CN117668798A - Data processing system for acquiring ID of mobile terminal - Google Patents

Data processing system for acquiring ID of mobile terminal Download PDF

Info

Publication number
CN117668798A
CN117668798A CN202211591903.2A CN202211591903A CN117668798A CN 117668798 A CN117668798 A CN 117668798A CN 202211591903 A CN202211591903 A CN 202211591903A CN 117668798 A CN117668798 A CN 117668798A
Authority
CN
China
Prior art keywords
mobile terminal
fingerprint
target
acquiring
association
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211591903.2A
Other languages
Chinese (zh)
Inventor
俞锋锋
方毅
王志豪
曾昱深
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Taierzhuoxin Technology Beijing Co ltd
Original Assignee
Taierzhuoxin Technology Beijing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Taierzhuoxin Technology Beijing Co ltd filed Critical Taierzhuoxin Technology Beijing Co ltd
Publication of CN117668798A publication Critical patent/CN117668798A/en
Pending legal-status Critical Current

Links

Abstract

The invention relates to the technical field of communication, in particular to a data processing system for acquiring an ID of a mobile terminal. The system comprises a processor and a memory storing a computer program which, when executed by the processor, performs the steps of: acquiring a fingerprint and an application software ID of a target terminal; acquiring an association ID according to the fingerprint of the target terminal and the ID of the application software; acquiring a target terminal ID according to the association ID; whether the equipment is the same equipment or not can be determined according to the twice acquired fingerprint list, the equipment ID is not updated when the equipment is the same equipment, and a new equipment ID is given when different equipment is different, so that the safety of the equipment is improved, and the safety of user information is further improved.

Description

Data processing system for acquiring ID of mobile terminal
Technical Field
The invention relates to the technical field of communication, in particular to a data processing system for acquiring an ID of a mobile terminal.
Background
The existing various device identifiers are unreasonable in design, so that the personal information can be easily tracked by all parties for a long time, the protection of the personal information is not considered, and the authorization consent of the user is not obtained. Meanwhile, various existing ID designs are easy to forge, so that a large amount of fake traffic is filled in the mobile Internet, and the health development of the industry is greatly influenced.
As the detection of application software by internet macro environment becomes more and more strict, it is also difficult for application software to acquire the unique identifier of the traditional unalterable device, and the acquisition rate of the variable advertisement identifier is also decreasing. The existing solutions of various IDs are all combat, do not form a system, and are difficult to communicate data. Both the "amount of brushing" and the omnibearing protection of user information are important, which has higher requirements for enterprise implementation solutions and also requires high cost. Thus, a widely accepted, non-falsified, variable, uniform device ID is essential to the whole industry.
Disclosure of Invention
Aiming at the technical problems, the invention adopts the following technical scheme: a data processing system for obtaining a mobile terminal ID, the system comprising: a processor and a memory storing a computer program which, when executed by the processor, performs the steps of:
acquiring a fingerprint and an application software ID of a target terminal;
acquiring an association ID according to the fingerprint of the target terminal and the ID of the application software;
and acquiring the ID of the target terminal according to the associated ID.
Compared with the prior art, the data processing system for acquiring the ID of the mobile terminal has obvious advantages and beneficial effects, by means of the technical scheme, the data processing system for acquiring the ID of the mobile terminal can achieve quite technical progress and practicality, has wide utilization value, and has at least the following advantages:
the fingerprint and the application software ID of the target terminal are acquired through the method; acquiring an association ID according to the fingerprint of the target terminal and the ID of the application software; acquiring a target terminal ID according to the association ID; according to the fingerprint list obtained twice, whether the equipment is the same equipment or not can be determined, the mobile terminal ID is not updated when the equipment is the same, and a new mobile terminal ID is given when different equipment is different, so that the safety of the equipment is improved, and the safety of user information is further improved.
The foregoing description is only an overview of the present invention, and is intended to be implemented in accordance with the teachings of the present invention, as well as the preferred embodiments thereof, together with the following detailed description of the invention, given by way of illustration only, together with the accompanying drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart of a data processing system executing a program for acquiring a mobile terminal ID according to an embodiment of the present invention
FIG. 2 is a flowchart of a data processing system executing a program for obtaining an ID of a mobile terminal according to an embodiment of the present invention;
FIG. 3 is a flowchart of a data processing system executing a program for obtaining a mobile terminal ID according to another embodiment of the present invention;
FIG. 4 is a flowchart of a data processing system executing a program for obtaining a mobile terminal ID according to another embodiment of the present invention;
FIG. 5 is a flowchart of a data processing system executing a program for obtaining a mobile terminal ID according to another embodiment of the present invention;
FIG. 6 is a flowchart of a data processing system executing a program for obtaining a mobile terminal ID according to another embodiment of the present invention;
fig. 7 is a flowchart of a data processing system executing a program for acquiring an ID of a mobile terminal according to another embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present invention, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed or inherent to such process, method, article, or apparatus, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Examples
The embodiment provides a data processing system for acquiring an ID of a mobile terminal, the system comprising: a processor and a memory storing a computer program which, when executed by the processor, performs the steps of, as shown in fig. 7:
acquiring fingerprints and an ID of application software;
acquiring an associated ID according to the fingerprint and the ID of the application software;
and acquiring the ID of the mobile terminal according to the association ID.
The specific procedure for acquiring the target terminal ID is as follows, as shown in fig. 1:
s100, acquiring a first fingerprint list A= { A 1 ,……,A i ,……,A m },A i Refers to the i first fingerprint, i= … … m, m being the first fingerprint number.
Specifically, the method further comprises the following steps before the step S100:
s1, acquiring a preset fingerprint configuration list T= { T 1 ,……,T j ,……,T M }, wherein T is j The j-th fingerprint type corresponding to the mobile terminal is indicated, j= … … M, and M is the preset feature quantity of the fingerprint type.
Further, in the method, the T is obtained through the following steps:
s11, acquiring an original fingerprint list V= { V 1 ,……,V r ,……,V s },V r =(V r1 ,V r2 ,V r3 ),V r1 Refers to the first degree value, V, of the r-th original fingerprint r2 Refers to the second degree value, V, of the r-th original fingerprint r3 Refers to the third degree value of the r original fingerprint, r= … … s, s is the number of original fingerprints.
Further, the first degree value characterizes the uniqueness of the original fingerprint, which can be understood as uniqueness, and those skilled in the art know any method in the prior art to obtain uniqueness, and the uniqueness is not described herein.
Further, the second degree value characterizes the stability of the original fingerprint, which can be understood as stability, and the person skilled in the art knows to obtain the stability by any method in the prior art, which is not described herein.
Further, the third degree value characterizes the saturation of the original fingerprint, and those skilled in the art know to take any method in the prior art to obtain the saturation, which is not described herein.
S12, traversing V r And when V r1 > first degree threshold V 1 0 、V r2 > second degree threshold V 2 0 And V r3 > third degree threshold V 3 0 When V is to r The fingerprint type corresponding to the corresponding original fingerprint is inserted into T.
Specifically, the original fingerprint refers to a fingerprint which cannot reflect the identity of the mobile terminal.
Specifically, V 1 0 As for the threshold value of the unique degree, those skilled in the art set the threshold value of the unique degree according to actual requirements, and will not be described herein.
Specifically, V 2 0 For the threshold of the stability degree, a person skilled in the art sets the threshold of the stability degree according to the actual requirement, which is not described herein.
Specifically, V 3 0 As for the saturation threshold, those skilled in the art set the saturation threshold according to actual requirements, and will not be described herein.
Further, m.ltoreq.m, preferably m=m=10.
S3, acquiring an initial fingerprint A '= { A' 1 ,……,A′ x ,……,A′ z And }, wherein A' x Refers to the x-th initial fingerprint, x= … … z, z being the initial fingerprint number.
Specifically, the initial fingerprint is an original fingerprint corresponding to a mobile terminal installed with target application software, wherein the type of the initial fingerprint is an anonymous fingerprint, and a person skilled in the art knows that any method in the prior art can be adopted to obtain the anonymous fingerprint, and the description is omitted herein; anonymous fingerprints can be adopted, so that terminal information is prevented from being revealed, and the safety of the mobile terminal is improved.
Further, those skilled in the art select the application software as the target application software according to the requirements, and will not be described herein.
S5, when the mobile terminal is authorized and the mobile terminal uploads the fingerprint for the first time, when A' x Corresponding fingerprint typeAnd T is j When the two phases are consistent, A 'is added' x As a first fingerprint.
The steps S1-S3 can select the fingerprint suitable for determining the similarity, and are favorable for accurately determining the similarity.
S120, acquiring a second fingerprint list B= { B 1 ,……,B i ,……,B m },B i Refers to the ith second fingerprint.
Specifically, the first association ID refers to an association ID generated when the mobile terminal uploads the fingerprint for the first time, where the association ID refers to an identity identifier associated with the mobile terminal ID, and further, the association ID is a randomly generated character string with a preset length, and those skilled in the art know that the preset length of the character string can be set according to requirements, which is not described herein again.
Specifically, the second fingerprint refers to an original fingerprint corresponding to the mobile terminal with the target application software installed under a non-first time point, wherein the non-first time point refers to any time point except the time point corresponding to the first fingerprint.
S140, acquiring a second application ID, and when a second association ID corresponding to the second application ID is not null, taking the second terminal ID as a target terminal ID, wherein the second terminal ID refers to the identity of the mobile terminal corresponding to the second association ID.
And S160, when the second association ID corresponding to the second application software ID is null, acquiring the target terminal ID according to the A and the B.
Specifically, the step S160 includes the steps of:
s1601, a first terminal ID corresponding to the first association ID is acquired.
Specifically, the first terminal ID characterizes a unique identity of the mobile terminal corresponding to the first association ID.
S1602, when any B i ≠A i And acquiring a first intermediate fingerprint number N and a second intermediate fingerprint number N.
Further, the first intermediate fingerprint refers to B in B i ≠A i Is a second fingerprint of (a).
Further, the second intermediate fingerprint refers to any order of second fingerprint in B other than the first intermediate fingerprint.
Further, n+n=m.
S1603, obtaining a first similarity F according to m, N and N 1 0 Wherein F is 1 0 Meets the following conditions:
s1604, when F 1 0 > first similarity threshold F 0 And taking the first terminal ID as a target terminal ID, so that the target terminal ID is sent to the mobile terminal corresponding to the B.
S1605, when F 1 0 ≤F 0 Regenerating a third association ID and taking a third terminal ID corresponding to the third association ID as a target terminal ID, so that the target terminal ID is sent to a mobile terminal corresponding to B; further understand that: when F 1 0 >F 0 When the similarity between the first fingerprint list and the second fingerprint list is high, the first fingerprint list and the second fingerprint list can be determined to be the same mobile terminal, and the first terminal ID is used as a target terminal ID to be sent to the corresponding mobile terminal; when F 1 0 ≤F 0 The first fingerprint list and the second fingerprint list are not high in similarity, the first fingerprint list and the second fingerprint list can be determined to be not the same mobile terminal, and the third terminal ID can be regenerated and sent to the corresponding mobile terminal.
Alternatively, in a specific embodiment, the step S160 includes the following steps:
s1601, a first terminal ID corresponding to the first association ID is acquired.
S1602, when any B i ≠A i And acquiring the first intermediate fingerprint number N and the second intermediate fingerprint number N in the second intermediate fingerprint list.
Further, the first intermediate fingerprint refers to B in B i ≠A i Is a second fingerprint of (a).
Further, the second intermediate fingerprint refers to any second fingerprint in B except the first intermediate fingerprint.
Further, n+n=m.
S1603, according to A, acquiring a first fingerprint quantity list D= { D 1 ,……,D t ,……,D k },D t Refers to the number of fingerprints of the first fingerprint of the t type, t= … … k, and k is the number of types of the first fingerprint.
Further, D 1 +……+D t +……+D k =m。
S1604, according to all the second intermediate fingerprints, a second fingerprint quantity list D ' = { D ' is obtained ' 1 ,……,D' t ,……,D' s },D' t Refers to the number of fingerprints of the t-th class second intermediate fingerprint.
Further, D' 1 +……+D' t +……+D' k =N。
S1605 according to D t And D' t Obtaining a second similarity F 2 0 Wherein F is 2 0 Meets the following conditions:
wherein W is t Refers to D t Corresponding weight values.
S1606, when F 2 0 > second similarity threshold F' 0 And when the first terminal ID is used as a target terminal ID, the target terminal ID is sent to the mobile terminal corresponding to the B.
S1607, when F 2 0 ≤F' 0 Regenerating a fourth association ID and taking a fourth terminal ID corresponding to the fourth association ID as a target terminal ID, so that the target terminal ID is sent to a mobile terminal corresponding to B; compared with the method that whether the association ID is regenerated or not is determined through the first similarity, the fingerprints are classified, different weights are set according to different classifications of the fingerprints, and then the similarity between two fingerprint lists can be acquired more accurately, so that whether the fingerprints are in the same movement or not is accurately determined according to the second similarityAnd when different mobile terminals give out new mobile terminal IDs, the terminal improves the safety of the equipment, and further improves the safety of user information.
Preferably F' 0 =F 0
In the above embodiment, the similarity between the two uploaded fingerprints is obtained through the fingerprints of the mobile terminal, so as to determine whether the fingerprints are the fingerprints uploaded by the same mobile terminal, and further determine whether to update the mobile terminal ID according to the similarity, thereby improving the security of the mobile terminal.
As shown in fig. 2, in a specific embodiment, the execution of the program by the processor further implements the steps of:
s200, obtaining an initial mapping list H 0
Specifically, the initial mapping list includes a first mapping list or an intermediate mapping list.
Further, the first mapping table refers to a relation list constructed based on each first fingerprint and a mapping relation between a first application ID and a first association ID, wherein the first application ID refers to an identifier for representing a target application identity when the mobile terminal uploads the fingerprint for the first time.
Further, the intermediate mapping list refers to a mapping table obtained by processing the first mapping table, where the step of updating the first mapping table may refer to S210-S270, which further includes the following steps: all the first fingerprints in the first mapping table are matched with one first association ID, and any fingerprint in the intermediate mapping list can be matched with a plurality of association IDs after passing through the steps S210-S270. Further, before step S200, when the number of association IDs corresponding to any fingerprint in the intermediate mapping list is greater than a preset threshold of the number of association IDs, the fingerprint in the intermediate mapping list is used as an abnormal fingerprint, and an H is constructed after deleting the abnormal fingerprint 0 Preferably, the preset threshold of the number of association IDs can be set by a person skilled in the art according to actual requirements, which is not described herein.
Above, H 0 The method has no abnormal fingerprints; any fingerprint in the intermediate mapping list can be avoidedThe corresponding quantity of the associated IDs is too large, so that the situation of overlarge load and excessive memory occupation is caused during calculation; meanwhile, when the number of associated IDs corresponding to any fingerprint in the intermediate mapping list is too large, a large number of mobile devices are indicated to have the fingerprint, and the fingerprint is deleted as an abnormal fingerprint.
S210, acquiring a third fingerprint list C= { C 1 ,……,C i ,……,C m },C i Refers to the ith current fingerprint, wherein each third fingerprint in C refers to the division of H 0 The method for obtaining the key fingerprint may refer to the method for obtaining the initial fingerprint, which is not described herein.
S220, when C i And H is 0 When any initial mapping fingerprint is consistent, the initial mapping fingerprint is used as a third intermediate fingerprint and is selected from H 0 And acquiring the association ID corresponding to the third intermediate fingerprint.
Specifically, the initial mapping fingerprint refers to a fingerprint in an initial mapping table.
S230, performing de-duplication processing on the associated IDs corresponding to all the third intermediate fingerprints to obtain an intermediate associated ID list R= { R 1 ,……,R q ,……,R p },R q Refers to the q-th intermediate association ID, q= … … p, p being the number of intermediate association IDs.
Specifically, the intermediate association ID refers to an association ID obtained after performing a deduplication process on association IDs corresponding to all third intermediate fingerprints, where any deduplication method in the prior art may be adopted by a person skilled in the art.
S240, according to R and H 0 Acquiring a first intermediate similarity list F= { F corresponding to C 1 ,……,F q ,……,F p And F is R q Corresponding first intermediate similarity.
Specifically, the first intermediate similarity refers to the similarity between fingerprints corresponding to any intermediate association ID in C and R, where the fingerprint corresponding to the intermediate association ID is obtained through an initial mapping table.
Further, each F q The acquisition method of (a) can refer to F 1 0 Acquisition method of (a) or F 2 0 The method of obtaining (c) is not described in detail herein.
Preferably, each F of F q Is consistent with the acquisition method of each F q The acquisition method of (a) can refer to F 1 0 Is provided.
S250, traversing F and acquiring the maximum similarity from F, so that the maximum similarity is taken as a target similarity F'.
Specifically, the step S250 further includes the steps of:
s2501, when the number of the maximum similarity in the F is equal to 1, taking the maximum similarity as a target similarity F'.
S2502, when the number of the maximum similarity in F is greater than 1, determining an acquisition method of F.
Specifically, the method for acquiring F refers to each F in F q Is provided.
S2503, according to the F acquisition method, acquiring a second intermediate similarity list E= { E 1 ,……,E y ,……,E g },E y Refers to the y second intermediate similarity, y= … … g, g being the second intermediate similarity number.
Further, the second intermediate similarity refers to a similarity obtained by adopting a method inconsistent with the obtaining method of F based on the intermediate association ID corresponding to the maximum similarity in F; for example, when the first intermediate similarity acquisition method refers to F 1 0 In the obtaining method of (2), the obtaining method of the second intermediate similarity needs to refer to F 2 0 Is provided.
S2504, traversing E, obtaining the maximum similarity from the E, and taking the maximum similarity as a target similarity F'.
When the number of the maximum similarity in the F is 1, it can be understood that only one of the association IDs corresponding to the third intermediate fingerprint has the highest similarity, that is, the maximum similarity is taken as the target similarity; when the number of the maximum similarity in F is greater than 1, it can be understood that there are a plurality of the maximum similarity of the associated IDs corresponding to the third intermediate fingerprint, and at this time, another method for obtaining F is adopted to obtain the maximum similarity F', and at the same time, the maximum similarity obtained by adopting the two methods is also more accurate.
S260, when F' is greater than a preset target similarity threshold, establishing each C i Mapping relation between intermediate associated IDs corresponding to F' and each C i The mapping relation between the intermediate associated IDs corresponding to F' is inserted into H 0 Is a kind of medium.
Specifically, the target similarity threshold is a first similarity threshold or a second similarity threshold, where determining the target similarity threshold based on the obtaining method according to F may be understood as: f (F) q Reference F 1 0 In the acquiring method of (2), the target similarity threshold is a first similarity threshold; alternatively F q Reference F 2 0 The target similarity threshold is a second similarity threshold.
S270, when F' is less than or equal to a preset target similarity threshold, regenerating the associated ID and taking the regenerated associated ID as a designated associated ID, and establishing each C i Mapping relation between specified associated IDs corresponding to F' and each C i The mapping relation between the appointed associated IDs corresponding to F' is inserted into H 0 Is a kind of medium.
Specifically, the specified association ID refers to any association ID except all intermediate association IDs in R.
In the above embodiment, C is established when F' > is greater than the preset target similarity threshold i Mapping relation between intermediate associated IDs corresponding to target similarity and inserted into H 0 In the method, a mapping relation between a third intermediate fingerprint and an intermediate associated ID corresponding to the target similarity is established, so that updating is performed on the basis of an initial mapping table, and each key fingerprint can correspond to a plurality of key associated IDs; when F'. Ltoreq.preset target similarity threshold, it is indicated that there is no correlation with C i The association ID corresponding to the fingerprint list with higher similarity, thereby generating a new association ID and generating each C i The mapping relation between the appointed associated IDs corresponding to F' is inserted into H 0 In which the mapping relation of the association ID of the mobile terminal ID can be continuously updatedThe method is beneficial to determining the association ID of the accurate mobile terminal ID through the accurate fingerprint.
As shown in fig. 3, in a specific embodiment, the execution of the program by the processor further implements the steps of:
s300, acquiring a current application ID corresponding to the C, wherein the current application ID is an identification used for representing the identity of the target application when the mobile terminal acquires the current fingerprint;
s310, when the association ID corresponding to the current application ID is null, taking the association ID corresponding to the C as the association ID corresponding to the current application ID;
s320, when the associated ID corresponding to the current application ID is not null, marking the associated ID corresponding to the current application ID as R 0
S330, when R 0 ≠R' 0 When R is taken 0 Replaced by R' 0 ,R' 0 Refers to each C of C i Corresponding association ID, wherein each C i The corresponding association ID may be acquired with reference to steps S200-S270.
When the association ID corresponding to the current application ID is null, it may be understood that the target application has not generated the association ID, and the association ID corresponding to the current fingerprint list is used as the association ID corresponding to the current application ID; when the association ID corresponding to the current application ID is not null, it can be understood that the target application is uploaded by the fingerprint list, when R 0 ≠R' 0 That is, the associated ID corresponding to the application ID is inaccurate, each C in the C is used i The corresponding associated ID is returned to the target application software, so that the accuracy of the associated ID of the mobile terminal ID is improved, and the same equipment can be determined.
As shown in fig. 4, in a specific embodiment, the processor executes a program to further implement the following steps:
s400, obtaining a target mapping list H' 0 Wherein H' 0 Refers to H after processing through steps S200-S270 0 The specific implementation process of steps S200-S270 is not described here again.
S410From H' 0 Acquiring all the associated IDs and constructing a first associated ID list R ' = { R ' based on all the associated IDs ' 1 ,……,R' a ,……,R' v },R' a Refers to H' 0 A= … … v, v is H' 0 Is the first association ID number in the database.
Specifically, R' 1 ≠……≠R' a ≠……≠R' v
S420 from H' 0 Obtain R' a All fingerprints corresponding and based on R' a All fingerprints corresponding to each other are constructed into R' a A corresponding first target fingerprint list.
S430, based on the first target fingerprint list and R' a Any corresponding second target fingerprint list is used for acquiring a first target similarity list E' a ={E' a1 ,……,E' ab ,……,E' av-1 },E' ab Refers to R' a Corresponding first target fingerprint list and R' a The corresponding b-th second target fingerprint list has a similarity, b= … … v-1, v-1 being the second association ID number.
In particular, the second finger list refers to a finger based on H' 0 A fingerprint list constructed by all fingerprints corresponding to a second association ID, wherein the second association ID is obtained by dividing R 'in R' a Any other association ID than the one.
S440, when E' ab When the preset target similarity threshold value is more than the preset target similarity threshold value, E 'is added' ab The corresponding association ID is replaced by R' a
Specifically E' ab The acquisition method of (a) can refer to F 1 0 Acquisition method of (a) or F 2 0 The method of obtaining (c) is not described in detail herein.
Preferably E' ab The acquisition method of (a) can refer to F 1 0 Is provided.
Specifically, the target similarity threshold is a first similarity threshold or a second similarity threshold, wherein the target similarity threshold is based on the similarity according to E' ab The determination of the target similarity threshold can be understood as: e's' ab Reference F 1 0 In the acquiring method of (2), the target similarity threshold is a first similarity threshold; alternatively, E' ab Reference F 2 0 The target similarity threshold is a second similarity threshold.
S450, when E' ab R 'is less than or equal to a preset target similarity threshold' a Is H' 0 Is associated with the ID.
S460, repeatedly executing the steps S400-S450 to obtain a final mapping list.
Based on H' 0 By repeating steps S400-S450 a plurality of times, a final mapping list of the target local application is obtained, based on which, when E' ab When the preset target similarity threshold is more than the preset target similarity threshold, the mobile terminal is considered to be the same mobile terminal, so E' ab The corresponding association ID is replaced by R' a When E' ab When the preset target similarity threshold value is less than or equal to the preset target similarity threshold value, the mobile terminal is not the same mobile terminal, R' a Is H' 0 An independent association ID; the association IDs corresponding to the mobile terminals can be clustered, and whether other mobile devices are the same device or not can be accurately determined.
As shown in fig. 5, in a specific embodiment, the processor executes a program to further implement the following steps:
s500, acquiring a first character string Z 1 Wherein Z is 1 The version number for characterizing the target mobile terminal ID can be set by those skilled in the art according to actual requirements.
S510, obtaining a second character string Z 2 Wherein Z is 2 A validity time T for characterizing the target mobile terminal ID.
Specifically, T meets the following conditions:
T=T 0 t', where T 0 The preset time period is indicated, and T' is indicated as a random time period; it can be understood that: the preset time period is a preset fixed time period, and the random time period is a randomly selected time period.
Further, T 0 The range of the value is 10-50 days;preferably T 0 The value of (2) is 30 days.
Further, the value range of T' is 6-48 hours; preferably, T' is 12 hours.
Based on the above, the target mobile terminal ID is unchanged in a certain period of time, so as to achieve the purpose of identifying the mobile terminal, and the third party can use the mobile terminal ID to identify the mobile device; the timing expiration time comprises a random time period, so that a large number of mobile terminal IDs expire at the same time, and the data processing server is prevented from being damaged due to excessive pressure.
S520, obtaining a third character string Z 3 Wherein Z is 3 The random character string is set according to actual requirements, which are known to those skilled in the art, and are not described herein.
Further, the random string is a 64-bit encryption string, and any encryption method in the prior art is adopted by a person skilled in the art to encrypt the string, which is not described herein.
S530, acquiring a fourth character string Z 4 Wherein Z is 4 The check number used to characterize the target mobile terminal ID is known to those skilled in the art that any method of generating the check number in the prior art, such as CRC generation check number, may be used, and will not be described in detail herein.
S540, Z 1 、Z 2 、Z 3 And Z4 are combined in order to generate a target mobile terminal ID, which can be understood as: initial mobile terminal id=z 1 +Z 2 +Z 3 +Z 4
Specifically, the target mobile terminal ID is consistent with the method for generating the initial mobile terminal ID, which is not described herein. Based on this, the target mobile terminal ID is composed of the first character string Z 1 Second character string Z 2 Third character string Z 3 Fourth character string Z 4 The combination is carried out to generate the target mobile terminal ID, specific components of the mobile terminal ID are marked, and the target mobile terminal ID has a controlled mechanism, an expiration mechanism and an anonymity mechanism, and provides effective identification on the premise of guaranteeing the privacy of users.
S550, acquiring a time interval delta T corresponding to the target mobile terminal ID, and regenerating the mobile terminal ID when delta T is more than T, so that the regenerated mobile terminal ID replaces the target mobile terminal ID, wherein delta T meets the following conditions:
ΔT=T α -T β wherein T is α Current time point, T β A point in time for generating a target mobile terminal ID.
The embodiment can relate to a complex mobile terminal ID format, prevent the mobile terminal ID from being tampered or cracked, improve the safety of the mobile terminal, further improve the safety of user information, and set effective time to realize periodic updating.
In a specific embodiment, as shown in fig. 6, the processor executes a program to further implement the following steps:
s600, acquiring an original mobile terminal ID list ZZ= { ZZ 1 ,……,ZZ λ ……,ZZ u }, where ZZ λ Refers to the lambda-th original mobile terminal ID provided by the target device, and lambda= … … u is the number of original mobile terminal IDs provided by the target device.
Specifically, the target device refers to any electronic device except a target mobile terminal and a target server, wherein the target mobile terminal refers to a mobile terminal installed with target application software, and the target server refers to a server communicated with the target mobile terminal.
Further, the mobile terminal ID is stored in the target mobile terminal and the association ID is stored in the target server.
Specifically, each ZZ λ The acquisition method of (a) can refer to steps S500-S540, and is not described herein.
S610, acquiring an intermediate mobile terminal ID list ZZ' according to ZZ.
Specifically, in step S610, the intermediate mobile terminal ID list is also acquired by:
s6101, when more than two identical original mobile terminal IDs exist in ZZ, reserving any one of the original mobile terminal IDs corresponding to the identical original mobile terminal ID in an original mobile terminal ID list, and deleting other original mobile terminal IDs corresponding to the identical original mobile terminal ID in ZZ;
s6102 obtaining ZZ λ ={Z λ1 、Z λ2 、Z λ3 、Z λ4 Z is }, where λ1 Refers to the original mobile terminal ID λ Is the first character string, Z λ2 Refers to the original mobile terminal ID λ And (Z) is the second character string of λ3 Refers to the original mobile terminal ID λ And (Z) is the third character string of λ4 Refers to the original mobile terminal ID λ A fourth string of (2);
s6103, as ZZ λ Corresponding time interval < Z λ2 Deleting ZZ in ZZ when the corresponding effective time is over λ Wherein ZZ λ The time interval acquisition method of (a) can refer to the time interval acquisition method of the target mobile terminal ID, Z λ2 The effective time obtaining method of (1) may refer to the effective time of the ID of the target mobile terminal and will not be described herein.
S6104, pair Z λ4 Analysis is carried out and Z λ4 If the analysis result of (1) is failure, deleting ZZ in ZZ λ The method comprises the steps of carrying out a first treatment on the surface of the Those skilled in the art will recognize that steps S6101-S6104 may be performed simultaneously to ensure that a valid list of intermediate mobile terminal IDs can be obtained.
S620, obtaining the ratio K of the number h of the intermediate mobile terminal IDs corresponding to ZZ 'and the number K of the abnormal mobile terminal IDs corresponding to ZZ'.
Specifically, the intermediate mobile terminal ID refers to any one of the original mobile terminal IDs in the intermediate mobile terminal IDs.
Specifically, K meets the following conditions: k=h 0 /h,h 0 The abnormal mobile terminal IDs are corresponding to ZZ', and the abnormal mobile terminal IDs are the middle mobile terminal IDs in the middle mobile terminal ID list, wherein the difference between the time interval of the mobile terminal IDs and the preset time period of the mobile terminal IDs is smaller than the random time period of the mobile terminal IDs.
S630, when h is smaller than or equal to a preset mobile terminal ID quantity threshold h 'or K is smaller than or equal to a preset ratio threshold K', feeding back prompt information to target equipment, wherein the prompt information is used for representing that an original mobile terminal ID list cannot be processed.
S640, when h is greater than a preset mobile terminal ID quantity threshold h 'and K is greater than a preset ratio threshold K', a target mobile terminal ID list is obtained.
Specifically, the step S640 further includes the steps of:
s6401, obtaining all associated IDs corresponding to any intermediate mobile terminal ID in ZZ 'and constructing an associated ID list corresponding to ZZ' based on all associated IDs corresponding to any intermediate mobile terminal ID in ZZ ', wherein the associated ID list corresponding to ZZ' is subjected to associated ID duplication removal processing, and a method of duplication removal processing is known to a person skilled in the art and is not described herein.
S6402, according to the associated ID list corresponding to ZZ', a target associated ID list is obtained from a mapping table between the mobile terminal ID and the associated ID.
Specifically, the value of h 'ranges from 800 to 3000, and preferably, the value of h' is 1000.
Specifically, the value range of K' is 80% to 100%; preferably, K' has a value of 99%.
Based on the above, when h is less than or equal to a preset mobile terminal ID quantity threshold h 'or K is less than or equal to a preset ratio threshold K', the situation that the quantity of abnormal mobile terminal IDs in the original mobile terminal ID list is too high is indicated, and the mobile terminal ID list is fed back to the target equipment to be not processed; when h is greater than a preset mobile terminal ID quantity threshold h 'and K is greater than a preset ratio threshold K', the quantity of abnormal mobile terminal IDs is in a normal range, and a target mobile terminal ID list is obtained based on the relation between the mobile terminal IDs and the associated IDs; therefore, when the original mobile terminal ID list is updated, the third party server acquires the mobile terminal IDs and the associated IDs in a many-to-many relationship, so that the third party is prevented from acquiring a plurality of mobile terminal IDs of the same device, the third party is prevented from decrypting the mobile terminal IDs and affecting the safety of the device, and the safety of the device is further improved.
While certain specific embodiments of the invention have been described in detail by way of example, it will be appreciated by those skilled in the art that the above examples are for illustration only and are not intended to limit the scope of the invention. Those skilled in the art will also appreciate that many modifications may be made to the embodiments without departing from the scope and spirit of the invention. The scope of the present disclosure is defined by the appended claims.

Claims (1)

1. A data processing system for obtaining a mobile terminal ID, the system comprising: a processor and a memory storing a computer program which, when executed by the processor, performs the steps of:
acquiring a fingerprint and an application software ID of a target terminal;
acquiring an association ID according to the fingerprint of the target terminal and the ID of the application software;
and acquiring the ID of the target terminal according to the associated ID.
CN202211591903.2A 2022-09-01 2022-12-09 Data processing system for acquiring ID of mobile terminal Pending CN117668798A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202211062819 2022-09-01
CN2022110628191 2022-09-01

Publications (1)

Publication Number Publication Date
CN117668798A true CN117668798A (en) 2024-03-08

Family

ID=90081376

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211591903.2A Pending CN117668798A (en) 2022-09-01 2022-12-09 Data processing system for acquiring ID of mobile terminal

Country Status (1)

Country Link
CN (1) CN117668798A (en)

Similar Documents

Publication Publication Date Title
Roy et al. Provably secure fine-grained data access control over multiple cloud servers in mobile cloud computing based healthcare applications
JP2019126021A (en) System and method for achieving block chain type multi-element individual identity authentication
US11146394B2 (en) Systems and methods for biometric key generation in data access control, data verification, and path selection in block chain-linked workforce data management
CN112926092A (en) Privacy-protecting identity information storage and identity authentication method and device
CN105681269A (en) Privacy preserving set-based biometric authentication
CN109636599A (en) License block chain secret protection and monitoring and managing method based on group ranking
EP1612643A2 (en) Call signs
Johnson et al. Secure voice-based authentication for mobile devices: vaulted voice verification
CN112257095A (en) Method for selecting alliance chain consensus node
CA2653204C (en) An automated adaptive method for identity verification with performance guarantees
EP3016315B1 (en) Method for authenticating a user holding a biometric certificate
AU2023201756B2 (en) Biometric digital signature generation for identity verification
KR102601509B1 (en) Biometric public key system providing revocable credentials
CN109829720A (en) A kind of identity real name authentication method based on block chain transaction data
CN115510416A (en) Method, device and medium for updating mapping table of mobile terminal ID
CN115484588A (en) Method, device and medium for acquiring mobile terminal ID
CN117668798A (en) Data processing system for acquiring ID of mobile terminal
CN117176324A (en) Cross-enterprise product ecological data trusted exchange method based on block chain code encryption
CN115510417A (en) Data processing method, device and medium for generating mobile terminal ID
CN115422553A (en) Data processing method, device and medium for updating mobile terminal ID
CN114465810B (en) Mobile quantum anonymous voting method based on non-maximum entangled GHZ state
CN108494759A (en) A kind of access request processing method, system, equipment and storage medium
RU2783069C1 (en) Generating a biometric digital signature for identity verification
Jiang et al. Robust Fingerprint of Privacy-Preserving Location Trajectories
Reddy Joint Framework for Access Control and Authentication using Blockchain over Cloud Environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication