CN111177536B - Method and device for transmitting customized information to unregistered user based on device fingerprint and electronic device - Google Patents
Method and device for transmitting customized information to unregistered user based on device fingerprint and electronic device Download PDFInfo
- Publication number
- CN111177536B CN111177536B CN201911271452.2A CN201911271452A CN111177536B CN 111177536 B CN111177536 B CN 111177536B CN 201911271452 A CN201911271452 A CN 201911271452A CN 111177536 B CN111177536 B CN 111177536B
- Authority
- CN
- China
- Prior art keywords
- user
- information
- fingerprint
- device fingerprint
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000012795 verification Methods 0.000 claims description 16
- 238000012790 confirmation Methods 0.000 claims description 12
- 238000004590 computer program Methods 0.000 claims description 10
- 238000013499 data model Methods 0.000 claims description 10
- 239000011159 matrix material Substances 0.000 claims description 10
- 238000001514 detection method Methods 0.000 claims description 4
- 230000005540 biological transmission Effects 0.000 abstract 1
- 238000012545 processing Methods 0.000 description 13
- 238000010586 diagram Methods 0.000 description 11
- 230000000694 effects Effects 0.000 description 7
- 230000003287 optical effect Effects 0.000 description 4
- 238000007792 addition Methods 0.000 description 2
- 238000004891 communication Methods 0.000 description 2
- 239000013307 optical fiber Substances 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000011895 specific detection Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
- G06F16/9535—Search customisation based on user profiles and personalisation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V40/00—Recognition of biometric, human-related or animal-related patterns in image or video data
- G06V40/10—Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
- G06V40/12—Fingerprints or palmprints
- G06V40/1365—Matching; Classification
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Human Computer Interaction (AREA)
- Multimedia (AREA)
- Collating Specific Patterns (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a method, a device, electronic equipment and a corresponding computer readable medium for transmitting customized information to an unregistered user based on equipment fingerprints. The method comprises the following steps: querying an equipment fingerprint database to obtain user information matched with the equipment fingerprint; when the user information matched with the device fingerprint is successfully acquired, generating or calling customized information matched with the user information according to the user information; and displaying the customized information on the client. The method and the device can realize accurate custom information transmission and display in the state that the user does not log in the APP.
Description
Technical Field
The present invention relates to the field of computer applications, and in particular, to a method, an apparatus, an electronic device, and a computer readable medium for transmitting customized information to an unregistered user based on a device fingerprint.
Background
In general, when a user opens a new APP, the user defaults to an unregistered state, and at this time, basic information of the user cannot be directly acquired, and accurate customized information cannot be transmitted. The customization information is, for example, marketing-like information. Thus, for the specific product to which the APP is directed, the opportunity for the user to first open the APP to display product information is wasted. In particular, financial APP has high requirements on security and reliability, and defaults to an unregistered state when APP is not used. In particular, when a user logs into a new device, verification of the user's identity is required.
Therefore, a method for accurately marketing a user in a state where the user is not logged in has yet to be proposed.
Disclosure of Invention
The invention aims to solve the problem that in the prior art, user information cannot be acquired when a user is not logged in, so that customized information cannot be transmitted to the user.
In order to solve the above technical problems, a first aspect of the present invention provides a method for transmitting customized information to an unregistered user based on a device fingerprint, including the following steps: acquiring equipment information of a client and generating equipment fingerprints according to the equipment information; querying an equipment fingerprint database to obtain user information matched with the equipment fingerprint; when the user information matched with the device fingerprint is successfully acquired, generating or calling customized information matched with the user information according to the user information; and displaying the customized information on the client.
According to a preferred embodiment of the present invention, the querying the device fingerprint database to obtain user information matching the device fingerprint includes: and the client sends a query instruction to a server configured with the equipment fingerprint database and receives a query result returned by the server.
According to a preferred embodiment of the present invention, the client pre-stores a plurality of customized information;
and when the user information matched with the device fingerprint is successfully acquired, at least one of the prestored customized information is called according to the user information.
According to a preferred embodiment of the invention, default customization information is presented on the client when user information matching the device fingerprint is not successfully obtained.
According to a preferred embodiment of the present invention, a user login operation on a client is detected, and login user information is acquired when the user login operation on the client is detected; when the user information matched with the device fingerprint is successfully acquired, judging whether the acquired user information matched with the device fingerprint is consistent with the login user information or not; and when the acquired user information matched with the equipment fingerprint is inconsistent with the login user information, performing security verification.
According to a preferred embodiment of the invention, the security verification comprises: and sending alarm information to the telephone number in the login user information, wherein the alarm information is used for guiding the user to confirm whether login on the client is allowed or not.
According to a preferred embodiment of the present invention, the security verification further comprises: and detecting the confirmation information of the current user for the login operation on the client, and if the confirmation information is detected, allowing the current user to login, and simultaneously updating the user information corresponding to the device fingerprint information of the client in the device fingerprint database into the user information of the current user.
In order to solve the above technical problem, a second aspect of the present invention provides an apparatus for transmitting customized information to an unregistered user based on a device fingerprint, including: the acquisition module is used for acquiring equipment information of the client and generating equipment fingerprints according to the equipment information; the query module is used for querying the equipment fingerprint database to acquire user information matched with the equipment fingerprint; the matching module is used for generating or calling customized information matched with the user information according to the user information when the user information matched with the device fingerprint is successfully acquired; and the display module is used for displaying the customized information on the client.
According to a preferred embodiment of the present invention, the query module is configured to: and sending a query instruction to a server configured with the device fingerprint database, and acquiring a query result returned by the server.
According to a preferred embodiment of the present invention, the client pre-stores a plurality of customized information; the matching module is used for: and when the user information matched with the device fingerprint is successfully acquired, at least one of the prestored customized information is called according to the user information.
According to a preferred embodiment of the invention, the display module is further adapted to: and when the user information matched with the device fingerprint is not successfully acquired, displaying default customized information on the client.
According to a preferred embodiment of the present invention, the detection module is configured to detect a user login operation on the client, and when detecting the user login operation on the client, obtain login user information; the judging module is used for judging whether the acquired user information matched with the equipment fingerprint is consistent with the login user information or not when the user information matched with the equipment fingerprint is successfully acquired; and the security module is used for performing security verification when the acquired user information matched with the equipment fingerprint is inconsistent with the login user information.
According to a preferred embodiment of the invention, the security module is further adapted to: and sending alarm information to the telephone number in the login user information, wherein the alarm information is used for guiding the user to confirm whether login on the client is allowed or not.
According to a preferred embodiment of the invention, the security module is further adapted to: and detecting the confirmation information of the current user for the login operation on the client, and if the confirmation information is detected, allowing the current user to login, and simultaneously updating the user information corresponding to the device fingerprint information of the client in the device fingerprint database into the user information of the current user.
In order to solve the above-mentioned technical problem, a third aspect of the present invention provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor implements the method for transmitting customized information to an unregistered user based on a device fingerprint when executing the program.
In order to solve the above technical problem, a fourth aspect of the present invention provides a computer readable storage medium having stored thereon a computer program executable by a processor to implement the above method for transmitting customized information to an unregistered user based on a device fingerprint.
According to the invention, the device fingerprint of the client is obtained, and the basic information of the user which is not logged in is obtained through matching the binding user, so that the customized information can be transmitted to the user under the condition that the user is not logged in.
In addition, the invention can also carry out security verification on the user login, update the binding relationship between the equipment fingerprint and the user information, and ensure the security.
Drawings
In order to make the technical problems solved by the present invention, the technical means adopted and the technical effects achieved more clear, specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings. It should be noted, however, that the drawings described below are merely illustrative of exemplary embodiments of the present invention and that other embodiments of the drawings may be derived from these drawings by those skilled in the art without undue effort.
FIG. 1 is a flow chart illustrating a method of communicating customization information to an unregistered user based on a device fingerprint, according to an embodiment of the present invention.
Fig. 2 is a schematic diagram illustrating a method of transmitting customized information to an unregistered user based on a device fingerprint according to an embodiment of the present invention.
Fig. 3 is a block diagram showing an apparatus for transmitting customized information to an unregistered user based on a device fingerprint according to an embodiment of the present invention.
Fig. 4 is a block diagram of an exemplary embodiment of an electronic device according to the present invention.
FIG. 5 is a schematic diagram of one embodiment of a computer readable medium of the present invention.
Detailed Description
Exemplary embodiments of the present invention will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments are shown, although the exemplary embodiments may be practiced in various specific ways. Rather, these exemplary embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the invention to those skilled in the art.
The structures, capabilities, effects, or other features described in a particular embodiment may be incorporated in one or more other embodiments in any suitable manner without departing from the spirit of the present invention.
In describing particular embodiments, specific details of construction, performance, effects, or other features are set forth in order to provide a thorough understanding of the embodiments by those skilled in the art. It is not excluded, however, that one skilled in the art may implement the present invention in a particular situation in a solution that does not include the structures, properties, effects, or other characteristics described above.
The flow diagrams in the figures are merely exemplary flow illustrations and do not represent that all of the elements, operations, and steps in the flow diagrams must be included in the aspects of the invention, nor that the steps must be performed in the order shown in the figures. For example, some operations/steps in the flowcharts may be decomposed, some operations/steps may be combined or partially combined, etc., and the order of execution shown in the flowcharts may be changed according to actual situations without departing from the gist of the present invention.
The block diagrams in the figures generally represent functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The same reference numerals in the drawings denote the same or similar elements, components or portions, and thus repeated descriptions of the same or similar elements, components or portions may be omitted hereinafter. It will be further understood that, although the terms first, second, third, etc. may be used herein to describe various devices, elements, components or portions, these devices, elements, components or portions should not be limited by these terms. That is, these phrases are merely intended to distinguish one from the other. For example, a first device may also be referred to as a second device without departing from the spirit of the invention. Furthermore, the term "and/or," "and/or" is meant to include all combinations of any one or more of the items listed.
FIG. 1 is a flow chart illustrating a method of communicating customization information to an unregistered user based on a device fingerprint, according to an embodiment of the present invention.
As shown in fig. 1, the method of the present invention first obtains device information of a client, and generates a device fingerprint according to the device information. The APP will obtain device related information according to the user protocol. The related information may be unique identification information for identifying the device, and the related information may be different for each device, for example, an IMEI of the device, an identification code, etc. The device may be a smart terminal, such as a smart phone, IPad, smart phone watch, etc. The APP may be a higher security APP, such as a financial APP, more specifically a bank APP, a security transaction APP, a mobile payment APP, etc. Most of such APPs have to log in to the user if the user is to use them.
And querying a device fingerprint database to obtain user information matched with the device fingerprint. Optionally, the APP forms a uniquely identified user device fingerprint by an encryption algorithm. The user equipment fingerprint will be stored in a remote server of the APP. The secret key can be placed in the signature file, and the secret key can be applied to the UID of the secret key to access the file, so that the security is high. The key may be encrypted with an asymmetric key, and the server may store a corresponding private key. The user device fingerprints formed are all different and only the APP can be identified.
When the user information matched with the device fingerprint is successfully acquired, custom information matched with the user information is generated or called according to the user information. Optionally, the client pre-stores a plurality of customization information; when the user information matched with the device fingerprint is successfully acquired, at least one of the prestored customized information is called according to the user information. In particular, the user information may be commercial public opinion customization information based on user requirements, which may be established according to different users. Preferably, when the user customization information needs to be expanded, firstly, a matrix data model is built based on the requirement of the user, then, the corresponding relation between the expandable matrix data model and the user is built, and matched customization information is obtained. User information can be updated in time by establishing the expandable matrix data model, so that the user requirements can be flexibly met, and the resource utilization rate is improved. When the user information matched with the device fingerprint is successfully acquired, at least one or more pieces of pre-stored customized information can be called according to the user information.
After a user logs in the device, binding user information and device fingerprints generated according to the device information. The APP records the binding relationship, and forms a one-to-one correspondence between a certain user and a certain device. When a user logs in the device for the first time, the APP automatically records the corresponding relation between the user information and the device fingerprint, and the corresponding relation is recorded in the device local and uploaded to a device fingerprint database of the server.
In the case that the user is not logged in (the user has not logged in on the device for the first time, or has logged out of the device), the APP can also acquire the device fingerprint of the current device, or generate the device fingerprint from the device information of the current device. Therefore, the APP matches the user information corresponding to the current equipment fingerprint through inquiring the binding relation recorded before on the server, takes the user information as the user information of the unregistered user, and carries out accurate marketing on the unregistered user. The user information may include user ID information, and may also include characteristic information such as user usage habits, browsing habits, which type of message is focused on, and the like.
Therefore, the APP can obtain the basic information of the user who uses the equipment at one time in the unregistered state of the user, and can push the estimated value message to carry out accurate marketing. And displaying the customized information on the client.
And when the user information matched with the device fingerprint is not successfully acquired, displaying default customized information on the client.
Meanwhile, the APP also detects user login operation on the client in real time, and when detecting the user login operation on the client, user information of a current login user is obtained; when the user information matched with the device fingerprint is successfully acquired, judging whether the acquired user information matched with the device fingerprint is consistent with the current logged-in user information or not; and when the acquired user information matched with the equipment fingerprint is inconsistent with the login user information, performing security verification.
One way of security verification is to send an alert to the phone number in the login user information, which is used to guide the user to confirm whether login is allowed on the client. Specifically, before the APP obtains information of the device according to a user protocol, the APP is opened, and is in an unregistered state by default. When the APP is installed on the equipment, the information of the equipment can be automatically acquired according to a user protocol. Normally, when the APP is first installed to the device, no user is logged in, and therefore, when the APP is first opened, the APP is defaulted to an unregistered state.
And detecting the confirmation information of the current user for the login operation on the client, if the confirmation information is detected, allowing the current user to login, and simultaneously updating the user information corresponding to the device fingerprint information of the client in the device fingerprint database into the user information of the current user.
Fig. 2 is a schematic diagram illustrating a method of transmitting customized information to an unregistered user based on a device fingerprint according to an embodiment of the present invention. In this embodiment, the customization information is marketing information, such as advertising pages, promotional campaign information, and the like. As shown in fig. 2, when the user logs in on the new device, the new device is triggered to log in the security verification mechanism, and the binding relationship between the user and the device fingerprint is updated after verification. And judging whether the fingerprint of the equipment is consistent with the original equipment of the user, and if so, not changing. If not, the short message reminds the user to log in on the new equipment, then the user continues to judge whether the operation is the operation of the user, if the operation is the operation of the user, the corresponding relation between the user and the fingerprint of the equipment is not considered, and if the operation is not the operation of the user, the user can freeze the account and modify the account through the short message link.
Optionally, judging whether the fingerprint of the equipment has a corresponding user, if so, matching the corresponding user information, and performing a precise marketing activity; if not, displaying a default page, wherein the default page is in a state that the user is not logged in. The APP has recorded the device information in the previous step, and when a certain user logs in to the device, the APP also records the binding relationship. Therefore, when judging whether the equipment has the corresponding user, the APP judges whether the user is the corresponding user according to the equipment information recorded before, and if so, the APP matches the corresponding user information to perform the accurate marketing activity. Optionally, when the APP is to perform the precise marketing campaign, the APP server sends the marketing message to the marketing campaign server first, and the marketing campaign server first determines whether the APP corresponding to the APP server has a registered mobile terminal, and returns a result to the APP server. The marketing campaign, if present, is filtered, processed, and then sent to the APP of the mobile terminal.
Optionally, judging whether the fingerprint of the device corresponds to the user, if not, displaying a default page, and executing user login. If the APP judges that the user is not the corresponding user, a default page is displayed, and the user can select to execute user login.
Those skilled in the art will appreciate that all or part of the steps implementing the above-described embodiments are implemented as a program, i.e., a computer program, executed by a data processing apparatus (including a computer). The above-described method provided by the present invention can be implemented when the computer program is executed. Moreover, the computer program may be stored in a computer readable storage medium, which may be a readable storage medium such as a magnetic disk, an optical disk, a ROM, a RAM, or a storage array composed of a plurality of storage media, for example, a magnetic disk or a tape storage array. The storage medium is not limited to a centralized storage, but may be a distributed storage, such as cloud storage based on cloud computing.
The following describes apparatus embodiments of the invention that may be used to perform method embodiments of the invention. Details described in the embodiments of the device according to the invention should be regarded as additions to the embodiments of the method described above; for details not disclosed in the embodiments of the device according to the invention, reference may be made to the above-described method embodiments.
Fig. 3 is a schematic block diagram of an apparatus for transmitting customized information to an unregistered user based on a device fingerprint according to the present invention, where, as shown in fig. 3, the apparatus includes an acquisition module, a query module, a matching module, and a display module.
The acquisition module is used for acquiring equipment information of the client and generating equipment fingerprints according to the equipment information. Specifically, the acquisition module acquires equipment information of the client and generates equipment fingerprints according to the equipment information. The APP will obtain device related information according to the user protocol. The relevant information may be unique identification information identifying the device, and may be different from device to device, such as an IMEI of the device, an identification code, etc. The device may be a smart terminal, such as a smart phone, IPad, etc. The APP may be a higher security APP, such as a financial APP, more specifically a bank APP, a security transaction APP, a mobile payment APP, etc. Most of such APPs have to log in to the user if the user is to use them.
And the query module is used for querying the equipment fingerprint database to acquire the user information matched with the equipment fingerprint. Specifically, a device fingerprint database is queried to obtain user information matched with the device fingerprint. Optionally, the APP forms a uniquely identified user device fingerprint by an encryption algorithm. The user equipment fingerprint will be stored in a remote server of the APP. The secret key can be placed in the signature file, and the secret key can be applied to the UID of the secret key to access the file, so that the security is high. The key may be encrypted with an asymmetric key, and the server may store a corresponding private key. The user device fingerprints formed are all different and only the APP can be identified.
Preferably, the query module sends a query instruction to a server configured with the device fingerprint database, and obtains a query result returned by the server.
And the matching module is used for generating or calling customized information matched with the user information according to the user information when the user information matched with the device fingerprint is successfully acquired. Preferably, the client pre-stores a plurality of customized information; and when the matching module successfully acquires the user information matched with the device fingerprint, at least one of the plurality of pre-stored customized information is called according to the user information. That is, when user information matching the device fingerprint is successfully acquired, customized information matching the user information is generated or called according to the user information. Optionally, the client pre-stores a plurality of customization information; when the user information matched with the device fingerprint is successfully acquired, at least one of the prestored customized information is called according to the user information. In particular, the user information may be commercial public opinion customization information based on user requirements, which may be established according to different users. Preferably, when the user customization information needs to be expanded, firstly, a matrix data model is built based on the requirement of the user, then, the corresponding relation between the expandable matrix data model and the user is built, and matched customization information is obtained. User information can be updated in time by establishing the expandable matrix data model, so that the user requirements can be flexibly met, and the resource utilization rate is improved. When the user information matched with the device fingerprint is successfully acquired, at least one or more pieces of pre-stored customized information can be called according to the user information.
After a user logs in the device, binding user information and device fingerprints generated according to the device information. The APP records the binding relationship, and forms a one-to-one correspondence between a certain user and a certain device. When a user logs in the device for the first time, the APP automatically records the corresponding relation between the user information and the device fingerprint, and the corresponding relation is recorded in the device local and uploaded to a device fingerprint database of the server.
In case the user is not logged in (the user logs in on the device for the first time, or has logged out of the device), the APP can also obtain the device fingerprint of the current device, or generate the device fingerprint from the device information of the current device. Therefore, the APP matches the user information corresponding to the current equipment fingerprint through inquiring the binding relation recorded before on the server, takes the user information as the user information of the unregistered user, and carries out accurate marketing on the unregistered user. The user information may include user ID information, and may also include characteristic information such as user usage habits, browsing habits, which type of message is focused on, and the like.
And the display module is used for displaying the customized information on the client. And when the user information matched with the device fingerprint is not successfully acquired, displaying default customized information on the client.
As a preferred embodiment, the device of the invention further comprises a detection module, a judgment module and a safety module.
The detection module is used for detecting user login operation on the client, and acquiring login user information when the user login operation on the client is detected. The specific detection module detects user login operation on the client in real time, and when the user login operation on the client is detected, user information of a current login user is obtained.
The judging module is used for judging whether the acquired user information matched with the equipment fingerprint is consistent with the login user information or not when the user information matched with the equipment fingerprint is successfully acquired. Specifically, when the user information matched with the device fingerprint is successfully obtained, judging whether the obtained user information matched with the device fingerprint is consistent with the currently logged-in user information or not; and when the acquired user information matched with the equipment fingerprint is inconsistent with the login user information, performing security verification.
And the security module is used for performing security verification when the acquired user information matched with the device fingerprint is inconsistent with the login user information.
Preferably, the security module sends an alert message to the telephone number in the login user information, the alert message being used to guide the user to confirm whether login is allowed on the client. . Specifically, before the APP obtains information of the device according to a user protocol, the APP is opened, and is in an unregistered state by default. When the APP is installed on the equipment, the information of the equipment can be automatically acquired according to a user protocol. Normally, when the APP is first installed to the device, no user is logged in, and therefore, when the APP is first opened, the APP is defaulted to an unregistered state.
Preferably, the security module further detects confirmation information of the current user for the login operation on the client, and if the confirmation information is detected, allows the current user to login, and updates the user information corresponding to the device fingerprint information of the client in the device fingerprint database to the user information of the current user.
It will be appreciated by those skilled in the art that the modules in the embodiments of the apparatus described above may be distributed in an apparatus as described, or may be distributed in one or more apparatuses different from the embodiments described above with corresponding changes. The modules of the above embodiments may be combined into one module, or may be further split into a plurality of sub-modules.
The following describes an embodiment of an electronic device of the present invention, which may be regarded as a physical form of implementation for the above-described embodiment of the method and apparatus of the present invention. Details described in relation to the embodiments of the electronic device of the present invention should be considered as additions to the embodiments of the method or apparatus described above; for details not disclosed in the embodiments of the electronic device of the present invention, reference may be made to the above-described method or apparatus embodiments.
Fig. 4 is a block diagram of an exemplary embodiment of an electronic device according to the present invention. The electronic device shown in fig. 4 is only an example and should not be construed as limiting the functionality and scope of use of the embodiments of the present invention.
As shown in fig. 4, the electronic device 310 of the exemplary embodiment is embodied in the form of a general-purpose data processing device. Components of electronic device 310 may include, but are not limited to: at least one processing unit 311, at least one memory unit 312, a bus 316 connecting the different system components (including the memory unit 312 and the processing unit 311), a display unit 313, etc.
The storage unit 312 stores a computer readable program, which may be a source program or code of a read only program. The program may be executed by the processing unit 311 such that the processing unit 210 performs the steps of the various embodiments of the present invention. For example, the processing unit 311 may perform the steps as shown in fig. 1.
The storage unit 312 may include a readable medium in the form of a volatile storage unit, such as a Random Access Memory (RAM) 3121 and/or a cache memory 3122, and may further include a Read Only Memory (ROM) 3123. The storage unit 312 may also include a program/utility 3124 having a set (at least one) of program modules 3125, such program modules 3125 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each or some combination of which may include an implementation of a network environment.
Bus 316 may be a bus representing one or more of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 310 may also be in communication with one or more external devices 320 (e.g., keyboard, display, network device, bluetooth device, etc.), such that a user can interact with the electronic device 310 via the external devices 320, and/or such that the electronic device 310 can communicate with one or more other data processing devices (e.g., router, modem, etc.). Such communication may occur via an input/output (I/O) interface 314, and may also occur via a network adapter 315 to one or more networks, such as a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet. The network adapter 315 may communicate with other modules of the electronic device 310 via the bus 316. It should be appreciated that although not shown, other hardware and/or software modules may be used in electronic device 310, including, but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, data backup storage systems, and the like.
FIG. 5 is a schematic diagram of one embodiment of a computer readable medium of the present invention. As shown in fig. 5, the computer program may be stored on one or more computer readable media. The computer readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), optical fiber, portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer program, when executed by one or more data processing devices, enables the computer readable medium to carry out the above-described method of the present invention, namely: a method, apparatus, electronic device and corresponding computer readable medium for transmitting customized information to an unregistered user based on a device fingerprint. The method comprises the following steps: querying an equipment fingerprint database to obtain user information matched with the equipment fingerprint; when the user information matched with the device fingerprint is successfully acquired, generating or calling customized information matched with the user information according to the user information; and displaying the customized information on the client. Therefore, the invention can realize that the APP judges the user information through the equipment fingerprint under the state that the user does not log in the APP, transmits the constant value information and carries out accurate marketing on the user. The process that the user logs in the APP and the APP can identify the user information is omitted. Especially, the APP in the financial field is activated and operated only after the user logs in the APP. And when a user logs in the new equipment, whether the user operates the equipment or not can be judged, so that the safety is ensured, and the problem of improving the accurate marketing rate and the user persistence rate is solved. From the above description of embodiments, those skilled in the art will readily appreciate that the exemplary embodiments described herein may be implemented in software, or may be implemented in software in combination with necessary hardware. Thus, the technical solution according to the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a computer readable storage medium (may be a CD-ROM, a usb disk, a mobile hard disk, etc.) or on a network, comprising several instructions to cause a data processing device (may be a personal computer, a server, or a network device, etc.) to perform the above-described method according to the present invention.
The computer readable storage medium may include a data signal propagated in baseband or as part of a carrier wave, with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable storage medium may also be any readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
In summary, the present invention may be implemented in a method, apparatus, electronic device, or computer readable medium that executes a computer program. Some or all of the functions of the present invention may be implemented in practice using a general purpose data processing device such as a microprocessor or Digital Signal Processor (DSP).
The above-described specific embodiments further describe the objects, technical solutions and advantageous effects of the present invention in detail, and it should be understood that the present invention is not inherently related to any particular computer, virtual device or electronic apparatus, and various general-purpose devices may also implement the present invention. The foregoing description of the embodiments of the invention is not intended to be limiting, but rather is intended to cover all modifications, equivalents, alternatives, and improvements that fall within the spirit and scope of the invention.
Claims (16)
1. A method of communicating customized information to an unregistered user based on a device fingerprint, comprising the steps of:
acquiring equipment information of a client, and generating a uniquely identified equipment fingerprint through an encryption algorithm according to the equipment information; when a user logs in the device, binding the user information and the device fingerprint generated according to the device information to form a one-to-one correspondence between the user and the device, and when the user logs in the device for the first time
When the device is in use, the APP automatically records the corresponding relation between the user information and the device fingerprint, and records the corresponding relation in the device local and uploads the corresponding relation to the device fingerprint database of the server; acquiring the device fingerprint of the current device under the condition that the user does not log in the device, or generating the device fingerprint according to the device information of the current device;
inquiring a binding relation recorded on a device fingerprint database to obtain user information matched with the device fingerprint;
when the user information matched with the device fingerprint is successfully acquired, generating or calling customized information matched with the user information according to the user information; when the user customization information needs to be expanded, a matrix data model is built based on the requirements of the user, and the corresponding relation between the expandable matrix data model and the user is built to obtain matched customization information;
and displaying the customized information on the client.
2. The method for communicating customized information to an unregistered user based on a device fingerprint of claim 1, wherein:
the step of obtaining the user information matched with the device fingerprint by inquiring the binding relation recorded on the device fingerprint database comprises the following steps: and the client sends a query instruction to a server configured with the equipment fingerprint database and receives a query result returned by the server.
3. The method for communicating customized information to an unregistered user based on a device fingerprint of claim 1, wherein:
the client pre-stores a plurality of customized information;
and when the user information matched with the device fingerprint is successfully acquired, at least one of the custom information is called according to the user information.
4. The method for communicating customized information to an unregistered user based on a device fingerprint of claim 1, further comprising:
and when the user information matched with the device fingerprint is not successfully acquired, displaying default customized information on the client.
5. The method for communicating customized information to an unregistered user based on a device fingerprint of claim 1, further comprising:
detecting user login operation on a client, and acquiring login user information when the user login operation on the client is detected;
when the user information matched with the device fingerprint is successfully acquired, judging whether the acquired user information matched with the device fingerprint is consistent with the login user information or not;
and when the acquired user information matched with the equipment fingerprint is inconsistent with the login user information, performing security verification.
6. The method for communicating customized information to an unregistered user based on a device fingerprint of claim 5, wherein the security verification includes:
and sending alarm information to the telephone number in the login user information, wherein the alarm information is used for guiding the user to confirm whether login on the client is allowed or not.
7. The method for communicating customized information to an unregistered user based on a device fingerprint of claim 6, wherein the security verification further comprises:
and detecting the confirmation information of the current user for the login operation on the client, and if the confirmation information is detected, allowing the current user to login, and simultaneously updating the user information corresponding to the device fingerprint information of the client in the device fingerprint database into the user information of the current user.
8. An apparatus for communicating customized information to an unregistered user based on a device fingerprint, comprising:
the acquisition module is used for acquiring the equipment information of the client and generating a uniquely identified equipment fingerprint through an encryption algorithm according to the equipment information; when a user logs in the device, binding user information and device fingerprints generated according to the device information to form a one-to-one correspondence between the user and the device, and when the user logs in the device for the first time, automatically recording the correspondence between the user information and the device fingerprints by the APP, and recording the correspondence between the user information and the device fingerprints locally on the device and uploading the correspondence to a device fingerprint database of a server; acquiring the device fingerprint of the current device under the condition that the user does not log in the device, or generating the device fingerprint according to the device information of the current device;
the query module is used for acquiring user information matched with the equipment fingerprint by querying the binding relation recorded on the equipment fingerprint database;
the matching module is used for generating or calling customized information matched with the user information according to the user information when the user information matched with the device fingerprint is successfully acquired; when the user customization information needs to be expanded, a matrix data model is built based on the requirements of the user, and the corresponding relation between the expandable matrix data model and the user is built to obtain matched customization information;
and the display module is used for displaying the customized information on the client.
9. The apparatus for communicating customized information to an unregistered user based on a device fingerprint as recited in claim 8, wherein:
the query module is used for: and sending a query instruction to a server configured with the device fingerprint database, and acquiring a query result returned by the server.
10. The apparatus for communicating customized information to an unregistered user based on a device fingerprint as recited in claim 8, wherein:
the client pre-stores a plurality of customized information;
the matching module is used for: and when the user information matched with the device fingerprint is successfully acquired, at least one of the custom information is called according to the user information.
11. The apparatus for communicating customized information to an unregistered user based on a device fingerprint of claim 8, wherein the presentation module is further configured to:
and when the user information matched with the device fingerprint is not successfully acquired, displaying default customized information on the client.
12. The apparatus for communicating customized information to an unregistered user based on a device fingerprint of claim 8, further comprising:
the detection module is used for detecting user login operation on the client, and acquiring login user information when the user login operation on the client is detected;
the judging module is used for judging whether the acquired user information matched with the equipment fingerprint is consistent with the login user information or not when the user information matched with the equipment fingerprint is successfully acquired;
and the security module is used for performing security verification when the acquired user information matched with the equipment fingerprint is inconsistent with the login user information.
13. The apparatus for communicating customized information to an unregistered user based on a device fingerprint of claim 12, wherein the security module is further configured to:
and sending alarm information to the telephone number in the login user information, wherein the alarm information is used for guiding the user to confirm whether login on the client is allowed or not.
14. The apparatus for communicating customized information to an unregistered user based on a device fingerprint of claim 13, wherein the security module is further configured to:
and detecting the confirmation information of the current user for the login operation on the client, and if the confirmation information is detected, allowing the current user to login, and simultaneously updating the user information corresponding to the device fingerprint information of the client in the device fingerprint database into the user information of the current user.
15. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 7 when the program is executed by the processor.
16. A computer readable storage medium having stored thereon a computer program executable by a processor to implement the method of any of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911271452.2A CN111177536B (en) | 2019-12-12 | 2019-12-12 | Method and device for transmitting customized information to unregistered user based on device fingerprint and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911271452.2A CN111177536B (en) | 2019-12-12 | 2019-12-12 | Method and device for transmitting customized information to unregistered user based on device fingerprint and electronic device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111177536A CN111177536A (en) | 2020-05-19 |
CN111177536B true CN111177536B (en) | 2023-12-26 |
Family
ID=70657154
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911271452.2A Active CN111177536B (en) | 2019-12-12 | 2019-12-12 | Method and device for transmitting customized information to unregistered user based on device fingerprint and electronic device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111177536B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112182665B (en) * | 2020-09-22 | 2022-03-29 | 深圳竹云科技有限公司 | Equipment ID generation method, equipment binding method and device and computing equipment |
CN112786152A (en) * | 2021-01-21 | 2021-05-11 | 安徽华米信息科技有限公司 | Data processing method of wearable device and wearable device |
CN113486315A (en) * | 2021-06-07 | 2021-10-08 | 广发银行股份有限公司 | User login verification method, system and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103297404A (en) * | 2012-03-01 | 2013-09-11 | 盛大计算机(上海)有限公司 | Method, device and system for achieving login confirmation |
EP2966586A1 (en) * | 2014-07-11 | 2016-01-13 | Patents Factory Ltd. Sp. z o.o. | System and method for managing application passwords |
CN106775742A (en) * | 2016-12-27 | 2017-05-31 | 中国建设银行股份有限公司 | The extended method and system of a kind of user customized information |
CN107979521A (en) * | 2016-10-24 | 2018-05-01 | 广州市动景计算机科技有限公司 | Pushed information method for customizing and device |
CN108712435A (en) * | 2018-05-25 | 2018-10-26 | 四川斐讯信息技术有限公司 | A kind of verification system and method for login application program |
CN109657434A (en) * | 2018-12-18 | 2019-04-19 | 浙江口碑网络技术有限公司 | Application access method and device |
CN109978607A (en) * | 2019-03-05 | 2019-07-05 | 平安科技(深圳)有限公司 | Advertisement recommended method, device and computer readable storage medium |
CN110061984A (en) * | 2019-04-12 | 2019-07-26 | 广州小鹏汽车科技有限公司 | Account switching method, onboard system and the vehicle of onboard system |
CN110363577A (en) * | 2019-06-27 | 2019-10-22 | 上海淇馥信息技术有限公司 | Resource-niche methods of exhibiting, device and electronic equipment based on User Status |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7464342B2 (en) * | 2006-02-28 | 2008-12-09 | Microsoft Corporation | Customizable service provider user interface |
WO2012150602A1 (en) * | 2011-05-03 | 2012-11-08 | Yogesh Chunilal Rathod | A system and method for dynamically monitoring, recording, processing, attaching dynamic, contextual & accessible active links & presenting of physical or digital activities, actions, locations, logs, life stream, behavior & status |
US10178166B2 (en) * | 2014-12-08 | 2019-01-08 | Ebay Inc. | Delivering personalized content to authenticated user devices |
US10992669B2 (en) * | 2015-04-28 | 2021-04-27 | Hewlett-Packard Development Company, L.P. | Acquisition of a device fingerprint from an instance of a client application |
US10108733B2 (en) * | 2016-05-26 | 2018-10-23 | Salesforce.Com, Inc. | Methods and systems for providing customized web pages to users of a website |
-
2019
- 2019-12-12 CN CN201911271452.2A patent/CN111177536B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103297404A (en) * | 2012-03-01 | 2013-09-11 | 盛大计算机(上海)有限公司 | Method, device and system for achieving login confirmation |
EP2966586A1 (en) * | 2014-07-11 | 2016-01-13 | Patents Factory Ltd. Sp. z o.o. | System and method for managing application passwords |
CN107979521A (en) * | 2016-10-24 | 2018-05-01 | 广州市动景计算机科技有限公司 | Pushed information method for customizing and device |
CN106775742A (en) * | 2016-12-27 | 2017-05-31 | 中国建设银行股份有限公司 | The extended method and system of a kind of user customized information |
CN108712435A (en) * | 2018-05-25 | 2018-10-26 | 四川斐讯信息技术有限公司 | A kind of verification system and method for login application program |
CN109657434A (en) * | 2018-12-18 | 2019-04-19 | 浙江口碑网络技术有限公司 | Application access method and device |
CN109978607A (en) * | 2019-03-05 | 2019-07-05 | 平安科技(深圳)有限公司 | Advertisement recommended method, device and computer readable storage medium |
CN110061984A (en) * | 2019-04-12 | 2019-07-26 | 广州小鹏汽车科技有限公司 | Account switching method, onboard system and the vehicle of onboard system |
CN110363577A (en) * | 2019-06-27 | 2019-10-22 | 上海淇馥信息技术有限公司 | Resource-niche methods of exhibiting, device and electronic equipment based on User Status |
Also Published As
Publication number | Publication date |
---|---|
CN111177536A (en) | 2020-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109558748B (en) | Data processing method and device, electronic equipment and storage medium | |
CN111177536B (en) | Method and device for transmitting customized information to unregistered user based on device fingerprint and electronic device | |
US9763100B2 (en) | Instant messaging message processing method and device and storage medium | |
KR102107560B1 (en) | Method, device, terminal, and server for verifying security of service operation | |
JP2019502192A (en) | Method and device for application information risk management | |
CN102306256A (en) | The file that obtains is carried out the prestige inspection | |
CN109995523B (en) | Activation code management method and device and activation code generation method and device | |
CN107634947A (en) | Limitation malice logs in or the method and apparatus of registration | |
CN106030527B (en) | By the system and method for application notification user available for download | |
CN109947408A (en) | Information push method and device, storage medium and electronic equipment | |
CN114598671B (en) | Session message processing method, device, storage medium and electronic equipment | |
CN111259382A (en) | Malicious behavior identification method, device and system and storage medium | |
US20190020635A1 (en) | System and method for encrypting a data alert | |
CN105224870A (en) | Suspected virus applies the method and apparatus uploaded | |
CN108737350B (en) | Information processing method and client | |
CN114978749A (en) | Login authentication method and system, storage medium and electronic equipment | |
US9424552B2 (en) | Managing website registrations | |
CN113297479B (en) | User portrait generation method and device and electronic equipment | |
CN112348661B (en) | Service policy distribution method and device based on user behavior track and electronic equipment | |
US10171486B2 (en) | Security and authentication daisy chain analysis and warning system | |
CN114282940A (en) | Method and apparatus for intention recognition, storage medium, and electronic device | |
Liu et al. | On the data privacy practices of Android OEMs | |
CN114428737A (en) | Communication method, device, equipment and storage medium based on micro service system | |
CN114301713A (en) | Risk access detection model training method, risk access detection method and risk access detection device | |
CN113783828A (en) | Business system monitoring method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |