CN114528296A - Contact data processing method and device and contact data query method - Google Patents

Contact data processing method and device and contact data query method Download PDF

Info

Publication number
CN114528296A
CN114528296A CN202210118968.9A CN202210118968A CN114528296A CN 114528296 A CN114528296 A CN 114528296A CN 202210118968 A CN202210118968 A CN 202210118968A CN 114528296 A CN114528296 A CN 114528296A
Authority
CN
China
Prior art keywords
user equipment
contact data
encrypted
value
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210118968.9A
Other languages
Chinese (zh)
Inventor
申琦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shuhe Information Technology Co Ltd
Original Assignee
Shanghai Shuhe Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Shuhe Information Technology Co Ltd filed Critical Shanghai Shuhe Information Technology Co Ltd
Priority to CN202210118968.9A priority Critical patent/CN114528296A/en
Publication of CN114528296A publication Critical patent/CN114528296A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2457Query processing with adaptation to user needs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computational Linguistics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Power Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to a contact data processing method, a contact data processing device, computer equipment and a storage medium. The method comprises the following steps: acquiring contact data to be processed, wherein the contact data to be processed comprises user equipment information; determining a corresponding user equipment number according to the user equipment information; encrypting the user equipment number to obtain a corresponding user equipment encryption value; determining a matched target contact data table according to the encryption value of the user equipment; and recording the contact data to be processed into a target contact data table. By adopting the method, the common abstract processing can be carried out on the user equipment number, the data format of the advertisement information flow platform is processed uniformly, and the corresponding contact data is recorded into the matched contact data table accurately and orderly.

Description

Contact data processing method and device and contact data query method
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for processing contact data, a computer device, and a storage medium, and a method and an apparatus for querying contact data, a computer device, and a storage medium.
Background
When a professional advertisement information flow platform is connected, contact data such as exposure and clicking are required to be accessed, but the contact data size of the advertisement information flow platform is large and complicated. The large amount of data refers to a large amount of exposure, click and the like, for example, exposure data of an advertisement information flow platform which is a head platform can reach thirty million every day, click data of an advertisement information flow platform which is a fast hand can reach one million every day, the advertisement information flow platform is also one advertisement information flow platform, and if a plurality of information flow platforms are connected, the magnitude of the click data can be thought of. And the miscellaneous means that the format and the content of the contact data of each advertising information flow platform are different.
At present, when each advertisement information flow platform stores contact data, a user equipment ID is often required to be used as a unique identifier, but when the advertisement information flow platforms are connected, the formats of the equipment IDs transmitted by each advertisement information flow platform are different, some are transmitted with original capitalization, some are transmitted with original lowercase, some are transmitted with MD5 values after original capitalization (MD5 information summary Algorithm MD5 Message-Digest Algorithm), and some are transmitted with MD5 values after original lowercase, so that the data formats of the advertisement information flow platforms cannot be unified, and the storage confusion of the contact data is easily caused.
Disclosure of Invention
Therefore, in order to solve the above technical problems, it is necessary to provide a contact data processing method, device, computer device, and storage medium, and a contact data query method, device, computer device, and storage medium, which can perform common abstraction processing on a user equipment number, perform uniform processing on a data format of an advertisement information stream platform, and accurately and orderly record corresponding contact data in a matching contact data table.
A contact data processing method, the method comprising:
acquiring contact data to be processed, wherein the contact data to be processed comprises user equipment information;
determining a corresponding user equipment number according to the user equipment information;
encrypting the user equipment number to obtain a corresponding user equipment encryption value;
determining a matched target contact data table according to the encryption value of the user equipment;
and recording the contact data to be processed into a target contact data table.
In one embodiment, the contact data processing method further includes: and when the user equipment information comprises the user equipment encryption value, the execution step determines a matched target contact data table according to the user equipment encryption value.
In one embodiment, acquiring touch point data to be processed, where the touch point data to be processed includes user equipment information, includes: the touch point data to be processed is called from the advertisement information flow platform through an interface, the advertisement information flow platform plays target advertisement content, receives user operation of a user on the target advertisement content, acquires user behavior information according to the user operation, acquires user equipment information according to the user operation, and forms the touch point data to be processed by the user behavior information, the user equipment information and advertisement content identification corresponding to the target advertisement content.
In one embodiment, determining the corresponding ue number according to the ue information includes: obtaining an international mobile equipment identification code in the user equipment information, and determining the international mobile equipment identification code as a user equipment number; and/or obtaining an advertisement identifier corresponding to the IOS system in the user equipment information, and determining the advertisement identifier as a user equipment number; and/or acquiring a unique device identifier corresponding to the Android system in the user device information, and determining the unique device identifier as a user device number; and/or obtaining an anonymous device identifier corresponding to the Android system in the user device information, and determining the anonymous device identifier as a user device number.
In one embodiment, encrypting the user equipment number to obtain a corresponding user equipment encryption value includes: converting the user equipment number to obtain a converted user equipment number; encrypting the converted user equipment number according to a preset encryption algorithm to obtain an encrypted user equipment number; and capitalizing the encrypted user equipment number to obtain a corresponding user equipment encryption value.
In one embodiment, the converting the ue number to obtain a converted ue number includes: when the user equipment number is the international mobile equipment identification code, the international mobile equipment identification code is subjected to lower case processing to obtain the lower case international mobile equipment identification code, when the user equipment number is the advertisement identifier corresponding to the IOS system, the advertisement identifier is subjected to upper case processing to obtain the upper case advertisement identifier, and when the user equipment number is the equipment unique identifier corresponding to the Android system or the anonymous equipment identifier corresponding to the Android system, no processing is needed.
In one embodiment, determining a matching target contact data table based on the user device cryptographic value includes: acquiring the last encrypted numerical value in the encrypted value of the user equipment; and determining a matched target contact data table according to the last bit encryption value, wherein different last bit encryption values correspond to different contact data tables.
A contact data query method, the method adopts any contact data processing method to make the contact data to be processed record to the corresponding target contact data table;
receiving a request to be queried, wherein the request to be queried carries information of user equipment to be queried;
determining the number of the corresponding user equipment to be inquired according to the information of the user equipment to be inquired;
encrypting the user equipment number to be inquired to obtain a corresponding first user equipment encrypted value and a corresponding second user equipment encrypted value;
determining a corresponding first contact data table according to the encrypted value of the first user equipment, and determining a corresponding second contact data table according to the encrypted value of the second user equipment;
and searching the inquired contact data matched with the number of the user equipment to be inquired from the first contact data table or the second contact data table.
In one embodiment, encrypting a user equipment number to be queried to obtain a corresponding first user equipment encrypted value and a corresponding second user equipment encrypted value includes: carrying out lowercase processing on the number of the user equipment to be inquired to obtain the lowercase number of the user equipment to be inquired; encrypting the user equipment number to be inquired after the lowercase according to a preset encryption algorithm to obtain an encrypted first user equipment number to be inquired; capitalizing the encrypted first user equipment number to be inquired to obtain a corresponding first user equipment encrypted value; capitalizing the user equipment number to be inquired to obtain the capitalized user equipment number to be inquired; encrypting the capitalized user equipment number to be inquired according to a preset encryption algorithm to obtain an encrypted second user equipment number to be inquired; and capitalizing the encrypted second user equipment number to be inquired to obtain a corresponding second user equipment encrypted value.
In one embodiment, determining the corresponding first contact data table according to the first user device cryptographic value and the corresponding second contact data table according to the second user device cryptographic value includes: acquiring a last encrypted numerical value in the encrypted value of the first user equipment, and determining a matched first contact data table according to the last encrypted numerical value in the encrypted value of the first user equipment; and acquiring the last encrypted numerical value in the encrypted value of the second user equipment, and determining a matched second contact data table according to the last encrypted numerical value in the encrypted value of the second user equipment.
A contact data processing apparatus, the apparatus comprising:
the acquisition module is used for acquiring contact data to be processed, and the contact data to be processed comprises user equipment information;
the first determining module is used for determining a corresponding user equipment number according to the user equipment information;
the encryption module is used for encrypting the user equipment number to obtain a corresponding user equipment encryption value;
the second determining module is used for determining a matched target contact data table according to the user equipment encryption value;
and the recording module is used for recording the contact data to be processed into the target contact data table.
A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of any one of the contact data processing method or the contact data query method when executing the computer program.
A computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the steps in any one of the contact data processing methods or the contact data query method described above.
The contact data processing method, the contact data processing device, the computer equipment and the storage medium, and the contact data query method, the contact data query device, the computer equipment and the storage medium acquire contact data to be processed, wherein the contact data to be processed comprises user equipment information; determining a corresponding user equipment number according to the user equipment information; encrypting the user equipment number to obtain a corresponding user equipment encryption value; determining a matched target contact data table according to the encryption value of the user equipment; and recording the contact data to be processed into a target contact data table. Therefore, the data formats of the contact data transmitted by different advertisement information flow platforms are different, the user equipment encryption value is obtained by performing common abstract processing on the user equipment number, the matched target contact data table is determined according to the user equipment encryption value, the contact data of each advertisement information flow platform are accurately and orderly recorded into the matched contact data table, and the storage chaos of the contact data is avoided. And in the subsequent query, the contact data can be queried from the corresponding contact data table according to the user equipment number, so that the matching rate of the contact data is improved.
Drawings
FIG. 1 is a diagram of an application environment of a contact data processing method according to an embodiment;
FIG. 2 is a flow diagram illustrating a method for processing contact data according to one embodiment;
FIG. 3 is a flow diagram that illustrates a methodology for contact data query in one embodiment;
FIG. 4 is a block diagram of a contact data processing device in one embodiment;
FIG. 5 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application.
The touch point data processing method provided by the application can be applied to the application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 104 may be implemented by an independent server or a server cluster formed by a plurality of servers.
Specifically, the terminal 102 obtains contact data to be processed, where the contact data to be processed includes user equipment information, and sends the contact data to be processed to the server 104, and the server 104 determines a corresponding user equipment number according to the user equipment information in the contact data to be processed, encrypts the user equipment number to obtain a corresponding user equipment encryption value, determines a matched target contact data table according to the user equipment encryption value, and records the contact data to be processed into the target contact data table.
In one embodiment, as shown in fig. 2, a contact data processing method is provided, which is described by taking the application of the method to the server in fig. 1 as an example, and includes the following steps:
step 202, contact data to be processed is obtained, and the contact data to be processed includes user equipment information.
The contact data to be processed here is the contact data which needs to be processed currently, the contact data includes exposure data, click data and the like accessed by an advertisement information flow platform, the exposure data is data related to advertisement exposure, and the click data is data related to advertisement click. The advertisement is a propaganda way that the advertisement information flow platform needs to introduce the information of commercial, service industry or cultural and physical programs and the like to the masses.
Specifically, click data, exposure data, and the like related to a certain advertisement may be composed as data to be processed, a certain advertisement may be an advertisement meeting actual business requirements, actual product requirements, or actual business requirements, and the data to be processed may include user equipment information and an advertisement identifier, where the user equipment information is equipment information related to a user of an advertisement click operation or exposure operation corresponding to the advertisement identifier, and the user equipment information may include a user equipment number, a user equipment name, an operating system used by the user equipment, a user equipment model, and the like.
In one embodiment, step 202 further comprises: the touch point data to be processed is called from the advertisement information flow platform through an interface, the advertisement information flow platform plays the target advertisement content, receives user operation of a user on the target advertisement content, acquires user behavior information according to the user operation, acquires user equipment information according to the user operation, and forms the touch point data to be processed by the user behavior information, the user equipment information and advertisement content identification corresponding to the target advertisement content.
The advertiser platform is a platform where an advertiser needing to publicize an advertisement is located, the advertiser platform provides an interface for calling contact point data, specifically, the advertiser platform can be used for enabling an advertisement information flow platform to send the contact point data of a target advertisement through the interface, and the sent contact point data is determined to be the contact point data to be processed. Specifically, the advertisement information flow platform calls contact data of a target advertisement which meets the actual business requirement, the actual product requirement or the actual application scene through an interface provided by the advertiser platform, and the contact data is used as to-be-processed contact data.
The advertisement information flow platform is a special advertisement putting platform, each advertiser can play the target advertisement content needing broadcasting through the advertisement information flow platform, when the target advertisement content is played on the advertisement information flow platform, a user can perform user operation on the target advertisement content, for example, the user operation can be clicking operation to click the target advertisement content for watching, the user operation can also be that the duration for watching the target advertisement content reaches preset duration, or the user operation can also be voice operation, and the target advertisement content is operated through voice.
Further, the advertisement information flow platform may receive a user operation, and acquire user behavior information and user device information through the user operation, where the user behavior information is information related to a user behavior. And finally, the user behavior information, the user equipment information and the advertisement content identification corresponding to the target advertisement content can form to-be-processed data.
In one embodiment, step 202 is followed by: if the user device encryption value is not included in the user device information, step 204 is executed, and if the user device encryption value is included in the user device information, step 208 is executed.
Specifically, after the user equipment information is obtained, it is required to detect whether the user equipment information includes the user equipment encryption value, and if it is detected that the user equipment information already includes the user equipment encryption value, the subsequent step 208 is directly executed without performing encryption processing, that is, the target contact point data table is directly matched according to the user equipment encryption value in the user equipment information. If it is detected that the user equipment information does not include the user equipment encryption value, encryption processing is required, step 204 is executed, namely, the user equipment number in the user equipment information is obtained, encryption processing is performed to obtain the user equipment encryption value, and then matching of the target contact data table is performed according to the user equipment encryption value.
And step 204, determining a corresponding user equipment number according to the user equipment information.
The user equipment number is used for identifying the user equipment, and may be an international mobile equipment identity IMEI, an advertisement identifier IDFA corresponding to an IOS system, an equipment unique identifier Android ID corresponding to an Android system, or an anonymous equipment identifier OAID corresponding to an Android system, where at least one of the user equipment numbers may be obtained from the user equipment information, but the IOS system and the Android system may only exist in one type and may not coexist at the same time, that is, the user equipment number may include at least one of the foregoing types, where the user equipment information may include a user equipment number, a user equipment name, an operating system used by the user equipment, a user equipment model, and the like, and thus, the user equipment number may be found from or extracted from the user equipment information.
In one embodiment, step 204 further comprises: the method comprises the steps of obtaining an international mobile equipment identification code in user equipment information, determining the international mobile equipment identification code as a user equipment number, and/or obtaining an advertisement identifier corresponding to an IOS system in the user equipment information, determining the advertisement identifier as the user equipment number, and/or obtaining an equipment unique identifier corresponding to an Android system in the user equipment information, determining the equipment unique identifier as the user equipment number, and/or obtaining an anonymous equipment identifier corresponding to the Android system in the user equipment information, and determining the anonymous equipment identifier as the user equipment number.
The specific process of acquiring the user equipment number may be that, when the user equipment number may be an international mobile equipment identity IMEI, the IMEI is a mobile phone serial number and a mobile phone "serial number" which are commonly referred to as IMEI, and is used to identify each independent mobile phone and other mobile communication devices in the mobile phone network, and is equivalent to an identity card of a mobile phone, and may be extracted from user equipment information, and different mobile communication devices correspond to different IMEI, so that the IMEI may be determined as the user equipment number.
The IDFA is an Identifier For Advertising, and a unique Identifier related to the user equipment and can be used For getting through advertisements among different application program apps. For example, after a certain commodity is searched in panning, when a browser is used to browse a web page, the advertisement of the web page will show the advertisement of the corresponding commodity, and if the operating system used by the user equipment is the IOS system, the IDFA corresponding to the IOS system in the user equipment information can be acquired and determined as the user equipment number. The user equipment number can also be an equipment unique identifier Android ID corresponding to an Android system, the Android system is an operating system used by the user equipment, the Android system is one of the operating systems and cannot coexist with an IOS (internet of things) system at the same time, the equipment unique identifier Android ID can also be used for identifying the user equipment, and the function of the equipment unique identifier Android ID is the same as that of an International Mobile Equipment Identity (IMEI) and an advertisement identifier IDFA corresponding to the IOS system.
In practical application, due to the permission problem, the IMEI and the Android ID may not be obtained, and only the OAID may be obtained, the OAID may be determined as the user equipment number, and if both the IMEI and the Android ID are obtained, both the OAID and the OAID may be determined as the user equipment number. The Anonymous Device Identifier OAID is called an Open Anonymous Device Identifier, and can be used for providing personalized advertisements and user statistics for users on the premise of protecting personal data privacy and security of the users.
And step 206, encrypting the user equipment number to obtain a corresponding user equipment encryption value.
Specifically, after the user equipment number is obtained, the user equipment number may be uniformly encrypted through a preset encryption algorithm to obtain an encrypted user equipment encryption value. The preset encryption algorithm may be an MD5 encryption algorithm, and the user equipment number is encrypted through an MD5 encryption algorithm, where the preset encryption algorithm may also be another existing encryption algorithm, which is not limited herein. An MD5 Message Digest Algorithm (english: MD5 Message-Digest Algorithm), a widely used cryptographic hash function, can generate a 128-bit (16-byte) hash value (hash value) to ensure the integrity of Message transmission.
In one embodiment, step 206 further comprises: and carrying out conversion processing on the user equipment number to obtain a converted user equipment number, carrying out encryption processing on the converted user equipment number according to a preset encryption algorithm to obtain an encrypted user equipment number, and carrying out capitalization processing on the encrypted user equipment number to obtain a corresponding user equipment encryption value.
In one embodiment, the converting the user equipment number to obtain a converted user equipment number includes: when the user equipment number is the international mobile equipment identification code, the international mobile equipment identification code is subjected to lower case processing to obtain the lower case international mobile equipment identification code, when the user equipment number is the advertisement identifier corresponding to the IOS system, the advertisement identifier is subjected to upper case processing to obtain the upper case advertisement identifier, and when the user equipment number is the equipment unique identifier corresponding to the Android system or the anonymous equipment identifier corresponding to the Android system, no processing is needed.
The encryption processing of the user equipment number may specifically be that the user equipment number is subjected to capitalization processing, the capitalization processing is to convert lower case letters in the user equipment number into upper case letters to obtain an capitalized user equipment number, the capitalized user equipment number is encrypted by a preset encryption algorithm, for example, the capitalized user equipment number may be encrypted by an MD5 encryption algorithm to obtain an encrypted user equipment number, and finally, the encrypted user equipment number is subjected to conversion processing to obtain a user equipment encryption value.
Since the encrypted ue number may be at least one of IMEI, IDFA, Android ID, and OAID, and the corresponding conversion processing manners of different ue numbers are different, for example, the IMEI conversion processing may be lowercase processing, the IDFA conversion processing may be uppercase processing, and the Android ID and OAID conversion processing may be nothing.
For example,
and if the user equipment number is the MD5 value corresponding to the IMEI or IDFA, the IMEI or MD5 value is rewritten to obtain the user equipment encryption value. The MD5 value corresponding to the IDFA is obtained by encrypting the IDFA with MD 5.
If the user equipment number is OAID, the OAID is converted into capital after being encrypted by MD5, and then the encrypted value of the user equipment is obtained.
And if the user equipment number is the OAID and the MD5 value corresponding to the OAID, converting the MD5 value corresponding to the OAID into capitalization to obtain the encrypted value of the user equipment. Wherein, the MD5 value corresponding to OAID is obtained by performing MD5 encryption on OAID.
And if the user equipment number is the Android ID, converting the Android ID into the capitalization after the MD5 is encrypted, and then converting the capitalization to obtain the user equipment encryption value.
And if the user equipment number is the Android ID and the MD5 value corresponding to the Android ID, converting the MD5 value corresponding to the Android ID into capitalization to obtain the user equipment encryption value. The MD5 value corresponding to the Android ID is obtained by encrypting the Android ID through MD 5.
And step 208, determining a matched target contact data table according to the user equipment encryption value.
And step 210, recording the contact data to be processed into a target contact data table.
Specifically, after the user equipment encryption value is obtained, the matched target contact data table can be determined according to a preset rule and the user equipment encryption value, the preset rule can be customized, and specifically can be determined according to actual business requirements, actual product requirements or actual application scenarios, the preset rule can be to obtain a last digit value of the user equipment encryption value, determine a corresponding contact data table according to the last digit value, and determine the corresponding contact data table as the target contact data table corresponding to the contact data to be processed. Or, the target contact data table corresponding to the encrypted value of the user equipment is searched according to a preset mapping relation, where the preset mapping relation is a mapping relation between the encrypted value of the mapping equipment and the contact data table, and may be established in advance according to actual service requirements, product requirements, or actual application scenarios. And finally, after the target contact data table is obtained, storing the contact data to be processed into the target contact data table.
In one embodiment, step 208 further comprises: and acquiring the last encrypted numerical value in the encrypted value of the user equipment, determining a matched target contact data table according to the last encrypted numerical value, wherein different last encrypted numerical values correspond to different contact data tables.
Specifically, the specific determination step of the target contact data table may be to determine the matched target contact data table through the last encrypted value of the user equipment, where the last encrypted value is different and the corresponding contact data tables are also different. Therefore, the contact data to be processed can be accurately stored in the matched contact data table through the last bit encryption value of the user equipment encryption value. For example, the last encrypted value in the user device encrypted value is 0, the matching target contact data table is contact data table a, the last value in the user device encrypted value is 1, and the matching target contact data table is contact data table B.
In the contact data processing method, the contact data to be processed comprises user equipment information; determining a corresponding user equipment number according to the user equipment information; encrypting the user equipment number to obtain a corresponding user equipment encryption value; determining a matched target contact data table according to the encryption value of the user equipment; and recording the contact data to be processed into a target contact data table. Therefore, the contact data transmitted by different advertisement information flow platforms have different data formats, the user equipment encryption value is obtained by performing common abstract processing on the user equipment number, the matched target contact data table is determined according to the user equipment encryption value, the contact data of each advertisement information flow platform are accurately and orderly recorded into the matched contact data table, and the storage disorder of the contact data is avoided.
In one embodiment, as shown in fig. 3, a method for querying contact data is provided, which is described by taking the method as an example applied to the server in fig. 1, and includes the following steps:
step 302, receiving a request to be queried, where the request to be queried carries information of a user equipment to be queried.
And step 304, determining the corresponding user equipment number to be inquired according to the user equipment information to be inquired.
And step 306, encrypting the user equipment number to be inquired to obtain the corresponding first user equipment encrypted value and second user equipment encrypted value.
After the contact data is stored in the matched contact data table, the corresponding contact data can be queried from the contact data table by sending a query request. Specifically, the execution main server receives a request to be queried, where the request to be queried may be initiated by a terminal or a server, the request to be queried carries information of a user device to be queried, and the information of the user device to be queried is information related to the user device to be queried, and includes a number of the user device to be queried, a name of the user device to be queried, an operating system used by the user device to be queried, and the like.
Further, the number of the user equipment to be queried may be determined from the information of the user equipment to be queried, where the number of the user equipment to be queried may be the user equipment number mentioned above, and the obtaining manner may also be determined by the manner described above, which is not described herein again. After the user equipment number to be inquired is obtained, encryption processing is carried out on the user equipment number to be inquired to obtain a first user equipment encryption value and a second user equipment encryption value, and the first user equipment encryption value and the second user equipment encryption value can be obtained through encryption in different encryption processing modes.
In one embodiment, step 306 further comprises: the method comprises the steps of carrying out lowercase processing on a user equipment number to be inquired to obtain a lowercase user equipment number to be inquired, carrying out encryption processing on the lowercase user equipment number to be inquired according to a preset encryption algorithm to obtain an encrypted first user equipment number to be inquired, carrying out uppercase processing on the encrypted first user equipment number to be inquired to obtain a corresponding encrypted value of the first user equipment, carrying out uppercase processing on the user equipment number to be inquired to obtain an uppercase user equipment number to be inquired, carrying out encryption processing on the uppercase user equipment number to be inquired according to the preset encryption algorithm to obtain an encrypted second user equipment number to be inquired, and carrying out uppercase processing on the encrypted second user equipment number to be inquired to obtain a corresponding encrypted value of the second user equipment.
The encryption process of the first user equipment encryption value and the second user equipment encryption value may specifically be, first, a lowercase process may be performed on the user equipment number to be queried, because the data format of the user equipment number to be queried transmitted from the information stream platform may be all capital letters at this time, therefore, the user equipment number to be queried may be subjected to a lowercase process to obtain a lowercase user equipment number to be queried, then a preset encryption algorithm is used to perform an encryption process on the lowercase user equipment number to be queried, specifically, the lowercase user equipment number to be queried may be subjected to an encryption process through a preset MD5 encryption algorithm to obtain an encrypted first user equipment number to be queried, and finally, the encrypted first user equipment number to be queried is subjected to an uppercase process to obtain a corresponding first user equipment encryption value.
Similarly, the data format of the user equipment number to be queried transmitted from the information flow platform may be all in lowercase, so that the user equipment number to be queried may be subjected to capitalization processing to obtain an capitalized user equipment number to be queried, the capitalized user equipment number to be queried may be encrypted by using a preset encryption algorithm, specifically, the capitalization processing may be performed on the lowercase user equipment number to be queried by using a preset MD5 encryption algorithm to obtain an encrypted second user equipment number to be queried, and finally, the encrypted second user equipment number to be queried may be subjected to capitalization processing to obtain a corresponding second user equipment encryption value.
For example, if the number of the user equipment to be queried is the IMEI or IDFA, the IMEI or IDFA is changed from lower case to MD5 for encryption and then to upper case to obtain the encryption value of the first user equipment, and the IMEI or IDFA is changed from upper case to MD5 for encryption and then to upper case to obtain the encryption value of the second user equipment.
And if the number of the user equipment to be inquired is OAID, converting the OAID into lower case, then performing MD5 encryption, and then converting the OAID into upper case to obtain the first user equipment encryption value, and then converting the OAID into upper case, then performing MD5 encryption, and then converting the OAID into upper case to obtain the second user equipment encryption value.
And if the user equipment number to be inquired is the Android ID, converting the Android ID into lower case, then encrypting by the MD5, and then converting into upper case to obtain the first user equipment encryption value, and then converting the Android ID into upper case, then encrypting by the MD5, and then converting into upper case to obtain the second user equipment encryption value.
And 308, determining a corresponding first contact data table according to the encrypted value of the first user equipment, and determining a corresponding second contact data table according to the encrypted value of the second user equipment.
Specifically, after the first user device encrypted value and the second user device encrypted value are obtained, the matched first contact data table may be determined through the first user device encrypted value, and the matched second contact data table may also be determined through the second user device encrypted value.
In one embodiment, step 308 further comprises: and obtaining the last encrypted numerical value in the encrypted value of the first user equipment, determining a matched first contact data table according to the last encrypted numerical value in the encrypted value of the first user equipment, obtaining the last encrypted numerical value in the encrypted value of the second user equipment, and determining a matched second contact data table according to the last encrypted numerical value in the encrypted value of the second user equipment.
The first contact data table may be determined by the last encrypted value of the first user device, and different encrypted values correspond to different contact data tables, so that the last encrypted value of the first user device is obtained, and the matched first contact data table is determined according to the last encrypted value.
And step 310, searching the inquired contact data matched with the number of the user equipment to be inquired from the first contact data table or the second contact data table.
Specifically, after the first contact data table and the second contact data table are determined, the contact data matched with the user equipment number to be queried can be searched from the first contact data table or the second contact data table. That is, it is determined that the first contact data table and the second contact data table are only to narrow the query range, and then the matched contact data is searched from the first contact data table or the second contact data table according to the number of the user equipment to be queried.
It should be understood that, although the steps in the above-described flowcharts are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in the above-described flowcharts may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the sub-steps or the stages is not necessarily sequential, but may be performed alternately or alternatingly with other steps or at least a portion of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 4, there is provided a contact data processing apparatus 400 comprising: an obtaining module 402, a first determining module 404, an encrypting module 406, a second determining module 408, and a recording module 410, wherein:
an obtaining module 402, configured to obtain to-be-processed contact data, where the to-be-processed contact data includes user equipment information.
A first determining module 404, configured to determine a corresponding user equipment number according to the user equipment information.
The encryption module 406 is configured to encrypt the user equipment number to obtain a corresponding user equipment encryption value.
A second determining module 408, configured to determine a matching target contact data table according to the user device encryption value.
And the recording module 410 is used for recording the contact data to be processed into the target contact data table.
In one embodiment, the obtaining module 402 calls the to-be-processed contact data from the advertisement information flow platform through the interface, the advertisement information flow platform plays the target advertisement content, receives the user operation of the user on the target advertisement content, obtains the user behavior information according to the user operation acquisition, and obtains the user device information according to the user operation, and combines the user behavior information, the user device information, and the advertisement content identifier corresponding to the target advertisement content into the to-be-processed contact data.
In one embodiment, the contact data processing apparatus 400 performs, when the user device information does not include the user device encryption value, the first determining module 404 to determine the corresponding user device number according to the user device information, and when the user device information includes the user device encryption value, the second determining module 408 to determine the matched target contact data table according to the user device encryption value.
In one embodiment, the first determining module 404 obtains an international mobile equipment identity in the user equipment information, determines the international mobile equipment identity as a user equipment number, and/or obtains an advertisement identifier corresponding to an IOS system in the user equipment information, determines the advertisement identifier as the user equipment number, and/or obtains a device unique identifier corresponding to an Android system in the user equipment information, determines the device unique identifier as the user equipment number, and/or obtains an anonymous device identifier corresponding to the Android system in the user equipment information, and determines the anonymous device identifier as the user equipment number.
In an embodiment, the encryption module 406 performs conversion processing on the user equipment number to obtain a converted user equipment number, performs encryption processing on the converted user equipment number according to a preset encryption algorithm to obtain an encrypted user equipment number, and performs capitalization processing on the encrypted user equipment number to obtain a corresponding user equipment encryption value.
In one embodiment, the encryption module 406 performs lowercase processing on the international mobile equipment identity to obtain a lowercase international mobile equipment identity when the user equipment number is the international mobile equipment identity, performs uppercase processing on the advertisement identifier to obtain an uppercase advertisement identifier when the user equipment number is the advertisement identifier corresponding to the IOS system, and does not need to perform any processing when the user equipment number is the equipment unique identifier corresponding to the Android system or the anonymous equipment identifier corresponding to the Android system.
In one embodiment, the second determining module 408 obtains the last encrypted value of the user device encrypted value, and determines the matching target touch point data table according to the last encrypted value, wherein different last encrypted values correspond to different touch point data tables.
For the specific definition of the contact data processing device, reference may be made to the above definition of the contact data processing method, which is not described in detail here. The respective modules in the above-described contact data processing device may be implemented in whole or in part by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a contact data query device is provided, which receives a request to be queried, where the request to be queried carries user equipment information to be queried, determines a corresponding user equipment number to be queried according to the user equipment information to be queried, encrypts the user equipment number to be queried to obtain a corresponding first user equipment encrypted value and a corresponding second user equipment encrypted value, determines a corresponding first contact data table according to the first user equipment encrypted value, determines a corresponding second contact data table according to the second user equipment encrypted value, and searches queried contact data matched with the user equipment number to be queried from the first contact data table or the second contact data table.
In one embodiment, the contact data query device performs lowercase processing on a user equipment number to be queried to obtain a lowercase user equipment number to be queried, encrypts the lowercase user equipment number to be queried according to a preset encryption algorithm to obtain an encrypted first user equipment number to be queried, performs uppercase processing on the encrypted first user equipment number to be queried to obtain a corresponding first user equipment encryption value, performs uppercase processing on the user equipment number to be queried to obtain an uppercase user equipment number to be queried, encrypts the uppercase user equipment number to be queried according to the preset encryption algorithm to obtain an encrypted second user equipment number to be queried, and performs uppercase processing on the encrypted second user equipment number to be queried to obtain a corresponding second user equipment encryption value.
In one embodiment, the contact data query device obtains the last encrypted value in the first user device encrypted value, determines a first contact data table matching the last encrypted value in the first user device encrypted value, obtains the last encrypted value in the second user device encrypted value, and determines a second contact data table matching the last encrypted value in the second user device encrypted value.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 5. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing a target contact data table. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a contact data processing method.
Those skilled in the art will appreciate that the architecture shown in fig. 5 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the following steps when executing the computer program: the method comprises the steps of obtaining contact data to be processed, wherein the contact data to be processed comprises user equipment information, determining a corresponding user equipment number according to the user equipment information, encrypting the user equipment number to obtain a corresponding user equipment encryption value, determining a matched target contact data table according to the user equipment encryption value, and recording the contact data to be processed into the target contact data table.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and when the user equipment information comprises the user equipment encryption value, the execution step determines a matched target contact data table according to the user equipment encryption value.
In one embodiment, the processor, when executing the computer program, further performs the steps of: the touch point data to be processed is called from the advertisement information flow platform through an interface, the advertisement information flow platform plays target advertisement content, receives user operation of a user on the target advertisement content, acquires user behavior information according to the user operation, acquires user equipment information according to the user operation, and forms the touch point data to be processed by the user behavior information, the user equipment information and advertisement content identification corresponding to the target advertisement content.
In one embodiment, the processor when executing the computer program further performs the steps of: obtaining an international mobile equipment identification code in the user equipment information, and determining the international mobile equipment identification code as a user equipment number; and/or obtaining an advertisement identifier corresponding to the IOS system in the user equipment information, and determining the advertisement identifier as a user equipment number; and/or acquiring a unique device identifier corresponding to the Android system in the user device information, and determining the unique device identifier as a user device number; and/or obtaining an anonymous device identifier corresponding to the Android system in the user device information, and determining the anonymous device identifier as a user device number.
In one embodiment, the processor when executing the computer program further performs the steps of: converting the user equipment number to obtain a converted user equipment number; encrypting the converted user equipment number according to a preset encryption algorithm to obtain an encrypted user equipment number; and capitalizing the encrypted user equipment number to obtain a corresponding user equipment encryption value.
In one embodiment, the processor, when executing the computer program, further performs the steps of: when the user equipment number is the international mobile equipment identification code, the international mobile equipment identification code is subjected to lower case processing to obtain the lower case international mobile equipment identification code, when the user equipment number is the advertisement identifier corresponding to the IOS system, the advertisement identifier is subjected to upper case processing to obtain the upper case advertisement identifier, and when the user equipment number is the equipment unique identifier corresponding to the Android system or the anonymous equipment identifier corresponding to the Android system, no processing is needed.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring the last encrypted numerical value in the encrypted value of the user equipment; and determining a matched target contact data table according to the last bit encryption value, wherein different last bit encryption values correspond to different contact data tables.
In one embodiment, the processor, when executing the computer program, further performs the steps of: receiving a request to be inquired, wherein the request to be inquired carries user equipment information to be inquired, determining a corresponding user equipment number to be inquired according to the user equipment information to be inquired, encrypting the user equipment number to be inquired to obtain a corresponding first user equipment encryption value and a second user equipment encryption value, determining a corresponding first contact data table according to the first user equipment encryption value, determining a corresponding second contact data table according to the second user equipment encryption value, and searching inquired contact data matched with the user equipment number to be inquired from the first contact data table or the second contact data table.
In one embodiment, the processor when executing the computer program further performs the steps of: carrying out lowercase processing on the number of the user equipment to be queried to obtain the lowercase number of the user equipment to be queried; encrypting the user equipment number to be inquired after the lowercase according to a preset encryption algorithm to obtain an encrypted first user equipment number to be inquired; capitalizing the encrypted first user equipment number to be inquired to obtain a corresponding first user equipment encrypted value; capitalizing the user equipment number to be inquired to obtain the capitalized user equipment number to be inquired; encrypting the capitalized user equipment number to be inquired according to a preset encryption algorithm to obtain an encrypted second user equipment number to be inquired; and capitalizing the encrypted second user equipment number to be inquired to obtain a corresponding second user equipment encrypted value.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring a last encrypted numerical value in the encrypted value of the first user equipment, and determining a matched first contact data table according to the last encrypted numerical value in the encrypted value of the first user equipment; and acquiring the last encrypted numerical value in the encrypted value of the second user equipment, and determining a matched second contact data table according to the last encrypted numerical value in the encrypted value of the second user equipment.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: the method comprises the steps of obtaining contact data to be processed, wherein the contact data to be processed comprises user equipment information, determining a corresponding user equipment number according to the user equipment information, encrypting the user equipment number to obtain a corresponding user equipment encryption value, determining a matched target contact data table according to the user equipment encryption value, and recording the contact data to be processed into the target contact data table.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and when the user equipment information comprises the user equipment encryption value, the execution step determines a matched target contact data table according to the user equipment encryption value.
In one embodiment, the processor, when executing the computer program, further performs the steps of: the touch point data to be processed is called from the advertisement information flow platform through an interface, the advertisement information flow platform plays target advertisement content, receives user operation of a user on the target advertisement content, acquires user behavior information according to the user operation, acquires user equipment information according to the user operation, and forms the touch point data to be processed by the user behavior information, the user equipment information and advertisement content identification corresponding to the target advertisement content.
In one embodiment, the processor, when executing the computer program, further performs the steps of: obtaining an international mobile equipment identification code in the user equipment information, and determining the international mobile equipment identification code as a user equipment number; and/or obtaining an advertisement identifier corresponding to the IOS system in the user equipment information, and determining the advertisement identifier as a user equipment number; and/or acquiring a unique device identifier corresponding to the Android system in the user device information, and determining the unique device identifier as a user device number; and/or obtaining an anonymous device identifier corresponding to the Android system in the user device information, and determining the anonymous device identifier as a user device number.
In one embodiment, the processor, when executing the computer program, further performs the steps of: converting the user equipment number to obtain a converted user equipment number; encrypting the converted user equipment number according to a preset encryption algorithm to obtain an encrypted user equipment number; and capitalizing the encrypted user equipment number to obtain a corresponding user equipment encryption value.
In one embodiment, the processor, when executing the computer program, further performs the steps of: when the user equipment number is the international mobile equipment identification code, the international mobile equipment identification code is subjected to lower case processing to obtain the lower case international mobile equipment identification code, when the user equipment number is the advertisement identifier corresponding to the IOS system, the advertisement identifier is subjected to upper case processing to obtain the upper case advertisement identifier, and when the user equipment number is the equipment unique identifier corresponding to the Android system or the anonymous equipment identifier corresponding to the Android system, no processing is needed.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring the last encrypted numerical value in the encrypted value of the user equipment; and determining a matched target contact data table according to the last bit encryption value, wherein different last bit encryption values correspond to different contact data tables.
In one embodiment, the processor, when executing the computer program, further performs the steps of: receiving a request to be inquired, wherein the request to be inquired carries user equipment information to be inquired, determining a corresponding user equipment number to be inquired according to the user equipment information to be inquired, encrypting the user equipment number to be inquired to obtain a corresponding first user equipment encryption value and a second user equipment encryption value, determining a corresponding first contact data table according to the first user equipment encryption value, determining a corresponding second contact data table according to the second user equipment encryption value, and searching inquired contact data matched with the user equipment number to be inquired from the first contact data table or the second contact data table.
In one embodiment, the processor, when executing the computer program, further performs the steps of: carrying out lowercase processing on the number of the user equipment to be inquired to obtain the lowercase number of the user equipment to be inquired; encrypting the user equipment number to be inquired after the lowercase according to a preset encryption algorithm to obtain an encrypted first user equipment number to be inquired; capitalizing the encrypted first user equipment number to be queried to obtain a corresponding first user equipment encrypted value; capitalizing the user equipment number to be inquired to obtain the capitalized user equipment number to be inquired; encrypting the capitalized user equipment number to be inquired according to a preset encryption algorithm to obtain an encrypted second user equipment number to be inquired; and capitalizing the encrypted second user equipment number to be inquired to obtain a corresponding second user equipment encrypted value.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring a last encrypted numerical value in the encrypted value of the first user equipment, and determining a matched first contact data table according to the last encrypted numerical value in the encrypted value of the first user equipment; and acquiring the last encrypted numerical value in the encrypted value of the second user equipment, and determining a matched second contact data table according to the last encrypted numerical value in the encrypted value of the second user equipment.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A contact data processing method, the method comprising:
acquiring contact data to be processed, wherein the contact data to be processed comprises user equipment information;
determining a corresponding user equipment number according to the user equipment information;
encrypting the user equipment number to obtain a corresponding user equipment encryption value;
determining a matched target contact data table according to the user equipment encryption value;
and recording the contact data to be processed into the target contact data table.
2. The method of claim 1, further comprising:
when the user equipment information does not comprise a user equipment encryption value, the execution step determines a corresponding user equipment number according to the user equipment information;
and when the user equipment information comprises a user equipment encryption value, executing the step of determining a matched target contact data table according to the user equipment encryption value.
3. The method of claim 1, wherein the obtaining the touch point data to be processed, the touch point data to be processed including user equipment information, comprises:
calling contact data to be processed from an advertisement information flow platform through an interface, playing target advertisement content by the advertisement information flow platform, receiving user operation of a user on the target advertisement content, acquiring user behavior information according to the user operation, acquiring user equipment information according to the user operation, and forming the user behavior information, the user equipment information and an advertisement content identifier corresponding to the target advertisement content into the contact data to be processed.
4. The method of claim 1, wherein the determining a corresponding ue number according to the ue information comprises:
obtaining an international mobile equipment identification code in the user equipment information, and determining the international mobile equipment identification code as the user equipment number; and/or
Acquiring an advertisement identifier corresponding to an IOS (input/output system) in the user equipment information, and determining the advertisement identifier as the user equipment number; and/or
Acquiring a unique device identifier corresponding to an Android system in the user device information, and determining the unique device identifier as the user device number; and/or
And obtaining an anonymous device identifier corresponding to the Android system in the user device information, and determining the anonymous device identifier as the user device number.
5. The method of claim 1, wherein the encrypting the ue number to obtain a corresponding ue encrypted value comprises:
converting the user equipment number to obtain a converted user equipment number;
encrypting the converted user equipment number according to a preset encryption algorithm to obtain an encrypted user equipment number;
capitalizing the encrypted user equipment number to obtain a corresponding user equipment encryption value;
preferably, the converting the user equipment number to obtain a converted user equipment number includes:
when the user equipment number is an international mobile equipment identification code, carrying out lower case processing on the international mobile equipment identification code to obtain a lower case international mobile equipment identification code;
when the user equipment number is the advertisement identifier corresponding to the IOS system, capitalizing the advertisement identifier to obtain the capitalized advertisement identifier;
if the user equipment number is the unique equipment identifier corresponding to the Android system or the anonymous equipment identifier corresponding to the Android system, no processing is needed;
preferably, the determining a matching target contact data table according to the user device encryption value includes:
acquiring the last encrypted numerical value in the encrypted numerical value of the user equipment;
and determining a matched target contact data table according to the last bit encryption numerical value, wherein different last bit encryption numerical values correspond to different contact data tables.
6. A contact data query method, characterized in that the method adopts the contact data processing method according to any one of claims 1 to 5, so that the contact data to be processed is recorded in the corresponding target contact data table;
receiving a request to be queried, wherein the request to be queried carries information of user equipment to be queried;
determining the corresponding user equipment number to be inquired according to the user equipment information to be inquired;
encrypting the user equipment number to be inquired to obtain a corresponding first user equipment encrypted value and a corresponding second user equipment encrypted value;
determining a corresponding first contact data table according to the encrypted value of the first user equipment, and determining a corresponding second contact data table according to the encrypted value of the second user equipment;
and searching queried contact data matched with the number of the user equipment to be queried from the first contact data table or the second contact data table.
7. The method according to claim 6, wherein said encrypting the user equipment number to be queried to obtain the corresponding first user equipment encrypted value and second user equipment encrypted value comprises:
carrying out lowercase processing on the user equipment number to be inquired to obtain the lowercase user equipment number to be inquired;
encrypting the user equipment number to be inquired after the lowercase according to a preset encryption algorithm to obtain an encrypted first user equipment number to be inquired;
capitalizing the encrypted first user equipment number to be inquired to obtain a corresponding first user equipment encrypted value;
capitalizing the user equipment number to be inquired to obtain the capitalized user equipment number to be inquired;
encrypting the rewritten user equipment number to be inquired according to a preset encryption algorithm to obtain an encrypted second user equipment number to be inquired;
capitalizing the encrypted second user equipment number to be inquired to obtain a corresponding second user equipment encrypted value;
preferably, the determining a corresponding first contact data table according to the first user device encrypted value and determining a corresponding second contact data table according to the second user device encrypted value includes:
acquiring the last encrypted numerical value in the encrypted value of the first user equipment, and determining a matched first contact data table according to the last encrypted numerical value in the encrypted value of the first user equipment;
and acquiring the last encrypted numerical value in the encrypted value of the second user equipment, and determining a matched second contact data table according to the last encrypted numerical value in the encrypted value of the second user equipment.
8. A contact data processing apparatus, characterized in that the apparatus comprises:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring contact data to be processed, and the contact data to be processed comprises user equipment information;
the first determining module is used for determining a corresponding user equipment number according to the user equipment information;
the encryption module is used for encrypting the user equipment number to obtain a corresponding user equipment encryption value;
the second determining module is used for determining a matched target contact data table according to the user equipment encryption value;
and the recording module is used for recording the contact data to be processed into the target contact data table.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1 to 7 are implemented when the computer program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202210118968.9A 2022-02-08 2022-02-08 Contact data processing method and device and contact data query method Pending CN114528296A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210118968.9A CN114528296A (en) 2022-02-08 2022-02-08 Contact data processing method and device and contact data query method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210118968.9A CN114528296A (en) 2022-02-08 2022-02-08 Contact data processing method and device and contact data query method

Publications (1)

Publication Number Publication Date
CN114528296A true CN114528296A (en) 2022-05-24

Family

ID=81623555

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210118968.9A Pending CN114528296A (en) 2022-02-08 2022-02-08 Contact data processing method and device and contact data query method

Country Status (1)

Country Link
CN (1) CN114528296A (en)

Similar Documents

Publication Publication Date Title
CN110365670B (en) Blacklist sharing method and device, computer equipment and storage medium
CN109474578B (en) Message checking method, device, computer equipment and storage medium
CN108512830B (en) Information encryption processing method and device, computer equipment and storage medium
CN110908778B (en) Task deployment method, system and storage medium
CN110727949B (en) Data storage method and device, computer equipment and storage medium
CN110768784B (en) Password transmission method, device, computer equipment and storage medium
CN110750810A (en) Data desensitization method and device, computer equipment and storage medium
CN110245505A (en) Tables of data access method, device, computer equipment and storage medium
CN112527835B (en) Authentication request processing method and device based on cache and related equipment
CN110213202B (en) Identification encryption matching method and device, and identification processing method and device
CN111222075A (en) Data transmission method based on multiple Webviews, server and storage medium
US10033705B2 (en) Process for the user-related answering of customer inquiries in data networks
CN110930193B (en) Advertisement conversion rate evaluation method, advertisement conversion rate evaluation device, computer equipment and storage medium
CN114448722B (en) Cross-browser login method and device, computer equipment and storage medium
CN114222288B (en) Equipment identifier generation method, equipment identifier verification method and device
CN115757535A (en) Data query method, data storage method and device and electronic equipment
CN114528296A (en) Contact data processing method and device and contact data query method
CN110995437B (en) ETC system-based user information input method, device, equipment and storage medium
CN110460585B (en) Equipment identity identification method and device, computer equipment and storage medium
CN110071908B (en) Terminal binding method and device, computer equipment and storage medium
CN113992359A (en) Encryption control method and device for user information, computer equipment and storage medium
CN114238914A (en) Digital certificate application system, method, device, computer equipment and storage medium
CN111193606B (en) Equipment configuration parameter comparison method and device, storage medium and computer equipment
CN114692121A (en) Information acquisition method and related product
CN112073174B (en) Communication account decryption method, device, equipment, storage medium and information interaction system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination