Disclosure of Invention
The embodiment of the application aims to provide a product delivery method based on privacy protection and related equipment thereof, so as to solve the problem of low user conversion rate of a target user.
In order to solve the above technical problem, an embodiment of the present application provides a product delivery method based on privacy protection, which adopts the following technical solutions:
determining overlapped users, label missing users and a target prediction model according to a first data party and a second data party through privacy set intersection; the overlapping users are overlapping users in a first data party and a second data party; the label missing user is a user without a user label in the overlapped users, and the user label is used for indicating whether the user purchases a target product; the target prediction model is a network model pre-trained by the second data party and used for predicting a user label of a user; predicting a user tag of the tag-missing user using the target prediction model; extracting a preset number of releasing users from the label missing users, and releasing the target products to the releasing users; the releasing user is any user of the user with the lost label, the label of which is predicted to buy the target product; obtaining a release result, and calculating the user conversion rate of the release user according to the release result; the releasing result comprises the number of users of releasing users and the number of users who purchase the target product in the releasing users; when the user conversion rate is larger than a preset threshold value, acquiring an initial user in the overlapped users; the user tags of the initial users are all the target products for purchase; acquiring a user portrait corresponding to the initial user in the first data party, and determining a user same as the user portrait as a target user; and releasing the target product to the target user.
Further, the determining overlapping users according to the first data party and the second data party by privacy set intersection includes: acquiring product purchase information of the user on the product in the second data party; the product comprises the target product; determining a corresponding user corresponding to the product purchase information of the user in the first data party by using privacy set intersection; and determining the corresponding user as an overlapping user.
Further, the determining the target prediction model includes: acquiring user information of a tag user; the label user is a user with a user label in the overlapped users, and the user information comprises user consumption information in the first data party and product purchase information of the product by the user in the second data party; and performing user label prediction training on a preset network model by using a longitudinal federated learning algorithm and the user information of the label user until a loss function is converged to obtain the target prediction model.
Further, after calculating the user conversion rate of the release user according to the release result, the product release method further includes: when the user conversion rate is smaller than or equal to the preset threshold, executing the following cyclic operation on the overlapped users until the user conversion rate is larger than the preset threshold; the cyclic operation includes: acquiring user information of the user with the missing label; updating and training the target prediction model by utilizing a longitudinal federated learning algorithm, the user information of the label user and the user information of the label-missing user until the loss function is converged to obtain an updated target prediction model; the overlapping users comprise the tab users and the tab missing users; predicting the user label of the label-missing user again by using the updated target prediction model; extracting a preset number of circularly releasing users from the label missing users, and releasing the target products to the circularly releasing users; the circularly releasing user is any user of the users with the lost labels, and the label of the user is predicted to buy the target product; and acquiring a circular putting result, and calculating the user conversion rate of the circular putting user according to the circular putting result.
Further, the step of calculating the user conversion rate of the released user according to the release result includes: according to the formula
And calculating the user conversion rate of the releasing user, wherein n is used for representing the user conversion rate of the releasing user, a is used for representing the number of users purchasing the target product in the releasing user, and b is used for representing the number of users of the releasing user.
Further, the obtaining a user representation of the initial user includes: acquiring product purchase information of an initial user on a product in the second data party; the product comprises the target product; and determining a user portrait corresponding to the product purchase information of the initial user in the first data party by utilizing privacy set intersection.
Further, after the target product is released to the target user, the product release method further includes: storing the release data corresponding to the target product to a target block chain; the placement data includes at least a user representation of the target user.
In order to solve the above technical problem, an embodiment of the present application further provides a product delivery device based on privacy protection, which adopts the following technical scheme:
the first determining module is used for determining an overlapped user, a label missing user and a target prediction model according to a first data party and a second data party through privacy set intersection; the overlapping users are overlapping users in a first data party and a second data party; the label missing user is a user without a user label in the overlapped users, and the user label is used for indicating whether the user purchases a target product; the target prediction model is a network model pre-trained by the second data party and used for predicting a user label of a user; a label prediction module for predicting the user label of the label-missing user using the target prediction model; the first releasing module is used for extracting a preset number of releasing users from the label missing users and releasing the target product to the releasing users; the releasing user is any user of the user with the lost label, the label of which is predicted to buy the target product; the calculation module is used for acquiring a release result and calculating the user conversion rate of the release user according to the release result; the releasing result comprises the number of users of releasing users and the number of users who purchase the target product in the releasing users; the user obtaining module is used for obtaining an initial user in the overlapped users when the user conversion rate is greater than a preset threshold value; the user tags of the initial users are all the target products for purchase; the second determining module is used for acquiring a user portrait corresponding to the initial user in the first data party and determining a user identical to the user portrait as a target user; and the second delivery module is used for delivering the target product to the target user.
Further, the first determining module comprises a first obtaining sub-module, a first determining sub-module and a second determining sub-module; the first obtaining submodule is used for obtaining product purchasing information of the user on the product in the second data party; the product comprises the target product; the first determining submodule is used for determining a corresponding user corresponding to the product purchasing information of the user in the first data party by utilizing privacy set intersection; the second determining submodule is configured to determine the corresponding user as an overlapping user.
Further, the first determining module further comprises a second obtaining sub-module and a training sub-module; the second obtaining submodule is used for obtaining the user information of the tag user; the label user is a user with a user label in the overlapped users, and the user information comprises user consumption information in the first data party and product purchase information of the product by the user in the second data party; and the training submodule is used for carrying out user label prediction training on a preset network model by utilizing a longitudinal federated learning algorithm and the user information of the label user until a loss function is converged to obtain the target prediction model.
Further, the product delivery device based on privacy protection further comprises a processing module; the processing module is used for executing the following cyclic operation on the overlapped users when the user conversion rate is smaller than or equal to the preset threshold value until the user conversion rate is larger than the preset threshold value; the cyclic operation includes: acquiring user information of the user with the missing label; updating and training the target prediction model by utilizing a longitudinal federated learning algorithm, the user information of the label user and the user information of the label-missing user until the loss function is converged to obtain an updated target prediction model; the overlapping users comprise the tab users and the tab missing users; predicting the user label of the label-missing user again by using the updated target prediction model; extracting a preset number of circularly releasing users from the label missing users, and releasing the target products to the circularly releasing users; the circularly releasing user is any user of the users with the lost labels, and the label of the user is predicted to buy the target product; and acquiring a circular putting result, and calculating the user conversion rate of the circular putting user according to the circular putting result.
Further, the delivery result includes a number of users who purchased the target product, and the calculation module is specifically configured to calculate the target product according to a formula
ComputingAnd the user conversion rate of the releasing user, wherein n is used for representing the user conversion rate of the releasing user, a is used for representing the number of users purchasing the target product in the releasing user, and b is used for representing the number of users of the releasing user.
Further, the second acquisition module comprises an information acquisition sub-module and an image determination sub-module; the information acquisition submodule is used for acquiring product purchase information of an initial user on a product in the second data party; the product comprises the target product; the portrait determination sub-module is used for determining a user portrait corresponding to the product purchase information of the initial user in the first data party by means of privacy set intersection.
Further, the product delivery device based on privacy protection further comprises a storage module; the storage module is used for storing the release data corresponding to the target product to a target block chain; the placement data includes at least a user representation of the target user.
In order to solve the above technical problem, an embodiment of the present application further provides a computer device, which includes a memory and a processor, where the memory stores a computer program, and the processor implements the steps of the product delivery method based on privacy protection when executing the computer program.
In order to solve the above technical problem, an embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the steps of the product delivery method based on privacy protection are implemented.
Compared with the prior art, the embodiment of the application mainly has the following beneficial effects: determining overlapped users, label missing users and a target prediction model, predicting user labels of the label missing users by using the target prediction model, and extracting a preset number of releasing users from the label missing users. The overlapped users are the overlapped users in the first data party and the second data party, namely, the data of the multiple data parties are utilized to pertinently determine the target users, and the accuracy of the determined target users is improved. And then, delivering the target product to the delivery user, acquiring a delivery result, and calculating the user conversion rate of the delivery user according to the delivery result. And when the user conversion rate is greater than a preset threshold value, acquiring a user portrait of an initial user in the overlapped users, and determining a user with the same portrait as the user portrait as a target user needing to put in a target product. In the method, trial delivery is firstly carried out on part of users (namely delivery users) in overlapped users, and when the user conversion rate in the trial delivery is larger than a preset threshold value, the user portrait of an initial user is determined, so that a target user is determined. The problem of high customer acquisition cost caused by directly taking all users entering the Internet as target users is solved, and the user conversion rate is improved.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "including" and "having," and any variations thereof, in the description and claims of this application and the description of the above figures are intended to cover non-exclusive inclusions. The terms "first," "second," and the like in the description and claims of this application or in the above-described drawings are used for distinguishing between different objects and not for describing a particular order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various communication client applications installed thereon, such as a web browser application, a shopping application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture experts Group Audio Layer III, mpeg compression standard Audio Layer 3), MP4 players (Moving Picture experts Group Audio Layer IV, mpeg compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background server providing support for pages displayed on the terminal devices 101, 102, 103.
It should be noted that the product delivery method based on privacy protection provided in this embodiment may be applied to the server device 105, and may also be applied to the terminal devices 101, 102, and 103. The server device 105 and the terminal devices 101, 102, 103 may be collectively referred to as electronic devices. That is, an executive subject of the privacy protection-based product delivery method provided in the embodiment of the present application may be a privacy protection-based product delivery apparatus, and the privacy protection-based product delivery apparatus may be the electronic device (e.g., the server device 105 or the terminal devices 101, 102, and 103).
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for an implementation.
With continued reference to FIG. 2, a flowchart of one embodiment of a privacy-based product delivery method according to the present application is shown. The product release method based on privacy protection comprises the following steps:
and step S21, determining overlapped users, label-missing users and a target prediction model according to the first data party and the second data party through privacy set intersection.
The overlapping users are the overlapping users in the first data party and the second data party; the label missing user is a user without a user label in the overlapped users, and the user label is used for indicating whether the user purchases a target product; the target prediction model is used to predict a user label of a user. The first data party is a data party including consumption information (such as annual consumption amount) of the user, for example, an internet company, an e-commerce company and the like; the second data party is a data party including product purchase information (such as underwriting information and claim settlement information) of the product purchased by the user, for example, when the product is an insurance product, the second data party may be an insurance company. Wherein, the product comprises the target product to be released in the application.
Specifically, fig. 3 is a flowchart of a method for determining an overlapped user according to a first data party and a second data party, and as shown in fig. 3, the method includes the following steps S211 to S213.
And step S211, acquiring product purchase information of the user on the product in the second data party.
Wherein the product comprises a target product.
Step S212, determining a corresponding user corresponding to the product purchase information of the user in the first data party by utilizing the privacy set intersection.
Because the first data side comprises the consumption information of the user, the second user side comprises the product purchase information of the user, and the consumption information and the product purchase information of the user are both the privacy information of the user. Therefore, in order to avoid leakage of the user privacy information, a corresponding user corresponding to the product purchase information of the user in the first data party is determined by using a Privacy Set Interaction (PSI). The PSI means that the first data party and the second data party obtain an intersection of data held by the two parties (i.e. corresponding users) without revealing any additional information.
Specifically, the first data party and the second data party both establish communication connection with the PSI server, and hash the data of the first data party and the second data party according to the salt value (salt) obtained from the PSI server to obtain a hash result. And then, sending a hash result to the PSI server, and carrying out PSI processing on the hash result of the first data party and the hash result of the second data party by the PSI server to obtain the information of the user with intersection in the first data party and the second data party. And finally, determining the corresponding user according to the information of the user with intersection in the first data party and the second data party, which is sent by the PSI server.
In step S213, the corresponding user is determined as an overlapping user.
In the embodiment, the target user is determined in a targeted manner by using the data of a plurality of data parties, so that the accuracy of the determined target user is improved. And overlapping users in the first data party and the second data party are determined by privacy set intersection, so that the privacy of the users can be prevented from being revealed.
And then, determining the users with the labels missing in the overlapped users according to the product purchase information of the overlapped users. Specifically, when the product purchase information of the user does not include the user tag, it is determined that the user is a tag-missing user.
Finally, a target prediction model is determined.
Specifically, fig. 4 is a flowchart of a method for determining a target prediction model, and as shown in fig. 4, the method includes the following steps S214 to S215.
Step S214, user information of the label user is obtained.
The label user is a user with a user label in the overlapped users, and the user information comprises user consumption information in the first data party and product purchase information of the product by the user in the second data party.
And S215, performing user label prediction training on the preset network model by using a longitudinal federated learning algorithm and user information of the label user until the loss function is converged to obtain a target prediction model.
Specifically, a first data party establishes a local network model, and a second data party establishes a preset network model. Then, the first data party and the second data party establish communication connection with a cooperation party (used for cooperating the second data party to train the target prediction model), and obtain a public key from the cooperation party.
The first data party encrypts the data characteristics in the user consumption information by using the public key to obtain a first encryption result, and sends the first encryption result to the second data party. And the second data party encrypts the data characteristics in the product purchase information by using the public key to obtain a second encryption result, and sends the second encryption result to the second data party. Wherein the user personal information of the target tag user (any one of the tag users) in the first data side and the second data side is the same, but the characteristic data is different. For example, the first data party includes the mobile phone number, age, sex, and annual consumption amount of the target tag user, and the second data party includes the mobile phone number, annual premium, and whether to purchase the target product (user tag). The personal information of the target label user in the first data party and the second data party is a mobile phone number; the characteristic data of the target tag user in the first data party are age, gender and annual consumption amount; the characteristic data of the target tag user in the second data party is annual premiums; target tag the user tag of the user in the second data party is whether to purchase the target product.
And after receiving the first encryption result, the second data party calculates the local encryption gradient and the encryption loss corresponding to the second data party according to the first encryption result and the data characteristics in the product purchase information, adds an additional mask to the local encryption gradient and the encryption loss corresponding to the second data party, and sends the additional mask to the cooperative party. And after receiving the second encryption result, the first data party calculates the local encryption gradient corresponding to the first data party according to the second encryption result and the data characteristics in the user consumption information, adds an additional mask code to the local encryption gradient corresponding to the first data party and then sends the added mask code to the cooperative party.
And after receiving the local encryption gradient and the encryption loss corresponding to the second data party and the local encryption gradient corresponding to the first data party, the cooperative party decrypts the local encryption gradient and the encryption loss corresponding to the second data party and the local encryption gradient corresponding to the first data party by using a private key corresponding to the public key to obtain a complete gradient, and transmits the complete gradient back to the first data party and the second data party.
Finally, the first data party removes the additional mask on the complete gradient to obtain the complete gradient, and updates the local network model according to the complete gradient; and the second data side removes the additional mask on the complete gradient to obtain the complete gradient, and updates the preset network model according to the complete gradient until the loss function corresponding to the preset network model converges to obtain the target prediction model.
In the embodiment, a longitudinal federated learning technology is used, a logistic regression mode is adopted to train the target prediction model, and data of the first data party and data of the second data party are stored locally in the whole training process, so that the privacy of a user can be ensured not to be revealed.
In step S22, the user label of the label-missing user is predicted using the target prediction model.
Specifically, user consumption information and product purchase information of the user with the label missing are input into the target prediction model, and the user label of the user with the label missing is obtained.
And step S23, extracting a preset number of releasing users from the users with the missing labels, and releasing the target products to the releasing users.
The released user is any user of which the user label is predicted to buy the target product in the user with the label missing. The preset number value can be a default value or a value set by related personnel according to specific conditions. For example, the preset number is 10% of the number of overlapping users.
And step S24, obtaining the releasing result and calculating the user conversion rate of the releasing user according to the releasing result.
In particular, according to the formula
And calculating the user conversion rate of the releasing user, wherein n is used for representing the user conversion rate of the releasing user, a is used for representing the number of users purchasing the target product in the releasing user, and b is used for representing the number of users of the releasing user.
Optionally, when the user conversion rate is less than or equal to the preset threshold, the following loop operation is performed on the overlapped user until the user conversion rate is greater than the preset threshold. The preset threshold may be a default value or a numerical value set by a relevant person according to a specific situation. For example, the preset threshold is 60%.
Specifically, the cyclic operation includes: and obtaining user information of the label-missing user, and updating and training the target prediction model by utilizing a longitudinal federal learning algorithm, the user information of the label user and the user information of the label-missing user until the loss function is converged to obtain an updated target prediction model. Wherein the overlapped users comprise tagged users and users with missing tags. And then, predicting the user labels of the users with the labels missing again by using the updated target prediction model, and extracting a preset number of circularly delivered users from the users with the labels missing. And then, delivering the target product to the circular delivery user, and acquiring a circular delivery result. And finally, calculating the user conversion rate of the circularly launched user according to the circularly launched result. The circularly releasing user is any user of which the user label is predicted to buy the target product in the label-missing user. The specific implementation process of the loop operation is the same as that of steps S21-S25, and is not described here again.
In this embodiment, when the user conversion rate of the randomly extracted drop users is less than or equal to the preset threshold, the target prediction model is trained and updated until the user conversion rate of the randomly extracted drop users is greater than the preset threshold, so that the prediction accuracy of the updated target prediction model is ensured, and the user conversion rate of the determined target users is improved.
And step S25, when the user conversion rate is greater than a preset threshold value, acquiring an initial user of the overlapped users.
Wherein, the user tags of the initial users are all purchase target products.
In step S26, a user representation corresponding to the first data party of the initial user is obtained, and the user with the same representation is determined as the target user.
Specifically, product purchase information of an initial user on a product in the second data party is obtained, and a user portrait corresponding to the product purchase information of the initial user in the first data party is determined by means of privacy set intersection. The process of determining the user profile is the same as the process of determining the overlapped users in steps S211 to S213, and is not described herein again.
In the embodiment, the user portrait corresponding to the product purchase information of the initial user is determined by using the privacy set intersection, so that the privacy of the user can be ensured not to be leaked.
And step S27, the target product is released to the target user.
Specifically, target products are delivered to target users in batches by using a preset delivery mode. For example, the target product is delivered to the target user by using a marketing short message.
Optionally, fig. 5 is a flowchart of another embodiment of the product delivery method based on privacy protection according to the present application, and referring to fig. 5, after step S27, the method further includes the following step S28.
And step S28, storing the release data corresponding to the target product to the target block chain. Wherein the placement data comprises at least a user representation of the target user. In this embodiment, the delivery data corresponding to the target product is stored in the target block chain, so that the delivery data can be guaranteed to be real and credible, and subsequent statistics and monitoring of the conversion result of delivery of the target product are facilitated.
In this embodiment, an overlapped user, a label-missing user, and a target prediction model are determined, a user label of the label-missing user is predicted by using the target prediction model, and a preset number of released users are extracted from the label-missing users. The overlapped users are the overlapped users in the first data party and the second data party, namely, the data of the multiple data parties are utilized to pertinently determine the target users, and the accuracy of the determined target users is improved. And then, delivering the target product to the delivery user, acquiring a delivery result, and calculating the user conversion rate of the delivery user according to the delivery result. And when the user conversion rate is greater than a preset threshold value, acquiring a user portrait of an initial user in the overlapped users, and determining a user with the same portrait as the user portrait as a target user needing to put in a target product. In the application, trial delivery is firstly carried out on part of users (namely delivery users) in overlapped users, and when the conversion rate of the users in the trial delivery is larger than a preset threshold value, the user portrait of the initial user is determined, so that the target user is determined. The problem of high customer acquisition cost caused by directly taking all users entering the Internet as target users is solved, and the user conversion rate is improved.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and can include the processes of the embodiments of the methods described above when the computer program is executed. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random Access Memory (RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
With further reference to fig. 6, as an implementation of the method shown in fig. 2, the present application provides an embodiment of a product delivery apparatus based on privacy protection, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be specifically applied to various electronic devices.
As shown in fig. 6, the privacy-protection-based product delivery apparatus 600 of the present embodiment includes: a first determining module 601, a tag predicting module 602, a first delivering module 603, a calculating module 604, a user obtaining module 605, a second determining module 606 and a second delivering module 607, wherein:
a first determining module 601, configured to determine, according to a first data party and a second data party, an overlapping user, a tag missing user, and a target prediction model through privacy set intersection; the overlapping users are overlapping users in a first data party and a second data party; the label missing user is a user without a user label in the overlapped users, and the user label is used for indicating whether the user purchases a target product; the target prediction model is a network model pre-trained by the second data party and used for predicting a user label of a user; a tag prediction module 602, configured to predict a user tag of the user with the missing tag using the target prediction model; a first releasing module 603, configured to extract a preset number of releasing users from the users with missing tags, and release the target product to the releasing users; the releasing user is any user of the user with the lost label, the label of which is predicted to buy the target product; a calculating module 604, configured to obtain a delivery result, and calculate a user conversion rate of the delivery user according to the delivery result; the releasing result comprises the number of users of releasing users and the number of users who purchase the target product in the releasing users; a user obtaining module 605, configured to obtain an initial user of the overlapping users when the user conversion rate is greater than a preset threshold; the user tags of the initial users are all the target products for purchase; a second determining module 606, configured to obtain a user portrait corresponding to the initial user in the first data party, and determine a user that is the same as the user portrait as a target user; a second releasing module 607, configured to release the target product to the target user.
In this embodiment, an overlapped user, a label missing user, and a target prediction model are determined, a user label of the label missing user is predicted by using the target prediction model, and a preset number of released users are extracted from the label missing user. The overlapped users are the overlapped users in the first data party and the second data party, namely, the data of the multiple data parties are utilized to pertinently determine the target users, and the accuracy of the determined target users is improved. And then, delivering the target product to the delivery user, acquiring a delivery result, and calculating the user conversion rate of the delivery user according to the delivery result. And when the user conversion rate is greater than a preset threshold value, acquiring a user portrait of an initial user in the overlapped users, and determining a user with the same portrait as the user portrait as a target user needing to put in a target product. In the method, trial delivery is firstly carried out on part of users (namely delivery users) in overlapped users, and when the user conversion rate in the trial delivery is larger than a preset threshold value, the user portrait of an initial user is determined, so that a target user is determined. The problem of high customer acquisition cost caused by directly taking all users entering the Internet as target users is solved, and the user conversion rate is improved.
In some possible implementation manners of this embodiment, the first determining module 601 includes a first obtaining sub-module, a first determining sub-module, and a second determining sub-module; the first obtaining submodule is used for obtaining product purchasing information of the user on the product in the second data party; the product comprises the target product; the first determining submodule is used for determining a corresponding user corresponding to the product purchasing information of the user in the first data party by utilizing privacy set intersection; the second determining submodule is configured to determine the corresponding user as an overlapping user.
In the embodiment, the target user is determined in a targeted manner by using the data of a plurality of data parties, so that the accuracy of the determined target user is improved. And the overlapping users in the first data party and the second data party are determined by the privacy set intersection, so that the privacy of the users can be ensured not to be revealed.
In some optional implementations of this embodiment, the first determining module 601 further includes a second obtaining sub-module and a training sub-module; the second obtaining submodule is used for obtaining the user information of the tag user; the label user is a user with a user label in the overlapped users, and the user information comprises user consumption information in the first data party and product purchase information of the product by the user in the second data party; and the training submodule is used for carrying out user label prediction training on a preset network model by utilizing a longitudinal federated learning algorithm and the user information of the label user until a loss function is converged to obtain the target prediction model.
In the embodiment, a longitudinal federated learning technology is used, a logistic regression mode is adopted to train the target prediction model, and data of the first data party and data of the second data party are stored locally in the whole training process, so that the privacy of a user can be ensured not to be revealed.
In some possible implementation manners of this embodiment, the product delivery apparatus based on privacy protection further includes a processing module; the processing module is used for executing the following cyclic operation on the overlapped users when the user conversion rate is smaller than or equal to the preset threshold value until the user conversion rate is larger than the preset threshold value; the cyclic operation includes: acquiring user information of the user with the missing label; updating and training the target prediction model by utilizing a longitudinal federated learning algorithm, the user information of the label user and the user information of the label-missing user until the loss function is converged to obtain an updated target prediction model; the overlapping users comprise the tab users and the tab missing users; predicting the user label of the label-missing user again by using the updated target prediction model; extracting a preset number of circularly releasing users from the label missing users, and releasing the target products to the circularly releasing users; the circularly releasing user is any user of the users with the lost labels, and the label of the user is predicted to buy the target product; and acquiring a circular putting result, and calculating the user conversion rate of the circular putting user according to the circular putting result.
In this embodiment, when the user conversion rate of the randomly extracted drop users is less than or equal to the preset threshold, the target prediction model is trained and updated until the user conversion rate of the randomly extracted drop users is greater than the preset threshold, so that the prediction accuracy of the updated target prediction model is ensured, and the user conversion rate of the determined target users is improved.
In some possible implementations of this embodiment, the delivery result includes a number of users who purchased the target product, and the calculating
module 604 is specifically configured to calculate the target product according to a formula
And calculating the user conversion rate of the releasing user, wherein n is used for representing the user conversion rate of the releasing user, a is used for representing the number of users purchasing the target product in the releasing user, and b is used for representing the number of users of the releasing user.
In some possible implementations of this embodiment, the user obtaining module 605 includes an information obtaining sub-module and a portrait determining sub-module; the information acquisition submodule is used for acquiring product purchase information of an initial user on a product in the second data party; the product comprises the target product; the portrait determination submodule is used for determining the user portrait corresponding to the product purchase information of the initial user in the first data party by utilizing privacy set intersection.
In the embodiment, the user portrait corresponding to the product purchase information of the initial user is determined by using the privacy set intersection, so that the privacy of the user can be ensured not to be leaked.
In some possible implementation manners of this embodiment, the product delivery device based on privacy protection further includes a storage module; the storage module is used for storing the release data corresponding to the target product to a target block chain; the placement data includes at least a user representation of the target user.
In this embodiment, the release data corresponding to the target product is stored in the target block chain, so that the release data can be guaranteed to be real and credible, and the subsequent statistics and monitoring of the conversion result of the release of the target product are facilitated.
In order to solve the technical problem, the embodiment of the application further provides computer equipment. Referring to fig. 7, fig. 7 is a block diagram of a basic structure of a computer device according to the present embodiment.
The computer device 7 comprises a memory 71, a processor 72, a network interface 73, which are communicatively connected to each other via a system bus. It is noted that only a computer device 7 having components 71-73 is shown, but it is to be understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead. As will be understood by those skilled in the art, the computer device is a device capable of automatically performing numerical calculation and/or information processing according to instructions set or stored in advance, and the hardware thereof includes but is not limited to a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The computer device can be a desktop computer, a notebook, a palm computer, a cloud server and other computing devices. The computer equipment can carry out man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch panel or voice control equipment and the like.
The memory 71 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the storage 71 may be an internal storage unit of the computer device 7, such as a hard disk or a memory of the computer device 7. In other embodiments, the memory 71 may also be an external storage device of the computer device 7, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the computer device 7. Of course, the memory 71 may also comprise both an internal storage unit of the computer device 7 and an external storage device thereof. In this embodiment, the memory 71 is generally used for storing an operating system and various application software installed on the computer device 7, such as computer readable instructions of a product delivery method based on privacy protection, and the like. Further, the memory 71 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 72 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 72 is typically arranged to control the overall operation of the computer device 7. In this embodiment, the processor 72 is configured to execute the computer readable instructions or process data stored in the memory 71, for example, execute the computer readable instructions of the product delivery method based on privacy protection.
The network interface 73 may comprise a wireless network interface or a wired network interface, and the network interface 73 is generally used for establishing a communication connection between the computer device 7 and other electronic devices.
The computer device provided in this embodiment may perform the steps of the product delivery method based on privacy protection. Here, the steps of the product delivery method based on privacy protection may be steps of the product delivery method based on privacy protection of the above embodiments.
In this embodiment, an overlapped user, a label missing user, and a target prediction model are determined, a user label of the label missing user is predicted by using the target prediction model, and a preset number of released users are extracted from the label missing user. The overlapped users are the overlapped users in the first data party and the second data party, namely, the data of the multiple data parties are utilized to pertinently determine the target users, and the accuracy of the determined target users is improved. And then, releasing the target product to the releasing user, acquiring a releasing result, and calculating the user conversion rate of the releasing user according to the releasing result. And when the user conversion rate is greater than a preset threshold value, acquiring a user portrait of an initial user in the overlapped users, and determining a user with the same portrait as the user portrait as a target user needing to put in a target product. In the method, trial delivery is firstly carried out on part of users (namely delivery users) in overlapped users, and when the user conversion rate in the trial delivery is larger than a preset threshold value, the user portrait of an initial user is determined, so that a target user is determined. The problem of high customer acquisition cost caused by directly taking all users entering the Internet as target users is solved, and the user conversion rate is improved.
The present application further provides another embodiment, which is to provide a computer-readable storage medium storing computer-readable instructions executable by at least one processor to cause the at least one processor to perform the steps of the privacy-based product delivery method as described above.
In this embodiment, an overlapped user, a label missing user, and a target prediction model are determined, a user label of the label missing user is predicted by using the target prediction model, and a preset number of released users are extracted from the label missing user. The overlapped users are the overlapped users in the first data party and the second data party, namely, the data of the multiple data parties are utilized to pertinently determine the target users, and the accuracy of the determined target users is improved. And then, delivering the target product to the delivery user, acquiring a delivery result, and calculating the user conversion rate of the delivery user according to the delivery result. And when the user conversion rate is greater than a preset threshold value, acquiring a user portrait of an initial user in the overlapped users, and determining a user with the same portrait as the user portrait as a target user needing to put in a target product. In the method, trial delivery is firstly carried out on part of users (namely delivery users) in overlapped users, and when the user conversion rate in the trial delivery is larger than a preset threshold value, the user portrait of an initial user is determined, so that a target user is determined. The problem that all users entering the Internet are directly regarded as target users, so that customer acquisition cost is high is solved, and user conversion rate is improved.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application or portions thereof that contribute to the prior art may be embodied in the form of a software product, where the computer software product is stored in a storage medium (such as a ROM/RAM, a magnetic disk, and an optical disk), and includes several instructions for enabling a terminal device (which may be a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
It is to be understood that the above-described embodiments are merely illustrative of some, but not restrictive, of the broad invention, and that the appended drawings illustrate preferred embodiments of the invention and do not limit the scope of the invention. This application is capable of embodiments in many different forms and is provided for the purpose of enabling a thorough understanding of the disclosure of the application. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to one skilled in the art that the present application may be practiced without modification or with equivalents of some of the features described in the foregoing embodiments. All equivalent structures made by using the contents of the specification and the drawings of the present application are directly or indirectly applied to other related technical fields and are within the protection scope of the present application.