WO2022111169A1 - 用户身份识别方法、计算设备及计算机存储介质 - Google Patents

用户身份识别方法、计算设备及计算机存储介质 Download PDF

Info

Publication number
WO2022111169A1
WO2022111169A1 PCT/CN2021/125773 CN2021125773W WO2022111169A1 WO 2022111169 A1 WO2022111169 A1 WO 2022111169A1 CN 2021125773 W CN2021125773 W CN 2021125773W WO 2022111169 A1 WO2022111169 A1 WO 2022111169A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
user terminal
time
fingerprint
timing
Prior art date
Application number
PCT/CN2021/125773
Other languages
English (en)
French (fr)
Inventor
方茗
Original Assignee
掌阅科技股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 掌阅科技股份有限公司 filed Critical 掌阅科技股份有限公司
Publication of WO2022111169A1 publication Critical patent/WO2022111169A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication

Definitions

  • the present disclosure relates to the field of Internet technologies, and in particular, to a user identity identification method, a computing device and a computer storage medium.
  • the identification method based on the user account that is, the user uses the mobile phone number, ID number, etc. to register the account, and after the registration, the application platform assigns the user account of the platform.
  • the application platform assigns the user account of the platform.
  • User account and then identify the user through the user account;
  • the second is the identification method based on the user's biometrics or device characteristics, such as obtaining the user's biometrics (such as palm prints, biometric fingerprints, facial features), device IP address, IDFA , IMEI, Cookie and other information to identify users.
  • the user account identification method requires the user to provide privacy information such as mobile phone number and ID number, so there is a potential security risk of leakage of user privacy information.
  • privacy information such as mobile phone number and ID number
  • this type of user will not be able to be identified.
  • user accounts between different applications cannot communicate with each other, which is not conducive to the user's cross-application experience; and user biometrics, device IP address, IDFA, IMEI, etc. can only be obtained by obtaining high-level permissions of the system, which is not conducive to the user's cross-application experience.
  • the present disclosure is proposed to provide a user identification method, a computing device and a computer storage medium that overcome the above problems or at least partially solve the above problems.
  • a user identification method comprising:
  • the user time fingerprint of the user terminal is generated
  • User identification is performed based on user time fingerprints.
  • a computing device including: a processor, a memory, a communication interface, and a communication bus, and the processor, the memory, and the communication interface communicate with each other through the communication bus;
  • the memory is used to store at least one executable instruction, and the executable instruction causes the processor to perform the following operations:
  • the user time fingerprint of the user terminal is generated
  • User identification is performed based on user time fingerprints.
  • a non-volatile computer-readable storage medium where at least one executable instruction is stored in the non-volatile computer-readable storage medium, and the executable instruction causes a processor to execute the above-mentioned The operation corresponding to the user identification method.
  • a computer program product comprising a computing program stored on the above-mentioned non-volatile computer-readable storage medium.
  • the time difference between the user terminal and the corresponding timing server is firstly calculated, the user time fingerprint of the user terminal is generated according to the time difference, and finally based on the user time fingerprint, the user Identification.
  • the user time fingerprint generated by this solution is unique, so that the user's identity can be accurately identified; moreover, this solution does not involve the acquisition of user privacy data, which ensures the security of user privacy data;
  • the corresponding user time fingerprints are the same, which can realize cross-application identification in the same terminal; in addition, this solution can generate user time fingerprints without obtaining high-level system permissions, ensuring user system security and improving user experience;
  • the scheme does not require user registration, is simple and easy to operate, and is suitable for large-scale application and implementation.
  • FIG. 1 shows a schematic flowchart of a user identity identification method according to Embodiment 1 of the present disclosure
  • FIG. 2 shows a schematic flowchart of a user identity identification method provided according to Embodiment 2 of the present disclosure
  • FIG. 3 shows a schematic flowchart of a user identity identification method according to Embodiment 3 of the present disclosure
  • FIG. 4 shows a schematic flowchart of a user identity identification method according to Embodiment 5 of the present disclosure.
  • FIG. 1 shows a schematic flowchart of a user identity identification method according to Embodiment 1 of the present disclosure.
  • the method may be executed by a user terminal or an application server.
  • this embodiment does not limit the specific execution subject of the method.
  • the method includes:
  • Step S110 Calculate the time difference between the user terminal and the corresponding timing server.
  • the user terminal will establish a communication connection with a timing server, and the local time of the terminal is time calibrated through the timing server, which is the timing server corresponding to the user terminal.
  • the time of the user terminal and the corresponding timing server cannot be absolutely consistent, and there is a stable time difference between the two, and the time difference may be a millisecond time difference.
  • the time differences between different user terminals and corresponding timing servers are different. Therefore, in this embodiment, the user identity is identified by using the time difference between the user terminal and the corresponding timing server.
  • the user terminal may send a timing request to its corresponding timing server, and obtain timing request response parameters corresponding to the timing request.
  • the timing request response parameter includes at least one of the following parameters: the first time at which the user terminal initiates the timing request, the second time at which the timing server included in the timing response message receives the timing request, and the first time at which the user terminal receives the timing response message. three times. Then, according to the response parameter of the timing request, the time difference between the user terminal and the timing server is calculated.
  • the time difference between the user terminal and the corresponding timing server can be specifically obtained in the following two ways:
  • Time difference calculation method 1 The user terminal sends a timing request to the corresponding timing server, and this step can quickly calculate the time difference between the user terminal and the timing server according to the timing request response parameter corresponding to the single timing request.
  • the one-way network time consumption is calculated.
  • the user terminal may send multiple timing requests to the timing server in sequence, for example, send a timing request to the timing server every preset time period.
  • the time difference between the user terminal and the corresponding timing server is accurately calculated according to the timing request response parameters corresponding to the multiple timing requests.
  • the first timing request can be eliminated from multiple timing requests, and the relationship between the user terminal and the corresponding timing server can be calculated according to the formal timing request response parameters corresponding to the eliminated timing requests. time difference between.
  • the candidate time difference between the user terminal corresponding to the timing request and the timing server is calculated according to the timing request response parameter corresponding to the formal timing request.
  • the calculation method of the candidate time difference corresponding to each timing request may refer to the calculation method of calculating the time difference between the user terminal and the timing server according to the timing request response parameter corresponding to a single formal timing request in the above-mentioned method 1, and this embodiment is described here. I won't go into details.
  • the time difference between the terminal and the target timing server is calculated.
  • the average value of all the calculated candidate time differences may be directly used as the time difference between the terminal and the target timing server.
  • the deviation points in the calculated candidate time differences can be eliminated, and the average value of the candidate time differences after eliminating the deviation points can be used as the timing between the terminal and the target.
  • the candidate time difference set contains all the calculated candidate time differences.
  • the deviation threshold corresponding to the current candidate time difference set is negatively related to the execution times of this step S1, that is, the more times this step S1 is executed, the smaller the deviation threshold value is, which facilitates the convergence of the candidate time difference set, and further improves the calculated user The accuracy of the time difference between the terminal and the timing server.
  • the mapping relationship between different S1 execution times and the deviation threshold may be preset, so that the deviation threshold corresponding to each current candidate time difference set is determined according to the mapping relationship; or , the deviation threshold corresponding to the current candidate time difference set is calculated according to the standard deviation corresponding to the current candidate time difference set and the preset multiple, wherein the preset multiple is a fixed value. Since the deviation candidate time difference is eliminated in the subsequent step S2, the new The standard deviation of the candidate time difference set is smaller than the standard deviation of the previous candidate time difference set, so the deviation threshold of the new candidate time difference set is also smaller than the deviation threshold of the previous candidate time difference set.
  • S2 Eliminate the deviation candidate time difference from the current candidate time difference set, thereby generating a new candidate time difference set.
  • the absolute value of the difference between the deviation candidate time difference and the average value corresponding to the current candidate time difference set is greater than the deviation threshold corresponding to the current candidate time difference set.
  • step S3 Determine whether the current number of culling operations is greater than or equal to the preset number; if not, step S1 is further performed; if so, the average value corresponding to the new candidate time difference set is taken as the time difference between the user terminal and the timing server.
  • Step S120 Generate a user time fingerprint of the user terminal according to the time difference.
  • the user time fingerprint of the user terminal is preferably generated from the millisecond-level time difference between the user terminal and the timing server.
  • the state of the user's time fingerprint is changed to an invalid state.
  • the preset event is an event that can cause the time difference corresponding to the user terminal to change.
  • the preset event includes at least one of the following events: the timing server on which the user terminal performs time synchronization is switched, the time difference from the preset task start time in the user terminal is less than or equal to a preset threshold, the network status of the user terminal changes, and the position of the user terminal changes beyond the preset range, etc.
  • the user terminal in order to improve the time synchronization accuracy of the user terminal, multiple timing servers are deployed, and the user terminal has preset tasks (such as seckill tasks, time-limited activity tasks) every corresponding period or adjacent to the user terminal. etc.) during the startup time, the user terminal selects a timing server with the best current timing quality as the timing server corresponding to the user terminal according to the response time of each timing server, the validity of the response data, etc., and then the user terminal according to the corresponding timing server. time synchronization server. Since the currently selected timing server with the best timing quality may be different each time, the timing server corresponding to the user terminal will also be switched, and then the time difference corresponding to the user terminal will change.
  • the timing server corresponding to the user terminal will also be switched, and then the time difference corresponding to the user terminal will change.
  • the previously generated user time fingerprint when the switching of the timing server corresponding to the user terminal is monitored, the previously generated user time fingerprint can be placed in an invalid state; in addition, since the time difference between the preset task start times in the user terminal is less than or equal to When the threshold is preset, the user terminal will re-select the corresponding timing server. Therefore, in this embodiment, when it is monitored that the current time difference from the preset task start time in the user terminal is less than or equal to the preset threshold, the previous The generated user time fingerprint is placed in an invalid state; in addition, the network state of the user terminal changes, and the change of the user terminal position beyond the preset range will also affect the time difference corresponding to the user terminal. Therefore, this embodiment can also be used in the user terminal. When the network state changes and/or the position of the user terminal changes beyond the preset range, the previously generated user time fingerprint is placed in an invalid state.
  • a corresponding validity period can be assigned to the user time fingerprint, and when the current time exceeds the validity period, the The status of the user's time fingerprint changes to an invalid status.
  • the validity period is determined according to the time when the user terminal and the timing server perform time synchronization next time.
  • Step S130 Identify the user identity based on the user time fingerprint.
  • the time difference between the user terminal and the corresponding timing server is used to generate the user time fingerprint. Since the time difference between different user terminals and the corresponding timing server is different, the user time fingerprint is unique. Therefore, the user identity can be accurately identified according to the user time fingerprint; and, this embodiment does not involve the acquisition of user privacy data, thereby ensuring the security of user privacy data; furthermore, in this embodiment, the corresponding users of the same user terminal The time fingerprints are the same, so that cross-application identity recognition in the same terminal can be realized; in addition, this embodiment can generate user time fingerprints without obtaining high-level system permissions, which ensures user system security and helps improve user experience; moreover, this implementation The example does not require user registration, the operation is simple and easy, and it is suitable for large-scale application and implementation.
  • FIG. 2 shows a schematic flowchart of a method for identifying a user according to Embodiment 2 of the present disclosure.
  • the user identification method provided in this embodiment is further optimized for the user identification method in the first embodiment.
  • the method includes:
  • Step S210 Calculate the time difference between the user terminal and the corresponding timing server, and generate a user time fingerprint corresponding to the user terminal according to the time difference.
  • Step S220 Generate a user equipment fingerprint corresponding to the user terminal according to the preset type device information of the user terminal.
  • the preset type device information includes at least one of the following information: system version information, screen resolution information, CPU information, GPU information, and sound card fingerprint information.
  • system version information screen resolution information
  • CPU information CPU information
  • GPU information GPU information
  • sound card fingerprint information can be extracted through audio playback.
  • Step S230 Generate a user network fingerprint corresponding to the user terminal according to the network egress IP information corresponding to the user terminal.
  • the user terminal when the user terminal sends information to the server, it will carry the corresponding network egress IP information, and the corresponding network egress IP information of different user terminals may be different, so that the user terminal can be generated according to the network egress IP information corresponding to the user terminal.
  • the corresponding user network fingerprint when the user terminal sends information to the server, it will carry the corresponding network egress IP information, and the corresponding network egress IP information of different user terminals may be different, so that the user terminal can be generated according to the network egress IP information corresponding to the user terminal.
  • the corresponding user network fingerprint when the user terminal sends information to the server, it will carry the corresponding network egress IP information, and the corresponding network egress IP information of different user terminals may be different, so that the user terminal can be generated according to the network egress IP information corresponding to the user terminal.
  • the corresponding user network fingerprint when the user terminal sends information to the server, it will carry the corresponding network egress IP information, and the
  • this embodiment does not limit the specific execution order of step S210, step S220 and step S230.
  • Step S240 Identify the user identity based on the user equipment fingerprint and/or the user network fingerprint, and the user time fingerprint.
  • the two user terminals are the same user.
  • this embodiment further combines the user equipment fingerprint and/or the user network fingerprint to comprehensively identify the user identity, so that the identification accuracy of the user identity can be further improved.
  • FIG. 3 shows a schematic flowchart of a method for identifying a user according to Embodiment 3 of the present disclosure.
  • the user identification method provided in this embodiment is further optimized for the user identification method in the first embodiment.
  • the method includes:
  • Step S310 When the first preset trigger operation is monitored, a user time fingerprint of the first user terminal corresponding to the first preset trigger operation is generated.
  • Step S320 Store the user time fingerprint of the first user terminal in a preset fingerprint database.
  • Step S330 When the second preset trigger operation is monitored, a user time fingerprint of the second user terminal corresponding to the second preset trigger operation is generated.
  • Step S340 Compare the user time fingerprint corresponding to the second user terminal with the user time fingerprint of the first user terminal in the preset fingerprint database, and if the comparison is consistent, determine that the second user terminal is the same as the first user terminal user.
  • steps S310 to S340 may be applied to a scenario in which an old user is used to acquire a new user.
  • the existing scenario of using old users to acquire new users after the new user clicks the application link shared by the old user, if he does not download or register the application through the link, he downloads the application through the application store.
  • the existing technology will not be able to establish the connection between the new user and the old user, which is not conducive to the application platform's evaluation of the promotion effect, and then affects the formulation of the subsequent promotion plan.
  • the connection between the new user and the old user can be established without the need for the user to download or register the application through the link.
  • the first preset trigger operation is specifically a click operation on the sharing link, etc., when a click operation on the sharing link is detected in a terminal, the terminal (here, the first click operation) is generated. a user time fingerprint of a user terminal), and execute step S320 to store the user time fingerprint of the first user terminal in the preset fingerprint database; further execute step S330, in which the second preset trigger operation is specifically to APP download and other operations, so that when a download operation of a preset APP is detected in a certain terminal, the user time fingerprint of the terminal (here, the second user terminal) is generated; step S340 is further performed, and the newly generated The user time fingerprint of the second user terminal is compared with the user time fingerprint in the preset fingerprint database.
  • the second user time fingerprint is determined.
  • the user terminal and the first user terminal are the same user.
  • the upstream user of the first user terminal may be obtained, and the upstream user is an old user, and after determining that the second user terminal and the first user terminal are the same user, Corresponding electronic resources are allocated to upstream users of the first user, wherein the electronic resources may be rebate resources such as coupons.
  • user A clicks the promotion link of APP1 shared by upstream user B in a user terminal, that is, the first preset trigger operation is executed, and the user terminal C1 (first user terminal) corresponding to the click operation is generated at this time.
  • the user time fingerprint of C1 is stored, and the user terminal C1 here is only an identifier randomly assigned by the system for the convenience of data storage and subsequent fingerprint comparison; further, user A does not pass the The link is used to download and register APP1, but the APP1 is downloaded through the application mall, that is, the second preset trigger operation is executed, and the user time fingerprint of the user terminal C2 (ie the second user terminal) corresponding to the download operation is generated at this time.
  • the user terminal C2 is also an identifier randomly assigned by the system; further, compare the user time fingerprint of the user terminal C2 with the user time fingerprint in the fingerprint database one by one, the user time fingerprint of the user terminal C2 and the user terminal C1 are the same, and the same belong to the same user. Moreover, after it is determined that the user terminal C2 and the user terminal C1 belong to the same user, it indicates that the promotion task of the upstream user is completed, and then rebate resources such as coupons are allocated to the upstream user.
  • steps S310 to S340 may be applied in a cross-application information promotion scenario.
  • the first preset trigger operation may be an operation of using the first application
  • the second preset trigger operation may be an operation such as opening the second application.
  • the recorded historical data of the first user terminal can be obtained; further, promotion information is generated according to the historical data, and the promotion information is displayed in the second user terminal. information.
  • the first preset trigger operation is executed.
  • the user time fingerprint of the user terminal C1 (the first user terminal) running APP1 is generated, and the user time fingerprint of C1 is generated.
  • the fingerprint is stored, and the user terminal C1 here is only an identifier randomly assigned by the system to facilitate data storage and subsequent fingerprint comparison; further, after closing APP1 and opening APP2, the second preset trigger operation is executed.
  • promotion information can be generated according to the user's historical data when using APP1 (ie, the recorded historical data of the first user terminal), and displayed when using APP2 (ie, the promotion information is displayed in the second user terminal). For example, through the historical data of the user in APP1, it is analyzed that the user wants to search for the X commodity, so that the promotion information of the X commodity can be displayed during the use of the APP2.
  • the present embodiment can still establish connections between new and old users when the users do not download or register through the shared link, thereby facilitating the promotion effect. and can realize cross-application information promotion, which is conducive to improving user experience.
  • a non-volatile computer-readable storage medium stores at least one executable instruction, and the computer-executable instruction can execute any of the foregoing method embodiments. Methods.
  • Executable instructions can specifically be used to cause the processor to perform the following operations:
  • the user time fingerprint of the user terminal is generated
  • User identification is performed based on user time fingerprints.
  • the executable instructions cause the processor to perform the following operations:
  • the user terminal sends a timing request to the corresponding timing server, and obtains the timing request response parameter corresponding to the timing request;
  • the timing request response parameter includes at least one of the following parameters: the first time at which the user terminal initiates the timing request, the second time at which the timing server included in the timing response message receives the timing request, and the first time at which the user terminal receives the timing response message. three times.
  • the executable instructions cause the processor to perform the following operations:
  • the executable instructions cause the processor to perform the following operations:
  • the time difference between the user terminal and the corresponding timing server is calculated.
  • the executable instructions cause the processor to perform the following operations:
  • S1 Calculate the average value and deviation threshold corresponding to the current candidate time difference set; wherein, the candidate time difference set includes all the calculated candidate time differences in the initial state;
  • S2 Eliminate the deviation candidate time difference from the current candidate time difference set, thereby generating a new candidate time difference set; wherein, the absolute value of the difference between the deviation candidate time difference and the average value corresponding to the current candidate time difference set is greater than the deviation threshold corresponding to the current candidate time difference set ;
  • step S3 Determine whether the current number of culling operations is greater than or equal to the preset number of times; if not, step S1 is further performed; if so, the average value corresponding to the new candidate time difference set is taken as the time difference between the user terminal and the corresponding timing server.
  • the executable instructions cause the processor to perform the following operations:
  • the state of the user time fingerprint is changed to an invalid state.
  • the preset event includes at least one of the following events:
  • the timing server corresponding to the user terminal switches, the time difference between the preset task start time in the user terminal and the preset task start time in the user terminal is less than or equal to the preset threshold, the network status of the user terminal changes, and the position change of the user terminal exceeds the preset range.
  • the executable instructions cause the processor to perform the following operations:
  • the validity period is determined according to the time when the user terminal performs time synchronization next time.
  • the executable instructions cause the processor to perform the following operations:
  • the user identity is performed.
  • the preset type device information includes at least one of the following information:
  • System version information screen resolution information, CPU information, GPU information, and sound card fingerprint information.
  • the executable instructions cause the processor to perform the following operations:
  • the user identity is identified.
  • the executable instructions cause the processor to perform the following operations:
  • the user time fingerprint corresponding to the second user terminal is compared with the user time fingerprint of the first user terminal in the preset fingerprint database, and if the comparison is consistent, it is determined that the second user terminal and the first user terminal are the same user.
  • the executable instructions cause the processor to perform the following operations:
  • the executable instructions cause the processor to perform the following operations:
  • the promotion information is generated according to the historical data, and the promotion information is displayed in the second user terminal.
  • the time difference between the user terminal and the corresponding timing server is used to generate the user time fingerprint. Since the time difference between different user terminals and the corresponding timing server is different, the user time fingerprint is unique. Therefore, the user identity can be accurately identified according to the user time fingerprint; and, this embodiment does not involve the acquisition of user privacy data, thereby ensuring the security of user privacy data; furthermore, in this embodiment, the corresponding users of the same user terminal The time fingerprints are the same, so that cross-application identity recognition in the same terminal can be realized; in addition, this embodiment can generate user time fingerprints without obtaining high-level system permissions, which ensures user system security and helps improve user experience; moreover, this implementation The example does not require user registration, the operation is simple and easy, and it is suitable for large-scale application and implementation.
  • FIG. 4 shows a schematic structural diagram of a computing device according to Embodiment 5 of the present disclosure.
  • the specific embodiment of the present disclosure does not limit the specific implementation of the computing device.
  • the computing device may include: a processor (processor) 402 , a communication interface (Communications Interface) 404 , a memory (memory) 406 , and a communication bus 408 .
  • processor processor
  • Communication interface Communication Interface
  • memory memory
  • the processor 402 , the communication interface 404 , and the memory 406 communicate with each other through the communication bus 408 .
  • the communication interface 404 is used for communicating with network elements of other devices such as clients or other servers.
  • the processor 402, configured to execute the program 410, may specifically execute the above-mentioned relevant steps used in any of the above method embodiments.
  • the program 410 may include program code including computer operation instructions.
  • the processor 402 may be a central processing unit (CPU), or an Application Specific Integrated Circuit (ASIC), or one or more integrated circuits configured to implement embodiments of the present disclosure.
  • the one or more processors included in the computing device may be the same type of processors, such as one or more CPUs; or may be different types of processors, such as one or more CPUs and one or more ASICs.
  • the memory 406 is used to store the program 410 .
  • Memory 406 may include high-speed RAM memory, and may also include non-volatile memory, such as at least one disk memory.
  • the program 410 can specifically be used to cause the processor 402 to perform the following operations:
  • the user time fingerprint of the user terminal is generated
  • User identification is performed based on user time fingerprints.
  • program 410 may specifically be used to cause the processor 402 to perform the following operations:
  • the user terminal sends a timing request to the corresponding timing server, and obtains the timing request response parameter corresponding to the timing request;
  • the timing request response parameter includes at least one of the following parameters: the first time at which the user terminal initiates the timing request, the second time at which the timing server included in the timing response message receives the timing request, and the first time at which the user terminal receives the timing response message. three times.
  • program 410 may specifically be used to cause the processor 402 to perform the following operations:
  • program 410 may specifically be used to cause the processor 402 to perform the following operations:
  • the time difference between the user terminal and the corresponding timing server is calculated.
  • program 410 may specifically be used to cause the processor 402 to perform the following operations:
  • S1 Calculate the average value and deviation threshold corresponding to the current candidate time difference set; wherein, the candidate time difference set includes all the calculated candidate time differences in the initial state;
  • S2 Eliminate the deviation candidate time difference from the current candidate time difference set, thereby generating a new candidate time difference set; wherein, the absolute value of the difference between the deviation candidate time difference and the average value corresponding to the current candidate time difference set is greater than the deviation threshold corresponding to the current candidate time difference set ;
  • step S3 Determine whether the current number of culling operations is greater than or equal to the preset number; if not, step S1 is further performed; if so, the average value corresponding to the new candidate time difference set is taken as the time difference between the user terminal and the corresponding timing server.
  • program 410 may specifically be used to cause the processor 402 to perform the following operations:
  • the state of the user time fingerprint is changed to an invalid state.
  • the preset event includes at least one of the following events:
  • the timing server corresponding to the user terminal switches, the time difference between the preset task start time in the user terminal and the preset task start time in the user terminal is less than or equal to the preset threshold, the network status of the user terminal changes, and the position change of the user terminal exceeds the preset range.
  • program 410 may specifically be used to cause the processor 402 to perform the following operations:
  • the validity period is determined according to the time when the user terminal performs time synchronization next time.
  • program 410 may specifically be used to cause the processor 402 to perform the following operations:
  • user identity is performed.
  • the preset type device information includes at least one of the following information:
  • System version information screen resolution information, CPU information, GPU information, and sound card fingerprint information.
  • program 410 may specifically be used to cause the processor 402 to perform the following operations:
  • the user identity is identified.
  • program 410 may specifically be used to cause the processor 402 to perform the following operations:
  • the user time fingerprint corresponding to the second user terminal is compared with the user time fingerprint of the first user terminal in the preset fingerprint database, and if the comparison is consistent, it is determined that the second user terminal and the first user terminal are the same user.
  • program 410 may specifically be used to cause the processor 402 to perform the following operations:
  • program 410 may specifically be used to cause the processor 402 to perform the following operations:
  • the promotion information is generated according to the historical data, and the promotion information is displayed in the second user terminal.
  • the time difference between the user terminal and the corresponding timing server is used to generate the user time fingerprint. Since the time difference between different user terminals and the corresponding timing server is different, the user time fingerprint is unique. Therefore, the user identity can be accurately identified according to the user time fingerprint; and, this embodiment does not involve the acquisition of user privacy data, thereby ensuring the security of user privacy data; furthermore, in this embodiment, the corresponding users of the same user terminal The time fingerprints are the same, so that cross-application identity recognition in the same terminal can be realized; in addition, this embodiment can generate user time fingerprints without obtaining high-level system permissions, which ensures user system security and helps improve user experience; moreover, this implementation The example does not require user registration, the operation is simple and easy, and it is suitable for large-scale application and implementation.
  • modules in the device in the embodiment can be adaptively changed and arranged in one or more devices different from the embodiment.
  • the modules or units or components in the embodiments may be combined into one module or unit or component, and further they may be divided into multiple sub-modules or sub-units or sub-assemblies. All features disclosed in this specification (including accompanying claims, abstract and drawings) and any method so disclosed may be employed in any combination, unless at least some of such features and/or procedures or elements are mutually exclusive. All processes or units of equipment are combined.
  • Each feature disclosed in this specification may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
  • Various component embodiments of the present disclosure may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof.
  • a microprocessor or a digital signal processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components according to embodiments of the present disclosure.
  • DSP digital signal processor
  • the present disclosure can also be implemented as apparatus or apparatus programs (eg, computer programs and computer program products) for performing some or all of the methods described herein.
  • Such a program implementing the present disclosure may be stored on a computer-readable medium, or may be in the form of one or more signals. Such signals may be downloaded from Internet sites, or provided on carrier signals, or in any other form.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephonic Communication Services (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

本公开公开了一种用户身份识别方法、计算设备及计算机存储介质。该方法包括:计算用户终端与对应的授时服务器之间的时间差,根据时间差,生成用户终端的用户时间指纹,基于用户时间指纹,进行用户身份识别。

Description

用户身份识别方法、计算设备及计算机存储介质
相关申请的交叉参考
本申请要求于2020年11月30日提交中国专利局、申请号为202011375285.9、名称为“用户身份识别方法、计算设备及计算机存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本公开涉及互联网技术领域,具体涉及一种用户身份识别方法、计算设备及计算机存储介质。
背景技术
目前,用户身份识别方式通常包含两种:其一为,基于用户账号的身份识别方式,即用户利用手机号码、身份证号码等进行账号注册,并在注册后应用平台为该用户分配该平台的用户账号,继而通过用户账号来识别用户身份;其二为,基于用户生物或设备特征的身份识别方式,如通过获取用户生物特征(如掌纹、生物指纹、面部特征)、设备IP地址、IDFA、IMEI、Cookie等信息来识别用户身份。
然而,发明人在实施过程中发现,现有技术中存在如下缺陷:采用用户账号的身份识别方式需用户提供手机号码、身份证号码等隐私信息,从而存在用户隐私信息泄露的安全隐患。并且,针对于尚未注册用户账号的新用户,采用该方式将无法对该类用户进行识别。此外,不同应用之间的用户账号无法互通,从而不利于用户的跨应用体验;而用户生物特征、设备IP地址、IDFA、IMEI等等需获得系统的高级别权限才可获取到,从而也不利于用户身份的识别。
公开内容
鉴于上述问题,提出了本公开以便提供一种克服上述问题或者至少部分地解决上述问题的用户身份识别方法、计算设备及计算机存储介质。
根据本公开的一个方面,提供了一种用户身份识别方法,该方法包括:
计算用户终端与对应的授时服务器之间的时间差;
根据时间差,生成用户终端的用户时间指纹;
基于用户时间指纹,进行用户身份识别。
根据本公开的又一方面,提供了一种计算设备,包括:处理器、存储器、 通信接口和通信总线,处理器、存储器和通信接口通过通信总线完成相互间的通信;
存储器用于存放至少一可执行指令,可执行指令使处理器执行如下操作:
计算用户终端与对应的授时服务器之间的时间差;
根据时间差,生成用户终端的用户时间指纹;
基于用户时间指纹,进行用户身份识别。
根据本公开的再一方面,提供了一种非易失性计算机可读存储介质,该非易失性计算机可读存储介质中存储有至少一可执行指令,可执行指令使处理器执行如上述用户身份识别方法对应的操作。
根据本公开的再又一方面,还提供了一种计算机程序产品,该计算机程序产品包括存储在上述非易失性计算机可读存储介质上的计算程序。
根据本公开提供的用户身份识别方法、计算设备及计算机存储介质,首先计算用户终端与对应的授时服务器之间的时间差,根据时间差,生成用户终端的用户时间指纹,最终基于用户时间指纹,进行用户身份识别。本方案生成的用户时间指纹具有唯一性,从而能够准确地识别用户身份;并且,本方案不涉及用户隐私数据的获取,保障了用户隐私数据的安全性;再者,本方案中同一用户终端其对应的用户时间指纹相同,能够实现同一终端中的跨应用身份识别;此外,本方案无需获取系统高级别权限即可生成用户时间指纹,保障用户系统安全,并有利于提升用户体验;而且,本方案无需用户注册,操作简单易行,适于大规模应用与实施。
上述说明仅是本公开技术方案的概述,为了能够更清楚了解本公开的技术手段,而可依照说明书的内容予以实施,并且为了让本公开的上述和其它目的、特征和优点能够更明显易懂,以下特举本公开的具体实施方式。
附图概述
通过阅读下文优选实施方式的详细描述,各种其他的优点和益处对于本领域普通技术人员将变得清楚明了。附图仅用于示出优选实施方式的目的,而并不认为是对本公开的限制。而且在整个附图中,用相同的参考符号表示相同的部件。在附图中:
图1示出了根据本公开实施例一提供的一种用户身份识别方法的流程示意图;
图2示出了根据本公开实施例二提供的一种用户身份识别方法的流程示意图;
图3示出了根据本公开实施例三提供的一种用户身份识别方法的流程示意图;
图4示出了根据本公开实施例五提供的一种用户身份识别方法的流程示意图。
本公开的较佳实施方式
下面将参照附图更详细地描述本公开的示例性实施例。虽然附图中显示了本公开的示例性实施例,然而应当理解,可以以各种形式实现本公开而不应被这里阐述的实施例所限制。相反,提供这些实施例是为了能够更透彻地理解本公开,并且能够将本公开的范围完整的传达给本领域的技术人员。
实施例一
图1示出了根据本公开实施例一提供的一种用户身份识别方法的流程示意图。其中,本方法可以由用户终端执行,也可以由应用服务器执行。总之,本实施例对本方法的具体执行主体不作限定。
如图1所示,该方法包括:
步骤S110:计算用户终端与对应的授时服务器之间的时间差。
在实际的应用场景中,由于业务需求,用户终端会与一个授时服务器建立通信连接,通过该授时服务器来对终端本地时间进行时间校准,该授时服务器即为该用户终端对应的授时服务器。
然而由于授时精度的限制,用户终端与对应的授时服务器的时间无法达到绝对的一致,两者之间存在稳定的时间差,该时间差可以为毫秒级时间差。并且,由于授时算法、授时服务器响应机制、时间同步时机、用户终端与授时服务器间网络结构等因素影响,不同的用户终端与对应的授时服务器之间的时间差不同。由此,本实施例中利用用户终端与对应的授时服务器之间的时间差来进行用户身份的识别。
在计算用户终端与对应的授时服务器之间的时间差的过程中,具体可以由用户终端向其对应的授时服务器发送授时请求,并获取授时请求对应的授时请求响应参数。其中,授时请求响应参数包括以下参数中至少一种:用户终端发起授时请求的第一时间,授时响应消息中包含的授时服务器接收授时请求的第二时间,以及用户终端接收到授时响应消息的第三时间。继而根据授时请求响应参数,计算用户终端与授时服务器之间的时间差。
可选地,用户终端与对应的授时服务器之间的时间差具体可通过以下两种方式获得:
时间差计算方式一:用户终端向对应的授时服务器发送一个授时请求, 则本步骤可根据该单个授时请求对应的授时请求响应参数,快速地计算出用户终端与授时服务器之间的时间差。
具体地,首先根据该单个授时请求对应的授时请求响应参数中的第一时间以及第三时间,计算单程网络耗时。单程网络耗时具体计算过程为:计算第三时间与第一时间的差值,将该差值的一半确定为单程网络耗时。即若第一时间为T 1,第三时间为T 3,则单程网络耗时RTT=(T 3-T 1)/2。
进一步地,根据第一时间、第二时间以及单程网络耗时,计算用户终端与对应的授时服务器之间的时间差。具体地,计算第一时间与单程网络耗时的第一总和;将第二时间与第一总和之间的差值,确定为用户终端与对应的授时服务器之间的时间差。其中,若第二时间为T 2,则用户终端与授时服务器之间的时间差D=T 2-(T 1+RTT)。和/或,根据第二时间、第三时间以及单程网络耗时,计算用户终端与对应的授时服务器之间的时间差。具体地,计算第二时间与单程网络耗时的第二总和;将第二总和与第三时间的差值,确定为终端与目标授时服务器之间的时间差。即用户终端与授时服务器之间的时间差D=T 2+RTT–T 3
时间差计算方式二,用户终端可以依次向授时服务器发送多个授时请求,如每隔预设时长向授时服务器发送一个授时请求。则在本实施方式中,根据多个授时请求对应的授时请求响应参数,准确地计算出用户终端与对应的授时服务器之间的时间差。
可选地,由于首次向授时服务器发送授时请求时,需进行TCP/IP握手协议、建立路由链接、进行DNS识别等操作,从而使得请求-响应过程较长,因此,为避免该首次请求对后续终端与授时服务器之间时间差计算精度的影响,可从多个授时请求中剔除首个授时请求,并根据剔除后的授时请求对应的正式授时请求响应参数,计算出用户终端与对应的授时服务器之间的时间差。
具体地,首先针对于该多个授时请求中的任一正式授时请求,根据该正式授时请求对应的授时请求响应参数,计算该授时请求对应的用户终端与授时服务器之间的候选时间差。其中,每个授时请求对应的候选时间差的计算方式可参照上述方式一中根据单个正式授时请求对应的授时请求响应参数,计算用户终端与授时服务器之间的时间差的计算方式,本实施方式在此不做赘述。
进一步地,根据多个候选时间差的平均值,计算终端与目标授时服务器之间的时间差。在一种可选的实施方式中,可直接将计算出的所有候选时间差的平均值,作为终端与目标授时服务器之间的时间差。在另一种可选的实施方式中,为了进一步提升计算出的时间差的准确度,可剔除计算出的候选 时间差中的偏离点,将剔除偏离点后的候选时间差的平均值作为终端与目标授时服务器之间的时间差,其具体实施过程如S1-S3所示。
S1:计算当前候选时间差集合对应的平均值及偏离阈值。
在初始状态下,候选时间差集合中包含所有计算出的候选时间差。其中,当前候选时间差集合对应的偏离阈值负相关于本步骤S1的执行次数,即本步骤S1的执行次数越多,偏离阈值越小,从而便于候选时间差集合的收敛,进而进一步提升计算出的用户终端与授时服务器之间时间差的准确度。具体地,在计算当前候选时间差集合对应的偏离阈值过程中,可预先设置不同的S1执行次数与偏离阈值的映射关系,从而根据该映射关系确定每次当前候选时间差集合对应的偏离阈值;又或者,根据当前候选时间差集合对应的标准差与预设倍数计算当前候选时间差集合对应的偏离阈值,其中,预设倍数为固定值,由于后续步骤S2中剔除了偏离候选时间差,所以剔除后生成的新的候选时间差集合的标准差小于上一候选时间差集合的标准差,因此新的候选时间差集合的偏离阈值也小于上一候选时间差集合的偏离阈值。
S2:从当前候选时间差集合中剔除偏离候选时间差,从而生成新的候选时间差集合。其中,偏离候选时间差与当前候选时间差集合对应的平均值的差值的绝对值大于当前候选时间差集合对应的偏离阈值。
S3:判断当前剔除操作次数是否大于或等于预设次数;若否,则进一步执行步骤S1;若是,则将新的候选时间差集合对应的平均值作为用户终端与授时服务器之间的时间差。
步骤S120:根据时间差,生成用户终端的用户时间指纹。
具体地,为了保障每个用户终端对应的用户时间指纹的唯一性,优选将用户终端与授时服务器之间的毫秒级的时间差生成用户终端的用户时间指纹。
在一种可选的实施方式中,为了提升身份识别精度,当监测到预设事件时,将该用户时间指纹的状态更改为无效状态。其中,预设事件为能够引起用户终端对应的时间差发生改变的事件。例如,预设事件包括以下事件中的至少一种:用户终端进行时间同步的授时服务器发生切换,距离用户终端中预设任务启动时间的时间差值小于或等于预设阈值,用户终端的网络状态发生变化,以及用户终端位置变化超出预设范围等等。
举例来说,在实际的实施过程中,为提升用户终端的时间同步精度,部署有多个授时服务器,用户终端每隔相应周期,或者临近用户终端中预设任务(如秒杀任务,限时活动任务等)启动时间时,用户终端根据各个授时服务器的响应时间,响应数据的有效性等等,选取一个当前授时质量最优的授 时服务器作为该用户终端对应的授时服务器,继而该用户终端根据该对应的授时服务器进行时间同步。由于每次选取的当前授时质量最优的授时服务器可能存在不同,所以,用户终端对应的授时服务器也会发生切换,继而使得用户终端对应的时间差发生变化。由此,本实施例可在监测到用户终端对应的授时服务器发生切换时,将先前产生的用户时间指纹置于无效状态;另外,由于用户终端中预设任务启动时间的时间差值小于或等于预设阈值时,用户终端会重新进行对应的授时服务器的选取,因此本实施例也可在监测到当前距离用户终端中预设任务启动时间的时间差值小于或等于预设阈值时,将先前产生的用户时间指纹置于无效状态;此外,用户终端的网络状态发生变化,以及用户终端位置变化超出预设范围也会影响用户终端对应的时间差,由此,本实施例也可在用户终端的网络状态发生变化和/或用户终端位置变化超出预设范围时,将先前产生的用户时间指纹置于无效状态。
在另一种可选的实施方式中,为了提升身份识别精度,在生成与用户终端对应的用户时间指纹之后,可为该用户时间指纹分配对应的有效期限,在当前时间超出该有效期限时,将该用户时间指纹的状态更改为无效状态。其中,该有效期限根据下次用户终端与授时服务器进行时间同步的时间确定。
步骤S130:基于用户时间指纹,对用户身份进行识别。
由此可见,本实施例利用用户终端与对应的授时服务器之间的时间差来生成用户时间指纹,由于不同的用户终端与对应的授时服务器之间的时间差不同,由此用户时间指纹具有唯一性,从而根据该用户时间指纹能够准确地识别用户身份;并且,本实施例不涉及用户隐私数据的获取,从而保障了用户隐私数据的安全性;再者,本实施例中同一用户终端其对应的用户时间指纹相同,从而能够实现同一终端中的跨应用身份识别;此外,本实施例无需获取系统高级别权限即可生成用户时间指纹,保障用户系统安全,并有利于提升用户体验;而且,本实施例无需用户注册,操作简单易行,适于大规模应用与实施。
实施例二
图2示出了根据本公开实施例二提供的一种用户身份识别方法的流程示意图。其中,本实施例所提供的用户身份识别方法是针对于实施例一中用户身份识别方法的进一步优化。
如图2所示,该方法包括:
步骤S210:计算用户终端与对应的授时服务器之间的时间差,根据时间差,生成与用户终端对应的用户时间指纹。
其中,本步骤的具体实施过程可参照实施例一中相应部分的描述,本实 施例在此不做赘述。
步骤S220:根据用户终端的预设类型设备信息,生成与用户终端对应的用户设备指纹。
其中,预设类型设备信息包括以下信息中的至少一种:系统版本信息、屏幕分辨率信息、CPU信息,GPU信息、以及声卡指纹信息。其中,用户终端的预设类型设备信息不同,其对应的用户设备指纹不同。其中,本实施例对预设类型设备信息的提取方式不作限定,例如可通过canvas绘制提取GPU信息,通过音频播放提取声卡指纹信息等等。
步骤S230:根据用户终端对应的网络出口IP信息,生成与用户终端对应的用户网络指纹。
其中,用户终端在向服务器发送信息时,会携带相应的网络出口IP信息,不同用户终端其对应的网络出口IP信息会存在不同,从而可根据用户终端对应的网络出口IP信息,生成与用户终端对应的用户网络指纹。
此外,本实施例对步骤S210,步骤S220及步骤S230的具体执行顺序不做限定。
步骤S240:基于用户设备指纹和/或用户网络指纹,以及用户时间指纹,对用户身份进行识别。
具体地,当两个用户终端的用户设备指纹和/或用户网络指纹,以及用户时间指纹相同时,则确定该两个用户终端为同一用户。
由此可见,本实施例在用户时间指纹的基础上,进一步地结合用户设备指纹和/或用户网络指纹来综合地对用户身份进行识别,从而能够进一步地提升用户身份的识别精度。
实施例三
图3示出了根据本公开实施例三提供的一种用户身份识别方法的流程示意图。其中,本实施例所提供的用户身份识别方法是针对于实施例一中用户身份识别方法的进一步优化。
如图3所示,该方法包括:
步骤S310:当监测到第一预设触发操作时,生成第一预设触发操作对应的第一用户终端的用户时间指纹。
步骤S320:将第一用户终端的用户时间指纹存储至预设指纹库中。
步骤S330:当监测到第二预设触发操作时,生成第二预设触发操作对应的第二用户终端的用户时间指纹。
步骤S340:将第二用户终端对应的用户时间指纹与预设指纹库中第一用 户终端的用户时间指纹进行比对,若比对一致,则确定第二用户终端与该第一用户终端为同一用户。
在一种可选的实施方式中,步骤S310-步骤S340可应用于利用老用户来获取新用户的场景中。其中,在现有的利用老用户来获取新用户的场景中,新用户在点击老用户分享的应用链接之后,若未通过该链接进行应用的下载或注册等操作,而是通过应用商城下载该应用,现有技术中将无法建立该新用户与老用户之间的联系,从而不利于应用平台对推广效果进行评估,继而影响后续推广方案的制定。而采用本实施例,无需用户通过链接进行应用下载或注册,便可建立新用户与老用户之间的联系。
具体地,在步骤S310中,第一预设触发操作具体为针对分享链接的点击操作等等,当监测到某终端中发生了针对分享链接的点击操作时,则生成该终端(此处为第一用户终端)的用户时间指纹,并执行步骤S320将第一用户终端的用户时间指纹存储至预设指纹库中;进一步执行步骤S330,在该步骤中第二预设触发操作具体为对预设APP的下载等操作,从而在监测到某终端中发生了对预设APP的下载操作时,生成该终端(此处为第二用户终端)的用户时间指纹;进一步执行步骤S340,将新生成的第二用户终端的用户时间指纹与预设指纹库中的用户时间指纹进行比对,若第二用户终端的用户时间指纹与某第一户终端的用户时间指纹比对一致,则确定该第二用户终端与该第一用户终端为同一用户。可选的,在监测到第一预设触发操作之后,可获取第一用户终端的上游用户,该上游用户为老用户,并在确定第二用户终端与该第一用户终端为同一用户之后,向该第一用户的上游用户分配对应的电子资源,其中,该电子资源可以为优惠券等返利资源。
举例来说,用户A在某用户终端中点击了上游用户B分享的APP1的推广链接,即执行了第一预设触发操作,此时生成该点击操作对应的用户终端C1(第一用户终端)的用户时间指纹,并将C1的用户时间指纹进行存储,其中,此处的用户终端C1仅仅是系统为便于数据存储及后续指纹比对而随机分配的标识;进一步地,用户A并未通过该链接进行APP1的下载及注册,而是通过应用商城下载该APP1,即执行了第二预设触发操作,此时生成该下载操作对应的用户终端C2(即第二用户终端)的用户时间指纹其中,用户终端C2也是系统随机分配的标识;进一步地,将用户终端C2的用户时间指纹与指纹库中的用户时间指纹进行一一对比,用户终端C2与用户终端C1的用户时间指纹相同,其同属于同一用户。并且,在确定用户终端C2与用户终端C1同属同一用户后,表明上游用户的推广任务完成,继而为该上游用户分配优惠券等返利资源。
在另一种可选的实施方式中,步骤S310-步骤S340可应用于跨应用的信 息推广场景中。在该场景中,第一预设触发操作可以为第一应用的使用操作,第二预设触发操作可以为第二应用的打开等操作。可选地,在确定第二用户终端与该第一用户终端为同一用户之后,可获取记录的第一用户终端的历史数据;进一步根据历史数据生成推广信息,并在第二用户终端中展示推广信息。
举例来说,在某用户终端中打开APP1后,即执行了第一预设触发操作,此时生成运行着APP1的用户终端C1(第一用户终端)的用户时间指纹,并将C1的用户时间指纹进行存储,其中,此处的用户终端C1仅仅是系统为便于数据存储及后续指纹比对而随机分配的标识;进一步在关闭APP1打开APP2后,即执行了第二预设触发操作,此时生成运行着APP2的用户终端C2(即第二用户终端)的用户时间指纹其中,用户终端C2也是系统随机分配的标识;进一步地,将用户终端C2的用户时间指纹与指纹库中的用户时间指纹进行一一对比,用户终端C2与用户终端C1的用户时间指纹相同,其同属于同一用户。从而,可以根据用户在使用APP1时的历史数据(即记录的第一用户终端的历史数据)生成推广信息,并在使用APP2时进行展示(即在第二用户终端中展示推广信息)。如,通过用户在APP1时的历史数据,分析出该用户欲搜索X商品,从而可以在APP2使用过程中展示该X商品的推广信息。
由此可见,本实施例能够在利用老用户来获取新用户的场景中,在用户未通过分享链接进行下载或注册等操作时,仍能建立新老用户之间的连接,从而便于对推广效果的评估;并且能够实现跨应用的信息推广,有利于提升用户体验。
实施例四
根据本公开实施例四提供了一种非易失性计算机可读存储介质,非易失性计算机可读存储介质存储有至少一可执行指令,该计算机可执行指令可执行上述任意方法实施例中的方法。
可执行指令具体可以用于使得处理器执行以下操作:
计算用户终端与对应的授时服务器之间的时间差;
根据时间差,生成用户终端的用户时间指纹;
基于用户时间指纹,进行用户身份识别。
在一种可选的实施方式中,可执行指令使所述处理器执行如下操作:
用户终端向对应的授时服务器发送授时请求,并获取授时请求对应的授时请求响应参数;
根据授时请求响应参数,计算用户终端与对应的授时服务器之间的时间 差;
其中,授时请求响应参数包括以下参数中至少一种:用户终端发起授时请求的第一时间,授时响应消息中包含的授时服务器接收授时请求的第二时间,以及用户终端接收到授时响应消息的第三时间。
在一种可选的实施方式中,可执行指令使处理器执行如下操作:
根据第一时间以及第三时间,计算单程网络耗时;
根据第一时间、第二时间以及单程网络耗时,计算用户终端与对应的授时服务器之间的时间差;和/或,根据第二时间、第三时间以及单程网络耗时,计算用户终端与对应的授时服务器之间的时间差。
在一种可选的实施方式中,可执行指令使处理器执行如下操作:
授时请求为多个;
针对于任一授时请求,根据该授时请求对应的授时请求响应参数,计算该授时请求对应的用户终端与授时服务器之间的候选时间差;
根据多个候选时间差的平均值,计算用户终端与对应的授时服务器之间的时间差。
在一种可选的实施方式中,可执行指令使处理器执行如下操作:
S1:计算当前候选时间差集合对应的平均值及偏离阈值;其中,候选时间差集合在初始状态下包含所有计算出的候选时间差;
S2:从当前候选时间差集合中剔除偏离候选时间差,从而生成新的候选时间差集合;其中,偏离候选时间差与当前候选时间差集合对应的平均值的差值的绝对值大于当前候选时间差集合对应的偏离阈值;
S3:判断当前剔除操作次数是否大于或等于预设次数;若否,则进一步执行步骤S1;若是,则将新的候选时间差集合对应的平均值作为用户终端与对应的授时服务器之间的时间差。
在一种可选的实施方式中,可执行指令使处理器执行如下操作:
在生成用户终端的用户时间指纹之后,当监测到预设事件时,将用户时间指纹的状态更改为无效状态。
在一种可选的实施方式中,预设事件包括以下事件中的至少一种:
用户终端对应的授时服务器发生切换,与用户终端中预设任务启动时间的时间差值小于或等于预设阈值,用户终端的网络状态发生变化,以及用户终端位置变化超出预设范围。
在一种可选的实施方式中,可执行指令使处理器执行如下操作:
在生成用户终端的用户时间指纹之后,为该用户时间指纹分配对应的有效期限,以及在当前时间超出该有效期限时,将用户时间指纹的状态更改为无效状态;
其中,有效期限根据用户终端下次进行时间同步的时间确定。
在一种可选的实施方式中,可执行指令使处理器执行如下操作:
根据用户终端的预设类型设备信息,生成用户终端的用户设备指纹;
基于用户时间指纹以及用户设备指纹,进行用户身份。
在一种可选的实施方式中,预设类型设备信息包括以下信息中的至少一种:
系统版本信息、屏幕分辨率信息、CPU信息,GPU信息、以及声卡指纹信息。
在一种可选的实施方式中,可执行指令使处理器执行如下操作:
根据用户终端对应的网络出口IP信息,生成用户终端的用户网络指纹;
基于用户时间指纹以及用户网络指纹,进行用户身份识别。
在一种可选的实施方式中,可执行指令使处理器执行如下操作:
当监测到第一预设触发操作时,生成第一预设触发操作对应的第一用户终端的用户时间指纹;
将第一用户终端的用户时间指纹存储至预设指纹库中;
当监测到第二预设触发操作时,生成第二预设触发操作对应的第二用户终端的用户时间指纹;
将第二用户终端对应的用户时间指纹与预设指纹库中第一用户终端的用户时间指纹进行比对,若比对一致,则确定第二用户终端与该第一用户终端为同一用户。
在一种可选的实施方式中,可执行指令使处理器执行如下操作:
在监测到第一预设触发操作之后,获取第一用户终端的上游用户;
在确定第二用户终端与该第一用户终端为同一用户之后,向该第一用户的上游用户分配对应的电子资源。
在一种可选的实施方式中,可执行指令使处理器执行如下操作:
在确定第二用户终端与该第一用户终端为同一用户之后,获取记录的第一用户终端的历史数据;
根据历史数据生成推广信息,并在第二用户终端中展示推广信息。
由此可见,本实施例利用用户终端与对应的授时服务器之间的时间差来 生成用户时间指纹,由于不同的用户终端与对应的授时服务器之间的时间差不同,由此用户时间指纹具有唯一性,从而根据该用户时间指纹能够准确地识别用户身份;并且,本实施例不涉及用户隐私数据的获取,从而保障了用户隐私数据的安全性;再者,本实施例中同一用户终端其对应的用户时间指纹相同,从而能够实现同一终端中的跨应用身份识别;此外,本实施例无需获取系统高级别权限即可生成用户时间指纹,保障用户系统安全,并有利于提升用户体验;而且,本实施例无需用户注册,操作简单易行,适于大规模应用与实施。
实施例五
图4示出了根据本公开实施例五提供的一种计算设备的结构示意图,本公开具体实施例并不对计算设备的具体实现做限定。
如图4所示,该计算设备可以包括:处理器(processor)402、通信接口(Communications Interface)404、存储器(memory)406、以及通信总线408。
其中:处理器402、通信接口404、以及存储器406通过通信总线408完成相互间的通信。通信接口404,用于与其它设备比如客户端或其它服务器等的网元通信。处理器402,用于执行程序410,具体可以执行上述用于上述任一方法实施例中的相关步骤。
具体地,程序410可以包括程序代码,该程序代码包括计算机操作指令。
处理器402可能是中央处理器CPU,或者是特定集成电路ASIC(Application Specific Integrated Circuit),或者是被配置成实施本公开实施例的一个或多个集成电路。计算设备包括的一个或多个处理器,可以是同一类型的处理器,如一个或多个CPU;也可以是不同类型的处理器,如一个或多个CPU以及一个或多个ASIC。
存储器406,用于存放程序410。存储器406可能包含高速RAM存储器,也可能还包括非易失性存储器(non-volatile memory),例如至少一个磁盘存储器。
程序410具体可以用于使得处理器402执行以下操作:
计算用户终端与对应的授时服务器之间的时间差;
根据时间差,生成用户终端的用户时间指纹;
基于用户时间指纹,进行用户身份识别。
在一种可选的实施方式中,程序410具体可以用于使得处理器402执行以下操作:
用户终端向对应的授时服务器发送授时请求,并获取授时请求对应的授 时请求响应参数;
根据授时请求响应参数,计算用户终端与对应的授时服务器之间的时间差;
其中,授时请求响应参数包括以下参数中至少一种:用户终端发起授时请求的第一时间,授时响应消息中包含的授时服务器接收授时请求的第二时间,以及用户终端接收到授时响应消息的第三时间。
在一种可选的实施方式中,程序410具体可以用于使得处理器402执行以下操作:
根据第一时间以及第三时间,计算单程网络耗时;
根据第一时间、第二时间以及单程网络耗时,计算用户终端与对应的授时服务器之间的时间差;和/或,根据第二时间、第三时间以及单程网络耗时,计算用户终端与对应的授时服务器之间的时间差。
在一种可选的实施方式中,程序410具体可以用于使得处理器402执行以下操作:
授时请求为多个;
针对于任一授时请求,根据该授时请求对应的授时请求响应参数,计算该授时请求对应的用户终端与授时服务器之间的候选时间差;
根据多个候选时间差的平均值,计算用户终端与对应的授时服务器之间的时间差。
在一种可选的实施方式中,程序410具体可以用于使得处理器402执行以下操作:
S1:计算当前候选时间差集合对应的平均值及偏离阈值;其中,候选时间差集合在初始状态下包含所有计算出的候选时间差;
S2:从当前候选时间差集合中剔除偏离候选时间差,从而生成新的候选时间差集合;其中,偏离候选时间差与当前候选时间差集合对应的平均值的差值的绝对值大于当前候选时间差集合对应的偏离阈值;
S3:判断当前剔除操作次数是否大于或等于预设次数;若否,则进一步执行步骤S1;若是,则将新的候选时间差集合对应的平均值作为用户终端与对应的授时服务器之间的时间差。
在一种可选的实施方式中,程序410具体可以用于使得处理器402执行以下操作:
在生成用户终端的用户时间指纹之后,当监测到预设事件时,将用户时间指纹的状态更改为无效状态。
在一种可选的实施方式中,预设事件包括以下事件中的至少一种:
用户终端对应的授时服务器发生切换,与用户终端中预设任务启动时间的时间差值小于或等于预设阈值,用户终端的网络状态发生变化,以及用户终端位置变化超出预设范围。
在一种可选的实施方式中,程序410具体可以用于使得处理器402执行以下操作:
在生成用户终端的用户时间指纹之后,为该用户时间指纹分配对应的有效期限,以及在当前时间超出该有效期限时,将用户时间指纹的状态更改为无效状态;
其中,有效期限根据用户终端下次进行时间同步的时间确定。
在一种可选的实施方式中,程序410具体可以用于使得处理器402执行以下操作:
根据用户终端的预设类型设备信息,生成用户终端的用户设备指纹;
基于用户时间指纹以及用户设备指纹,进行用户身份。
在一种可选的实施方式中,预设类型设备信息包括以下信息中的至少一种:
系统版本信息、屏幕分辨率信息、CPU信息,GPU信息、以及声卡指纹信息。
在一种可选的实施方式中,程序410具体可以用于使得处理器402执行以下操作:
根据用户终端对应的网络出口IP信息,生成用户终端的用户网络指纹;
基于用户时间指纹以及用户网络指纹,进行用户身份识别。
在一种可选的实施方式中,程序410具体可以用于使得处理器402执行以下操作:
当监测到第一预设触发操作时,生成第一预设触发操作对应的第一用户终端的用户时间指纹;
将第一用户终端的用户时间指纹存储至预设指纹库中;
当监测到第二预设触发操作时,生成第二预设触发操作对应的第二用户终端的用户时间指纹;
将第二用户终端对应的用户时间指纹与预设指纹库中第一用户终端的用户时间指纹进行比对,若比对一致,则确定第二用户终端与该第一用户终端为同一用户。
在一种可选的实施方式中,程序410具体可以用于使得处理器402执行以下操作:
在监测到第一预设触发操作之后,获取第一用户终端的上游用户;
在确定第二用户终端与该第一用户终端为同一用户之后,向该第一用户的上游用户分配对应的电子资源。
在一种可选的实施方式中,程序410具体可以用于使得处理器402执行以下操作:
在确定第二用户终端与该第一用户终端为同一用户之后,获取记录的第一用户终端的历史数据;
根据历史数据生成推广信息,并在第二用户终端中展示推广信息。
由此可见,本实施例利用用户终端与对应的授时服务器之间的时间差来生成用户时间指纹,由于不同的用户终端与对应的授时服务器之间的时间差不同,由此用户时间指纹具有唯一性,从而根据该用户时间指纹能够准确地识别用户身份;并且,本实施例不涉及用户隐私数据的获取,从而保障了用户隐私数据的安全性;再者,本实施例中同一用户终端其对应的用户时间指纹相同,从而能够实现同一终端中的跨应用身份识别;此外,本实施例无需获取系统高级别权限即可生成用户时间指纹,保障用户系统安全,并有利于提升用户体验;而且,本实施例无需用户注册,操作简单易行,适于大规模应用与实施。
在此提供的算法或显示不与任何特定计算机、虚拟系统或者其它设备固有相关。各种通用系统也可以与基于在此的示教一起使用。根据上面的描述,构造这类系统所要求的结构是显而易见的。此外,本公开实施例也不针对任何特定编程语言。应当明白,可以利用各种编程语言实现在此描述的本公开的内容,并且上面对特定语言所做的描述是为了披露本公开的最佳实施方式。
在此处所提供的说明书中,说明了大量具体细节。然而,能够理解,本公开的实施例可以在没有这些具体细节的情况下实践。在一些实例中,并未详细示出公知的方法、结构和技术,以便不模糊对本说明书的理解。
类似地,应当理解,为了精简本公开并帮助理解各个公开方面中的一个或多个,在上面对本公开的示例性实施例的描述中,本公开实施例的各个特征有时被一起分组到单个实施例、图、或者对其的描述中。然而,并不应将该公开的方法解释成反映如下意图:即所要求保护的本公开要求比在每个权利要求中所明确记载的特征更多的特征。更确切地说,如下面的权利要求书所反映的那样,公开方面在于少于前面公开的单个实施例的所有特征。因此, 遵循具体实施方式的权利要求书由此明确地并入该具体实施方式,其中每个权利要求本身都作为本公开的单独实施例。
本领域那些技术人员可以理解,可以对实施例中的设备中的模块进行自适应性地改变并且把它们设置在与该实施例不同的一个或多个设备中。可以把实施例中的模块或单元或组件组合成一个模块或单元或组件,以及此外可以把它们分成多个子模块或子单元或子组件。除了这样的特征和/或过程或者单元中的至少一些是相互排斥之外,可以采用任何组合对本说明书(包括伴随的权利要求、摘要和附图)中公开的所有特征以及如此公开的任何方法或者设备的所有过程或单元进行组合。除非另外明确陈述,本说明书(包括伴随的权利要求、摘要和附图)中公开的每个特征可以由提供相同、等同或相似目的的替代特征来代替。
此外,本领域的技术人员能够理解,尽管在此的一些实施例包括其它实施例中所包括的某些特征而不是其它特征,但是不同实施例的特征的组合意味着处于本公开的范围之内并且形成不同的实施例。例如,在下面的权利要求书中,所要求保护的实施例的任意之一都可以以任意的组合方式来使用。
本公开的各个部件实施例可以以硬件实现,或者以在一个或者多个处理器上运行的软件模块实现,或者以它们的组合实现。本领域的技术人员应当理解,可以在实践中使用微处理器或者数字信号处理器(DSP)来实现根据本公开实施例的一些或者全部部件的一些或者全部功能。本公开还可以实现为用于执行这里所描述的方法的一部分或者全部的设备或者装置程序(例如,计算机程序和计算机程序产品)。这样的实现本公开的程序可以存储在计算机可读介质上,或者可以具有一个或者多个信号的形式。这样的信号可以从因特网网站上下载得到,或者在载体信号上提供,或者以任何其他形式提供。
应该注意的是上述实施例对本公开进行说明而不是对本公开进行限制,并且本领域技术人员在不脱离所附权利要求的范围的情况下可设计出替换实施例。在权利要求中,不应将位于括号之间的任何参考符号构造成对权利要求的限制。单词“包含”不排除存在未列在权利要求中的元件或步骤。位于元件之前的单词“一”或“一个”不排除存在多个这样的元件。本公开可以借助于包括有若干不同元件的硬件以及借助于适当编程的计算机来实现。在列举了若干装置的单元权利要求中,这些装置中的若干个可以是通过同一个硬件项来具体体现。单词第一、第二、以及第三等的使用不表示任何顺序。可将这些单词解释为名称。上述实施例中的步骤,除有特殊说明外,不应理解为对执行顺序的限定。

Claims (30)

  1. 一种用户身份识别方法,所述方法包括:
    计算用户终端与对应的授时服务器之间的时间差;
    根据所述时间差,生成所述用户终端的用户时间指纹;
    基于所述用户时间指纹,进行用户身份识别。
  2. 根据权利要求1所述的方法,其中,所述计算用户终端与对应的授时服务器之间的时间差进一步包括:
    用户终端向对应的授时服务器发送授时请求,并获取所述授时请求对应的授时请求响应参数;
    根据所述授时请求响应参数,计算用户终端与对应的授时服务器之间的时间差;
    其中,所述授时请求响应参数包括以下参数中至少一种:用户终端发起授时请求的第一时间,授时响应消息中包含的授时服务器接收授时请求的第二时间,以及用户终端接收到授时响应消息的第三时间。
  3. 根据权利要求2所述的方法,所述根据所述授时请求响应参数,计算用户终端与对应的授时服务器之间的时间差进一步包括:
    根据所述第一时间以及所述第三时间,计算单程网络耗时;
    根据所述第一时间、所述第二时间以及所述单程网络耗时,计算用户终端与对应的授时服务器之间的时间差;和/或,根据所述第二时间、所述第三时间以及所述单程网络耗时,计算用户终端与对应的授时服务器之间的时间差。
  4. 根据权利要求2或3所述的方法,其中,所述授时请求为多个;
    则所述根据所述授时请求响应参数,计算用户终端与对应的授时服务器之间的时间差进一步包括:
    针对于任一授时请求,根据该授时请求对应的授时请求响应参数,计算该授时请求对应的用户终端与授时服务器之间的候选时间差;
    根据多个候选时间差的平均值,计算用户终端与对应的授时服务器之间的时间差。
  5. 根据权利要求4所述的方法,其中,所述根据多个候选时间差的平均值,计算用户终端与授时服务器之间的时间差进一步包括:
    S1:计算当前候选时间差集合对应的平均值及偏离阈值;其中,所述候选时间差集合在初始状态下包含所有计算出的候选时间差;
    S2:从当前候选时间差集合中剔除偏离候选时间差,从而生成新的候选时间差集合;其中,偏离候选时间差与当前候选时间差集合对应的平均值的差值的绝对值大于当前候选时间差集合对应的偏离阈值;
    S3:判断当前剔除操作次数是否大于或等于预设次数;若否,则进一步执行步骤S1;若是,则将所述新的候选时间差集合对应的平均值作为用户终端与对应的授时服务器之间的时间差。
  6. 根据权利要求1-5中任一项所述的方法,其中,在所述生成所述用户终端的用户时间指纹之后,所述方法还包括:
    当监测到预设事件时,将所述用户时间指纹的状态更改为无效状态。
  7. 根据权利要求6所述的方法,其中,所述预设事件包括以下事件中的至少一种:
    用户终端对应的授时服务器发生切换,与用户终端中预设任务启动时间的时间差值小于或等于预设阈值,用户终端的网络状态发生变化,以及用户终端位置变化超出预设范围。
  8. 根据权利要求1-5中任一项所述的方法,其中,在所述生成所述用户终端的用户时间指纹之后,所述方法还包括:为该用户时间指纹分配对应的有效期限,以及在当前时间超出该有效期限时,将所述用户时间指纹的状态更改为无效状态;
    其中,所述有效期限根据用户终端下次进行时间同步的时间确定。
  9. 根据权利要求1-8中任一项所述的方法,其中,所述方法还包括:根据用户终端的预设类型设备信息,生成所述用户终端的用户设备指纹;
    则所述基于所述用户时间指纹,进行用户身份识别进一步包括:基于所述用户时间指纹以及所述用户设备指纹,进行用户身份。
  10. 根据权利要求9所述的方法,其中,所述预设类型设备信息包括以下信息中的至少一种:
    系统版本信息、屏幕分辨率信息、CPU信息,GPU信息、以及声卡指纹信息。
  11. 根据权利要求1-10中任一项所述的方法,其中,所述方法还包括:根据所述用户终端对应的网络出口IP信息,生成所述用户终端的用户网络指纹;
    则所述基于所述用户时间指纹,对用户身份进行识别进一步包括:基于所述用户时间指纹以及所述用户网络指纹,进行用户身份识别。
  12. 根据权利要求1-11中任一项所述的方法,其中,所述生成所述用户 终端的用户时间指纹,基于所述用户时间指纹,进行用户身份识别进一步包括:
    当监测到第一预设触发操作时,生成所述第一预设触发操作对应的第一用户终端的用户时间指纹;
    将所述第一用户终端的用户时间指纹存储至预设指纹库中;
    当监测到第二预设触发操作时,生成所述第二预设触发操作对应的第二用户终端的用户时间指纹;
    将第二用户终端对应的用户时间指纹与预设指纹库中第一用户终端的用户时间指纹进行比对,若比对一致,则确定第二用户终端与该第一用户终端为同一用户。
  13. 根据权利要求12所述的方法,其中,在所述监测到第一预设触发操作之后,所述方法还包括:获取所述第一用户终端的上游用户;
    则在所述确定第二用户终端与该第一用户终端为同一用户之后,所述方法还包括:向该第一用户的上游用户分配对应的电子资源。
  14. 根据权利要求12所述的方法,其中,在所述确定第二用户终端与该第一用户终端为同一用户之后,所述方法还包括:
    获取记录的第一用户终端的历史数据;
    根据所述历史数据生成推广信息,并在所述第二用户终端中展示所述推广信息。
  15. 一种计算设备,包括:处理器、存储器、通信接口和通信总线,所述处理器、所述存储器和所述通信接口通过所述通信总线完成相互间的通信;
    所述存储器用于存放至少一可执行指令,所述可执行指令使所述处理器执行如下操作:
    计算用户终端与对应的授时服务器之间的时间差;
    根据所述时间差,生成所述用户终端的用户时间指纹;
    基于所述用户时间指纹,进行用户身份识别。
  16. 根据权利要求15所述的计算设备,其中,所述可执行指令使所述处理器执行如下操作:
    用户终端向对应的授时服务器发送授时请求,并获取所述授时请求对应的授时请求响应参数;
    根据所述授时请求响应参数,计算用户终端与对应的授时服务器之间的 时间差;
    其中,所述授时请求响应参数包括以下参数中至少一种:用户终端发起授时请求的第一时间,授时响应消息中包含的授时服务器接收授时请求的第二时间,以及用户终端接收到授时响应消息的第三时间。
  17. 根据权利要求16所述的计算设备,其中,所述可执行指令使所述处理器执行如下操作:
    根据所述第一时间以及所述第三时间,计算单程网络耗时;
    根据所述第一时间、所述第二时间以及所述单程网络耗时,计算用户终端与对应的授时服务器之间的时间差;和/或,根据所述第二时间、所述第三时间以及所述单程网络耗时,计算用户终端与对应的授时服务器之间的时间差。
  18. 根据权利要求16或17所述的计算设备,其中,所述可执行指令使所述处理器执行如下操作:
    所述授时请求为多个;
    针对于任一授时请求,根据该授时请求对应的授时请求响应参数,计算该授时请求对应的用户终端与授时服务器之间的候选时间差;
    根据多个候选时间差的平均值,计算用户终端与对应的授时服务器之间的时间差。
  19. 根据权利要求18所述的计算设备,其中,所述可执行指令使所述处理器执行如下操作:
    S1:计算当前候选时间差集合对应的平均值及偏离阈值;其中,所述候选时间差集合在初始状态下包含所有计算出的候选时间差;
    S2:从当前候选时间差集合中剔除偏离候选时间差,从而生成新的候选时间差集合;其中,偏离候选时间差与当前候选时间差集合对应的平均值的差值的绝对值大于当前候选时间差集合对应的偏离阈值;
    S3:判断当前剔除操作次数是否大于或等于预设次数;若否,则进一步执行步骤S1;若是,则将所述新的候选时间差集合对应的平均值作为用户终端与对应的授时服务器之间的时间差。
  20. 根据权利要求15-19中任一项所述的计算设备,其中,所述可执行指令使所述处理器执行如下操作:
    在所述生成所述用户终端的用户时间指纹之后,当监测到预设事件时,将所述用户时间指纹的状态更改为无效状态。
  21. 根据权利要求20所述的计算设备,其中,所述预设事件包括以下事 件中的至少一种:
    用户终端对应的授时服务器发生切换,与用户终端中预设任务启动时间的时间差值小于或等于预设阈值,用户终端的网络状态发生变化,以及用户终端位置变化超出预设范围。
  22. 根据权利要求15-19中任一项所述的计算设备,其中,所述可执行指令使所述处理器执行如下操作:
    在所述生成所述用户终端的用户时间指纹之后,为该用户时间指纹分配对应的有效期限,以及在当前时间超出该有效期限时,将所述用户时间指纹的状态更改为无效状态;
    其中,所述有效期限根据用户终端下次进行时间同步的时间确定。
  23. 根据权利要求15-22中任一项所述的计算设备,其中,所述可执行指令使所述处理器执行如下操作:
    根据用户终端的预设类型设备信息,生成所述用户终端的用户设备指纹;
    基于所述用户时间指纹以及所述用户设备指纹,进行用户身份。
  24. 根据权利要求23所述的计算设备,其中,所述预设类型设备信息包括以下信息中的至少一种:
    系统版本信息、屏幕分辨率信息、CPU信息,GPU信息、以及声卡指纹信息。
  25. 根据权利要求15-24中任一项所述的计算设备,其中,所述可执行指令使所述处理器执行如下操作:
    根据所述用户终端对应的网络出口IP信息,生成所述用户终端的用户网络指纹;
    基于所述用户时间指纹以及所述用户网络指纹,进行用户身份识别。
  26. 根据权利要求15-25中任一项所述的计算设备,其中,所述可执行指令使所述处理器执行如下操作:
    当监测到第一预设触发操作时,生成所述第一预设触发操作对应的第一用户终端的用户时间指纹;
    将所述第一用户终端的用户时间指纹存储至预设指纹库中;
    当监测到第二预设触发操作时,生成所述第二预设触发操作对应的第二用户终端的用户时间指纹;
    将第二用户终端对应的用户时间指纹与预设指纹库中第一用户终端的 用户时间指纹进行比对,若比对一致,则确定第二用户终端与该第一用户终端为同一用户。
  27. 根据权利要求26所述的计算设备,其中,所述可执行指令使所述处理器执行如下操作:
    在所述监测到第一预设触发操作之后,获取所述第一用户终端的上游用户;
    在所述确定第二用户终端与该第一用户终端为同一用户之后,向该第一用户的上游用户分配对应的电子资源。
  28. 根据权利要求26所述的计算设备,其中,所述可执行指令使所述处理器执行如下操作:
    在所述确定第二用户终端与该第一用户终端为同一用户之后,获取记录的第一用户终端的历史数据;
    根据所述历史数据生成推广信息,并在所述第二用户终端中展示所述推广信息。
  29. 一种非易失性计算机可读存储介质,所述非易失性计算机可读、存储介质中存储有至少一可执行指令,所述可执行指令使处理器执行如权利要求1-14中任一项所述的用户身份识别方法对应的操作。
  30. 一种计算机程序产品,该计算机程序产品包括存储在非易失性计算机可读存储介质上的计算程序,该计算机程序包括程序指令,当该程序指令被处理器执行时,使该处理器执行如权利要求1-14中任一项所述的用户身份识别方法对应的操作。
PCT/CN2021/125773 2020-11-30 2021-10-22 用户身份识别方法、计算设备及计算机存储介质 WO2022111169A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011375285.9A CN112417404B (zh) 2020-11-30 2020-11-30 用户身份识别方法、计算设备及计算机存储介质
CN202011375285.9 2020-11-30

Publications (1)

Publication Number Publication Date
WO2022111169A1 true WO2022111169A1 (zh) 2022-06-02

Family

ID=74830582

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/125773 WO2022111169A1 (zh) 2020-11-30 2021-10-22 用户身份识别方法、计算设备及计算机存储介质

Country Status (2)

Country Link
CN (1) CN112417404B (zh)
WO (1) WO2022111169A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112417404B (zh) * 2020-11-30 2021-09-03 掌阅科技股份有限公司 用户身份识别方法、计算设备及计算机存储介质
CN114095166A (zh) * 2021-11-23 2022-02-25 北京京东方技术开发有限公司 生成节点临时身份标识的方法、节点及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070001903A1 (en) * 1999-03-05 2007-01-04 Smith Alexander E Use of geo-stationary satellites to augment wide_area multilateration synchronization
CN101631015A (zh) * 2008-07-18 2010-01-20 郑州威科姆科技股份有限公司 网络授时时间标签标定方法
CN109743127A (zh) * 2019-01-04 2019-05-10 四川金互通科技股份有限公司 一种信息码的处理方法、电子设备及存储介质
CN112417404A (zh) * 2020-11-30 2021-02-26 掌阅科技股份有限公司 用户身份识别方法、计算设备及计算机存储介质

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100512098C (zh) * 2004-03-26 2009-07-08 上海山丽信息安全有限公司 具有指纹限制的机密文件访问授权系统
CN1921390B (zh) * 2006-09-08 2011-11-02 网之易信息技术(北京)有限公司 一种用户身份识别方法及识别系统
US8214291B2 (en) * 2007-10-19 2012-07-03 Ebay Inc. Unified identity verification
EP2492834A1 (fr) * 2011-02-28 2012-08-29 Gemalto SA Procédé d'authentification d'un utilisateur
CN104063643A (zh) * 2014-07-07 2014-09-24 西安电子科技大学 一种基于时间间隔特征的智能终端安全认证方法及装置
US10015174B2 (en) * 2016-03-16 2018-07-03 Qualcomm Incorporated Using communication characteristics of a station to verify identity information
CN111464479B (zh) * 2019-01-18 2022-03-25 千寻位置网络有限公司 终端设备用户身份的识别方法及系统
CN111065045B (zh) * 2019-11-04 2021-06-15 广东博智林机器人有限公司 匹配定位方法、装置、电子设备及计算机可读介质
CN110826524B (zh) * 2019-11-18 2022-08-16 广东博智林机器人有限公司 指纹库生成方法、装置、电子设备及存储介质

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070001903A1 (en) * 1999-03-05 2007-01-04 Smith Alexander E Use of geo-stationary satellites to augment wide_area multilateration synchronization
CN101631015A (zh) * 2008-07-18 2010-01-20 郑州威科姆科技股份有限公司 网络授时时间标签标定方法
CN109743127A (zh) * 2019-01-04 2019-05-10 四川金互通科技股份有限公司 一种信息码的处理方法、电子设备及存储介质
CN112417404A (zh) * 2020-11-30 2021-02-26 掌阅科技股份有限公司 用户身份识别方法、计算设备及计算机存储介质

Also Published As

Publication number Publication date
CN112417404A (zh) 2021-02-26
CN112417404B (zh) 2021-09-03

Similar Documents

Publication Publication Date Title
CN106797405B (zh) 分布式负载均衡系统、健康检查方法和服务节点
US10432652B1 (en) Methods for detecting and mitigating malicious network behavior and devices thereof
WO2022111169A1 (zh) 用户身份识别方法、计算设备及计算机存储介质
CN110213212B (zh) 一种设备的分类方法和装置
US7228459B2 (en) Apparatus and method that provides a primary server and a backup server that both support a RADIUS client and share an IP address
CN111131544B (zh) 一种实现nat穿越的方法
CN106878045B (zh) 业务调用方法及装置
CN109492380A (zh) 一种设备认证方法、装置及区块链节点
CN113316926B (zh) 域名处理方法、装置、电子设备以及存储介质
US8924478B2 (en) Virtual desktop infrastructure (VDI) login acceleration
WO2017215492A1 (zh) 设备检测方法及装置
WO2017107804A1 (zh) 发现DDoS攻击的方法及装置
CN114024972A (zh) 一种长连接通信方法、系统、装置、设备及存储介质
CN114118447A (zh) 新型联邦学习系统、方法、装置、计算机设备及存储介质
CN113067824A (zh) 数据调度方法、系统、虚拟主机及计算机可读存储介质
CN111866993A (zh) 无线局域网连接管理方法、装置、软件程序及存储介质
US20190007403A1 (en) Pppoe packets transmitting method and pppoe server thereof
EP2701068B1 (en) Network access system
CN113596105B (zh) 内容的获取方法、边缘节点及计算机可读存储介质
CN113596119B (zh) 边缘能力分发方法、系统、设备及计算机可读存储介质
WO2017219777A1 (zh) 一种报文处理方法及装置
CN107864127B (zh) 一种应用程序的识别方法及装置
US10581916B2 (en) System and method for identifying cyber-attacks
CN110750322B (zh) 一种终端设备中页面管理的方法以及相关装置
US20240152502A1 (en) Data authentication and validation across multiple sources, interfaces, and networks

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21896671

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21896671

Country of ref document: EP

Kind code of ref document: A1