Disclosure of Invention
In view of this, embodiments of the present invention provide an electronic credential pushing method and apparatus based on user behavior, and an electronic device, which at least partially solve the problems in the prior art.
In a first aspect, an embodiment of the present invention provides an electronic credential pushing method based on user behavior, including:
acquiring historical electronic certificate acquisition information of a plurality of users, and generating a two-dimensional matrix comprising the plurality of users and events corresponding to the plurality of electronic certificates;
performing association aggregation on a plurality of user hobbies in the two-dimensional matrix to form a hobbies association aggregation list;
acquiring a historical transaction record of a current user, and determining a new characteristic of the current user based on the historical transaction record and the preference association degree aggregation list;
pushing an electronic credential associated with the new feature to a user.
According to a specific implementation manner of the embodiment of the present invention, the obtaining historical electronic certificate pickup information of a plurality of users and generating a two-dimensional matrix including the plurality of users and a plurality of electronic certificates includes:
aiming at historical electronic certificate acquisition information of a user, constructing corresponding event characteristic vectors, wherein each event is used as a characteristic value and is represented in the characteristic vectors in a binary manner;
counting the occurrence times m of the events of the same type in a preset period
iAnd total number of events occurring of all types
Will be provided with
As weighting coefficients for the same type of event;
and constructing the two-dimensional matrix on the basis of the feature vectors after the weighting coefficients are set.
According to a specific implementation manner of the embodiment of the present invention, the constructing the two-dimensional matrix based on the eigenvectors after the setting of the weighting coefficients includes:
acquiring a user set and a feature vector set after setting a weighting coefficient;
and taking the user set as a first column of the two-dimensional matrix, and taking the feature vector set after the weighting coefficient is set as the rest columns of the two-dimensional matrix to construct the two-dimensional matrix.
According to a specific implementation manner of the embodiment of the present invention, the aggregating the relevancy of the user preferences in the two-dimensional matrix to form a preference relevancy aggregation list includes:
acquiring an event i and an event j in the two-dimensional matrix;
determining i.j whether there is an evaluation vector for event i and event j;
if the event j exists, taking i.j/| i | | | | j | | as the similarity of the event i and the event j, and constructing a preference relevancy aggregation list.
According to a specific implementation manner of the embodiment of the present invention, constructing a preference relevance aggregation list by using i.j/| i | | | j | | as a similarity between an event i and an event j includes:
acquiring average scores of all users on the event i;
constructing an upper triangular matrix of the similarity matrix on the basis of the scores of the users on the events i;
and constructing a similarity matrix on the basis of the upper triangular matrix, and taking the similarity matrix as the preference association aggregation list.
According to a specific implementation manner of the embodiment of the present invention, the obtaining of the historical transaction record of the current user and the determining of the new feature of the current user based on the historical transaction record and the preference association degree aggregation list include:
constructing a feature vector containing user features based on the historical transaction records of the user;
calculating a focus value for each feature of the user in the feature vector;
and determining new characteristics of the current user based on the attention value and the preference association degree aggregation list.
According to a specific implementation manner of the embodiment of the present invention, the pushing the electronic certificate related to the new feature to the user includes:
acquiring current position information and the new characteristic information of a user;
determining a plurality of target objects based on the current location information and the new feature information;
determining whether there is an electronic voucher matching at least two different target objects of the plurality of target objects;
and if so, sending the electronic certificate to the user.
According to a specific implementation manner of the embodiment of the present invention, the method further includes:
acquiring first position information and new characteristic information of a user;
determining a plurality of target objects based on the first location information and the new feature information;
judging whether a first electronic certificate which is matched with at least two different target objects in the plurality of target objects and needs to be checked in and triggered exists or not;
and if so, sending the first electronic certificate in the to-be-signed state to a user.
According to a specific implementation manner of the embodiment of the present invention, the method further includes:
acquiring second position information and a sign-in record of the user;
determining whether to prompt a user to sign in the first electronic certificate or not based on the second position information and the sign-in record; and
after the user finishes the check-in operation, acquiring check-in operation information of the user on the first electronic certificate;
judging whether the check-in operation meets a check-in condition or not;
if yes, the first electronic certificate is converted into a second electronic certificate.
In a second aspect, an embodiment of the present invention provides an electronic credential pushing device based on user behavior, including:
the acquisition module is used for acquiring historical electronic certificate acquisition information of a plurality of users and generating a two-dimensional matrix comprising the plurality of users and events corresponding to the plurality of electronic certificates;
the aggregation module is used for performing association aggregation on a plurality of user hobbies in the two-dimensional matrix to form a hobbie association aggregation list;
the determining module is used for acquiring the historical transaction record of the current user and determining the new characteristics of the current user based on the historical transaction record and the preference association degree aggregation list;
and the pushing module is used for pushing the electronic certificate related to the new characteristic to the user.
In a third aspect, an embodiment of the present invention further provides an electronic device, where the electronic device includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method for pushing electronic credentials based on user behavior according to any of the first aspect or any implementation manner of the first aspect.
In a fourth aspect, an embodiment of the present invention further provides a non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute the electronic credential pushing method based on user behavior in the foregoing first aspect or any implementation manner of the first aspect.
In a fifth aspect, the present invention further provides a computer program product, which includes a computer program stored on a non-transitory computer-readable storage medium, where the computer program includes program instructions, and when the program instructions are executed by a computer, the computer executes the electronic credential pushing method based on the user behavior in the foregoing first aspect or any implementation manner of the first aspect.
The electronic certificate pushing scheme based on the user behaviors comprises the steps of obtaining historical electronic certificate obtaining information of a plurality of users and generating a two-dimensional matrix containing the plurality of users and events corresponding to the plurality of electronic certificates; performing association aggregation on a plurality of user hobbies in the two-dimensional matrix to form a hobbies association aggregation list; acquiring a historical transaction record of a current user, and determining a new characteristic of the current user based on the historical transaction record and the preference association degree aggregation list; pushing an electronic credential associated with the new feature to a user. The utilization rate of the electronic certificate is improved through a specific electronic certificate issuing strategy.
Detailed Description
Embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
The embodiments of the present disclosure are described below with specific examples, and other advantages and effects of the present disclosure will be readily apparent to those skilled in the art from the disclosure in the specification. It is to be understood that the described embodiments are merely illustrative of some, and not restrictive, of the embodiments of the disclosure. The disclosure may be embodied or carried out in various other specific embodiments, and various modifications and changes may be made in the details within the description without departing from the spirit of the disclosure. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
It is noted that various aspects of the embodiments are described below within the scope of the appended claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the disclosure, one skilled in the art should appreciate that one aspect described herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. Additionally, such an apparatus may be implemented and/or such a method may be practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present disclosure, and the drawings only show the components related to the present disclosure rather than the number, shape and size of the components in actual implementation, and the type, amount and ratio of the components in actual implementation may be changed arbitrarily, and the layout of the components may be more complicated.
In addition, in the following description, specific details are provided to facilitate a thorough understanding of the examples. However, it will be understood by those skilled in the art that the aspects may be practiced without these specific details.
The embodiment of the disclosure provides an electronic certificate pushing method based on user behaviors. The electronic certificate pushing method based on user behaviors provided by the embodiment can be executed by a computing device, the computing device can be implemented as software, or implemented as a combination of software and hardware, and the computing device can be integrally arranged in a server, a terminal device and the like.
Referring to fig. 1, an embodiment of the present invention provides an electronic credential pushing method based on user behavior, where the method may operate on a server side, and the method includes the following steps:
s101, obtaining historical electronic certificate obtaining information of a plurality of users and generating a two-dimensional matrix containing events corresponding to the plurality of users and the plurality of electronic certificates.
The electronic certificate is generally stored in a specific application program, a user registers a corresponding ID when using the application program, and when the server side needs or the first position of the user, whether the user is in an online state can be judged through the user ID. For example, the server may send a ping command to the device terminal where the user ID is located, and may know whether the user is in an online state by checking whether the device terminal responds. Generally, when a user is in an online state, the corresponding application program is also in a running state.
The server side stores the pushing conditions of all the electronic certificates and the receiving information of the user aiming at the electronic certificates. At this time, the electronic certificate picking-up information of part or all of the users can be obtained from the server side.
In order to facilitate analysis of user characteristics in a quantitative manner, for historical electronic certificate pickup information of a user, a corresponding event feature vector can be constructed in a quantitative manner, and each event (for example, a transaction record or an electronic certificate use record) is represented in a binary manner in the feature vector as a feature value.
The user aims at the same event in a certain periodThe purchase is carried out for a plurality of times, which shows that the event is important for the user, and the occurrence times m of the same type of event in a preset period can be counted
iAnd total number of events occurring of all types
Will be provided with
As a weighting factor for the same type of event.
The two-dimensional matrix is constructed on the basis of the feature vector after the weighting coefficient is set, so that the real transaction features/characteristics of the user can be reflected more accurately.
Specifically, when a two-dimensional matrix is constructed, a user set and a feature vector set after a weighting coefficient is set may be obtained first, the user set is used as a first column of the two-dimensional matrix, and the feature vector set after the weighting coefficient is set is used as the remaining columns of the two-dimensional matrix to construct the two-dimensional matrix.
And S102, carrying out association aggregation on the user hobbies in the two-dimensional matrix to form a hobbie association aggregation list.
When recommending electronic certificates of a user, a new feature of the user needs to be found first, and the new feature of the user often has an association relation with the existing feature of the user. Based on the user's historical preferences, the user's potential new preferences may be inferred. For example, through the historical two-dimensional matrix, people who like eating also like watching movies, but only the electronic certificate which has been pushed to eat by the user before is sent to the user, and the electronic certificate which has not been pushed to watch movies by the user before is sent to the user, and at the moment, the electronic certificate which has been pushed to watch movies can also be sent to the user.
Specifically, any event i (e.g., eating) and event j (e.g., watching a movie) in the two-dimensional matrix may be acquired, and whether an evaluation vector i.j exists for the event i and the event j may be determined, and if an evaluation vector i.j exists, it may be determined that an association relationship exists between the two events. At this time, i.j/| i | | | j | | is taken as the similarity of the event i and the event j, where i.j represents the inner product of two feature entity score vectors and | | | | j | | represents the product of two feature entity score vectors modulo.
In order to reflect the difference of different events for an average event, the average scores of all users for any event i can be obtained, the average scores are subtracted from the real scores at time i to serve as correction scores, and the similarity s (i, j) between the event i and the event j is calculated based on the correction scores.
Through analysis, the following results are found: if s (i, j) is s (j, i) and s (i, i) is 1, only the upper triangular matrix may be considered in the calculation. For example, an upper triangular matrix of a similarity matrix is constructed on the basis of the scores of the users on the event i, the similarity matrix is constructed in a mapping mode on the basis of the upper triangular matrix, and the similarity matrix is used as the preference association degree aggregation list.
S103, acquiring a historical transaction record of the current user, and determining the new characteristics of the current user based on the historical transaction record and the preference association degree aggregation list.
The similarity matrix calculated in step S102 may reflect the internal association relationship between different features. For a particular current user, only the historical transaction records of the current user need to be acquired, and some new characteristics of the user can be acquired.
Specifically, a feature vector C (m) ═ C (C) including features of the user may be constructed based on the historical transaction records of the user
1,C
2...C
n) N, where m is 1. By obtaining the feature vector, the attention value C of each feature of the user in the feature vector can be calculated
mEach attention value indicates the user's preference for a different event. Finally, based on the attention value and the preference association degree aggregation list, the new characteristics of the current user can be determined. For example, by formula
The preference feature vectors of the user for different events can be calculated, and one or more new features of the user can be determined by selecting a larger value in the feature vectors.
S104, pushing the electronic certificate related to the new feature to the user.
Before sending the electronic voucher to the user, it can be checked as a case if the user has previously received the electronic voucher. For example, it may be found whether the user has received one or more of the same electronic credentials within a preset period (e.g., one week).
If the same electronic certificate has been received in the application program of the user, other electronic certificates with different types from the one or more electronic certificates received by the user are sent to the application program corresponding to the user ID.
In order to improve the pushing efficiency of the electronic certificate, the electronic certificate may be pushed in a plurality of ways, referring to fig. 2, an embodiment of the present invention provides an LBS-based electronic certificate pushing method, which may operate on a server side, and the method includes the following steps:
s201, acquiring current position information and new feature information of a user.
When the application program is in the running state, the application program can be used for acquiring the position of the equipment terminal where the application program runs, and further acquiring the position of the user.
Besides obtaining the latest position of the user, a history of the position is generally kept on the device terminal of the user, and at this time, the history position information on the device terminal can be read through an application program.
S202, determining a plurality of target objects based on the current position information and the new characteristic information.
Having determined the latest location of the user, all target objects within a certain distance (e.g., 1KM) in the vicinity, such as some merchants, some vending machines, or ticket dispensers, etc., can be located.
If all target objects in a certain area are directly searched, more resources are generally consumed. For this, a target object related to the feature information of the user may be searched based on the determined new feature information of the user. For example, if the new feature information of the user is "food enthusiasts", then only restaurants within the target range need to be searched. By the searching mode, resources of the server can be saved, and meanwhile, the searching efficiency is improved.
S203, judging whether the electronic voucher matched with at least two different target objects in the plurality of target objects exists or not.
The traditional electronic certificates are usually in a one-to-one relationship, that is, one electronic certificate can only be applied to one target object, so that a user often owns electronic certificates of a plurality of target objects, which results in that the user hardly remembers how many electronic certificates are owned, and the user hardly chooses to use the proper electronic certificate at a specific time or place.
In order to improve the utilization efficiency of the electronic certificate, one electronic certificate is associated with a plurality of target objects. For example, one electronic voucher may be used on multiple target objects of the same type (e.g., restaurants). Alternatively, one electronic voucher may be used on a target object within a certain range (e.g., all merchants near the Wangfu well). Therefore, when the user reaches a specific position, only a small amount of electronic certificates are needed to be pushed to the user, and the target objects related to the transaction habits of the user can be pushed to the user.
And S204, if yes, sending the electronic certificate to the user.
Before sending the electronic voucher to the user, it can be checked as a case if the user has previously received the electronic voucher. For example, it may be found whether the user has received one or more of the same electronic credentials within a preset period (e.g., one week).
If the same electronic certificate has been received in the application program of the user, other electronic certificates with different types from the one or more electronic certificates received by the user are sent to the application program corresponding to the user ID.
Besides the sending method in steps S201 to S204, as another method, referring to fig. 3, the pushing the electronic certificate to the user may further include:
s301, first position information and new feature information of the user are obtained.
When the application program is in the running state, the application program can be used for acquiring the position of the equipment terminal where the application program runs, and further acquiring the position of the user.
S302, determining a plurality of target objects based on the first position information and the new characteristic information.
Having determined the latest location of the user, all target objects within a certain distance (e.g., 1KM) in the vicinity, such as some merchants, some vending machines, or ticket dispensers, etc., can be located.
If all target objects in a certain area are directly searched, more resources are generally consumed. To this end, all target objects that can apply the electronic voucher may be searched based on whether the target objects can apply the electronic voucher.
In order to match the electronic certificate, the target object needs to be set with tags of whether to participate in the electronic certificate, and the tags are stored in the server in advance. Therefore, when the search is carried out based on the tags, the matched target object can be found out under the condition of using less resources.
S303, judging whether the electronic certificate matched with at least two different target objects in the plurality of target objects exists or not.
The traditional electronic certificates are usually in a one-to-one relationship, that is, one electronic certificate can only be applied to one target object, so that a user often owns electronic certificates of a plurality of target objects, which results in that the user hardly remembers how many electronic certificates are owned, and the user hardly chooses to use the proper electronic certificate at a specific time or place.
In order to improve the utilization efficiency of the electronic certificate, one electronic certificate is associated with a plurality of different types of target objects. For example, the electronic voucher may be used on a plurality of different types of target objects (e.g., a plurality of restaurants or a plurality of movie theaters). Alternatively, the electronic voucher may be used on a target object within a specific range (e.g., all merchants near the Wangfu well). Therefore, when the user reaches a specific position, the target object associated with the position area can be pushed to the user only by pushing one electronic certificate to the user, and more target objects can be conveniently and quickly recommended to the user.
S304, if yes, the first electronic certificate in the to-be-signed state is sent to the user.
Before sending the electronic voucher to the user, it can be checked as a case if the user has previously received the electronic voucher. For example, it may be found whether the user has received one or more of the same electronic credentials within a preset period (e.g., one week).
If the same electronic certificate has been received in the application program of the user, other electronic certificates with different types from the one or more electronic certificates received by the user are sent to the application program corresponding to the user ID.
Steps S301 to S304 disclose methods for sending an electronic certificate, which are required to prompt a user to perform a check-in operation in a specific case, in addition to sending the electronic certificate to the user, and the electronic certificate after the check-in is used as the electronic certificate that can be finally used for a target object. Referring to fig. 4, according to a specific implementation manner of the embodiment of the present invention, the operation of reminding the user to sign in the electronic certificate may further include:
s401, second position information and a sign-in record of the user are obtained.
After the user receives the first electronic certificate, the latest position of the user may be obtained through the application program used by the user, and the method for obtaining the position of the user may adopt the method in step S301, where the obtained latest position is used as the second position.
In addition to obtaining the second location of the user, a check-in record for the first electronic certificate needs to be obtained for determining whether the user has performed a check-in operation for the first electronic certificate.
In order to save resources, as an optional mode, the check-in record of the user may be obtained first, and when it is found that the user has not performed check-in operation on the first electronic certificate, the second location information of the user is obtained. Otherwise, when the user is found to have performed the sign-in operation on the first electronic certificate, directly stopping acquiring the second position information of the user.
S402, determining whether to prompt a user to sign in the first electronic certificate or not based on the second position information and the sign-in record.
And when the user is found not to have performed the check-in operation on the first electronic certificate, acquiring second position information of the user. Based on the second location information, whether one or more target objects corresponding to the first electronic certificate exist in a second location range can be acquired. When one or more target objects corresponding to the electronic certificate exist, the user can be reminded to check in.
And S403, after the user finishes the check-in operation, processing the check-in operation of the user.
After the user completes the check-in operation, the electronic voucher may be used for one or more target objects, specifically, in the execution process of step S403, the method may further include:
and S4031, acquiring sign-in operation information of the user on the first electronic certificate.
By acquiring the sign-in operation information of the user on the first electronic certificate, whether the sign-in operation of the user is performed before can be judged, and whether the sign-in operation of the current user is effective can be further judged.
S4032, whether the check-in operation meets the check-in condition is judged.
Different usage rules may be set for different electronic certificates, for example, for a first electronic certificate, a check-in rule may be set to "check in at most 1 time in a day", "check in at most 7 times in a week", or "electronic certificate check in at most 2 times in the Wangfu area". By comparing the check-in operation of the user with the check-in rule, whether the check-in operation of the user meets the check-in condition can be judged.
S4033, if yes, the first electronic certificate is converted into a second electronic certificate.
When the check-in operation of the user meets the check-in condition, the electronic certificate in the check-in state can be converted into a second electronic certificate. The second electronic voucher may be applied to (e.g., used directly as cash in) the plurality of target objects.
After the user completes the operation of step S4033, the state of the first electronic certificate may be changed from the pending-check-in state to a checked-in state.
In addition to the methods shown in steps S4031-S4033, the user is allowed to perform multiple check-in operations, and at this time, the allowed check-in times of the first electronic certificate need to be determined, and after the first electronic certificate does not reach the maximum allowed check-in times, and after the user completes the operation in step S4033, the state of the first electronic certificate is still in a to-be-checked-in state.
As an embodiment, the application method of continuous check-in may include: acquiring third position information of the user and a check-in record aiming at the first electronic certificate; prompting a user to continuously sign in the first electronic certificate based on the third position information and the sign-in record aiming at the first electronic certificate; based on the continuous check-in operation, the first electronic credential is converted into a third electronic credential.
After the check-in operation of the user meets the check-in condition, the electronic certificate in the check-in state can be converted into a third electronic certificate. The third electronic voucher may be applied to (e.g., used directly as cash in) a plurality of target objects.
After the maximum number of sign-in times is set, in different positions, when the scene that the electronic certificate can be applied to is found, the user can be encouraged to carry out the operation of sign-in for many times, and the use efficiency of the electronic certificate is improved.
Referring to fig. 5, an embodiment of the present invention provides an electronic credential pushing device 50 based on user behavior, including:
an obtaining module 501, configured to obtain historical electronic certificate obtaining information of multiple users, and generate a two-dimensional matrix including the multiple users and events corresponding to the multiple electronic certificates;
an aggregation module 502, configured to perform relevancy aggregation on the multiple user hobbies in the two-dimensional matrix to form a hobbies relevancy aggregation list;
a determining module 503, configured to obtain a historical transaction record of a current user, and determine a new feature of the current user based on the historical transaction record and the preference association degree aggregation list;
a pushing module 504 for pushing the electronic credential related to the new feature to the user.
The apparatus shown in fig. 5 may correspondingly execute the content in the above method embodiment, and details of the part not described in detail in this embodiment refer to the content described in the above method embodiment, which is not described again here.
Referring to fig. 6, an embodiment of the present invention further provides an electronic device 60, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method for pushing electronic credentials based on user behavior in the above method embodiments.
Embodiments of the present invention also provide a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the foregoing method embodiments.
Embodiments of the present invention also provide a computer program product, which includes a computer program stored on a non-transitory computer readable storage medium, where the computer program includes program instructions, and when the program instructions are executed by a computer, the computer executes the electronic certificate pushing method based on user behaviors in the foregoing method embodiments.
Referring now to FIG. 6, a schematic diagram of an electronic device 60 suitable for use in implementing embodiments of the present disclosure is shown. The electronic devices in the embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., car navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 6, the electronic device 60 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 601 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 60 are also stored. The processing device 601, the ROM 602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, image sensor, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the electronic device 60 to communicate with other devices wirelessly or by wire to exchange data. While the figures illustrate an electronic device 60 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring at least two internet protocol addresses; sending a node evaluation request comprising the at least two internet protocol addresses to node evaluation equipment, wherein the node evaluation equipment selects the internet protocol addresses from the at least two internet protocol addresses and returns the internet protocol addresses; receiving an internet protocol address returned by the node evaluation equipment; wherein the obtained internet protocol address indicates an edge node in the content distribution network.
Alternatively, the computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: receiving a node evaluation request comprising at least two internet protocol addresses; selecting an internet protocol address from the at least two internet protocol addresses; returning the selected internet protocol address; wherein the received internet protocol address indicates an edge node in the content distribution network.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of a unit does not in some cases constitute a limitation of the unit itself, for example, the first retrieving unit may also be described as a "unit for retrieving at least two internet protocol addresses".
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.