CN115484588A - Method, device and medium for acquiring mobile terminal ID - Google Patents

Method, device and medium for acquiring mobile terminal ID Download PDF

Info

Publication number
CN115484588A
CN115484588A CN202211067248.0A CN202211067248A CN115484588A CN 115484588 A CN115484588 A CN 115484588A CN 202211067248 A CN202211067248 A CN 202211067248A CN 115484588 A CN115484588 A CN 115484588A
Authority
CN
China
Prior art keywords
fingerprint
mobile terminal
terminal
acquiring
list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211067248.0A
Other languages
Chinese (zh)
Inventor
方毅
俞锋锋
董霖
曾昱深
刘桢
王志豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taierzhuoxin Technology Beijing Co ltd
Original Assignee
Taierzhuoxin Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taierzhuoxin Technology Beijing Co ltd filed Critical Taierzhuoxin Technology Beijing Co ltd
Priority to CN202211067248.0A priority Critical patent/CN115484588A/en
Publication of CN115484588A publication Critical patent/CN115484588A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/30Managing network names, e.g. use of aliases or nicknames
    • H04L61/3005Mechanisms for avoiding name conflicts
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/30Managing network names, e.g. use of aliases or nicknames
    • H04L61/3015Name registration, generation or assignment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/60Context-dependent security
    • H04W12/69Identity-dependent

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Collating Specific Patterns (AREA)

Abstract

The invention relates to the technical field of communication, in particular to a method, equipment and medium for acquiring a mobile terminal ID. The method comprises the following steps: acquiring a first fingerprint list and a second fingerprint list, acquiring a second application software ID, and taking the second terminal ID as a target terminal ID when a second association ID corresponding to the second application software ID is not null, wherein the second terminal ID is the identity of the mobile terminal corresponding to the second association ID; when a second associated ID corresponding to the second application software ID is null, acquiring a target terminal ID according to the first fingerprint list and the second fingerprint list; the method and the device can determine whether the fingerprint list is the same device or not, do not update the mobile terminal ID when the fingerprint list is the same device, and give out a new mobile terminal ID when the fingerprint list is different devices, so that the safety of the device is improved, and the safety of user information is further improved.

Description

Method, device and medium for acquiring mobile terminal ID
Technical Field
The invention relates to the technical field of communication, in particular to a method, equipment and medium for acquiring a mobile terminal ID.
Background
The existing various device identifiers are unreasonable in design and can be easily used by all parties to track personal information for a long time without considering the protection of the personal information and without proving the authorization consent of users. Meanwhile, various existing ID designs are easy to forge, so that a large amount of forged traffic is flooded in the mobile internet, and the healthy development of the industry is greatly influenced.
With the stricter detection of the application software in the internet environment, the application software is difficult to acquire the traditional unique identification of the unchangeable device, and the acquisition rate of the changeable advertisement identification is reduced. The current solutions of various IDs are in conflict, no system is formed, and data association is difficult to get through. Not only preventing the 'swiping amount' but also paying attention to the omnibearing protection of user information, which has higher requirements on enterprise implementation solutions, and also needs to pay high cost. Therefore, a widely recognized, tamper-resistant, variable, uniform device ID is essential to the industry.
Disclosure of Invention
Aiming at the technical problems, the technical scheme adopted by the invention is as follows: a method for acquiring a mobile terminal ID comprises the following steps:
s100 obtaining a first list of fingerprints a = { a = { (a) } 1 ,……,A i ,……,A m },A i I =1 … … m, where m is the number of first fingerprints;
s120 get the second finger texture list B = { B = { B = } 1 ,……,B i ,……,B m },B i Refers to the ith second fingerprint;
s140, acquiring a second application software ID, and taking the second terminal ID as a target terminal ID when a second association ID corresponding to the second application software ID is not null, wherein the second terminal ID is the identity of the mobile terminal corresponding to the second association ID;
and S160, when the second associated ID corresponding to the second application software ID is null, acquiring the ID of the target terminal according to the A and the B.
The invention also protects a non-transitory computer readable storage medium, wherein at least one instruction or at least one program is stored in the storage medium, and the at least one instruction or the at least one program is loaded and executed by a processor to realize the method for acquiring the ID of the mobile terminal.
The invention also protects an electronic device comprising a processor and the non-transitory computer-readable storage medium described above.
Compared with the prior art, the method for acquiring the mobile terminal ID has obvious advantages and beneficial effects, can achieve considerable technical progress and practicability, has wide utilization value and at least has the following advantages:
according to the method and the device, the first fingerprint list and the second fingerprint list are obtained, the second application software ID is obtained, and when the second association ID corresponding to the second application software ID is not null, the second terminal ID is used as the target terminal ID, wherein the second terminal ID refers to the identity of the mobile terminal corresponding to the second association ID; when a second association ID corresponding to the second application software ID is null, acquiring a target terminal ID according to the first fingerprint list and the second fingerprint list; the method and the device can determine whether the fingerprint list is the same device or not according to the fingerprint list acquired twice, the mobile terminal ID is not updated when the fingerprint list is the same device, and a new mobile terminal ID is given when the fingerprint list is different devices, so that the safety of the device is improved, and the safety of user information is further improved.
In addition, the characteristic value of the local application is anonymized to be the fingerprint, and the safety of the user information is further improved.
The foregoing description is only an overview of the technical solutions of the present invention, and in order to make the technical means of the present invention more clearly understood, the present invention may be implemented in accordance with the content of the description, and in order to make the above and other objects, features, and advantages of the present invention more clearly understood, the following preferred embodiments are specifically described below with reference to the accompanying drawings.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a method for acquiring an ID of a mobile terminal according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for acquiring an ID of a mobile terminal according to another embodiment of the present invention;
fig. 3 is a flowchart of a method for acquiring a mobile terminal ID according to another embodiment of the present invention;
fig. 4 is a flowchart of a method for acquiring a mobile terminal ID according to another embodiment of the present invention;
fig. 5 is a flowchart of a method for acquiring a mobile terminal ID according to another embodiment of the present invention;
fig. 6 is a flowchart of a method for acquiring a mobile terminal ID according to another embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, belong to the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
As shown in fig. 1, an embodiment of the present invention provides a data processing method for acquiring a mobile terminal ID, where the method includes the following steps:
s100 obtaining a first list of fingerprints a = { a = { (a) } 1 ,……,A i ,……,A m },A i I =1 … … m, where m is the number of first fingerprints.
Specifically, the method further comprises the following steps before the step S100:
s1 acquiring a preset fingerprint configuration list T = { T = { (T) 1 ,……,T j ,……,T M In which T j The method is characterized in that the method refers to a jth fingerprint type corresponding to the mobile terminal, j =1 … … M, and M is a preset feature quantity of the fingerprint type.
Further, the method also comprises the following steps of:
s11, obtaining an original fingerprint list V = { V = { (V) 1 ,……,V r ,……,V s },V r =(V r1 ,V r2 , V r3 ),V r1 Is the first degree value, V, of the r-th original fingerprint r2 Is the second degree value, V, of the r-th original fingerprint r3 Is the third degree value of the r-th original fingerprint, r =1 … … s, s is the number of the original fingerprintsAmount of the compound (A).
Further, the first degree value represents the unique degree of the original fingerprint, which can be understood as uniqueness, and those skilled in the art know to adopt any method in the prior art to obtain uniqueness, which is not described herein again.
Further, the second degree value represents the stability degree of the original fingerprint, which can be understood as stability, and those skilled in the art know to adopt any method in the prior art to obtain stability, which is not described herein again.
Further, the third degree value represents the saturation of the original fingerprint, and those skilled in the art know to adopt any method in the prior art to obtain the saturation, which is not described herein again.
S12, go through V r And when V r1 First degree threshold V 1 0 、V r2 Second degree threshold V 2 0 And V r3 Greater than a third degree threshold V 3 0 When it is, V will be r The corresponding original fingerprint has the corresponding fingerprint type inserted into T.
Specifically, the original fingerprint refers to a fingerprint that cannot reflect the identity of the mobile terminal.
In particular, V 1 0 The threshold value of the unique degree is set by a person skilled in the art according to actual requirements, and is not described herein again.
In particular, V 2 0 For the threshold of the stability degree, those skilled in the art set the threshold of the stability degree according to actual requirements, and details are not described herein.
In particular, V 3 0 For the saturation threshold, those skilled in the art set the saturation threshold according to actual requirements, and details are not described herein.
Further, M ≦ M, preferably M = M =10.
S3, obtaining an initial fingerprint A '= { A' 1 ,……,A′ x ,……,A′ z In which, A' x Refers to the x-th initial fingerprint, x =1 … … z, z being the number of initial fingerprints.
Specifically, the initial fingerprint refers to an original fingerprint corresponding to a mobile terminal installed with target application software, where the type of the initial fingerprint is an anonymous fingerprint, and a person skilled in the art knows that an anonymous fingerprint may be obtained by any method in the prior art, which is not described herein again; anonymous fingerprints can be adopted, leakage of terminal information is avoided, and safety of the mobile terminal is improved.
Further, those skilled in the art select the application software as the target application software according to requirements, and details are not described herein.
S5, when the mobile terminal is authorized and the fingerprint is uploaded for the first time by the mobile terminal, when the mobile terminal is A' x Corresponding fingerprint type and T j If they are consistent, mixing A' x As the first fingerprint.
The steps S1-S3 can select the fingerprint suitable for determining the similarity, and are favorable for accurately determining the similarity.
S120, acquiring a second fingerprint list B = { B = 1 ,……,B i ,……,B m },B i Refers to the ith second fingerprint.
Specifically, the first association ID is an association ID generated when the mobile terminal uploads the fingerprint for the first time, where the association ID is an identity associated with the mobile terminal ID, and further, the association ID is a randomly generated character string with a preset length, and a person skilled in the art knows that the preset length of the character string can be set as required, which is not described herein again.
Specifically, the second fingerprint refers to an original fingerprint corresponding to the mobile terminal with the target application software installed at a non-first time point, where the non-first time point refers to any time point except for a time point corresponding to the first fingerprint.
S140, acquiring a second application software ID, and when a second association ID corresponding to the second application software ID is not null, taking the second terminal ID as a target terminal ID, wherein the second terminal ID refers to the identity of the mobile terminal corresponding to the second association ID.
And S160, when the second associated ID corresponding to the second application software ID is null, acquiring the target terminal ID according to the A and the B.
Specifically, the step S160 includes the following steps:
s1601, a first terminal ID corresponding to the first association ID is obtained.
Specifically, the first terminal ID represents a unique identity of the mobile terminal corresponding to the first association ID.
S1602, when any B i ≠A i Then, a first number N of intermediate fingerprints and a second number N of intermediate fingerprints are obtained.
Further, the first intermediate fingerprint refers to B in B i ≠A i The second fingerprint of (1).
Further, the second intermediate fingerprint refers to any one of the second fingerprints except the first intermediate fingerprint in B.
Further, N + N = m.
S1603, acquiring a first similarity F according to m, N and N 1 0 Wherein, F 1 0 The following conditions are met:
Figure DEST_PATH_FDA0003828222200000021
s1604, when F 1 0 First similarity threshold F 0 And taking the first terminal ID as a target terminal ID, so that the target terminal ID is sent to the mobile terminal corresponding to the B.
S1605, when F 1 0 ≤F 0 Regenerating a third association ID and taking a third terminal ID corresponding to the third association ID as a target terminal ID so as to send the target terminal ID to the mobile terminal corresponding to B; further understanding: when F is present 1 0 >F 0 When the mobile terminal is in a mobile terminal state, the first fingerprint list and the second fingerprint list are high in similarity, the mobile terminal can be determined to be the same mobile terminal, and the first terminal ID is used as a target terminal ID and is sent to the corresponding mobile terminal; when F is present 1 0 ≤F 0 If the similarity between the first fingerprint list and the second fingerprint list is not high, the first fingerprint list and the second fingerprint list can be determined not to be the same mobile terminal, and the first fingerprint list and the second fingerprint list can be regeneratedAnd the third terminal ID is sent to the corresponding mobile terminal.
Alternatively, in a specific embodiment, the step S160 includes the following steps:
s1601, a first terminal ID corresponding to the first association ID is obtained.
S1602, when any B i ≠A i Then, the first number N of intermediate fingerprints and the second number N of intermediate fingerprints in the second intermediate fingerprint list are obtained.
Further, the first intermediate fingerprint refers to B in B i ≠A i The second fingerprint of (1).
Further, the second intermediate fingerprint refers to any second fingerprint in B except the first intermediate fingerprint.
Further, N + N = m.
S1603, according to A, a first fingerprint quantity list D = { D is obtained 1 ,……,D t ,……,D k }, D t Refers to the number of fingerprints of the t-th class first fingerprint, and t =1 … … k is the number of types of the first fingerprint.
Further, D 1 +……+D t +……+D k =m。
S1604, acquiring a second fingerprint number list D ' = { D ' according to all second intermediate fingerprints ' 1 ,……, D' t ,……,D' s },D' t Refers to the number of fingerprints of the t-th class second intermediate fingerprint.
Further, D' 1 +……+D' t +……+D' k =N。
S1605, according to D t And D' t Obtaining a second similarity F 2 0 Wherein F is 2 0 The following conditions are met:
Figure DEST_PATH_FDA0003828222200000022
wherein, W t Is referred to as D t And (4) corresponding weight values.
S1606, when F 2 0 > second similarity threshold F' 0 And taking the first terminal ID as a target terminal ID, so that the target terminal ID is sent to the mobile terminal corresponding to the B.
S1607, when F 2 0 ≤F' 0 Regenerating a fourth correlation ID and taking a fourth terminal ID corresponding to the fourth correlation ID as a target terminal ID so as to send the target terminal ID to the mobile terminal corresponding to B; compared with the method that whether the association ID is regenerated or not is determined through the first similarity, the fingerprints are classified, different weights are set according to the classification difference of the fingerprints, and then the similarity between two fingerprint lists can be obtained more accurately, so that whether the fingerprints are the same mobile terminal or not is determined accurately according to the second similarity, when different mobile terminals give new mobile terminal IDs, the safety of equipment is improved, and the safety of user information is improved.
Preferably, F' 0 =F 0
In the embodiment, the similarity between the two uploaded fingerprints is acquired through the fingerprint of the mobile terminal so as to determine whether the uploaded fingerprints are the same on the mobile terminal, and then whether the ID of the mobile terminal is updated is determined according to the similarity, so that the safety of the mobile terminal is improved.
As shown in fig. 2, in a specific embodiment, the method further comprises the steps of:
s200, obtaining an initial mapping list H 0
Specifically, the initial mapping list includes a first mapping list or an intermediate mapping list.
Further, the first mapping table is a relationship list constructed based on each first fingerprint and a mapping relationship between a first application software ID and a first association ID, where the first application software ID is an identifier used for characterizing the identity of the target application software when the mobile terminal uploads the fingerprint for the first time.
Further, the intermediate mapping list refers to a mapping table obtained by processing the first mapping table, where the step of updating the first mapping table may refer to S210-S270, and it is further understood that: all the first fingerprints and one in the first mapping tableAnd matching the first correlation IDs, wherein after the steps of S210-S270, any fingerprint in the intermediate mapping list can be matched with a plurality of correlation IDs. Further, before step S200, when the number of associated IDs corresponding to any fingerprint in the intermediate mapping list is greater than a preset threshold value of the number of associated IDs, taking the fingerprint in the intermediate mapping list as an abnormal fingerprint, and after deleting the abnormal fingerprint, constructing H 0 Preferably, a preset association ID number threshold may be set by a person skilled in the art according to actual requirements, and details are not described herein.
Above, H 0 Normal fingerprint is not found; the situations that the number of the associated IDs corresponding to any fingerprint in the intermediate mapping list is too large, and the load is too large and the memory is too much occupied during calculation can be avoided; meanwhile, when the number of the associated IDs corresponding to any fingerprint in the intermediate mapping list is too large, it is indicated that a large number of mobile devices all have the fingerprint, and therefore the fingerprint is deleted as an abnormal fingerprint.
S210, acquiring a third fingerprint list C = { C = { (C) 1 ,……,C i ,……,C m },C i Refers to the ith current fingerprint, wherein each of the third fingerprints in C is a division H 0 The method for acquiring the key fingerprint may refer to the method for acquiring the initial fingerprint, which is not described herein again.
S220, when C i And H 0 When any initial mapping fingerprint is consistent, the initial mapping fingerprint is used as a third intermediate fingerprint and is selected from H 0 And acquiring the association ID corresponding to the third intermediate fingerprint.
Specifically, the initial mapping fingerprint refers to a fingerprint in an initial mapping table.
S230, performing de-duplication processing on the association IDs corresponding to all the third intermediate fingerprints, obtaining an intermediate association ID list R = { R = { (R) } 1 ,……,R q ,……,R p },R q Refers to the q-th intermediate association ID, q =1 … … p, and p is the number of intermediate association IDs.
Specifically, the intermediate correlation ID refers to a correlation ID obtained by performing deduplication processing on correlation IDs corresponding to all third intermediate fingerprints, where a person skilled in the art may adopt any deduplication method in the prior art.
S240 according to R and H 0 And acquiring a first intermediate similarity list F = { F ] corresponding to the C 1 ,……, F q ,……,F p Wherein F is R q Corresponding first intermediate similarity.
Specifically, the first intermediate similarity refers to a similarity between fingerprints corresponding to any one of the intermediate association IDs in C and R, where the fingerprint corresponding to the intermediate association ID is obtained through an initial mapping table.
Further, each F q Can be obtained by referring to F 1 0 Obtaining method of (1) or F 2 0 The obtaining method is not described herein again.
Preferably, each of F q Are consistent and each F q Can be obtained by referring to F 1 0 The method of obtaining.
S250, traversing F and obtaining the maximum similarity from the F, so that the maximum similarity is taken as the target similarity F'.
Specifically, the method further includes the following steps in the step S250:
s2501, when the number of the maximum similarity degrees in F is equal to 1, taking the maximum similarity degree as a target similarity degree F'.
S2502, when the number of the maximum similarity in the F is larger than 1, determining the obtaining method of the F.
Specifically, the method for obtaining F refers to each F in F q The method of obtaining.
S2503, according to the obtaining method of the F, obtaining a second intermediate similarity list E = { E = { E = } 1 ,……, E y ,……,E g },E y Refers to the y-th second intermediate degree of similarity, y =1 … … g, g being the second intermediate degree of similarity number.
Further, the second intermediate similarity is obtained by adopting a method inconsistent with the obtaining method of the F based on the intermediate association ID corresponding to the maximum similarity in the F; for example, when firstMethod for obtaining intermediate similarity reference F 1 0 In the method for obtaining (1), the second intermediate similarity obtaining method is referred to as F 2 0 The method of obtaining.
S2504, traversing the E, obtaining the maximum similarity from the E, and taking the maximum similarity as the target similarity F'.
As described above, when the number of the maximum similarity degrees in F is 1, it can be understood that only one of the associated ID similarity degrees corresponding to the third intermediate fingerprint is the highest, that is, the maximum similarity degree is taken as the target similarity degree; when the number of the maximum similarities in F is greater than 1, it can be understood that there are a plurality of the highest associated ID similarities corresponding to the third intermediate fingerprint, and at this time, another method for obtaining F is adopted to further obtain the maximum similarity F', and the maximum similarities obtained by the two methods are more accurate.
S260, when F' > is larger than a preset target similarity threshold, each C is established i Mapping between intermediate associate IDs corresponding to F' and each C i The mapping relation between the intermediate association IDs corresponding to F' is inserted into H 0 In (1).
Specifically, the target similarity threshold is a first similarity threshold or a second similarity threshold, where the determination of the target similarity threshold based on the acquisition method according to F may be understood as: f q Reference F 1 0 In the method for acquiring, the target similarity threshold is a first similarity threshold; or, F q Reference F 2 0 In the method of (1), the target similarity threshold is a second similarity threshold.
S270, when the F' is less than or equal to the preset target similarity threshold value, the association ID is regenerated, the regenerated association ID is used as the designated association ID, and each C is established i A mapping relationship between the designated associate IDs corresponding to F' and each C i The mapping relation between the designated association IDs corresponding to F' is inserted into H 0 In (1).
Specifically, the specified associate ID refers to any associate ID except all intermediate associate IDs in R.
In the above examples, when F' > PreWhen a target similarity threshold is set, C is established i Mapping relation between intermediate association IDs corresponding to target similarity and inserting into H 0 In the method, a mapping relation between a third intermediate fingerprint and an intermediate association ID corresponding to the target similarity is established, so that updating is performed on the basis of an initial mapping table, and each key fingerprint can correspond to a plurality of key association IDs; when F' is less than or equal to the preset target similarity threshold value, the result shows that the similarity is not equal to C i The fingerprint list with higher similarity corresponds to the association ID, so as to generate a new association ID and combine each C i The mapping relation between the designated association IDs corresponding to F' is inserted into H 0 In the method, the mapping relation of the associated ID of the mobile terminal ID can be continuously updated, and the accurate associated ID of the mobile terminal ID can be determined through accurate fingerprints.
As shown in fig. 3, in a specific embodiment, the method further comprises the steps of:
s300, acquiring a current application software ID corresponding to the C, wherein the current application software ID is an identifier for representing the identity of the target application software when the mobile terminal acquires the current fingerprint;
s310, when the association ID corresponding to the current application software ID is null, taking the association ID corresponding to the C as the association ID corresponding to the current application software ID;
s320, when the associated ID corresponding to the current application software ID is not null, marking the associated ID corresponding to the current application software ID as R 0
S330, when R 0 ≠R' 0 When R is equal to R 0 Is replaced by R' 0 ,R' 0 Means each of C i Corresponding association ID, wherein each C i The corresponding association ID may be obtained with reference to steps S200-S270.
In the above, when the association ID corresponding to the current application software ID is null, it may be understood that the association ID is not generated by the target application software, and the association ID corresponding to the current fingerprint list is used as the association ID corresponding to the current application software ID; when the associated ID corresponding to the current application software ID is not null, the target application software can be understood to upload a fingerprint list, and when the associated ID is not null, the target application software can upload the fingerprint listR 0 ≠R' 0 That is, the associated ID corresponding to the application ID is not accurate, and each C in C is used i And the corresponding associated ID is returned to the target application software, so that the accuracy of the associated ID of the mobile terminal ID is improved, and the same equipment can be determined.
As shown in fig. 4, in a specific embodiment, the method further comprises the steps of:
s400, obtaining a target mapping list H' 0 Wherein, H' 0 Refers to H after processing through steps S200-S270 0 The specific implementation process of steps S200-S270 is not described herein.
S410, from H' 0 All the correlation IDs are obtained and based on all the correlation IDs, a first correlation ID list R '= { R' 1 ,……,R' a ,……,R' v },R' a Is H' 0 The (a) th first correlation ID, a =1 … … v, v is H' 0 The first number of associate IDs.
Specifically, R' 1 ≠……≠R' a ≠……≠R' v
S420, from H' 0 To obtain R' a All fingerprints corresponding and based on R' a All fingerprints are constructed as R' a A corresponding first list of target fingerprints.
S430, list and R 'based on first target fingerprint' a Obtaining a first target similarity list E 'from any corresponding second target fingerprint list' a ={E' a1 ,……,E' ab ,……,E' av-1 },E' ab Is R' a Corresponding first target fingerprint list and R' a The similarity between the corresponding b-th second target fingerprint list, b =1 … … v-1,v-1, is the second association ID number.
Specifically, the second fingerprint list is based on H' 0 The second association ID refers to the R 'except R' a Any other associate ID.
S440, when E' ab E 'when the target similarity threshold value is greater than the preset target similarity threshold value' ab Corresponding correlation ID is replaced by R' a
Specifically, E' ab Can be obtained by referring to F 1 0 Obtaining method of (1) or F 2 0 The obtaining method is not described herein again.
Preferably, E' ab Can refer to F 1 0 The method of obtaining.
Specifically, the target similarity threshold is a first similarity threshold or a second similarity threshold, wherein the target similarity threshold is based on the value according to E' ab The obtaining method of (1) determines the target similarity threshold, which may be understood as: e' ab Reference F 1 0 In the method for acquiring, the target similarity threshold is a first similarity threshold; or, E' ab Reference F 2 0 In the method of (3), the target similarity threshold is a second similarity threshold.
S450, when E' ab R 'when the target similarity threshold is less than or equal to the preset target similarity threshold' a Is H' 0 Is associated with the ID independently.
And S460, repeatedly executing the steps S400-S450 to obtain a final mapping list.
Above, based on H' 0 Obtaining a final mapping list of the target local application by repeatedly executing the steps S400-S450 for multiple times, wherein the mapping list is the final mapping list of the target local application when E' ab E 'is determined to be the same mobile terminal when the preset target similarity threshold value is greater than the preset target similarity threshold value' ab Corresponding correlation ID is replaced by R' a When E' ab And when the target similarity threshold is less than or equal to the preset target similarity threshold, determining that the mobile terminals are not the same mobile terminal, R' a Is H' 0 A medium independent association ID; the method and the device can cluster the associated IDs corresponding to the mobile terminals, and are beneficial to accurately determining whether other mobile devices are the same device.
As shown in fig. 5, in a specific embodiment, the method further obtains the ID of the target mobile terminal by:
s500, acquiring a first character string Z 1 Wherein Z is 1 For characterizing the version number of the target mobile terminal ID, a person skilled in the art can followThe actual requirement sets the string format of the version number of the mobile terminal ID.
S510, acquiring a second character string Z 2 Wherein, Z 2 The validity time T used to characterize the target mobile terminal ID.
Specifically, T satisfies the following condition:
T=T 0 + -T', wherein T 0 Refers to a preset time period, and T' refers to a random time period; it can be understood that: the preset time period is a preset fixed time period, and the random time period is a randomly selected time period.
Further, T 0 The value range of (A) is 10-50 days; preferably, T 0 Is taken for 30 days.
Further, the value range of T' is 6-48 hours; preferably, T' is 12 hours.
Based on the method, the ID of the target mobile terminal is unchanged in a certain time period, the purpose of identifying the mobile terminal is achieved, and a third party can identify the mobile equipment by using the ID of the mobile terminal; the timing expiration time comprises a random time period, so that the damage of the data processing server caused by excessive pressure on the data processing server due to the fact that a large number of mobile terminal IDs are expired at the same time is avoided.
S520, acquiring a third character string Z 3 Wherein Z is 3 The random character string is referred to, and those skilled in the art know that the random character string is set according to actual requirements, which is not described herein again.
Further, the random character string is an encrypted character string of 64 bits, and those skilled in the art adopt any encryption method in the prior art to encrypt the character string, which is not described herein again.
S530, acquiring a fourth character string Z 4 Wherein Z is 4 The check number used for characterizing the ID of the target mobile terminal is known to those skilled in the art to adopt any method for generating the check number in the prior art, for example, adopt CRC to generate the check number, and details are not repeated herein.
S540, mixing Z 1 、Z 2 、Z 3 And Z4 are combined in sequence to generate the ID of the target mobile terminalIt can be understood that: initial mobile terminal ID = Z 1 +Z 2 +Z 3 +Z 4
Specifically, the generation method of the target mobile terminal ID is consistent with that of the initial mobile terminal ID, and is not described herein again. Based on this, the target mobile terminal ID is represented by the first string Z 1 The second character string Z 2 The third character string Z 3 The fourth character string Z 4 The combination generates a target mobile terminal ID, marks the specific components of the mobile terminal ID, has a controlled mechanism, an expiration mechanism and an anonymity mechanism, and provides effective identification on the premise of ensuring the privacy of a user.
S550, obtaining a time interval delta T corresponding to the target mobile terminal ID, and regenerating the mobile terminal ID when the delta T is larger than T, so that the target mobile terminal ID is replaced by the regenerated mobile terminal ID, wherein the delta T meets the following conditions:
ΔT=T α -T β wherein, T α Current point in time, T β To generate a time point of the target mobile terminal ID.
The embodiment can relate to a complex mobile terminal ID format, prevent the complex mobile terminal ID format from being tampered or cracked, improve the safety of the mobile terminal, further improve the safety of user information, and meanwhile set effective time to realize regular updating.
As shown in fig. 6, in a specific embodiment, the method further comprises the steps of:
s600, obtaining an original mobile terminal ID list ZZ = { ZZ = 1 ,……,ZZ λ ……,ZZ u In which ZZ λ The number of the λ -th original mobile terminal ID provided by the target device is λ =1 … … u, u is the number of the original mobile terminal ID provided by the target device.
Specifically, the target device refers to any electronic device except a target mobile terminal and a target server, wherein the target mobile terminal refers to a mobile terminal installed with target application software, and the target server refers to a server communicated with the target mobile terminal.
Further, a mobile terminal ID is stored at the target mobile terminal and an association ID is stored at the target server.
Specifically, each ZZ λ The obtaining method can refer to steps S500 to S540, which are not described herein again.
S610, acquiring an ID list ZZ' of the middle mobile terminal according to ZZ.
Specifically, the intermediate mobile terminal ID list is also acquired in the step S610 by:
s6101, when there are more than two identical original mobile terminal IDs in ZZ, then any original mobile terminal ID corresponding to the same original mobile terminal ID is retained in the original mobile terminal ID list and other original mobile terminal IDs corresponding to the same original mobile terminal ID are deleted in ZZ;
s6102, obtaining ZZ λ ={Z λ1 、Z λ2 、Z λ3 、Z λ4 In which Z is λ1 Refers to the original mobile terminal ID λ First character string of, Z λ2 Refers to the original mobile terminal ID λ Of the second character string, Z λ3 Refers to the original mobile terminal ID λ Third string of characters, Z λ4 Refers to the original mobile terminal ID λ The fourth character string of (1);
s6103 when ZZ λ Corresponding time interval < Z λ2 Deleting ZZ in ZZ at the corresponding valid time λ Wherein ZZ λ The time interval acquisition method of (2) may refer to the time interval acquisition method of the target mobile terminal ID, Z λ2 The valid time obtaining method may refer to the valid time of the target mobile terminal ID, which is not described herein again.
S6104, pair Z λ4 Is analyzed and Z λ4 If the result of the analysis (2) is a failure, ZZ is deleted from ZZ λ (ii) a Those skilled in the art will appreciate that steps S6101-S6104 may be performed simultaneously to ensure that a valid list of intermediate mobile terminal IDs is obtained.
S620, obtaining the ratio K of the ID number h of the middle mobile terminal corresponding to ZZ 'to the ID number of the abnormal mobile terminal corresponding to ZZ'.
Specifically, the intermediate mobile terminal ID refers to any original mobile terminal ID in the intermediate mobile terminal ID.
Specifically, K satisfies the following condition: k = h 0 /h,h 0 The number of abnormal mobile terminal IDs corresponding to ZZ' is referred to, and the abnormal mobile terminal IDs are intermediate mobile terminal IDs in which a difference between a time interval of the mobile terminal IDs and a preset time period of the mobile terminal IDs is smaller than a random time period of the mobile terminal IDs in an intermediate mobile terminal ID list.
S630, when h is smaller than or equal to a preset mobile terminal ID number threshold h 'or K is smaller than or equal to a preset ratio threshold K', feeding back prompt information to the target device, wherein the prompt information is used for representing that an original mobile terminal ID list cannot be processed.
And S640, when h is larger than a preset mobile terminal ID number threshold h 'and K is larger than a preset ratio threshold K', acquiring a target mobile terminal ID list.
Specifically, the step S640 further includes the steps of:
s6401, acquiring all correlation IDs corresponding to any intermediate mobile terminal ID in ZZ 'and constructing a correlation ID list corresponding to ZZ' based on all correlation IDs corresponding to any intermediate mobile terminal ID in ZZ ', wherein the correlation ID list corresponding to ZZ' is subjected to correlation ID deduplication processing, and a method for deduplication processing is known by a person skilled in the art and is not repeated herein.
S6402, according to the association ID list corresponding to ZZ', a target association ID list is obtained from a mapping table between the mobile terminal ID and the association ID.
Specifically, the value of h 'ranges from 800 to 3000, and preferably, the value of h' is 1000.
Specifically, the value range of K' is 80% to 100%; preferably, K' is 99%.
Based on the above, when h is less than or equal to a preset mobile terminal ID number threshold h 'or K is less than or equal to a preset ratio threshold K', it is indicated that the number of abnormal mobile terminal IDs is too large in the original mobile terminal ID list, and the mobile terminal ID list is fed back to the target device to be not processed; when h is larger than a preset mobile terminal ID number threshold h 'and K is larger than a preset ratio threshold K', the number of the abnormal mobile terminal IDs is within a normal range, and a target mobile terminal ID list is obtained based on the relation between the mobile terminal IDs and the associated IDs; therefore, when the original mobile terminal ID list is updated, the third-party server obtains the mobile terminal ID and the associated ID in a many-to-many relationship, and the situation that the third party obtains a plurality of mobile terminal IDs of the same device is avoided, so that the third party decrypts the mobile terminal IDs and affects the safety of the device is avoided, and the safety of the device is improved.
Embodiments of the present invention also provide a non-transitory computer-readable storage medium, which may be disposed in an electronic device to store at least one instruction or at least one program for implementing a method of the method embodiments, where the at least one instruction or the at least one program is loaded into and executed by a processor to implement the method provided by the above embodiments.
Embodiments of the present invention also provide an electronic device comprising a processor and the aforementioned non-transitory computer-readable storage medium.
Although some specific embodiments of the present invention have been described in detail by way of illustration, it should be understood by those skilled in the art that the above illustration is only for the purpose of illustration and is not intended to limit the scope of the invention. It will also be appreciated by those skilled in the art that various modifications may be made to the embodiments without departing from the scope and spirit of the invention. The scope of the present disclosure is defined by the appended claims.

Claims (10)

1. A method for acquiring a mobile terminal ID is characterized by comprising the following steps:
s100 obtaining a first fingerprint list a = { a = 1 ,……,A i ,……,A m },A i I =1 … … m, where m is the number of first fingerprints;
s120 obtaining a second fingerprint list B = { B = { (B) } 1 ,……,B i ,……,B m },B i Means the ith secondA fingerprint;
s140, acquiring a second application software ID, and taking the second terminal ID as a target terminal ID when a second association ID corresponding to the second application software ID is not null, wherein the second terminal ID is the identity of the mobile terminal corresponding to the second association ID;
and S160, when the second associated ID corresponding to the second application software ID is null, acquiring the ID of the target terminal according to the A and the B.
2. The method of claim 1, further comprising the following steps before the step S100:
s1 acquiring a preset fingerprint configuration list T = { T = { (T) 1 ,……,T j ,……,T M In which T j J =1 … … M, wherein M is the preset feature quantity of the fingerprint type;
s3, obtaining an initial fingerprint A '= { A' 1 ,……,A′ x ,……,A′ z In which, A' x Refers to the x-th initial fingerprint, x =1 … … z, z is the number of initial fingerprints;
s5, when the mobile terminal is authorized and the fingerprint is uploaded for the first time by the mobile terminal, when the mobile terminal is A' x Corresponding fingerprint type and T j If consistent, mixing A' x As the first fingerprint.
3. The method of claim 1, wherein T is further obtained by:
s11, obtaining an original fingerprint list V = { V = { (V) 1 ,……,V r ,……,V s },V r =(V r1 ,V r2 ,V r3 ),V r1 Is the first degree value, V, of the r-th original fingerprint r2 Is the second degree value, V, of the r-th original fingerprint r3 The third degree value of the r-th original fingerprint is defined, r =1 … … s, and s is the number of the original fingerprints; s12, traversing V r And when V r1 Greater than a first degree threshold V 1 0 、V r2 Second degree threshold V 2 0 And V r3 Greater than a third degree threshold V 3 0 When it is, V will be r The corresponding original fingerprint has the corresponding fingerprint type inserted into T.
4. The method of claim 1, wherein the step S160 comprises the steps of:
s1601, acquiring a first terminal ID corresponding to the first association ID;
s1602, when any B i ≠A i Then, acquiring a first intermediate fingerprint number N and a second intermediate fingerprint number N;
s1603, acquiring a first similarity F according to m, N and N 1 0 Wherein F is 1 0 The following conditions are met:
Figure FDA0003828222200000021
s1604, when F 1 0 First similarity threshold F 0 Taking the first terminal ID as a target terminal ID, so that the target terminal ID is sent to a mobile terminal corresponding to the B;
s1605, when F 1 0 ≤F 0 And regenerating the third association ID and taking the third terminal ID corresponding to the third association ID as the target terminal ID.
5. The method of claim 4, wherein N + N = m.
6. The method of claim 1, wherein the step S160 comprises the steps of:
s1601, acquiring a first terminal ID corresponding to the first association ID;
s1602, when any B i ≠A i Then, the number n of the first intermediate fingerprints and the second intermediate fingerprints in the second intermediate fingerprint list are obtainedThe number of intermediate fingerprints N;
s1603, according to A, a first fingerprint quantity list D = { D is obtained 1 ,……,D t ,……,D k },D t The number of the fingerprints of the first fingerprints of the t-th class is defined, t =1 … … k, and k is the number of the types of the first fingerprints;
s1604, acquiring a second fingerprint number list D ' = { D ' according to all second intermediate fingerprints ' 1 ,……,D' t ,……,D' s },D' t Refers to the number of fingerprints of the t-th class second intermediate fingerprint;
s1605, according to D t And D' t Obtaining a second similarity F 2 0 Wherein, F 2 0 The following conditions are met:
Figure FDA0003828222200000022
wherein, W t Is referred to as D t A corresponding weight value;
s1606, when F 2 0 > second similarity threshold F' 0 When the mobile terminal is in a mobile terminal state, taking the first terminal ID as a target terminal ID, so that the target terminal ID is sent to the mobile terminal corresponding to the B;
s1607, when F 2 0 ≤F' 0 And regenerating the fourth correlation ID and taking the fourth terminal ID corresponding to the fourth correlation ID as the target terminal ID.
7. The method of claim 6, wherein D 'is the mobile terminal ID' 1 +……+D' t +……+D' k =N。
8. The method of claim 6, wherein D is the ID of the mobile terminal 1 +……+D t +……+D k =m。
9. A non-transitory computer-readable storage medium, wherein at least one instruction or at least one program is stored in the storage medium, and the at least one instruction or the at least one program is loaded by a processor and executed to implement the method for acquiring an ID of a mobile terminal according to any one of claims 1 to 8.
10. An electronic device comprising a processor and the non-transitory computer readable storage medium of claim 9.
CN202211067248.0A 2022-09-01 2022-09-01 Method, device and medium for acquiring mobile terminal ID Pending CN115484588A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211067248.0A CN115484588A (en) 2022-09-01 2022-09-01 Method, device and medium for acquiring mobile terminal ID

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211067248.0A CN115484588A (en) 2022-09-01 2022-09-01 Method, device and medium for acquiring mobile terminal ID

Publications (1)

Publication Number Publication Date
CN115484588A true CN115484588A (en) 2022-12-16

Family

ID=84422273

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211067248.0A Pending CN115484588A (en) 2022-09-01 2022-09-01 Method, device and medium for acquiring mobile terminal ID

Country Status (1)

Country Link
CN (1) CN115484588A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115795482A (en) * 2023-01-06 2023-03-14 杭州中电安科现代科技有限公司 Industrial control equipment safety management method, device, equipment and medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115795482A (en) * 2023-01-06 2023-03-14 杭州中电安科现代科技有限公司 Industrial control equipment safety management method, device, equipment and medium
CN115795482B (en) * 2023-01-06 2023-05-05 杭州中电安科现代科技有限公司 Method, device, equipment and medium for managing safety of industrial control equipment

Similar Documents

Publication Publication Date Title
JP2019126021A (en) System and method for achieving block chain type multi-element individual identity authentication
US8478768B1 (en) Privacy-preserving collaborative filtering
CN112926092A (en) Privacy-protecting identity information storage and identity authentication method and device
US11823197B2 (en) Authenticating based on user behavioral transaction patterns
WO2020186789A1 (en) User anti-fraud realization method and apparatus, computer device, and storage medium
CN109155736A (en) Data watermarking and fingerprinting system and method
CN115484588A (en) Method, device and medium for acquiring mobile terminal ID
US20180137149A1 (en) De-identification data generation apparatus, method, and non-transitory computer readable storage medium thereof
CN115510416A (en) Method, device and medium for updating mapping table of mobile terminal ID
Delgado-Mohatar et al. Blockchain meets biometrics: Concepts, application to template protection, and trends
KR102125784B1 (en) Verification method of voice recording data using blockchain
CN106341285A (en) Traffic identification method and device
Camacho et al. A cloud-oriented integrity verification system for audio forensics
CN109784918A (en) Information measure of supervision, device, equipment and storage medium based on block chain
CN117390657A (en) Data encryption method, device, computer equipment and storage medium
CN111027065B (en) Leucavirus identification method and device, electronic equipment and storage medium
CN115422553A (en) Data processing method, device and medium for updating mobile terminal ID
CN115510417A (en) Data processing method, device and medium for generating mobile terminal ID
CN116170162A (en) Selective consensus method, computer storage medium, and terminal device
CN117668798A (en) Data processing system for acquiring ID of mobile terminal
JP2020512630A (en) System and method for identifying leaked data and assigning guilty to suspected leakers
CN108494759A (en) A kind of access request processing method, system, equipment and storage medium
CN111475690A (en) Character string matching method and device, data detection method and server
CN111291336A (en) Game registration method and device in game platform
Alsolami et al. Cloud-id-screen: secure fingerprint data in the cloud

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination