WO2018210214A1 - 设备定位方法及装置 - Google Patents

设备定位方法及装置 Download PDF

Info

Publication number
WO2018210214A1
WO2018210214A1 PCT/CN2018/086792 CN2018086792W WO2018210214A1 WO 2018210214 A1 WO2018210214 A1 WO 2018210214A1 CN 2018086792 W CN2018086792 W CN 2018086792W WO 2018210214 A1 WO2018210214 A1 WO 2018210214A1
Authority
WO
WIPO (PCT)
Prior art keywords
login
identifier
target
user identifier
location
Prior art date
Application number
PCT/CN2018/086792
Other languages
English (en)
French (fr)
Inventor
尤飞
杨勇
陈远斌
陈梦
宗旋
刘飞飞
Original Assignee
腾讯科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 腾讯科技(深圳)有限公司 filed Critical 腾讯科技(深圳)有限公司
Publication of WO2018210214A1 publication Critical patent/WO2018210214A1/zh
Priority to US16/365,124 priority Critical patent/US11240777B2/en

Links

Images

Classifications

    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • G01S5/02Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations using radio waves
    • G01S5/0284Relative positioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • H04W64/003Locating users or terminals or network equipment for network management purposes, e.g. mobility management locating network equipment
    • GPHYSICS
    • G01MEASURING; TESTING
    • G01SRADIO DIRECTION-FINDING; RADIO NAVIGATION; DETERMINING DISTANCE OR VELOCITY BY USE OF RADIO WAVES; LOCATING OR PRESENCE-DETECTING BY USE OF THE REFLECTION OR RERADIATION OF RADIO WAVES; ANALOGOUS ARRANGEMENTS USING OTHER WAVES
    • G01S5/00Position-fixing by co-ordinating two or more direction or position line determinations; Position-fixing by co-ordinating two or more distance determinations
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/025Services making use of location information using location based information parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W64/00Locating users or terminals or network equipment for network management purposes, e.g. mobility management
    • H04W64/006Locating users or terminals or network equipment for network management purposes, e.g. mobility management with additional information processing, e.g. for direction or speed determination
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/22Processing or transfer of terminal data, e.g. status or physical capabilities
    • H04W8/24Transfer of terminal data

Definitions

  • the present application relates to the field of computer technologies, and in particular, to a device positioning method and apparatus.
  • the network applications rely on the GPS (Global Positioning System) module built in the terminal to obtain the location information of the terminal (ie, the user).
  • the user may prohibit the GPS permission of a part of the network application.
  • some terminals such as PCs (Personal Computers) and laptops, do not have a GPS module installed, which causes the network application to obtain GPS information to achieve positioning.
  • the limitation is strong. For this situation, the communication terminal can be used to access the Internet.
  • IP Internet Protocol
  • IP information is easily forged, for example, criminals often seek illegal benefits from the business by forging geographical location information, such as swiping, fraud , porn, and other activities, so if you use IP information for positioning, it is difficult to correctly identify the user's real geographical location, and the accuracy is low.
  • the embodiment of the present application provides a device positioning method and device, which can improve the accuracy of device positioning.
  • a device positioning method includes:
  • the device location request carries a target device identifier of the device to be located
  • each target user identifier Obtaining at least one piece of login information reported by each target user identifier, where each login information includes the target user identifier, a device identifier of the login device, and a login location;
  • the device to be located is located according to the target login location.
  • a device positioning apparatus comprising: a processor and a memory, the memory storing computer readable instructions, the computer readable instructions being executed by the processor to:
  • the device location request carries a target device identifier of the device to be located
  • each target user identifier Obtaining at least one piece of login information reported by each target user identifier, where each login information includes the target user identifier, a device identifier of the login device, and a login location;
  • the device to be located is located according to the target login location.
  • a device positioning method for a server, the server comprising: a processor and a memory, the method comprising:
  • the device location request carries a target device identifier of the device to be located
  • each target user identifier Obtaining at least one piece of login information reported by each target user identifier, where each login information includes the target user identifier, a device identifier of the login device, and a login location;
  • the device to be located is located according to the target login location.
  • a computer readable storage medium wherein the computer readable storage medium stores instructions that, when run on a computer, cause the computer to perform the following methods, including:
  • the device location request carries a target device identifier of the device to be located
  • each target user identifier Obtaining at least one piece of login information reported by each target user identifier, where each login information includes the target user identifier, a device identifier of the login device, and a login location;
  • the device to be located is located according to the target login location.
  • FIG. 1 is a schematic diagram of an implementation environment of a device positioning method according to an embodiment of the present disclosure
  • FIG. 2A is a schematic flowchart of a device positioning method according to an embodiment of the present application.
  • 2B is a schematic flowchart of a device positioning method according to an embodiment of the present disclosure
  • 2C is a schematic diagram of device aggregation for an account provided by an embodiment of the present application.
  • 2D is a schematic diagram of a frame of a device positioning method according to an embodiment of the present application.
  • 3A is a schematic structural diagram of a device positioning apparatus according to an embodiment of the present application.
  • FIG. 3B is a schematic structural diagram of another device positioning apparatus according to an embodiment of the present disclosure.
  • FIG. 4 is a schematic structural diagram of a server according to an embodiment of the present application.
  • the embodiment of the present application provides a device positioning method and device. The details are described below separately.
  • FIG. 1 is a schematic diagram of an implementation environment of a device positioning method according to an embodiment of the present disclosure.
  • the implementation environment includes a user device 10 and a server system 20 that interacts with the user device 10.
  • server system 20 is also referred to as a system, a server.
  • User device 10 is coupled to server system 20 via a wireless or wired network 30.
  • User device 10 may be an electronic device capable of accessing server system 20, such as a computer, smart phone, tablet, or other electronic device in which an application is installed. There may be multiple applications on one user device, and each application may have multiple users.
  • the server system 20 may include an application server 40 for communicating with the application 1 on the user device 10; a detection server 50 for detecting whether a user device needs to be located; and a positioning server 60 for the user device Positioning.
  • the system 20 may further include a database 70 for storing various data of the user and the user equipment, such as a user identifier, a device identifier, login information, and the like. In FIG. 1, the database 70 is shown as a separate portion for convenience of description, which may also be distributed among application servers.
  • the location locating device 60 may include a device locating device 61 for acquiring a device location request, where the device location request carries a target device identifier, for example, sent by the detection server 50.
  • the device locating device 61 determines at least one target user identifier according to the target device identifier, and acquires at least one piece of login information reported by each target user identifier.
  • Each login information includes information such as the target user identifier, the device identifier of the login device, and the login location. After that, the device locating device 61 determines the target login location according to the target user identifier and the device identifier in each login information, and locates the target device according to the target login location.
  • Each of the servers in the above system 20 is only functionally divided, and these servers can also be integrated.
  • the device locating device may perform a device locating method, including: acquiring a device locating request, where the device locating request carries a target device identity of the device to be located, and then determining at least one target user id according to the target device identifier, and acquiring each At least one login information reported by the target user identifier, each login information includes the target user identifier, the device identifier of the login device, and the login location, and then the target login location is determined according to the target user identifier and the device identifier in each login information. And positioning the device to be located according to the target login location.
  • FIG. 2A is a schematic flowchart of a device positioning method according to an embodiment of the present application. As shown in FIG. 2A, the specific process of the device positioning method may be as follows:
  • the target device identifier is a unique identifier of the device, which may be an IMEI (International Mobile Equipment Identity) number of the device, a device fingerprint, or an application when the device is used.
  • the system automatically assigns a string to each device, and so on.
  • the device fingerprint here is usually formed according to the hardware information of each device (such as device brand, model, etc.) and network browsing information, and different devices have different device fingerprints. For example, when the detection server in the system detects that a certain device is using a different application, and the login location reported to the application server is inconsistent, the device may be determined as the device to be located.
  • the device location request is sent to the device location device.
  • the device positioning device acquires the device positioning request and locates the device.
  • the target user identifier is an identifier of the user, and the same user usually has different user identifiers in different application systems, and the user identifier may be in the process of using the application by the user.
  • the account registered on the server in the system may also be a string assigned to each user by the server in the application system, and the like.
  • the at least one target user identifier may be a user identifier in a different application of the same user on the target device corresponding to the target device identifier, or may be in the same application of the different user on the target device corresponding to the target device identifier.
  • User ID User ID.
  • step S102 may specifically include:
  • the device locating device searches for the user identifier corresponding to the target device identifier from the identifier library as the target user identifier.
  • the identifier in the identifier library may include a user identifier and a device identifier, where the user identifier and the device identifier may be associated with each other, and each device identifier may correspond to at least one user identifier, and each user identifier may correspond to at least A device identification, the specific number can be determined according to the actual situation.
  • the identification library can be pre-set or can be referred to as a database. That is, before the step S102, the device positioning method may further include:
  • the preset time may be determined according to actual needs, such as one month or two months.
  • the server can automatically record and store it in the identifier library.
  • the device locating device can obtain all the user identifiers of the device to be located in the preset time period from the identifier library.
  • steps 1-2 may specifically include:
  • the user identifier of the pre-set digit in the sorted user identifier is obtained as the target user identifier.
  • the preset bit may be determined according to actual needs, for example, may be 3 bits or 4 bits.
  • the device locating device may sum each login time of a certain user identifier in a preset time to obtain the total login duration of the user identifier, and then determine the user identifier of the first few login durations as the target user.
  • logo the longer the user ID of the device is, the more likely it is the user ID of the device to be located, and the user ID of the primary user of the device to be located.
  • the login status of these user IDs (mainly login) Location) has important reference in the subsequent process of determining the attribution of equipment.
  • each device identifier may be associated with multiple user identifiers, and each user identifier is a primary usage identifier of the device indicated by the device identifier, which may be the same user or different users registered on different applications. Accounts, these different applications are usually developed by an operator.
  • the step of "finding the user identifier corresponding to the target device identifier from the identifier library, as the target user identifier" may specifically include:
  • the user identifier corresponding to the target device identifier is obtained from the identifier database according to the association relationship between the target device identifier and the target user identifier, as the target user identifier.
  • the device identifier of each device is associated with the corresponding user identifier, so that the subsequent device positioning device can find the corresponding user identifier according to the device identifier.
  • Each login information may include the target user identifier, a device identifier of the login device, and a login location.
  • the login information mainly refers to information related to user login, such as a login account (that is, a login user identifier), a login device, a login application, a login time, and a login location.
  • the login location may be a location location of the built-in GPS of the device, or may be a location obtained according to the IP address of the device, which may be determined according to actual needs.
  • GPS information is not easily forged, it is possible to preferentially use the GPS location as a login location, and only when the GPS function is not available, the login location is determined based on the IP address.
  • S104 Determine a target login location according to the target user identifier and the device identifier in each login information.
  • step S104 may specifically include:
  • the first weight value is mainly used to indicate the importance degree of each user identifier relative to the device, which may be set according to the frequency of use and/or the login duration of each user identifier on the same device, usually For the different user IDs that appear on the same device, the more frequently the user ID is logged in or the longer the login time is, the more important the user ID is to the device, that is, the greater the first weight value.
  • the credibility mainly refers to the credibility of the location (ie, the attribution) of the device as the corresponding login location.
  • the credibility can be determined in various ways, for example, it can be directly calculated according to the first weight value, that is, the credibility is calculated directly according to the frequency of use and the login duration of each user identifier on the device.
  • the more frequently used or the longer the login time the more the login location corresponding to the user's attribution is the higher the credibility of the device's home location, so that the home location of the device can be determined according to the login status of multiple users on the same device.
  • the device positioning method in the embodiment of the present invention can effectively avoid the problem of positioning errors caused by forging the login information of a single user, and improve the accuracy of the positioning, as compared with the existing method for determining the attribution of the device. .
  • the positioning may be performed from multiple dimensions, such as combining the service data of the service in which the device participates, that is, the login information may further include an application identifier of the login application.
  • the foregoing step 2-2 may specifically include:
  • the application identifier is a unique identifier of the application, which may be an application name, and different applications have different application identifiers.
  • the second weight value is mainly used to indicate the importance level of each application relative to the user, which can be set in advance according to the user's own factors (such as usage habits), such as the more frequently used application, the second weight value can be Set to be larger.
  • the second weight value may also be combined with the application itself (such as the level of the real name).
  • the application information reported by the application is less likely to be fraudulent due to the higher real name, and the device attribution is determined.
  • the higher the reference value, the second weight value can be proportional to the real name.
  • the application whose value is decremented in turn can be set to be successively decremented. .
  • the second weight value may be determined not only according to the user's own factors, but also the user's own factors and the application itself, and may be directly determined according to the application itself. At this time, different users for the same application. Have the same second weight value.
  • the target login location may be determined according to the login information reported by the target user identifier in the device to be located, and the login information reported by the target user identifier in other devices may be used to determine the target login location. It can be other ways of determining.
  • the calculation method can be determined according to actual needs, such as simple multiplication or addition, and the like.
  • the foregoing step 2-2-2 may specifically include:
  • each target user identifier may report the login location in multiple devices. Therefore, when the home location of the device to be located needs to be analyzed, the login information reported by the device to be located may be directly determined. That is, the target login location is determined directly according to the second weight value of the login application in the target login information and the first weight value of the login user.
  • This determination method combines the two dimensions of business data and user's own factors. Compared with the single dimension determination method, the positioning is more accurate, and it is beneficial to realize data sharing between different services and open up information barriers.
  • the foregoing step 2-2-2 may specifically include:
  • the third weight value is mainly used to indicate the importance degree of each device relative to the user, which may be set in advance according to the login frequency and/or the login duration of each device on the same user identifier, usually For the same user ID, the third weight value of the device (such as the device with the most logins or the longest login time) can be set very large. Non-primary devices (such as devices that have been logged in once) can be set. Very small. This determination method combines the three dimensions of service data, user's own factors and device factors to locate, which can effectively distinguish false login information and improve the accuracy of device positioning.
  • the third weight value is set in advance according to the historical login status of each user identifier on each device, there may be a case where a certain user identifier is logged in on the new device. The new device does not exist in the historical login device, so the corresponding third weight value cannot be obtained. For this case, the third weight value of each new device may be defaulted to a fixed value of 0 or less.
  • steps 2-3 may specifically include:
  • the login location corresponding to the merged credibility with the largest value is determined as the target login location.
  • all the credibility corresponding to the same login location may be added to obtain the total credibility (that is, the combined credibility), and the greater the credibility value, the login The more likely the location is the location (ie, the home location) where the device to be located is located, the login location corresponding to the reliability of the maximum value can be directly determined as the target login location.
  • the target login location may be directly determined as the current location of the device to be located, thereby achieving accurate positioning of the to-be-positioned device.
  • the geographical location information such as swiping, fraud, pornography
  • the device positioning request carries the target device identifier of the device to be located, and then determines at least one target user identifier according to the target device identifier, and obtains each At least one login information reported by the target user identifier, each login information includes the target user identifier, the device identifier of the login device, and the login location, and then the target login location is determined according to the target user identifier and the device identifier in each login information. And positioning the device to be located according to the target login location, so that device positioning can be implemented from multiple dimensions, and the accuracy is high.
  • the device positioning device is integrated into the server as an example for detailed description.
  • a device positioning method may be as follows:
  • S201 The server acquires all user identifiers of the device to be located in a preset time.
  • the preset time may be 60 days
  • the device to be located may be A1
  • the user identifier may be a user account registered by the user in multiple application systems corresponding to the device to be located, such as U1, U2, ... Un , n is a positive integer, see Figure 2C for details.
  • S202 The server collects the total login duration of each user identifier on the to-be-located device in the preset time, and sorts the user identifier according to the total length of each login.
  • the server may add the length of each login of the user identifier Ui on the device A1 to be located, and obtain the total login duration, and then sort each user identifier Ui according to the login duration from large to small. Sorted user ID ⁇ U1, U2...Un ⁇ , i ⁇ (1, 2...n).
  • the server obtains the user identifier of the pre-preset bit in the sorted user identifier, as the target user identifier.
  • the preset bit can be set to 3, and at this time, the server can determine ⁇ U1, U2, U3 ⁇ as the target user identifier.
  • the server establishes an association relationship between the target device identifier of the device to be located and the target user identifier, and stores the association relationship in the identifier database.
  • the identifier library can store the association relationship between each user identifier of all the registered user identifiers on the server platform and the device identifier of the device that has been logged in, so that the corresponding user identifier can be found according to the device identifier.
  • the server acquires a device location request, where the device location request carries a target device identifier of the device to be located.
  • the device may generate a device location request for the device, for example, in the device A1, if the user identifier U1 is reported.
  • the login location is P1 and the login location reported by the user identifier Ui is P2
  • the device A1 can be determined as the device to be located, and the device location request is generated.
  • the server acquires, according to the association relationship, a target user identifier corresponding to the target device identifier from the identifier library.
  • the server can find the target user identifier ⁇ U1, U2, U3 ⁇ in the identifier library according to the target device identifier A1.
  • the server obtains at least one login information reported by each target user identifier, where each login information includes the target user identifier, a device identifier of the login device, an application identifier of the login application, and a login location.
  • the server can obtain all login information reported by U1, U2, and U3.
  • the server obtains a first weight value corresponding to the target user identifier according to the device identifier in each login information, and obtains a second weight value corresponding to the application identifier according to the target user identifier in each login information, according to each login information.
  • the target user identifier acquires a third weight value of the corresponding device identifier.
  • the server can pre-register the historical login application and the historical login device reported by U1, U2, and U3, and then set each historical login device according to the login frequency and/or duration of U1, U2, or U3 on each historical login device.
  • the second weight value is set according to the level of the real name of each historical login application, and the registration frequency and/or duration of the U1, U2, and U3 on the device to be located according to the third weight value of U1, U2, or U3.
  • the first weight value of the U1, U2, or U3 relative to the device to be located is set and stored, so that the stored first weight value, second weight value, and third weight value can be directly acquired subsequently.
  • the server calculates, according to the first weight value, the second weight value, and the third weight value corresponding to each login information, the reliability of the corresponding login location.
  • the second weight values of the applications C1, C2, and C3 are a, b, and c, respectively, and the third weight values of U1, U2, and U3 with respect to the device A1 to be located are 1, 0.9, and 0.8, respectively.
  • 2D in the login information below,
  • the reliability of P1 may be 1*1*a;
  • the reliability of P1 may be 1*0.8. *c;
  • the reliability of P2 may be 0.9*1.2*b;
  • the reliability of P1 may be 0.9*0.6*a
  • the reliability of P3 may be 0.8*0.7*c;
  • the reliability of P2 may be 0.8*0.5*a.
  • the server combines the credibility of the login information belonging to the same login location to obtain the combined credibility, and each login location corresponds to a combined credibility.
  • the server determines the login location corresponding to the merged credibility with the largest value as the target login location, and locates the to-be-located device according to the target login location.
  • the target login location P may be Max (Rank (P1), Rank (P2), Rank (P3)). Thereafter, the home location of the to-be-located device A1 may be determined as the target login location P.
  • the device locating method provided by the embodiment of the present invention, wherein the server can obtain all the user identifiers of the device to be located in the preset time. Then, the server counts the total login duration of each user identifier on the to-be-located device in the preset time, and sorts the user identifier according to the total length of each login. Then, the server obtains the user identifier of the pre-preset digit in the sorted user identifier, and establishes an association relationship between the target device identifier of the to-be-located device and the target user identifier, and stores the association relationship. In the identity library. Afterwards, the server acquires a device location request, where the device location request carries the target device identifier of the device to be located.
  • the server obtains the target user identifier corresponding to the target device identifier from the identifier library according to the association relationship. Then, the server obtains at least one login information reported by each target user identifier, and each login information includes the target user identifier, a device identifier of the login device, an application identifier of the login application, and a login location. The server obtains a first weight value corresponding to the target user identifier according to the device identifier in each login information, and obtains a second weight value corresponding to the application identifier according to the target user identifier in each login information, according to the target user in each login information. The identifier obtains a third weight value of the corresponding device identifier.
  • the server calculates the credibility of the corresponding login location according to the first weight value, the second weight value, and the third weight value corresponding to each login information, and merges the credibility of the login information belonging to the same login location. Get the confidence after the merger.
  • Each login location corresponds to a combined credibility.
  • the server determines the login location corresponding to the merged credibility with the largest value as the target login location, and locates the to-be-located device according to the target login location.
  • the server can locate the device by combining the three dimensions of service data, user's own factors and device factors, and the positioning accuracy is high.
  • the embodiment of the present application will be further described from the perspective of a device locating device which can be integrated in a server.
  • FIG. 3A specifically describes a device locating device provided by an embodiment of the present application, which may include: a first acquiring module 10, a first determining module 20, a second obtaining module 30, a second determining module 40, and a positioning module. 50, where:
  • the first obtaining module 10 is configured to obtain a device positioning request, where the device positioning request carries a target device identifier of the device to be located.
  • the target device identifier is a unique identifier of the device, which may be an IMEI (International Mobile Equipment Identity) number of the device, a device fingerprint, or an application when the device is used.
  • the system automatically assigns a string to each device, and so on.
  • the device fingerprint here is usually formed according to the hardware information of each device (such as device brand, model, etc.) and network browsing information, and different devices have different device fingerprints. For example, when the detection server in the system detects that a certain device is using a different application, and the login location reported to the application server is inconsistent, the device may be determined as the device to be located.
  • the device location request is sent to the device location device.
  • the first obtaining module 10 in the device locating device acquires the device positioning request and locates the device.
  • the first determining module 20 is configured to determine at least one target user identifier according to the target device identifier.
  • the target user identifier is an identifier of the user, and the same user usually has different user identifiers in different application systems, and the user identifier may be in the process of using the application by the user.
  • the account registered on the server in the system may also be a string assigned to each user by the server in the application system, and the like.
  • the at least one target user identifier may be a user identifier in a different application of the same user on the target device corresponding to the target device identifier, or may be in the same application of the different user on the target device corresponding to the target device identifier.
  • User ID User ID.
  • the first determining module 20 can be specifically configured to:
  • the user identifier corresponding to the target device identifier is searched from the identifier library as the target user identifier.
  • the identifier in the identifier library may include a user identifier and a device identifier, where the user identifier and the device identifier may be associated with each other, and each device identifier may correspond to at least one user identifier, and each user identifier may correspond to at least A device identification, the specific number can be determined according to the actual situation.
  • the identification library may be pre-set or may be referred to as a database. That is, referring to FIG. 3B, the device locating device may further include an association module 60, configured to perform the following steps before determining at least one target user identifier according to the target device identifier:
  • the preset time may be determined according to actual needs, such as one month or two months.
  • the server can automatically record and store it in the identifier library.
  • the device locating device can obtain all the user identifiers of the device to be located in the preset time period from the identifier library.
  • association module 60 can further be used to:
  • the user identifier of the pre-set digit in the sorted user identifier is obtained as the target user identifier.
  • the preset bit may be determined according to actual needs, for example, may be 3 bits or 4 bits.
  • the association module 60 may sum each login time of a certain user identifier in a preset time to obtain the total login duration of the user identifier, and then determine the user identifier of the first few login durations as the target user.
  • logo Generally, the longer the user ID of the device is, the more likely it is the user ID of the device to be located, and the user ID of the primary user of the device to be located.
  • the login status of these user IDs (mainly login) Location) has important reference in the subsequent process of determining the attribution of equipment.
  • each device identifier may be associated with multiple user identifiers, and each user identifier is a primary usage identifier of the device indicated by the device identifier, which may be the same user or different users registered on different applications. Accounts, these different application applications are usually developed by an operator.
  • the first determining module 20 is further configured to: obtain, according to the association relationship between the target device identifier and the target user identifier, the user identifier corresponding to the target device identifier from the identifier library, as the target user identifier.
  • the association module 60 associates the device identifier of each device with the corresponding user identifier, so that the subsequent first determining module 20 can find the corresponding user identifier according to the device identifier.
  • the second obtaining module 30 is configured to obtain at least one login information that is reported by each target user identifier, and each login information may include the target user identifier, a device identifier of the login device, and a login location.
  • the login information mainly refers to information related to user login, such as a login account (that is, a login user identifier), a login device, a login application, a login time, and a login location, where the login location may be a device.
  • the location of the built-in GPS can also be obtained according to the IP address of the device, which can be determined according to actual needs.
  • the second acquisition module 30 can preferentially use the GPS location as the login location, and only when the GPS function is unavailable, the login location is determined according to the IP address.
  • the second determining module 40 is configured to determine a target login location according to the target user identifier and the device identifier in each login information.
  • the second determining module 40 may specifically include an obtaining submodule 41, a calculating submodule 42 and a determining submodule 43, wherein:
  • the obtaining sub-module 41 is configured to obtain a first weight value corresponding to the target user identifier according to the device identifier in each login information.
  • the first weight value is mainly used to indicate the importance degree of each user identifier relative to the device, which may be set according to the frequency of use and/or the login duration of each user identifier on the same device, usually For the different user IDs that appear on the same device, the more frequently the user ID is logged in or the longer the login time is, the more important the user ID is to the device, that is, the greater the first weight value.
  • the calculation sub-module 42 is configured to calculate the credibility of the corresponding login location according to the first weight value corresponding to each login information.
  • the credibility mainly refers to the credibility of the location (ie, the attribution) of the device as the corresponding login location.
  • the credibility can be determined in various ways, for example, it can be directly calculated according to the first weight value, that is, the credibility is calculated directly according to the frequency of use and the login duration of each user identifier on the device.
  • the more frequently used or the longer the login time the more the login location corresponding to the user's attribution is the higher the credibility of the device's home location, so that the home location of the device can be determined according to the login status of multiple users on the same device.
  • the device locating device in the embodiment of the present invention can effectively avoid the problem of locating errors caused by falsifying the login information of a single user, and improve the positioning, as compared with the existing method for determining the affiliation of the device. accuracy.
  • the positioning may be performed from multiple dimensions, such as combining the service data of the service in which the device participates, that is, the login information may further include an application identifier of the login application,
  • the calculation sub-module 42 may specifically include an acquisition unit and a calculation unit, wherein:
  • the obtaining unit is configured to obtain a second weight value corresponding to the application identifier according to the target user identifier in each login information.
  • the application identifier is a unique identifier of the application, which may be an application name, and different applications have different application identifiers.
  • the second weight value is mainly used to indicate the importance level of each application relative to the user, which can be set in advance according to the user's own factors (such as usage habits), such as the more frequently used application, the second weight value can be Set to be larger.
  • the second weight value may also be combined with the application itself (such as the level of the real name).
  • the application information reported by the application is less likely to be fraudulent due to the higher real name, and the device attribution is determined.
  • the higher the reference value, the second weight value can be proportional to the real name.
  • the application whose value is decremented in turn can be set to be successively decremented. .
  • the second weight value may be determined not only according to the user's own factors, but also the user's own factors and the application itself, and may be directly determined according to the application itself. At this time, different users for the same application. Have the same second weight value.
  • the calculating unit is configured to calculate the credibility of the corresponding login location according to the first weight value and the second weight value corresponding to each login information.
  • the target login location may be determined according to the login information reported by the target user identifier in the device to be located, and the login information reported by the target user identifier in other devices may be used to determine the target login location. It can be other ways of determining.
  • the calculation method can be determined according to actual needs, such as simple multiplication or addition, and the like.
  • the calculation unit may be specifically configured to:
  • each target user identifier may report the login location in multiple devices. Therefore, when the home location of the device to be located needs to be analyzed, the login information reported by the device to be located may be directly determined. That is, the target login location is determined directly according to the second weight value of the login application in the target login information and the first weight value of the login user.
  • This determination method combines the two dimensions of business data and user's own factors. Compared with the single dimension determination method, the positioning is more accurate, and it is beneficial to realize data sharing between different services and open up information barriers.
  • the calculation unit may be specifically configured to:
  • the third weight value is mainly used to indicate the importance degree of each device relative to the user, and may be set in advance according to the login frequency and/or the login duration on each device according to the same user identifier.
  • the third weight value of the device (such as the device with the most logins or the longest login time) can be set very large.
  • the non-primary device such as the device that has logged in once) can be used. The settings are small. This determination method combines the three dimensions of service data, user's own factors and device factors to locate, which can effectively distinguish false login information and improve the accuracy of device positioning.
  • the third weight value is set in advance according to the historical login status of each user identifier on each device, there may be a case where a certain user identifier is logged in on the new device. The new device does not exist in the login device, so the corresponding third weight value cannot be obtained. For this case, the third weight value of each new device can be defaulted to a fixed value of 0 or less.
  • the determining sub-module 43 is configured to determine a target login location according to the credibility of each login location.
  • the determining sub-module 43 can be specifically used to:
  • the login location corresponding to the merged credibility with the largest value is determined as the target login location.
  • the determining sub-module 43 may add all the credibility corresponding to the same login location to obtain the total credibility (that is, the combined credibility), because the value of the credibility is larger. It indicates that the registration location is the location (ie, the attribution) of the device to be located. Therefore, the login location corresponding to the reliability of the maximum value can be directly determined as the target login location.
  • the positioning module 50 is configured to locate the device to be located according to the target login location.
  • the positioning module 50 can directly determine the target login location as the current location of the device to be located, thereby achieving accurate positioning of the device to be located.
  • the server can further determine that the login information of the login location is not the target login location as false information, thereby effectively preventing the illegal elements from trying to obtain illegal interests from the business by forging the geographical location information, such as billing, fraud, Porn chat, etc., is conducive to maintenance to create a good network environment.
  • the foregoing units may be implemented as a separate entity, or may be implemented in any combination, and may be implemented as the same or a plurality of entities.
  • the foregoing method embodiments and details are not described herein.
  • the device locating device obtained by using the first acquiring module 10, and the device positioning request carries the target device identifier of the device to be located, and then the first determining module 20 identifies the target device according to the target device identifier.
  • the second obtaining module 30 acquires at least one login information reported by each target user identifier, where each login information includes the target user identifier, a device identifier of the login device, and a login location, and then the second determining module
  • the target registration location is determined according to the target user identifier and the device identifier in each login information, and the positioning module 50 locates the to-be-located device according to the target login location, so that device positioning can be implemented from multiple dimensions, and the accuracy is high.
  • the embodiment of the present application further provides a device positioning system, which includes any device positioning device provided by the embodiment of the present application, and the device positioning device can be integrated into a server.
  • the server may obtain a device location request, where the device location request carries the target device identifier of the device to be located, and at least one target user identifier is determined according to the target device identifier; and at least one login information reported by each target user identifier is obtained, and each login is performed.
  • the information includes the target user identifier, the device identifier of the login device, and the login location; the target login location is determined according to the target user identifier and the device identifier in each login information; and the to-be-located device is located according to the target login location.
  • the device positioning system can include any device positioning device provided by the embodiment of the present application. Therefore, the beneficial effects that can be achieved by any device positioning device provided by the embodiments of the present application can be implemented. For example, it will not be described here.
  • the embodiment of the present application further provides a server, as shown in FIG. 4, which shows a schematic structural diagram of a server involved in the embodiment of the present application, specifically:
  • the server may include one or more processors 701, a memory 702 of one or more computer readable storage media, a radio frequency (RF) circuit 703, a power source 704, an input unit 705, and a display unit 706, etc. component.
  • the server structure shown in FIG. 4 does not constitute a limitation to the server, and may include more or less components than those illustrated, or some components may be combined, or different component arrangements. among them:
  • the processor 701 is the control center of the server, connecting various portions of the entire server using various interfaces and lines, by running or executing software programs and/or modules stored in the memory 702, and recalling data stored in the memory 702, Execute the server's various functions and process data to monitor the server as a whole.
  • the processor 701 may include one or more processing cores; the processor 701 may integrate an application processor and a modem processor, where the application processor mainly processes an operating system, a user interface, an application, etc., and a modulation solution
  • the processor mainly handles wireless communication. It can be understood that the above modem processor may not be integrated into the processor 701.
  • the memory 702 can be used to store software programs and modules, and the processor 701 executes various functional applications and data processing by running software programs and modules stored in the memory 702.
  • the memory 702 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may be stored according to Data created by the use of the server, etc.
  • memory 702 can include high speed random access memory, and can also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, memory 702 can also include a memory controller to provide processor 701 access to memory 702.
  • the RF circuit 703 can be used for receiving and transmitting signals during the process of transmitting and receiving information. Specifically, after receiving the downlink information of the base station, it is processed by one or more processors 701; in addition, the data related to the uplink is sent to the base station.
  • the RF circuit 703 includes, but is not limited to, an antenna, at least one amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, and a Low Noise Amplifier (LNA). , duplexer, etc.
  • SIM Subscriber Identity Module
  • LNA Low Noise Amplifier
  • the RF circuit 703 can also communicate with the network and other devices through wireless communication.
  • the wireless communication can use any communication standard or protocol, including but not limited to Global System of Mobile communication (GSM), General Packet Radio Service (GPRS), and Code Division Multiple Access (CDMA). Code Division Multiple Access), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), e-mail, Short Messaging Service (SMS), and the like.
  • GSM Global System of Mobile communication
  • GPRS General Packet Radio Service
  • CDMA Code Division Multiple Access
  • Code Division Multiple Access Code Division Multiple Access
  • WCDMA Wideband Code Division Multiple Access
  • LTE Long Term Evolution
  • SMS Short Messaging Service
  • the server also includes a power source 704 (such as a battery) that powers the various components.
  • the power supply 704 can be logically coupled to the processor 701 through a power management system to manage functions such as charging, discharging, and power management through the power management system.
  • the power supply 704 can also include any one or more of a DC or AC power source, a recharging system, a power failure detection circuit, a power converter or inverter, a power status indicator, and the like.
  • the server can also include an input unit 705 that can be used to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function controls.
  • input unit 705 can include a touch-sensitive surface as well as other input devices. Touch-sensitive surfaces, also known as touch screens or trackpads, collect touch operations on or near the user (such as the user using a finger, stylus, etc., any suitable object or accessory on a touch-sensitive surface or touch-sensitive Operation near the surface), and drive the corresponding connecting device according to a preset program.
  • the touch sensitive surface may include two parts of a touch detection device and a touch controller.
  • the touch detection device detects the touch orientation of the user, and detects a signal brought by the touch operation, and transmits the signal to the touch controller; the touch controller receives the touch information from the touch detection device, converts the touch information into contact coordinates, and sends the touch information.
  • the processor 701 is provided and can receive commands from the processor 701 and execute them.
  • touch-sensitive surfaces can be implemented in a variety of types, including resistive, capacitive, infrared, and surface acoustic waves.
  • the input unit 705 can also include other input devices. Specifically, other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control buttons, switch buttons, etc.), trackballs, mice, joysticks, and the like.
  • the server can also include a display unit 706 that can be used to display information entered by the user or information provided to the user and various graphical user interfaces of the server, which can be composed of graphics, text, icons, video, and It is composed of any combination.
  • the display unit 706 can include a display panel.
  • the display panel can be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like.
  • the touch-sensitive surface may cover the display panel, and when the touch-sensitive surface detects a touch operation thereon or nearby, it is transmitted to the processor 701 to determine the type of the touch event, and then the processor 701 displays the type according to the touch event. A corresponding visual output is provided on the panel.
  • the touch-sensitive surface and display panel are implemented as two separate components to perform input and input functions, in some embodiments, the touch-sensitive surface can be integrated with the display panel to implement input and output functions.
  • the server may further include a camera, a Bluetooth module, and the like, and details are not described herein again.
  • the processor 701 in the server loads the executable file corresponding to the process of one or more applications into the memory 702 according to the following instructions, and is stored and stored by the processor 701.
  • the application in memory 702, thereby implementing various functions, as follows:
  • the device location request carries a target device identifier of the device to be located
  • each target user identifier Acquiring at least one login information reported by each target user identifier, where each login information includes the target user identifier, a device identifier of the login device, and a login location;
  • the device to be located is located according to the target login location.
  • the determining, according to the target user identifier and the device identifier in each login information, the target login location including:
  • the target login location is determined based on the credibility of each login location.
  • the determining the target login location according to the credibility of each login location including:
  • the login location corresponding to the merged credibility with the largest value is determined as the target login location.
  • the login information further includes an application identifier of the login application, and the trustedness of the corresponding login location is calculated according to the first weight value corresponding to each login information, including:
  • the calculating, according to the first weight value and the second weight value corresponding to each login information, the reliability of the corresponding login location including:
  • the calculating, according to the first weight value and the second weight value corresponding to each login information, the reliability of the corresponding login location including:
  • the method further includes:
  • Determining, according to the target device identifier, the at least one target user identifier comprising: acquiring, according to the association relationship, a user identifier corresponding to the target device identifier from the identifier database, as the target user identifier.
  • the determining the target user identifier from the user identifier includes:
  • the user identifier of the pre-set digit in the sorted user identifier is obtained as the target user identifier.
  • the server can implement the effective effect of any device positioning device provided by the embodiment of the present application. For details, refer to the previous embodiment, and details are not described herein again.
  • the program may be stored in a computer readable storage medium, and the storage medium may include: Read Only Memory (ROM), Random Access Memory (RAM), disk or optical disk.
  • ROM Read Only Memory
  • RAM Random Access Memory

Abstract

本申请公开了一种设备定位方法及装置,该设备定位方法包括:获取设备定位请求,该设备定位请求携带待定位设备的目标设备标识;根据该目标设备标识确定至少一个目标用户标识;获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括该目标用户标识、登录设备的设备标识和登录地点;根据每一登录信息中的目标用户标识和设备标识确定目标登录地点;根据该目标登录地点对该待定位设备进行定位。

Description

设备定位方法及装置
本申请要求于2017年05月17日提交中国专利局、申请号为201710345737.0、发明名称为“一种设备定位方法及装置”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及计算机技术领域,尤其涉及一种设备定位方法及装置。
背景技术
随着网络技术的不断发展,网络应用的种类及功能越来越多。结合日益成熟的定位技术,许多网络应用均开发了地理位置服务,以便根据用户的真实地理位置更好地开展应用业务,比如网上订餐、购物等。
目前,网络应用大多依赖于终端内置的GPS(Global Positioning System,全球定位系统)模块来获取终端(也即用户)的位置信息,但是,在很多情况下,用户会禁止一部分网络应用的GPS权限,而且有些终端,比如PC(Personal Computer,个人计算机)和笔记本电脑等并未安装GPS模块,导致网络应用无法通过获取GPS信息来实现定位,局限性较强,针对这种情况,可以采用通信终端上网的IP(Internet Protocol,网络之间互连的协议)地址来实现其定位,但是,由于IP信息容易被伪造,比如不法分子经常通过伪造地理位置信息从业务中谋取非法利益,比如刷单,欺诈,色情代聊等活动,故若单独采用IP信息进行定位,则难以正确识别出用户的真实地理位置,准确性较低。
发明内容
本申请实施例提供了一种设备定位方法及装置,可以提高设备定位的准确性。
一种设备定位方法,包括:
获取设备定位请求,所述设备定位请求携带待定位设备的目标设备标识;
根据所述目标设备标识确定至少一个目标用户标识;
获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括所述目标用户标识、登录设备的设备标识和登录地点;
根据每一登录信息中的目标用户标识和设备标识确定目标登录地点;
根据所述目标登录地点对所述待定位设备进行定位。
一种设备定位装置,包括:处理器和存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令由所述处理器执行以完成以下操作:
获取设备定位请求,所述设备定位请求携带待定位设备的目标设备标识;
根据所述目标设备标识确定至少一个目标用户标识;
获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括所述目标用户标识、登录设备的设备标识和登录地点;
根据每一登录信息中的目标用户标识和设备标识确定目标登录地点;
根据所述目标登录地点对所述待定位设备进行定位。
一种设备定位方法,用于服务器,所述服务器包括:处理器和存储器,所述方法包括:
获取设备定位请求,所述设备定位请求携带待定位设备的目标设备标识;
根据所述目标设备标识确定至少一个目标用户标识;
获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括所述目标用户标识、登录设备的设备标识和登录地点;
根据每一登录信息中的目标用户标识和设备标识确定目标登录地点;
根据所述目标登录地点对所述待定位设备进行定位。
一种计算机可读存储介质,其中,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行以下方法,包括:
获取设备定位请求,所述设备定位请求携带待定位设备的目标设备标识;
根据所述目标设备标识确定至少一个目标用户标识;
获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括所述目标用户标识、登录设备的设备标识和登录地点;
根据每一登录信息中的目标用户标识和设备标识确定目标登录地点;
根据所述目标登录地点对所述待定位设备进行定位。
附图简要说明
下面结合附图,通过对本申请的具体实施方式详细描述,将使本申请的技术方案及其它有益效果显而易见。
图1为本申请实施例提供的设备定位方法的实施环境示意图;
图2A为本申请实施例提供的设备定位方法的流程示意图;
图2B为本申请实施例提供的设备定位方法的流程示意图;
图2C为本申请实施例提供的针对账号做设备聚集的示意图;
图2D为本申请实施例提供的设备定位方法的框架示意图;
图3A为本申请实施例提供的设备定位装置的结构示意图;
图3B为本申请实施例提供的另一设备定位装置的结构示意图;
图4为本申请实施例提供的服务器的结构示意图。
实施本发明的方式
下面将结合本申请实施例中的附图,对本申请实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本申请一部分实施例,而不是全部的实施例。基于本申请中的实施例,本领域技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都属于本申请保护的范围。
本申请实施例提供一种设备定位方法和装置。以下分别进行详细说明。
图1为本申请实施例提供的设备定位方法的实施环境示意图。该实施环境包括用户设备10和与用户设备10进行交互的服务器系统20。在下文中,服务器系统20也称为系统、服务器。用户设备10通过无线或者有线网络30与服务器系统20连接。用户设备10可以为能够访问服务器系统20的电子设备,例如可以为电脑、智能手机、平板电脑或者其他电子设备,其中装有应用程序。一个用户设备上可能有多个应用程序,每个应用程序可能有多个用户使用。服务器系统20可以包括应用程序服务器40,用于与用户设备10上的应用程序1进行通讯;检测服务器50,用于检测是否需要对某个用户设备进行定位;定位服务器60,用于对用户设备进行定位。所述系统20中还可以包括数据库70,用于存储用户和用户设备的各种数据,例如用户标识、设备标识、登录信息等。在图1中,为了描述方便起见,所述数据库70是作为一个独立的部分示出的,其也可以是分布于各应用程序服务器中。定位服务器60中可以包括设备定位装置61,用于获取设备定位请求,该设备定位请求携带目标设备标识,例如是检测服务器50发送的。设备定位装置61根据目标设备标识确定至少一个 目标用户标识,并获取每一目标用户标识上报的至少一条登录信息。每一登录信息包括该目标用户标识、登录设备的设备标识和登录地点等等信息。之后,设备定位装置61根据每一登录信息中的目标用户标识和设备标识确定目标登录地点,并根据该目标登录地点对该目标设备进行定位。上述系统20中的各服务器仅是功能上的划分,这些服务器也可以集成在一起。
本申请实施例将从设备定位装置的角度进行描述,该设备定位装置具体可以作为独立的实体来实现,也可以集成在其他的设备,比如服务器中来实现,该服务器可以是多个服务器的集成。所述设备定位装置可以执行一种设备定位方法,包括:获取设备定位请求,该设备定位请求携带待定位设备的目标设备标识,之后,根据该目标设备标识确定至少一个目标用户标识,并获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括该目标用户标识、登录设备的设备标识和登录地点,之后,根据每一登录信息中的目标用户标识和设备标识确定目标登录地点,并根据该目标登录地点对该待定位设备进行定位。
图2A为本申请实施例提供的设备定位方法的流程示意图。如图2A所示,该设备定位方法的具体流程可以如下:
S101、获取设备定位请求,该设备定位请求携带待定位设备的目标设备标识。
本申请实施例中,目标设备标识(设备标识)是设备的唯一标识,其可以为设备的IMEI(International Mobile Equipment Identity,国际移动设备码)号、设备指纹、或者在使用设备上的应用程序时系统自动给每一个设备分配的字符串等。这里的设备指纹通常是根据每个设备的硬件信息(比如设备品牌、型号等)和网络浏览信息形成的,不同的设备具有不同的设备指纹。例如,当系统中的检测服务器检测到某个设备在使用不同的应用程序的过程中,向应用程序服务器上报的登录地点不一致时,可以将该设备确定为待定位设备,此时,可以生成该设备定位请求,发送至设备定位装置。设备定位装置获取该设备定位请求,对所述设备进行定位。
S102、根据该目标设备标识确定至少一个目标用户标识。
本申请实施例中,目标用户标识(用户标识)是用户的识别标识,同一用户在不同的应用系统中通常具有不同的用户标识,该用户标识可以为用户在使用应用程序的过程中,在应用系统中的服务器上注册的账号,也可是应用系统中的服务器为每个用户分配的字符串,等等。该至少一个目标用户标识可以是同一个用户在与该目标设备标识对应的目标设备上不同应用程序中的用户标识,也可以是不同用户在与该目标设备标识对应的目标设备上同一应用程序中的用户标识。
例如,上述步骤S102具体可以包括:
设备定位装置从标识库中查找与该目标设备标识对应的用户标识,作为目标用户标识。
本申请实施例中,该标识库中的标识可以包括用户标识和设备标识,该用户标识与设备标识之间可以相互关联,每一设备标识可以对应至少一个用户标识,每一用户标识可以对应至少一个设备标识,具体数量可以根据实际情况而定。
该标识库可以是预先设置好的,也可以称为是数据库。即,在上述步骤S102之前,该设备定位方法还可以包括:
1-1、获取预设时间内登录该待定位设备的所有用户标识。
本申请实施例中,该预设时间可以根据实际需求而定,比如可以为一个月或两个月等。通常,对于用户每次在应用系统中的登录情况,比如登录设备、登录时间、登录账号和登录应用程序等,服务器均可以自动进行记录,存储在标识库中。设备定位装置可以从标识库中获取所述预设时间内登录该待定位设备的所有用户标识。
1-2、从用户标识中确定目标用户标识。
例如,上述步骤1-2具体可以包括:
统计该预设时间内每一用户标识在该待定位设备上的登录总时长;
根据每一用户标识登录总时长的大小对用户标识进行排序;
获取排序后的用户标识中位于前预设位的用户标识,作为目标用户标识。
本申请实施例中,该预设位可以根据实际需求而定,比如可以为3位或4位等。例如,设备定位装置可以将预设时间内某个用户标识的每次登录时间进行求和,得到该用户标识的登录总时长,然后将登录总时长排在前几位的用户标识确定为目标用户标识。一般来说,登录总时长越长的用户标识,越可能是 该待定位设备持有者的用户标识,也是该待定位设备的主要使用者的用户标识,这些用户标识的登录情况(主要是登录地点)在后续对设备归属地的判定过程中具有重要参考性。
1-3、建立该目标设备标识和目标用户标识之间的关联关系,并将该关联关系存储在标识库中。
本申请实施例中,每个设备标识可以关联多个用户标识,每个用户标识均是该设备标识所指示设备的主要使用标识,其可以是同一个用户或不同用户在不同应用程序上的注册账号,这些不同应用程序通常是一个运营商开发的。
此时,上述步骤“从标识库中查找与该目标设备标识对应的用户标识,作为目标用户标识”具体可以包括:
根据目标设备标识与目标用户标识之间的关联关系从标识库中获取与该目标设备标识对应的用户标识,作为目标用户标识。
本申请实施例中,通过将每一设备的设备标识和对应的用户标识进行关联,从而后续设备定位装置可以根据设备标识找到对应的用户标识。
S103、获取每一目标用户标识上报的至少一条登录信息,每一登录信息可以包括该目标用户标识、登录设备的设备标识和登录地点。
本申请实施例中,该登录信息主要指与用户登录有关的信息,比如登录账号(也即登录用户标识)、登录设备、登录应用程序、登录时间以及登录地点等。其中,登陆地点可以是设备内置GPS的定位地点,也可以是根据设备的IP地址得到的地点,具体可以根据实际需求而定。通常,考虑到GPS信息不容易被伪造,故可以优先将GPS的定位地点作为登录地点,只有当GPS功能无法使用时,才根据IP地址确定登录地点。
S104、根据每一登录信息中的目标用户标识和设备标识确定目标登录地点。
例如,上述步骤S104具体可以包括:
2-1、根据每一登录信息中的设备标识获取对应目标用户标识的第一权重值。
本申请实施例中,第一权重值主要用于指示每个用户标识相对于设备的重要程度,其可以根据同一设备上每个用户标识的使用频度和/或登录时长提前设定好,通常,对于同一设备上出现的不同用户标识,用户标识登录越频繁或登录时长越长,代表该用户标识对该设备越重要,也即第一权重值越大。
2-2、根据每一登录信息对应的第一权重值计算对应登录地点的可信度。
本申请实施例中,可信度主要指设备所在地(也即归属地)为对应登录地点的可信程度。可信度的确定方式可以有多种,比如可以直接根据该第一权重值计算得到,也即直接根据每个用户标识在设备上的使用频度和登录时长来计算可信度。通常,使用越频繁或登录时间越长的用户标识所对应的登录地点为设备归属地的可信度越高,从而可以根据同一设备上多个用户的登录情况来确定该设备的归属地。相对于现有只针对单个用户的登录情况来确定设备归属地的方法,本申请实施例的设备定位方法能有效避免因伪造单个用户的登录信息而导致定位错误的问题,提高了定位的准确性。
当然,为进一步确保定位准确性,可以从多个维度进行定位,比如结合该设备所参与业务的业务数据来计算可信度,也即,该登录信息还可以包括登录应用程序的应用标识,此时,上述步骤2-2具体可以包括:
2-2-1、根据每一登录信息中的目标用户标识获取对应应用标识的第二权重值。
本申请实施例中,应用标识是应用程序的唯一识别标识,其可以是应用程序名称,不同的应用程序具有不同的应用标识。该第二权重值主要用于指示每个应用程序相对于用户的重要程度,其可以根据用户本身因素(比如使用习惯)提前设定好,比如使用越频繁的应用程序,其第二权重值可以设定成越大。当然,该第二权重值还可以结合应用程序本身因素(比如实名程度高低)而定,通常,由于实名程度越高的应用程序,其上报的登录信息越不容易造假,对于设备归属地判定的参考价值也越高,故可以使第二权重值与实名程度成正比,比如对于支付类型、社交类型以及视频播放类型这些实名程度依次递减的应用程序,可以将其权重值也设定成依次递减。
需要说明的是,由于不同的用户具有不同的使用习惯,故对于同一应用程序而言,不同的用户具有不同的第二权重值。此外,该第二权重值不仅可以根据用户本身因素,或者用户本身因素和应用程序本身因素而定,还可以直接根据应用程序本身因素而定,此时,对于同一应用程序而言,不同的用户具有相同的第二权重值。
2-2-2、根据每一登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度。
本申请实施例中,可以直接根据该待定位设备中目标用户标识上报的登录信息来确定目标登录地点,也可以结合目标用户标识在其他设备中上报的登录信息来确定目标登录地点,当然,也可以是其他确定方式。该计算方法可以根据实际需求而定,比如可以是简单的乘法或加法,等等。
例如,当该目标登录地点为仅根据待定位设备上报的登录信息来确定时,上述步骤2-2-2具体可以包括:
获取该目标设备标识对应的登录信息,作为目标登录信息;
根据每一目标登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度。
本申请实施例中,由于每一目标用户标识可能在多个设备中均上报了登录地点,故当需要分析待定位设备的归属地时,可以直接根据该待定位设备上报的登录信息来确定,也即直接根据目标登录信息中登录应用程序的第二权重值和登录用户的第一权重值来确定目标登录地点。这种确定方法结合了业务数据和用户本身因素这两个维度,相对于单个维度的确定方法来说,定位更准确,而且有利于不同业务间实现数据共享,打通信息壁垒。
具体地,当该目标登录地点为根据待定位设备以及其他设备中目标用户标识上报的登录信息来确定时,上述步骤2-2-2具体可以包括:
根据每一登录信息中的目标用户标识获取对应设备标识的第三权重值;
根据每一登录信息对应的第一权重值、第二权重值和第三权重值计算对应登录地点的可信度。
本申请实施例中,该第三权重值主要用于指示每个设备相对于用户的重要程度,其可以根据同一用户标识在每个设备上的登录频次和/或登录时长提前设定好,通常,对于同一用户标识来说,其主要使用设备(比如登录次数最多或登录时长最长的设备)的第三权重值可以设置得很大,非主要使用设备(比如登录过一次的设备)可以设置的很小。这种确定方法结合了业务数据、用户本身因素和设备因素这三个维度进行定位,能有效区分出虚假的登录信息,提高设备定位的精准度。
需要说明的是,由于第三权重值是预先根据每个用户标识在各个设备上的历史登录情况设置好的,故后续可能存在某个用户标识在新设备上进行登录的情况,此时,由于历史登录设备不存在该新设备,故无法获取对应的第三权重 值,对于这种情况,可以默认每个新设备的第三权重值为0或者较小的固定值。
2-3、根据每一登录地点的可信度确定目标登录地点。
例如,上述步骤2-3具体可以包括:
将该登录信息中属于同一登录地点的可信度进行合并,得到合并后可信度,每一登录地点对应一个合并后可信度;
将数值最大的合并后可信度对应的登录地点确定为目标登录地点。
本申请实施例中,可以将同一登录地点对应的所有可信度进行相加,得到总的可信度(也即该合并后可信度),由于可信度的数值越大,说明该登录地点越可能是待定位设备当前所在的地点(也即归属地),故可以直接将最大值的可信度对应的登录地点确定为目标登录地点。
105、根据该目标登录地点对该待定位设备进行定位。
本申请实施例中,可以直接将该目标登录地点确定为待定位设备的当前所在地,从而实现该待定位设备的精准定位。此外,还可以进一步的将登录地点不是目标登录地点的登录信息初步判定为虚假信息,从而有效阻止非法分子想通过伪造地理位置信息从业务中谋取非法利益的现象产生,比如刷单、欺诈、色情代聊等,有利于维护营造一个良好的网络环境。
由上述可知,本申请实施例提供的设备定位方法,通过获取设备定位请求,该设备定位请求携带待定位设备的目标设备标识,之后,根据该目标设备标识确定至少一个目标用户标识,并获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括该目标用户标识、登录设备的设备标识和登录地点,之后,根据每一登录信息中的目标用户标识和设备标识确定目标登录地点,并根据该目标登录地点对该待定位设备进行定位,从而能从多个维度来实现设备定位,准确性高。
根据前述实施例所描述的方法,以下将举例作进一步详细说明。
在本申请实施例中,将以设备定位装置集成在服务器中为例进行详细说明。
如图2B所示,一种设备定位方法,具体流程可以如下:
S201、服务器获取预设时间内登录待定位设备的所有用户标识。
譬如,该预设时间可以为60天,该待定位设备可以为A1,该用户标识可以为用户在与该待定位设备对应的多个应用系统中注册的用户账号,比如U1、U2……Un,n为正整数,具体请参见图2C。
S202、服务器统计该预设时间内每一用户标识在该待定位设备上的登录总时长,并根据每一登录总时长的大小对用户标识进行排序。
譬如,服务器可以将每一用户标识Ui在待定位设备A1上每次登录的时长进行相加,得到登录总时长,然后将每个用户标识Ui按照登录时长从大到小的顺序进行排序,得到排序后的用户标识{U1、U2……Un},i∈(1、2……n)。
S203、服务器获取排序后的用户标识中位于前预设位的用户标识,作为目标用户标识。
譬如,该预设位可以设定为3,此时,服务器可以将{U1、U2、U3}确定为目标用户标识。
S204、服务器建立该待定位设备的目标设备标识和该目标用户标识之间的关联关系,并将该关联关系存储在标识库中。
譬如,该标识库中可以存储该服务器平台上所有已注册用户标识中每一用户标识与其已登录设备的设备标识之间的关联关系,从而后续可以根据设备标识查找到对应的用户标识。
S205、服务器获取设备定位请求,该设备定位请求携带该待定位设备的目标设备标识。
譬如,当服务器检测到某个设备上报了多个登录地点,该登陆地点是根据IP地址和GPS得到的,则可以针对该设备生成设备定位请求,比如在设备A1中,若用户标识U1上报的登录地点为P1,用户标识Ui上报的登录地点为P2时,可以将设备A1确定为待定位设备,并生成该设备定位请求。
S206、服务器根据该关联关系从标识库中获取与该目标设备标识对应的目标用户标识。
譬如,服务器可以根据目标设备标识A1在标识库中查找到目标用户标识{U1、U2、U3}。
S207、服务器获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括该目标用户标识、登录设备的设备标识、登录应用程序的应用标识和登录地点。
譬如,服务器可以分别获取U1、U2和U3上报的所有登录信息。
S208、服务器根据每一登录信息中的设备标识获取对应目标用户标识的第一权重值,根据每一登录信息中的目标用户标识获取对应应用标识的第二权重值,根据每一登录信息中的目标用户标识获取对应设备标识的第三权重值。
譬如,服务器可以预先统计U1、U2和U3上报的历史登录应用程序和历史登录设备,然后根据U1、U2或U3在每个历史登录设备上的登录频次和/或时长设定每个历史登录设备相对于U1、U2或U3的第三权重值,根据每个历史登录应用程序的实名程度高低设定第二权重值,根据U1、U2和U3在该待定位设备上的登录频次和/或时长设定U1、U2或U3相对于待定位设备的第一权重值,并进行存储,从而后续可以直接获取已存储的第一权重值、第二权重值和第三权重值。
S209、服务器根据每一登录信息对应的第一权重值、第二权重值和第三权重值计算对应登录地点的可信度。
譬如,假设应用程序C1、C2和C3的第二权重值分别为a、b、c,U1、U2和U3相对于待定位设备A1的第三权重值分别为1、0.9、0.8,请参见图2D,在下述登陆信息中,
若U1在设备A1上通过社交应用C1上报了登录地点P1,其中,A1相对于U1的第一权重值为1,则P1的可信度可以为1*1*a;
若U1在设备A2上通过支付应用C3上报了登录地点P1,其中,A1相对于U1的第一权重值为1,A2的第一权重值为0.8,则P1的可信度可以为1*0.8*c;
若U2在设备A1上通过游戏应用C2上报了登陆地点P2,其中,A1相对于U2的第一权重值为1.2,则P2的可信度可以为0.9*1.2*b;
若U2在设备A3上通过社交应用C1上报了登陆地点P1,其中,A3相对于U2的第一权重值为0.6,则P1的可信度可以为0.9*0.6*a;
若U3在设备A1上通过支付应用C3上报了登录地点P3,其中,A1相对于U3的第一权重值为0.7,则P3的可信度可以为0.8*0.7*c;
若U3在设备A4上通过社交应用C1上报了登录地点P2,其中,A4相对于U3的第一权重值为0.5,则P2的可信度可以为0.8*0.5*a。
S210、服务器将该登录信息中属于同一登录地点的可信度进行合并,得到合并后可信度,每一登录地点对应一个合并后可信度。
譬如,合并后可信度Rank(P1)=1*1*a+1*0.8*c+0.9*0.6*a,
Rank(P2)=0.9*1.2*b+0.8*0.5*a,
Rank(P3)=0.8*0.7*c。
S211、服务器将数值最大的合并后可信度对应的登录地点确定为目标登录地点,并根据该目标登录地点对该待定位设备进行定位。
譬如,目标登录地点P可以为Max(Rank(P1),Rank(P2),Rank(P3)),之后,可以将该待定位设备A1的归属地确定为目标登录地点P。
由上述可知,本申请实施例提供的设备定位方法,其中服务器可以获取预设时间内登录待定位设备的所有用户标识。接着,服务器统计该预设时间内每一用户标识在该待定位设备上的登录总时长,并根据每一登录总时长的大小对该用户标识进行排序。接着,服务器获取排序后的用户标识中位于前预设位的用户标识,作为目标用户标识,建立该待定位设备的目标设备标识和该目标用户标识之间的关联关系,并将该关联关系存储在标识库中。之后,服务器获取设备定位请求,该设备定位请求携带该待定位设备的目标设备标识。服务器根据关联关系从标识库中获取与该目标设备标识对应的目标用户标识。接着,服务器获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括该目标用户标识、登录设备的设备标识、登录应用程序的应用标识和登录地点。服务器根据每一登录信息中的设备标识获取对应目标用户标识的第一权重值,根据每一登录信息中的目标用户标识获取对应应用标识的第二权重值,根据每一登录信息中的目标用户标识获取对应设备标识的第三权重值。之后,服务器根据每一登录信息对应的第一权重值、第二权重值和第三权重值计算对应登录地点的可信度,并将该登录信息中属于同一登录地点的可信度进行合并,得到合并后可信度。每一登录地点对应一个合并后可信度。之后,服务器将数值最大的合并后可信度对应的登录地点确定为目标登录地点,并根据该目标登录地点对该待定位设备进行定位。通过上述的处理过程,服务器能结合业务数据、用户本身因素和设备因素这三个维度对设备进行定位,定位准确性高。
根据前述实施例所描述的方法,本申请实施例将从设备定位装置的角度进一步进行描述,该设备定位装置可以集成在服务器中。
请参阅图3A,图3A具体描述了本申请实施例提供的设备定位装置,其可以包括:第一获取模块10、第一确定模块20、第二获取模块30、第二确定模块40和定位模块50,其中:
(1)第一获取模块10
第一获取模块10,用于获取设备定位请求,该设备定位请求携带待定位设备的目标设备标识。
本申请实施例中,目标设备标识(设备标识)是设备的唯一标识,其可以为设备的IMEI(International Mobile Equipment Identity,国际移动设备码)号、设备指纹、或者在使用设备上的应用程序时系统自动给每一个设备分配的字符串等。这里的设备指纹通常是根据每个设备的硬件信息(比如设备品牌、型号等)和网络浏览信息形成的,不同的设备具有不同的设备指纹。例如,当系统中的检测服务器检测到某个设备在使用不同的应用程序的过程中,向应用程序服务器上报的登录地点不一致时,可以将该设备确定为待定位设备,此时,可以生成该设备定位请求,发送给设备定位装置。设备定位装置中的第一获取模块10获取该设备定位请求,对所述设备进行定位。
(2)第一确定模块20
第一确定模块20,用于根据该目标设备标识确定至少一个目标用户标识。
本申请实施例中,目标用户标识(用户标识)是用户的识别标识,同一用户在不同的应用系统中通常具有不同的用户标识,该用户标识可以为用户在使用应用程序的过程中,在应用系统中的服务器上注册的账号,也可是应用系统中的服务器为每个用户分配的字符串,等等。该至少一个目标用户标识可以是同一个用户在与该目标设备标识对应的目标设备上不同应用程序中的用户标识,也可以是不同用户在与该目标设备标识对应的目标设备上同一应用程序中的用户标识。
例如,该第一确定模块20具体可以用于:
从标识库中查找与该目标设备标识对应的用户标识,作为目标用户标识。
本申请实施例中,该标识库中的标识可以包括用户标识和设备标识,该用户标识与设备标识之间可以相互关联,每一设备标识可以对应至少一个用户标识,每一用户标识可以对应至少一个设备标识,具体数量可以根据实际情况而定。
例如,该标识库可以是预先设置好的,也可以称为是数据库。即,请参阅图3B,该设备定位装置还可以包括关联模块60,用于:在根据该目标设备标识确定至少一个目标用户标识之前,执行以下步骤:
1-1、获取预设时间内登录该待定位设备的所有用户标识。
本申请实施例中,该预设时间可以根据实际需求而定,比如可以为一个月或两个月等。通常,对于用户每次在应用系统中的登录情况,比如登录设备、登录时间、登录账号和登录应用程序等,服务器均可以自动进行记录,存储在标识库中。设备定位装置可以从标识库中获取所述预设时间内登录该待定位设备的所有用户标识。
1-2、从用户标识中确定目标用户标识。
例如,上述关联模块60进一步可以用于:
统计该预设时间内每一用户标识在该待定位设备上的登录总时长;
根据每一用户标识登录总时长的大小对用户标识进行排序;
获取排序后的用户标识中位于前预设位的用户标识,作为目标用户标识。
本申请实施例中,该预设位可以根据实际需求而定,比如可以为3位或4位等。例如,关联模块60可以将预设时间内某个用户标识的每次登录时间进行求和,得到该用户标识的登录总时长,然后将登录总时长排在前几位的用户标识确定为目标用户标识。一般来说,登录总时长越长的用户标识,越可能是该待定位设备持有者的用户标识,也是该待定位设备的主要使用者的用户标识,这些用户标识的登录情况(主要是登录地点)在后续对设备归属地的判定过程中具有重要参考性。
1-3、建立该目标设备标识和目标用户标识之间的关联关系,并将该关联关系存储在标识库中。
本申请实施例中,每个设备标识可以关联多个用户标识,每个用户标识均是该设备标识所指示设备的主要使用标识,其可以是同一个用户或不同用户在不同应用程序上的注册账号,这些不同程序应用通常是一个运营商开发的。
此时,该第一确定模块20进一步可以用于:根据目标设备标识与目标用户标识之间的关联关系从标识库中获取与该目标设备标识对应的用户标识,作为目标用户标识。
本申请实施例中,关联模块60通过将每一设备的设备标识和对应的用户标识进行关联,从而后续第一确定模块20可以根据设备标识找到对应的用户标识。
(3)第二获取模块30
第二获取模块30,用于获取每一目标用户标识上报的至少一条登录信息,每一登录信息可以包括该目标用户标识、登录设备的设备标识和登录地点。
本申请实施例中,该登录信息主要指与用户登录有关的信息,比如登录账号(也即登录用户标识)、登录设备、登录应用程序、登录时间以及登录地点等,其中,登陆地点可以是设备内置GPS的定位地点,也可以是根据设备的IP地址得到的地点,具体可以根据实际需求而定。通常,考虑到GPS信息不容易被伪造,故第二获取模块30可以优先将GPS的定位地点作为登录地点,只有当GPS功能无法使用时,才根据IP地址确定登录地点。
(4)第二确定模块40
第二确定模块40,用于根据每一登录信息中的目标用户标识和设备标识确定目标登录地点。
例如,该第二确定模块40具体可以包括获取子模块41、计算子模块42和确定子模块43,其中:
获取子模块41,用于根据每一登录信息中的设备标识获取对应目标用户标识的第一权重值。
本申请实施例中,第一权重值主要用于指示每个用户标识相对于设备的重要程度,其可以根据同一设备上每个用户标识的使用频度和/或登录时长提前设定好,通常,对于同一设备上出现的不同用户标识,用户标识登录越频繁或登录时长越长,代表该用户标识对该设备越重要,也即第一权重值越大。
计算子模块42,用于根据每一登录信息对应的第一权重值计算对应登录地点的可信度。
本申请实施例中,可信度主要指设备所在地(也即归属地)为对应登录地点的可信程度。可信度的确定方式可以有多种,比如可以直接根据该第一权重值计算得到,也即直接根据每个用户标识在设备上的使用频度和登录时长来计算可信度。通常,使用越频繁或登录时间越长的用户标识所对应的登录地点为设备归属地的可信度越高,从而可以根据同一设备上多个用户的登录情况来确定该设备的归属地。相对于现有只针对单个用户的登录情况来确定设备归属地的方法来说,本申请实施例的设备定位装置能有效避免因伪造单个用户的登录信息而导致定位错误的问题,提高了定位的准确性。
当然,为进一步确保定位准确性,可以从多个维度进行定位,比如结合该设备所参与业务的业务数据来计算可信度,也即,该登录信息还可以包括登录应用程序的应用标识,该计算子模块42具体可以包括获取单元和计算单元,其中:
获取单元,用于根据每一登录信息中的目标用户标识获取对应应用标识的第二权重值。
本申请实施例中,该应用标识是应用程序的唯一识别标识,其可以是应用程序名称,不同的应用程序具有不同的应用标识。该第二权重值主要用于指示每个应用程序相对于用户的重要程度,其可以根据用户本身因素(比如使用习惯)提前设定好,比如使用越频繁的应用程序,其第二权重值可以设定成越大。当然,该第二权重值还可以结合应用程序本身因素(比如实名程度高低)而定,通常,由于实名程度越高的应用程序,其上报的登录信息越不容易造假,对于设备归属地判定的参考价值也越高,故可以使第二权重值与实名程度成正比,比如对于支付类型、社交类型以及视频播放类型这些实名程度依次递减的应用程序,可以将其权重值也设定成依次递减。
需要说明的是,由于不同的用户具有不同的使用习惯,故对于同一应用程序而言,不同的用户具有不同的第二权重值。此外,该第二权重值不仅可以根据用户本身因素,或者用户本身因素和应用程序本身因素而定,还可以直接根据应用程序本身因素而定,此时,对于同一应用程序而言,不同的用户具有相同的第二权重值。
计算单元,用于根据每一登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度。
本申请实施例中,可以直接根据该待定位设备中目标用户标识上报的登录信息来确定目标登录地点,也可以结合目标用户标识在其他设备中上报的登录信息来确定目标登录地点,当然,也可以是其他确定方式。该计算方法可以根据实际需求而定,比如可以是简单的乘法或加法,等等。
例如,当该目标登录地点为仅根据待定位设备上报的登录信息来确定时,该计算单元具体可以用于:
获取该目标设备标识对应的登录信息,作为目标登录信息;
根据每一目标登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度。
本申请实施例中,由于每一目标用户标识可能在多个设备中均上报了登录地点,故当需要分析待定位设备的归属地时,可以直接根据该待定位设备上报的登录信息来确定,也即直接根据目标登录信息中登录应用程序的第二权重值和登录用户的第一权重值来确定目标登录地点。这种确定方法结合了业务数据 和用户本身因素这两个维度,相对于单个维度的确定方法来说,定位更准确,而且有利于不同业务间实现数据共享,打通信息壁垒。
此外,当该目标登录地点为根据待定位设备以及其他设备中目标用户标识上报的登录信息来确定时,该计算单元具体可以用于:
根据每一登录信息中的目标用户标识获取对应设备标识的第三权重值;
根据每一登录信息对应的第一权重值、第二权重值和第三权重值计算对应登录地点的可信度。
本申请实施例中,该第三权重值主要用于指示每个设备相对于用户的重要程度,其可以根据同一用户标识在每个设备上的登录频次和/或登录时长提前设定好。通常,对于同一用户标识来说,其主要使用设备(比如登录次数最多或登录时长最长的设备)的第三权重值可以设置得很大,非主要使用设备(比如登录过一次的设备)可以设置的很小。这种确定方法结合了业务数据、用户本身因素和设备因素这三个维度进行定位,能有效区分出虚假的登录信息,提高设备定位的精准度。
需要说明的是,由于第三权重值是预先根据每个用户标识在各个设备上的历史登录情况设置好的,故后续可能存在某个用户标识在新设备上登录的情况,此时,由于历史登录设备不存在该新设备,故无法获取对应的第三权重值,对于这种情况,可以默认每个新设备的第三权重值为0或者较小的固定值。
确定子模块43,用于根据每一登录地点的可信度确定目标登录地点。
例如,该确定子模块43具体可以用于:
将该登录信息中属于同一登录地点的可信度进行合并,得到合并后可信度,每一登录地点对应一个合并后可信度;
将数值最大的合并后可信度对应的登录地点确定为目标登录地点。
本申请实施例中,确定子模块43可以将同一登录地点对应的所有可信度进行相加,得到总的可信度(也即该合并后可信度),由于可信度的数值越大,说明该登录地点越可能是待定位设备当前所在的地点(也即归属地),故可以直接将最大值的可信度对应的登录地点确定为目标登录地点。
(5)定位模块50
定位模块50,用于根据该目标登录地点对该待定位设备进行定位。
本申请实施例中,定位模块50可以直接将该目标登录地点确定为待定位设备的当前所在地,从而实现该待定位设备的精准定位。此外,服务器还可以进一步的将登录地点不是目标登录地点的登录信息初步判定为虚假信息,从而有效阻止非法分子想通过伪造地理位置信息从业务中谋取非法利益的现象产生,比如刷单、欺诈、色情代聊等,有利于维护营造一个良好的网络环境。
具体实施时,以上各个单元可以作为独立的实体来实现,也可以进行任意组合,作为同一或若干个实体来实现,以上各个单元的具体实施可参见前面的方法实施例,在此不再赘述。
由上述可知,本申请实施例提供的设备定位装置,通过第一获取模块10获取设备定位请求,该设备定位请求携带待定位设备的目标设备标识,之后,第一确定模块20根据该目标设备标识确定至少一个目标用户标识,第二获取模块30获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括该目标用户标识、登录设备的设备标识和登录地点,之后,第二确定模块40根据每一登录信息中的目标用户标识和设备标识确定目标登录地点,定位模块50根据该目标登录地点对该待定位设备进行定位,从而能从多个维度来实现设备定位,准确性高。
相应地,本申请实施例还提供一种设备定位系统,包括本申请实施例所提供的任一种设备定位装置,该设备定位装置可以集成在服务器中。
其中,服务器可以获取设备定位请求,该设备定位请求携带待定位设备的目标设备标识;根据该目标设备标识确定至少一个目标用户标识;获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括该目标用户标识、登录设备的设备标识和登录地点;根据每一登录信息中的目标用户标识和设备标识确定目标登录地点;根据该目标登录地点对该待定位设备进行定位。
以上各个设备的具体实施可参见前面的实施例,在此不再赘述。
由于该设备定位系统可以包括本申请实施例所提供的任一种设备定位装置,因此,可以实现本申请实施例所提供的任一种设备定位装置所能实现的有益效果,详见前面的实施例,在此不再赘述。
本申请实施例还提供一种服务器,如图4所示,其示出了本申请实施例所涉及的服务器的结构示意图,具体来讲:
该服务器可以包括一个或者一个以上处理核心的处理器701、一个或一个以上计算机可读存储介质的存储器702、射频(Radio Frequency,RF)电路703、电源704、输入单元705、以及显示单元706等部件。图4中示出的服务器结构并不构成对服务器的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。其中:
处理器701是该服务器的控制中心,利用各种接口和线路连接整个服务器的各个部分,通过运行或执行存储在存储器702内的软件程序和/或模块,以及调用存储在存储器702内的数据,执行服务器的各种功能和处理数据,从而对服务器进行整体监控。可选的,处理器701可包括一个或多个处理核心;处理器701可集成应用处理器和调制解调处理器,其中,应用处理器主要处理操作系统、用户界面和应用程序等,调制解调处理器主要处理无线通信。可以理解的是,上述调制解调处理器也可以不集成到处理器701中。
存储器702可用于存储软件程序以及模块,处理器701通过运行存储在存储器702的软件程序以及模块,从而执行各种功能应用以及数据处理。存储器702可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作系统、至少一个功能所需的应用程序(比如声音播放功能、图像播放功能等)等;存储数据区可存储根据服务器的使用所创建的数据等。此外,存储器702可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。相应地,存储器702还可以包括存储器控制器,以提供处理器701对存储器702的访问。
RF电路703可用于收发信息过程中,信号的接收和发送,特别地,将基站的下行信息接收后,交由一个或者一个以上处理器701处理;另外,将涉及上行的数据发送给基站。通常,RF电路703包括但不限于天线、至少一个放大器、调谐器、一个或多个振荡器、用户身份模块(SIM)卡、收发信机、耦合器、低噪声放大器(LNA,Low Noise Amplifier)、双工器等。此外,RF电路703还可以通过无线通信与网络和其他设备通信。该无线通信可以使用任一通信标准或协议,包括但不限于全球移动通讯系统(GSM,Global System of Mobile communication)、通用分组无线服务(GPRS,General Packet Radio Service)、码分多址(CDMA,Code Division Multiple Access)、宽带码分多址(WCDMA,Wideband Code Division Multiple Access)、长期演进(LTE, Long Term Evolution)、电子邮件、短消息服务(SMS,Short Messaging Service)等。
服务器还包括给各个部件供电的电源704(比如电池)。电源704可以通过电源管理系统与处理器701逻辑相连,从而通过电源管理系统实现管理充电、放电、以及功耗管理等功能。电源704还可以包括一个或一个以上的直流或交流电源、再充电系统、电源故障检测电路、电源转换器或者逆变器、电源状态指示器等任意组件。
该服务器还可包括输入单元705,该输入单元705可用于接收输入的数字或字符信息,以及产生与用户设置以及功能控制有关的键盘、鼠标、操作杆、光学或者轨迹球信号输入。具体地,在一个具体的实施例中,输入单元705可包括触敏表面以及其他输入设备。触敏表面,也称为触摸显示屏或者触控板,可收集用户在其上或附近的触摸操作(比如用户使用手指、触笔等任何适合的物体或附件在触敏表面上或在触敏表面附近的操作),并根据预先设定的程式驱动相应的连接装置。可选的,触敏表面可包括触摸检测装置和触摸控制器两个部分。其中,触摸检测装置检测用户的触摸方位,并检测触摸操作带来的信号,将信号传送给触摸控制器;触摸控制器从触摸检测装置上接收触摸信息,并将它转换成触点坐标,再送给处理器701,并能接收处理器701发来的命令并加以执行。此外,可以采用电阻式、电容式、红外线以及表面声波等多种类型实现触敏表面。除了触敏表面,输入单元705还可以包括其他输入设备。具体地,其他输入设备可以包括但不限于物理键盘、功能键(比如音量控制按键、开关按键等)、轨迹球、鼠标、操作杆等中的一种或多种。
该服务器还可包括显示单元706,该显示单元706可用于显示由用户输入的信息或提供给用户的信息以及服务器的各种图形用户接口,这些图形用户接口可以由图形、文本、图标、视频和其任意组合来构成。显示单元706可包括显示面板,可选的,可以采用液晶显示器(LCD,Liquid Crystal Display)、有机发光二极管(OLED,Organic Light-Emitting Diode)等形式来配置显示面板。进一步的,触敏表面可覆盖显示面板,当触敏表面检测到在其上或附近的触摸操作后,传送给处理器701以确定触摸事件的类型,随后处理器701根据触摸事件的类型在显示面板上提供相应的视觉输出。虽然在图4中,触敏表面与显示面板是作为两个独立的部件来实现输入和输入功能,但是在某些实施例中,可以将触敏表面与显示面板集成而实现输入和输出功能。
尽管未示出,服务器还可以包括摄像头、蓝牙模块等,在此不再赘述。具体在本申请实施例中,服务器中的处理器701会按照如下的指令,将一个或一个以上的应用程序的进程对应的可执行文件加载到存储器702中,并由处理器701来运行存储在存储器702中的应用程序,从而实现各种功能,如下:
获取设备定位请求,该设备定位请求携带待定位设备的目标设备标识;
根据该目标设备标识确定至少一个目标用户标识;
获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括该目标用户标识、登录设备的设备标识和登录地点;
根据每一登录信息中的目标用户标识和设备标识确定目标登录地点;
根据该目标登录地点对该待定位设备进行定位。
其中,所述根据每一登录信息中的目标用户标识和设备标识确定目标登录地点,包括:
根据每一登录信息中的设备标识获取对应目标用户标识的第一权重值;
根据每一登录信息对应的第一权重值计算对应登录地点的可信度;
根据每一登录地点的可信度确定目标登录地点。
其中,所述根据每一登录地点的可信度确定目标登录地点,包括:
将所述登录信息中属于同一登录地点的可信度进行合并,得到合并后可信度,每一登录地点对应一个合并后可信度;
将数值最大的合并后可信度对应的登录地点确定为目标登录地点。
其中,所述登录信息还包括登录应用程序的应用标识,所述根据每一登录信息对应的第一权重值计算对应登录地点的可信度,包括:
根据每一登录信息中的目标用户标识获取对应应用标识的第二权重值;
根据每一登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度。
其中,所述根据每一登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度,包括:
获取所述目标设备标识对应的登录信息,作为目标登录信息;
根据每一目标登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度。
其中,所述根据每一登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度,包括:
根据每一登录信息中的目标用户标识获取对应设备标识的第三权重值;
根据每一登录信息对应的第一权重值、第二权重值和第三权重值计算对应登录地点的可信度。
其中,在根据所述目标设备标识确定至少一个目标用户标识之前,还包括:
获取预设时间内登录所述待定位设备的所有用户标识;
从所述用户标识中确定目标用户标识;
建立所述目标设备标识和目标用户标识之间的关联关系,并将所述关联关系存储在标识库中;
所述根据所述目标设备标识确定至少一个目标用户标识,包括:根据所述关联关系从标识库中获取与所述目标设备标识对应的用户标识,作为目标用户标识。
其中,所述从所述用户标识中确定目标用户标识,包括:
统计所述预设时间内每一用户标识在所述待定位设备上的登录总时长;
根据每一登录总时长的大小对所述用户标识进行排序;
获取排序后的用户标识中位于前预设位的用户标识,作为目标用户标识。
该服务器可以实现本申请实施例所提供的任一种设备定位装置所能实现的有效效果,详见前面的实施例,在此不再赘述。
本领域普通技术人员可以理解上述实施例的各种方法中的全部或部分步骤是可以通过程序来指令相关的硬件来完成,该程序可以存储于一计算机可读存储介质中,存储介质可以包括:只读存储器(ROM,Read Only Memory)、随机存取记忆体(RAM,Random Access Memory)、磁盘或光盘等。
以上对本申请实施例所提供的一种设备定位方法、装置和系统进行了详细介绍,本文中应用了具体个例对本申请的原理及实施方式进行了阐述,以上实施例的说明只是用于帮助理解本申请的方法及其核心思想;同时,对于本领域的技术人员,依据本申请的思想,在具体实施方式及应用范围上均会有改变之处,综上所述,本说明书内容不应理解为对本申请的限制。

Claims (24)

  1. 一种设备定位方法,包括:
    获取设备定位请求,所述设备定位请求携带待定位设备的目标设备标识;
    根据所述目标设备标识确定至少一个目标用户标识;
    获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括所述目标用户标识、登录设备的设备标识和登录地点;
    根据每一登录信息中的目标用户标识和设备标识确定目标登录地点;
    根据所述目标登录地点对所述待定位设备进行定位。
  2. 根据权利要求1所述的设备定位方法,其中,所述根据每一登录信息中的目标用户标识和设备标识确定目标登录地点包括:
    根据每一登录信息中的设备标识获取对应目标用户标识的第一权重值;
    根据每一登录信息对应的第一权重值计算对应登录地点的可信度;
    根据每一登录地点的可信度确定目标登录地点。
  3. 根据权利要求2所述的设备定位方法,其中,所述根据每一登录地点的可信度确定目标登录地点包括:
    将所述登录信息中属于同一登录地点的可信度进行合并,得到合并后可信度,每一登录地点对应一个合并后可信度;
    将数值最大的合并后可信度对应的登录地点确定为目标登录地点。
  4. 根据权利要求2所述的设备定位方法,其中,所述登录信息还包括登录应用程序的应用标识,所述根据每一登录信息对应的第一权重值计算对应登录地点的可信度包括:
    根据每一登录信息中的目标用户标识获取对应应用标识的第二权重值;
    根据每一登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度。
  5. 根据权利要求4所述的设备定位方法,其中,所述根据每一登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度包括:
    获取所述目标设备标识对应的登录信息,作为目标登录信息;
    根据每一目标登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度。
  6. 根据权利要求4所述的设备定位方法,其中,所述根据每一登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度包括:
    根据每一登录信息中的目标用户标识获取对应设备标识的第三权重值;
    根据每一登录信息对应的第一权重值、第二权重值和第三权重值计算对应登录地点的可信度。
  7. 根据权利要求1-6中任意一项所述的设备定位方法,其中,在根据所述目标设备标识确定至少一个目标用户标识之前,还包括:
    获取预设时间内登录所述待定位设备的所有用户标识;
    从所述用户标识中确定目标用户标识;
    建立所述目标设备标识和目标用户标识之间的关联关系,并将所述关联关系存储在标识库中;
    所述根据所述目标设备标识确定至少一个目标用户标识,包括:根据所述关联关系从标识库中获取与所述目标设备标识对应的用户标识,作为目标用户标识。
  8. 根据权利要求7所述的设备定位方法,其中,所述从所述用户标识中确定目标用户标识包括:
    统计所述预设时间内每一用户标识在所述待定位设备上的登录总时长;
    根据每一登录总时长的大小对所述用户标识进行排序;
    获取排序后的用户标识中位于前预设位的用户标识,作为目标用户标识。
  9. 一种设备定位装置,包括:处理器和存储器,所述存储器上存储有计算机可读指令,所述计算机可读指令由所述处理器执行以完成以下操作:
    获取设备定位请求,所述设备定位请求携带待定位设备的目标设备标识;
    根据所述目标设备标识确定至少一个目标用户标识;
    获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括所述目标用户标识、登录设备的设备标识和登录地点;
    根据每一登录信息中的目标用户标识和设备标识确定目标登录地点;
    根据所述目标登录地点对所述待定位设备进行定位。
  10. 根据权利要求9所述的设备定位装置,其中,所述根据每一登录信息中的目标用户标识和设备标识确定目标登录地点包括:
    根据每一登录信息中的设备标识获取对应目标用户标识的第一权重值;
    根据每一登录信息对应的第一权重值计算对应登录地点的可信度;
    根据每一登录地点的可信度确定目标登录地点。
  11. 根据权利要求10所述的设备定位装置,其中,所述根据每一登录地 点的可信度确定目标登录地点包括:
    将所述登录信息中属于同一登录地点的可信度进行合并,得到合并后可信度,每一登录地点对应一个合并后可信度;
    将数值最大的合并后可信度对应的登录地点确定为目标登录地点。
  12. 根据权利要求10所述的设备定位装置,其中,所述登录信息还包括登录应用程序的应用标识,所述根据每一登录信息对应的第一权重值计算对应登录地点的可信度包括:
    根据每一登录信息中的目标用户标识获取对应应用标识的第二权重值;
    根据每一登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度。
  13. 根据权利要求12所述的设备定位装置,其中,所述根据每一登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度包括:
    根据每一登录信息中的目标用户标识获取对应设备标识的第三权重值;
    根据每一登录信息对应的第一权重值、第二权重值和第三权重值计算对应登录地点的可信度。
  14. 根据权利要求9-13中任意一项所述的设备定位装置,其中,所述计算机可读指令由所述处理器执行还完成以下操作:在根据所述目标设备标识确定至少一个目标用户标识之前,
    获取预设时间内登录所述待定位设备的所有用户标识;
    从所述用户标识中确定目标用户标识;
    建立所述目标设备标识和目标用户标识之间的关联关系,并将所述关联关系存储在标识库中;
    所述第一确定模块用于:根据所述关联关系从标识库中获取与所述目标设备标识对应的用户标识,作为目标用户标识。
  15. 根据权利要求14所述的设备定位装置,其中,所述从所述用户标识中确定目标用户标识包括:
    统计所述预设时间内每一用户标识在所述待定位设备上的登录总时长;
    根据每一登录总时长的大小对所述用户标识进行排序;
    获取排序后的用户标识中位于前预设位的用户标识,作为目标用户标识。
  16. 一种设备定位方法,用于服务器,所述服务器包括:处理器和存储器,所述方法包括:
    获取设备定位请求,所述设备定位请求携带待定位设备的目标设备标识;
    根据所述目标设备标识确定至少一个目标用户标识;
    获取每一目标用户标识上报的至少一条登录信息,每一登录信息包括所述目标用户标识、登录设备的设备标识和登录地点;
    根据每一登录信息中的目标用户标识和设备标识确定目标登录地点;
    根据所述目标登录地点对所述待定位设备进行定位。
  17. 根据权利要求16所述的设备定位方法,其中,所述根据每一登录信息中的目标用户标识和设备标识确定目标登录地点包括:
    根据每一登录信息中的设备标识获取对应目标用户标识的第一权重值;
    根据每一登录信息对应的第一权重值计算对应登录地点的可信度;
    根据每一登录地点的可信度确定目标登录地点。
  18. 根据权利要求16所述的设备定位方法,其中,所述根据每一登录地点的可信度确定目标登录地点包括:
    将所述登录信息中属于同一登录地点的可信度进行合并,得到合并后可信度,每一登录地点对应一个合并后可信度;
    将数值最大的合并后可信度对应的登录地点确定为目标登录地点。
  19. 根据权利要求17所述的设备定位方法,其中,所述登录信息还包括登录应用程序的应用标识,所述根据每一登录信息对应的第一权重值计算对应登录地点的可信度包括:
    根据每一登录信息中的目标用户标识获取对应应用标识的第二权重值;
    根据每一登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度。
  20. 根据权利要求19所述的设备定位方法,其中,所述根据每一登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度包括:
    获取所述目标设备标识对应的登录信息,作为目标登录信息;
    根据每一目标登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度。
  21. 根据权利要求19所述的设备定位方法,其中,所述根据每一登录信息对应的第一权重值和第二权重值计算对应登录地点的可信度包括:
    根据每一登录信息中的目标用户标识获取对应设备标识的第三权重值;
    根据每一登录信息对应的第一权重值、第二权重值和第三权重值计算对应登录地点的可信度。
  22. 根据权利要求16-21中任意一项所述的设备定位方法,其中,在根据所述目标设备标识确定至少一个目标用户标识之前,还包括:
    获取预设时间内登录所述待定位设备的所有用户标识;
    从所述用户标识中确定目标用户标识;
    建立所述目标设备标识和目标用户标识之间的关联关系,并将所述关联关系存储在标识库中;
    所述根据所述目标设备标识确定至少一个目标用户标识,包括:根据所述关联关系从标识库中获取与所述目标设备标识对应的用户标识,作为目标用户标识。
  23. 根据权利要求22所述的设备定位方法,其中,所述从所述用户标识中确定目标用户标识包括:
    统计所述预设时间内每一用户标识在所述待定位设备上的登录总时长;
    根据每一登录总时长的大小对所述用户标识进行排序;
    获取排序后的用户标识中位于前预设位的用户标识,作为目标用户标识。
  24. 一种计算机可读存储介质,其中,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行上述权利要求1-8中任一项权利要求中的设备定位方法。
PCT/CN2018/086792 2017-05-17 2018-05-15 设备定位方法及装置 WO2018210214A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US16/365,124 US11240777B2 (en) 2017-05-17 2019-03-26 Device positioning method and apparatus

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710345737.0A CN108966340B (zh) 2017-05-17 2017-05-17 一种设备定位方法及装置
CN201710345737.0 2017-05-17

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/365,124 Continuation US11240777B2 (en) 2017-05-17 2019-03-26 Device positioning method and apparatus

Publications (1)

Publication Number Publication Date
WO2018210214A1 true WO2018210214A1 (zh) 2018-11-22

Family

ID=64273353

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/086792 WO2018210214A1 (zh) 2017-05-17 2018-05-15 设备定位方法及装置

Country Status (3)

Country Link
US (1) US11240777B2 (zh)
CN (1) CN108966340B (zh)
WO (1) WO2018210214A1 (zh)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109302377B (zh) * 2018-06-13 2021-01-15 百度在线网络技术(北京)有限公司 一种应用功能实现方法、装置、设备和存储介质
CN109885350A (zh) * 2019-01-14 2019-06-14 平安科技(深圳)有限公司 用户界面配置方法、系统、计算机设备及存储介质
CN110544132B (zh) * 2019-09-06 2023-04-07 上海喜马拉雅科技有限公司 用户常活动位置的确定方法、装置、设备和存储介质
CN114491357B (zh) * 2021-12-27 2023-11-03 北京金堤科技有限公司 用户地域属性的确定方法、装置、设备及计算机存储介质

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220623A (zh) * 2013-04-03 2013-07-24 腾讯科技(深圳)有限公司 一种终端定位方法和装置
CN104105064A (zh) * 2014-07-28 2014-10-15 小米科技有限责任公司 定位设备的方法及装置
CN105491524A (zh) * 2015-12-11 2016-04-13 小米科技有限责任公司 一种确定目标便携设备位置的方法和装置
CN105578411A (zh) * 2015-12-18 2016-05-11 小米科技有限责任公司 定位信息提示方法及装置

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8155662B2 (en) * 2007-02-19 2012-04-10 Microsoft Corporation Self-configuring wireless network location system
US9922323B2 (en) * 2007-03-16 2018-03-20 Visa International Service Association System and method for automated analysis comparing a wireless device location with another geographic location
US8930438B2 (en) * 2009-06-17 2015-01-06 Apple Inc. Push-based location update
US9729930B2 (en) * 2010-01-05 2017-08-08 CSC Holdings, LLC Enhanced subscriber authentication using location tracking
US9065908B2 (en) * 2010-02-12 2015-06-23 Broadcom Corporation Method and system for ensuring user and/or device anonymity for location based services (LBS)
US8281397B2 (en) * 2010-04-29 2012-10-02 Telcordia Technologies, Inc. Method and apparatus for detecting spoofed network traffic
US8615605B2 (en) * 2010-10-22 2013-12-24 Microsoft Corporation Automatic identification of travel and non-travel network addresses
CN104244174B (zh) * 2013-06-13 2018-10-26 阿里巴巴集团控股有限公司 终端的地理位置信息的获取方法和服务器
US20150215762A1 (en) * 2014-01-24 2015-07-30 Qualcomm Incorporated Method and apparatus for verifying the identity of a wireless device
EP3345349A4 (en) * 2015-09-05 2019-08-14 Nudata Security Inc. SYSTEMS AND METHODS FOR DETECTING AND PENALIZING ANOMALIES

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220623A (zh) * 2013-04-03 2013-07-24 腾讯科技(深圳)有限公司 一种终端定位方法和装置
CN104105064A (zh) * 2014-07-28 2014-10-15 小米科技有限责任公司 定位设备的方法及装置
CN105491524A (zh) * 2015-12-11 2016-04-13 小米科技有限责任公司 一种确定目标便携设备位置的方法和装置
CN105578411A (zh) * 2015-12-18 2016-05-11 小米科技有限责任公司 定位信息提示方法及装置

Also Published As

Publication number Publication date
US20190223141A1 (en) 2019-07-18
US11240777B2 (en) 2022-02-01
CN108966340B (zh) 2020-10-13
CN108966340A (zh) 2018-12-07

Similar Documents

Publication Publication Date Title
CN107147647B (zh) 一种网页授权方法及装置
WO2018210214A1 (zh) 设备定位方法及装置
US10304461B2 (en) Remote electronic service requesting and processing method, server, and terminal
US20200053090A1 (en) Automated access control policy generation for computer resources
US10178548B2 (en) Method for protecting terminal location information and intelligent terminal
CN103425736B (zh) 一种网页信息识别方法、装置及系统
CN104426844B (zh) 一种安全认证方法、服务器以及安全认证系统
WO2016082194A1 (zh) 消息处理方法及装置
WO2015000422A1 (en) Method,device and system for detecting potential phishing websites
CN108475304B (zh) 一种关联应用程序和生物特征的方法、装置以及移动终端
US20180012302A1 (en) Data processing method and apparatus for virtual resource
CN106534093B (zh) 一种终端数据的处理方法、装置及系统
EP3640787A1 (en) Input method and electronic device
US11641596B2 (en) Crowd sourced privacy preserving access point mapping
US20180218134A1 (en) Determining computer ownership
US11023544B2 (en) User matching method and apparatus
CN104780234B (zh) Ip归属地查询方法、装置及系统
WO2023173666A1 (zh) 人脸支付方法、装置、电子设备、存储介质、程序和产品
CN114840565A (zh) 抽样查询方法、装置、电子设备及计算机可读存储介质
CN114971662A (zh) 一种数据追踪方法、装置、设备及存储介质
US9633227B2 (en) Method, apparatus, and system of detecting unauthorized data modification
US20160191490A1 (en) Identify a radio frequency emitting device by mac address
CN106060021A (zh) 一种电子邮件识别方法、装置和系统
CN104134044B (zh) 一种数据安全性的检测方法、装置和系统
CN112801837A (zh) 设备聚类方法、装置、存储介质及电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18802569

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18802569

Country of ref document: EP

Kind code of ref document: A1