CN118283610A - Mobile phone flow data monitoring method and device, electronic equipment and medium - Google Patents

Mobile phone flow data monitoring method and device, electronic equipment and medium Download PDF

Info

Publication number
CN118283610A
CN118283610A CN202410558563.6A CN202410558563A CN118283610A CN 118283610 A CN118283610 A CN 118283610A CN 202410558563 A CN202410558563 A CN 202410558563A CN 118283610 A CN118283610 A CN 118283610A
Authority
CN
China
Prior art keywords
application
target
coding
sequence
characters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410558563.6A
Other languages
Chinese (zh)
Inventor
卫博
张祖强
陈亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hualing Science And Technology Innovation Guangdong Co ltd
Original Assignee
Hualing Science And Technology Innovation Guangdong Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hualing Science And Technology Innovation Guangdong Co ltd filed Critical Hualing Science And Technology Innovation Guangdong Co ltd
Priority to CN202410558563.6A priority Critical patent/CN118283610A/en
Publication of CN118283610A publication Critical patent/CN118283610A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application provides a mobile phone flow data monitoring method, a mobile phone flow data monitoring device, electronic equipment and a medium. The mobile phone flow data monitoring method comprises the following steps: acquiring flow data corresponding to each target application in a mobile phone terminal and a device number of terminal equipment where the mobile phone terminal is located; importing flow data corresponding to each target application into a preset data table; the method comprises the steps of adopting a target coding table to code an application sequence which is ordered according to a preset application ordering rule in a data table in sequence, and obtaining a first coding value corresponding to the application sequence; character selection is carried out on the first coding value based on the equipment number, so that a first character is obtained; and generating an encryption password based on the first character, and encrypting the flow data list according to the encryption password to obtain encrypted data. According to the technical scheme provided by the embodiment of the application, the risk of data leakage in the data transmission process is effectively reduced, the user privacy data leakage is effectively avoided, and the data security is improved.

Description

Mobile phone flow data monitoring method and device, electronic equipment and medium
Technical Field
The present application relates to the field of data transmission, and in particular, to a method and apparatus for monitoring mobile phone traffic data, an electronic device, and a computer readable medium.
Background
The mobile phone terminal generally counts traffic usage information of various applications such as short videos, music, communication software, a browser and the like on the equipment, so that traffic usage conditions of the user can be known conveniently, and the mobile phone terminal sends the information to an operator service terminal for providing network services, so that the operator service terminal recommends reasonable traffic services for the user according to the traffic usage information and pushes the traffic services to the mobile phone terminal.
At present, the information transmission between the mobile phone end and the server end is mainly carried out in a plaintext form, but the information is sensitive privacy data of a user, if the information is intercepted illegally, the privacy data of the user are easy to leak, and therefore the risk of easy data leakage exists in the data transmission process of the mode, and the data security is low.
Disclosure of Invention
The embodiment of the application provides a mobile phone flow data monitoring method, a mobile phone flow data monitoring device, electronic equipment and a computer readable medium, which effectively reduce the risk of easy data leakage in the data transmission process, avoid the leakage of private data of a user and effectively improve the data security.
Other features and advantages of the application will be apparent from the following detailed description, or may be learned by the practice of the application.
According to one aspect of the embodiment of the application, there is provided a mobile phone traffic data monitoring method, including: acquiring flow data corresponding to each target application in the mobile phone terminal and a device number of a terminal device where the mobile phone terminal is located, wherein the target application is an application which runs under a target network and generates excessive flow of the mobile phone terminal; importing the flow data corresponding to each target application into a preset data table, wherein the data table comprises an application sequence obtained by sequencing each target application according to a preset application sequencing rule and a flow data list obtained by sequencing the flow data corresponding to each target application according to the preset application sequencing rule; the method comprises the steps of adopting a target coding table to code an application sequence which is ordered according to a preset application ordering rule in the data table in sequence, and obtaining a first coding value corresponding to the application sequence; performing character selection on the first coding value based on the equipment number to obtain a first character; generating an encryption password based on the first character, encrypting the flow data list according to the encryption password to obtain encrypted data, and sending the encrypted data, the first coding value and the equipment number to a server so that the server generates flow service pushing information based on the encrypted data, the first coding value and the equipment number; and receiving traffic service push information from the server side so as to select traffic service based on the traffic service push information.
Optionally, the target coding table includes a standard chinese coding table and a target english coding table, the standard chinese coding table includes all kanji characters and coded digits mapped to kanji characters, and the target english coding table includes all english characters and coded digits mapped to english characters; the English characters comprise uppercase and lowercase English letters, the application sequences which are sequenced according to a preset application sequencing rule in the data table are coded in sequence by adopting a target coding table, and a first coding value corresponding to the application sequences is obtained, and the method comprises the following steps: sequentially encoding the Chinese names of each target application of the application sequence based on the standard Chinese encoding table to obtain a second encoding value corresponding to the application sequence; encoding English names of all target applications of the application sequence in sequence based on the target English encoding table to obtain a third encoding value corresponding to the application sequence; determining the sum of the characters contained in the second code value and the total characters of the characters contained in the third code value, and taking the first digit of the sum of the total characters as a first marking digit; moving the code value corresponding to the target application of which the application sequence is positioned at the first few digits of the first marked number to the end of the second code value in the second code value corresponding to the application sequence to obtain an updated second code value; moving the code value corresponding to the target application of which the application sequence is positioned at the first few digits of the first marked number to the end of the third code value in the third code value corresponding to the application sequence to obtain an updated third code value; and generating a first code value corresponding to the application sequence based on the updated second code value and the updated third code value.
Optionally, the encoding the english names of each target application of the application sequence in sequence based on the target english encoding table, to obtain a third encoded value corresponding to the application sequence, includes: obtaining a standard Chinese coding table to code Chinese names corresponding to all applications in the application catalog in sequence to obtain a fourth coding value; performing hash calculation based on the fourth code value to obtain a hash value; determining English characters existing in the hash value and the equipment number as target characters, and generating an identification number based on the total number of characters of the target characters; adding the identification number to the tail of the coding number corresponding to the character identical to the target character in the standard English coding table, and generating the corresponding target English coding table; and encoding English names of all target applications of the application sequence in sequence based on the target English encoding table to obtain a third encoding value corresponding to the application sequence.
Optionally, the character selection is performed on the first code value based on the device number to obtain a first character, including: obtaining a first marked number based on the total number of characters corresponding to the character with the largest repeated occurrence number in the characters contained in the equipment number; obtaining a second marked number based on the total number of characters corresponding to the remaining characters after the duplication removal processing is performed on the characters contained in the equipment number; generating a rule selection sequence number based on the first marked number and the second marked number; if the first marked number and the second marked number are both units, taking the first marked number as a ten-digit number and taking the number formed by the second marked number as the unit as a rule to select a serial number; if more than ten digits exist in the first marked digit and the second marked digit, taking the sum of the digits of the first marked digit and the second marked digit as a rule to select a serial number; based on the rule selection sequence number, matching a corresponding character selection rule in a management database; wherein, the management database stores the mapping relation between the rule selection sequence number and the character selection rule; and based on the matched character selection rule, character selection is carried out on the first coding value, and the selected characters are sequentially combined to obtain the encryption password.
Optionally, the generating, by the server, traffic push information based on the encrypted data, the first encoded value, and the device number includes: decoding the first code value by adopting the target code table to obtain the corresponding application sequence; performing character selection on the first coding value based on the equipment number to obtain a second character; generating a decryption password based on the second character, and decrypting the encrypted data according to the decryption password to obtain the flow data list; based on the application sequence and the flow data list, obtaining flow data corresponding to each target application; and determining traffic service push information in a traffic service information base based on the traffic data corresponding to each target application.
According to an aspect of the embodiment of the present application, there is provided a mobile phone traffic data monitoring device, including: the mobile phone terminal comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring flow data corresponding to each target application in the mobile phone terminal and equipment numbers of terminal equipment where the mobile phone terminal is located, and the target application is an application which runs under a target network and generates excessive flow of the mobile phone terminal; an importing unit, configured to import flow data corresponding to each target application into a preset data table, where the data table includes an application sequence obtained by sequencing each target application according to a predetermined application sequencing rule, and a flow data list obtained by sequencing flow data corresponding to each target application according to a predetermined application sequencing rule; the coding unit is used for coding the application sequences sequenced according to a preset application sequencing rule in the data table in sequence by adopting a target coding table to obtain a first coding value corresponding to the application sequences; the selection unit is used for carrying out character selection on the first coding value based on the equipment number to obtain a first character; the encryption unit is used for generating an encryption password based on the first character, encrypting the flow data list according to the encryption password to obtain encrypted data, and sending the encrypted data, the first coding value and the equipment number to a server so that the server generates flow service pushing information based on the encrypted data, the first coding value and the equipment number; and the receiving unit is used for receiving the traffic service pushing information from the server side so as to select traffic service based on the traffic service pushing information.
Optionally, the target coding table includes a standard chinese coding table and a target english coding table, the standard chinese coding table includes all kanji characters and coded digits mapped to kanji characters, and the target english coding table includes all english characters and coded digits mapped to english characters; the English characters comprise uppercase and lowercase English letters, and the coding unit comprises: the first coding module is used for coding the Chinese names of each target application of the application sequence in sequence based on the standard Chinese coding table to obtain a second coding value corresponding to the application sequence; the second coding module is used for coding English names of all target applications of the application sequence in sequence based on the target English coding table to obtain a third coding value corresponding to the application sequence; the marking module is used for determining the sum of the characters contained in the second coding value and the total characters of the characters contained in the third coding value, and taking the first digit of the sum of the total characters as a first marking digit; the first moving module is used for moving the code value corresponding to the target application of which the application sequence is positioned at the first few digits of the first mark number to the end of the second code value in the second code value corresponding to the application sequence, so as to obtain an updated second code value; the second moving module is used for moving the code value corresponding to the target application of which the application sequence is positioned at the first few digits of the first mark number to the end of the third code value in the third code value corresponding to the application sequence, so as to obtain an updated third code value; and the generation module is used for generating a first code value corresponding to the application sequence based on the updated second code value and the updated third code value.
Optionally, the second encoding module includes: the first coding sub-module is used for obtaining a standard Chinese coding table to code Chinese names corresponding to all applications in the application catalog in sequence to obtain a fourth coding value; the calculation sub-module is used for carrying out hash calculation based on the fourth coding value to obtain a hash value; the generation submodule is used for determining English characters existing in the hash value and the equipment number as target characters and generating identification numbers based on the total number of the characters of the target characters; an adding sub-module, configured to add the identification number to the tail of a coding number corresponding to the same character as the target character in a standard english coding table, and generate a corresponding target english coding table; and the second coding submodule is used for coding English names of all target applications of the application sequence in sequence based on the target English coding table to obtain a third coding value corresponding to the application sequence.
According to an aspect of an embodiment of the present application, there is provided an electronic apparatus including: one or more processors; and the storage device is used for storing one or more programs, and when the one or more programs are executed by the one or more processors, the one or more processors are enabled to realize the mobile phone flow data monitoring method in the embodiment.
According to an aspect of the embodiments of the present application, there is provided a computer readable medium having stored thereon a computer program which, when executed by a processor, implements a method for monitoring traffic data of a mobile phone as described in the above embodiments.
In the technical solutions provided in some embodiments of the present application, by acquiring traffic data corresponding to each target application and importing the traffic data into a preset data table, an application sequence obtained by sequencing each target application according to a predetermined application sequencing rule is obtained, and traffic data corresponding to each target application is sequenced according to a predetermined application sequencing rule to obtain a traffic data list; sequentially encoding the application sequence by adopting a target encoding table to obtain a first encoding value corresponding to the application sequence; character selection is carried out on the first coding value based on the equipment number, so that a first character is obtained; generating an encryption password based on the first character, encrypting the flow data list according to the encryption password to obtain encrypted data, and sending the encrypted data, the first coding value and the equipment number to the server; because the application sequence and the flow data list are both ciphertext transmission, the server can successfully acquire the flow data corresponding to each target application of the mobile phone according to the encrypted data, the first coding value and the equipment number only by setting corresponding algorithm rules, and further the server can generate flow service pushing information based on the flow data corresponding to each target application of the mobile phone, so that the mobile phone can select the flow service based on the flow service pushing information. The traffic data corresponding to each target application in the mobile phone terminal is encrypted and transmitted in a specific mode, so that the risk of data leakage in the data transmission process is effectively reduced, the user privacy data leakage is effectively avoided, and the data security is improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application as claimed.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application. It is evident that the drawings in the following description are only some embodiments of the present application and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art. In the drawings:
Fig. 1 shows a flow chart of a method of monitoring traffic data of a mobile phone according to an embodiment of the application.
Fig. 2 shows a block diagram of a mobile phone traffic data monitoring device in an embodiment according to the application.
Fig. 3 shows a schematic diagram of a computer system suitable for use in implementing an embodiment of the application.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the application. One skilled in the relevant art will recognize, however, that the application may be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known methods, devices, implementations, or operations are not shown or described in detail to avoid obscuring aspects of the application.
The block diagrams depicted in the figures are merely functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow diagrams depicted in the figures are exemplary only, and do not necessarily include all of the elements and operations/steps, nor must they be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the order of actual execution may be changed according to actual situations.
Referring to fig. 1, fig. 1 shows a flowchart of a mobile phone traffic data monitoring method according to an embodiment of the present application, where the mobile phone traffic data monitoring method in this embodiment is applied to a mobile phone terminal, and the mobile phone traffic data monitoring method at least includes steps S110 to S160, which will be described in detail below.
Step S110, obtaining flow data corresponding to each target application in the mobile phone terminal and the equipment number of the mobile phone terminal, wherein the target application is an application which runs under a target network and generates excessive flow of the mobile phone terminal;
step S120, importing flow data corresponding to each target application into a preset data table, wherein the data table comprises an application sequence obtained by sequencing each target application according to a preset application sequencing rule and a flow data list obtained by sequencing the flow data corresponding to each target application according to the preset application sequencing rule;
step S130, an application sequence sequenced according to a preset application sequencing rule in a data table is coded in sequence by adopting a target coding table, and a first coding value corresponding to the application sequence is obtained;
Step S140, character selection is carried out on the first coding value based on the equipment number, and a first character is obtained;
Step S150, an encryption password is generated based on the first character, traffic data corresponding to each target application in the application list is encrypted according to the encryption password, encrypted data are obtained, the encrypted data, a first coding value and a device number are sent to a server, and the server generates traffic pushing information based on the encrypted data, the first coding value and the device number;
step S160, receiving traffic service pushing information from the server side to select traffic service based on the traffic service pushing information.
In this embodiment, the system architecture applying the technical scheme of the present application includes a mobile phone end and a server end, where the mobile phone end may be an electronic device such as a smart phone. The server side is a server, and the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and can also be a cloud server for providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, basic cloud computing services such as big data and artificial intelligent platforms. Various types of connection communication media for providing a communication link may be included between the handset side and the service side, such as a wired communication link or a wireless communication link. The mobile phone end sends the encrypted data and the first code value to the server end, so that the server end generates traffic service push information based on the encrypted data, the first code value and the equipment number; and receiving traffic service push information from the server to select traffic service based on the traffic service push information.
Specifically, as described in step S110, the mobile phone end obtains the flow data corresponding to each target application of the mobile phone end and the device number of the terminal device where the mobile phone end is located. The device number is identification information for uniquely identifying the terminal device where the mobile terminal is located, and is generally a character string composed of numbers and english letters, and of course, the device number may also include a specific symbol, which is not limited herein. The target application is an application that the mobile phone end operates under a target network and generates excessive traffic, and the target network includes one or more of 5G, 4G, 3G and 2G, which is not limited herein. The application is an application installed on the mobile phone end and can comprise various types of applications such as short video, music, communication software, video playing, shopping and the like.
As described in step S120, the data table is one type of table data storing two dimensional data, namely, the application sequence and the traffic data list corresponding to each target application. The application ordering rule is an ordering rule for ordering a plurality of different applications according to a predetermined ordering order. The application sequence is a sequence obtained by sequencing the target application according to the application sequencing rule, for example, the target application is A, B, C, D, wherein A, B, C, D refers to the Chinese name of the application, the application sequencing rule includes that B is in front of A, D is in front of C and A is in front of D, and then the generated application sequence is (B, A, D and C). And filling the flow data corresponding to each target application into the data table in sequence according to an application ordering rule to obtain a flow data list, wherein the flow data corresponding to four applications, such as A, B, C, D are a, B, C, D in sequence, and the flow data corresponding to B, A, D, C are also filled into the data table in sequence according to the arrangement sequence of B, A, D and C, so that the flow data list of (B, a, D and C) is obtained. It will be appreciated that the traffic data includes total traffic data used by each target application, and of course, traffic data used by the target application during each different period may also be included, which is not specifically limited herein.
As described in step S130, the server side uses the target coding table to code each application name in the application sequence ordered according to the predetermined application ordering rule in the data table in order to obtain the first coding value corresponding to the application sequence, where the target coding table includes all application names and the coding numbers mapped by the application names one by one, and the target coding table is used to code each application name in the application sequence as a number. Through the target coding table, each application name in the application sequence can be coded, so that target application information which runs under a target network and generates excessive flow at the mobile phone end is converted into ciphertext information, and leakage of data information can be effectively prevented.
As described in step S140, the character selection is performed on the first code value based on the device number, so as to obtain the first character. In this embodiment, a specific character selection rule may be obtained according to the device number, where the character selection rule refers to a rule of selecting a corresponding character from a character string, for example, selecting the first three characters and the last three characters, or selecting the characters on the first, second, fourth, fifth, eighth, and ninth digits, which is not limited herein specifically.
In one embodiment, performing character selection on the first code value based on the device number to obtain a first character includes:
Obtaining a first marked number based on the total number of characters corresponding to the character with the largest repeated occurrence number in the characters contained in the equipment number; and obtaining a second marked number based on the total number of characters corresponding to the remaining characters after the duplicate removal processing is carried out on the characters contained in the equipment number. The device number may include more characters, for example, the device number is the string "FFWDL2WOD1DD2021090", and it can be seen that, in the string corresponding to the device number, the character with the largest occurrence number is "D", the total number of characters of the character "D" is 4, and the first flag number is "4". The character string obtained after the duplicate removal of the character string corresponding to the equipment number is 'FWDL 2O 109', the total number of characters corresponding to the remaining characters after the duplicate removal of the characters contained in the equipment number is 9, and the second marked number is '9'.
Generating a rule selection sequence number based on the first marked number and the second marked number; if the first marked number and the second marked number are both ones, the first marked number is used as a tens number, and the number formed by the second marked number as the ones is used as a rule selection sequence number; if more than ten digits exist in the first marked digit and the second marked digit, the sum of the digits of the first marked digit and the second marked digit is used as a rule to select a serial number. For example, if the first marker number is "4", the second marker number is "9", and since both the first marker number and the second marker number are unit numbers, the rule selects the sequence number to be "49"; if the first marked number is "4", the second marked number is "11", and since the second marked number is a number having ten or more digits, the rule selects the sequence number as "15".
Based on the rule selection sequence number, matching corresponding character selection rules in the management database; wherein, the management database stores the mapping relation between the rule selection sequence number and the character selection rule. The management database stores the mapping relation between the rule selection sequence number and the character selection rule; the character selection rules corresponding to the different rule selection sequence numbers are different, if the character selection rule corresponding to the rule selection sequence number of 15 is that the first three characters and the last three characters are selected, and the character selection rule corresponding to the rule selection sequence number of 49 is that the characters on the first, second, fourth, fifth, eighth and ninth digits are selected. And based on the matched character selection rule, character selection is carried out on the first coding value, and the selected characters are sequentially combined to obtain the encryption password.
In the scheme of the embodiment, a specific character selection rule can be selected based on the specificity of the device number, when the device number of the mobile phone terminal changes, the character selection rule is different, and further the subsequent encryption password generation result is directly affected, so that only a specific mobile phone terminal can generate a correct and effective encryption password, other terminal devices cannot generate a correct encryption password, and the generated encryption password has specificity.
As described in step S150, an encryption password is generated based on the first character, the traffic data list is encrypted according to the encryption password to obtain encrypted data, and the encrypted data, the first code value and the device number are sent to the server, so that the server generates traffic push information based on the encrypted data, the first code value and the device number. The mobile phone terminal can directly take the first character as a corresponding encryption password, and encrypt the flow data list according to the encryption password to obtain encrypted data. The server side is provided with an algorithm rule corresponding to the mobile phone side, so that the server side can obtain flow data corresponding to each target application which runs under the target network and generates excessive flow of the mobile phone side based on the encrypted data, the first coding value and the equipment number, and further according to the flow data corresponding to each target application, flow service pushing information suitable for pushing to the mobile phone side is determined in a flow service information base.
In one embodiment, the service end generates traffic push information based on the encrypted data, the first encoded value, and the device number, including:
and decoding the first code value by adopting a target code table to obtain a corresponding application sequence. The server is provided with an algorithm rule corresponding to the mobile phone, and a corresponding application sequence can be obtained by decoding the first coding value.
Character selection is carried out on the first coding value based on the equipment number, so that a second character is obtained; generating a decryption password based on the second character, and decrypting the encrypted data according to the decryption password to obtain a flow data list; and obtaining flow data corresponding to each target application based on the application sequence and the flow data list. The server generates a decryption password corresponding to or identical to the encryption password based on an algorithm rule corresponding to the server, and decrypts the encrypted data according to the decryption password to obtain a flow data list. And when the flow data list is obtained, the flow data corresponding to each target application of the mobile phone end can be obtained only by associating and corresponding the flow data corresponding to each target application of the application sequence in sequence.
And determining traffic pushing information in a traffic service information base based on traffic data corresponding to each target application. After obtaining the traffic data used by each target application of the mobile phone running under the target network and generating the excessive traffic, the server can determine the type corresponding to all the target applications used by the mobile phone and the traffic ratio of which types of applications are highest according to the traffic data used by each target application of the mobile phone running under the target network and generating the excessive traffic, and then determine traffic pushing information in a traffic information base according to the information, so as to generate traffic pushing information with high matching degree with the traffic using information of the mobile phone according to the traffic using information corresponding to each target application used by the mobile phone.
As described in step S160, the traffic push information from the server is received to select the traffic based on the traffic push information. So that the user can reasonably select the traffic service according to the traffic service push information of the mobile phone terminal.
In the technical scheme of the embodiment, by acquiring flow data corresponding to each target application and importing the flow data into a preset data table, an application sequence obtained by sequencing each target application according to a preset application sequencing rule is obtained, and a flow data list is obtained by sequencing the flow data corresponding to each target application according to the preset application sequencing rule; sequentially encoding the application sequence by adopting a target encoding table to obtain a first encoding value corresponding to the application sequence; character selection is carried out on the first coding value based on the equipment number, so that a first character is obtained; generating an encryption password based on the first character, encrypting the flow data list according to the encryption password to obtain encrypted data, and sending the encrypted data, the first coding value and the equipment number to the server; because the application sequence and the flow data list are both ciphertext transmission, the server can successfully acquire the flow data corresponding to each target application of the mobile phone according to the encrypted data, the first coding value and the equipment number only by setting corresponding algorithm rules, and further the server can generate flow service pushing information based on the flow data corresponding to each target application of the mobile phone, so that the mobile phone can select the flow service based on the flow service pushing information. The traffic data corresponding to each target application in the mobile phone terminal is encrypted and transmitted in a specific mode, so that the risk of data leakage in the data transmission process is effectively reduced, the user privacy data leakage is effectively avoided, and the data security is improved.
In one embodiment, in order to improve the specificity of encoding an application sequence, the target encoding table includes a standard chinese encoding table and a target english encoding table, and the encoding of the application sequence ordered according to a predetermined application ordering rule in the data table by using the target encoding table, to obtain a first encoding value corresponding to the application sequence specifically includes:
And encoding the Chinese names of each target application of the application sequence in sequence based on a standard Chinese encoding table to obtain a second encoding value corresponding to the application sequence. The standard Chinese coding table comprises all Chinese characters and coding numbers mapped with the Chinese characters one by one, the coding numbers corresponding to the Chinese names of each target application can be obtained according to the standard Chinese coding table, and then the second coding values corresponding to the application sequences are obtained according to the coding numbers corresponding to each Chinese name in sequence.
And encoding English names of all target applications of the application sequence in sequence based on the target English encoding table to obtain a third encoding value corresponding to the application sequence. The target English coding table comprises all English characters and coded numbers mapped with the English characters one by one; the English characters comprise uppercase and lowercase English letters, the code numbers corresponding to the English names of each target application can be obtained according to the target English code table, and then the third code values corresponding to the application sequences are obtained according to the code numbers corresponding to the English names of each target application in sequence.
Determining the sum of the characters contained in the second code value and the total characters of the characters contained in the third code value, and taking the first digit of the sum of the total characters as a first marking digit; moving the code value corresponding to the target application of which the application sequence is positioned at the first few digits of the first marked number to the end of the second code value in the second code value corresponding to the application sequence, and obtaining an updated second code value; and moving the code value corresponding to the target application of which the application sequence is positioned at the first few digits of the first marked number to the end of the third code value in the third code value corresponding to the application sequence, so as to obtain an updated third code value. And obtaining a first code value corresponding to the application sequence based on the updated second code value and the updated third code value. It can be understood that, if the first digit of the sum of the total characters is "2", the code values corresponding to the first two target applications in the second code values corresponding to the application sequences are moved to the end of the second code values, so as to obtain updated second code values. And similarly, the code values which are arranged in the third code values corresponding to the application sequences and correspond to the first two target applications are moved to the tail end of the third code values, so that updated second code values are obtained. When the first code value corresponding to the application sequence is obtained based on the updated second code value and the updated third code value, the updated second code value and the updated third code value may be combined to obtain the first code value corresponding to the application sequence, where the updated second code value is placed before the updated third code value, or may be placed after the updated third code value, which is not limited herein.
In this embodiment, since the Chinese names and the English names corresponding to the target applications of the application sequence are respectively encoded and then recombined, the encoding specificity of the application sequence is effectively ensured, and in addition, the sequence of the target applications of the application sequence is disturbed according to the sum of the characters contained in the second encoding value and the total characters of the characters contained in the third encoding value, even if the target encoding table is known, specific target application information cannot be obtained, the risk of data leakage in the data transmission process is effectively reduced, and the data security is improved.
In one embodiment, a scheme for arranging the coding table is also provided, which is used for improving the specificity of coding, so that the coding security can be enhanced, and the generated encryption password is prevented from being easily cracked. Specifically, encoding english names of each target application of the application sequence in sequence based on the target english encoding table to obtain a third encoded value corresponding to the application sequence, including:
And obtaining a standard Chinese coding table to code Chinese names corresponding to all applications in the application catalog in sequence, so as to obtain a fourth coding value. The standard Chinese coding table comprises all Chinese characters and coding numbers mapped with the Chinese characters one by one, the coding numbers corresponding to the Chinese names of each target application can be obtained according to the standard Chinese coding table, and further the fourth coding values corresponding to the application sequences are obtained according to the coding numbers corresponding to each Chinese name in sequence.
And carrying out hash calculation based on the fourth code value to obtain a hash value. The hash calculation may be performed by using an MD5 information digest algorithm, or may be performed by using other hash algorithms, which are not limited herein.
And determining English characters existing in the hash value and the equipment number as target characters, and generating an identification number based on the total number of characters of the target characters. Traversing all characters in the hash value and the equipment number, determining all English characters existing in the hash value and the equipment number as target characters, counting the total number of characters corresponding to the target characters, and generating an identification number. For example, the target character is "W", "F", and the identification number is "2".
And adding an identification number to the tail part of a coding number corresponding to the character identical to the target character in the standard English coding table, and generating the corresponding target English coding table. The standard english encoding table may be an ASCII encoding table, or may be another standard english encoding table, which is not limited herein. And adding an identification number to the tail part of the code number corresponding to the character identical to the target character in the standard English code table to generate a corresponding target English code table. If the code number of the english character "a" is "65", the identification number is "2", and the new code number corresponding to the new english character "a" is "652".
And encoding English names of all target applications of the application sequence in sequence based on the target English encoding table to obtain a third encoding value corresponding to the application sequence.
The target English code table obtained after the standard English code table is rearranged has uniqueness, other users cannot obtain the target English code table on the premise of not knowing the corresponding arrangement rule, the correct encryption password cannot be generated, and the coding safety is improved.
The following describes an embodiment of the device of the present application, which may be used to execute the method for monitoring mobile traffic data in the foregoing embodiment of the present application. For details not disclosed in the embodiment of the device of the present application, please refer to the embodiment of the method for monitoring mobile phone traffic data described above.
Fig. 2 shows a block diagram of a mobile phone traffic data monitoring device according to an embodiment of the application.
Referring to fig. 2, a mobile phone traffic data monitoring device 200 according to an embodiment of the present application includes: acquisition unit 210, import unit 220, encoding unit 230, selection unit 240, encryption unit 250, and reception unit 260. An obtaining unit 210, configured to obtain flow data corresponding to each target application in the mobile phone end and a device number of a terminal device where the mobile phone end is located, where the target application is an application that the mobile phone end operates under a target network and generates excessive flow; an importing unit 220, configured to import flow data corresponding to each target application into a preset data table, where the data table includes an application sequence obtained by sequencing each target application according to a predetermined application sequencing rule, and a flow data list obtained by sequencing flow data corresponding to each target application according to a predetermined application sequencing rule; an encoding unit 230, configured to encode, in order, an application sequence ordered according to a predetermined application ordering rule in the data table by using a target encoding table, to obtain a first encoded value corresponding to the application sequence; a selecting unit 240, configured to perform character selection on the first code value based on the device number, so as to obtain a first character; an encryption unit 250, configured to generate an encryption password based on the first character, encrypt the traffic data list according to the encryption password, obtain encrypted data, and send the encrypted data, the first encoded value, and the device number to a server, so that the server generates traffic service push information based on the encrypted data, the first encoded value, and the device number; the receiving unit 260 is configured to receive traffic service push information from the server, so as to select a traffic service based on the traffic service push information.
In some embodiments of the present application, based on the foregoing, the target encoding table includes a standard chinese encoding table including all kanji characters and encoding numbers mapped one-to-one with kanji characters and a target english encoding table including all english characters and encoding numbers mapped one-to-one with english characters; the english characters include uppercase and lowercase english alphabets, and the encoding unit 230 includes: the first coding module is used for coding the Chinese names of each target application of the application sequence in sequence based on the standard Chinese coding table to obtain a second coding value corresponding to the application sequence; the second coding module is used for coding English names of all target applications of the application sequence in sequence based on the target English coding table to obtain a third coding value corresponding to the application sequence; the marking module is used for determining the sum of the characters contained in the second coding value and the total characters of the characters contained in the third coding value, and taking the first digit of the sum of the total characters as a first marking digit; the first moving module is used for moving the code value corresponding to the target application of which the application sequence is positioned at the first few digits of the first mark number to the end of the second code value in the second code value corresponding to the application sequence, so as to obtain an updated second code value; the second moving module is used for moving the code value corresponding to the target application of which the application sequence is positioned at the first few digits of the first mark number to the end of the third code value in the third code value corresponding to the application sequence, so as to obtain an updated third code value; and the generation module is used for generating a first code value corresponding to the application sequence based on the updated second code value and the updated third code value.
In some embodiments of the application, based on the foregoing, the second encoding module includes: the first coding sub-module is used for obtaining a standard Chinese coding table to code Chinese names corresponding to all applications in the application catalog in sequence to obtain a fourth coding value; the calculation sub-module is used for carrying out hash calculation based on the fourth coding value to obtain a hash value; the generation submodule is used for determining English characters existing in the hash value and the equipment number as target characters and generating identification numbers based on the total number of the characters of the target characters; an adding sub-module, configured to add the identification number to the tail of a coding number corresponding to the same character as the target character in a standard english coding table, and generate a corresponding target english coding table; and the second coding submodule is used for coding English names of all target applications of the application sequence in sequence based on the target English coding table to obtain a third coding value corresponding to the application sequence.
In some embodiments of the present application, based on the foregoing scheme, the selecting unit 240 is specifically configured to obtain the first tag number based on a total number of characters corresponding to a character with the largest number of repeated occurrences among the characters included in the device number; obtaining a second marked number based on the total number of characters corresponding to the remaining characters after the duplication removal processing is performed on the characters contained in the equipment number; generating a rule selection sequence number based on the first marked number and the second marked number; if the first marked number and the second marked number are both units, taking the first marked number as a ten-digit number and taking the number formed by the second marked number as the unit as a rule to select a serial number; if more than ten digits exist in the first marked digit and the second marked digit, taking the sum of the digits of the first marked digit and the second marked digit as a rule to select a serial number; based on the rule selection sequence number, matching a corresponding character selection rule in a management database; wherein, the management database stores the mapping relation between the rule selection sequence number and the character selection rule; and based on the matched character selection rule, character selection is carried out on the first coding value, and the selected characters are sequentially combined to obtain the encryption password.
In some embodiments of the present application, based on the foregoing solution, the generating, by the server, traffic push information based on the encrypted data, the first encoded value, and the device number includes: decoding the first code value by adopting the target code table to obtain the corresponding application sequence; performing character selection on the first coding value based on the equipment number to obtain a second character; generating a decryption password based on the second character, and decrypting the encrypted data according to the decryption password to obtain the flow data list; based on the application sequence and the flow data list, obtaining flow data corresponding to each target application; and determining traffic service push information in a traffic service information base based on the traffic data corresponding to each target application.
Fig. 3 shows a schematic diagram of a computer system suitable for use in implementing an embodiment of the application.
It should be noted that, the computer system 300 of the electronic device shown in fig. 3 is only an example, and should not impose any limitation on the functions and the application scope of the embodiments of the present application.
As shown in fig. 3, the computer system 300 includes a central processing unit (Central Processing Unit, CPU) 301 that can perform various appropriate actions and processes, such as performing the methods described in the above embodiments, according to a program stored in a Read-Only Memory (ROM) 302 or a program loaded from a storage section 308 into a random access Memory (Random Access Memory, RAM) 303. In the RAM 303, various programs and data required for the system operation are also stored. The CPU 301, ROM 302, and RAM 303 are connected to each other through a bus 304. An Input/Output (I/O) interface 305 is also connected to bus 304.
The following components are connected to the I/O interface 305: an input section 306 including a keyboard, a mouse, and the like; an output portion 307 including a Cathode Ray Tube (CRT), a Liquid crystal display (Liquid CRYSTAL DISPLAY, LCD), and a speaker, etc.; a storage section 308 including a hard disk or the like; and a communication section 309 including a network interface card such as a LAN (Local Area Network ) card, a modem, or the like. The communication section 309 performs communication processing via a network such as the internet. The drive 310 is also connected to the I/O interface 305 as needed. A removable medium 311 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed on the drive 310 as needed, so that a computer program read therefrom is installed into the storage section 308 as needed.
In particular, according to embodiments of the present application, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present application include a computer-readable medium including a computer program embodied on the computer-readable medium, the computer program including a computer program for performing the method shown in the flowchart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 309, and/or installed from the removable medium 311. When executed by a Central Processing Unit (CPU) 301, performs the various functions defined in the system of the present application.
It should be noted that, the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-Only Memory (ROM), an erasable programmable read-Only Memory (Erasable Programmable Read Only Memory, EPROM), a flash Memory, an optical fiber, a portable compact disc read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with a computer-readable computer program embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. A computer program embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Where each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present application may be implemented by software, or may be implemented by hardware, and the described units may also be provided in a processor. Wherein the names of the units do not constitute a limitation of the units themselves in some cases.
As another aspect, the present application also provides a computer-readable medium that may be contained in the electronic device described in the above embodiment; or may exist alone without being incorporated into the electronic device. The computer-readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to implement the methods described in the above embodiments.
It should be noted that although in the above detailed description several modules or units of a device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functions of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the application. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a U-disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, a touch terminal, or a network device, etc.) to perform the method according to the embodiments of the present application.
Other embodiments of the application will be apparent to those skilled in the art from consideration of the specification and practice of the embodiments disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains.
It is to be understood that the application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. The mobile phone flow data monitoring method is characterized by being applied to a mobile phone end and comprising the following steps:
Acquiring flow data corresponding to each target application in the mobile phone terminal and a device number of a terminal device where the mobile phone terminal is located, wherein the target application is an application which runs under a target network and generates excessive flow of the mobile phone terminal;
Importing the flow data corresponding to each target application into a preset data table, wherein the data table comprises an application sequence obtained by sequencing each target application according to a preset application sequencing rule and a flow data list obtained by sequencing the flow data corresponding to each target application according to the preset application sequencing rule;
The method comprises the steps of adopting a target coding table to code an application sequence which is ordered according to a preset application ordering rule in the data table in sequence, and obtaining a first coding value corresponding to the application sequence;
performing character selection on the first coding value based on the equipment number to obtain a first character;
Generating an encryption password based on the first character, encrypting the flow data list according to the encryption password to obtain encrypted data, and sending the encrypted data, the first coding value and the equipment number to a server so that the server generates flow service pushing information based on the encrypted data, the first coding value and the equipment number;
And receiving traffic service push information from the server side so as to select traffic service based on the traffic service push information.
2. The method for monitoring mobile phone traffic data according to claim 1, wherein the target coding table comprises a standard chinese coding table and a target english coding table, the standard chinese coding table comprises all chinese characters and coded numbers mapped one by one with the chinese characters, and the target english coding table comprises all english characters and coded numbers mapped one by one with the english characters; the English characters comprise uppercase and lowercase English letters, the application sequences which are sequenced according to a preset application sequencing rule in the data table are coded in sequence by adopting a target coding table, and a first coding value corresponding to the application sequences is obtained, and the method comprises the following steps:
Sequentially encoding the Chinese names of each target application of the application sequence based on the standard Chinese encoding table to obtain a second encoding value corresponding to the application sequence;
encoding English names of all target applications of the application sequence in sequence based on the target English encoding table to obtain a third encoding value corresponding to the application sequence;
Determining the sum of the characters contained in the second code value and the total characters of the characters contained in the third code value, and taking the first digit of the sum of the total characters as a first marking digit;
Moving the code value corresponding to the target application of which the application sequence is positioned at the first few digits of the first marked number to the end of the second code value in the second code value corresponding to the application sequence to obtain an updated second code value;
moving the code value corresponding to the target application of which the application sequence is positioned at the first few digits of the first marked number to the end of the third code value in the third code value corresponding to the application sequence to obtain an updated third code value;
And generating a first code value corresponding to the application sequence based on the updated second code value and the updated third code value.
3. The method for monitoring mobile phone traffic data according to claim 2, wherein the encoding english names of each target application of the application sequence in order based on the target english encoding table, to obtain a third encoded value corresponding to the application sequence, includes:
obtaining a standard Chinese coding table to code Chinese names corresponding to all applications in the application catalog in sequence to obtain a fourth coding value;
performing hash calculation based on the fourth code value to obtain a hash value;
Determining English characters existing in the hash value and the equipment number as target characters, and generating an identification number based on the total number of characters of the target characters;
Adding the identification number to the tail of the coding number corresponding to the character identical to the target character in the standard English coding table, and generating the corresponding target English coding table;
and encoding English names of all target applications of the application sequence in sequence based on the target English encoding table to obtain a third encoding value corresponding to the application sequence.
4. The method for monitoring mobile phone traffic data according to claim 1, wherein the character selection of the first code value based on the device number to obtain a first character comprises:
Obtaining a first marked number based on the total number of characters corresponding to the character with the largest repeated occurrence number in the characters contained in the equipment number;
obtaining a second marked number based on the total number of characters corresponding to the remaining characters after the duplication removal processing is performed on the characters contained in the equipment number;
Generating a rule selection sequence number based on the first marked number and the second marked number; if the first marked number and the second marked number are both units, taking the first marked number as a ten-digit number and taking the number formed by the second marked number as the unit as a rule to select a serial number; if more than ten digits exist in the first marked digit and the second marked digit, taking the sum of the digits of the first marked digit and the second marked digit as a rule to select a serial number;
based on the rule selection sequence number, matching a corresponding character selection rule in a management database; wherein, the management database stores the mapping relation between the rule selection sequence number and the character selection rule;
and based on the matched character selection rule, character selection is carried out on the first coding value, and the selected characters are sequentially combined to obtain the encryption password.
5. The method for monitoring traffic data of a mobile phone according to claim 1, wherein the generating traffic push information by the server based on the encrypted data, the first encoded value and the device number includes:
Decoding the first code value by adopting the target code table to obtain the corresponding application sequence;
performing character selection on the first coding value based on the equipment number to obtain a second character;
Generating a decryption password based on the second character, and decrypting the encrypted data according to the decryption password to obtain the flow data list;
Based on the application sequence and the flow data list, obtaining flow data corresponding to each target application;
and determining traffic service push information in a traffic service information base based on the traffic data corresponding to each target application.
6. A device for monitoring traffic data of a mobile phone, comprising:
The mobile phone terminal comprises an acquisition unit, a processing unit and a processing unit, wherein the acquisition unit is used for acquiring flow data corresponding to each target application in a mobile phone terminal and equipment numbers of terminal equipment where the mobile phone terminal is located, and the target application is an application which runs under a target network and generates excessive flow of the mobile phone terminal;
An importing unit, configured to import flow data corresponding to each target application into a preset data table, where the data table includes an application sequence obtained by sequencing each target application according to a predetermined application sequencing rule, and a flow data list obtained by sequencing flow data corresponding to each target application according to a predetermined application sequencing rule;
The coding unit is used for coding the application sequences sequenced according to a preset application sequencing rule in the data table in sequence by adopting a target coding table to obtain a first coding value corresponding to the application sequences;
the selection unit is used for carrying out character selection on the first coding value based on the equipment number to obtain a first character;
the encryption unit is used for generating an encryption password based on the first character, encrypting the flow data list according to the encryption password to obtain encrypted data, and sending the encrypted data, the first coding value and the equipment number to a server so that the server generates flow service pushing information based on the encrypted data, the first coding value and the equipment number;
And the receiving unit is used for receiving the traffic service pushing information from the server side so as to select traffic service based on the traffic service pushing information.
7. The traffic data monitoring device according to claim 6, wherein the target encoding table includes a standard chinese encoding table including all kanji characters and encoding numbers mapped one by one with kanji characters and a target english encoding table including all english characters and encoding numbers mapped one by one with english characters; the English characters comprise uppercase and lowercase English letters, and the coding unit comprises:
the first coding module is used for coding the Chinese names of each target application of the application sequence in sequence based on the standard Chinese coding table to obtain a second coding value corresponding to the application sequence;
The second coding module is used for coding English names of all target applications of the application sequence in sequence based on the target English coding table to obtain a third coding value corresponding to the application sequence;
The marking module is used for determining the sum of the characters contained in the second coding value and the total characters of the characters contained in the third coding value, and taking the first digit of the sum of the total characters as a first marking digit;
The first moving module is used for moving the code value corresponding to the target application of which the application sequence is positioned at the first few digits of the first mark number to the end of the second code value in the second code value corresponding to the application sequence, so as to obtain an updated second code value;
The second moving module is used for moving the code value corresponding to the target application of which the application sequence is positioned at the first few digits of the first mark number to the end of the third code value in the third code value corresponding to the application sequence, so as to obtain an updated third code value;
And the generation module is used for generating a first code value corresponding to the application sequence based on the updated second code value and the updated third code value.
8. The traffic data monitoring device of claim 7, wherein the second encoding module comprises:
The first coding sub-module is used for obtaining a standard Chinese coding table to code Chinese names corresponding to all applications in the application catalog in sequence to obtain a fourth coding value;
the calculation sub-module is used for carrying out hash calculation based on the fourth coding value to obtain a hash value;
The generation submodule is used for determining English characters existing in the hash value and the equipment number as target characters and generating identification numbers based on the total number of the characters of the target characters;
An adding sub-module, configured to add the identification number to the tail of a coding number corresponding to the same character as the target character in a standard english coding table, and generate a corresponding target english coding table;
And the second coding submodule is used for coding English names of all target applications of the application sequence in sequence based on the target English coding table to obtain a third coding value corresponding to the application sequence.
9. An electronic device, comprising:
one or more processors;
Storage means for storing one or more programs that when executed by the one or more processors cause the one or more processors to implement the method of monitoring handset traffic data as claimed in any one of claims 1 to 5.
10. A computer readable medium having stored thereon a computer program, wherein the computer program when executed by a processor implements the method of monitoring traffic data of a handset according to any of claims 1 to 5.
CN202410558563.6A 2024-05-08 2024-05-08 Mobile phone flow data monitoring method and device, electronic equipment and medium Pending CN118283610A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410558563.6A CN118283610A (en) 2024-05-08 2024-05-08 Mobile phone flow data monitoring method and device, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410558563.6A CN118283610A (en) 2024-05-08 2024-05-08 Mobile phone flow data monitoring method and device, electronic equipment and medium

Publications (1)

Publication Number Publication Date
CN118283610A true CN118283610A (en) 2024-07-02

Family

ID=91636122

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410558563.6A Pending CN118283610A (en) 2024-05-08 2024-05-08 Mobile phone flow data monitoring method and device, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN118283610A (en)

Similar Documents

Publication Publication Date Title
CN109150499B (en) Method and device for dynamically encrypting data, computer equipment and storage medium
CN104657673A (en) Average-complexity ideal-security order-preserving encryption
CN112042150B (en) Registration device, server device, concealment search system, concealment search method, and computer-readable recording medium
CN112131316A (en) Data processing method and device applied to block chain system
CN112489742B (en) Prescription circulation processing method and device
CN111191255A (en) Information encryption processing method, server, terminal, device and storage medium
CN112235104B (en) Data encryption transmission method, system, terminal and storage medium
US20220407683A1 (en) Data extraction system, data extraction method, registration apparatus, and program
KR102421567B1 (en) Internet access management service server capable of providing internet access management service based on terminal grouping and operating method thereof
CN111339206A (en) Data sharing method and device based on block chain
CN116015767A (en) Data processing method, device, equipment and medium
CN109583237A (en) User data protection method, server and storage medium
CN111931204A (en) Encryption and de-duplication storage method and terminal equipment for distributed system
CN112953716A (en) Method and device for generating and verifying exchange code
CN118283610A (en) Mobile phone flow data monitoring method and device, electronic equipment and medium
CN115567263A (en) Data transmission management method, data processing method and device
CN115442073A (en) Encryption method and decryption method of numeric string, electronic device and storage medium
CN113762958A (en) Method and device for generating electronic certificate
CN111131270B (en) Data encryption and decryption method and device, electronic equipment and storage medium
CN118034629B (en) LED display screen splicing optimization method and device, electronic equipment and medium
CN118199916A (en) Screen projection control method and device for LED video wall, electronic equipment and medium
CN118395479A (en) Data protection method and device for online mall system, electronic equipment and medium
CN113469683B (en) Key storage method and device, electronic equipment and storage medium
CN118200049B (en) Encryption method, encryption device, equipment and medium for financial data
CN117633898B (en) Medical data management method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination