CN114238771A - Intelligent big data pushing method and device - Google Patents

Intelligent big data pushing method and device Download PDF

Info

Publication number
CN114238771A
CN114238771A CN202111597540.9A CN202111597540A CN114238771A CN 114238771 A CN114238771 A CN 114238771A CN 202111597540 A CN202111597540 A CN 202111597540A CN 114238771 A CN114238771 A CN 114238771A
Authority
CN
China
Prior art keywords
big data
request
range corresponding
resource
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111597540.9A
Other languages
Chinese (zh)
Inventor
翁正国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Business Technology Institute
Original Assignee
Zhejiang Business Technology Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Business Technology Institute filed Critical Zhejiang Business Technology Institute
Priority to CN202111597540.9A priority Critical patent/CN114238771A/en
Publication of CN114238771A publication Critical patent/CN114238771A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention provides a big data intelligent pushing method and a big data intelligent pushing device, wherein the method comprises the following steps: when a resource acquisition request of a first user is detected, acquiring a first identity tag of the first user, and judging whether a request range corresponding to the resource acquisition request corresponds to a large data range corresponding to the first identity tag or not; when the request range corresponding to the resource acquisition request does not correspond to the big data range corresponding to the first identity tag, acquiring a related second user; acquiring a second identity label of a second user, and judging whether a request range corresponding to the resource acquisition request corresponds to a big data range corresponding to the second identity label; and in response, determining the corresponding big data resource according to the resource acquisition request, and performing resource optimization and pushing on the big data resource according to the second identity tag. By adopting the method, the big data request result optimization can be more accurately provided for the relevant users, and more accurate big data request data can be provided for the relevant users.

Description

Intelligent big data pushing method and device
Technical Field
The invention relates to the technical field of big data, in particular to a big data intelligent pushing method and device.
Background
With the development of big data technology becoming more and more mature, more and more web pages and software are introduced into big data pushing methods more or less when pushing data, the big data pushing is usually performed according to the historical search records of the user or the relevant user characteristics (such as the occupation, sex, age, etc.) of the user, when the user has a resource acquisition request for big data, the big data pushing method is usually also related to the historical search records or the user characteristics of the user, and the data retrieved by the big data request can be optimized and sorted or screened through the two characteristics, and then the data pushing is performed for the user.
However, in the current intelligent big data pushing process, the situation of the related user is not considered, that is, the current user is not a binding user, but a preset relationship exists between the current user and the binding user, and the relationship may be, for example, the same user group of the server or a binding parent relationship in app, and for example, when a user B in the user group uses a terminal of the user a to make a big data request, the type of the big data query content of the user B may be different from the user a, and cannot be optimized or screened according to the historical search record or the user characteristic of the user a, and can only be sorted according to the default sorting of the current webpage or software, which is not beneficial for the related user to obtain the target result.
Disclosure of Invention
Aiming at the problems in the prior art, the embodiment of the invention provides a big data intelligent pushing method and device.
The embodiment of the invention provides an intelligent big data pushing method, which comprises the following steps:
when a resource acquisition request of a first user is detected, acquiring first identity information bound by the first user, determining a first identity tag of the first user according to the first identity information, and judging whether a request range corresponding to the resource acquisition request corresponds to a large data range corresponding to the first identity tag;
when the request range corresponding to the resource acquisition request does not correspond to the big data range corresponding to the first identity tag, acquiring a second user associated in the first identity information;
acquiring second identity information bound by the second user, determining a second identity label of the second user according to the second identity information, and judging whether a request range corresponding to the resource acquisition request corresponds to a big data range corresponding to the second identity label;
and when the request range corresponding to the resource acquisition request corresponds to the big data range corresponding to the second identity tag, determining the corresponding big data resource according to the resource acquisition request, and performing resource optimization and pushing on the big data resource according to the second identity tag.
In one embodiment, the method further comprises:
when the request range corresponding to the resource acquisition request does not correspond to the big data range corresponding to the second identity tag, acquiring security verification information preset by the first user, and sending the security verification information to a terminal corresponding to the resource acquisition request;
and when the received feedback information of the safety verification information passes, pushing the corresponding big data resource according to the resource acquisition request.
In one embodiment, the method further comprises:
and acquiring a corresponding request data range according to the resource acquisition request, and merging the request data range into a big data range corresponding to the first identity tag and updating.
In one embodiment, the method further comprises:
and when the received feedback information of the safety verification information passes, locking the first identity information until the received feedback information of the safety verification information passes.
In one embodiment, the method further comprises:
and determining a corresponding possible search range according to the first identity tag, acquiring a historical search record of the first user, and determining a big data range corresponding to the first identity tag according to the possible search range and the historical search record.
The embodiment of the invention provides a big data intelligent pushing device, which comprises:
the device comprises a detection module, a resource obtaining module and a resource obtaining module, wherein the detection module is used for obtaining first identity information bound by a first user when a resource obtaining request of the first user is detected, determining a first identity label of the first user according to the first identity information, and judging whether a request range corresponding to the resource obtaining request corresponds to a large data range corresponding to the first identity label or not;
a first obtaining module, configured to obtain a second user associated with the first identity information when a request range corresponding to the resource obtaining request does not correspond to a big data range corresponding to the first identity tag;
a second obtaining module, configured to obtain second identity information bound by the second user, determine a second identity tag of the second user according to the second identity information, and determine whether a request range corresponding to the resource obtaining request corresponds to a big data range corresponding to the second identity tag;
and the pushing module is used for determining the corresponding big data resource according to the resource acquisition request when the request range corresponding to the resource acquisition request corresponds to the big data range corresponding to the second identity tag, and performing resource optimization and pushing on the big data resource according to the second identity tag.
In one embodiment, the apparatus further comprises:
a third obtaining module, configured to obtain security verification information preset by the first user when a request range corresponding to the resource obtaining request does not correspond to a big data range corresponding to the second identity tag, and send the security verification information to a terminal corresponding to the resource obtaining request;
and the second pushing module is used for pushing the corresponding big data resource according to the resource acquisition request when the received feedback information of the security verification information passes.
In one embodiment, the apparatus further comprises:
and the updating module is used for acquiring a corresponding request data range according to the resource acquisition request, merging the request data range into a large data range corresponding to the first identity tag and updating.
The embodiment of the invention provides electronic equipment, which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the program to realize the steps of the intelligent big data pushing method.
The embodiment of the invention provides a non-transitory computer readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the steps of the big data intelligent pushing method are implemented.
According to the method and the device for intelligently pushing the big data, provided by the embodiment of the invention, when a resource acquisition request of a first user is detected, first identity information bound by the first user is acquired, a first identity tag of the first user is determined according to the first identity information, and whether a request range corresponding to the resource acquisition request corresponds to a big data range corresponding to the first identity tag is judged; when the request range corresponding to the resource obtaining request does not correspond to the big data range corresponding to the first identity tag, obtaining a second user related to the first identity information; acquiring second identity information bound by a second user, determining a second identity label of the second user according to the second identity information, and judging whether a request range corresponding to the resource acquisition request corresponds to a big data range corresponding to the second identity label; and when the request range corresponding to the resource acquisition request corresponds to the big data range corresponding to the second identity tag, determining the corresponding big data resource according to the resource acquisition request, and performing resource optimization and pushing on the big data resource according to the second identity tag. Therefore, the optimization of the big data request result can be provided for the relevant users more accurately, and the more accurate big data request data can be provided for the relevant users.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a big data intelligent pushing method according to an embodiment of the present invention;
fig. 2 is a structural diagram of an intelligent big data pushing device according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device in an embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Fig. 1 is a schematic flow diagram of a big data intelligent pushing method provided in an embodiment of the present invention, and as shown in fig. 1, the embodiment of the present invention provides a big data intelligent pushing method, including:
step S101, when a resource acquisition request of a first user is detected, first identity information bound by the first user is acquired, a first identity tag of the first user is determined according to the first identity information, and whether a request range corresponding to the resource acquisition request corresponds to a large data range corresponding to the first identity tag or not is judged.
Specifically, when a big data resource acquisition request from a terminal/server of a first user is detected, corresponding first identity information pre-bound by the first user is acquired, wherein the first user is a master user, such as the master user of the server, a user is created on an account of software in an app, the identity information may include the age, sex, age, occupation, marital status, fertility status, and the like of the first user, the first identity tag of the user may be determined according to the identity information, such as the occupation of the user is a language teacher, the corresponding language teacher tag is determined, the marital status is not married, the corresponding not married tag is determined, the sex is 32, the corresponding tag between ages 30 and 40 is determined, and the like, after the first identity tag is determined, a possible search range corresponding to the identity tag is determined, such as the search range corresponding to the language teacher tag does not include high molecular chemical materials, and the like, and acquiring a historical search record of the first user, comprehensively determining a large data range corresponding to the first identity tag according to the possible search range and the historical search record, and then judging whether a request range corresponding to the current resource acquisition request corresponds to the large data range corresponding to the first identity tag.
Step S102, when the request range corresponding to the resource obtaining request does not correspond to the big data range corresponding to the first identity tag, obtaining a second user associated in the first identity information.
Specifically, when the data request range corresponding to the resource acquisition request does not correspond to the big data range corresponding to the first identity tag, it is indicated that the current terminal/server is not the master user performing the resource acquisition request, and then the second user associated in the first identity information is acquired, where the second user may be other slave users in the same cluster as the master user of the server, and may also create a friend-in-person account bound by the user for an account in the app.
Step S103, acquiring second identity information bound by the second user, determining a second identity label of the second user according to the second identity information, and judging whether a request range corresponding to the resource acquisition request corresponds to a big data range corresponding to the second identity label.
Specifically, second identity information pre-bound by a second user is acquired, a second identity tag corresponding to the second user is determined according to the second identity information, and then whether a request range corresponding to the resource acquisition request corresponds to a big data range corresponding to the second identity tag is judged, wherein the big data range corresponding to the second identity tag comprises a possible search range corresponding to the second identity tag and a historical search record of the second user.
Step S104, when the request range corresponding to the resource obtaining request corresponds to the big data range corresponding to the second identity label, determining the corresponding big data resource according to the resource obtaining request, and performing resource optimization and pushing on the big data resource according to the second identity label.
Specifically, when the data request range corresponding to the resource acquisition request corresponds to the big data range corresponding to the second identity tag, it is indicated that the terminal/server may be a relevant user of the master user in operation, and the user who sends the big data resource acquisition request is the relevant user, the resource acquisition request is obtained to determine the corresponding big data resource, and resource optimization including resource filtering, resource sorting and the like is performed on the big data resource according to the second identity tag, and then resource pushing is performed.
According to the intelligent big data pushing method provided by the embodiment of the invention, when a resource acquisition request of a first user is detected, first identity information bound by the first user is acquired, a first identity label of the first user is determined according to the first identity information, and whether a request range corresponding to the resource acquisition request corresponds to a big data range corresponding to the first identity label is judged; when the request range corresponding to the resource obtaining request does not correspond to the big data range corresponding to the first identity tag, obtaining a second user related to the first identity information; acquiring second identity information bound by a second user, determining a second identity label of the second user according to the second identity information, and judging whether a request range corresponding to the resource acquisition request corresponds to a big data range corresponding to the second identity label; and when the request range corresponding to the resource acquisition request corresponds to the big data range corresponding to the second identity tag, determining the corresponding big data resource according to the resource acquisition request, and performing resource optimization and pushing on the big data resource according to the second identity tag. Therefore, the optimization of the big data request result can be provided for the relevant users more accurately, and the more accurate big data request data can be provided for the relevant users.
On the basis of the above embodiment, the method for intelligently pushing big data further includes:
when the request range corresponding to the resource acquisition request does not correspond to the big data range corresponding to the second identity tag, acquiring security verification information preset by the first user, and sending the security verification information to a terminal corresponding to the resource acquisition request;
and when the received feedback information of the safety verification information passes, pushing the corresponding big data resource according to the resource acquisition request.
In the embodiment of the invention, when the request range corresponding to the resource acquisition request does not correspond to the big data range corresponding to the second identity tag, which indicates that the current terminal/server may be operated by neither a master user nor a related user, but by a third user, the security authentication information preset by the first user is acquired, the security authentication information is sent to the terminal/server corresponding to the resource acquisition request, whether the third user has the authorization of the master user is detected, when the feedback information of the received security authentication information passes, it indicates that the third user has the authorization of the master user, and the corresponding big data resource is pushed according to the resource acquisition request.
In addition, after the received feedback information of the security verification information passes, the corresponding request data range can be obtained according to the resource obtaining request, the request data range is merged into the big data range corresponding to the first identity tag and is updated, so that the third user can be updated to the authorized user, the authorized user can be automatically updated, the third user can also have authorization when the third user carries out the same request next time, and the pushing efficiency of pushing the big data resource is improved.
In addition, when the feedback information of the received safety verification information does not pass, the third user is not an authorized user of the master user and is not a related user, and the first identity information is locked until the feedback information of the received safety verification information passes, so that the safety of the related information of the master user can be protected in time.
According to the embodiment of the invention, when the request range corresponding to the resource acquisition request does not correspond to the big data range corresponding to the second identity tag, the safety verification is carried out on the third user of the current operation, and after the safety verification is passed, the big data resource is provided, so that the safety of the related information of the main user is ensured
Fig. 2 is a diagram of an intelligent big data pushing device provided in an embodiment of the present invention, including: the system comprises a detection module S201, a first acquisition module S202, a second acquisition module S203 and a push module S204, wherein:
the detection module S201 is configured to, when a resource acquisition request of a first user is detected, acquire first identity information bound by the first user, determine a first identity tag of the first user according to the first identity information, and determine whether a request range corresponding to the resource acquisition request corresponds to a big data range corresponding to the first identity tag.
A first obtaining module S202, configured to obtain a second user associated in the first identity information when a request range corresponding to the resource obtaining request does not correspond to a big data range corresponding to the first identity tag.
A second obtaining module S203, configured to obtain second identity information bound by the second user, determine a second identity tag of the second user according to the second identity information, and determine whether a request range corresponding to the resource obtaining request corresponds to a big data range corresponding to the second identity tag.
And a pushing module S204, configured to determine, according to the resource acquisition request, a corresponding big data resource when a request range corresponding to the resource acquisition request corresponds to a big data range corresponding to the second identity tag, and perform resource optimization and pushing on the big data resource according to the second identity tag.
In one embodiment, the apparatus may further comprise:
and the third obtaining module is used for obtaining the safety verification information preset by the first user when the request range corresponding to the resource obtaining request does not correspond to the big data range corresponding to the second identity tag, and sending the safety verification information to the terminal corresponding to the resource obtaining request.
And the second pushing module is used for pushing the corresponding big data resource according to the resource acquisition request when the received feedback information of the security verification information passes.
In one embodiment, the apparatus may further comprise:
and the updating module is used for acquiring a corresponding request data range according to the resource acquisition request, merging the request data range into a large data range corresponding to the first identity tag and updating.
In one embodiment, the apparatus may further comprise:
and the locking module is used for locking the first identity information until the received feedback information of the safety verification information passes when the received feedback information of the safety verification information passes.
For specific limitations of the big data intelligent pushing device, reference may be made to the above limitations of the big data intelligent pushing method, and details are not described here. All or part of the modules in the big data intelligent pushing device can be realized through software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
Fig. 3 illustrates a physical structure diagram of an electronic device, which may include, as shown in fig. 3: a processor (processor)301, a memory (memory)302, a communication Interface (Communications Interface)303 and a communication bus 304, wherein the processor 301, the memory 302 and the communication Interface 303 complete communication with each other through the communication bus 304. The processor 301 may call logic instructions in the memory 302 to perform the following method: when a resource acquisition request of a first user is detected, acquiring first identity information bound by the first user, determining a first identity tag of the first user according to the first identity information, and judging whether a request range corresponding to the resource acquisition request corresponds to a large data range corresponding to the first identity tag or not; when the request range corresponding to the resource obtaining request does not correspond to the big data range corresponding to the first identity tag, obtaining a second user related to the first identity information; acquiring second identity information bound by a second user, determining a second identity label of the second user according to the second identity information, and judging whether a request range corresponding to the resource acquisition request corresponds to a big data range corresponding to the second identity label; and when the request range corresponding to the resource acquisition request corresponds to the big data range corresponding to the second identity tag, determining the corresponding big data resource according to the resource acquisition request, and performing resource optimization and pushing on the big data resource according to the second identity tag.
Furthermore, the logic instructions in the memory 302 may be implemented in software functional units and stored in a computer readable storage medium when sold or used as a stand-alone product. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, an embodiment of the present invention further provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is implemented to perform the transmission method provided in the foregoing embodiments when executed by a processor, and for example, the method includes: when a resource acquisition request of a first user is detected, acquiring first identity information bound by the first user, determining a first identity tag of the first user according to the first identity information, and judging whether a request range corresponding to the resource acquisition request corresponds to a large data range corresponding to the first identity tag or not; when the request range corresponding to the resource obtaining request does not correspond to the big data range corresponding to the first identity tag, obtaining a second user related to the first identity information; acquiring second identity information bound by a second user, determining a second identity label of the second user according to the second identity information, and judging whether a request range corresponding to the resource acquisition request corresponds to a big data range corresponding to the second identity label; and when the request range corresponding to the resource acquisition request corresponds to the big data range corresponding to the second identity tag, determining the corresponding big data resource according to the resource acquisition request, and performing resource optimization and pushing on the big data resource according to the second identity tag.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A big data intelligent pushing method is characterized by comprising the following steps:
when a resource acquisition request of a first user is detected, acquiring first identity information bound by the first user, determining a first identity tag of the first user according to the first identity information, and judging whether a request range corresponding to the resource acquisition request corresponds to a large data range corresponding to the first identity tag;
when the request range corresponding to the resource acquisition request does not correspond to the big data range corresponding to the first identity tag, acquiring a second user associated in the first identity information;
acquiring second identity information bound by the second user, determining a second identity label of the second user according to the second identity information, and judging whether a request range corresponding to the resource acquisition request corresponds to a big data range corresponding to the second identity label;
and when the request range corresponding to the resource acquisition request corresponds to the big data range corresponding to the second identity tag, determining the corresponding big data resource according to the resource acquisition request, and performing resource optimization and pushing on the big data resource according to the second identity tag.
2. The intelligent big data pushing method according to claim 1, wherein after determining whether the request range corresponding to the resource obtaining request corresponds to the big data range corresponding to the second identity tag, the method further comprises:
when the request range corresponding to the resource acquisition request does not correspond to the big data range corresponding to the second identity tag, acquiring security verification information preset by the first user, and sending the security verification information to a terminal corresponding to the resource acquisition request;
and when the received feedback information of the safety verification information passes, pushing the corresponding big data resource according to the resource acquisition request.
3. The big data intelligent pushing method according to claim 2, wherein after the received feedback information of the security verification information passes, the method includes:
and acquiring a corresponding request data range according to the resource acquisition request, and merging the request data range into a big data range corresponding to the first identity tag and updating.
4. The big data intelligent pushing method according to claim 2, wherein after the received feedback information of the security verification information passes, the method includes:
and acquiring a corresponding request data range according to the resource acquisition request, and merging the request data range into a big data range corresponding to the first identity tag and updating.
5. The big data intelligent pushing method according to claim 1, wherein the big data range corresponding to the first identity tag comprises:
and determining a corresponding possible search range according to the first identity tag, acquiring a historical search record of the first user, and determining a big data range corresponding to the first identity tag according to the possible search range and the historical search record.
6. The big data intelligent pushing device is characterized by comprising:
the device comprises a detection module, a resource obtaining module and a resource obtaining module, wherein the detection module is used for obtaining first identity information bound by a first user when a resource obtaining request of the first user is detected, determining a first identity label of the first user according to the first identity information, and judging whether a request range corresponding to the resource obtaining request corresponds to a large data range corresponding to the first identity label or not;
a first obtaining module, configured to obtain a second user associated with the first identity information when a request range corresponding to the resource obtaining request does not correspond to a big data range corresponding to the first identity tag;
a second obtaining module, configured to obtain second identity information bound by the second user, determine a second identity tag of the second user according to the second identity information, and determine whether a request range corresponding to the resource obtaining request corresponds to a big data range corresponding to the second identity tag;
and the pushing module is used for determining the corresponding big data resource according to the resource acquisition request when the request range corresponding to the resource acquisition request corresponds to the big data range corresponding to the second identity tag, and performing resource optimization and pushing on the big data resource according to the second identity tag.
7. The big data intelligent pushing device according to claim 6, wherein the device further comprises:
a third obtaining module, configured to obtain security verification information preset by the first user when a request range corresponding to the resource obtaining request does not correspond to a big data range corresponding to the second identity tag, and send the security verification information to a terminal corresponding to the resource obtaining request;
and the second pushing module is used for pushing the corresponding big data resource according to the resource acquisition request when the received feedback information of the security verification information passes.
8. The big data intelligent pushing device according to claim 6, wherein the device further comprises:
and the updating module is used for acquiring a corresponding request data range according to the resource acquisition request, merging the request data range into a large data range corresponding to the first identity tag and updating.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the big data intelligent pushing method according to any one of claims 1 to 5 when executing the program.
10. A non-transitory computer readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the steps of the big data intelligent pushing method according to any one of claims 1 to 5.
CN202111597540.9A 2021-12-24 2021-12-24 Intelligent big data pushing method and device Pending CN114238771A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111597540.9A CN114238771A (en) 2021-12-24 2021-12-24 Intelligent big data pushing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111597540.9A CN114238771A (en) 2021-12-24 2021-12-24 Intelligent big data pushing method and device

Publications (1)

Publication Number Publication Date
CN114238771A true CN114238771A (en) 2022-03-25

Family

ID=80762556

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111597540.9A Pending CN114238771A (en) 2021-12-24 2021-12-24 Intelligent big data pushing method and device

Country Status (1)

Country Link
CN (1) CN114238771A (en)

Similar Documents

Publication Publication Date Title
CN109543891B (en) Method and apparatus for establishing capacity prediction model, and computer-readable storage medium
CN112115511A (en) Authority verification method, device and system, and service authority configuration method and device
CN110619545A (en) Big data-based vehicle insurance data pushing method, system, equipment and storage medium
CN113205130B (en) Data auditing method and device, electronic equipment and storage medium
CN111241402A (en) Information pushing method and device, electronic equipment and readable storage medium
CN106529281A (en) Executable file processing method and device
CN104021324A (en) Method and device for writing safety verification
CN114238771A (en) Intelligent big data pushing method and device
CN111045725A (en) Control method, device and storage medium of code management system
CN110825947A (en) URL duplicate removal method, device, equipment and computer readable storage medium
CN111949363A (en) Service access management method, computer equipment, storage medium and system
CN113297583B (en) Vulnerability risk analysis method, device, equipment and storage medium
CN114255134A (en) Account number disassembling method and device and storage medium
CN114841267A (en) Real-time prediction method and device, electronic equipment and computer program product
CN114417431A (en) File archiving method and device
CN113240499A (en) Order processing method and device based on system switching
CN113704251A (en) Method and device for layout of home page of distributed storage database all-in-one machine
CN113342647A (en) Test data generation method and device
CN111901299A (en) Application authentication method and device, electronic equipment and storage medium
CN113660277B (en) Crawler-resisting method based on multiplexing embedded point information and processing terminal
CN115495911B (en) Model renaming method, device and storage medium
CN116881880B (en) Space-time data management system and space-time data service resource cooperative scheduling method
CN109933573B (en) Database service updating method, device and system
CN111178044B (en) Method and device for determining target text elements
CN110363425B (en) Cross-platform object identification method, device, system, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination