information of first application is not in the usage time section of second application, and described second answers
With preset white list is belonged to, by described second using the installation source as first application;The white list includes to answer
Common installation source.
7. device according to claim 6, which is characterized in that the preprocessing module is specifically used for:
According to the temporal information, the historical data of the candidate application is ranked up, to obtain ranking results, the candidate
The historical data of application includes the delta data using data and candidate application of candidate application;
According to the delta data of the ranking results and the candidate application, obtain in the corresponding candidate application of the delta data
The candidate application newly increased, to be applied as described first.
8. device according to claim 6, which is characterized in that described information acquisition module is additionally operable to:
If the temporal information of first application is located in the usage time section of second application, and first application
Temporal information is not equal to the boundary value in the usage time section, judges whether second application is installation first application
When used plug-in unit;
If second application is not used plug-in unit when installing first application, and second application is not belonging to preset
Blacklist, by it is described second application as it is described first apply installation source.
9. device according to claim 8, which is characterized in that described information acquisition module is additionally operable to:
If used plug-in unit when second application is installs first application, makes recently before obtaining second application
Candidate's application, using as third application;
If the third application belongs to the white list, the third is applied into the installation source as first application.
10. device according to claim 8, which is characterized in that described information acquisition module is additionally operable to:
If the temporal information of first application is equal to the boundary value in the usage time section, the class of second application is obtained
Not;
If second application belongs to the white list, the installation source by second application as first application;
If used plug-in unit when second application is installs first application, nearest before obtaining second application
The candidate application used, using as third application, if the third application belongs to the white list, using the third application as
The installation source of first application.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510342336.0A CN104951538B (en) | 2015-06-18 | 2015-06-18 | A kind of acquisition methods and device of application message |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510342336.0A CN104951538B (en) | 2015-06-18 | 2015-06-18 | A kind of acquisition methods and device of application message |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104951538A CN104951538A (en) | 2015-09-30 |
CN104951538B true CN104951538B (en) | 2018-08-10 |
Family
ID=54166196
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510342336.0A Active CN104951538B (en) | 2015-06-18 | 2015-06-18 | A kind of acquisition methods and device of application message |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104951538B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102830997A (en) * | 2012-08-17 | 2012-12-19 | 北京金山软件有限公司 | Method, device and equipment for controlling plug-in installation |
CN103049692A (en) * | 2012-11-19 | 2013-04-17 | 北京小米科技有限责任公司 | Application installation method, device and facility |
CN103116594A (en) * | 2011-07-08 | 2013-05-22 | 韩国电子通信研究院 | Application execution apparatus, application providing apparatus, and application distribution method using chaining of applications |
CN103455522A (en) * | 2012-06-04 | 2013-12-18 | 北京搜狗科技发展有限公司 | Recommendation method and system of application extension tools |
CN103593434A (en) * | 2013-11-12 | 2014-02-19 | 北京奇虎科技有限公司 | Application recommendation method and device and server equipment |
CN103677866A (en) * | 2012-09-05 | 2014-03-26 | 北京搜狗科技发展有限公司 | Application program extension tool pushing method and system |
-
2015
- 2015-06-18 CN CN201510342336.0A patent/CN104951538B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103116594A (en) * | 2011-07-08 | 2013-05-22 | 韩国电子通信研究院 | Application execution apparatus, application providing apparatus, and application distribution method using chaining of applications |
CN103455522A (en) * | 2012-06-04 | 2013-12-18 | 北京搜狗科技发展有限公司 | Recommendation method and system of application extension tools |
CN102830997A (en) * | 2012-08-17 | 2012-12-19 | 北京金山软件有限公司 | Method, device and equipment for controlling plug-in installation |
CN103677866A (en) * | 2012-09-05 | 2014-03-26 | 北京搜狗科技发展有限公司 | Application program extension tool pushing method and system |
CN103049692A (en) * | 2012-11-19 | 2013-04-17 | 北京小米科技有限责任公司 | Application installation method, device and facility |
CN103593434A (en) * | 2013-11-12 | 2014-02-19 | 北京奇虎科技有限公司 | Application recommendation method and device and server equipment |
Also Published As
Publication number | Publication date |
---|---|
CN104951538A (en) | 2015-09-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104838405B (en) | The method and system of test frame for application program | |
CN108768875A (en) | Gray scale dissemination method, device and the computer readable storage medium of application | |
CN104462277B (en) | Application program installation data statistical method, server and terminal | |
CN104598286B (en) | The Oftware updating method and device of mobile terminal | |
CN107786601B (en) | Information processing method, terminal and server | |
CN105100003A (en) | Method and device for preloading webpage game at client | |
CN105989122A (en) | Application recommendation method and device | |
CN108829444A (en) | A kind of method that background application is automatically closed, terminal and computer storage medium | |
CN111147327A (en) | Network quality evaluation method and device | |
CN110580171A (en) | APP classification method, related device and product | |
KR101979334B1 (en) | Techniques to rate-adjust data usage with a virtual private network | |
CN110929129A (en) | Information detection method, equipment and machine-readable storage medium | |
CN104951538B (en) | A kind of acquisition methods and device of application message | |
CN107154971A (en) | One kind application method for down loading and device | |
KR20130089900A (en) | Method for simultaneously processing advertisement material at internet mobile device | |
CN103634348A (en) | Terminal device and method for releasing information | |
CN110377836A (en) | By block chain from media data personalized recommendation method and its device | |
CN105630503B (en) | A kind of application and development mobile device choosing method based on user operation records | |
EP2871802B1 (en) | Techniques to rate-adjust data usage with a virtual private network | |
CN112181527B (en) | Method and device for processing jump data of small program and server | |
CN111210279B (en) | Target user prediction method and device and electronic equipment | |
CN104899514B (en) | The detection method and system of mobile terminal from malicious behavior based on guidance quality symbol | |
CN111143526B (en) | Method and device for generating and controlling configuration information of counsel service control | |
CN110515687A (en) | Recommendation information methods of exhibiting, device, electronic equipment and medium | |
CN110390053A (en) | Knowledge payment data recommended method and its device based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |