CN114257400A - Information acquisition method and device based on identification algorithm and computer equipment - Google Patents
Information acquisition method and device based on identification algorithm and computer equipment Download PDFInfo
- Publication number
- CN114257400A CN114257400A CN202111333516.4A CN202111333516A CN114257400A CN 114257400 A CN114257400 A CN 114257400A CN 202111333516 A CN202111333516 A CN 202111333516A CN 114257400 A CN114257400 A CN 114257400A
- Authority
- CN
- China
- Prior art keywords
- mobile terminal
- information
- target address
- address set
- prefix
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000004590 computer program Methods 0.000 claims description 19
- 230000004044 response Effects 0.000 claims description 11
- 238000004891 communication Methods 0.000 claims description 10
- 230000010365 information processing Effects 0.000 description 17
- 238000010586 diagram Methods 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000003032 molecular docking Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/09—Mapping addresses
- H04L61/10—Mapping addresses of different types
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application relates to an information acquisition method, an information acquisition device, computer equipment and a storage medium based on an identification algorithm, wherein the method comprises the following steps: responding to an application request sent by a mobile terminal, and receiving identification information to be analyzed; determining a mobile terminal prefix included in the identifier to be analyzed, and identifying and obtaining a target address set matched with the mobile terminal prefix from a target storage set library according to the mobile terminal prefix; the target storage set library stores the corresponding relation between a plurality of mobile terminal prefixes and a target address set; and acquiring the attribute information of the mobile terminal according to the target address set. The method comprises the steps of obtaining a mobile terminal prefix through identification information to be analyzed, finding a matched target address set according to the mobile terminal prefix, and obtaining attribute information of the mobile terminal through an address in the target address set; the attribute information of the mobile terminal is acquired according to the algorithm of the identification information, and the information acquisition efficiency is improved.
Description
Technical Field
The present application relates to the field of network security technologies, and in particular, to an information obtaining method and apparatus based on an identification algorithm, a computer device, and a storage medium.
Background
With the popularization of internet application and the dependence of people on the internet, users increasingly store important personal data and privacy information on mobile intelligent terminals, and the security problem of the internet is increasingly highlighted.
In the prior art, in order to prevent information leakage, a manual analysis method is adopted, for example, a browser is manually opened, a corresponding page is accessed through the browser and information of an object to be analyzed is searched, after an access result is obtained, a comparison result is manually compared and analyzed, and whether information leakage occurs to the object to be analyzed is judged.
However, in the prior art, a large amount of repeated work exists in the information acquisition process, and meanwhile, the request cannot be responded in 24 hours by manpower, so that the information acquisition efficiency is low.
Disclosure of Invention
In view of the above, it is necessary to provide an information acquisition method, apparatus, computer device and storage medium based on an identification algorithm.
An information acquisition method based on an identification algorithm, the method comprising:
responding to an application request sent by a mobile terminal, and receiving identification information to be analyzed;
determining a mobile terminal prefix included in the identification information to be analyzed, and identifying and obtaining a target address set matched with the mobile terminal prefix from a target storage set library according to the mobile terminal prefix; the target storage set library stores the corresponding relation between a plurality of mobile terminal prefixes and a target address set;
and acquiring the attribute information of the mobile terminal according to the target address set.
In one embodiment, the obtaining attribute information of the mobile terminal according to the target address set includes:
creating an information acquisition strategy according to a preset identification strategy template;
and searching information matched with the mobile terminal through the target address set as the attribute information according to the information acquisition strategy and a preset search rule.
In one embodiment, the identification information to be analyzed includes the mobile terminal prefix, a custom code, an identity identifier and a combined public key; the combined public key comprises a seed public key and a seed private key, and the seed private key is uniquely corresponding to the mobile terminal.
In one embodiment, the correspondence relationship is used for IP addresses allocated to all mobile terminals within a preset location range, and the IP addresses correspond to the target address set.
In one embodiment, after receiving the identification information to be resolved, the method further includes:
sending authentication information to the mobile terminal according to the identification information to be analyzed; and the mobile terminal performs authentication according to the authentication information.
In one embodiment, sending authentication information to the mobile terminal includes:
if the authentication is successful, sending a random password to the mobile terminal through the IP address; the random password enables the mobile terminal to establish communication connection with the address corresponding to the target address set.
In one embodiment, the destination address set includes a plurality of destination addresses matched with a mobile terminal prefix, and each destination address is arranged according to a degree of matching with the mobile terminal prefix to obtain the destination address set.
Receiving a message which is sent by a mobile terminal and carries a target address of the mobile terminal; the mobile terminal sends a request for acquiring the identification information to be analyzed of the mobile terminal corresponding to the target address;
an information acquisition apparatus based on an identification algorithm, the apparatus comprising:
the request response module is used for responding to an application request sent by the mobile terminal and receiving the identification information to be analyzed;
the address determining module is used for determining a mobile terminal prefix included in the identification information to be analyzed, and identifying and obtaining a target address set matched with the mobile terminal prefix from a target storage set library according to the mobile terminal prefix; the target storage set library stores the corresponding relation between a plurality of mobile terminal prefixes and a target address set;
and the information acquisition module is used for acquiring the attribute information of the mobile terminal according to the target address set.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
responding to an application request sent by a mobile terminal, and receiving identification information to be analyzed;
determining the mobile terminal prefix included in the identification information to be analyzed, and identifying a target address set matched with the mobile terminal prefix from a target storage set library according to the mobile terminal prefix; the target storage set library stores the corresponding relation between a plurality of mobile terminal prefixes and a target address set;
and acquiring the attribute information of the mobile terminal according to the target address set.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
responding to an application request sent by a mobile terminal, and receiving identification information to be analyzed;
determining a mobile terminal prefix included in the identification information to be analyzed, and identifying and obtaining a target address set matched with the mobile terminal prefix from a target storage set library according to the mobile terminal prefix; the target storage set library stores the corresponding relation between a plurality of mobile terminal prefixes and a target address set;
and acquiring the attribute information of the mobile terminal according to the target address set.
The information acquisition method, the information acquisition device, the computer equipment and the storage medium based on the identification algorithm comprise the following steps: responding to an application request sent by a mobile terminal, and receiving identification information to be analyzed; determining a mobile terminal prefix included in the identification information to be analyzed, and identifying and obtaining a target address set matched with the mobile terminal prefix from a target storage set library according to the mobile terminal prefix; the target storage set library stores the corresponding relation between a plurality of mobile terminal prefixes and a target address set; and acquiring the attribute information of the mobile terminal according to the target address set. The method comprises the steps of obtaining a mobile terminal prefix through identification information to be analyzed, finding a matched target address set according to the mobile terminal prefix, and obtaining attribute information of the mobile terminal through an address in the target address set; the attribute information of the mobile terminal is acquired according to the algorithm of the identification information, and the information acquisition efficiency is improved.
Drawings
FIG. 1 is a diagram of an application environment of an information retrieval method based on an identification algorithm in one embodiment;
FIG. 2 is a schematic flow chart of an information retrieval method based on an identification algorithm in one embodiment;
FIG. 3 is a flowchart illustrating a method for obtaining attribute information of a mobile terminal according to a destination address set in another embodiment;
FIG. 4 is a block diagram of an information acquisition device based on an identification algorithm in one embodiment;
FIG. 5 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The information acquisition method based on the identification algorithm can be applied to the application environment shown in fig. 1. Wherein the mobile terminal 102 communicates with the server 104 over a network. The server 104 responds to the application request sent by the mobile terminal 102 and receives the identification information to be analyzed; the server 104 determines a mobile terminal prefix included in the identification information to be analyzed, and identifies a target address set matched with the mobile terminal prefix from a target storage set library according to the mobile terminal prefix; the target storage set library stores the corresponding relation between a plurality of mobile terminal prefixes and a target address set; the server 104 obtains the attribute information of the mobile terminal 102 according to the target address set. The mobile terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, the server 104 may be implemented by an independent server or a server cluster including a plurality of servers, and the server 104 is mounted with an information processing center system and can perform information processing operations in response to information sent by the mobile terminal.
In one embodiment, as shown in fig. 2, an information obtaining method based on an identification algorithm is provided, which is described by taking the method as an example applied to the mobile terminal 102 in fig. 1, and includes the following steps:
The mobile terminal is a terminal device capable of generating identification information to be analyzed; the application request refers to a communication application sent by the mobile terminal to the server, and after the application request passes, the information processing center carried on the server receives the identification information to be analyzed sent by the mobile terminal.
Specifically, an information processing center on the server receives an application request sent by the mobile terminal, verifies the application request, and receives to-be-analyzed identification information if the verification is passed.
The mobile terminals correspond to a mobile terminal prefix, and at least the mobile terminals, the types of the mobile terminals, the history information and the like can be identified through the mobile terminal prefix. The target storage set library is a database for storing the mobile terminal prefix and the target address set. In the target storage set library, a corresponding target address set can be determined through the mobile terminal prefixes, and one or more corresponding mobile terminal prefixes can also be identified through the target address set.
Specifically, the server identifies a target address set matched with the prefix of the mobile terminal from the target storage set library according to the prefix of the mobile terminal obtained by analyzing the identifier to be analyzed and the corresponding relation between the prefix of the mobile terminal and the target address set.
And step 206, acquiring the attribute information of the mobile terminal according to the target address set.
The target address set comprises a plurality of target address information; the server can perform data access, data processing and other steps according to the target address in the target address set to obtain the attribute information of the mobile terminal.
Specifically, the server creates an information processing strategy according to a preset identification strategy template, and searches attribute information matched with the mobile terminal through at least one target address in a target address set in a target storage set library according to the information processing strategy and a preset search rule.
The information acquisition method, the information acquisition device, the computer equipment and the storage medium based on the identification algorithm comprise the following steps: responding to an application request sent by a mobile terminal, and receiving identification information to be analyzed; determining a mobile terminal prefix included in the identification information to be analyzed, and identifying and obtaining a target address set matched with the mobile terminal prefix from a target storage set library according to the mobile terminal prefix; the target storage set library stores the corresponding relation between a plurality of mobile terminal prefixes and a target address set; and acquiring the attribute information of the mobile terminal according to the target address set. The method comprises the steps of obtaining a mobile terminal prefix through identification information to be analyzed, finding a matched target address set according to the mobile terminal prefix, and obtaining attribute information of the mobile terminal through an address in the target address set; the attribute information of the mobile terminal is acquired according to the algorithm of the identification information, and the information acquisition efficiency is improved.
In one embodiment, as shown in fig. 3, step 206, obtaining attribute information of the mobile terminal according to the target address set includes:
And step 304, searching information matched with the mobile terminal through the target address set as attribute information according to the information acquisition strategy and a preset search rule.
The preset identification strategy template is a template which can be logically generated for acquiring the attribute information of the corresponding mobile terminal according to information such as the prefix of the mobile terminal; that is, the identification policy template can identify a data acquisition manner in which the mobile terminal attribute information is appropriately acquired.
Specifically, the search rule and the acquisition policy are two data processing steps in the identification policy template, and different acquisition policies and search rules can be adopted through the target address set, so that the effect of acquiring information matched with the mobile terminal as attribute information as soon as possible is achieved.
In one embodiment, the identification information to be analyzed comprises a mobile terminal prefix, a custom code, an identity and a combined public key; the combined public key comprises a seed public key and a seed private key, and the seed private key is uniquely corresponding to the mobile terminal.
Specifically, the identification information to be analyzed at least comprises a mobile terminal prefix, a custom code, an identity and a combined public key; the user-defined code can describe the mobile terminal; the identity can accurately identify different mobile terminals, and the identity is unique; the combined public key comprises a seed public key and a seed private key, and the seed private key is uniquely corresponding to the mobile terminal, so that encryption in the data transmission process of different mobile terminals can be realized, and the safety in the information acquisition process is improved.
In one embodiment, the correspondence is used for IP addresses assigned to all mobile terminals within a preset location range, and the IP addresses correspond to the target address set.
Specifically, the IP address is obtained by allocating the location of the mobile terminal according to the corresponding relationship, and the allocated IP address corresponds to the target address set, so that the communications of the mobile terminal and the server are matched with each other, and the communication efficiency is improved.
In one embodiment, after receiving the identification information to be resolved, the method further includes: sending authentication information to the mobile terminal according to the identification information to be analyzed; and the mobile terminal performs authentication according to the authentication information.
Specifically, the server can send authentication information to the mobile terminal according to the identification information to be analyzed; the authentication information can verify the identity of the mobile terminal, the request for information acquisition and the acquisition process each time, and the safety of information transmission between the mobile terminal and the server is improved.
In one embodiment, sending authentication information to the mobile terminal includes: if the authentication is successful, sending a random password to the mobile terminal through the IP address; the random password enables the mobile terminal to establish communication connection with the address corresponding to the target address set.
Specifically, the random password is generated according to the IP address, and the random password is only sent to the mobile terminal which succeeds in authentication; the mobile terminal can be accessed after verification is carried out on the random password and any address in the target address set, namely, secondary verification is achieved, and the safety of the information acquisition process based on the identification algorithm is further improved.
In one embodiment, the target address set includes a plurality of target addresses matched with the mobile terminal prefix, and each target address is arranged according to the matching degree with the mobile terminal prefix to obtain the target address set.
Specifically, each target address is arranged according to the matching degree with the mobile terminal prefix to obtain a target address set, so that a target address with a higher matching degree is tried preferentially when the attribute information is obtained, and the like until all the attribute information is obtained. And the target address sets are summarized and sorted according to the matching degree, so that the selection cost is reduced, and the information acquisition efficiency is improved.
In one embodiment, there is provided another information obtaining method based on an identification algorithm, including:
step S1, the mobile terminal applies for accessing the terminal network and sends out application request, the information processing center receives the message carrying the destination address of the mobile terminal;
step S2, the mobile terminal sends a request for obtaining the identification information to be analyzed of the mobile terminal corresponding to the target address;
step S3, determining the mobile terminal prefix included in the identification information to be analyzed, and searching a corresponding target storage set library in the cache set according to the mobile terminal prefix;
step S4, the target storage set library stores the corresponding relation between the prefix of each mobile terminal and the target address set;
and step S5, the information processing center creates an information processing strategy according to the preset identification strategy template, and searches the attribute information matched with the mobile terminal in the database according to the information processing strategy and the preset search rule.
The method further comprises the following steps: and taking the identification information to be analyzed as the unique identification of the mobile terminal in the website.
The identification information to be analyzed comprises a mobile terminal prefix, a custom code, an identity identification and a combined public key; the combined public key comprises a seed public key and a seed private key, the seed public key is uniformly distributed by the information processing center, and the seed private key is uniquely corresponding to the mobile terminal.
The target storage set library stores corresponding relations between a plurality of mobile terminal prefixes and a plurality of target address sets, and the target address sets are sorted from large to small according to the target similarity.
The corresponding relation is established after the mobile terminal accesses the information processing center, all the mobile terminals in the preset position range are distributed with IP addresses, and the IP addresses correspond to the identification information to be analyzed and the target address.
And under the condition of carrying the IP address of the mobile terminal, returning a response instruction for accessing the website after analyzing the identification information to be analyzed of the mobile terminal.
The information processing center receives the response instruction and sends authentication information; and the mobile terminal performs authentication according to the authentication information. After the authentication is successful, the information processing center identifies the mobile terminal according to the IP address, and sends a random password to connect the communication link between the website and the mobile terminal.
The identification information of the invention adopts the combined public key, the technical system solves the problems of large-scale key management and identification certification by the key, and the invention has the advantages of simple and efficient system, good feasibility and off-line authentication support. The combined public key cryptosystem is independent innovation in China, is mainly used for constructing an authentication system, provides authenticity certification, security guarantee and construction and management of a trust system, is an indispensable basic means for implementing management and guaranteeing security under networked and information conditions, and is also a basis for developing cloud computing internet of things.
The matching process of the invention is completed locally, the tolerance to the network environment is high, the authentication process is simple and efficient, the docking and development cost is low, the time consumption for completing an information processing process is extremely short, the time consumption can be controlled within hundreds of milliseconds, the information processing center can master the processing system by one hand, the failure rate is low, the trust transfer does not exist, and the man-in-the-middle attack does not exist.
The embodiment also discloses that the database determines the network access target according to the target influence factor of the mobile terminal, and the target influence factor is a parameter which influences the network selection of the target area.
Generating recommendation information when the target influence factor meets the preset condition of the access network target corresponding to the mobile terminal; the recommendation information is used for recommending a target access network meeting a target preset condition, and the mobile terminal carries out network access by matching the IP address with the identification information to be analyzed and the target address.
The embodiment further discloses that after the information processing center receives the information acquisition request, the mobile terminal directly acquires the object information of the target object from the server of the target website, and after the target information fingerprint matched with the object information is found in the fingerprint library, the information leakage state of the target information fingerprint recorded in the fingerprint library is used as the information leakage state of the target object.
In the embodiment, the object information is automatically inquired in the server of the target website in response to the information acquisition request, the processing speed is improved, in the scheme, a plurality of information fingerprints are prestored in the fingerprint library, each information fingerprint is marked with the information leakage state, and after the target information fingerprint matched with the object information of the target object is determined, the information leakage state of the target object can be accurately determined, so that the accuracy is high.
It should be understood that although the various steps in the flow charts of fig. 2-3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-3 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 4, there is provided an information acquisition apparatus based on an identification algorithm, including: a request response module 402, an address determination module 404, and an information acquisition module 406, wherein:
a request response module 402, configured to receive identifier information to be analyzed in response to an application request sent by a mobile terminal;
an address determining module 404, configured to determine a mobile terminal prefix included in the to-be-analyzed identification information, and identify and obtain a target address set matching the mobile terminal prefix from a target storage set library according to the mobile terminal prefix; the target storage set library stores the corresponding relation between a plurality of mobile terminal prefixes and a target address set;
and an information obtaining module 406, configured to obtain attribute information of the mobile terminal according to the target address set.
In an embodiment, the information obtaining module 406 is further configured to create an information obtaining policy according to a preset identification policy template; and searching information matched with the mobile terminal through the target address set as attribute information according to the information acquisition strategy and a preset search rule.
In an embodiment, the request response module 402 is further configured to send authentication information to the mobile terminal according to the identification information to be analyzed; and the mobile terminal performs authentication according to the authentication information.
In one embodiment, the request response module 402 is further configured to send a random password to the mobile terminal through the IP address if the authentication is successful; the random password enables the mobile terminal to establish communication connection with the address corresponding to the target address set.
For the specific definition of the information acquiring apparatus based on the identification algorithm, reference may be made to the above definition of the information acquiring method based on the identification algorithm, and details are not repeated here. The modules in the information acquisition device based on the identification algorithm can be wholly or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 5. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing information acquisition data based on an identification algorithm. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement an information acquisition method based on an identification algorithm.
Those skilled in the art will appreciate that the architecture shown in fig. 5 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
responding to an application request sent by a mobile terminal, and receiving identification information to be analyzed;
determining a mobile terminal prefix included in the identification information to be analyzed, and identifying and obtaining a target address set matched with the mobile terminal prefix from a target storage set library according to the mobile terminal prefix; the target storage set library stores the corresponding relation between a plurality of mobile terminal prefixes and a target address set;
and acquiring the attribute information of the mobile terminal according to the target address set.
In one embodiment, the processor, when executing the computer program, further performs the steps of: creating an information acquisition strategy according to a preset identification strategy template; and searching information matched with the mobile terminal through the target address set as attribute information according to the information acquisition strategy and a preset search rule.
In one embodiment, the processor, when executing the computer program, further performs the steps of: sending authentication information to the mobile terminal according to the identification information to be analyzed; and the mobile terminal performs authentication according to the authentication information.
In one embodiment, the processor, when executing the computer program, further performs the steps of: if the authentication is successful, sending a random password to the mobile terminal through the IP address; the random password enables the mobile terminal to establish communication connection with the address corresponding to the target address set.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
responding to an application request sent by a mobile terminal, and receiving identification information to be analyzed;
determining a mobile terminal prefix included in the identification information to be analyzed, and identifying and obtaining a target address set matched with the mobile terminal prefix from a target storage set library according to the mobile terminal prefix; the target storage set library stores the corresponding relation between a plurality of mobile terminal prefixes and a target address set;
and acquiring the attribute information of the mobile terminal according to the target address set.
In one embodiment, the computer program when executed by the processor further performs the steps of: creating an information acquisition strategy according to a preset identification strategy template; and searching information matched with the mobile terminal through the target address set as attribute information according to the information acquisition strategy and a preset search rule.
In one embodiment, the computer program when executed by the processor further performs the steps of: sending authentication information to the mobile terminal according to the identification information to be analyzed; and the mobile terminal performs authentication according to the authentication information.
In one embodiment, the computer program when executed by the processor further performs the steps of: if the authentication is successful, sending a random password to the mobile terminal through the IP address; the random password enables the mobile terminal to establish communication connection with the address corresponding to the target address set.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above examples only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. An information acquisition method based on an identification algorithm, characterized in that the method comprises:
responding to an application request sent by a mobile terminal, and receiving identification information to be analyzed;
determining a mobile terminal prefix included in the identification information to be analyzed, and identifying and obtaining a target address set matched with the mobile terminal prefix from a target storage set library according to the mobile terminal prefix; the target storage set library stores the corresponding relation between a plurality of mobile terminal prefixes and a target address set;
and acquiring the attribute information of the mobile terminal according to the target address set.
2. The method according to claim 1, wherein the obtaining attribute information of the mobile terminal according to the target address set comprises:
creating an information acquisition strategy according to a preset identification strategy template;
and searching information matched with the mobile terminal through the target address set as the attribute information according to the information acquisition strategy and a preset search rule.
3. The information acquisition method based on the identification algorithm as claimed in claim 1, wherein the identification information to be analyzed comprises the mobile terminal prefix, the custom code, the identity and the combined public key; the combined public key comprises a seed public key and a seed private key, and the seed private key is uniquely corresponding to the mobile terminal.
4. The information acquisition method based on identification algorithm according to claim 1, wherein the correspondence is used for the IP addresses allocated to all mobile terminals within a preset location range, and the IP addresses correspond to the target address set.
5. The method for acquiring information based on identification algorithm according to claim 1, further comprising, after receiving the identification information to be parsed:
sending authentication information to the mobile terminal according to the identification information to be analyzed; and the mobile terminal performs authentication according to the authentication information.
6. The method of claim 5, wherein sending authentication information to the mobile terminal comprises:
if the authentication is successful, sending a random password to the mobile terminal through the IP address; the random password enables the mobile terminal to establish communication connection with the address corresponding to the target address set.
7. The information acquisition method based on the identification algorithm according to any one of claims 1 to 6, wherein the target address set comprises a plurality of target addresses matched with a mobile terminal prefix, and each target address is arranged according to the degree of matching with the mobile terminal prefix to obtain the target address set.
8. An information acquisition apparatus based on an identification algorithm, the apparatus comprising:
the request response module is used for responding to an application request sent by the mobile terminal and receiving the identification information to be analyzed;
the address determining module is used for determining a mobile terminal prefix included in the identification information to be analyzed, and identifying a target address set matched with the mobile terminal prefix from a target storage set library according to the mobile terminal prefix; the target storage set library stores the corresponding relation between a plurality of mobile terminal prefixes and a target address set;
and the information acquisition module is used for acquiring the attribute information of the mobile terminal according to the target address set.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the identification algorithm based information acquisition method of any one of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the identification algorithm-based information acquisition method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111333516.4A CN114257400A (en) | 2021-11-11 | 2021-11-11 | Information acquisition method and device based on identification algorithm and computer equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111333516.4A CN114257400A (en) | 2021-11-11 | 2021-11-11 | Information acquisition method and device based on identification algorithm and computer equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114257400A true CN114257400A (en) | 2022-03-29 |
Family
ID=80792424
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111333516.4A Pending CN114257400A (en) | 2021-11-11 | 2021-11-11 | Information acquisition method and device based on identification algorithm and computer equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114257400A (en) |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020133591A1 (en) * | 2001-03-14 | 2002-09-19 | Makarios Selene K. | Method and apparatus for mapping of attributes to networked resources |
WO2010069181A1 (en) * | 2008-12-17 | 2010-06-24 | 华为技术有限公司 | Method and system for configuring ipv6 address |
EP3122007A1 (en) * | 2015-07-20 | 2017-01-25 | Cisco Technology, Inc. | Attribute set_id in border gateway protocol |
WO2018090933A1 (en) * | 2016-11-17 | 2018-05-24 | 腾讯科技(深圳)有限公司 | Method, apparatus, and system for resolving service platform address |
CN111459985A (en) * | 2020-03-31 | 2020-07-28 | 美的集团股份有限公司 | Identification information processing method and device |
CN111767484A (en) * | 2020-08-31 | 2020-10-13 | 中国信息通信研究院 | Industrial Internet identification analysis method and related device |
CN112579931A (en) * | 2020-12-11 | 2021-03-30 | 腾讯科技(深圳)有限公司 | Network access analysis method and device, computer equipment and storage medium |
CN117473953A (en) * | 2023-10-20 | 2024-01-30 | 北京星云通力科技有限公司 | Unique resource coding identification informatization system and generation and recursion analysis method |
-
2021
- 2021-11-11 CN CN202111333516.4A patent/CN114257400A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020133591A1 (en) * | 2001-03-14 | 2002-09-19 | Makarios Selene K. | Method and apparatus for mapping of attributes to networked resources |
WO2010069181A1 (en) * | 2008-12-17 | 2010-06-24 | 华为技术有限公司 | Method and system for configuring ipv6 address |
EP3122007A1 (en) * | 2015-07-20 | 2017-01-25 | Cisco Technology, Inc. | Attribute set_id in border gateway protocol |
WO2018090933A1 (en) * | 2016-11-17 | 2018-05-24 | 腾讯科技(深圳)有限公司 | Method, apparatus, and system for resolving service platform address |
CN111459985A (en) * | 2020-03-31 | 2020-07-28 | 美的集团股份有限公司 | Identification information processing method and device |
CN111767484A (en) * | 2020-08-31 | 2020-10-13 | 中国信息通信研究院 | Industrial Internet identification analysis method and related device |
CN112579931A (en) * | 2020-12-11 | 2021-03-30 | 腾讯科技(深圳)有限公司 | Network access analysis method and device, computer equipment and storage medium |
CN117473953A (en) * | 2023-10-20 | 2024-01-30 | 北京星云通力科技有限公司 | Unique resource coding identification informatization system and generation and recursion analysis method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108701309A (en) | A kind of distributed user profile authentication system for security of e-commerce transactions | |
CN110290112B (en) | Authority control method and device, computer equipment and storage medium | |
WO2019144549A1 (en) | Vulnerability testing method and device, computer equipment, and storage medium | |
CN108365958B (en) | Account login verification method and device, computer equipment and storage medium | |
CN110597782B (en) | Database dynamic switching method and device, computer equipment and storage medium | |
CN109657107B (en) | Terminal matching method and device based on third-party application | |
CN112860778B (en) | Database management method, device, equipment and medium for desktop application program | |
WO2018233051A1 (en) | Data release method and device, and server and storage medium | |
CN115840964A (en) | Data processing method and device, electronic equipment and computer storage medium | |
CN113242331B (en) | Different types of address conversion method, device, computer equipment and storage medium | |
CN111177776A (en) | Multi-tenant data isolation method and system | |
CN113709181A (en) | Website login method, device, equipment and storage medium based on browser plug-in | |
CN114153626A (en) | Method and device for abstracting service integration process and computer equipment | |
WO2021169305A1 (en) | Voiceprint data processing method and apparatus, computer device, and storage medium | |
CN108154024B (en) | Data retrieval method and device and electronic equipment | |
CN114218322A (en) | Data display method, device, equipment and medium based on ciphertext transmission | |
CN113872990B (en) | VPN network certificate authentication method and device based on SSL protocol and computer equipment | |
CN113949579B (en) | Website attack defense method and device, computer equipment and storage medium | |
CN114996675A (en) | Data query method and device, computer equipment and storage medium | |
CN111177481A (en) | User identifier mapping method and device | |
CN110677506A (en) | Network access method, device, computer equipment and storage medium | |
CN114338527A (en) | IPv6 active identifier processing method and system | |
CN112507010B (en) | Service data processing method and device, computer equipment and storage medium | |
CN114257400A (en) | Information acquisition method and device based on identification algorithm and computer equipment | |
CN114021175B (en) | User portrait configuration method and device, computer equipment and medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |