CN106612201A - Data acquisition method and system - Google Patents
Data acquisition method and system Download PDFInfo
- Publication number
- CN106612201A CN106612201A CN201510706158.5A CN201510706158A CN106612201A CN 106612201 A CN106612201 A CN 106612201A CN 201510706158 A CN201510706158 A CN 201510706158A CN 106612201 A CN106612201 A CN 106612201A
- Authority
- CN
- China
- Prior art keywords
- identification information
- data
- user identification
- user
- data acquisition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 31
- 230000000694 effects Effects 0.000 claims description 11
- 238000013481 data capture Methods 0.000 claims 7
- 230000006399 behavior Effects 0.000 abstract description 44
- 238000012795 verification Methods 0.000 description 10
- 230000003542 behavioural effect Effects 0.000 description 5
- 238000010586 diagram Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 235000014510 cooky Nutrition 0.000 description 2
- 238000013523 data management Methods 0.000 description 2
- 238000011835 investigation Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 235000019800 disodium phosphate Nutrition 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
Landscapes
- Telephonic Communication Services (AREA)
Abstract
本发明提供一种数据获取方法及系统,其中,所述数据获取方法包括:接收一数据获取方输入的对应于一目标用户的第一用户标识信息;从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方,其中,所述目标用户的行为特征数据包括与所述第一用户标识信息对应的第一部分数据和与所述第一用户标识信息不同但对应于所述目标用户的至少一个第二用户标识信息对应的第二部分数据。本发明的方案,能够使得所述数据获取方根据目标用户的某一用户标识信息,对所述目标用户的多样性行为进行全面的把握,得到所需要的所述目标用户的行为特征数据。
The present invention provides a data acquisition method and system, wherein the data acquisition method includes: receiving first user identification information corresponding to a target user input by a data acquirer; selecting from the behavior characteristic data of the target user At least part of the data is output to the data acquirer, wherein the behavior characteristic data of the target user includes a first part of data corresponding to the first user identification information and a first part of data that is different from the first user identification information but corresponds to the The second part of data corresponding to at least one piece of second user identification information of the target user. The solution of the present invention enables the data acquirer to fully grasp the diverse behaviors of the target user according to certain user identification information of the target user, and obtain the required behavior characteristic data of the target user.
Description
技术领域technical field
本发明涉及数据业务技术领域,特别是涉及一种数据获取方法及系统。The invention relates to the technical field of data services, in particular to a data acquisition method and system.
背景技术Background technique
目前,不同行业的消费方(即数据获取方),在从电信运营商侧获取交易数据,例如用户行为特征数据时,常采用以下方式:At present, consumers in different industries (that is, data acquirers) often use the following methods when acquiring transaction data from telecom operators, such as user behavior characteristic data:
1、基于IMEI、IDFA、Android ID等终端标识信息1. Based on IMEI, IDFA, Android ID and other terminal identification information
参见图4所示,DPS(Demand-Side Platform,需求方平台)消费方将已经获得的目标用户所使用的终端标识(终端设备的IMEI/IDFA/Android ID)作为输入,输入至电信运营商侧的DMP(Data Management Platform,数据管理平台)系统;电信运营商从其DMP系统中查询,是否存在所述终端标识,若存在,则返回对应的用户行为特征数据。As shown in Figure 4, the DPS (Demand-Side Platform, demand-side platform) consumer takes the obtained terminal identification (IMEI/IDFA/Android ID of the terminal device) used by the target user as input and inputs it to the telecom operator side A DMP (Data Management Platform, data management platform) system; the telecom operator inquires from its DMP system whether the terminal identifier exists, and if so, returns the corresponding user behavior characteristic data.
2、基于Cookie-ID的映射2. Mapping based on Cookie-ID
与方式1的查询方式类似,本方式是将用户使用的浏览器等客户端存储的Cookie-ID作为输入,输入至电信运营商侧的DMP系统,以发起查询请求。Similar to the query method of method 1, in this method, the Cookie-ID stored in the client such as the browser used by the user is used as input to the DMP system on the telecom operator side to initiate a query request.
3、基于手机号、身份证等3. Based on mobile phone number, ID card, etc.
从事线下精准营销和个人征信服务的商业消费方,为了精确定位自己的目标受众和潜在客户,通常会拿自己已有的会员客户真实身份ID,比如手机号和身份证,直接来查询该电信用户手机号的在网时长或者经常活动区域是否与目标业务的区域相一致。Commercial consumers engaged in offline precision marketing and personal credit investigation services, in order to accurately locate their target audiences and potential customers, usually use their existing member customer real IDs, such as mobile phone numbers and ID cards, to directly inquire about the Whether the online duration or frequent activity area of a telecom user's mobile phone number is consistent with the area of the target business.
4、基于MSISDN、IMSI等4. Based on MSISDN, IMSI, etc.
内部业务系统间,比如流量经营分析系统和CRM(Customer RelationshipManagement,客户关系管理)、BOSS(Business&Operation Support System,业务运营支撑系统)子系统间,在依据用户标识信息进行数据关联时,通常直接采用MSISDN(手机号)和IMSI(国际移动用户识别码)。Between internal business systems, such as traffic management analysis system and CRM (Customer Relationship Management, customer relationship management), BOSS (Business&Operation Support System, business operation support system) subsystems, when performing data association based on user identification information, MSISDN is usually used directly (mobile phone number) and IMSI (International Mobile Subscriber Identity).
从上述方式可知:现有技术中,在从电信运营商获取目标用户的行为特征数据时,大都按照消费方的个性需求,即消费方输入什么样的用户标识信息,电信运营商就直接将被查询用户的标识信息及对应的行为特征数据,作为数据交易内容输出给消费方。It can be seen from the above method that in the prior art, when obtaining the behavioral characteristic data of the target user from the telecom operator, most of them are based on the individual needs of the consumer, that is, what kind of user identification information the consumer inputs, and the telecom operator will directly receive it. Query the user's identification information and corresponding behavioral characteristic data, and output it to the consumer as the data transaction content.
但是,随着外部行业消费方所涉及的行业需求越来越广泛,且不同行业对其目标用户关注的行为特征差异很大,比如汽车行业关注用户在汽车方面的行为偏好、电商行业关注用户的网上购买行为、征信行业关注用户的手机号在网年限等。所以,如何能满足不同行业消费方对电信运营商内用户各行业多样性行为的精准感知,已成为重点关注的问题。However, as consumers in external industries are involved in more and more industries, and the behavioral characteristics of their target users in different industries are very different. online purchase behavior, the number of mobile phone numbers of users concerned by the credit investigation industry, etc. Therefore, how to meet the precise perception of consumers in different industries on the diverse behaviors of users in telecom operators in various industries has become a key concern.
发明内容Contents of the invention
本发明的目的在于提供一种数据获取方法及系统,用以解决现有技术中存在的不同行业数据获取方不能对电信运营商内用户各行业多样性行为进行精准感知的技术问题。The purpose of the present invention is to provide a data acquisition method and system to solve the technical problem in the prior art that data acquirers in different industries cannot accurately perceive the diverse behaviors of users in various industries within a telecom operator.
为了实现上述的目的,本发明提供一种数据获取方法,包括:In order to achieve the above object, the present invention provides a data acquisition method, including:
接收一数据获取方输入的对应于一目标用户的第一用户标识信息;receiving first user identification information corresponding to a target user input by a data acquirer;
从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方;Selecting at least part of the data from the behavior characteristic data of the target user to output to the data acquirer;
其中,所述目标用户的行为特征数据包括与所述第一用户标识信息对应的第一部分数据和与所述第一用户标识信息不同但对应于所述目标用户的至少一个第二用户标识信息对应的第二部分数据。Wherein, the behavior characteristic data of the target user includes a first part of data corresponding to the first user identification information and at least one second user identification information corresponding to the target user which is different from the first user identification information The second part of the data.
优选的,所述第一用户标识信息为终端标识信息、业务卡标识信息、Web用户标识信息和Web客户端标识信息中的一者或多者。Preferably, the first user identification information is one or more of terminal identification information, service card identification information, Web user identification information, and Web client identification information.
优选的,所述从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方的步骤之前还包括:Preferably, before the step of selecting at least part of the data from the target user's behavior characteristic data and outputting it to the data acquirer, the step further includes:
获取所述目标用户的统一用户标识信息,所述统一用户标识信息与所述第一用户标识信息和至少一个第二用户标识信息对应;Acquire unified user identification information of the target user, where the unified user identification information corresponds to the first user identification information and at least one second user identification information;
将所述统一用户标识信息输出给所述数据获取方;Outputting the unified user identification information to the data acquirer;
接收所述数据获取方输入的携带所述统一用户标识信息的数据获取请求;receiving a data acquisition request carrying the unified user identification information input by the data acquirer;
根据所述统一用户标识信息,查找所述目标用户的行为特征数据。According to the unified user identification information, the behavior characteristic data of the target user is searched.
优选的,所述将所述统一用户标识信息输出给所述数据获取方的步骤包括:Preferably, the step of outputting the unified user identification information to the data acquirer includes:
对所述统一用户标识信息进行加密,得到一重编码用户标识信息;Encrypting the unified user identification information to obtain a re-encoded user identification information;
将所述重编码用户标识信息输出给所述数据获取方;Outputting the recoded user identification information to the data acquirer;
所述接收所述数据获取方输入的携带所述统一用户标识信息的数据获取请求的步骤包括:The step of receiving the data acquisition request carrying the unified user identification information input by the data acquirer includes:
接收所述数据获取方输入的携带所述重编码用户标识信息的数据获取请求;receiving a data acquisition request carrying the recoded user identification information input by the data acquirer;
解密所述重编码用户标识信息,得到相应的统一用户标识信息。The recoded user identification information is decrypted to obtain corresponding unified user identification information.
优选的,所述对所述统一用户标识信息进行加密,得到一重编码用户标识信息的步骤包括:Preferably, the step of encrypting the unified user identification information to obtain a re-encoded user identification information includes:
利用数据获取方标识信息和有效期,对所述统一用户标识信息进行加密,得到一重编码用户标识信息。The unified user identification information is encrypted by using the identification information of the data acquirer and the validity period to obtain the re-encoded user identification information.
优选的,所述解密所述重编码用户标识信息,得到相应的统一用户标识信息的步骤包括:Preferably, the step of decrypting the recoded user identification information to obtain corresponding unified user identification information includes:
解密所述重编码用户标识信息,得到所述统一用户标识信息和有效期;Decrypting the re-encoded user identification information to obtain the unified user identification information and validity period;
验证所述统一用户标识信息和有效期;Verifying the unified user identification information and validity period;
所述根据统一用户标识信息,查找所述目标用户的行为特征数据的步骤包括:The step of searching the behavior characteristic data of the target user according to the unified user identification information includes:
在验证结果为所述统一用户标识信息有效且所述有效期在有效生命周期内时,根据所述统一用户标识信息,查找所述目标用户的行为特征数据。When the verification result is that the unified user identification information is valid and the validity period is within a valid life cycle, the behavior characteristic data of the target user is searched according to the unified user identification information.
优选的,所述数据获取方法还包括:Preferably, the data acquisition method also includes:
在验证结果为所述统一用户标识信息无效或所述有效期超出有效生命周期时,对计数器加1,所述计数器的初值为0;When the verification result is that the unified user identification information is invalid or the validity period exceeds the valid life cycle, add 1 to the counter, and the initial value of the counter is 0;
当所述计数器的值大于一预设阈值时,将所述数据获取方标识信息加入黑名单,所述数据获取方标识信息是解密所述重编码用户标识信息时得到的。When the value of the counter is greater than a preset threshold, adding the data acquirer identification information to a blacklist, the data acquirer identification information is obtained when decrypting the re-encoded user identification information.
本发明还提供一种数据获取系统,包括:The present invention also provides a data acquisition system, including:
第一接收模块,用于接收一数据获取方输入的对应于一目标用户的第一用户标识信息;A first receiving module, configured to receive first user identification information corresponding to a target user input by a data acquirer;
第一输出模块,用于从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方;A first output module, configured to select at least part of the data from the target user's behavior characteristic data and output it to the data acquirer;
其中,所述目标用户的行为特征数据包括与所述第一用户标识信息对应的第一部分数据和与所述第一用户标识信息不同但对应于所述目标用户的至少一个第二用户标识信息对应的第二部分数据。Wherein, the behavior characteristic data of the target user includes a first part of data corresponding to the first user identification information and at least one second user identification information corresponding to the target user which is different from the first user identification information The second part of the data.
优选的,所述第一用户标识信息为终端标识信息、业务卡标识信息、Web用户标识信息和Web客户端标识信息中的一者或多者。Preferably, the first user identification information is one or more of terminal identification information, service card identification information, Web user identification information, and Web client identification information.
优选的,所述数据获取系统还包括:Preferably, the data acquisition system also includes:
获取模块,用于获取所述目标用户的统一用户标识信息,所述统一用户标识信息与所述第一用户标识信息和至少一个第二用户标识信息对应;An acquisition module, configured to acquire unified user identification information of the target user, where the unified user identification information corresponds to the first user identification information and at least one second user identification information;
第二输出模块,用于将所述统一用户标识信息输出给所述数据获取方;A second output module, configured to output the unified user identification information to the data acquirer;
第二接收模块,用于接收所述数据获取方输入的携带所述统一用户标识信息的数据获取请求;The second receiving module is configured to receive a data acquisition request carrying the unified user identification information input by the data acquirer;
查找模块,用于根据所述统一用户标识信息,查找所述目标用户的行为特征数据。A search module, configured to search for the behavior characteristic data of the target user according to the unified user identification information.
优选的,所述第二输出模块包括:Preferably, the second output module includes:
加密模块,用于对所述统一用户标识信息进行加密,得到一重编码用户标识信息;An encryption module, configured to encrypt the unified user identification information to obtain a re-encoded user identification information;
输出子模块,用于将所述重编码用户标识信息输出给所述数据获取方;An output submodule, configured to output the recoded user identification information to the data acquirer;
所述第二接收模块包括:The second receiving module includes:
接收子模块,用于接收所述数据获取方输入的携带所述重编码用户标识信息的数据获取请求;A receiving submodule, configured to receive a data acquisition request carrying the recoded user identification information input by the data acquirer;
解密模块,用于解密所述重编码用户标识信息,得到相应的统一用户标识信息。A decryption module, configured to decrypt the re-encoded user identification information to obtain corresponding unified user identification information.
优选的,所述加密模块具体用于利用数据获取方标识信息和有效期,对所述统一用户标识信息进行加密,得到一重编码用户标识信息。Preferably, the encryption module is specifically configured to encrypt the unified user identification information by using the data acquirer identification information and the validity period, so as to obtain re-encoded user identification information.
优选的,所述解密模块包括:Preferably, the decryption module includes:
解密子模块,用于解密所述重编码用户标识信息,得到所述统一用户标识信息和有效期;The decryption submodule is used to decrypt the re-encoded user identification information to obtain the unified user identification information and validity period;
验证子模块,用于验证所述统一用户标识信息和有效期;A verification submodule, configured to verify the unified user identification information and validity period;
所述查找模块具体用于在验证结果为所述统一用户标识信息有效且所述有效期在有效生命周期内时,根据所述统一用户标识信息,查找所述目标用户的行为特征数据。The search module is specifically configured to search for the behavior characteristic data of the target user according to the unified user identification information when the verification result is that the unified user identification information is valid and the validity period is within the valid life cycle.
优选的,所述数据获取系统还包括:Preferably, the data acquisition system also includes:
计数模块,用于在验证结果为所述统一用户标识信息无效或所述有效期超出有效生命周期时,对计数器加1,所述计数器的初值为0;A counting module, configured to add 1 to the counter when the verification result is that the unified user identification information is invalid or the validity period exceeds the valid life cycle, and the initial value of the counter is 0;
加入模块,用于当所述计数器的值大于一预设阈值时,将所述数据获取方标识信息加入黑名单,所述数据获取方标识信息是解密所述重编码用户标识信息时得到的。An adding module, configured to add the data acquirer identification information to a blacklist when the value of the counter is greater than a preset threshold, and the data acquirer identification information is obtained when decrypting the re-encoded user identification information.
通过本发明的上述技术方案,本发明的有益效果在于:Through the above-mentioned technical scheme of the present invention, the beneficial effect of the present invention is:
本发明实施例的数据获取方法,通过接收一数据获取方输入的对应于一目标用户的第一用户标识信息,从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方,能够使得所述数据获取方根据目标用户的某一用户标识信息,对所述目标用户的多样性行为进行全面的把握,得到所需要的所述目标用户的行为特征数据。In the data acquisition method of the embodiment of the present invention, by receiving the first user identification information corresponding to a target user input by a data acquirer, at least part of the data is selected from the behavior characteristic data of the target user and output to the data acquirer , enabling the data acquirer to fully grasp the diverse behaviors of the target user according to certain user identification information of the target user, and obtain the required behavior characteristic data of the target user.
附图说明Description of drawings
图1表示本发明实施例的数据获取方法的流程图。FIG. 1 shows a flowchart of a data acquisition method in an embodiment of the present invention.
图2表示统一用户标识信息与用户的真实的标识信息的对应关系图。FIG. 2 is a diagram showing the correspondence relationship between the unified user identification information and the real identification information of the user.
图3表示本发明实施例的数据获取系统的结构示意图。FIG. 3 shows a schematic structural diagram of a data acquisition system according to an embodiment of the present invention.
图4表示现有技术中,数据获取方利用目标用户的终端标识信息获取相应数据的示意图。FIG. 4 shows a schematic diagram of a data acquirer using terminal identification information of a target user to acquire corresponding data in the prior art.
具体实施方式detailed description
为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合附图对具体实施例进行详细描述。In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, specific embodiments will be described in detail below with reference to the accompanying drawings.
参见图1所示,本发明实施例提供一种数据获取方法,应用于电信运营商侧的数据获取系统,包括:Referring to Fig. 1, an embodiment of the present invention provides a data acquisition method, which is applied to a data acquisition system on the telecom operator side, including:
S101:接收一数据获取方输入的对应于一目标用户的第一用户标识信息;S101: Receive first user identification information corresponding to a target user input by a data acquirer;
S102:从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方;S102: Selecting at least part of the data from the behavior characteristic data of the target user and outputting it to the data acquirer;
其中,所述目标用户的行为特征数据包括与所述第一用户标识信息对应的第一部分数据和与所述第一用户标识信息不同但对应于所述目标用户的至少一个第二用户标识信息对应的第二部分数据。Wherein, the behavior characteristic data of the target user includes a first part of data corresponding to the first user identification information and at least one second user identification information corresponding to the target user which is different from the first user identification information The second part of the data.
本发明实施例的数据获取方法,通过接收一数据获取方输入的对应于一目标用户的第一用户标识信息,从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方,能够使得所述数据获取方根据目标用户的某一用户标识信息,对所述目标用户的多样性行为进行全面的把握,得到所需要的所述目标用户的行为特征数据。In the data acquisition method of the embodiment of the present invention, by receiving the first user identification information corresponding to a target user input by a data acquirer, at least part of the data is selected from the behavior characteristic data of the target user and output to the data acquirer , enabling the data acquirer to fully grasp the diverse behaviors of the target user according to certain user identification information of the target user, and obtain the required behavior characteristic data of the target user.
例如,数据获取方A属于房地产行业,知道目标用户B的一个与房地产相关的Web账号12**5。For example, the data acquirer A belongs to the real estate industry and knows a real estate-related Web account 12**5 of the target user B.
现有技术中,A根据所述Web账号12**5,在电信运营商侧的数据获取系统中只能查询B的与房地产相关的数据。但是,通过本发明的数据获取方法,A根据所述Web账号12**5,可在电信运营商侧的数据获取系统中查询B的与其他行业,例如电商行业、征信行业等相关的数据。In the prior art, according to the Web account 12**5, A can only query B's real estate-related data in the data acquisition system on the telecom operator side. However, through the data acquisition method of the present invention, A can query B's information related to other industries, such as e-commerce industry, credit industry, etc. data.
本发明实施例中,所述第一用户标识信息(或第二用户标识信息)例如为终端标识信息、业务卡标识信息、Web用户标识信息和Web客户端标识信息中的一者或多者。In the embodiment of the present invention, the first user identification information (or second user identification information) is, for example, one or more of terminal identification information, service card identification information, Web user identification information, and Web client identification information.
具体的,所述终端标识信息主要针对终端Device,包括但不限于终端的IMEI,互联网接入设备的MAC、IDFA、IDFV、Android ID等设备标识。实际应用中,互联网广告主、DSP等外部消费方,倾向于使用所述终端标识信息。Specifically, the terminal identification information is mainly for the terminal Device, including but not limited to the IMEI of the terminal, device identifications such as MAC, IDFA, IDFV, and Android ID of the Internet access device. In practical applications, external consumers such as Internet advertisers and DSPs tend to use the terminal identification information.
所述业务卡标识信息主要针对手机Mobile,包括但不限于SIM卡的IMSI、手机号MISDN。实际应用中,电信运营商侧的内部业务子系统间在基于用户数据关联和聚合时,倾向于使用这一部分标识信息。The service card identification information is mainly for the mobile phone, including but not limited to the IMSI of the SIM card and the MISDN of the mobile phone number. In practical applications, this part of identification information tends to be used when the internal business subsystems on the telecom operator side are associated and aggregated based on user data.
所述Web用户标识信息主要针对Web用户(Web user),包括但不限于Web账号、Web昵称。实际应用中,电信运营商侧可通过解析流量包,获取用户在不同web站点和app应用中账户和昵称。而互联网行业例如房地产或电商在分析目标用户时,倾向于使用这一部分标识信息。The Web user identification information is mainly for Web users (Web users), including but not limited to Web accounts and Web nicknames. In practical applications, the telecom operator side can obtain user accounts and nicknames in different web sites and apps by analyzing traffic packets. Internet industries such as real estate or e-commerce tend to use this part of identification information when analyzing target users.
所述Web客户端标识信息主要针对Web客户端(Web client),包括但不限于暂存资料cookies、浏览器类型user agent。The Web client identification information is mainly aimed at the Web client (Web client), including but not limited to temporarily stored data cookies and browser type user agent.
其中,根据实际需求,可将所述终端标识信息、业务卡标识信息、Web用户标识信息和Web客户端标识信息划分为分属4个维度,即终端标识信息属于维度1,业务卡标识信息属于维度2,Web用户标识信息属于维度3,Web客户端标识信息属于维度4,以方便区分。Among them, according to actual needs, the terminal identification information, service card identification information, Web user identification information and Web client identification information can be divided into four dimensions, that is, the terminal identification information belongs to dimension 1, and the service card identification information belongs to dimension 1. Dimension 2, web user identification information belongs to dimension 3, and web client identification information belongs to dimension 4, for easy distinction.
本发明实施例中,所述从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方的步骤之前还包括:In the embodiment of the present invention, before the step of selecting at least part of the data from the behavior characteristic data of the target user and outputting it to the data acquirer, the step further includes:
获取所述目标用户的统一用户标识信息,所述统一用户标识信息与所述第一用户标识信息和至少一个第二用户标识信息对应;Acquire unified user identification information of the target user, where the unified user identification information corresponds to the first user identification information and at least one second user identification information;
将所述统一用户标识信息输出给所述数据获取方;Outputting the unified user identification information to the data acquirer;
接收所述数据获取方输入的携带所述统一用户标识信息的数据获取请求;receiving a data acquisition request carrying the unified user identification information input by the data acquirer;
根据所述统一用户标识信息,查找所述目标用户的行为特征数据。According to the unified user identification information, the behavior characteristic data of the target user is searched.
本发明实施例的数据获取方法,通过统一用户标识信息,不仅能够满足数据获取方的数据获取需求,还能够隐藏用户的真实的标识信息,避免从电信运营商侧泄露用户的真实的标识信息的风险。The data acquisition method in the embodiment of the present invention can not only meet the data acquisition requirements of the data acquirer by unifying the user identification information, but also hide the user's real identification information, avoiding leakage of the user's real identification information from the telecom operator side risk.
其中,参见图2所述,所述统一用户标识信息(UN-ID)是将上述4个维度的标识信息统一后的指代目标用户的唯一的标识信息,是分配给目标用户的身份标识,对应着目标用户的全部行为特征数据。Wherein, referring to FIG. 2, the unified user identification information (UN-ID) is the unique identification information referring to the target user after unifying the identification information of the above four dimensions, and is the identity identification assigned to the target user, Corresponding to all the behavior characteristic data of the target user.
例如,对于目标用户M,在电信运营商侧的数据获取系统中,其移动终端的IMEI为123,业务卡的IMSI为136****0101,Web账号为“天天”,Web客户端中的cookies包括M登录过的有关健身器械网站中的用户标识,分别对应着M的部分行为特征数据。而目标用户M的统一用户标识信息,例如qazwsx123,将这些标识信息融合在一起,唯一指代M,对应着M的全部行为特征数据。For example, for the target user M, in the data acquisition system on the telecom operator side, the IMEI of the mobile terminal is 123, the IMSI of the service card is 136****0101, the web account is "Tian Tian", and the Cookies include the user identification on the fitness equipment website that M has logged in, corresponding to some of M's behavioral characteristic data. The unified user identification information of the target user M, such as qazwsx123, combines these identification information together to uniquely refer to M, corresponding to all behavior characteristic data of M.
这样,电信运营商侧的数据获取系统在接收到数据获取方输入的移动终端的IMEI 123后,会获取到M的统一用户标识信息qazwsx123,并将所述qazwsx123输出给所述数据获取方,以进行后续的数据获取。In this way, after the data acquisition system on the telecom operator side receives the IMEI 123 of the mobile terminal input by the data acquirer, it will acquire the unified user identification information qazwsx123 of M, and output the qazwsx123 to the data acquirer for Follow-up data acquisition.
其中,用户的统一用户标识信息和真实的用户标识信息的对应关系例如是预先存储于电信运营商侧的数据获取系统中,或是在初次接收到某一用户的真实的用户标识信息时,根据预设规则,为所述用户分配一个统一用户标识信息,并存储这一对应关系,当再接收到所述用户的其他真实的用户标识信息时,直接根据存储的对应关系,确定出所述用户的统一用户标识信息。Wherein, the corresponding relationship between the unified user identification information of the user and the real user identification information is, for example, pre-stored in the data acquisition system on the side of the telecom operator, or when the real user identification information of a certain user is received for the first time, according to Preset rules, assign a unified user identification information to the user, and store this corresponding relationship, when receiving other real user identification information of the user, determine the user directly according to the stored corresponding relationship unified user identification information.
实际应用中,本发明实施例的数据获取方法的应用场景一般包括对内和对外,即电信运营商内部获取数据和电信运营商外部获取数据。而为了区分,以更方便满足电信运营商内部的需求,可通过为内部数据获取方和外部数据获取方配置不同权限的统一用户标识信息的方式来实现,本发明不对其进行限制,都应属于本发明所保护的范围。In practical applications, the application scenarios of the data acquisition method in the embodiment of the present invention generally include internal and external, that is, internal data acquisition by the telecom operator and external data acquisition by the telecom operator. In order to distinguish and meet the internal needs of telecom operators more conveniently, it can be realized by configuring unified user identification information with different permissions for the internal data acquirer and the external data acquirer. The present invention does not limit it, and it should belong to The protected scope of the present invention.
本发明实施例中,所述数据获取请求中不仅携带目标用户的统一用户标识信息,还包括数据获取方的需要限定,即数据获取方限定的需要获取的目标用户的行为特征数据。这样,电信运营商侧的数据获取系统在接收到数据获取方输入的数据获取请求后,会查找相应目标用户的行为特征数据(根据统一用户标识信息),并从所述行为特征数据中选择至少部分数据输出给所述数据获取方(根据数据获取方的需要限定),以完成数据获取过程。In the embodiment of the present invention, the data acquisition request not only carries the unified user identification information of the target user, but also includes the requirement definition of the data acquirer, that is, the behavior characteristic data of the target user that needs to be acquired as defined by the data acquirer. In this way, after receiving the data acquisition request input by the data acquirer, the data acquisition system on the telecom operator side will search for the behavior characteristic data of the corresponding target user (according to the unified user identification information), and select at least Part of the data is output to the data acquirer (defined according to the needs of the data acquirer) to complete the data acquisition process.
为了避免用户标识信息的泄露,可选择在输出统一用户标识信息时,对所述统一用户标识信息进行加密,例如,采用常用的MD5编码加密的机制。In order to avoid leakage of the user identification information, the unified user identification information may be encrypted when the unified user identification information is output, for example, a commonly used MD5 encoding encryption mechanism is adopted.
基于上述内容,在本发明具体实施例中,所述将所述统一用户标识信息输出给所述数据获取方的步骤包括:Based on the above, in a specific embodiment of the present invention, the step of outputting the unified user identification information to the data acquirer includes:
对所述统一用户标识信息进行加密,得到一重编码用户标识信息;Encrypting the unified user identification information to obtain a re-encoded user identification information;
将所述重编码用户标识信息输出给所述数据获取方;Outputting the recoded user identification information to the data acquirer;
所述接收所述数据获取方输入的携带所述统一用户标识信息的数据获取请求的步骤包括:The step of receiving the data acquisition request carrying the unified user identification information input by the data acquirer includes:
接收所述数据获取方输入的携带所述重编码用户标识信息的数据获取请求;receiving a data acquisition request carrying the recoded user identification information input by the data acquirer;
解密所述重编码用户标识信息,得到相应的统一用户标识信息。The recoded user identification information is decrypted to obtain corresponding unified user identification information.
但是,采用常用的MD5编码加密的机制对所述统一用户标识信息进行加密,然后直接提供给不同数据获取方的方式,电信运营商将无法保证从自身渠道获得目标用户的行为特征数据的数据获取方,不会将这些行为特征数据进行二次销售获利,即对外销售获取的统一用户标识信息。并且,只进行一次购买,就可反复从电信运营商侧获取数据,使得电信运营商无法获得应有的价值回报,特别是对一些生命周期很长的高价值数据。However, by adopting the commonly used MD5 code encryption mechanism to encrypt the unified user identification information, and then directly providing it to different data acquirers, the telecom operators will not be able to guarantee the data acquisition of the target user's behavior characteristic data from their own channels. Party, will not use these behavioral feature data for secondary sales for profit, that is, the unified user identification information obtained from external sales. Moreover, only one purchase is required to obtain data repeatedly from the telecom operator side, making it impossible for the telecom operator to obtain the due value return, especially for some high-value data with a long life cycle.
为了克服上述问题,可选择数据获取方标识信息和有效期对所述统一用户标识信息进行加密。这样,在相同统一用户标识信息的情况下:In order to overcome the above problems, the unified user identification information can be encrypted by selecting the data acquirer identification information and the validity period. In this way, in the case of the same unified user identification information:
1)对于不同的数据获取方,可得到不同的重编码用户标识信息;1) For different data acquirers, different recoded user identification information can be obtained;
2)对于相同的数据获取方但不同的时间点,前后会得到不同的重编码用户标识信息;2) For the same data acquirer but different time points, different recoded user identification information will be obtained before and after;
3)对于不同的数据获取方且不同的时间点,前后也会得到不同的重编码用户标识信息。3) For different data acquirers and different time points, different recoded user identification information will be obtained before and after.
基于上述内容,本发明实施例中,所述对所述统一用户标识信息进行加密,得到一重编码用户标识信息的步骤包括:Based on the above, in the embodiment of the present invention, the step of encrypting the unified user identification information to obtain a re-encoded user identification information includes:
利用数据获取方标识信息和有效期,对所述统一用户标识信息进行加密,得到一重编码用户标识信息。The unified user identification information is encrypted by using the identification information of the data acquirer and the validity period to obtain the re-encoded user identification information.
其中,加密算法可为简单叠加或轮流叠加字符等,本发明不对其进行限制,可依需求进行相应的选择。Wherein, the encryption algorithm can be simple superposition or alternate superposition of characters, etc., which is not limited in the present invention, and can be selected according to requirements.
例如,数据获取方C要获取目标用户D的行为特征数据。目标用户D的统一用户标识信息为tian45,数据获取方C的标识信息为wangli112,有效期为2015/9/28。For example, the data acquirer C wants to acquire the behavior characteristic data of the target user D. The unified user identification information of target user D is tian45, the identification information of data acquirer C is wangli112, and the validity period is 2015/9/28.
当加密算法为简单叠加时,利用wangli112和2015/9/28,对所述tian45进行加密,得到的重编码用户标识信息就是tian45wangli1122015/9/28。When the encryption algorithm is simple superposition, use wangli112 and 2015/9/28 to encrypt the tian45, and the obtained recoded user identification information is tian45wangli1122015/9/28.
而当加密算法为轮流叠加字符时,利用wangli112和2015/9/28,对所述tian45进行加密,得到的重编码用户标识信息就是tw2ia0an1ng54l/5i91/1228。When the encryption algorithm is to superimpose characters in turn, use wangli112 and 2015/9/28 to encrypt the tian45, and the obtained recoded user identification information is tw2ia0an1ng54l/5i91/1228.
此外,为了增强对统一用户标识信息的保护,也可增加数据获取方输入的目标用户的用户标识信息所属维度编号对所述统一用户标识信息进行加密,即利用数据获取方标识信息、有效期和维度编号,对所述统一用户标识信息进行加密,但本发明不对其进行限制。In addition, in order to enhance the protection of the unified user identification information, the dimension number of the user identification information of the target user input by the data acquirer can also be added to encrypt the unified user identification information, that is, the data acquirer identification information, validity period and dimension number, and encrypt the unified user identification information, but the present invention does not limit it.
例如,重编码加密函数为:For example, the recode encryption function is:
Encode(UN-ID)=Encode_function(UN-ID,buyerID,date,userid_dimension)Encode(UN-ID) = Encode_function(UN-ID, buyerID, date, userid_dimension)
其中,UN-ID为统一用户标识信息,buyerID为数据获取方标识信息,date为有效期,userid_dimension为用户标识信息所属维度编号。Among them, UN-ID is the unified user identification information, buyerID is the identification information of the data acquirer, date is the validity period, and userid_dimension is the dimension number to which the user identification information belongs.
这样,能够对加密方式进行定期修改,避免被不法者破解,增强对统一用户标识信息的保护。In this way, the encryption method can be regularly modified to avoid being deciphered by lawbreakers and enhance the protection of unified user identification information.
本发明实施例中,所述解密所述重编码用户标识信息,得到相应的统一用户标识信息的步骤包括:In the embodiment of the present invention, the step of decrypting the recoded user identification information to obtain the corresponding unified user identification information includes:
解密所述重编码用户标识信息,得到所述统一用户标识信息和有效期;Decrypting the re-encoded user identification information to obtain the unified user identification information and validity period;
验证所述统一用户标识信息和有效期;Verifying the unified user identification information and validity period;
所述根据统一用户标识信息,查找所述目标用户的行为特征数据的步骤包括:The step of searching the behavior characteristic data of the target user according to the unified user identification information includes:
在验证结果为所述统一用户标识信息有效且所述有效期在有效生命周期内时,根据所述统一用户标识信息,查找所述目标用户的行为特征数据。When the verification result is that the unified user identification information is valid and the validity period is within a valid life cycle, the behavior characteristic data of the target user is searched according to the unified user identification information.
这样,数据获取方只有利用有效的重编码用户标识信息,才能获得所需数据,避免了数据获取方的二次销售获利及只进行一次购买,就可反复从电信运营商侧获取数据的弊端,保证电信运营商的一些生命周期很长的高价值数据可得到应有的价值回报。In this way, the data acquirer can obtain the required data only by using the effective re-encoded user identification information, which avoids the data acquirer’s profit from secondary sales and the disadvantages of repeatedly obtaining data from the telecom operator’s side after only one purchase , to ensure that some high-value data with a long life cycle of telecom operators can get the due value return.
此外,为了对试图通过尝试不同的重编码用户标识信息获取数据的数据获取方进行管理识别,本发明实施例的数据获取方法还包括:In addition, in order to manage and identify the data acquirer who tries to acquire data by trying different re-encoded user identification information, the data acquisition method in the embodiment of the present invention further includes:
在验证结果为所述统一用户标识信息无效或所述有效期超出有效生命周期时,对计数器加1,所述计数器的初值为0;When the verification result is that the unified user identification information is invalid or the validity period exceeds the valid life cycle, add 1 to the counter, and the initial value of the counter is 0;
当所述计数器的值大于一预设阈值时,将所述数据获取方标识信息加入黑名单,所述数据获取方标识信息是解密所述重编码用户标识信息时得到的。When the value of the counter is greater than a preset threshold, add the data acquirer identification information to a blacklist, and the data acquirer identification information is obtained when decrypting the re-encoded user identification information.
其中,所述预设阈值例如为5,即在计数器的值大于5时,将所述数据获取方标识信息加入黑名单。Wherein, the preset threshold is, for example, 5, that is, when the value of the counter is greater than 5, the identification information of the data acquirer is added to the blacklist.
这样,能够避免某一数据获取方一直占用电信运营商的系统资源,而试图非法获取数据。In this way, it is possible to prevent a certain data acquirer from occupying the system resources of the telecom operator all the time and attempting to illegally acquire data.
参见图3所示,本发明实施例还提供一种数据获取系统,与图1所示的数据获取方法相对应,所述数据获取系统包括:Referring to Fig. 3, an embodiment of the present invention also provides a data acquisition system corresponding to the data acquisition method shown in Fig. 1, the data acquisition system includes:
第一接收模块31,用于接收一数据获取方输入的对应于一目标用户的第一用户标识信息;The first receiving module 31 is configured to receive first user identification information corresponding to a target user input by a data acquirer;
第一输出模块32,用于从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方;The first output module 32 is configured to select at least part of the data from the target user's behavior characteristic data and output it to the data acquirer;
其中,所述目标用户的行为特征数据包括与所述第一用户标识信息对应的第一部分数据和与所述第一用户标识信息不同但对应于所述目标用户的至少一个第二用户标识信息对应的第二部分数据。Wherein, the behavior characteristic data of the target user includes a first part of data corresponding to the first user identification information and at least one second user identification information corresponding to the target user which is different from the first user identification information The second part of the data.
本发明实施例的数据获取系统,通过接收一数据获取方输入的对应于一目标用户的第一用户标识信息,从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方,能够使得所述数据获取方根据目标用户的某一用户标识信息,对所述目标用户的多样性行为进行全面的把握,得到所需要的所述目标用户的行为特征数据。In the data acquisition system of the embodiment of the present invention, by receiving the first user identification information corresponding to a target user input by a data acquirer, at least part of the data is selected from the behavior characteristic data of the target user and output to the data acquirer , enabling the data acquirer to fully grasp the diverse behaviors of the target user according to certain user identification information of the target user, and obtain the required behavior characteristic data of the target user.
本发明实施例中,所述第一用户标识信息(或第二用户标识信息)例如为终端标识信息、业务卡标识信息、Web用户标识信息和Web客户端标识信息中的一者或多者。In the embodiment of the present invention, the first user identification information (or second user identification information) is, for example, one or more of terminal identification information, service card identification information, Web user identification information, and Web client identification information.
具体的,所述数据获取系统还包括:Specifically, the data acquisition system also includes:
获取模块,用于获取所述目标用户的统一用户标识信息,所述统一用户标识信息与所述第一用户标识信息和至少一个第二用户标识信息对应;An acquisition module, configured to acquire unified user identification information of the target user, where the unified user identification information corresponds to the first user identification information and at least one second user identification information;
第二输出模块,用于将所述统一用户标识信息输出给所述数据获取方;A second output module, configured to output the unified user identification information to the data acquirer;
第二接收模块,用于接收所述数据获取方输入的携带所述统一用户标识信息的数据获取请求;The second receiving module is configured to receive a data acquisition request carrying the unified user identification information input by the data acquirer;
查找模块,用于根据所述统一用户标识信息,查找所述目标用户的行为特征数据。A search module, configured to search for the behavior characteristic data of the target user according to the unified user identification information.
这样,通过统一用户标识信息,不仅能够满足数据获取方的数据获取需求,还能够隐藏用户的真实的标识信息,避免从电信运营商侧泄露用户的真实的标识信息的风险。In this way, by unifying the user identification information, not only can the data acquisition requirements of the data acquirer be met, but also the real identification information of the user can be hidden, avoiding the risk of leaking the real identification information of the user from the telecom operator side.
其中,为了避免用户标识信息的泄露,所述第二输出模块包括:Wherein, in order to avoid leakage of user identification information, the second output module includes:
加密模块,用于对所述统一用户标识信息进行加密,得到一重编码用户标识信息;An encryption module, configured to encrypt the unified user identification information to obtain a re-encoded user identification information;
输出子模块,用于将所述重编码用户标识信息输出给所述数据获取方;An output submodule, configured to output the recoded user identification information to the data acquirer;
所述第二接收模块包括:The second receiving module includes:
接收子模块,用于接收所述数据获取方输入的携带所述重编码用户标识信息的数据获取请求;A receiving submodule, configured to receive a data acquisition request carrying the recoded user identification information input by the data acquirer;
解密模块,用于解密所述重编码用户标识信息,得到相应的统一用户标识信息。A decryption module, configured to decrypt the re-encoded user identification information to obtain corresponding unified user identification information.
所述加密模块具体用于利用数据获取方标识信息和有效期,对所述统一用户标识信息进行加密,得到一重编码用户标识信息。The encryption module is specifically used to encrypt the unified user identification information by using the data acquirer identification information and the validity period to obtain a re-encoded user identification information.
而所述解密模块包括:And the decryption module includes:
解密子模块,用于解密所述重编码用户标识信息,得到所述统一用户标识信息和有效期;The decryption submodule is used to decrypt the re-encoded user identification information to obtain the unified user identification information and validity period;
验证子模块,用于验证所述统一用户标识信息和有效期;A verification submodule, configured to verify the unified user identification information and validity period;
所述查找模块具体用于在验证结果为所述统一用户标识信息有效且所述有效期在有效生命周期内时,根据所述统一用户标识信息,查找所述目标用户的行为特征数据。The search module is specifically configured to search for the behavior characteristic data of the target user according to the unified user identification information when the verification result is that the unified user identification information is valid and the validity period is within the valid life cycle.
这样,数据获取方只有利用有效的重编码用户标识信息,才能获得所需数据,避免了数据获取方的二次销售获利及只进行一次购买,就可反复从电信运营商侧获取数据的弊端,保证电信运营商的一些生命周期很长的高价值数据可得到应有的价值回报。In this way, the data acquirer can obtain the required data only by using the effective re-encoded user identification information, which avoids the data acquirer’s profit from secondary sales and the disadvantages of repeatedly obtaining data from the telecom operator’s side after only one purchase , to ensure that some high-value data with a long life cycle of telecom operators can get the due value return.
具体的,所述的数据获取系统还包括:Specifically, the data acquisition system also includes:
计数模块,用于在验证结果为所述统一用户标识信息无效或所述有效期超出有效生命周期时,对计数器加1,所述计数器的初值为0;A counting module, configured to add 1 to the counter when the verification result is that the unified user identification information is invalid or the validity period exceeds the valid life cycle, and the initial value of the counter is 0;
加入模块,用于当所述计数器的值大于一预设阈值时,将所述数据获取方标识信息加入黑名单,所述数据获取方标识信息是解密所述重编码用户标识信息时得到的。An adding module, configured to add the data acquirer identification information to a blacklist when the value of the counter is greater than a preset threshold, and the data acquirer identification information is obtained when decrypting the re-encoded user identification information.
这样,能够避免某一数据获取方一直占用电信运营商的系统资源,而试图非法获取数据。In this way, it is possible to prevent a certain data acquirer from occupying the system resources of the telecom operator all the time and attempting to illegally acquire data.
以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。The above is only a preferred embodiment of the present invention, and it should be pointed out that for those of ordinary skill in the art, some improvements and modifications can be made without departing from the principle of the present invention. It should be regarded as the protection scope of the present invention.
Claims (14)
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510706158.5A CN106612201A (en) | 2015-10-27 | 2015-10-27 | Data acquisition method and system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510706158.5A CN106612201A (en) | 2015-10-27 | 2015-10-27 | Data acquisition method and system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN106612201A true CN106612201A (en) | 2017-05-03 |
Family
ID=58614509
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510706158.5A Pending CN106612201A (en) | 2015-10-27 | 2015-10-27 | Data acquisition method and system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106612201A (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108810057A (en) * | 2017-05-05 | 2018-11-13 | 腾讯科技(深圳)有限公司 | Acquisition method, device and the storage medium of user behavior data |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2011029238A1 (en) * | 2009-09-11 | 2011-03-17 | 华为技术有限公司 | Advertisement delivery method, advertisement server and advertisement system |
| CN104113828A (en) * | 2013-04-19 | 2014-10-22 | 陈亚斌 | Accurate push apparatus and accurate push method |
| CN104978383A (en) * | 2015-02-12 | 2015-10-14 | 腾讯科技(深圳)有限公司 | Data interworking method and data interworking equipment |
-
2015
- 2015-10-27 CN CN201510706158.5A patent/CN106612201A/en active Pending
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| WO2011029238A1 (en) * | 2009-09-11 | 2011-03-17 | 华为技术有限公司 | Advertisement delivery method, advertisement server and advertisement system |
| CN104113828A (en) * | 2013-04-19 | 2014-10-22 | 陈亚斌 | Accurate push apparatus and accurate push method |
| CN104978383A (en) * | 2015-02-12 | 2015-10-14 | 腾讯科技(深圳)有限公司 | Data interworking method and data interworking equipment |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108810057A (en) * | 2017-05-05 | 2018-11-13 | 腾讯科技(深圳)有限公司 | Acquisition method, device and the storage medium of user behavior data |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10586054B2 (en) | Privacy firewall | |
| US10848310B2 (en) | Method and device for identifying user identity | |
| US11296895B2 (en) | Systems and methods for preserving privacy and incentivizing third-party data sharing | |
| US9491146B2 (en) | Computational systems and methods for encrypting data for anonymous storage | |
| US9838839B2 (en) | Repackaging media content data with anonymous identifiers | |
| US11354437B2 (en) | System and methods for providing data analytics for secure cloud compute data | |
| US9432190B2 (en) | Computational systems and methods for double-encrypting data for subsequent anonymous storage | |
| US9195848B2 (en) | Computational systems and methods for anonymized storage of double-encrypted data | |
| US9037861B2 (en) | Enhancing data security using re-encryption | |
| TWI725940B (en) | Method, device and tripartite service system for protecting the safety of sensitive data | |
| CN114528571A (en) | Method, apparatus, electronic device and medium for resource access and data processing | |
| CN105262779A (en) | Identity authentication method, device and system | |
| JP2016031760A (en) | Private analytics with controlled information disclosure | |
| CN107645486A (en) | Login authentication method and device | |
| CN110598377B (en) | Software serial number management method and device based on blockchain | |
| CN105723681A (en) | Partner encoding of anonymous links to protect consumer privacy | |
| US20130268773A1 (en) | Computational systems and methods for preparing data for double-encryption and anonymous storage | |
| US11983284B2 (en) | Consent management methods | |
| US20130060695A1 (en) | Computational systems and methods for regulating information flow during interactions | |
| CN106612201A (en) | Data acquisition method and system | |
| CN115941279B (en) | Encryption and decryption method, system and equipment for user identification in data | |
| CN112559825B (en) | Service processing method, device, computing equipment and medium | |
| CN111131227A (en) | A data processing method and device | |
| Lou | Sensitive Data Risks Analysis in Emerging Online Platforms | |
| HK1226563A1 (en) | Method and device for identifying user identity |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170503 |
|
| RJ01 | Rejection of invention patent application after publication |