CN110674832B - Method, device and terminal for identifying enterprise to which Internet user belongs - Google Patents
Method, device and terminal for identifying enterprise to which Internet user belongs Download PDFInfo
- Publication number
- CN110674832B CN110674832B CN201810717283.XA CN201810717283A CN110674832B CN 110674832 B CN110674832 B CN 110674832B CN 201810717283 A CN201810717283 A CN 201810717283A CN 110674832 B CN110674832 B CN 110674832B
- Authority
- CN
- China
- Prior art keywords
- enterprise
- access point
- wireless network
- wireless access
- wireless
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F18/00—Pattern recognition
- G06F18/20—Analysing
- G06F18/23—Clustering techniques
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W48/00—Access restriction; Network selection; Access point selection
- H04W48/16—Discovering, processing access restriction or access information
Landscapes
- Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Theoretical Computer Science (AREA)
- Bioinformatics & Computational Biology (AREA)
- Evolutionary Biology (AREA)
- Life Sciences & Earth Sciences (AREA)
- Artificial Intelligence (AREA)
- Bioinformatics & Cheminformatics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Signal Processing (AREA)
- Evolutionary Computation (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The invention provides an identification method, a device and a terminal of an enterprise to which an internet user belongs, wherein the method comprises the following steps: acquiring a service set identifier for accessing a wireless access point, and screening out an enterprise wireless network according to the service set identifier and a physical address of the wireless access point; constructing an enterprise information base, and extracting entity characteristics of enterprises from the enterprise information base; calculating the similarity between the entity characteristics of the enterprise wireless network and the enterprise to establish a first mapping relation between the enterprise wireless network and the enterprise; acquiring data information of a target user using a wireless access point to establish a second mapping relation between the wireless access point and the target user; and generating an identification result of the enterprise to which the target user belongs according to the first mapping relation and the second mapping relation.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a method, a device and a terminal for identifying an enterprise to which an internet user belongs.
Background
With the development of internet big data, how to mine the company of the user is always the technical bottleneck of user image, and the accuracy rate of judging the company to which the user belongs is low. However, it is increasingly important to mine the companies to which the user belongs, for example, in terms of financial governance, the companies of the user, representing their income level, job stability, have a great value in assessing the credit level of the user and reasonably granting credit. In the internet information flow product, if the company of the user is known, the user attribute and the interest can be estimated, and the income for improving the information recommendation algorithm is huge.
At present, two methods are used for mining companies to which users belong, namely a scheme I: the sample collection, feature selection and model training of the company to which the user belongs are limited by the problems of sample scarcity, feature discrimination, various types and the like, and the accuracy and recall of the samples are not satisfactory. Scheme II: the method has the advantages that users are enabled to initiatively fill companies through computer application programs (APP), small programs and the like, the defects are that the covered users are small in amount, the quality is not guaranteed, the value is limited, and the users are enabled to have worry about invasion of privacy.
Disclosure of Invention
The embodiment of the invention provides an identification method, an identification device and a terminal of an enterprise to which an internet user belongs, and at least solves the technical problems in the prior art.
In a first aspect, an embodiment of the present invention provides a method for identifying an enterprise to which an internet user belongs, including:
acquiring a service set identifier for accessing a wireless access point, and screening out an enterprise wireless network according to the service set identifier and a physical address of the wireless access point;
constructing an enterprise information base, and extracting entity characteristics of enterprises from the enterprise information base;
calculating the similarity between the entity characteristics of the enterprise wireless network and the enterprise so as to establish a first mapping relation between the enterprise wireless network and the enterprise;
acquiring data information of a target user using the wireless access point to establish a second mapping relation between the wireless access point and the target user;
and generating an identification result of the enterprise to which the target user belongs according to the first mapping relation and the second mapping relation.
With reference to the first aspect, in a first implementation manner of the first aspect, the screening out an enterprise-type wireless network according to the service set identifier and a physical address of the wireless access point includes:
clustering the wireless access points according to the service set identifier and the physical address to generate a wireless access point cluster;
and classifying the wireless access point clusters according to the wireless network use characteristics so as to screen out the wireless access point clusters of the enterprise type as the wireless network of the enterprise type.
With reference to the first implementation manner of the first aspect, the present invention provides, in a second implementation manner of the first aspect, the wireless network usage characteristics include at least one of traffic time distribution of the wireless access point cluster, interest point topic characteristics around the wireless access point cluster, and user viscosity of the wireless access point cluster.
With reference to the first aspect, in a third implementation manner of the first aspect, the calculating a similarity between the entity characteristics of the enterprise-class wireless network and the enterprise to establish a first mapping relationship between the enterprise-class wireless network and the enterprise includes:
calculating semantic similarity between the enterprise-like wireless network and entity features of the enterprise according to the service set identifier and the name of the enterprise in the entity features of the enterprise;
calculating the relative distance between the enterprise wireless network and the entity characteristics of the enterprise according to the physical address of the wireless access point and the geographic position of the enterprise;
and establishing the first mapping relation according to the semantic similarity and the relative distance.
With reference to the first aspect, in a fourth implementation manner of the first aspect, the establishing a second mapping relationship between the radio access point and the target user includes:
calculating the probability value of the wireless access point belonging to the access point under the working environment of each target user according to the data information;
and establishing a second mapping relation between the access point and the target user in the working environment according to the probability value.
In a second aspect, an embodiment of the present invention provides an apparatus for identifying an enterprise to which an internet user belongs, including:
the enterprise wireless network screening module is used for acquiring a service set identifier for accessing a wireless access point and screening an enterprise wireless network according to the service set identifier and a physical address of the wireless access point;
the enterprise entity feature extraction module is used for constructing an enterprise information base and extracting entity features of enterprises from the enterprise information base;
the wireless network and enterprise mapping relation establishing module is used for calculating the similarity between the entity characteristics of the enterprise wireless network and the enterprise and establishing a first mapping relation between the enterprise wireless network and the enterprise;
the wireless network and user mapping relation establishing module is used for acquiring data information of a target user using the wireless access point and establishing a second mapping relation between the wireless access point and the target user according to the data information;
and the enterprise identification module is used for generating an identification result of the enterprise to which the target user belongs according to the first mapping relation and the second mapping relation.
With reference to the second aspect, in a first implementation manner of the second aspect, the enterprise-type wireless network screening module includes:
an access point clustering unit, configured to cluster the wireless access points according to the service set identifier and the physical address, and generate a wireless access point cluster;
and the wireless network classifying and screening unit is used for classifying the wireless access point clusters according to the wireless network use characteristics so as to screen out the wireless access point clusters of the enterprise type as the wireless network of the enterprise type.
With reference to the second aspect, in a second implementation manner of the second aspect, the wireless network and enterprise mapping relationship establishing module includes:
a semantic similarity calculation unit, configured to calculate a semantic similarity between the enterprise-class wireless network and an entity feature of the enterprise according to the service set identifier and a name of the enterprise in the entity feature of the enterprise;
the distance calculation unit is used for calculating the relative distance between the enterprise wireless network and the entity characteristics of the enterprise according to the physical address of the wireless access point and the geographic position of the enterprise;
and the first mapping establishing unit is used for establishing the first mapping relation according to the semantic similarity and the relative distance between the enterprise wireless network and the enterprise.
With reference to the second aspect, in a third implementation manner of the second aspect, the wireless network and user mapping relationship establishing module includes:
the probability calculation unit is used for calculating the probability value of the wireless access point belonging to the access point under the working environment of each target user according to the data information;
and the second mapping establishing unit is used for establishing a second mapping relation between the access point and the target user in the working environment according to the probability value.
The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above-described functions.
In a third aspect, the structure of the enterprise to which the internet user belongs provided by the present invention includes a processor and a memory, where the memory is used for storing a program for supporting the identifying apparatus of the enterprise to which the internet user belongs to execute the identifying method of the enterprise to which the internet user belongs in the first aspect, and the processor is configured to execute the program stored in the memory. The identification means of the enterprise to which the internet user belongs may further comprise a communication interface for the identification means of the enterprise to which the internet user belongs to communicate with other devices or communication networks.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium for storing computer software instructions for an identification apparatus of an enterprise to which an internet user belongs, which includes a program for executing the above-mentioned identification method of the enterprise to which the internet user belongs as the identification apparatus of the enterprise to which the internet user belongs in the first aspect.
One of the above technical solutions has the following advantages or beneficial effects: the method comprises the steps of screening out an enterprise wireless network by obtaining a service set identifier for accessing a wireless access point, extracting entity characteristics of an enterprise, establishing a first mapping relation between the enterprise wireless network and the enterprise, establishing a second mapping relation between the wireless access point and a target user by obtaining data information of the target user using the wireless access point, and generating an identification result of the enterprise to which the target user belongs according to the first mapping relation and the second mapping relation. The efficiency of mining the company to which the user belongs is improved, and the accuracy of mining the company to which the user belongs is also improved. In the aspect of financial wind control, accurate mining of companies to which the users belong has great value in evaluating credit levels and reasonably granting credit to the users, and in the aspect of internet information flow products, accurate mining of companies to which the users belong has great help in promoting information recommendation algorithms.
The foregoing summary is provided for the purpose of description only and is not intended to be limiting in any way. In addition to the illustrative aspects, embodiments, and features described above, further aspects, embodiments, and features of the present invention will be readily apparent by reference to the drawings and following detailed description.
Drawings
In the drawings, like reference numerals refer to the same or similar parts or elements throughout the several views unless otherwise specified. The figures are not necessarily to scale. It is appreciated that these drawings depict only some embodiments in accordance with the disclosure and are therefore not to be considered limiting of its scope.
Fig. 1 is a flowchart of an identification method for an enterprise to which an internet user belongs according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an identification process of an enterprise to which an internet user belongs according to an embodiment of the present invention;
fig. 3 is a block diagram of an identification apparatus of an enterprise to which an internet user belongs according to an embodiment of the present invention;
fig. 4 is a diagram of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
In the following, only certain exemplary embodiments are briefly described. As those skilled in the art will recognize, the described embodiments may be modified in various different ways, all without departing from the spirit or scope of the present invention. Accordingly, the drawings and description are to be regarded as illustrative in nature, and not as restrictive.
Example one
In one embodiment, a method for identifying an enterprise to which an internet user belongs is provided, as shown in fig. 1 and 2, including the steps of:
step S100: and acquiring a service set identifier for accessing the wireless access point, and screening out the enterprise wireless network according to the service set identifier and the physical address of the wireless access point.
A deployer of a wireless Access Point (AP) sets a Service Set Identifier (SSID) for the deployer. The plurality of service set identifiers constitutes a service set identifier repository. The wireless access point is obtained by identifying a service set identifier. Wherein each wireless access point has a uniquely identified physical address. The location between the wireless access points is relatively fixed. The wireless access point is from service Location Based Services (LBS), manual collection, public data on the network, and the like.
When some enterprises deploy wireless access points, the name of the service set identifier used to access the wireless access point is the name of the enterprise. Thus, whether it is an enterprise-type wireless network is confirmed by recognizing whether the name of the service set identifier is an enterprise name. Alternatively, when the physical addresses of multiple wireless access points are close, the same service set identifier may belong to the same service set identifier, and the same service set identifier may belong to the enterprise wireless network.
Step S200: and constructing an enterprise information base, and extracting entity characteristics of the enterprise from the enterprise information base.
The enterprise information base includes information of all enterprises, such as names of the enterprises, office locations, enterprise website URLs, scales, leadership names, and the like. The entity characteristics of the enterprise comprise the abbreviation of the enterprise, the legal person of the enterprise, the name of the enterprise, the English of the enterprise, the Chinese abbreviation of the name of the enterprise, the enterprise event and the like. The entity characteristics of the enterprise can be extracted from the website, the name and the news corpus of the enterprise through natural language processing technology.
Step S300: and calculating the similarity between the entity characteristics of the enterprise wireless network and the enterprise to establish a first mapping relation between the enterprise wireless network and the enterprise.
For example, since the name of the service set identifier and the name of the enterprise may be the same or similar, and the physical address of the wireless access point is the same or similar to the location of the enterprise, or other existing association relationships, by calculating the similarity, it is determined that the wireless network belongs to the corresponding company when the similarity is greater than the threshold, and then the first mapping relationship between the enterprise-class wireless network and the enterprise is formed.
Step S400: and acquiring data information of the target user using the wireless access point to establish a second mapping relation between the wireless access point and the target user.
The data information is the internet access data of the target user using the wireless access point, and comprises the time distribution, the connection duration, the used internet service content and the like of the target user connecting the wireless access point. For example, the time that target user a connects to AP1 in the time of day is nine am to five pm, indicating that target user a accesses AP1 in the work environment; the time for connecting to the AP2 is seven nights to eleven nights, which indicates that the target user A is at home to access the AP 2; and establishing the mapping relation between the target user A and the AP1 and the AP2 according to the above basis. Of course, the basis for establishing the second mapping relationship includes not only the listed internet access time, but also other data information such as a physical address, and the like, which are within the protection scope of the embodiment.
Step S500: and generating an identification result of the enterprise to which the target user belongs according to the first mapping relation and the second mapping relation.
The first mapping relationship may include an association between the enterprise-type wireless network and the enterprise. The second mapping relationship may include an association between the enterprise-like wireless network and the target user. Therefore, the incidence relation between the target user and the enterprise can be obtained. For example, the service set identifier is Baidu, under which AP3 of physical addresses 116.280,40.049 is accessed, and the time that target user B accesses AP3 is nine am to five pm, and thus, target user B is an employee of the hundred degree company.
The identification method for the enterprise to which the internet user belongs, provided by the embodiment, not only improves the efficiency of mining the company to which the user belongs, but also improves the accuracy of mining the company to which the user belongs. In the aspect of financial wind control, the credit level of a company to which the user belongs to the evaluation user can be accurately mined, and further reasonable credit granting is realized, so that the method has great value. In the aspect of internet information flow products, companies to which the users belong can be accurately mined to have great help for promoting information recommendation algorithms.
In one embodiment, screening out an enterprise type wireless network based on a service set identifier and a physical address of a wireless access point includes:
clustering the wireless access points according to the service set identifier and the physical address to generate a wireless access point cluster;
and classifying the wireless access point clusters according to the wireless network use characteristics so as to screen out the wireless access point clusters of the enterprise type as the wireless network of the enterprise type.
The wireless access points with the same or similar service set identifiers and similar physical addresses can be clustered to generate a wireless access point cluster. The wireless network use characteristics comprise at least one of traffic time distribution of the wireless access point cluster, interest point subject characteristics around the wireless access point cluster and user viscosity of the wireless access point cluster. Of course, the wireless network usage characteristics may also be other types related to user usage, and are within the scope of the present embodiment.
In one embodiment, calculating similarity between entity characteristics of the enterprise-type wireless network and the enterprise to establish a first mapping relationship between the enterprise-type wireless network and the enterprise includes:
calculating semantic similarity between the enterprise wireless network and the entity characteristics of the enterprises according to the service set identifiers and the names of the enterprises in the entity characteristics of the enterprises;
calculating the relative distance between the entity characteristics of the enterprise wireless network and the enterprise according to the physical address of the wireless access point and the geographic position of the enterprise;
and establishing a first mapping relation according to the semantic similarity and the relative distance.
The conditions that the semantics of the enterprise wireless network and the entity characteristics of the enterprise are similar or the same, and the relative distance between the physical address of the wireless access point and the geographic location of the enterprise is zero or is small are taken as the basis for establishing the first mapping relationship, but the basis for establishing the first mapping relationship may be of other types, which are all within the protection scope of the embodiment.
In one embodiment, establishing a second mapping relationship between the wireless access point and the target user includes:
calculating the probability value of the wireless access point belonging to the access point under the working environment of each target user according to the data information;
and establishing a second mapping relation between the access point and the target user under the working environment according to the probability value.
For example, the target user a accesses the wireless access points AP1, AP2 and AP3 respectively in the working day, the probability values are 80%, 15% and 5%, and the access time periods are respectively: nine am to six pm, seven pm to ten pm, twelve am to one noon. It can be determined that the target user is AP1 for accessing the company's wireless network in the working environment, AP2 for accessing the home in the non-working environment, and AP3 for accessing the public place. Thus, a second mapping relationship is established where the target user a is the AP1 with the wireless network that accesses the company in the work environment. Of course, the basis for establishing the second mapping relationship includes, but is not limited to, the above embodiments, and may also be adjusted according to different data information, all of which are within the scope of the present embodiment.
Example two
In another embodiment, there is provided an apparatus for identifying an enterprise to which an internet user belongs, as shown in fig. 3, including:
the enterprise wireless network screening module 10 is used for acquiring a service set identifier for accessing the wireless access point, and screening out an enterprise wireless network according to the service set identifier and a physical address of the wireless access point;
an enterprise entity feature extraction module 20, configured to construct an enterprise information base, and extract entity features of an enterprise from the enterprise information base;
a wireless network and enterprise mapping relationship establishing module 30, configured to calculate similarity between entity characteristics of the enterprise wireless network and the enterprise, and establish a first mapping relationship between the enterprise wireless network and the enterprise;
the wireless network and user mapping relationship establishing module 40 is used for acquiring data information of a target user using a wireless access point and establishing a second mapping relationship between the wireless access point and the target user according to the data information;
and the enterprise identification module 50 is configured to generate an identification result of the enterprise to which the target user belongs according to the first mapping relationship and the second mapping relationship.
In one embodiment, the enterprise-type wireless network screening module 10 includes:
the access point clustering unit is used for clustering the wireless access points according to the service set identifier and the physical address to generate a wireless access point cluster;
and the wireless network classifying and screening unit is used for classifying the wireless access point clusters according to the wireless network use characteristics so as to screen out the wireless access point clusters of the enterprise class as the wireless network of the enterprise type.
In one embodiment, the wireless network and enterprise mapping relationship establishing module 30 includes:
the semantic similarity calculation unit is used for calculating the semantic similarity between the enterprise wireless network and the entity characteristics of the enterprise according to the service set identifier and the name of the enterprise in the entity characteristics of the enterprise;
the distance calculation unit is used for calculating the relative distance between the enterprise wireless network and the entity characteristics of the enterprise according to the physical address of the wireless access point and the geographic position of the enterprise;
and the first mapping establishing unit is used for establishing a first mapping relation according to the semantic similarity and the relative distance between the enterprise wireless network and the enterprise.
In one embodiment, the wireless network and user mapping relationship establishing module 40 includes:
the probability calculation unit is used for calculating the probability value of the wireless access point under the working environment of each target user according to the data information;
and the second mapping establishing unit is used for establishing a second mapping relation between the access point and the target user under the working environment according to the probability value.
EXAMPLE III
An embodiment of the present invention provides a terminal for traffic cause, as shown in fig. 4, including:
a memory 400 and a processor 500, the memory 400 having stored therein a computer program operable on the processor 500. The processor 500 implements the method of identifying the enterprise to which the internet user belongs in the above-described embodiment when executing the computer program. The number of the memory 400 and the processor 500 may be one or more.
A communication interface 600 for the memory 400 and the processor 500 to communicate with the outside.
If the memory 400, the processor 500, and the communication interface 600 are implemented independently, the memory 400, the processor 500, and the communication interface 600 may be connected to each other through a bus and perform communication with each other. The bus may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 4, but this does not indicate only one bus or one type of bus.
Optionally, in a specific implementation, if the memory 400, the processor 500, and the communication interface 600 are integrated on a single chip, the memory 400, the processor 500, and the communication interface 600 may complete communication with each other through an internal interface.
Example four
A computer-readable storage medium storing a computer program which, when executed by a processor, implements a method of identifying an enterprise to which an internet user belongs according to any one of embodiments included herein.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Moreover, various embodiments or examples and features of various embodiments or examples described in this specification can be combined and combined by one skilled in the art without being mutually inconsistent.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
Any process or method descriptions in flow charts or otherwise described herein may be understood as representing modules, segments, or portions of code which include one or more executable instructions for implementing specific logical functions or steps of the process, and alternate implementations are included within the scope of the preferred embodiment of the present invention in which functions may be executed out of order from that shown or discussed, including substantially concurrently or in reverse order, depending on the functionality involved, as would be understood by those reasonably skilled in the art of the present invention.
The logic and/or steps represented in the flowcharts or otherwise described herein, e.g., an ordered listing of executable instructions that can be considered to implement logical functions, can be embodied in any computer-readable medium for use by or in connection with an instruction execution system, apparatus, or device, such as a computer-based system, processor-containing system, or other system that can fetch the instructions from the instruction execution system, apparatus, or device and execute the instructions. For the purposes of this description, a "computer-readable medium" can be any means that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, various steps or methods may be implemented in software or firmware stored in a memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
It will be understood by those skilled in the art that all or part of the steps carried by the method for implementing the above embodiments may be implemented by hardware related to instructions of a program, which may be stored in a computer readable storage medium, and when the program is executed, the program includes one or a combination of the steps of the method embodiments.
In addition, functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may exist alone physically, or two or more units are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode. The integrated module, if implemented in the form of a software functional module and sold or used as a separate product, may also be stored in a computer readable storage medium. The storage medium may be a read-only memory, a magnetic or optical disk, or the like.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
Claims (11)
1. A method for identifying an enterprise to which an Internet user belongs is characterized by comprising the following steps:
acquiring a service set identifier for accessing a wireless access point from a service set identifier library, and screening out an enterprise wireless network according to the service set identifier and a physical address of the wireless access point, wherein the wireless access point is determined to be the enterprise wireless network under the condition that the physical addresses of a plurality of wireless access points belong to the same service set identifier at the same time;
constructing an enterprise information base, and extracting entity characteristics of an enterprise from the enterprise information base, wherein the entity characteristics of the enterprise comprise the geographic position of the enterprise;
calculating the similarity between the entity characteristics of the enterprise wireless network and the enterprise according to the physical address of the wireless access point corresponding to the enterprise wireless network and the geographic position of the enterprise so as to establish a first mapping relation between the enterprise wireless network and the enterprise;
acquiring data information of a target user using the wireless access point to establish a second mapping relation between the wireless access point and the target user;
and generating an identification result of the enterprise to which the target user belongs according to the first mapping relation and the second mapping relation.
2. The method of claim 1, wherein screening out an enterprise-type wireless network based on the service set identifier and a physical address of the wireless access point comprises:
clustering the wireless access points according to the service set identifier and the physical address to generate a wireless access point cluster;
and classifying the wireless access point clusters according to the wireless network use characteristics so as to screen out the wireless access point clusters of the enterprise type as the wireless network of the enterprise type.
3. The method of claim 2, wherein the wireless network usage characteristics comprise at least one of traffic time distribution of the cluster of wireless access points, point of interest topic characteristics around the cluster of wireless access points, and user stickiness of the cluster of wireless access points.
4. The method of claim 1, wherein calculating the similarity between the enterprise-like wireless network and the entity characteristics of the enterprise to establish the first mapping relationship between the enterprise-like wireless network and the enterprise comprises:
calculating semantic similarity between the enterprise-like wireless network and entity features of the enterprise according to the service set identifier and the name of the enterprise in the entity features of the enterprise;
calculating the relative distance between the enterprise wireless network and the entity characteristics of the enterprise according to the physical address of the wireless access point and the geographic position of the enterprise;
and establishing the first mapping relation according to the semantic similarity and the relative distance.
5. The method of claim 1, wherein establishing a second mapping relationship between the wireless access point and the target user comprises:
calculating the probability value of the wireless access point belonging to the access point under the working environment of each target user according to the data information;
and establishing a second mapping relation between the access point and the target user in the working environment according to the probability value.
6. An apparatus for identifying an enterprise to which an internet user belongs, comprising:
the enterprise wireless network screening module is used for acquiring a service set identifier for accessing a wireless access point from a service set identifier library, and screening out an enterprise wireless network according to the service set identifier and a physical address of the wireless access point, wherein the wireless access point is determined to be the enterprise wireless network under the condition that the physical addresses of a plurality of wireless access points belong to the same service set identifier;
the enterprise entity feature extraction module is used for constructing an enterprise information base and extracting entity features of enterprises from the enterprise information base, wherein the entity features of the enterprises comprise the geographic positions of the enterprises;
the wireless network and enterprise mapping relation establishing module is used for calculating the similarity between the entity characteristics of the enterprise wireless network and the enterprise according to the physical address of the wireless access point corresponding to the enterprise wireless network and the geographic position of the enterprise, and establishing a first mapping relation between the enterprise wireless network and the enterprise;
the wireless network and user mapping relation establishing module is used for acquiring data information of a target user using the wireless access point and establishing a second mapping relation between the wireless access point and the target user according to the data information;
and the enterprise identification module is used for generating an identification result of the enterprise to which the target user belongs according to the first mapping relation and the second mapping relation.
7. The apparatus of claim 6, wherein the enterprise-like wireless network screening module comprises:
an access point clustering unit, configured to cluster the wireless access points according to the service set identifier and the physical address, and generate a wireless access point cluster;
and the wireless network classifying and screening unit is used for classifying the wireless access point clusters according to the wireless network use characteristics so as to screen out the wireless access point clusters of the enterprise class as the enterprise class wireless network.
8. The apparatus of claim 6, wherein the wireless network and enterprise mapping relationship establishing module comprises:
a semantic similarity calculation unit, configured to calculate a semantic similarity between the enterprise-class wireless network and an entity feature of the enterprise according to the service set identifier and a name of the enterprise in the entity feature of the enterprise;
the distance calculation unit is used for calculating the relative distance between the enterprise wireless network and the entity characteristics of the enterprise according to the physical address of the wireless access point and the geographic position of the enterprise;
and the first mapping establishing unit is used for establishing the first mapping relation according to the semantic similarity and the relative distance between the enterprise wireless network and the enterprise.
9. The apparatus of claim 6, wherein the wireless network and user mapping relationship establishing module comprises:
the probability calculation unit is used for calculating the probability value of the wireless access point belonging to the access point under the working environment of each target user according to the data information;
and the second mapping establishing unit is used for establishing a second mapping relation between the access point and the target user in the working environment according to the probability value.
10. An identification terminal for an enterprise to which an internet user belongs, comprising:
one or more processors;
a memory for storing one or more programs;
the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method recited in any of claims 1-5.
11. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810717283.XA CN110674832B (en) | 2018-07-03 | 2018-07-03 | Method, device and terminal for identifying enterprise to which Internet user belongs |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810717283.XA CN110674832B (en) | 2018-07-03 | 2018-07-03 | Method, device and terminal for identifying enterprise to which Internet user belongs |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110674832A CN110674832A (en) | 2020-01-10 |
CN110674832B true CN110674832B (en) | 2022-09-16 |
Family
ID=69065690
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810717283.XA Active CN110674832B (en) | 2018-07-03 | 2018-07-03 | Method, device and terminal for identifying enterprise to which Internet user belongs |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110674832B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111563133A (en) * | 2020-05-06 | 2020-08-21 | 支付宝(杭州)信息技术有限公司 | Method and system for data fusion based on entity relationship |
CN112487312B (en) * | 2020-11-30 | 2024-09-24 | 北京百度网讯科技有限公司 | Method and device for associating interest points and method and device for determining interest point state |
CN113949627B (en) * | 2021-08-24 | 2024-08-13 | 中国人寿保险股份有限公司上海数据中心 | Equipment network point attribution identification method and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105824921A (en) * | 2016-03-16 | 2016-08-03 | 广州彩瞳网络技术有限公司 | User social relation recognition device and method |
CN107783976A (en) * | 2016-08-25 | 2018-03-09 | 腾讯科技(深圳)有限公司 | User profile method for digging and device |
CN107801202A (en) * | 2017-10-31 | 2018-03-13 | 广东思域信息科技有限公司 | A kind of user's portrait method based on WiFi accesses |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9479488B2 (en) * | 2012-01-26 | 2016-10-25 | Facebook, Inc. | Network access based on social-networking information |
CN107659982B (en) * | 2016-07-26 | 2020-08-14 | 腾讯科技(深圳)有限公司 | Wireless network access point classification method and device |
CN107820297B (en) * | 2017-10-19 | 2019-04-26 | 北京三快在线科技有限公司 | A kind of information acquisition method and device |
-
2018
- 2018-07-03 CN CN201810717283.XA patent/CN110674832B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105824921A (en) * | 2016-03-16 | 2016-08-03 | 广州彩瞳网络技术有限公司 | User social relation recognition device and method |
CN107783976A (en) * | 2016-08-25 | 2018-03-09 | 腾讯科技(深圳)有限公司 | User profile method for digging and device |
CN107801202A (en) * | 2017-10-31 | 2018-03-13 | 广东思域信息科技有限公司 | A kind of user's portrait method based on WiFi accesses |
Non-Patent Citations (2)
Title |
---|
Inferring user relationship from hidden information in WLANs;Ningning Cheng et al.;《MILCOM 2012 - 2012 IEEE Military Communications Conference》;20130128;第1-6页 * |
基于WiFi扫描列表的用户生活模式挖掘;赵哲;《中国优秀硕士学位论文全文数据库信息科技辑》;20160715(第7期);第I138-674页 * |
Also Published As
Publication number | Publication date |
---|---|
CN110674832A (en) | 2020-01-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110765770B (en) | Automatic contract generation method and device | |
CN110674832B (en) | Method, device and terminal for identifying enterprise to which Internet user belongs | |
CN111198976B (en) | Cloud asset association analysis system, method, electronic equipment and medium | |
CN111163072B (en) | Method and device for determining characteristic value in machine learning model and electronic equipment | |
CN111078818B (en) | Address analysis method and device, electronic equipment and storage medium | |
CN109982257B (en) | Method, device and system for determining mobile user home region | |
CN112148305A (en) | Application detection method and device, computer equipment and readable storage medium | |
CN114817968B (en) | Method, device and equipment for tracing path of featureless data and storage medium | |
CN105653550B (en) | Webpage filtering method and device | |
CN109711656B (en) | Multisystem association early warning method, device, equipment and computer readable storage medium | |
WO2017000817A1 (en) | Method and device for acquiring matching relationship between data | |
CN111930891A (en) | Retrieval text expansion method based on knowledge graph and related device | |
CN114817518B (en) | License handling method, system and medium based on big data archive identification | |
CN112887408B (en) | System and method for solving data state sharing of multi-kernel browser | |
CN110401639B (en) | Method and device for judging abnormality of network access, server and storage medium thereof | |
CN110471708B (en) | Method and device for acquiring configuration items based on reusable components | |
CN112910879A (en) | Malicious domain name analysis method and system | |
CN114765599A (en) | Sub-domain name acquisition method and device | |
CN112100670A (en) | Big data based privacy data grading protection method | |
CN111143644A (en) | Identification method and device of Internet of things equipment | |
CN113055243B (en) | DPI interface data processing method and device | |
CN116843304B (en) | Digital twin park management method, device, equipment and storage medium | |
CN112328614B (en) | Virus library updating method, device, storage medium and apparatus | |
CN117787234A (en) | Report generation method and device | |
CN117891993A (en) | Edge recognition method based on Internet of things |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |