Terminal source determining method and device, electronic equipment and storage medium

文档序号:196585 发布日期:2021-11-02 浏览:39次 中文

阅读说明:本技术 终端来源的确定方法、装置、电子设备和存储介质 (Terminal source determining method and device, electronic equipment and storage medium ) 是由 李冬卉 王懿 郭瑜 明朗 于 2021-07-09 设计创作,主要内容包括:本公开关于终端来源的确定方法、装置、电子设备和存储介质。该方法包括:获取已有终端检测到邀请行为的邀请时刻、新增终端首次执行目标操作的激活时刻和已有终端和新增终端分别连接Wi-Fi网络的网络标识;确定具有相同网络标识的关联终端,任意一组关联终端包括已有终端中的第一终端和新增终端中的第二终端,并确定各组关联终端中第二终端的激活时刻与第一终端的邀请时刻的间隔时长;在任一组关联终端的间隔时长小于参考时长,且该组关联终端满足来源判断条件的情况下,将其中的第二终端归因至Wi-Fi指纹对应的新增终端。该方法可在邀请链路中存在难以确定归因指纹的步骤甚至邀请链路不完整的场景下,实现对新增终端的准确归因。(The disclosure relates to a terminal source determination method, a terminal source determination device, an electronic device and a storage medium. The method comprises the following steps: acquiring invitation time when an existing terminal detects an invitation behavior, activation time when a newly added terminal executes a target operation for the first time, and network identifiers when the existing terminal and the newly added terminal are respectively connected with a Wi-Fi network; determining associated terminals with the same network identification, wherein any group of associated terminals comprises a first terminal in the existing terminals and a second terminal in the newly added terminals, and determining the interval duration between the activation time of the second terminal in each group of associated terminals and the invitation time of the first terminal; and under the condition that the interval duration of any group of associated terminals is less than the reference duration and the group of associated terminals meets the source judgment condition, attributing the second terminal to the newly added terminal corresponding to the Wi-Fi fingerprint. The method can realize accurate attribution of the newly added terminal under the condition that the step of attribution fingerprints which are difficult to determine exists in the invitation link, even the invitation link is incomplete.)

1. A method for determining a terminal source is characterized by comprising the following steps:

acquiring an invitation moment when an existing terminal detects an invitation behavior, an activation moment when a newly added terminal executes a target operation for the first time and network identifications of wireless fidelity Wi-Fi networks respectively connected with the existing terminal and the newly added terminal, wherein the existing terminal executes the target operation before detecting the invitation behavior;

determining at least one group of associated terminals with the same network identifier, wherein any group of associated terminals comprises a first terminal in the existing terminals and a second terminal in the newly added terminal, and determining the interval duration between the activation time of the second terminal in each group of associated terminals and the invitation time of the first terminal;

and under the condition that the interval duration corresponding to any group of associated terminals is less than the reference duration and the associated terminals meet the source judgment condition, attributing a second terminal in the associated terminals to a new terminal corresponding to the Wi-Fi fingerprint.

2. The method of claim 1, wherein obtaining the network identifiers of the Wi-Fi networks to which the existing terminal and the newly added terminal are respectively connected comprises:

acquiring a first network connection record of the existing terminal in a first time period, and extracting a network identifier of a Wi-Fi network connected with the existing terminal from the first network connection record; and the number of the first and second groups,

and acquiring a second network connection record of the newly added terminal in a second time period, and extracting the network identifier of the Wi-Fi network connected with the newly added terminal from the second network connection record.

3. The method of claim 2, wherein the network identifier is obtained periodically, and wherein during any period of obtaining the invitation time and the activation time:

the starting time point of the first time period comprises the invitation time, the activation time or the starting time of any cycle, the starting time point of the second time period is the activation time, and the ending time points of the first time period and the second time period are the ending time of any cycle.

4. The method according to claim 1, wherein after determining the interval duration between the activation time of the second terminal and the invitation time of the first terminal in each group of associated terminals, the method further comprises:

recording the terminal information of each group of associated terminals to an association relation table, wherein the terminal information of any group of associated terminals recorded in the association relation table comprises: the terminal identification comprises a public network identification, an interval duration corresponding to any group of associated terminals and terminal identifications of a first terminal and a second terminal in any group of associated terminals, wherein the public network identification is the network identification of a Wi-Fi network connected with the first terminal and the second terminal in any group of associated terminals.

5. The method of claim 4, further comprising:

determining first public network identifiers recorded in the association relationship table, wherein the proportion of the identifier number of the first public network identifiers recorded in the association relationship table to the total identifier amount of all public network identifiers recorded in the association relationship table is not more than a preset proportion threshold;

and when the interval duration corresponding to each group of associated terminals indicated by the first public network identifier is less than the reference duration, determining that the interval duration corresponding to each group of associated terminals is less than the reference duration.

6. The method of claim 1, wherein determining whether the interval duration corresponding to each group of associated terminals is less than a reference duration and meets a source determination condition comprises:

determining other newly added terminals and adjacent associated terminals in all associated terminals, wherein the other newly added terminals are newly added terminals which are attributed to other attribution fingerprints different from the Wi-Fi fingerprints, and the adjacent associated terminals are associated terminals corresponding to which the interval duration is smaller than the reference duration;

and under the condition that the terminal contact ratio between the second terminal in the other newly-added terminals and the second terminal in the adjacent associated terminal is not more than a preset contact ratio threshold value, determining that the adjacent associated terminal meets the source judgment condition.

7. An apparatus for determining a source of a terminal, comprising:

an obtaining unit, configured to obtain an invitation moment when an existing terminal detects an invitation behavior, an activation moment when a newly added terminal executes a target operation for the first time, and network identifiers of Wi-Fi networks to which the existing terminal and the newly added terminal are connected respectively, wherein the existing terminal has executed the target operation before detecting the invitation behavior;

a determining unit, configured to determine at least one group of associated terminals with the same network identifier, where any group of associated terminals includes a first terminal in the existing terminals and a second terminal in the newly added terminal, and determine an interval duration between an activation time of the second terminal in each group of associated terminals and an invitation time of the first terminal;

and the attribution unit is configured to attribution the second terminal in any group of associated terminals to the new terminal corresponding to the Wi-Fi fingerprint under the condition that the interval duration corresponding to any group of associated terminals is less than the reference duration and the any group of associated terminals meets the source judgment condition.

8. An electronic device, comprising:

a processor;

a memory for storing the processor-executable instructions;

wherein the processor is configured to execute the executable instructions to implement the method of terminal sourcing determination as claimed in any of claims 1 to 6.

9. A computer-readable storage medium, wherein instructions in the computer-readable storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the method of determining a terminal source of any one of claims 1 to 6.

10. A computer program product comprising computer programs/instructions, characterized in that said computer programs/instructions, when executed by a processor, implement the terminal sourced determination method of any one of claims 1 to 6.

Technical Field

The present disclosure relates to the field of big data, and in particular, to a method and an apparatus for determining a source of a terminal, an electronic device, and a storage medium.

Background

With the rapid development of internet technology, in order to attract more users to use an application program, a promoter of the application program usually initiates an invitation activity to promote, that is, an old user is guided to invite a new user (or called a new user) to use the application program. In order to obtain the actual promotion effect of the invitation activity and the old user corresponding to the new user, the promoter needs to determine the source (or called attribution) of the new terminal.

In the related art, the source of the newly added terminal is often determined (i.e., the newly added terminal is attributed) by an attribution fingerprint such as a preset invitation code binding relationship, network information of an H5 page, clipboard information of an existing terminal, and the like. However, in the invitation link of the actual invitation activity, there are usually steps such as oral recommendation, self-download and the like which are difficult to determine attribution fingerprints, or the invitation link is incomplete due to user behaviors such as a new user jumping to other pages to self-download an installation package, a clipboard being refreshed and the like, so that the source of the terminal cannot be determined, and the accuracy of the attribution is finally affected.

Disclosure of Invention

The present disclosure provides a method, an apparatus, an electronic device, and a storage medium for determining a terminal source, so as to solve at least the technical problems in the related art. The technical scheme of the disclosure is as follows:

according to a first aspect of the embodiments of the present disclosure, a method for determining a terminal source is provided, including:

acquiring an invitation moment when an existing terminal detects an invitation behavior, an activation moment when a newly added terminal executes a target operation for the first time and network identifications of wireless fidelity Wi-Fi networks respectively connected with the existing terminal and the newly added terminal, wherein the existing terminal executes the target operation before detecting the invitation behavior;

determining at least one group of associated terminals with the same network identifier, wherein any group of associated terminals comprises a first terminal in the existing terminals and a second terminal in the newly added terminal, and determining the interval duration between the activation time of the second terminal in each group of associated terminals and the invitation time of the first terminal;

and under the condition that the interval duration corresponding to any group of associated terminals is less than the reference duration and the associated terminals meet the source judgment condition, attributing a second terminal in the associated terminals to a new terminal corresponding to the Wi-Fi fingerprint.

Optionally, the obtaining network identifiers of the Wi-Fi networks to which the existing terminal and the newly added terminal are respectively connected includes:

acquiring a first network connection record of the existing terminal in a first time period, and extracting a network identifier of a Wi-Fi network connected with the existing terminal from the first network connection record; and the number of the first and second groups,

and acquiring a second network connection record of the newly added terminal in a second time period, and extracting the network identifier of the Wi-Fi network connected with the newly added terminal from the second network connection record.

Optionally, the network identifier is obtained periodically, and in any period of obtaining the invitation time and the activation time:

the starting time point of the first time period comprises the invitation time, the activation time or the starting time of any cycle, the starting time point of the second time period is the activation time, and the ending time points of the first time period and the second time period are the ending time of any cycle.

Optionally, after determining the interval duration between the activation time of the second terminal and the invitation time of the first terminal in each group of associated terminals, the method further includes:

recording the terminal information of each group of associated terminals to an association relation table, wherein the terminal information of any group of associated terminals recorded in the association relation table comprises: the terminal identification comprises a public network identification, an interval duration corresponding to any group of associated terminals and terminal identifications of a first terminal and a second terminal in any group of associated terminals, wherein the public network identification is the network identification of a Wi-Fi network connected with the first terminal and the second terminal in any group of associated terminals.

Optionally, the method further includes:

determining first public network identifiers recorded in the association relationship table, wherein the proportion of the identifier number of the first public network identifiers recorded in the association relationship table to the total identifier amount of all public network identifiers recorded in the association relationship table is not more than a preset proportion threshold;

and when the interval duration corresponding to each group of associated terminals indicated by the first public network identifier is less than the reference duration, determining that the interval duration corresponding to each group of associated terminals is less than the reference duration.

Optionally, the determining whether the interval duration corresponding to each group of associated terminals is less than the reference duration and meets the source determination condition includes:

determining other newly added terminals and adjacent associated terminals in all associated terminals, wherein the other newly added terminals are newly added terminals which are attributed to other attribution fingerprints different from the Wi-Fi fingerprints, and the adjacent associated terminals are associated terminals corresponding to which the interval duration is smaller than the reference duration;

and under the condition that the terminal contact ratio between the second terminal in the other newly-added terminals and the second terminal in the adjacent associated terminal is not more than a preset contact ratio threshold value, determining that the adjacent associated terminal meets the source judgment condition.

Alternatively to this, the first and second parts may,

further comprising: acquiring an operation record of the first execution of the target operation by a second terminal in all the associated terminals, and determining an average operation index corresponding to all the associated terminals and an adjacent operation index corresponding to the adjacent associated terminal according to the operation record;

the determining that the adjacent associated terminal meets the source judgment condition includes: and if the index deviation between the adjacent operation index and the average operation index is smaller than a preset deviation threshold value, determining that the adjacent associated terminal meets a source judgment condition.

Optionally, the method further includes:

sending a research message to the second terminal, wherein the research message is used for inquiring a user about a mode of executing the target operation in the second terminal for the first time;

and determining the accuracy of attributing the second terminal in the associated terminals to the newly added terminal of the Wi-Fi fingerprint according to the research result returned by the second terminal.

Optionally, the method further includes:

determining valid invitation terminals, wherein the valid invitation terminals are existing terminals which belong to the same group of associated terminals with the newly added terminal attributed to the Wi-Fi fingerprint;

and allocating preset resources to the user account logged by the valid invitation terminal at the invitation time.

Optionally, the method further includes:

acquiring invitation information received by a newly added terminal attributed to the Wi-Fi fingerprint, wherein the invitation information at least records an invitation relation between a sender terminal of the invitation information and the newly added terminal;

sending the invitation information to a user analysis system, wherein the user analysis system is used for adjusting the user portrait of the user corresponding to the newly-added terminal according to the invitation relation; and/or the presence of a gas in the gas,

and sending the invitation information to a content recommendation system, wherein the content recommendation system is used for adjusting the recommended content aiming at the newly added terminal according to the invitation relation.

According to a second aspect of the embodiments of the present disclosure, an apparatus for determining a source of a terminal is provided, including:

an obtaining unit, configured to obtain an invitation moment when an existing terminal detects an invitation behavior, an activation moment when a newly added terminal executes a target operation for the first time, and network identifiers of Wi-Fi networks to which the existing terminal and the newly added terminal are connected respectively, wherein the existing terminal has executed the target operation before detecting the invitation behavior;

a determining unit, configured to determine at least one group of associated terminals with the same network identifier, where any group of associated terminals includes a first terminal in the existing terminals and a second terminal in the newly added terminal, and determine an interval duration between an activation time of the second terminal in each group of associated terminals and an invitation time of the first terminal;

and the attribution unit is configured to attribution the second terminal in any group of associated terminals to the new terminal corresponding to the Wi-Fi fingerprint under the condition that the interval duration corresponding to any group of associated terminals is less than the reference duration and the any group of associated terminals meets the source judgment condition.

Optionally, the obtaining unit is further configured to:

acquiring a first network connection record of the existing terminal in a first time period, and extracting a network identifier of a Wi-Fi network connected with the existing terminal from the first network connection record; and the number of the first and second groups,

and acquiring a second network connection record of the newly added terminal in a second time period, and extracting the network identifier of the Wi-Fi network connected with the newly added terminal from the second network connection record.

Optionally, the network identifier is obtained periodically, and in any period of obtaining the invitation time and the activation time:

the starting time point of the first time period comprises the invitation time, the activation time or the starting time of any cycle, the starting time point of the second time period is the activation time, and the ending time points of the first time period and the second time period are the ending time of any cycle.

Optionally, the determining unit is further connected to a recording unit, and the recording unit is configured to:

recording the terminal information of each group of associated terminals to an association relation table, wherein the terminal information of any group of associated terminals recorded in the association relation table comprises: the terminal identification comprises a public network identification, an interval duration corresponding to any group of associated terminals and terminal identifications of a first terminal and a second terminal in any group of associated terminals, wherein the public network identification is the network identification of a Wi-Fi network connected with the first terminal and the second terminal in any group of associated terminals.

Optionally, the method further includes:

a first determining unit, configured to determine a first public network identifier recorded in the association table, where a ratio of the identifier number of the first public network identifier recorded in the association table to a total identifier amount of all public network identifiers recorded in the association table is not greater than a preset ratio threshold;

a duration determining unit, configured to determine that the interval duration corresponding to each group of associated terminals indicated by the first public network identifier is smaller than the reference duration when the interval duration corresponding to each group of associated terminals is smaller than the reference duration.

Optionally, the attribution unit is further configured to:

determining other newly added terminals and adjacent associated terminals in all associated terminals, wherein the other newly added terminals are newly added terminals which are attributed to other attribution fingerprints different from the Wi-Fi fingerprints, and the adjacent associated terminals are associated terminals corresponding to which the interval duration is smaller than the reference duration;

and under the condition that the terminal contact ratio between the second terminal in the other newly-added terminals and the second terminal in the adjacent associated terminal is not more than a preset contact ratio threshold value, determining that the adjacent associated terminal meets the source judgment condition.

Alternatively to this, the first and second parts may,

the system further comprises a record acquisition unit, configured to acquire an operation record of the first execution of the target operation by a second terminal of all the associated terminals, and determine an average operation index corresponding to all the associated terminals and an adjacent operation index corresponding to the adjacent associated terminal according to the operation record;

the attribution unit is further configured to: and if the index deviation between the adjacent operation index and the average operation index is smaller than a preset deviation threshold value, determining that the adjacent associated terminal meets a source judgment condition.

Optionally, the method further includes:

a message sending unit configured to send a research message to the second terminal, the research message being used to inquire a user about a manner in which the target operation is first performed in the second terminal;

and the accuracy determining unit is configured to determine the accuracy of attributing the second terminal in the associated terminals to the newly added terminal of the Wi-Fi fingerprint according to the research result returned by the second terminal.

Optionally, the method further includes:

a validity determination unit configured to determine valid invitation terminals that are existing terminals belonging to the same group of associated terminals as the newly added terminal attributed to the Wi-Fi fingerprint;

and the resource allocation unit is configured to allocate preset resources to the user account which is logged in by the valid invitation terminal at the invitation time.

Optionally, the method further includes:

an information acquisition unit configured to acquire invitation information received by a newly added terminal attributed to the Wi-Fi fingerprint, the invitation information recording at least an invitation relationship between a sender terminal of the invitation message and the newly added terminal;

the first sending unit is configured to send the invitation information to a user analysis system, and the user analysis system is used for adjusting a user portrait of a user corresponding to the newly-added terminal according to the invitation relation; and/or the presence of a gas in the gas,

and the second sending unit is configured to send the invitation information to a content recommendation system, and the content recommendation system is used for adjusting the recommended content for the newly added terminal according to the invitation relation.

According to a third aspect of the embodiments of the present disclosure, an electronic device is provided, including:

a processor;

a memory for storing the processor-executable instructions;

wherein the processor is configured to execute the instructions to implement the method for determining a source of a terminal as described in any embodiment of the first aspect.

According to a fourth aspect of the embodiments of the present disclosure, a storage medium is provided, where instructions executed by a processor of an electronic device enable the electronic device to perform the method for determining a source of a terminal according to any one of the embodiments of the first aspect.

According to a fifth aspect of the embodiments of the present disclosure, there is provided a computer program product, which includes a computer program and/or instructions, and when the computer program and/or instructions are executed by a processor, the method for determining a source of a terminal according to any one of the embodiments of the first aspect is implemented.

The technical solution provided by the embodiments of the present disclosure is based on the following facts: the old user and the new user who invite in an offline invitation mode through oral recommendation and the like are usually closer to each other, the new terminal and the old terminal are usually connected to the same Wi-Fi network, and the new user downloads, installs and runs the target application program for the first time usually within a short time after receiving invitation information.

The technical scheme provided by the embodiment of the disclosure at least brings the following beneficial effects:

the existing terminal and the newly added terminal in the same Wi-Fi network are associated through network identifications of the Wi-Fi network connected with the existing terminal and the newly added terminal, and therefore the associated terminal is determined; further, the interval duration between the invitation moment when the first terminal detects the invitation behavior and the activation moment when the second terminal operates the target application program for the first time is used for determining the newly added terminal which is in the same Wi-Fi network with the existing equipment and activates the application program within a short time interval, and attributing the newly added terminal to the newly added terminal corresponding to the Wi-Fi fingerprint. Therefore, the newly added terminal is attributed through the Wi-Fi network and the interval duration which are weakly related to the user invitation behavior, and obviously, even if the step that the attribution fingerprint is difficult to determine exists in the invitation link, even under the scene that the invitation link is incomplete, the scheme can still realize the accurate attribution of the newly added terminal.

It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.

Drawings

The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure and are not to be construed as limiting the disclosure.

Fig. 1 is a schematic diagram of an architecture of a terminal sourcing determination system according to an exemplary embodiment;

fig. 2 is a flowchart illustrating a method of determining a source of a terminal according to an embodiment of the present disclosure;

fig. 3 is a flowchart illustrating another method of determining a source of a terminal according to an embodiment of the present disclosure;

fig. 4 is a block diagram illustrating a structure of a terminal source determining apparatus according to an embodiment of the disclosure;

fig. 5 is a block diagram illustrating an electronic device in accordance with an embodiment of the present disclosure.

Detailed Description

In order to make the technical solutions of the present disclosure better understood by those of ordinary skill in the art, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below with reference to the accompanying drawings.

It should be noted that the terms "first," "second," and the like in the description and claims of the present disclosure and in the above-described drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the disclosure described herein are capable of operation in sequences other than those illustrated or otherwise described herein. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.

With the rapid development of internet technology, in order to attract more users to use an application program, a promoter of the application program generally employs information flow, search advertisement, score wall, manufacturer pre-installation, invitation activity, and the like for promotion. In which an invitation activity, i.e. the process of inviting a new user (or invitation) to use an application by guiding an old user. For example, the application popularizing party may push an invitation message to an existing terminal used by an old user, and the old user recommends the relevant information of the application included in the invitation message to another person, and the latter may download, install and run the application in the terminal used by the user according to the relevant information, thereby becoming an additional user of the application, and the terminal used by the user is an additional terminal of the application.

In order to obtain the actual promotion effect of the invitation activity and the old user corresponding to the new user, the promoter needs to attribute the new terminal. The attribution is to determine the source of the new terminal of the application program through various fingerprints or technical means, in other words, to determine through which channel the new terminal is added.

In the related art, attribution is often performed through attribution fingerprints such as a preset invitation code binding relationship, network information of an H5 page, clipboard information of an existing terminal, and the like. However, in the invitation link of the actual invitation activity, there are usually steps that it is difficult to determine attribution fingerprints, such as oral recommendation, self-download of the new user, or incomplete invitation link due to user behaviors that the new user jumps out to other pages to self-download installation packages, the clipboard is refreshed, and the like, so that the source of the newly added terminal cannot be accurately determined, and the accuracy of attribution to the terminal is finally affected.

In order to solve the above problem, an embodiment of the present disclosure provides a method for determining a terminal source, where a first terminal and a second terminal connected to the same Wi-Fi network are determined by obtaining network identifiers of Wi-Fi networks to which an existing terminal and a newly added terminal are connected, and an interval duration between the first terminal and the second terminal is determined by obtaining an invitation time of the existing terminal and an activation time of the newly added terminal, so as to attribute the newly added terminal. By the scheme, accurate attribution of the newly added terminal can be realized in the scenes that the attribution fingerprint is difficult to determine in the invitation link, even the invitation link is incomplete and the like.

Fig. 1 is a schematic architecture diagram of a terminal sourcing determination system according to an exemplary embodiment. As shown in fig. 1, the system may include a network 10, a service server 11, a number of electronic devices, such as a first handset 12, a second handset 13, and a third handset 14, an attribution server 15, and the like.

The service server 11 and the attribution server 15 may be physical servers comprising a separate host, or the service server 11 may be a virtual server carried by a cluster of hosts. In the operation process, the service server 11 may operate a service server-side program of an application program to implement a related service function of the application, for example, when the service server 11 operates a program of a live broadcast platform, the service server may be implemented as a server of the live broadcast platform, so that the service server 11 may cooperate with a client operating on the first mobile phone 12, the second mobile phone 13, and/or the third mobile phone 14 to implement a scheme for recording and distributing live broadcast programs. The attribution server 15 may also cooperate with a service server-side program running on the service server 11, a service client-side program running on the first handset 12, the second handset 13, and/or the third handset 14, and the like, to implement a scheme for determining the source of the terminal. Of course, the attribution server 15 and the service server 11 may be implemented in the same physical device, such as different instances implemented in the same server device; alternatively, the following functions of the attribution server 15 may also be implemented by the service server 11, so that the service server 11 is implemented as the attribution server 15, which is not described in detail.

In this embodiment, the system for determining a source of a terminal may not only implement an attribution function, but also be an integrated functional platform with many other functions, such as detecting an invitation behavior, installing and running a target application, obtaining an invitation time and an activation time, determining an associated terminal, determining an interval duration, determining whether a source judgment condition is satisfied, and the like.

The first handset 12, the second handset 13 and the third handset 14 are only one type of electronic device that the user can use. In fact, it is obvious that the user can also use electronic devices of the type such as: tablet devices, notebook computers, Personal Digital Assistants (PDAs), wearable devices (e.g., smart glasses, smart watches, etc.), etc., which are not limited by one or more embodiments of the present disclosure. In the operation process, the electronic device may operate a program on a client side of an application to implement a related service function of the application, for example, when the electronic device operates a program on a live broadcast platform, the electronic device may be implemented as a client on the live broadcast platform, for example, the first mobile phone 12 may implement an anchor client, and the second mobile phone 13 and the third mobile phone 14 may implement audience clients, where the second mobile phone 13 may be an existing terminal, and the third mobile phone 14 may be a new terminal generated in response to an invitation action of the second mobile phone 13.

It should be noted that: the application program of any client can be pre-installed on the electronic equipment, so that the client can be started and run on the electronic equipment; of course, when an online "client" such as HTML5 technology is employed, the client can be obtained and run without installing a corresponding application on the electronic device.

And for the network 10, which may be a wired or wireless network, the second handset 13 and the third handset 14 are connected directly to the network 10 via a Wi-Fi network.

Fig. 2 is a flowchart illustrating a method for determining a terminal source according to an exemplary embodiment of the present disclosure. As shown in fig. 2, the method applied to the attribution server may include the following steps:

step 202, obtaining an invitation moment when an existing terminal detects an invitation behavior, an activation moment when a newly added terminal executes a target operation for the first time, and network identifiers of wireless fidelity Wi-Fi networks respectively connected with the existing terminal and the newly added terminal, wherein the existing terminal has executed the target operation before detecting the invitation behavior.

First, it should be noted that the specific form of the target Application program is not limited in this embodiment, for example, in the case that the terminal is a mobile phone, the target Application program may be an APP (Application program) formed by installing an installation package in formats such as apk, ipa, pxl, and the like in the mobile phone, or in the case that the terminal is a computer, the target Application program may also be an APP formed by installing an installation package in formats such as exe, msi, and the like in the computer, or may also be a web version Application program running in the terminal such as the mobile phone, the computer, and the like. Similarly, the embodiments of the present disclosure do not limit the business functions implemented by the application programs.

The existing terminal is a terminal device already running a target application in an activated state, for example, the target application has been opened and run, or a registered user account has been logged in, and the like. The new terminal is a terminal device that operates (i.e., activates) the target application for the first time, such as first installation, first opening operation, or first login of a registered user account. It can be understood that the existing terminal and the new terminal in the scheme are concepts related to the current time: if attribution processing is already carried out before the current time, the equipment where the target application program is activated before the previous attribution finishing time is the existing terminal; and the device in which the target application program activated between the previous attribution ending time and the current time is located is the newly added terminal. If the attribution processing is performed on the newly added terminal generated on the previous day at 24:00 a day in the morning, the device where the target application program which has been activated before 24:00 a day in the morning may be used as the existing terminal, and the device where the target application program which has been newly activated between 24:00 a day in the morning and the current time may be used as the newly added terminal.

The method for determining a terminal source according to this embodiment may be implemented when a service server corresponding to a target application provides a service function, or may also be implemented when the service server suspends providing a service, which is not limited in this disclosure. For example, the following scheme of the present embodiment may be implemented periodically, for example, in the case of daily implementation, the following attribution processing may be performed on all the newly added terminals of the previous day at 00:30 in the morning of each day. For example, attribution processing can be carried out on all newly added terminals from 00:30 in the morning today to 00:00-24:00 in the morning yesterday; and performing attribution processing and the like on all newly added terminals from 00:30 in tomorrow early morning to 00:00-24:00 in tomorrow early morning.

In this embodiment, both the existing terminal and the newly added terminal are connected to a Wi-Fi network, wherein any existing terminal or any Wi-Fi connected to the newly added terminal may form an ESS (extended Service Set), so that an SSID (Service Set Identifier) of the ESS may be used as a network Identifier of the Wi-Fi network. The SSID corresponding to any Wi-Fi network is a network name set for the Wi-Fi network by the Wi-Fi network manager, such as "abcdefg", "office 123456", wifi of a small white house ", and the like.

In an embodiment, a buried point may be preset in the target application according to an invitation behavior that may be implemented by a user, and the buried point may be buried at a trigger position of the invitation behavior, for example, in a case that the invitation behavior is a link copy behavior, the buried point may be buried at the link or at a clipboard, and so on, which is not described again. When the user corresponding to the existing terminal implements the invitation behavior in the target application program, the existing terminal may notify the embedded point after detecting the invitation behavior or the embedded point may learn the operation through interrupt triggering, event subscription, and the like, so that the embedded point may send the moment when detecting the invitation behavior as the invitation moment to the service server or the attribution server when the existing terminal detects the invitation behavior. It can be understood that the above-mentioned "buried point sends the invitation time", is essentially that the buried point sends a message containing the invitation time to the server through the existing terminal.

Any existing terminal can send the invitation time to the service server under the condition that the invitation behavior is detected, so that the service server can send the invitation time to the attribution server after receiving the invitation time sent by any existing terminal. Or, in order to reduce the non-service overhead of the service server, after receiving the request of the attribution server for acquiring the invitation time, the invitation time stored at present may be returned to the attribution server in a unified manner. Certainly, since the attribution processing period is usually long, the invitation time and the information related to the invitation behavior in this period are both stored in the service server, and will certainly occupy the storage space or the device memory of the service server, so the service server can send the invitation times in batch to the attribution server after receiving the preset number of invitation times sent by the existing terminal, which is not limited in the embodiment of the disclosure.

Similarly, after determining or receiving the activation time sent by the newly added terminal, the service server may send the activation time to the attribution server immediately, may also send the activation time to the attribution server periodically, and may also wait for the attribution server to request for acquisition, which is not described in detail.

In one embodiment, the attribution server may obtain a network identification of a Wi-Fi network to which the device is connected from a network connection record of the terminal. For example, the attribution server may obtain a first network connection record of the existing terminal in a first time period, and extract a network identifier of a Wi-Fi network to which the existing terminal is connected from the obtained first network connection record; and acquiring a second network connection record of the newly added terminal in a second time period, and extracting the network identifier of the Wi-Fi network connected with the newly added terminal from the acquired second network connection record. Because the network connection record generated when the terminal is connected with the Wi-Fi network usually records the network identifier of the Wi-Fi network, and the same terminal usually does not only connect with one Wi-Fi network but can realize connection switching (or called network roaming) among a plurality of Wi-Fi networks along with position change, the existing terminal usually connects with at least one Wi-Fi network in a first time period or a newly added terminal in a second time period, so that the network identifiers of the complete Wi-Fi networks respectively connected by the existing terminal and the newly added terminal in a response time period are obtained by obtaining the network connection record, and the omission of the network identifiers can be avoided.

Further, in the case that the network identifier is obtained periodically (e.g., the attribution process is performed periodically on the newly added terminal), the attribution server may generally obtain at least one invitation time and at least one activation time within any period. At this time, the starting time point of the first time period may include an invitation time, an activation time, or a starting time of the cycle, and the ending time point of the first time period may be an ending time of the cycle. In other words, the attribution server may obtain a network connection record of the existing terminal from the invitation time to the termination time of the period, may obtain a network connection record of the existing terminal from the activation time to the termination time of any period, or obtain a first network connection record from the start time to the termination time of any period. Similarly, the starting time point of the second time period may be an activation time in the cycle, and the ending time point may be an ending time in the cycle; in other words, the attribution server may obtain a record of network connections of the newly added terminal from the activation time to the termination time of the any period.

And 204, determining at least one group of associated terminals with the same network identifier, wherein any group of associated terminals comprises a first terminal in the existing terminals and a second terminal in the newly added terminal, and determining the interval duration between the activation time of the second terminal in each group of associated terminals and the invitation time of the first terminal.

In this embodiment, the attribution server may determine multiple groups of associated terminals according to the network identifier, where any group of associated terminals includes a first terminal and a second terminal, where the first terminal and the second terminal have the same network identifier. Under the condition that a plurality of network identifications of any existing terminal are the same as those of a plurality of newly added terminals, the existing terminal can belong to a plurality of groups of associated terminals at the same time, namely the existing terminal and the newly added terminals respectively form a plurality of groups of associated terminals. In addition, the interval duration may be an absolute value of the duration, and if the invitation time of the existing terminal in a group of associated terminals is 9:00 am and the activation time of the newly added terminal in the associated terminal is 9:40 am, the interval duration is 40 min; similarly, if the activation time of the new terminal in the associated terminals is 10:20 in the morning, the interval duration is 80min, and the like, which is not described again. Of course, the interval duration may also be in the form of seconds(s) or hours (h), and the like, and the embodiment of the disclosure does not limit this.

In an embodiment, after the interval duration is determined, the attribution server may further establish an association relation table according to the determined association client. For example, the attribution server may record the terminal information of each group of associated terminals into an association relationship table, and the terminal information of any group of associated terminals recorded in the association relationship table may include: the terminal identification comprises a public network identification, an interval duration corresponding to the group of associated terminals and terminal identifications of a first terminal and a second terminal in the group of associated terminals, wherein the public network identification is a network identification of a Wi-Fi network connected with the first terminal and the second terminal in the group of associated terminals. It is understood that any set of associated terminals determined in the above steps uniquely corresponds to one entry in the association table. By establishing the association relation table, the first terminal and the second terminal with the association relation can be correspondingly recorded in the same table entry, thereby avoiding the confusion of the correspondence relation between the terminals and ensuring the orderly processing of the subsequent processing.

Because any first terminal and any second terminal may correspond to multiple same terminal identifiers at the same time, in order to avoid that invalid entries occupy storage space, multiple entries including that the terminal identifier of the first terminal and the terminal identifier of the second terminal are the same may be deleted, and only any one of the entries or only the entry with the smallest interval duration is reserved. For example, in the case where the first terminal a (terminal identification ID _ Ea) connects Wi-Fi networks having SSIDs "ID _ N1", "ID _ N2", and "ID _ N3" for a first period of time, and the second terminal B (terminal identification ID _ Eb) connects Wi-Fi networks having SSIDs "ID _ N2", "ID _ N3", and "ID _ N4" for a second period of time, the association table is established such that entry 1 "ID _ Ea, ID _ Eb, ID _ N2, interval duration 1", and entry 2 "ID _ Ea, ID _ Eb, ID _ N3, interval duration 2" exist. At this time, only the entry 1 or only the entry 2 may be retained in the corresponding relationship table, or only the entry 2 may be retained in the case that the interval duration 1 is greater than the interval duration 2, and only the entry 1 may be retained in the case that the interval duration 1 is less than the interval duration 2, so as to only save the key entry in the association relationship table as much as possible.

Under the condition that the SSID corresponding to the Wi-Fi network is used as the network identifier, the network identifier of the Wi-Fi network may have a duplicate name because the SSID is the network name of the Wi-Fi network, and the Wi-Fi networks in different areas are likely to have the same network name. However, because the different geographic locations of different Wi-Fi networks are different, it is very likely that the first terminal and the second terminal with the different geographic locations far apart are connected to the Wi-Fi network with the same network identifier, but obviously, the first terminal and the second terminal are not connected to the same Wi-Fi network, and the first terminal usually does not implement the invitation behavior with respect to the second terminal, so the reason why the second terminal becomes the new terminal is not the invitation behavior of the first terminal.

Therefore, in order to avoid the attribution error possibly caused by the duplicate Wi-Fi network, the attribution server can delete the corresponding entry of the duplicate Wi-Fi network in the association relation table. For example, the attribution server may determine a first public network identifier recorded in an association table, where a ratio of the identifier number of the first public network identifier recorded in the association table to a total identifier amount of all public network identifiers recorded in the association table is not greater than a preset ratio threshold; at this time, the attribution server may determine that the interval duration corresponding to each group of associated terminals is less than the reference duration when the interval duration corresponding to each group of associated terminals indicated by the first public network identifier is less than the reference duration. Because the duplicate Wi-Fi network generally has more connection records relative to the non-duplicate Wi-Fi network, the association table has a larger number of identifiers of network identifiers, and further by setting a reasonable proportion threshold (i.e., the preset proportion threshold), the duplicate Wi-Fi network (i.e., the identifier proportion is greater than the proportion threshold) and the non-duplicate Wi-Fi network (i.e., the identifier proportion is less than the proportion threshold) can be distinguished, so that the subsequent step only performs attribution processing on the second terminal under the non-duplicate Wi-Fi network, which is equivalent to deleting the entry corresponding to the duplicate Wi-Fi network in the association table. In addition, the preset ratio may be determined according to actual service information such as an application type, a user behavior rule, and the like, and may be set to 5%, 10%, 3%, and the like, which is not limited in the embodiment of the present disclosure. Because the network identifications corresponding to the renamed Wi-Fi network often correspond to a large number of associated entries at the same time, the high-frequency network identifications which are possibly renamed are determined according to the number of the corresponding entries, all entries corresponding to the high-frequency network identifications are deleted, attribution errors possibly caused by the renamed network identifications in the associated table can be removed to a certain extent, and attribution accuracy is improved.

And step 206, under the condition that the interval duration corresponding to any group of associated terminals is less than the reference duration and the associated terminals meet the source judgment condition, attributing the second terminal in any group of associated terminals to the new terminal corresponding to the Wi-Fi fingerprint.

Because the interval durations corresponding to the groups of associated terminals may be different, the associated terminals corresponding to the interval durations with the interval durations smaller than the reference duration in the groups of associated terminals satisfy the source judgment condition, that is, all or a preset portion of the associated terminals with the interval durations smaller than the reference duration satisfy the source judgment condition. For example, under the condition that the reference duration is 30min, all the associated terminals with an interval duration not greater than 30min may all satisfy the source judgment condition, and only part of the associated terminals may also satisfy the source judgment condition, for example, only all the associated terminals with an interval duration less than 10min, all the associated terminals with an interval duration less than 15min, and part of the associated terminals with an interval duration between 10min and 15min, and the like, satisfy the source judgment condition, and are not described again.

In an embodiment, whether the associated terminal corresponding to the interval duration smaller than the reference duration meets the source determination condition may be determined in various ways, which is not limited in the embodiments of the present disclosure. For example, the attribution server may determine an adjacent associated terminal, i.e., an associated terminal whose corresponding interval duration is less than the reference duration, among all associated terminals, and other associated terminals, i.e., a new added terminal (hereinafter, referred to as a coincident terminal) attributed to other attribution fingerprints different from the Wi-Fi fingerprint; then, the attribution server may determine that the neighboring associated terminal satisfies the source determination condition when a terminal contact ratio between the second terminal of the other newly added terminals and the second terminal of the neighboring associated terminal is not greater than a preset contact ratio threshold. The other attribution fingerprints may be information streams, search advertisements, score walls, manufacturer preassembly, and the like, the corresponding attribution modes may be monitoring clipboards, tracing media channels, and the like, and the specific process of attributing the newly added terminal by using the attribution modes corresponding to the other attribution fingerprints may refer to the contents in the related art, and will not be described herein again. In addition, the above-mentioned terminal contact ratio may be a ratio of the number of the overlapped terminals to the number of all the newly added terminals, and the contact ratio threshold may be set according to a specific service scenario, which is not limited in this disclosure, and may be set to 50%, 70%, 20%, or the like.

For another example, the attribution server may obtain an operation record of a first execution target operation of the second terminal of all the associated terminals, and determine an average operation index corresponding to all the associated terminals and an adjacent operation index corresponding to the adjacent associated terminal according to the operation record; at this time, if the index deviation between the adjacent operation index and the average operation index is smaller than the preset deviation threshold, it may be determined that the adjacent associated terminal satisfies the source determination condition. The operation records can record operation information such as login time, work watching quantity, work sharing quantity and the like, the attribution server can determine first average operation indexes of all the newly added terminals according to the operation information of all the newly added terminals, further determine second average operation indexes of the first terminals in all the associated terminals corresponding to interval time less than reference time, and further determine the index deviation by comparing the first average operation indexes with the second average operation indexes. The average operation parameter may be an arithmetic average or a weighted average of operation indexes corresponding to the plurality of terminals, which is not limited in the embodiments of the present disclosure.

For another example, the contact ratio and the index deviation may also be calculated at the same time, and the associated terminal corresponding to the interval duration smaller than the reference duration is determined to satisfy the source judgment condition according to the contact ratio and the index deviation. If the attribution results corresponding to other attribution fingerprints can be obtained firstly, and the coincident terminals belonging to other associated terminals indicated by the attribution results are determined in all associated terminals corresponding to the interval duration less than the reference duration; then, under the condition that the proportion of the overlapped terminal to the newly-added terminal is not larger than a preset overlap ratio threshold value, acquiring an operation record of a target application program in the newly-added terminal, and determining index deviation between the newly-added terminal and first terminals in all the associated terminals corresponding to interval duration smaller than reference duration according to the operation record; and then judging the index deviation: if the index deviation is not less than the preset deviation threshold, it can be determined that the associated terminal corresponding to the interval duration less than the reference duration meets the source judgment condition. By the method, the newly-added terminal meeting the source judgment condition can be judged by the more severe judgment condition, so that more accurate terminal grouping is facilitated.

In an embodiment, after the second terminal in the associated terminal is attributed to the new terminal corresponding to the Wi-Fi fingerprint, the accuracy of the attribution result may be further determined. For example, a research message for inquiring the user about the manner in which the above-described target operation is first performed in the second terminal may be sent to the second terminal, so that the second terminal may present the message to the user, generate a research result according to the detected reply operation performed by the user to the message, and return the research result to the attribution server. Accordingly, the attribution server can determine the accuracy of attribution of the second terminal in the associated terminals to the newly added terminal of the Wi-Fi fingerprint according to the research result returned by the second terminal. The research message may include a plurality of alternative installation manners, such as information flow, search advertisement, credit wall, manufacturer pre-installation, old user invitation, and the like, so that the user may select a manner in which the user actually installs the target application program in the first terminal in the alternative installation manners, and submit the research result to complete the research. Therefore, the second terminal corresponding to the user selecting the old user invitation mode is the real newly-added terminal corresponding to the Wi-Fi fingerprint, so that the proportion of the number of the terminals selecting the old user invitation mode in the effective investigation result to the number of the effective investigation terminals can be used as the attribution accuracy. For example, in the case where S0 pieces of research messages are sent out and S1 pieces of valid research messages are received back, if S2 pieces of the old user invitation method are selected, the attribution accuracy may be S2/S1.

Further, to encourage old users to conduct an invitation action to invite more new users, the old users may be rewarded. If the valid invitation terminal is determined to be an existing terminal belonging to the same group of associated terminals as the newly added terminal attributed to the Wi-Fi fingerprint, and then the preset resources are allocated to the user account logged in by the valid invitation terminal at the invitation moment. The preset resource may be a point, a virtual currency, a coupon, a voucher, etc., which is not limited in the embodiments of the present disclosure. Certainly, in order to simultaneously stimulate new users, preset resources can be allocated to user accounts logged in by the newly added terminal corresponding to the Wi-Fi fingerprint, and/or invitation prompt information is sent to the user accounts, so that the new users can recommend the target application program to others by performing recommendation operation, secondary addition is achieved, the user range is further expanded, and the sharing effect is improved.

In an embodiment, after completing the attribution, the attribution server may send invitation information corresponding to the attribution result to other systems for secondary utilization, so as to guide the subsequent business development using the attribution result. For example, the attribution server may first obtain invitation information received by a newly added terminal attributed to the Wi-Fi fingerprint, where the invitation information at least records an invitation relationship between a sender terminal of the invitation message and the newly added terminal; and then, the invitation information can be sent to a user analysis system, so that the user analysis system can adjust the user image of the user corresponding to the newly added terminal according to the invitation information, and accurate image of the newly added user can be realized. And/or the attribution server can also send the invitation information to the content recommendation system so that the content recommendation system adjusts the recommended content for the newly added terminal according to the invitation information, thereby being beneficial to realizing more personalized and targeted content recommendation and further presenting a better recommendation effect for the newly added terminal.

In the embodiment, the existing terminal and the newly added terminal in the same Wi-Fi network are associated through the network identifiers of the Wi-Fi network connected with the existing terminal and the newly added terminal, so that the associated terminal is determined; further, the interval duration between the invitation moment when the first terminal detects the invitation behavior and the activation moment when the second terminal operates the target application program for the first time is used for determining the newly added terminal which is in the same Wi-Fi network with the existing equipment and activates the application program within a short time interval, and attributing the newly added terminal to the newly added terminal corresponding to the Wi-Fi fingerprint. Therefore, the newly added terminal is attributed through the Wi-Fi network and the interval duration which are weakly related to the user invitation behavior, and obviously, even if the step that the attribution fingerprint is difficult to determine exists in the invitation link, even under the scene that the invitation link is incomplete, the scheme can still realize the accurate attribution of the newly added terminal.

Fig. 3 is a flowchart illustrating another test case generation method according to an exemplary embodiment of the present specification, where the method is applied to an attribution server, such as a business server with attribution functionality, as shown in fig. 3. The terminal sourcing determination process described in the present disclosure is described in detail below with reference to fig. 3, and may include the following steps 301-308.

Step 301, acquiring the terminal information of the existing terminal and the terminal information of the newly added terminal in the previous day.

In the operation and promotion process of the target application program, a new terminal (corresponding to a new user) can be generated at any time, so that the new terminal in the time can be attributed once at intervals to analyze the new mode of the new terminal, thereby being beneficial to realizing the identification of different invitation ways and corresponding rewards. The attribution process may be performed periodically (i.e., the period of time is a fixed period of time), such as daily, weekly, monthly, quarterly, yearly, etc. In addition, the target application may be a live application, a video playing application, an instant messaging application, and the like, which is not limited in the embodiments of the present disclosure.

This embodiment will be described by taking an example of daily attribution processing for a newly added terminal on the previous day. In this embodiment, the attribution server may start attribution processing to a newly added terminal generated on the previous day at a fixed time every morning (e.g., 00:30 a.m., 1:00 a.m.).

First, the terminal information of the existing terminal and the newly added terminal on the previous day needs to be acquired. The existing terminal is a terminal device already running a target application in an activated state, for example, the target application has been opened and run, or a registered user account has been logged in. The new terminal is a terminal device that operates (i.e., activates) the target application for the first time, such as first installation, first opening operation, or first login of a registered user account. It can be understood that the existing terminal and the new terminal in the scheme are concepts related to the current time: when the processing is carried out on the same day, the existing terminal is the terminal which is activated before 00:00 of the previous day, and the newly added terminal is the terminal which is activated in the previous day (namely 00:00-24:00 of the previous day).

In an embodiment, the device information of the existing terminal may include a terminal identifier of the existing terminal, a time when the existing terminal detects the invitation behavior (i.e., the invitation time), and a network identifier of a Wi-Fi network to which the existing terminal is connected during the first time period. The invitation time may be sent to the service server from a buried point preset in the target application program, for example, the buried point may be preset at an operation location corresponding to the invitation behavior, and for example, when the invitation behavior is a link copy behavior, the buried point may be buried at the link or at a clipboard, and the like, which is not described in detail. Therefore, the embedded point may send the invitation time (i.e., the time when the invitation behavior is detected) to the service server when the existing terminal detects the preset invitation behavior implemented by the user or the embedded point learns the operation through interruption triggering, event subscription, or other manners, and may also send the terminal identifier of the existing terminal at the same time.

In an embodiment, any existing terminal may send the invitation time to the service server when detecting the invitation behavior, so that the service server may send the invitation time to the attribution server after receiving the invitation time sent by any existing terminal. Or, in order to reduce the non-service overhead of the service server, after receiving an acquisition request for the invitation time of the attribution server, the currently stored invitation time may be returned to the attribution server in a unified manner. Certainly, since the attribution processing period is usually long, the invitation time and the information related to the invitation behavior in this period are both stored in the service server, and will certainly occupy the storage space or the device memory of the service server, so that the service server may send the invitation times in batch to the attribution server after receiving the preset number of invitation times sent by at least one existing terminal, which is not limited in the embodiment of the present disclosure.

In an embodiment, the network identifier may be an SSID of a Wi-Fi network to which the existing terminal is connected, that is, a network name set for the network by an administrator of the Wi-Fi network, such as "abcdefg", "office 123456", "wif i of a small white house", and the like. The existing terminal records the SSID of the Wi-Fi network connected with the existing terminal in the connection record of the Wi-Fi network connected with the existing terminal in the previous day according to the time sequence, so that the attribution server can directly request the service server to acquire the network connection record, the service server returns the received network connection record of the existing terminal to the attribution server, or the service server requests each existing terminal to acquire the network connection record and then returns the acquired network connection record to the attribution server. The first time period may be from 00:00 a day before to 24:00 a day before, may be from an invitation time of the day before to 24:00 a day before, and may be from an activation time of the day before to 24:00 a day before, which is not described again. It can be understood that, at this time, the attribution server does not need to obtain all the network connection records of the existing terminals, but only needs to determine the existing terminal implementing the invitation behavior according to the received invitation time and correspondingly obtain the network connection records of the existing terminal (because only the users corresponding to the existing terminal implement the invitation behavior), thereby greatly reducing the number of the network connection records of the existing terminal that need to be obtained.

Similarly, the terminal information of the newly added terminal may include a terminal identifier of the newly added terminal, a time when the newly added terminal first runs the target application (i.e., the activation time), and a network identifier of the Wi-Fi network to which the newly added terminal is connected in the second time period. The activation time may be a time when the newly added terminal opens the target application program for the first time, a time when the user account is registered in the target application program for the first time or is logged in for the first time, and the like. The second time period may be from the activation time of the previous day to 24:00 of the previous day, and the network identifier may be an SSID of a Wi-Fi network connected to the newly added terminal, that is, a network name set for the Wi-Fi network by the client of the Wi-Fi network. The specific process of obtaining the network identifier corresponding to the newly added terminal by the attribution server through obtaining the network connection record of the newly added terminal in the second time period may refer to the processing process of the existing terminal, and is not described again.

In the foregoing embodiment, the terminal Identifier of any one of the existing terminal or the newly added terminal may be used to uniquely identify the terminal, For example, the terminal may be an IMEI (International Mobile Equipment Identity), an IDFA (Identifier For Advertising), a UDID (Unique Device Identity), a UUID (universal Unique Identifier), or the like of the terminal, which is not limited in the embodiment of the present disclosure. In addition, because there may be a plurality of existing terminals implementing the invitation behavior in the previous day and a plurality of devices operating the target application for the first time to become the new terminal, the attribution server may acquire the terminal information of all the existing terminals implementing the invitation behavior in the previous day and the terminal information of all the new terminals in the previous day in the above manner, so as to ensure the comprehensiveness of the attribution result as much as possible.

Step 302, the first terminal in the existing terminals and the second terminal in the new terminal are associated by using the SSID corresponding to the terminal.

The acquired terminal information of the existing terminal and the newly added terminal comprises SSIDs of Wi-Fi networks connected with the existing terminal and the newly added terminal, so that the attribution server can respectively determine a first terminal and a second terminal which correspond to the same SSID in the existing terminal and the newly added terminal through the SSID. For example, the attribution server may sequentially query SSIDs corresponding to each acquired existing terminal and each acquired newly added terminal, and determine the existing terminal and the newly added terminal corresponding to the same SSID as the first terminal and the second terminal corresponding to the SSID, respectively; or, structured data indexes related to the existing terminal and the newly added terminal can be respectively established through the SSID, so that the data indexes are used for realizing the rapid matching of the SSIDs of the existing terminal and the newly added terminal, and the matching speed of the SSID is accelerated.

In consideration of flexibility of a spatial location of a terminal user (for example, when the user walks), in the SSID matching process, the terminal may only need to be connected to the Wi-Fi network in the previous day without paying attention to actual connection time of the Wi-Fi network corresponding to each SSID.

For any pair of the first terminal and the second terminal that are associated with each other (both corresponding to the same SSID) determined in the above process, they may be referred to as associated terminals, i.e., a group of associated terminals includes one first terminal and one second terminal that correspond to the same SSID. Further, since the terminal information of the first terminal in any group of associated terminals includes the invitation time of the first terminal, and the terminal information of the second terminal includes the activation time of the second terminal, the attribution server may calculate the interval duration corresponding to each group of associated terminals, that is, the time difference between the activation time of the second terminal and the invitation time of the first terminal.

If the invitation time of the first terminal is 13:00 on the previous day, the interval time length of the group of the associated terminals is 30min under the condition that the activation time of the second terminal is 13:30 on the previous day; and in the case that the activation time of the second terminal is 12:40 on the previous day, the interval duration of the group of the associated terminals is-20 min. It can be understood that, for the first terminal and the second terminal having a true invitation relationship, the invitation time of the first terminal is necessarily earlier than the activation time of the second terminal, so that the associated terminal with the negative or zero interval duration may be deleted, and only the associated terminal with the remaining interval duration greater than zero is used to participate in the subsequent processing procedure, thereby avoiding interference and reducing the subsequent processing workload.

Step 303, an association relation table corresponding to the association terminal is established.

At this time, the association relation table may be generated according to the determined association terminal. For example, entries corresponding to each set of association terminals may be generated in the association relationship table, where any set of association terminals may uniquely correspond to one entry in the association relationship table. The entry corresponding to any group of associated terminals may record the terminal identifier of the first terminal, the terminal identifier of the second terminal, the public network identifier corresponding to both the first terminal and the second terminal, and the interval duration between the activation time of the second terminal and the invitation time of the first terminal. For example, the association table may be as shown in table 1 below.

TABLE 1

Serial number First terminal identification Second terminal identification Common SSID Interval duration (minutes)
1 ID_T1_1 ID_T2_1 SSID1 12
2 ID_T1_2 ID_T2_2 SSID2 3
3 ID_T1_2 ID_T2_2 SSID3 3
4 ID_T1_4 ID_T2_4 SSID4 65
5 ID_T1_5 ID_T2_5 SSID4 1
... ... ... ... ...

In table 1, "first terminal identifier" is a terminal identifier of a first terminal in the associated terminals, "second terminal identifier" is a terminal identifier of a second terminal in the associated terminals, "common SSID" is an SSID of a Wi-Fi network that the first terminal and the second terminal in the associated terminals are connected to together, "interval duration" is a time difference between an activation time of the second terminal and an invitation time of the first terminal. Because it is impossible for the first terminal to implement the invitation behavior to the second terminal in the associated terminals with the negative or zero interval duration, only the table entry corresponding to the associated terminal with the positive interval duration is recorded in table 1, that is, the correspondence table may be created only for the associated terminal with the positive interval duration.

Further, in order to reduce parameter interference in the subsequent processing process, the association relation table may be subjected to preliminary processing. For example, there may be a Wi-Fi network in which any existing terminal and any new terminal have two same names connected in the previous day, and at this time, the existing terminal and the new terminal may correspond to two entries in the association table, as shown in entry 2 and entry 3. It is understood that although there are two entries, entry 2 and entry 3 correspond to the same set of associated terminals and thus may alternatively be retained, such as deleting entry 2 or deleting entry 3.

Step 304a, determine and filter out high frequency entries in the association table.

Because the SSID is the network name of a Wi-Fi network, and Wi-Fi networks in different geographic locations are likely to have the same network name, there is often a duplication of network identification for Wi-Fi networks. Due to the different geographic locations corresponding to different Wi-Fi networks, it is highly likely that a first terminal and a second terminal, which are located at different geographic locations, are connected to a Wi-Fi network with the same network identifier (for example, a certain Wi-Fi network located in beijing and another Wi-Fi network located in guangzhou are renowned, but the two are not actually the same network). Obviously, the first terminal and the second terminal are not connected to the same Wi-Fi network, and the first terminal usually does not implement the invitation behavior with respect to the second terminal, so the reason why the second terminal becomes the new terminal is not the invitation behavior of the first terminal.

In order to avoid the attribution error caused by the renaming of the Wi-Fi network, the attribution server can delete the corresponding high-frequency table entry of the renaming network in the association relation table. For example, the attribution server may first determine that a ratio of the number of identifiers of the first public SSID to the total number of identifiers of all public SSIDs recorded in the association table is not greater than a preset ratio threshold, and at this time, may delete the entry where the first public SSID is located in the association table, and use the remaining entries in determining whether the associated terminal satisfies the source determination condition in step 306 described below. The preset proportion may be determined according to actual service information such as an application program type and a user behavior rule, and may be set to 5%, 10%, 3%, or the like, which is not limited in the embodiments of the present disclosure. Because the network identifications corresponding to the renamed Wi-Fi networks often correspond to a large number of associated entries at the same time, the network identifications which are possibly renamed are determined according to the number of the corresponding entries, and then all entries corresponding to the part of network identifications are deleted, so that attribution errors possibly brought by the renamed network identifications in the association relation table are eliminated, and the attribution accuracy is improved.

Step 304b, obtain attribution results of other attribution fingerprints.

In one embodiment, the attribution server may obtain attribution results of other attribution fingerprints, that is, obtain attribution results determined by other attribution means. The other attribution fingerprints may be information streams, search advertisements, score walls, manufacturer preassembly, and the like, the corresponding attribution modes may be monitoring clipboards, tracing media channels, and the like, and the specific process of attributing the newly added terminal by using the attribution modes corresponding to the other attribution fingerprints may refer to the contents in the related art, and will not be described herein again. The implementation of determining attribution results through other attribution means can be realized by an attribution server, the aforementioned business server or other devices.

It should be noted that the processing objects subjected to the attribution processing by the other attribution methods are also existing terminals and newly added terminals in the previous day, that is, the processing objects of the other attribution methods should be guaranteed to be the same as the processing objects of the attribution processing methods (hereinafter referred to as the attribution methods of the present scheme) described in the embodiments of the present disclosure, so as to guarantee the validity of the degree of overlap of the terminals as much as possible.

Step 305, calculating the terminal contact ratio and the index deviation of the associated terminal.

On one hand, the attribution server may count the entries corresponding to each interval duration first, then sequentially count the overlapping terminals of all the associated terminals not exceeding each interval duration and the other associated terminals indicated by the other attribution manners, and further calculate the proportion of the overlapping terminal to the newly added terminal as the terminal overlap ratio of the associated terminals. Obviously, this method can calculate the terminal contact ratio corresponding to each interval duration: if the terminal overlap ratio corresponding to the interval duration of 5min is the terminal overlap ratio between all the newly added terminals with the interval duration not more than 5min and the newly added terminals indicated by the attribution results of other attribution modes; the overlap ratio corresponding to the interval duration of 30min is the terminal overlap ratio between all the newly added terminals with the interval duration not greater than 30min and the newly added terminals indicated by the attribution results of other attribution modes, and the like, and is not described in detail. The terminal contact ratio corresponding to any interval duration can be used for characterizing: the newly added terminal with the interval duration determined by the attribution results of other attribution modes not exceeding the interval duration and the newly added terminal with the interval duration determined by the attribution mode of the scheme not exceeding the interval duration are overlapped. The higher the contact ratio is, the more newly added terminals are identified by other attribution modes and the attribution mode of the scheme at the same time; the lower the contact ratio is, the fewer the newly added terminals are identified by other attribution modes and the attribution mode of the scheme.

On the other hand, the attribution server may obtain an operation record of a first execution target operation of the second terminal of all the associated terminals, and determine an average operation index corresponding to all the associated terminals and an adjacent operation index corresponding to the adjacent associated terminal according to the operation record. The operation records can record operation information such as login time, work watching quantity, work sharing quantity and the like, the attribution server can determine first average operation indexes of all the newly added terminals according to the operation information of all the newly added terminals, further determine second average operation indexes of the first terminals in all the associated terminals corresponding to interval time less than reference time, and further determine the index deviation by comparing the first average operation indexes with the second average operation indexes.

In step 306, an attribution time window is determined to determine a second terminal attributed to the Wi-Fi fingerprint.

After the terminal contact ratio and the index deviation are obtained through calculation, whether the associated terminal corresponding to the interval duration less than a certain duration meets the source judgment condition or not can be determined according to the terminal contact ratio and/or the index deviation, and then the attribution time window is determined. The following description will be made by taking the minimum particle size with 1min as the interval duration as an example.

For example, assuming that the number of all the newly added terminals in the previous day is 10 ten thousand, and 6 ten thousand of the newly added terminals are identified by the attribution results determined by other attribution methods, if the attribution method of the present scheme determines that 5 ten thousand of all the associated terminals (corresponding to 5 ten thousand second terminals) with the interval duration not greater than 32min, and there are 3 ten thousand of overlapping terminals of the newly added terminals identified by the attribution results determined by other attribution methods, the terminal overlapping ratio corresponding to the interval duration 32min is 3 ten thousand/5 ten thousand — 60%. Meanwhile, if the attribution mode of the scheme determines that 6 thousands of all associated terminals (corresponding to 6 thousands of second terminals) with the interval duration not greater than 33min exist, wherein 3.1 thousands of overlapped terminals exist in the newly added terminals identified by the attribution results determined by other attribution modes, the terminal overlapping degree corresponding to the interval duration 33min is 3.1/6-51.7%. Assuming that the preset overlap ratio threshold is 55%, since 51.7% < 55% < 60%, the associated terminals with the interval duration not greater than 32min can be determined to satisfy the source judgment condition, so that the associated terminals can be determined to be the second terminals attributed to the Wi-Fi fingerprint.

For another example, assuming that the average login duration of all newly added terminals is calculated to be 25min, if the average login duration of the newly added terminals with the interval duration not greater than 20min determined by the attribution method of the present scheme is 23min, the index deviation corresponding to the interval duration 20min is 23/25-92%; if the average login duration of the newly-added terminal with the interval duration not greater than 21min is 15min, which is determined by the attribution method of the scheme, the index deviation corresponding to the interval duration 21min is 15/25-60%. Assuming that the preset similarity threshold is 80%, since 60% < 80% < 92%, it can be determined that the associated terminals with the interval duration not greater than 20min satisfy the source judgment condition, so that the associated terminals can be attributed to the Wi-Fi fingerprint.

Or, the determination results of the terminal contact ratio and the index deviation may be integrated, and the intersection of the two attributed second terminals is used as the second terminal attributed to the Wi-Fi fingerprint, that is, as the final attribution result, which is not described again in detail in the specific process.

Step 307a, the invitation information is determined and sent.

After the attribution is completed, the attribution server can send invitation information corresponding to the attribution result to other systems for secondary utilization, so that the attribution result is used for guiding the subsequent business to be carried out. For example, the attribution server may first obtain invitation information of a newly added terminal corresponding to the Wi-Fi fingerprint, where the invitation information may at least record an invitation relationship between a first terminal corresponding to the newly added terminal and the newly added terminal; and then, the invitation information can be sent to a user analysis system, so that the user analysis system can adjust the user portrait of the user corresponding to the newly added terminal according to the invitation information, and the accurate portrait of the newly added user is realized. And/or the attribution server can also send the invitation information to the content recommendation system, so that the content recommendation system can adjust the recommended content for the newly added terminal according to the invitation information, and a better recommendation effect is presented for the newly added terminal.

Additionally, to encourage old users to conduct an invitation action to invite more new users, the old users may be rewarded. If the valid invitation terminal is determined to be an existing terminal belonging to the same group of associated terminals as the newly added terminal attributed to the Wi-Fi fingerprint, and then the preset resources are allocated to the user account logged in by the valid invitation terminal at the invitation moment. The preset resource may be a point, a virtual currency, a coupon, a voucher, etc., which is not limited in the embodiments of the present disclosure. Certainly, in order to simultaneously stimulate new users, preset resources can be allocated to user accounts logged in by the newly added terminal corresponding to the Wi-Fi fingerprint, and/or invitation prompt information is sent to the user accounts, so that the new users can recommend the target application program to others by performing recommendation operation, secondary addition is achieved, the user range is further expanded, and the sharing effect is improved.

Step 307b, sending the investigation message to the second terminal corresponding to the time window.

And step 308, determining attribution accuracy of the second terminal according to the investigation result.

After the second terminal in the associated terminal is attributed to the new terminal corresponding to the Wi-Fi fingerprint, the accuracy of the attribution result can be further judged. For example, a research message for inquiring the user about the manner in which the above-described target operation is first performed in the second terminal may be sent to the second terminal, so that the second terminal may present the message to the user, generate a research result according to the detected reply operation performed by the user to the message, and return the research result to the attribution server. Accordingly, the attribution server may determine, from the research result returned by the first terminal, the accuracy with which the second terminal of the associated terminals is attributed to the newly added terminal due to the Wi-Fi fingerprint.

The research message may include a plurality of alternative installation manners, such as information flow, search advertisement, credit wall, manufacturer pre-installation, old user invitation, and the like, so that the user may select an actual manner in which the user actually installs the target application program in the first terminal among the alternative installation manners, and submit a research result to complete research. Therefore, the second terminal corresponding to the user selecting the old user invitation mode is the real newly-added terminal corresponding to the Wi-Fi fingerprint, so that the proportion of the number of the terminals selecting the old user invitation mode in the effective investigation result to the number of the effective investigation terminals can be used as the attribution accuracy. For example, in the case of sending 10000 research messages and receiving 4000 valid research results, if 3500 valid research results indicate that the new user activates the target application by means of invitation of the old user, the attribution accuracy of the corresponding Wi-Fi fingerprint is 3500/4000-87.5%.

Corresponding to the embodiment of the method for determining the source of the terminal, the disclosure also provides an embodiment of a device for determining the source of the terminal.

Fig. 4 is a schematic block diagram illustrating a terminal origination determining apparatus according to an embodiment of the present disclosure. The terminal source determining device shown in this embodiment may be a physical server including an independent host, a virtual server borne by a host cluster, a cloud server, or the like. The apparatus may be adapted to attribution instances corresponding to target applications running in a terminal, including but not limited to a cell phone, a tablet, a wearable device, a personal computer, and other electronic devices. The target application program may be an application program installed in the terminal, or may be a web application integrated in a browser.

As shown in fig. 4, the terminal sourcing determination apparatus may include:

an obtaining unit 401, configured to obtain an invitation time when an existing terminal detects an invitation behavior, an activation time when a newly added terminal performs a target operation for the first time, and network identifiers of wireless fidelity Wi-Fi networks to which the existing terminal and the newly added terminal are respectively connected, where the existing terminal has performed the target operation before detecting the invitation behavior;

a determining unit 402, configured to determine at least one group of associated terminals with the same network identifier, where any group of associated terminals includes a first terminal in the existing terminals and a second terminal in the newly added terminal, and determine an interval duration between an activation time of the second terminal in each group of associated terminals and an invitation time of the first terminal;

an attributing unit 403, configured to attribute a second terminal in any one group of associated terminals to a new terminal corresponding to the Wi-Fi fingerprint when the interval duration corresponding to the any one group of associated terminals is less than the reference duration and the any one group of associated terminals meets the source determination condition.

Optionally, the obtaining unit 401 is further configured to:

acquiring a first network connection record of the existing terminal in a first time period, and extracting a network identifier of a Wi-Fi network connected with the existing terminal from the first network connection record; and the number of the first and second groups,

and acquiring a second network connection record of the newly added terminal in a second time period, and extracting the network identifier of the Wi-Fi network connected with the newly added terminal from the second network connection record.

Optionally, the network identifier is obtained periodically, and in any period of obtaining the invitation time and the activation time:

the starting time point of the first time period comprises the invitation time, the activation time or the starting time of any cycle, the starting time point of the second time period is the activation time, and the ending time points of the first time period and the second time period are the ending time of any cycle.

Optionally, the determining unit 402 is further connected to a recording unit 404, and the recording unit 404 is configured to:

recording the terminal information of each group of associated terminals to an association relation table, wherein the terminal information of any group of associated terminals recorded in the association relation table comprises: the terminal identification comprises a public network identification, an interval duration corresponding to any group of associated terminals and terminal identifications of a first terminal and a second terminal in any group of associated terminals, wherein the public network identification is the network identification of a Wi-Fi network connected with the first terminal and the second terminal in any group of associated terminals.

Optionally, the method further includes:

a first determining unit 405 configured to determine a first public network identifier recorded in the association table, where a ratio of the identifier number of the first public network identifier recorded in the association table to a total identifier amount of all public network identifiers recorded in the association table is not greater than a preset ratio threshold;

a duration determining unit 406, configured to determine that the interval duration corresponding to each group of associated terminals indicated by the first public network identifier is smaller than the reference duration when the interval duration corresponding to each group of associated terminals is smaller than the reference duration.

Optionally, the attribution unit 403 is further configured to:

determining other newly added terminals and adjacent associated terminals in all associated terminals, wherein the other newly added terminals are newly added terminals which are attributed to other attribution fingerprints different from the Wi-Fi fingerprints, and the adjacent associated terminals are associated terminals corresponding to which the interval duration is smaller than the reference duration;

and under the condition that the terminal contact ratio between the second terminal in the other newly-added terminals and the second terminal in the adjacent associated terminal is not more than a preset contact ratio threshold value, determining that the adjacent associated terminal meets the source judgment condition.

Alternatively to this, the first and second parts may,

the system further comprises a record obtaining unit 407, configured to obtain an operation record of first executing the target operation by a second terminal of all the associated terminals, and determine an average operation index corresponding to all the associated terminals and an adjacent operation index corresponding to the adjacent associated terminal according to the operation record;

the attribution unit 403 is further configured to: and if the index deviation between the adjacent operation index and the average operation index is smaller than a preset deviation threshold value, determining that the adjacent associated terminal meets a source judgment condition.

Optionally, the method further includes:

a message sending unit 408 configured to send a research message to the second terminal, the research message being used to inquire a user about a manner in which the target operation is first performed in the second terminal;

an accuracy determination unit 409 configured to determine, according to the investigation result returned by the second terminal, the accuracy of attributing the second terminal of the associated terminals to the newly added terminal of the Wi-Fi fingerprint.

Optionally, the method further includes:

a validity determining unit 410 configured to determine valid invitation terminals that are existing terminals belonging to the same group of associated terminals as the newly added terminal attributed to the Wi-Fi fingerprint;

a resource allocation unit 411, configured to allocate preset resources to the user account logged in by the valid invitation terminal at the invitation time.

Optionally, the method further includes:

an information obtaining unit 412, configured to obtain invitation information received by a newly added terminal attributed to the Wi-Fi fingerprint, where the invitation information records at least an invitation relationship between a sender terminal of the invitation message and the newly added terminal;

a first sending unit 413, configured to send the invitation information to a user analysis system, where the user analysis system is configured to adjust a user portrait of a user corresponding to the newly added terminal according to the invitation relationship; and/or the presence of a gas in the gas,

a second sending unit 414, configured to send the invitation information to a content recommendation system, where the content recommendation system is configured to adjust recommended content for the newly added terminal according to the invitation relationship.

With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.

An embodiment of the present disclosure also provides an electronic device, including:

a processor;

a memory for storing the processor-executable instructions;

wherein the processor is configured to execute the instructions to implement the method for determining the source of the terminal according to any of the above embodiments.

Embodiments of the present disclosure also provide a storage medium, where instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the method for determining a terminal source according to any of the foregoing embodiments.

Fig. 5 is a schematic block diagram illustrating an electronic device in accordance with an embodiment of the present disclosure. For example, the electronic device 500 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, an exercise device, a personal digital assistant, and the like.

Referring to fig. 5, electronic device 500 may include one or more of the following components: processing component 502, memory 504, power component 506, multimedia component 508, audio component 510, input/output (I/O) interface 512, sensor component 514, and communication component 518.

The processing component 502 generally controls overall operation of the electronic device 500, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing component 502 may include one or more processors 520 to execute instructions to perform all or a portion of the steps of the above-described method of determining a source of a terminal. Further, the processing component 502 can include one or more modules that facilitate interaction between the processing component 502 and other components. For example, the processing component 502 can include a multimedia module to facilitate interaction between the multimedia component 508 and the processing component 502.

The memory 504 is configured to store various types of data to support operations at the electronic device 500. Examples of such data include instructions for any application or method operating on the electronic device 500, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 504 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.

The power supply component 506 provides power to the various components of the electronic device 500. The power components 506 may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the electronic device 500.

The multimedia component 508 includes a screen that provides an output interface between the electronic device 500 and the user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 508 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the electronic device 500 is in an operating mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.

The audio component 510 is configured to output and/or input audio signals. For example, the audio component 510 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 500 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 504 or transmitted via the communication component 518. In some embodiments, audio component 510 further includes a speaker for outputting audio signals.

The I/O interface 512 provides an interface between the processing component 502 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.

The sensor assembly 514 includes one or more sensors for providing various aspects of status assessment for the electronic device 500. For example, the sensor assembly 514 may detect an open/closed state of the electronic device 500, the relative positioning of components, such as a display and keypad of the electronic device 500, the sensor assembly 514 may detect a change in the position of the electronic device 500 or a component of the electronic device 500, the presence or absence of user contact with the electronic device 500, orientation or acceleration/deceleration of the electronic device 500, and a change in the temperature of the electronic device 500. The sensor assembly 514 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 514 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 514 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.

The image capture component 516 can be used to capture image data of a subject to form an image about the subject and can perform the necessary processing on the image. The Image capture component 516 may include a camera module, in which an Image Sensor (Sensor) senses light from a subject through a lens, and provides the obtained light sensing data to an Image Signal Processor (ISP), which generates an Image corresponding to the subject from the light sensing data. The image sensor may be a CMOS sensor or a CCD sensor, and may also be an infrared sensor, a depth sensor, or the like; the camera module may be built in the electronic device 500, or may be an external module of the electronic device 500; the ISP may be built in the camera module or may be externally hung on the electronic device (not in the camera module).

The communication component 518 is configured to facilitate wired or wireless communication between the electronic device 500 and other devices. The electronic device 500 may access a wireless network based on a communication standard, such as WiFi, a carrier network (such as 2G, 3G, 4G, or 5G), or a combination thereof. In an exemplary embodiment, the communication component 518 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 518 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.

In an embodiment of the present disclosure, the electronic device 500 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-mentioned method for determining the source of the terminal.

In an exemplary embodiment, a computer-readable storage medium comprising instructions, such as the memory 804 comprising instructions, executable by the processor 820 of the apparatus 800 to perform the above-described method is also provided. Alternatively, the computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.

In an exemplary embodiment, a computer program product is further provided, which includes a computer program and/or instructions, and when executed by a processor, the computer program and/or instructions implement the terminal source determining method according to any of the above embodiments.

Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This disclosure is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.

It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

It is noted that, in the present disclosure, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. The terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

The method and apparatus provided by the embodiments of the present disclosure are described in detail above, and the principles and embodiments of the present disclosure are explained herein by applying specific examples, and the above description of the embodiments is only used to help understanding the method and core ideas of the present disclosure; meanwhile, for a person skilled in the art, based on the idea of the present disclosure, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present disclosure should not be construed as a limitation to the present disclosure.

27页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种自适应时隙的邻节点发现方法

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!