CN111263345B - User terminal identification method and device - Google Patents

User terminal identification method and device Download PDF

Info

Publication number
CN111263345B
CN111263345B CN201811452478.2A CN201811452478A CN111263345B CN 111263345 B CN111263345 B CN 111263345B CN 201811452478 A CN201811452478 A CN 201811452478A CN 111263345 B CN111263345 B CN 111263345B
Authority
CN
China
Prior art keywords
terminal
user terminal
user
information
type information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811452478.2A
Other languages
Chinese (zh)
Other versions
CN111263345A (en
Inventor
吕传祝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Shandong Co Ltd
Original Assignee
China Mobile Group Shandong Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Shandong Co Ltd filed Critical China Mobile Group Shandong Co Ltd
Priority to CN201811452478.2A priority Critical patent/CN111263345B/en
Publication of CN111263345A publication Critical patent/CN111263345A/en
Application granted granted Critical
Publication of CN111263345B publication Critical patent/CN111263345B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/005Discovery of network devices, e.g. terminals
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W88/00Devices specially adapted for wireless communication networks, e.g. terminals, base stations or access point devices
    • H04W88/02Terminal devices
    • H04W88/04Terminal devices adapted for relaying to or from another terminal or user

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention provides a method and a device for identifying a user terminal. The method comprises the steps of obtaining a user agent UA identifier included in a log of surfing the Internet of a user terminal; the UA identifier comprises terminal type information, model type information and an operating system version number; and judging whether the user terminal is a provider of the shared flow or not according to a preset rule and the UA identifier. According to the user terminal identification method provided by the embodiment of the invention, the number of the terminals used by the user in surfing the Internet is identified through the UA information of the 4G Internet log, whether the user opens a hot spot is further judged, and the problem that in the prior art, the judgment is inaccurate when the terminal of the user using the shared flow is a non-mobile phone terminal such as a computer terminal is solved.

Description

User terminal identification method and device
Technical Field
The embodiment of the invention relates to the technical field of mobile communication, in particular to a method and a device for identifying a user terminal.
Background
With the popularization of 4G services, 4G has become the first choice for mobile internet access. In general, the office environment of a family or a unit has broadband internet access, so that a plurality of users switch to a shared hotspot for internet access. However, because some users move home and the like, the positions of the users are not provided with broadband and the like, and some users order large-flow packages, the mobile phones of the users are set as sharing hotspots, and the users can conveniently use the sharing hotspots to surf the internet.
How to accurately identify the users who open the shared traffic and the users who use the shared traffic, and how to perform targeted marketing on the users who use the shared traffic are the problems facing the current telecom operators to be solved urgently.
Disclosure of Invention
Aiming at the technical problems in the prior art, the embodiment of the invention provides a method and a device for identifying a user terminal.
In a first aspect, an embodiment of the present invention provides a method for identifying a user terminal, including:
acquiring a user agent UA identifier included in an internet log of a user terminal; the UA identifier comprises terminal type information, model type information and an operating system version number;
and judging whether the user terminal is a provider of the shared flow according to a preset rule and the UA identifier.
In a second aspect, an embodiment of the present invention provides an apparatus for identifying a user terminal, including:
the first processing module is used for acquiring a user agent UA identifier included in an internet log of a user terminal; the UA identifier comprises terminal type information, model type information and an operating system version number;
and the second processing module is used for judging whether the user terminal is a provider of the shared flow according to a preset rule and the UA identifier.
In a third aspect, an embodiment of the present invention provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the steps of the method as provided in the first aspect are implemented.
In a fourth aspect, an embodiment of the present invention provides a non-transitory computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements the steps of the method as provided in the first aspect.
According to the method and the device for identifying the user terminal, provided by the embodiment of the invention, the number of the terminals used by the user in surfing the Internet is identified through the UA information of the 4G Internet log, whether the user opens a hot spot is further judged, and the problem that the judgment is inaccurate when the terminal using the shared flow is a non-mobile phone terminal such as a computer terminal in the prior art is solved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic flow chart of an identification method of a user terminal according to an embodiment of the present invention;
fig. 2 is a schematic diagram illustrating an identification apparatus of a ue according to an embodiment of the present invention;
fig. 3 is a schematic physical structure diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without inventive step based on the embodiments of the present invention, are within the scope of protection of the present invention.
The telecommunication industry faces the pressure of increased competition, slow income increase and reduced input-output rate, and needs to continuously dig the use habits of customers to carry out targeted marketing. At present, a user who opens a hot spot (i.e., a provider of shared traffic) is still a huge customer group, and people around the user do not order a large amount of packages yet, so that it is an important subject how to accurately identify the user by logging on a network using the shared traffic of the user, and to develop sales promotion for 4G, broadband, new services, and the like in combination with the time and place when the user opens the hot spot, and the circle of contact of the user.
Fig. 1 is a schematic flow chart of an identification method of a user terminal according to an embodiment of the present invention, as shown in fig. 1, the method includes the following steps:
step 100, obtaining a user agent UA identifier included in an internet log of a user terminal; the UA identifier comprises terminal type information, model type information and an operating system version number;
step 101, judging whether the user terminal is a provider of the shared flow according to a preset rule and the UA identifier.
The embodiment of the method can judge the user who opens the hot spot and the equipment which hangs down based on the 4G internet log. Specifically, the UA (user agent) chinese name is a user agent, which is a part of Http protocol, and it is a special string header, and its standard format is: browser identification (operating system identification; encryption level identification; browser language) the rendering engine identifies version information, such as: mozilla/5.0 (Macintosh; U; intel MacOSX10_6 _8en-us) AppleWebKit/534.50 (KHTML, likeGecko) Version/5.1Safari/534.50. Often, the website sends different pages to different operating systems and different browsers by determining the type of the UA identifier, for example: different pages can be displayed when the mobile phone and the computer are respectively used for accessing hundreds of degrees. For compatibility and promotion purposes, many manufacturers will use the same browser id, for example: mozilla. The mobile phone is provided with the UA, mainstream mobile phone manufacturers generally name the UA according to the standard format, and at this time, the UA can be simply considered as mobile phone system description information of a user, and the brand type of the mobile phone of the user can be known through the UA identification.
Mainstream mobile phone manufacturers generally have respective unique UA identifiers, such as iPone, MI, and Vivo, and websites can show different pages to users accordingly, although UA is named completely according to the standard, sometimes all pages cannot be completely compatible, so that part of pages cannot be normally displayed in a browser, and at this time, a universal UA identifier has to be set by disguising, so as to achieve the purpose of deceiving a server to normally display a web page. Judging whether the user opens the hot spot, wherein the used user is a user 4G mobile phone internet log, the internet log comprises fields such as UA identification and the like, and the above introduction shows that since the UA identification comprises an operating system mark of the user terminal, if a plurality of different UA identifications appear in the user internet log, the user can be presumed to open the hot spot and share the flow for other terminals to use.
Whether the hotspot is opened is judged through the user internet log, and then the necessary premise is that the user or a terminal connected with the user has other internet surfing behaviors of generating traffic such as using WeChat or browsing a webpage, and the model of the user terminal and the model of the terminal connected with the hotspot of the user cannot be completely the same. After the foregoing conditions are satisfied, the UA identifier of the user may be screened from the log of surfing the internet, and the information beginning with Mozilla is mainly used, for example: mozilla/5.0 (Linux; android 7.0, U, PRO 7 Plus Build/NRD90M; en-us; wv) AppleWebKit/537.36 (KHTML, like Gecko) Version/4.0Chrome/48.0.2564.116 Mobile Safari/537.36, then intercepts the operating system identification, encryption level identification and browser language, i.e. "Linux"; 7.0 of Android; u; PRO 7 Plus Build/NRD90M; en _ us; wv ", removing encryption information, browser language and version information inside the operating system, and finally obtaining a character string Linux containing terminal type information, model type information and operating system version number; android 7.0; PRO 7 Plus ", which compares it with other UA identifiers in the log, and if different terminal type information, model type information and os version number are present, it can be presumed that the user may open a hotspot.
In this embodiment of the present invention, determining whether the ue is a provider of shared traffic according to a preset rule and the UA identifier may include:
if the user agent UA identifier included in the user terminal Internet log includes a second UA identifier corresponding to a non-mobile phone terminal, determining that the user terminal is a provider of shared flow; the terminal type in the second UA identifier is used for indicating that a corresponding terminal is a non-mobile phone terminal;
if the UA identification of the user agent included in the log of the user terminal surfing the internet comprises UA identifications corresponding to two mobile phone terminals, determining that the user terminal is a provider of shared flow; the UA identifiers corresponding to the two mobile phone terminals comprise different model type information and/or different operating system version numbers, and the terminal type information is the same.
Some terminals adopt a means of pretending UA in order to be compatible with web pages and normally display the web pages, so that the terminal obtained from the pretended UA is called a pseudo terminal, and the pseudo terminal needs to be removed from the obtained terminal, otherwise, the judgment of a final result is influenced. In addition, non-independent internet access terminals such as a computer, a tablet computer and a bracelet are required to be identified in the terminals, because the terminals cannot directly access the network through the SIM card, if the terminals appear in the internet access log of the user, the user inevitably opens a hot spot. If the non-independent internet access terminal does not appear in the user internet log, but a plurality of different mobile phone terminals exist, the fact that the user opens the hot spot is also indicated. When the internet log includes two UA identifiers, one is a UA identifier of the local user terminal, and the other is a UA identifier of another terminal, and when the terminal type information in the two UA identifiers is the same, it indicates that both are mobile phone terminals, at this time, it needs to be further determined whether the model type information in the second UA identifier is the same as the model type information in the local UA identifier, and if the model type information is different, it indicates that both are not mobile phone products of the same model, for example, one is hua as P20, and the other is vivo R7. At this point it may be determined that the user terminal is the provider of the shared traffic. However, if the model type information is the same, it indicates that all the mobile phone products are of the same model, for example, all the mobile phone products are P20. At this time, whether the operating system version numbers of the two are the same needs to be judged, if the operating system version numbers are different, it is indicated that the two mobile phones are both mobile phone products of the same model, for example, the mobile phones are both P20, but the two mobile phones can be determined to be two independent terminals due to the operating system version numbers. At this time, it may be determined that the user terminal is the provider of the shared traffic.
And by analogy, forming the terminal type details of the user on the Internet. After the user terminal is determined to be a provider of the shared traffic, a terminal information array corresponding to a user of the shared traffic can be acquired, wherein the terminal information comprises terminal type information and model type information.
User' s Terminal information Base station cell Type of model Terminal type Time of surfing Internet
User1 Term1 Lac/cell Millet Computer with a display
User1 Term2 Huawei Pad ..
User2… Term1 Mobile phone
User2… Term2
Usern… Term1..n
For example, user1 is a provider of shared traffic, and Term1 and Term2 are recipients of the shared traffic.
On the basis of the above embodiment, the method embodiment may further combine the user terminal information and the circle of contact information to form a user group detail using the shared traffic. Specifically, the method comprises:
acquiring user terminal information of a traffic circle user terminal of the user terminal within a preset time period, matching the user terminal information of the traffic circle user terminal with terminal information corresponding to an enjoying party sharing traffic, and marking the successfully matched traffic circle user terminal as a suspicious user terminal; the user terminal information comprises terminal type information and model type information. Specifically, the users (including the home network and the heterogeneous network) in the circle of contact user group of the user in the last month are firstly obtained, the terminal information of the users is obtained and matched with the terminal information array accessing the shared flow, and if the terminal information is matched, the users are marked as suspicious users.
Further, if the number of the suspicious user terminals is 1, the user terminal of the circle of contact marked as the suspicious user terminal is determined as the target user terminal. And after the users are marked as suspicious users, cleaning the part of users, and if the number of matched terminals is only 1, marking the users using the shared flow as target user terminals. And if the number of the suspicious user terminals is more than 1, determining the user terminals of the circle of contact marked as the suspicious user terminals which are not subscribed with the large-flow packets as the target user terminals. If the number of the matching terminals is multiple, judging whether the suspicious user orders a large-flow package, and if so, excluding the suspicious user; and if the large-flow package is not ordered, determining the target user terminal.
The relevant information forming the users using shared traffic is shown in the following table.
Figure BDA0001887005690000061
After the target user terminal is determined, the method and the system can also be used for network optimization and marketing by combining the user portrait. And pushing marketing information according to the information, wherein the pushing strategy mainly comprises pushing according to the type of the shared terminal and further accurately pushing according to the shared information, and comprises the following steps:
and if the terminal type of the target user terminal is judged and acquired according to the terminal type information, sending broadband push information to the target user terminal. For example, if the terminal enjoying the shared traffic is a computer or a PAD, broadband marketing information push is performed.
The method can also comprise the following steps: acquiring the time of the user terminal for traffic sharing according to the internet log, and acquiring the position of the user terminal for traffic sharing according to the cell information of the base station where the user terminal is located; correspondingly, the sending of the broadband push information to the target user terminal specifically includes: and sending broadband push information to the target user terminal according to the time and the position. In the embodiment of the method, the scene of the user shared flow can be further finely divided into office places or places with rest and frequent residence according to the determined shared time and position so as to push reasonable broadband packages. The sharing time can be obtained from the log of surfing the internet, and the position information can be determined by combining the latitude and longitude information of the base station.
In the embodiment of the method, if the terminal type of the target user terminal is judged and known to be the mobile phone terminal according to the terminal type information, the mobile phone package push information is sent to the target user terminal. For example, if the terminal enjoying the shared traffic is a mobile phone, the mobile phone package marketing information is pushed. Meanwhile, the tendency of the user to continue to share the flow in the later period can be accurately identified according to whether the terminal enjoying the flow sharing belongs to the circle of friends of the user, so that the flow can be further accurately pushed.
According to the user terminal identification method provided by the embodiment of the invention, the number of terminals used by the user in surfing the Internet is identified through the UA information of the 4G Internet log, whether the user opens a hot spot is further judged, and the problem that judgment is inaccurate when the user terminal using the shared flow is a non-mobile phone terminal such as a computer terminal in the prior art is solved. Meanwhile, the marketing information category is reasonably determined according to the type of the terminal used for surfing the Internet; through the log of surfing the Internet, the conditions of the time of opening the hot spot, the position of the base station cell where the user is located, the user using the shared flow and the like are further analyzed, a data base is provided for subsequent broad marketing/terminal marketing of the user, package marketing of the family, strategy marketing and the like, and the success rate of marketing is improved.
Fig. 2 is a schematic diagram of an identification apparatus of a user terminal according to an embodiment of the present invention, and as shown in fig. 2, the apparatus includes a first processing module 201 and a second processing module 202, where:
the first processing module 201 is configured to obtain a user agent UA identifier included in an internet log of a user terminal; the UA identifier comprises terminal type information, model type information and an operating system version number; the second processing module 202 is configured to determine whether the user terminal is a provider of shared traffic according to a preset rule and the UA identifier.
The embodiment of the apparatus may be specifically configured to execute the embodiment of the method, and specific functions are described in the embodiment of the method for details, which are not described herein again.
The identification device of the user terminal provided by the embodiment of the invention identifies the terminal number used in the user surfing the Internet through the UA information of the 4G surfing log, further judges whether the user opens a hot spot, and solves the problem that the judgment is inaccurate when the terminal using the shared flow is a non-mobile phone terminal such as a computer terminal in the prior art.
Fig. 3 is a schematic entity structure diagram of an electronic device according to an embodiment of the present invention, and as shown in fig. 3, the electronic device may include: a processor (processor) 310, a communication Interface (communication Interface) 320, a memory (memory) 330 and a communication bus 340, wherein the processor 310, the communication Interface 320 and the memory 330 communicate with each other via the communication bus 340. The processor 310 may invoke a computer program stored on the memory 330 and executable on the processor 310 to perform the methods provided by the various embodiments described above, including, for example: acquiring a user agent UA identifier included in an internet log of a user terminal; the UA identifier comprises terminal type information, model type information and an operating system version number; and judging whether the user terminal is a provider of the shared flow or not according to a preset rule and the UA identifier.
In addition, the logic instructions in the memory 330 may be implemented in the form of software functional units and stored in a computer readable storage medium when the logic instructions are sold or used as independent products. Based on such understanding, the technical solutions of the embodiments of the present invention may be essentially implemented or make a contribution to the prior art, or may be implemented in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the methods described in the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk, and various media capable of storing program codes.
Embodiments of the present invention further provide a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is implemented to perform the method provided in the foregoing embodiments when executed by a processor, and the method includes: acquiring a user agent UA identifier included in an internet log of a user terminal; the UA identifier comprises terminal type information, model type information and an operating system version number; and judging whether the user terminal is a provider of the shared flow according to a preset rule and the UA identifier.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment may be implemented by software plus a necessary general hardware platform, and may also be implemented by hardware. Based on the understanding, the above technical solutions substantially or otherwise contributing to the prior art may be embodied in the form of a software product, which may be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the method according to the various embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (8)

1. A method for identifying a user terminal, comprising:
acquiring a user agent UA identifier included in an internet log of a user terminal; the UA identifier comprises terminal type information, model type information and an operating system version number;
judging whether the user terminal is a provider of the shared flow or not according to a preset rule and the UA identifier;
after determining that the user terminal is a provider of shared traffic, the method further comprises:
acquiring terminal information corresponding to an enjoying party sharing flow, wherein the terminal information comprises terminal type information and model type information;
acquiring user terminal information of a traffic circle user terminal of the user terminal within a preset time period, matching the user terminal information of the traffic circle user terminal with terminal information corresponding to an enjoying party sharing traffic, and marking the successfully matched traffic circle user terminal as a suspicious user terminal; the user terminal information comprises terminal type information and model type information;
if the number of the suspicious user terminals is 1, determining the user terminals marked as the contact circle of the suspicious user terminals as target user terminals;
and if the number of the suspicious user terminals is more than 1, determining the user terminals of the circle of contact marked as the suspicious user terminals which do not subscribe the large-flow packets as target user terminals.
2. The method according to claim 1, wherein said determining whether the ue is a provider of shared traffic according to a preset rule and the UA identifier comprises:
if the user agent UA identifier included in the user terminal Internet log includes a second UA identifier corresponding to a non-mobile phone terminal, determining that the user terminal is a provider of shared flow; the terminal type in the second UA identifier is used for indicating that a corresponding terminal is a non-mobile phone terminal;
if the UA identification of the user agent included in the log of the user terminal surfing the internet comprises UA identifications corresponding to two mobile phone terminals, determining that the user terminal is a provider of shared flow; the UA identifiers corresponding to the two mobile phone terminals comprise different model type information and/or different operating system version numbers, and the terminal type information is the same.
3. The method of claim 1, further comprising:
and if the terminal type of the target user terminal is judged and acquired according to the terminal type information, sending broadband push information to the target user terminal.
4. The method of claim 3, further comprising:
acquiring the time of the user terminal for traffic sharing according to the internet log, and acquiring the position of the user terminal for traffic sharing according to the cell information of the base station where the user terminal is located;
correspondingly, the sending of the broadband push information to the target user terminal specifically includes:
and sending broadband push information to the target user terminal according to the time and the position.
5. The method of claim 1, further comprising:
and if the terminal type of the target user terminal is judged and acquired according to the terminal type information, sending mobile phone package push information to the target user terminal.
6. An apparatus for identifying a user terminal, comprising:
the first processing module is used for acquiring a user agent UA identifier included in an internet log of a user terminal; the UA identifier comprises terminal type information, model type information and an operating system version number;
the second processing module is used for judging whether the user terminal is a provider of the shared flow according to a preset rule and the UA identifier;
after determining that the user terminal is a provider of shared traffic, the identifying device is further configured to:
acquiring terminal information corresponding to an enjoying party sharing flow, wherein the terminal information comprises terminal type information and model type information;
acquiring user terminal information of a traffic circle user terminal of the user terminal within a preset time period, matching the user terminal information of the traffic circle user terminal with terminal information corresponding to an enjoying party sharing traffic, and marking the successfully matched traffic circle user terminal as a suspicious user terminal; the user terminal information comprises terminal type information and model type information;
if the number of the suspicious user terminals is 1, determining the user terminals marked as the interaction circle of the suspicious user terminals as target user terminals;
and if the number of the suspicious user terminals is more than 1, determining the user terminals of the circle of contact marked as the suspicious user terminals which are not subscribed with the large-flow packets as the target user terminals.
7. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method according to any of claims 1 to 5 are implemented when the processor executes the program.
8. A non-transitory computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 5.
CN201811452478.2A 2018-11-30 2018-11-30 User terminal identification method and device Active CN111263345B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811452478.2A CN111263345B (en) 2018-11-30 2018-11-30 User terminal identification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811452478.2A CN111263345B (en) 2018-11-30 2018-11-30 User terminal identification method and device

Publications (2)

Publication Number Publication Date
CN111263345A CN111263345A (en) 2020-06-09
CN111263345B true CN111263345B (en) 2022-11-08

Family

ID=70951875

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811452478.2A Active CN111263345B (en) 2018-11-30 2018-11-30 User terminal identification method and device

Country Status (1)

Country Link
CN (1) CN111263345B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111866146B (en) * 2020-07-22 2022-02-11 中国联合网络通信集团有限公司 Household user identification method and device
CN112559586B (en) * 2020-12-03 2023-06-09 中国联合网络通信集团有限公司 Method and system for acquiring home user characteristic data
CN115243248B (en) * 2021-04-21 2023-09-01 中国移动通信集团湖南有限公司 Method and device for identifying traffic sharing type of terminal and electronic equipment
CN116017411B (en) * 2022-12-16 2024-03-01 中国联合网络通信集团有限公司 Terminal identification method, device, server and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102882748A (en) * 2012-10-23 2013-01-16 深圳中兴网信科技有限公司 Network access detection system and network access detection method
CN103124407A (en) * 2011-11-18 2013-05-29 中国移动通信集团内蒙古有限公司 Determination method and device for on-line mode of mobile user
CN103607691A (en) * 2013-11-26 2014-02-26 中国联合网络通信集团有限公司 Flow package recommendation method and device
CN104702564A (en) * 2013-12-05 2015-06-10 华为技术有限公司 Tethering user identification method and device
CN105389713A (en) * 2015-10-15 2016-03-09 南京大学 Mobile data traffic package recommendation algorithm based on user historical data
EP3082053A2 (en) * 2016-08-04 2016-10-19 Clickky Group Ltd. Traffic distribution and click validation system
CN106789486A (en) * 2017-03-17 2017-05-31 杭州迪普科技股份有限公司 The detection method and device of shared access
CN107086928A (en) * 2017-04-11 2017-08-22 深信服科技股份有限公司 The detection method and device of the shared network terminal
CN108235303A (en) * 2017-12-29 2018-06-29 中国移动通信集团江苏有限公司 Method, apparatus, equipment and the medium of the shared flow user of identification

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2506184A1 (en) * 2006-03-29 2012-10-03 The Bank of Tokyo-Mitsubishi UFJ, Ltd. Apparatus, method, and program for validating user
KR101755612B1 (en) * 2014-04-30 2017-07-26 주식회사 수산아이앤티 Method of detecting a plurality of terminals using a type of a browser and apparatus thererof

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103124407A (en) * 2011-11-18 2013-05-29 中国移动通信集团内蒙古有限公司 Determination method and device for on-line mode of mobile user
CN102882748A (en) * 2012-10-23 2013-01-16 深圳中兴网信科技有限公司 Network access detection system and network access detection method
CN103607691A (en) * 2013-11-26 2014-02-26 中国联合网络通信集团有限公司 Flow package recommendation method and device
CN104702564A (en) * 2013-12-05 2015-06-10 华为技术有限公司 Tethering user identification method and device
CN105389713A (en) * 2015-10-15 2016-03-09 南京大学 Mobile data traffic package recommendation algorithm based on user historical data
EP3082053A2 (en) * 2016-08-04 2016-10-19 Clickky Group Ltd. Traffic distribution and click validation system
CN106789486A (en) * 2017-03-17 2017-05-31 杭州迪普科技股份有限公司 The detection method and device of shared access
CN107086928A (en) * 2017-04-11 2017-08-22 深信服科技股份有限公司 The detection method and device of the shared network terminal
CN108235303A (en) * 2017-12-29 2018-06-29 中国移动通信集团江苏有限公司 Method, apparatus, equipment and the medium of the shared flow user of identification

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
面向高速流量环境的网络用户识别研究;潘培龙;《中国优秀硕士学位论文辑》;20180415;全文 *

Also Published As

Publication number Publication date
CN111263345A (en) 2020-06-09

Similar Documents

Publication Publication Date Title
CN111263345B (en) User terminal identification method and device
CN109429230B (en) Communication fraud identification method and system
US9277378B2 (en) Short message service validation engine
US20170041307A1 (en) Identity authentication method and device
CN109302434B (en) Prompt message pushing method and device, service platform and storage medium
US11537751B2 (en) Using machine learning algorithm to ascertain network devices used with anonymous identifiers
CA2832722A1 (en) Data mining method for social network of terminal user and related methods, apparatuses and systems
US20130311283A1 (en) Data mining method for social network of terminal user and related methods, apparatuses and systems
CN104823470A (en) System and method for correlating network information with subscriber information in mobile network environment
CN109982293B (en) Flow product pushing method and system, electronic equipment and storage medium
CN107948199B (en) Method and device for rapidly detecting terminal shared access
WO2015021873A1 (en) Method, platform server, and system of data pushing
CN113412607B (en) Content pushing method and device, mobile terminal and storage medium
CN106973379B (en) Network re-entry recognition methods and device
CN111049822B (en) Short message verification code sending method and device, short message server and storage medium
CN107368334B (en) Business plug-in interaction system and method
CN113507471A (en) Method, device, router and storage medium for acquiring terminal system type
CN113727351B (en) Communication fraud identification method and device and electronic equipment
US11599673B2 (en) Ascertaining network devices used with anonymous identifiers
Wang et al. Smart devices information extraction in home wi‐fi networks
EP3424005A1 (en) Counterfeit electronic device detection
CN108924840B (en) Blacklist management method and device and terminal
CN107040603B (en) Method and device for determining active scene of application program App
CN116963055A (en) Authentication method, authentication device, authentication apparatus, authentication storage medium, and authentication program product
CN106060825B (en) Client identification card copying reminding method and server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant