CN110033273B - User identity identification method and device - Google Patents

User identity identification method and device Download PDF

Info

Publication number
CN110033273B
CN110033273B CN201810027084.6A CN201810027084A CN110033273B CN 110033273 B CN110033273 B CN 110033273B CN 201810027084 A CN201810027084 A CN 201810027084A CN 110033273 B CN110033273 B CN 110033273B
Authority
CN
China
Prior art keywords
user
information
virtual resource
resource transfer
identifier
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810027084.6A
Other languages
Chinese (zh)
Other versions
CN110033273A (en
Inventor
李佳锋
李亚光
朱尹华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sankuai Online Technology Co Ltd
Original Assignee
Beijing Sankuai Online Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sankuai Online Technology Co Ltd filed Critical Beijing Sankuai Online Technology Co Ltd
Priority to CN201810027084.6A priority Critical patent/CN110033273B/en
Publication of CN110033273A publication Critical patent/CN110033273A/en
Application granted granted Critical
Publication of CN110033273B publication Critical patent/CN110033273B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/409Device specific authentication in transaction processing

Abstract

The disclosure relates to a user identity identification method, a user identity identification device, electronic equipment and a storage medium, and relates to the technical field of computers. The method comprises the following steps: after the user virtual resource transfer identification of the first type of user information, the corresponding user registration identification information and the user virtual resource transfer identification in the second type of user information are obtained, the user virtual resource transfer identification is converted into a user identity identification according to a preset conversion rule, and after the same user identity identification in the first type of user information and the second type of user information is determined, corresponding relation information with the same user identity identification and the corresponding user registration identification information is generated. The method and the device can effectively identify the user identity information corresponding to the user virtual resource transfer identifier of the second type of user information.

Description

User identity identification method and device
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a user identity identification method, apparatus, electronic device, and computer-readable storage medium.
Background
As the internet is more widely used, the virtual resource transfer through the internet is higher. For example: the user purchases the online transaction generated by the corresponding service or commodity through the service website or APP; alternatively, the user may scan the merchant's collection two-dimensional code, the merchant may scan the user's payment two-dimensional code, the user may generate an offline transaction using a bank card through a POS, and so on. After the virtual resource transfer is generated, the service provider can collect and analyze the user information of the user so as to better provide service for the user.
However, since the virtual resource transfer of the offline user does not require registration of user information, the identity of the offline user cannot be effectively identified, and thus better service cannot be provided for the user more comprehensively and accurately.
Therefore, it is desirable to provide a solution to at least the above problems.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
An object of the present disclosure is to provide a user identification method, apparatus, electronic device, and computer-readable storage medium, which overcome one or more of the problems due to the limitations and disadvantages of the related art, at least to some extent.
According to an aspect of the present disclosure, there is provided a user identification method, including:
acquiring first-class user information and second-class user information, wherein the first-class user information and the second-class user information respectively comprise user virtual resource transfer identifications, and the first-class user information also comprises user registration identification information corresponding to the user virtual resource transfer identifications;
converting the user virtual resource transfer identifier into a user identity identifier according to a preset conversion rule;
and determining the same user identity identifier in the first type of user information and the second type of user information, and generating corresponding relation information with the same user identity identifier and corresponding user registration identifier information.
In an exemplary embodiment of the present disclosure, the converting the user virtual resource transfer identifier into the user identity identifier according to a preset conversion rule includes:
and converting the user virtual resource transfer identifier into a user identity identifier according to the user virtual resource transfer channel information.
In an exemplary embodiment of the present disclosure, converting the user virtual resource transfer identifier into a user identity identifier according to the user virtual resource transfer channel information includes:
respectively distinguishing the virtual resource transfer types of the user virtual resource transfer identifications in the first type of user information and the second type of user information according to the user virtual resource transfer channel information;
determining a conversion rule corresponding to each virtual resource transfer category;
and converting the user virtual resource transfer identifier into a user identity identifier according to a conversion rule corresponding to the virtual resource transfer category of the user virtual resource transfer identifier.
In an exemplary embodiment of the present disclosure, converting the user virtual resource transfer identifier into a user identity identifier according to a conversion rule corresponding to a virtual resource transfer category of the user virtual resource transfer identifier includes:
and encrypting or decrypting the user virtual resource transfer identifier to convert the user virtual resource transfer identifier into a user identity identifier.
In an exemplary embodiment of the disclosure, the method further comprises:
periodically acquiring newly added first-class user information and second-class user information;
converting the newly added user virtual resource transfer identifiers of the first type of user information and the second type of user information into newly added user identity identifiers according to a preset rule;
and matching the newly added user identification with the original user identification, and updating the corresponding relationship information according to the matching result.
In an exemplary embodiment of the present disclosure, the first type of user information and the second type of user information further include user behavior information, and the method further includes:
analyzing the user behavior information;
and generating corresponding relation information with user registration identification information, user identity identification and corresponding user behavior information according to a preset strategy.
In an exemplary embodiment of the present disclosure, the generating the correspondence information having the same user id and corresponding user registration identification information includes:
determining a user virtual resource transfer identifier corresponding to the same user identity identifier before conversion;
searching user registration identification information corresponding to the user virtual resource transfer identification in the first type of user information before conversion;
and generating the corresponding relation information by using the same user identity identification and the corresponding user registration identification information in the first type of user information.
In an exemplary embodiment of the disclosure, the first user information further includes at least one of an identity code and a communication identification code.
According to an aspect of the present disclosure, there is provided a user identification apparatus including:
the information acquisition module is used for acquiring first-class user information and second-class user information, wherein the first-class user information and the second-class user information respectively comprise user virtual resource transfer identifications, and the first-class user information also comprises user registration identification information corresponding to the user virtual resource transfer identifications;
the identification conversion module is used for converting the user virtual resource transfer identification into a user identity identification according to a preset conversion rule;
and the corresponding relation generating module is used for determining the same user identity identifier in the first type of user information and the second type of user information and generating corresponding relation information with the same user identity identifier and corresponding user registration identifier information.
According to an aspect of the present disclosure, there is provided an electronic device including:
a processor; and
a memory having computer readable instructions stored thereon which, when executed by the processor, implement a method according to any of the above.
According to an aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method according to any one of the above.
In the user identity identification method in the exemplary embodiment of the disclosure, after the user virtual resource transfer identifier of the first type of user information, the corresponding user registration identifier information, and the user virtual resource transfer identifier in the second type of user information are obtained, the user virtual resource transfer identifier is converted into the user identity identifier according to the preset conversion rule, and after the same user identity identifier in the first type of user information and the second type of user information is determined, the corresponding relation information having the same user identity identifier and the corresponding user registration identifier information is generated, so that the user registration identifier information corresponding to the second type of user information is known, and the identification of the user identity is completed. On one hand, the effective conversion of the user virtual resource transfer identifier and the user identity identifier can be completed according to the conversion rule, so that the efficiency and the accuracy of the user identity conversion are improved; on the other hand, by generating the corresponding relation information between the user identity identifier and the corresponding user registration identifier information, the user registration identifier information corresponding to the user virtual resource transfer identifier of the second type of user information can be more effectively and accurately identified.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The above and other features and advantages of the present disclosure will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings.
FIG. 1 shows a flow chart of a user identification method according to an example embodiment of the present disclosure;
FIG. 2 shows a schematic block diagram of a user identification apparatus according to an example embodiment of the present disclosure;
FIG. 3 schematically illustrates a block diagram of an electronic device according to an exemplary embodiment of the present disclosure; and
fig. 4 schematically illustrates a schematic diagram of a computer-readable storage medium according to an exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus, a repetitive description thereof will be omitted.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the embodiments of the disclosure can be practiced without one or more of the specific details, or with other methods, components, materials, devices, steps, and so forth. In other instances, well-known structures, methods, devices, implementations, materials, or operations are not shown or described in detail to avoid obscuring aspects of the disclosure.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. That is, these functional entities may be implemented in the form of software, or in one or more software-hardened modules, or in different networks and/or processor devices and/or microcontroller devices.
In this exemplary embodiment, first, a user identity recognition method is provided, which may be applied to a network device such as a server; referring to fig. 1, the user identification method may include the steps of:
step S110, acquiring first-class user information and second-class user information;
step S120, converting the user virtual resource transfer identifier into a user identity identifier according to a preset conversion rule;
step S130, determining the same user identification in the first type of user information and the second type of user information, and generating corresponding relation information with the same user identification and corresponding user registration identification information.
According to the user identity identification method in the embodiment, on one hand, the effective conversion between the user virtual resource transfer identifier and the user identity identifier can be completed according to the conversion rule, so that the efficiency and the accuracy of user identity conversion are improved; on the other hand, by generating the corresponding relation information between the user identity identifier and the corresponding user registration identifier information, the user registration identifier information corresponding to the user virtual resource transfer identifier of the second type of user information can be more effectively and accurately identified.
Next, the user identification method in the present exemplary embodiment will be further described.
In step S110, the first type of user information and the second type of user information may be acquired.
In this exemplary embodiment, the first type of user information may be online virtual resource transfer information generated when a user purchases a corresponding service or commodity through a service website or APP, and includes: user virtual resource transfer identification, user registration identification information corresponding to the user virtual resource transfer identification, and the like. For example: and the user logs in the meal ordering website through the user registration identification information, orders a meal through the APP and completes the transaction, so that the communication application acquires the user registration identification information and the user virtual resource transfer identification in the transaction process. The user registration identification information is identification information uploaded or distributed by a user when the user registers in the ordering website or APP, such as account information, an identification corresponding to a user name, and the like, and the user virtual resource transfer identification may be a data identification used for representing a transaction user.
The second type of user information may be offline virtual resource transfer information generated by a user scanning a collection two-dimensional code of a merchant, a merchant scanning a payment two-dimensional code of the user, the user using a bank card through a POS machine, and the like, and includes: and (4) user virtual resource transfer identification. When the user completes the transaction in any off-line transaction mode, the user virtual resource transfer identification in the transaction process can be obtained.
After the first type of user information and the second type of user information are obtained, the first type of user information and the second type of user information are respectively stored.
In step S120, the user virtual resource transfer identifier may be converted into a user identity identifier according to a preset conversion rule;
in this embodiment, the first type of user information and the second type of user information may further include user virtual resource transfer channel information, the user virtual resource transfer identifier is converted into a user identity identifier according to a preset conversion rule, and the converting of the user virtual resource transfer identifier into the user identity identifier according to the user virtual resource transfer channel information specifically includes: respectively distinguishing the virtual resource transfer types of the user virtual resource transfer identifications in the first type of user information and the second type of user information according to the user virtual resource transfer channel information; determining a conversion rule corresponding to each virtual resource transfer category; and converting the user virtual resource transfer identifier into a user identity identifier according to a conversion rule corresponding to the virtual resource transfer category of the user virtual resource transfer identifier. For example:
the user virtual resource transfer channel information is a virtual resource transfer mode used by the user to complete the transaction, such as virtual resource transfer through WeChat, virtual resource transfer through Payment treasured, virtual resource transfer through a bank card, and the like. Although the user virtual resource transfer identifier is a data identifier for representing a virtual resource transfer user, since the acquisition channels of the first type of user information and the second type of user information are not consistent (that is, the virtual resource transfer channels of the transaction are not consistent), even if the same user performs an online transaction and an offline transaction, the user virtual resource transfer identifiers in the first type of user information and the second type of user information that are acquired may be different. In addition, in consideration of user security, the obtained virtual resource transfer identifier of the user is usually an identifier obtained by processing a real account of the user, and cannot directly know the identity of the user, for example: the user virtual resource transfer identifier of the wechat virtual resource transfer category in the first type of user information is openID (digital identity identification), and the user virtual resource transfer identifier of the wechat virtual resource transfer category in the second type of user information is sub openID, so that the openID and the sub openID are both required to be converted into a uniform user identity identifier (unionID), and the user identity identifier is an indication identifier capable of representing the unique identity of the user. Therefore, the user virtual resource transfer identifications in the acquired first-class user information and the second-class user information can be classified according to the user virtual resource transfer channel information. For example, the first type of user information and the second type of user information are separated by using user virtual resource transfer identifiers of WeChat transaction, Payment treasures transaction and bank card transaction, and are divided into three virtual resource transfer categories. The preset conversion rule corresponding to the WeChat virtual resource transfer category of the first type of user information is as follows: sending the obtained openID, the previously obtained appID, the app key and other information to the WeChat communication application to obtain the user identity identifier unioniD; the preset conversion rule corresponding to the wechat virtual resource transfer category of the second type of user information may be: the method comprises the steps of firstly obtaining an openID corresponding to a sub openID, and sending the openID, the obtained appID, the app key and other information to a micro-communication application to obtain a user identity identifier unioniD.
In this exemplary embodiment, converting the user virtual resource transfer identifier into a user identity identifier according to the user virtual resource transfer channel information may further include: and encrypting or decrypting the user virtual resource transfer identifier to convert the user virtual resource transfer identifier into a user identity identifier. For example:
the preset conversion rules corresponding to the user virtual resource transfer identifications (buyerIDs) of the first type of user information and the second type of user information obtained through the virtual resource transfer treasure virtual resource transfer channel can be as follows: and uniformly decrypting the user virtual resource transfer identifier to obtain plaintext data, wherein the plaintext data is the user identity identifier. The preset conversion rules corresponding to the user virtual resource transfer identifications (ciphertext strings) of the first type of user information and the second type of user information obtained through the bank card virtual resource transfer channel can be as follows: and encrypting the password string according to an encryption algorithm to acquire the user identity, wherein the encryption algorithm can be a hash algorithm and the like.
It should be noted that the above examples are only exemplary descriptions listed for further understanding the disclosure, and due to the development of science and technology, various payment transaction applications are layered endlessly, and conversion rules corresponding to other virtual resource transfer channels are not listed one by one here, and conversion rules corresponding to other virtual resource transfer channels also belong to the scope of protection of the disclosure.
Step S130, determining the same user identification in the first type of user information and the second type of user information, and generating corresponding relation information with the same user identification and corresponding user registration identification information.
In this exemplary embodiment, after the virtual resource transfer identifiers in the first type of user information and the second type of user information are converted into the user identifiers having the uniform rule, the user identifiers of the same virtual resource transfer category in the first type of user information and the second type of user information may be matched to determine the same user identifier.
Generating the corresponding relationship information having the same user identity and corresponding user registration identification information includes: determining a user virtual resource transfer identifier corresponding to the same user identity identifier before conversion; searching user registration identification information corresponding to the user virtual resource transfer identification in the first type of user information before conversion; and generating the corresponding relation information by using the same user identity identification and the corresponding user registration identification information in the first type of user information. For example:
if the obtained first-class user information and the corresponding user virtual resource transfer identifier are shown in table 1:
Figure 634625DEST_PATH_IMAGE001
TABLE 1
And if the acquired second type of user information and the corresponding user virtual resource transfer identifier are 'wx-222' and 'jianhangXXX'.
The user identity of the first type of user information obtained by converting the user virtual resource transfer identity is shown in table 2:
Figure DEST_PATH_IMAGE002
TABLE 2
The user identity of the second type of user information obtained after converting the user virtual resource transfer identity is shown in table 3:
Figure 489448DEST_PATH_IMAGE003
TABLE 3
After the same user identity is found in the first-class user information and the second-class user information, the same user identity and the user registration identification information corresponding to the virtual resource transfer identification of the user before conversion in the first-class user information may be used to generate corresponding relationship information, as shown in table 4:
user registration identification information User identification
AA@meituan.com wx-AA
BB@meituan.com wx-AA、Jianhang111
TABLE 4
The contents shown in tables 1 to 4 are merely examples for further understanding of the present disclosure, and do not specifically limit the present disclosure.
After the corresponding relationship information is generated, the user registration identification information corresponding to the user virtual resource transfer identifications 'wx-222' and 'jianhangXXX' in the second type of user information can be known, and the identification of the user identity is completed.
In this exemplary embodiment, after the correspondence information is generated, there may still exist a case where the user id and the user registration id are n: and m, for example, a virtual resource transfer mode in which a plurality of family members share one bank card through a plurality of registration identifiers. Therefore, in order to identify the user identity more accurately, in this example embodiment, the first type of user information and the second type of user information may further include user behavior information, and through analyzing the user behavior information, the corresponding relationship information having the user registration identification information, the user identity identification and the corresponding user behavior information is generated according to the preset policy, so that the user identity identification is performed more accurately and more specifically. For example:
the user behavior information includes transaction amount, transaction content, transaction location, etc. of the virtual resource transfer transaction generated by the user, such as: the user behavior information of the first type of user information obtained comprises: com orders a takeout through a Mei Tuo website at 20 yuan (user virtual resource transfer identifier wx-111) in snack A at 11 o' clock 1 m 12 m 2017; the user behavior information of the second type of user information obtained comprises: the user virtual resource transfer is characterized in that the user with the identifier of Jianhang111 consumes 2 ten thousand yuan to purchase a nameplate package in a B department building at 15: 00 on 26.11.7.2017. After the user behavior information is acquired, analyzing all user behaviors of the user, and determining targeted corresponding relationship information according to a preset strategy, for example: the preset strategy can be that a user who has a transaction last time is required to be known according to marketing requirements; or, if the user with the highest consumption frequency or the user with the highest consumption amount needs to be known according to the wind control requirement, then more accurate corresponding relationship information can be obtained according to the preset policy, for example, as shown in table 5:
preset strategy User registration identification information User identification
The consumption frequency is highest AA@meituan.com wx-AA
The highest consumption amount BB@meituan.com Jianhang111
Last consumption AA@meituan.com wx-AA
TABLE 5
After the corresponding demand information is determined according to the preset strategy, more accurate service can be provided for the user according to the demand. For example: after the meal ordering habits of the user on the working day are known, coupons of corresponding restaurants can be provided for the user; when the user consumption place is known to be a very residential area, the wind control reminding can be timely carried out on the user; and similar users with the same or similar behaviors with the user can be known through comprehensive analysis, and corresponding services can be provided for the user according to the behavior habits of the similar users, and the like. The preset policy and the corresponding services provided subsequently may include various types according to different application scenarios (such as marketing, recommendation, wind control, behavior portrayal, and the like), which are not described in detail and are not particularly limited in this exemplary embodiment.
In this example embodiment, the first user information may further include at least one of an identity code and a communication identifier code. For example, when the user registers the user account information, if the identity identification code (such as an identification number) or the communication identification code (such as a telephone number) is bound, the stored corresponding relationship information may also include the user identity identification and the communication identification, so as to perform the user identity identification more accurately.
In this exemplary embodiment, in order to further improve the user information, the newly added first-type user information and second-type user information may also be periodically obtained; converting the newly added user virtual resource transfer identifiers of the first type of user information and the second type of user information into newly added user identity identifiers according to a preset rule; and matching the newly added user identification with the original user identification, and updating the corresponding relationship information according to the matching result.
Because the total amount of the obtained first-class user information and the second-class user information is large, in order to save calculation resources and calculation efficiency, the steps of S110-S130 can be executed on the newly added first-class user information and the original second-class user information, the steps of S110-S130 can be executed on the newly added second-class user information and the original first-class user information, and the stored corresponding relation information is updated after the calculation results are combined, so that the latest calculation results are continuously improved and updated.
It should be noted that although the various steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that these steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
In addition, in the present exemplary embodiment, a user identification apparatus is also provided. Referring to fig. 2, the user identification apparatus 200 may include: an information acquisition module 210, an identification conversion module 220, and a correspondence relationship generation module 230. Wherein:
an information obtaining module 210, configured to obtain first-class user information and second-class user information, where the first-class user information and the second-class user information respectively include a user virtual resource transfer identifier, and the first-class user information further includes user registration identifier information corresponding to the user virtual resource transfer identifier;
the identifier conversion module 220 is configured to convert the user virtual resource transfer identifier into a user identity identifier according to a preset conversion rule;
the corresponding relationship generating module 230 is configured to determine the same user identifier in the first type of user information and the second type of user information, and generate corresponding relationship information having the same user identifier and corresponding user registration identifier information.
The specific details of each user identification device module are already described in detail in the corresponding user identification method, and therefore are not described herein again.
It should be noted that although several modules or units of the user identification apparatus 200 are mentioned in the above detailed description, such division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
In addition, in an exemplary embodiment of the present disclosure, an electronic device capable of implementing the above method is also provided.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or program product. Thus, various aspects of the invention may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
An electronic device 300 according to such an embodiment of the invention is described below with reference to fig. 3. The electronic device 300 shown in fig. 3 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 3, electronic device 300 is embodied in the form of a general purpose computing device. The components of electronic device 300 may include, but are not limited to: the at least one processing unit 310, the at least one memory unit 320, a bus 330 connecting different system components (including the memory unit 320 and the processing unit 310), and a display unit 340.
Wherein the storage unit stores program code that is executable by the processing unit 310 to cause the processing unit 310 to perform steps according to various exemplary embodiments of the present invention as described in the above section "exemplary method" of the present specification. For example, the processing unit 310 may perform steps S110 to S130 as shown in fig. 1.
The storage unit 320 may include readable media in the form of volatile storage units, such as a random access memory unit (RAM) 3201 and/or a cache 3202, and may further include a read only memory unit (ROM) 3203.
The storage unit 320 may also include a program/utility 3204 having a set (at least one) of program modules 3205, such program modules 3205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 330 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 300 may also communicate with one or more external devices 370 (e.g., keyboard, pointing device, bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 300, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 300 to communicate with one or more other computing devices. Such communication may occur through input/output I/O interface 350. Also, the electronic device 300 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 360. As shown, network adapter 360 communicates with the other modules of electronic device 300 via bus 330. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with electronic device 300, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
In an exemplary embodiment of the present disclosure, there is also provided a computer-readable storage medium having stored thereon a program product capable of implementing the above-described method of the present specification. In some possible embodiments, aspects of the invention may also be implemented in the form of a program product comprising program code means for causing a terminal device to carry out the steps according to various exemplary embodiments of the invention described in the above-mentioned "exemplary methods" section of the present description, when said program product is run on the terminal device.
Referring to fig. 4, a program product 400 for implementing the above method according to an embodiment of the present invention is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited in this regard and, in the present document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
Furthermore, the above-described figures are merely schematic illustrations of processes involved in methods according to exemplary embodiments of the invention, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is to be limited only by the terms of the appended claims.

Claims (8)

1. A method for identifying a user, the method comprising:
the method comprises the steps of obtaining first-class user information and second-class user information, wherein the first-class user information is virtual resource transfer information generated when a user conducts online transaction, the second-class user information is virtual resource transfer information generated when the user conducts offline transaction, the first-class user information and the second-class user information respectively comprise a user virtual resource transfer identifier and user virtual resource transfer channel information, and the first-class user information also comprises user registration identifier information corresponding to the user virtual resource transfer identifier;
encrypting or decrypting the user virtual resource transfer identifier to convert the user virtual resource transfer identifier into a user identity identifier; or
Respectively distinguishing the virtual resource transfer categories of the user virtual resource transfer identifications in the first type of user information and the second type of user information according to the user virtual resource transfer channel information;
determining a conversion rule corresponding to each virtual resource transfer category;
converting the user virtual resource transfer identifier into a user identity identifier according to a conversion rule corresponding to the virtual resource transfer category of the user virtual resource transfer identifier;
and determining the same user identity identifier in the first type of user information and the second type of user information, and generating corresponding relation information with the same user identity identifier and corresponding user registration identifier information.
2. The method of claim 1, wherein the method further comprises:
periodically acquiring newly added first-class user information and second-class user information;
converting the newly added user virtual resource transfer identifiers of the first type of user information and the second type of user information into newly added user identity identifiers according to a preset rule;
and matching the newly added user identification with the original user identification, and updating the corresponding relationship information according to the matching result.
3. The method of any of claims 1-2, wherein the first type of user information and the second type of user information further comprise user behavior information, the method further comprising:
analyzing the user behavior information;
and generating corresponding relation information with user registration identification information, user identity identification and corresponding user behavior information according to a preset strategy.
4. The method of claim 1, wherein the generating the correspondence information having the same user id and corresponding user registration identification information comprises:
determining a user virtual resource transfer identifier corresponding to the same user identity identifier before conversion;
searching user registration identification information corresponding to the user virtual resource transfer identification in the first type of user information before conversion;
and generating the corresponding relation information by using the same user identity identification and the corresponding user registration identification information in the first type of user information.
5. The method of claim 1, wherein the first type of user information further comprises at least one of an identity code and a communication identification code.
6. An apparatus for identifying a user, the apparatus comprising:
the information acquisition module is used for acquiring first-class user information and second-class user information, wherein the first-class user information is virtual resource transfer information generated when a user conducts online transaction, the second-class user information is virtual resource transfer information generated when the user conducts offline transaction, the first-class user information and the second-class user information respectively comprise a user virtual resource transfer identifier and user virtual resource transfer channel information, and the first-class user information also comprises user registration identifier information corresponding to the user virtual resource transfer identifier;
the identification conversion module is used for encrypting or decrypting the user virtual resource transfer identification so as to convert the user virtual resource transfer identification into a user identity identification; or
Respectively distinguishing the virtual resource transfer categories of the user virtual resource transfer identifications in the first type of user information and the second type of user information according to the user virtual resource transfer channel information;
determining a conversion rule corresponding to each virtual resource transfer category;
converting the user virtual resource transfer identifier into a user identity identifier according to a conversion rule corresponding to the virtual resource transfer category of the user virtual resource transfer identifier;
and the corresponding relation generating module is used for determining the same user identity identifier in the first type of user information and the second type of user information and generating corresponding relation information with the same user identity identifier and corresponding user registration identifier information.
7. An electronic device, comprising
A processor; and
a memory having computer readable instructions stored thereon which, when executed by the processor, implement the method of any of claims 1 to 5.
8. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 5.
CN201810027084.6A 2018-01-11 2018-01-11 User identity identification method and device Active CN110033273B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810027084.6A CN110033273B (en) 2018-01-11 2018-01-11 User identity identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810027084.6A CN110033273B (en) 2018-01-11 2018-01-11 User identity identification method and device

Publications (2)

Publication Number Publication Date
CN110033273A CN110033273A (en) 2019-07-19
CN110033273B true CN110033273B (en) 2021-06-18

Family

ID=67234731

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810027084.6A Active CN110033273B (en) 2018-01-11 2018-01-11 User identity identification method and device

Country Status (1)

Country Link
CN (1) CN110033273B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894429A (en) * 2010-06-30 2010-11-24 张国祥 Full service implementing method
CN102750558A (en) * 2011-04-20 2012-10-24 张默 Implementation method of multifunctional intelligent electronic label management system based on cloud computation
CN104750394A (en) * 2013-12-30 2015-07-01 腾讯科技(深圳)有限公司 Information input method, account information input method and terminal
CN105550871A (en) * 2015-12-17 2016-05-04 浙江脸谱科技有限公司 Mobile internet based mobile phone bank transaction system
CN105989468A (en) * 2015-02-12 2016-10-05 阿里巴巴集团控股有限公司 Method and device for sending and receiving identifier and method and device for processing information

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101894429A (en) * 2010-06-30 2010-11-24 张国祥 Full service implementing method
CN102750558A (en) * 2011-04-20 2012-10-24 张默 Implementation method of multifunctional intelligent electronic label management system based on cloud computation
CN104750394A (en) * 2013-12-30 2015-07-01 腾讯科技(深圳)有限公司 Information input method, account information input method and terminal
CN105989468A (en) * 2015-02-12 2016-10-05 阿里巴巴集团控股有限公司 Method and device for sending and receiving identifier and method and device for processing information
CN105550871A (en) * 2015-12-17 2016-05-04 浙江脸谱科技有限公司 Mobile internet based mobile phone bank transaction system

Also Published As

Publication number Publication date
CN110033273A (en) 2019-07-19

Similar Documents

Publication Publication Date Title
US20140114822A1 (en) Method and system for creating tax configuration templates
JP2018054765A (en) Data processing device, data processing method, and program
CN111488995B (en) Method, device and system for evaluating joint training model
CN111311294A (en) Data processing method, device, medium and electronic equipment
CN111598494A (en) Resource limit adjusting method and device and electronic equipment
CN110705998A (en) Block chain based information auditing method and device, electronic equipment and storage medium
CN111324786A (en) Method and device for processing consultation problem information
US20220198579A1 (en) System and method for dimensionality reduction of vendor co-occurrence observations for improved transaction categorization
CN112348460A (en) Resource limit adjusting method and device of cooperative task and electronic equipment
CN114564294A (en) Intelligent service arranging method and device, computer equipment and storage medium
CN112330412B (en) Product recommendation method and device, computer equipment and storage medium
Susanto et al. Analysis of Factors that Affecting the Acceptance of the Use of Digital Form Mobile Application At Pt. Abc Using Tam Dan Utaut Theoretical Model
CN110070383B (en) Abnormal user identification method and device based on big data analysis
CN112860662A (en) Data blood relationship establishing method and device, computer equipment and storage medium
CN110033273B (en) User identity identification method and device
CN109547406B (en) Data transmission method and device, storage medium and electronic equipment
CN111612508A (en) Financial resource allocation request processing method and device and electronic equipment
JP7102910B2 (en) Information presentation system, information presentation method, and program
CN110796543A (en) Method and device for obtaining customized information based on relational network and electronic equipment
CN110895536A (en) Big data-based power information retrieval method and power information retrieval device
CN111046010A (en) Log storage method, device, system, electronic equipment and computer readable medium
CN116450723A (en) Data extraction method, device, computer equipment and storage medium
US11741099B2 (en) Supporting database queries using unsupervised vector embedding approaches over unseen data
CN109902698A (en) Information generating method and device
CN113591943A (en) Method and device for quickly authenticating user of newly added channel and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant