CN109582873B - Method and device for pushing information - Google Patents

Method and device for pushing information Download PDF

Info

Publication number
CN109582873B
CN109582873B CN201811495121.2A CN201811495121A CN109582873B CN 109582873 B CN109582873 B CN 109582873B CN 201811495121 A CN201811495121 A CN 201811495121A CN 109582873 B CN109582873 B CN 109582873B
Authority
CN
China
Prior art keywords
user
information
user identification
pushed
candidate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811495121.2A
Other languages
Chinese (zh)
Other versions
CN109582873A (en
Inventor
李村
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Douyin Vision Co Ltd
Douyin Vision Beijing Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN201811495121.2A priority Critical patent/CN109582873B/en
Publication of CN109582873A publication Critical patent/CN109582873A/en
Application granted granted Critical
Publication of CN109582873B publication Critical patent/CN109582873B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application discloses a method and a device for pushing information. One embodiment of the method comprises: acquiring information to be pushed and acquiring a candidate user identification set; acquiring an effective user identification set, wherein a user indicated by the effective user identification in the effective user identification set is a user of a target application, and the target application is used for displaying information to be pushed; determining the intersection of the candidate user identification set and the effective user identification set as a target user identification set; and selecting a target user identifier from the target user identifier set, and pushing information to be pushed to a target application installed on a terminal device used by a user indicated by the selected target user identifier. The implementation method can avoid the situation that some users who cannot browse the information to be pushed push the information, so as to avoid the waste of network resources.

Description

Method and device for pushing information
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to a method and a device for pushing information.
Background
With the popularization and development of mobile terminal devices, more and more applications installed on the mobile terminal devices emerge. The services provided by the applications relate to aspects of daily life and provide convenience for the life of the user.
One common functionality provided by various applications is to present various push information to a user using a client of the application installed on the terminal device used by the user. It is possible for the user to provide the user with the required information for only a part of the push information. Therefore, when the server side of various applications pushes information, how to determine a proper target user is required to avoid the problem that information pushing needs to be considered for users who do not need the information to be pushed.
Disclosure of Invention
The embodiment of the application provides a method and a device for pushing information.
In a first aspect, an embodiment of the present application provides a method for pushing information, where the method includes: acquiring information to be pushed and acquiring a candidate user identification set; acquiring an effective user identification set, wherein a user indicated by the effective user identification in the effective user identification set is a user of a target application, and the target application is used for displaying information to be pushed; determining the intersection of the candidate user identification set and the effective user identification set as a target user identification set; and selecting a target user identifier from the target user identifier set, and pushing information to be pushed to a target application installed on a terminal device used by a user indicated by the selected target user identifier.
In some embodiments, selecting the target user identifier from the set of target user identifiers comprises: acquiring an invalid user identification set, wherein a user indicated by an invalid user identification in the invalid user identification set is a user of an article indicated by information to be pushed; and selecting the target user identification which does not belong to the invalid user identification set from the target user identification set.
In some embodiments, the invalid set of user identifications is determined by: acquiring a user identifier of a user who browses information to be pushed as a candidate invalid user identifier to obtain a candidate invalid user identifier set; for candidate invalid user identifications in the candidate invalid user identification set, acquiring historical behavior data, aiming at browsed information to be pushed, of a user indicated by the candidate invalid user identifications; determining whether the user indicated by the candidate invalid user identification is the user of the article indicated by the information to be pushed or not according to the acquired historical behavior data; in response to determining that the user indicated by the candidate invalid user identifier is the user of the item indicated by the information to be pushed, adding the candidate invalid user identifier to the invalid user identifier set.
In some embodiments, the method for pushing information further includes: and storing the selected target user identification.
In some embodiments, obtaining a set of candidate user identifications comprises: acquiring at least two user identification sets, and acquiring keywords respectively corresponding to the user identification sets in the at least two user identification sets to obtain at least two keywords; acquiring keywords of information to be pushed; according to the at least two keywords and the keywords of the information to be pushed, carrying out collective operation on the user identification sets in the at least two user identification sets so as to enable the keywords corresponding to the obtained operation result set and the keywords of the information to be pushed to accord with preset matching conditions; and determining the obtained operation result set as a candidate user identification set.
In a second aspect, an embodiment of the present application provides an apparatus for pushing information, where the apparatus includes: the device comprises an acquisition unit and a processing unit, wherein the acquisition unit is configured to acquire information to be pushed and acquire a candidate user identification set; the obtaining unit is further configured to obtain a valid user identification set, wherein a user indicated by a valid user identification in the valid user identification set is a user of a target application, and the target application is used for displaying information to be pushed; a determining unit configured to determine an intersection of the candidate user identification set and the valid user identification set as a target user identification set; and the pushing unit is configured to select the target user identifier from the target user identifier set and push the information to be pushed to a target application installed by the terminal equipment used by the user indicated by the selected target user identifier.
In some embodiments, the above-mentioned pushing unit is further configured to: selecting a target user identifier from a target user identifier set, comprising: acquiring an invalid user identification set, wherein a user indicated by an invalid user identification in the invalid user identification set is a user of an article indicated by information to be pushed; and selecting the target user identification which does not belong to the invalid user identification set from the target user identification set.
In some embodiments, the invalid subscriber identity set is determined by: acquiring a user identifier of a user who browses information to be pushed as a candidate invalid user identifier to obtain a candidate invalid user identifier set; for candidate invalid user identifications in the candidate invalid user identification set, acquiring historical behavior data, aiming at browsed information to be pushed, of a user indicated by the candidate invalid user identifications; determining whether the user indicated by the candidate invalid user identification is the user of the article indicated by the information to be pushed or not according to the acquired historical behavior data; in response to determining that the user indicated by the candidate invalid user identifier is the user of the item indicated by the information to be pushed, adding the candidate invalid user identifier to the invalid user identifier set.
In some embodiments, the above apparatus for pushing information further includes: and storing the selected target user identification.
In some embodiments, the above-mentioned obtaining unit is further configured to: acquiring a candidate user identification set, comprising: acquiring at least two user identification sets, and acquiring keywords respectively corresponding to the user identification sets in the at least two user identification sets to obtain at least two keywords; acquiring keywords of information to be pushed; according to the at least two keywords and the keywords of the information to be pushed, carrying out collective operation on the user identification sets in the at least two user identification sets so as to enable the keywords corresponding to the obtained operation result set and the keywords of the information to be pushed to accord with preset matching conditions; and determining the obtained operation result set as a candidate user identification set.
In a third aspect, an embodiment of the present application provides a server, where the server includes: one or more processors; storage means for storing one or more programs; when the one or more programs are executed by the one or more processors, the one or more processors are caused to implement the method as described in any implementation of the first aspect.
In a fourth aspect, the present application provides a computer-readable medium, on which a computer program is stored, which, when executed by a processor, implements the method as described in any implementation manner of the first aspect.
According to the method and the device for pushing the information, the information to be pushed is obtained, and the candidate user identification set is obtained; acquiring an effective user identification set, wherein a user indicated by the effective user identification in the effective user identification set is a user of a target application, and the target application is used for displaying information to be pushed; determining the intersection of the candidate user identification set and the effective user identification set as a target user identification set; the target user identification is selected from the target user identification set, and the information to be pushed is pushed to the target application installed on the terminal equipment used by the user indicated by the selected target user identification, so that the condition that some users cannot browse the information to be pushed can be avoided, and the waste of network resources is avoided.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is an exemplary system architecture diagram in which one embodiment of the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a method for pushing information, according to the present application;
FIG. 3 is a schematic diagram of an application scenario of a method for pushing information according to an embodiment of the present application;
FIG. 4 is a flow diagram of yet another embodiment of a method for pushing information according to the present application;
FIG. 5 is a schematic block diagram illustrating one embodiment of an apparatus for pushing information according to the present application;
FIG. 6 is a schematic block diagram of a computer system suitable for use in implementing a server according to embodiments of the present application.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 shows an exemplary architecture 100 to which embodiments of the method for pushing information or the apparatus for pushing information of the present application may be applied.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The terminal devices 101, 102, 103 interact with a server 105 via a network 104 to receive or send messages or the like. Various client applications may be installed on the terminal devices 101, 102, 103.
The terminal apparatuses 101, 102, and 103 may be hardware or software. When the terminal devices 101, 102, 103 are hardware, they may be various electronic devices capable of installing applications, including but not limited to smart phones, tablet computers, e-book readers, laptop portable computers, desktop computers, and the like. When the terminal apparatuses 101, 102, 103 are software, they can be installed in the electronic apparatuses listed above. It may be implemented as multiple pieces of software or software modules (e.g., multiple pieces of software or software modules to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
The server 105 may be a server that provides various services, such as a server for supporting various functions of a target application. If the terminal devices 101, 102, 103 have the target application installed thereon, the server 105 may support normal operation of the target application on the terminal devices 101, 102, 103. At this time, the server 105 may push information to the target application installed on the terminal device 101, 102, 103. Accordingly, the terminal device 101, 102, 103 may present the received push information to the user through the installed target application.
It should be noted that the method for pushing information provided by the embodiment of the present application is generally performed by the server 105, and accordingly, the apparatus for pushing information is generally disposed in the server 105.
The server may be hardware or software. When the server is hardware, it may be implemented as a distributed server cluster formed by multiple servers, or may be implemented as a single server. When the server is software, it may be implemented as multiple pieces of software or software modules (e.g., multiple pieces of software or software modules used to provide distributed services), or as a single piece of software or software module. And is not particularly limited herein.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continued reference to fig. 2, a flow 200 of one embodiment of a method for pushing information in accordance with the present application is shown. The method for pushing the information comprises the following steps:
step 201, obtaining information to be pushed, and obtaining a candidate user identifier set.
In this embodiment, the candidate user identifiers in the candidate user identifier set may be various user identifiers that can be used to identify the user. It should be understood that, since the user receives the push information through the used terminal device, the identification of the terminal device may be used to identify the corresponding user. Different terminal devices may employ different identities.
Optionally, the user identification includes, but is not limited to: MAC (Media Access Control) address, IMEI (International Mobile Equipment Identity), IDFA (Identifier For Advertising Identifier), UDID (Unique Identifier of Device), UUID (universal Unique Identifier), and so on.
Optionally, the user identification may also employ relevant information of the user. User identities include, but are not limited to: user mailbox, mobile phone number, account number registered in target application of user on terminal device, etc.
The target application may be an application installed on a terminal device specified in a specific application scenario and capable of receiving and displaying information to be pushed.
In this embodiment, the executing entity (such as the server 105 shown in fig. 1) of the method for pushing information may first acquire information to be pushed from a local or other storage device (such as the terminal devices 101, 102, 103 shown in fig. 1) and acquire a candidate user identification set by using a wireless connection or a wired connection method. The information to be pushed and the candidate user identification set may both be obtained from a local or a certain storage device, or one of them may be obtained from the local and the other from a certain storage device. Of course, the information to be pushed and the candidate user identification set may also be obtained from a third-party data source.
In some optional implementations of this embodiment, the candidate user identifier set may be obtained by:
step one, at least two user identification sets are obtained, keywords corresponding to the user identification sets in the at least two user identification sets are obtained, and at least two keywords are obtained.
In this step, at least two user identifier sets and keywords corresponding to the two obtained user identifier sets may be obtained from the third-party platform. When the execution main body locally stores the user identifier set and the keywords corresponding to the user representation set, the user identifier set can be directly obtained from the local.
And step two, acquiring keywords of the information to be pushed.
In this step, similarly, the keyword of the information to be pushed may also be obtained locally from the third party platform or the execution subject. Alternatively, existing various natural language processing methods may be utilized to extract keywords from the information to be pushed.
And step three, performing set operation on the user identification sets in the at least two user identification sets according to the at least two keywords and the keywords of the information to be pushed so as to enable the keywords corresponding to the obtained operation result set and the keywords of the information to be pushed to accord with preset matching conditions.
In this step, the matching condition may be determined according to an actual application scenario. For example, the keywords of the two user identifier sets are respectively car and travel, and the keyword of the information to be pushed is car-loving and travel-loving. The matching condition is that the similarity between the keywords of the information to be pushed and the keywords of the operation result set is greater than a preset threshold value. At this time, the intersection of the two user identifier sets may be determined, and an operation result set is obtained.
And step four, determining the obtained operation result set as a candidate user identification set.
Step 202, obtaining a valid user identification set.
In this embodiment, the user indicated by the valid user identifier in the valid user identifier set may be a user of the target application. The user of the target application may refer to a user who installs the target application on the terminal device used. The valid user identity may be any of the user identities described above.
The execution body may store in advance a user identification of a user in which the target application is installed. At this time, the locally stored user identifiers of the users installed with the target application can be directly combined into an effective user identifier set. The execution subject can also obtain a valid user identification set from a third-party platform.
Step 203, determine the intersection of the candidate user identifier set and the valid user identifier set as the target user identifier set.
In this embodiment, the user identifiers that are in both the candidate user identifier set and the valid user identifier set may be used as the target user identifiers, so as to obtain the target user identifier set.
For a user who does not install the target application on the used terminal device, the information to be pushed cannot be received. Therefore, the candidate user identifications in the candidate user identification set can be screened, and the user identifications of the users which cannot receive the information to be pushed are deleted, so that meaningless pushing is avoided, and the cost for pushing the information to be pushed is saved.
Step 204, selecting a target user identifier from the target user identifier set, and pushing information to be pushed to a target application installed on a terminal device used by a user indicated by the selected target user identifier.
In this embodiment, the terminal device used by the target user indicated by the target user identifier is installed with the target application. Therefore, the information to be pushed can be pushed to the target application installed on the terminal equipment used by the user indicated by the target user identification. After receiving the information to be pushed, the target application can show the information to be pushed to the user.
According to actual application requirements, target user identifications can be selected from the target user identification set, and users indicated by the selected target user identifications are used as pushing objects of information to be pushed.
Alternatively, all target user identities in the set of target user identities may be selected.
Alternatively, the number of target user identifiers to be selected may be preset, and then the preset number of target user identifiers may be randomly selected from the target user identifier set.
In some optional implementation manners of this embodiment, after the target user identifier is selected from the target user identifier set, the selected target user identifier may be further stored to serve as a candidate user identifier of information to be pushed later.
With continued reference to fig. 3, fig. 3 is a schematic diagram 300 of an application scenario of the method for pushing information according to the present embodiment. In the application scenario of fig. 3, information to be pushed 301 and a candidate user identifier set 302 may be obtained first. The candidate user identifier set 302 includes three candidate user identifiers, which are: identification 1, identification 2 and identification 3.
Thereafter, a set of valid subscriber identities 303 may be obtained. The valid user identifier set 303 includes two valid user identifiers, which are: identification 1 and identification 2. The terminal devices used by the users indicated by the identifier 1 and the identifier 2 respectively are installed with the target application 305, that is, the users indicated by the identifier 1 and the identifier 2 respectively are users of the target application 305.
Further, the intersection of the candidate user identification set 302 and the valid user identification set 303 may be determined as the target user identification set 304. The target user id set 304 includes two target user ids, i.e. id 1 and id 2.
Then, all target user identities in the target user identity set may be selected, and the information to be pushed 301 may be pushed to the target applications 305 installed in the terminal devices used by the users indicated by the identities 1 and 2, respectively.
In the method provided by the embodiment of the application, the candidate user identifier set in the candidate user identifier set is screened, the candidate user identifier of the user indicated by the selected candidate user identifier is selected as the target user identifier, and the user indicated by the selected candidate user identifier is used as the pushing object of the information to be pushed, so that invalid pushing is avoided, and the network load for pushing the information to be pushed is favorably reduced.
With further reference to fig. 4, a flow 400 of yet another embodiment of a method for pushing information is shown. The flow 400 of the method for pushing information comprises the following steps:
step 401, obtaining information to be pushed, and obtaining a candidate user identifier set.
Step 402, obtaining a valid user identification set.
Step 403, determining the intersection of the candidate user identifier set and the valid user identifier set as a target user identifier set.
The specific implementation process of the steps 401, 402, and 403 may refer to the related descriptions of the steps 201, 202, and 203 in the corresponding embodiment of fig. 2, and will not be described herein again.
In step 404, an invalid user identifier set is obtained.
In this embodiment, the user indicated by the invalid user identifier in the invalid user identifier set is the user of the article indicated by the information to be pushed. The item indicated by the information to be pushed may refer to the item described by the information to be pushed. Wherein the item may be a physical item. Such as automobiles, computers, clothing, etc. The item may also be a virtual item. Such as services, coupons, tokens, applications, and the like.
A user of an item may refer to a user that has a preset relationship with the item. The preset relationship may be various according to a specific application scenario. For example, when the item is a physical item such as a car, the predetermined relationship may be that the user purchased the item. When the item is a coupon, the predetermined relationship may be that the user owns the item. When the article is an application, the preset relationship may be that the user downloads or registers the application, etc.
In this embodiment, the invalid user identification set may be obtained from a third party platform. When the execution main body locally stores the invalid user identification set, the invalid user identification set can be directly obtained from the local.
In some optional implementations of this embodiment, the invalid user identity set may be determined by:
step one, acquiring a user identifier of a user browsing information to be pushed as a candidate invalid user identifier to obtain a candidate invalid user identifier set.
In this step, if the terminal device used by the user has the target application installed, and the user browses the information to be pushed by the target application. Then, the target application installed on the terminal device used by the user may record the user identifications of the users, and send the recorded user identifications to the execution subject as candidate invalid user identifications. Of course, the execution subject may also obtain the candidate invalid user id from the third party platform.
Step two, acquiring historical behavior data of a user indicated by the candidate invalid user identification and aiming at browsed information to be pushed for the candidate invalid user identification in the candidate invalid user identification set; determining whether the user indicated by the candidate invalid user identification is the user of the article indicated by the information to be pushed or not according to the acquired historical behavior data; in response to determining that the user indicated by the candidate invalid user identifier is the user of the item indicated by the information to be pushed, adding the candidate invalid user identifier to the invalid user identifier set.
In this step, if the terminal device used by the user indicated by the candidate invalid user identifier has the target application, and the user browses the information to be pushed by the target application. Then, the target application installed on the terminal device used by the user may record historical behavior data of the user on the browsed information to be pushed, and send the historical behavior data of the user to the execution main body. Of course, the execution subject may also obtain, from the third-party platform, historical behavior data of the user indicated by the candidate invalid user identifier and for the browsed information to be pushed.
Optionally, through the analysis of the historical behavior data, it may be determined whether the user is the user of the item indicated by the information to be pushed by determining whether the user has performed a preset operation on the browsed information to be pushed. As an example, if the item described by the information to be pushed is an application. Then it can be analyzed from the user's historical behavior data whether the user downloaded the application indicated by the information to be pushed to determine whether it is the user of the application.
Alternatively, the likelihood that the user is a user of an item indicated by the information to be pushed may be estimated by analysis of historical behavior data. As an example, a user image of a user may be constructed from historical behavior data of the user. And estimating the possibility that the user is the user of the article indicated by the information to be pushed according to the relevance between the user portrait and the article indicated by the information to be pushed.
Step 405, selecting a target user identifier not belonging to the invalid user identifier set from the target user identifier set, and pushing information to be pushed to a target application installed on a terminal device used by a user indicated by the selected target user identifier.
In this embodiment, the target user identifier belonging to the invalid user identifier set may be further filtered from the target user identifier set. Since the users indicated by the invalid user identifiers in the invalid user identifier set belong to the users of the articles indicated by the information to be pushed, it is not necessary to push the information to be pushed to these users. Therefore, meaningless pushing can be further avoided, and the cost for pushing the information to be pushed is saved.
As can be seen from fig. 4, compared with the embodiment corresponding to fig. 2, the process 400 of the method for pushing information in this embodiment highlights that the target user identifier belonging to the invalid user identifier set can be deleted from the target user identifier set, so that the situation that some users who are already articles indicated by the information to be pushed push information are pushed again can be further avoided, and waste of network resources is further avoided.
With further reference to fig. 5, as an implementation of the method shown in the above-mentioned figures, the present application provides an embodiment of an apparatus for pushing information, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be applied to various electronic devices in particular.
As shown in fig. 5, the apparatus 500 for pushing information provided by the present embodiment includes an obtaining unit 501, a determining unit 502, and a pushing unit 503. The obtaining unit 501 is configured to obtain information to be pushed and obtain a candidate user identifier set; the obtaining unit 501 is further configured to obtain a valid user identifier set, where a user indicated by a valid user identifier in the valid user identifier set is a user of a target application, where the target application is used to display information to be pushed; the determining unit 5025 is configured to determine an intersection of the candidate subscriber identity set and the valid subscriber identity set as a target subscriber identity set; the pushing unit 503 is configured to select a target user identifier from the set of target user identifiers, and push information to be pushed to a target application installed on a terminal device used by a user indicated by the selected target user identifier.
In the present embodiment, in the apparatus 500 for pushing information: the specific processing of the obtaining unit 501, the determining unit 502, and the pushing unit 503 and the technical effects thereof can refer to the related descriptions of step 201, step 202, and step 203 in the corresponding embodiment of fig. 2, which are not described herein again.
In some optional implementations of the present embodiment, the pushing unit 503 is further configured to: selecting a target user identifier from a target user identifier set, comprising: acquiring an invalid user identification set, wherein a user indicated by an invalid user identification in the invalid user identification set is a user of an article indicated by information to be pushed; and selecting the target user identification which does not belong to the invalid user identification set from the target user identification set.
In some optional implementations of this embodiment, the invalid user identifier set is determined by: acquiring a user identifier of a user who browses information to be pushed as a candidate invalid user identifier to obtain a candidate invalid user identifier set; for candidate invalid user identifications in the candidate invalid user identification set, acquiring historical behavior data, aiming at browsed information to be pushed, of a user indicated by the candidate invalid user identifications; determining whether the user indicated by the candidate invalid user identification is the user of the article indicated by the information to be pushed or not according to the acquired historical behavior data; in response to determining that the user indicated by the candidate invalid user identifier is the user of the item indicated by the information to be pushed, adding the candidate invalid user identifier to the invalid user identifier set.
In some optional implementations of the present embodiment, the apparatus 500 for pushing information further includes: and storing the selected target user identification.
In some optional implementations of this embodiment, the obtaining unit 501 is further configured to: acquiring a candidate user identification set, comprising: acquiring at least two user identification sets, and acquiring keywords respectively corresponding to the user identification sets in the at least two user identification sets to obtain at least two keywords; acquiring keywords of information to be pushed; according to the at least two keywords and the keywords of the information to be pushed, carrying out collective operation on the user identification sets in the at least two user identification sets so as to enable the keywords corresponding to the obtained operation result set and the keywords of the information to be pushed to accord with preset matching conditions; and determining the obtained operation result set as a candidate user identification set.
The device provided by the above embodiment of the application acquires the information to be pushed and acquires the candidate user identifier set through the acquisition unit; acquiring an effective user identification set, wherein a user indicated by the effective user identification in the effective user identification set is a user of a target application, and the target application is used for displaying information to be pushed; the determining unit determines the intersection of the candidate user identification set and the effective user identification set as a target user identification set; the pushing unit selects the target user identifier from the target user identifier set and pushes the information to be pushed to the target application installed on the terminal equipment used by the user indicated by the selected target user identifier, so that the situation that some users cannot browse the information to be pushed can be avoided, and the waste of network resources is avoided.
Referring now to FIG. 6, shown is a block diagram of a computer system 600 suitable for use in implementing a server according to embodiments of the present application. The server shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 6, the computer system 600 includes a Central Processing Unit (CPU)601 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the system 600 are also stored. The CPU 601, ROM 602, and RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output portion 607 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted in the storage section 608 as necessary.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611. The computer program performs the above-described functions defined in the method of the present application when executed by a Central Processing Unit (CPU) 601.
It should be noted that the computer readable medium of the present application can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present application may be implemented by software or hardware. The described units may also be provided in a processor, and may be described as: a processor includes an acquisition unit, a determination unit, and a push unit. The names of these units do not in some cases form a limitation on the unit itself, and for example, the acquiring unit may also be described as a unit for acquiring information to be pushed and acquiring a candidate user identification set.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the server described in the above embodiments; or may exist separately and not be assembled into the server. The computer readable medium carries one or more programs which, when executed by the server, cause the server to: acquiring information to be pushed and acquiring a candidate user identification set; acquiring an effective user identification set, wherein a user indicated by the effective user identification in the effective user identification set is a user of a target application, and the target application is used for displaying information to be pushed; determining the intersection of the candidate user identification set and the effective user identification set as a target user identification set; and selecting a target user identifier from the target user identifier set, and pushing information to be pushed to a target application installed on a terminal device used by a user indicated by the selected target user identifier.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the invention. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (10)

1. A method for pushing information, comprising:
acquiring information to be pushed and acquiring a candidate user identification set;
obtaining an effective user identification set, wherein a user indicated by an effective user identification in the effective user identification set is a user of a target application, and the target application is used for displaying the information to be pushed;
determining the intersection of the candidate user identification set and the effective user identification set as a target user identification set;
selecting a target user identifier from the target user identifier set, and pushing the information to be pushed to a target application installed on a terminal device used by a user indicated by the selected target user identifier;
wherein the selecting a target user identifier from the target user identifier set comprises: acquiring an invalid user identification set, wherein a user indicated by an invalid user identification in the invalid user identification set is a user of an article indicated by the information to be pushed; and selecting the target user identification which does not belong to the invalid user identification set from the target user identification set.
2. The method of claim 1, the set of invalid subscriber identities being determined by:
acquiring a user identifier of a user who browses the information to be pushed as a candidate invalid user identifier to obtain a candidate invalid user identifier set;
for candidate invalid user identifications in the candidate invalid user identification set, acquiring historical behavior data, aiming at browsed information to be pushed, of a user indicated by the candidate invalid user identifications; determining whether the user indicated by the candidate invalid user identifier is the user of the article indicated by the information to be pushed or not according to the acquired historical behavior data; in response to determining that the user indicated by the candidate invalid user identifier is the user of the item indicated by the information to be pushed, adding the candidate invalid user identifier to an invalid user identifier set.
3. The method of claim 1, wherein the method further comprises:
and storing the selected target user identification.
4. The method according to one of claims 1 to 3, wherein the obtaining of the set of candidate user identities comprises:
acquiring at least two user identification sets, and acquiring keywords respectively corresponding to the user identification sets in the at least two user identification sets to obtain at least two keywords;
acquiring keywords of the information to be pushed;
according to the at least two keywords and the keywords of the information to be pushed, carrying out set operation on the user identification sets in the at least two user identification sets so as to enable the keywords corresponding to the obtained operation result set and the keywords of the information to be pushed to meet preset matching conditions;
and determining the obtained operation result set as the candidate user identification set.
5. An apparatus for pushing information, comprising:
the device comprises an acquisition unit and a processing unit, wherein the acquisition unit is configured to acquire information to be pushed and acquire a candidate user identification set;
the obtaining unit is further configured to obtain a valid user identifier set, where a user indicated by a valid user identifier in the valid user identifier set is a user of a target application, where the target application is used to display the information to be pushed;
a determining unit configured to determine an intersection of the candidate user identification set and the valid user identification set as a target user identification set;
the pushing unit is configured to select a target user identifier from the target user identifier set and push the information to be pushed to a target application installed by a terminal device used by a user indicated by the selected target user identifier;
wherein the pushing unit is further configured to: acquiring an invalid user identification set, wherein a user indicated by an invalid user identification in the invalid user identification set is a user of an article indicated by the information to be pushed; and selecting the target user identification which does not belong to the invalid user identification set from the target user identification set.
6. The apparatus of claim 5, the set of invalid subscriber identities is determined by:
acquiring a user identifier of a user who browses the information to be pushed as a candidate invalid user identifier to obtain a candidate invalid user identifier set;
for candidate invalid user identifications in the candidate invalid user identification set, acquiring historical behavior data, aiming at browsed information to be pushed, of a user indicated by the candidate invalid user identifications; determining whether the user indicated by the candidate invalid user identifier is the user of the article indicated by the information to be pushed or not according to the acquired historical behavior data; in response to determining that the user indicated by the candidate invalid user identifier is the user of the item indicated by the information to be pushed, adding the candidate invalid user identifier to an invalid user identifier set.
7. The apparatus of claim 5, wherein the apparatus further comprises:
and the storage unit is configured to store the selected target user identification.
8. The apparatus according to one of claims 5-7, wherein the obtaining unit is further configured to:
acquiring at least two user identification sets, and acquiring keywords respectively corresponding to the user identification sets in the at least two user identification sets to obtain at least two keywords;
acquiring keywords of the information to be pushed;
according to the at least two keywords and the keywords of the information to be pushed, carrying out set operation on the user identification sets in the at least two user identification sets so as to enable the keywords corresponding to the obtained operation result set and the keywords of the information to be pushed to meet preset matching conditions;
and determining the obtained operation result set as the candidate user identification set.
9. A server, comprising:
one or more processors;
a storage device having one or more programs stored thereon;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-4.
10. A computer-readable medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-4.
CN201811495121.2A 2018-12-07 2018-12-07 Method and device for pushing information Active CN109582873B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811495121.2A CN109582873B (en) 2018-12-07 2018-12-07 Method and device for pushing information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811495121.2A CN109582873B (en) 2018-12-07 2018-12-07 Method and device for pushing information

Publications (2)

Publication Number Publication Date
CN109582873A CN109582873A (en) 2019-04-05
CN109582873B true CN109582873B (en) 2020-11-10

Family

ID=65928978

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811495121.2A Active CN109582873B (en) 2018-12-07 2018-12-07 Method and device for pushing information

Country Status (1)

Country Link
CN (1) CN109582873B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110363577A (en) * 2019-06-27 2019-10-22 上海淇馥信息技术有限公司 Resource-niche methods of exhibiting, device and electronic equipment based on User Status
CN110633419B (en) * 2019-09-20 2022-10-21 百度在线网络技术(北京)有限公司 Information pushing method and device
CN111241402A (en) * 2020-01-14 2020-06-05 恩亿科(北京)数据科技有限公司 Information pushing method and device, electronic equipment and readable storage medium
WO2021163856A1 (en) * 2020-02-17 2021-08-26 深圳市欢太科技有限公司 Content pushing method and apparatus, and server and storage medium
CN113556352B (en) * 2021-07-27 2022-10-28 北京字跳网络技术有限公司 Information pushing method and device, terminal equipment and storage medium
CN113591095B (en) * 2021-08-04 2023-08-29 百度在线网络技术(北京)有限公司 Identification information processing method and device and electronic equipment
CN115471262B (en) * 2022-09-15 2023-12-01 武汉精阅数字传媒科技有限公司 Advertisement distribution system and intelligent advertisement distributor

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103685502A (en) * 2013-12-09 2014-03-26 腾讯科技(深圳)有限公司 Message pushing method, device and system
CN104065981A (en) * 2014-06-20 2014-09-24 海信集团有限公司 Method and device for recommending videos
CN105096158A (en) * 2015-07-01 2015-11-25 北京奇虎科技有限公司 Method and device for pushing information
CN105404628A (en) * 2014-09-12 2016-03-16 阿里巴巴集团控股有限公司 Data pushing method and device
CN107920100A (en) * 2016-10-10 2018-04-17 北京京东尚科信息技术有限公司 Information-pushing method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9721086B2 (en) * 2013-03-15 2017-08-01 Advanced Elemental Technologies, Inc. Methods and systems for secure and reliable identity-based computing
CN105989122A (en) * 2015-02-12 2016-10-05 广东欧珀移动通信有限公司 Application recommendation method and device
CN106959965B (en) * 2016-01-12 2021-02-05 腾讯科技(北京)有限公司 Information processing method and server
CN106446195A (en) * 2016-09-29 2017-02-22 北京百度网讯科技有限公司 News recommending method and device based on artificial intelligence

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103685502A (en) * 2013-12-09 2014-03-26 腾讯科技(深圳)有限公司 Message pushing method, device and system
CN104065981A (en) * 2014-06-20 2014-09-24 海信集团有限公司 Method and device for recommending videos
CN105404628A (en) * 2014-09-12 2016-03-16 阿里巴巴集团控股有限公司 Data pushing method and device
CN105096158A (en) * 2015-07-01 2015-11-25 北京奇虎科技有限公司 Method and device for pushing information
CN107920100A (en) * 2016-10-10 2018-04-17 北京京东尚科信息技术有限公司 Information-pushing method and device

Also Published As

Publication number Publication date
CN109582873A (en) 2019-04-05

Similar Documents

Publication Publication Date Title
CN109582873B (en) Method and device for pushing information
CN110708346B (en) Information processing system and method
CN108804450B (en) Information pushing method and device
CN107665225B (en) Information pushing method and device
CN108846753B (en) Method and apparatus for processing data
CN108011949B (en) Method and apparatus for acquiring data
CN111800513B (en) Method and device for pushing information and computer readable medium of electronic equipment
CN110619078B (en) Method and device for pushing information
CN109862100B (en) Method and device for pushing information
CN107908662B (en) Method and device for realizing search system
CN110543604A (en) information processing method and device
CN109087139B (en) Advertisement putting method and device for feed stream
CN109472540B (en) Service processing method and device
CN110619101B (en) Method and apparatus for processing information
CN109408647B (en) Method and apparatus for processing information
CN110557351B (en) Method and apparatus for generating information
CN110287087B (en) Method and device for detecting application
CN109308299B (en) Method and apparatus for searching information
CN108494982B (en) Method and apparatus for generating information
CN111414566A (en) Method and device for pushing information
CN110569468A (en) information processing method and device
CN112131287A (en) Method and device for reading data
CN112835609A (en) Method and device for modifying dependent package download address
CN113127561A (en) Method and device for generating service order number, electronic equipment and storage medium
CN109634827A (en) Method and apparatus for generating information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee after: Douyin Vision Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee before: Tiktok vision (Beijing) Co.,Ltd.

Address after: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee after: Tiktok vision (Beijing) Co.,Ltd.

Address before: 100041 B-0035, 2 floor, 3 building, 30 Shixing street, Shijingshan District, Beijing.

Patentee before: BEIJING BYTEDANCE NETWORK TECHNOLOGY Co.,Ltd.

CP01 Change in the name or title of a patent holder