[go: up one dir, main page]

CN106612201A - Data acquisition method and system - Google Patents

Data acquisition method and system Download PDF

Info

Publication number
CN106612201A
CN106612201A CN201510706158.5A CN201510706158A CN106612201A CN 106612201 A CN106612201 A CN 106612201A CN 201510706158 A CN201510706158 A CN 201510706158A CN 106612201 A CN106612201 A CN 106612201A
Authority
CN
China
Prior art keywords
identification information
data
user identification
user
data acquisition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510706158.5A
Other languages
Chinese (zh)
Inventor
邓超
熊龙
邓展成
宋刚
胡久林
赵耀红
高丹
赵学峰
曾海涛
冯俊兰
顾志峰
石世磊
许闱纬
彭传金
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN201510706158.5A priority Critical patent/CN106612201A/en
Publication of CN106612201A publication Critical patent/CN106612201A/en
Pending legal-status Critical Current

Links

Landscapes

  • Telephonic Communication Services (AREA)

Abstract

本发明提供一种数据获取方法及系统,其中,所述数据获取方法包括:接收一数据获取方输入的对应于一目标用户的第一用户标识信息;从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方,其中,所述目标用户的行为特征数据包括与所述第一用户标识信息对应的第一部分数据和与所述第一用户标识信息不同但对应于所述目标用户的至少一个第二用户标识信息对应的第二部分数据。本发明的方案,能够使得所述数据获取方根据目标用户的某一用户标识信息,对所述目标用户的多样性行为进行全面的把握,得到所需要的所述目标用户的行为特征数据。

The present invention provides a data acquisition method and system, wherein the data acquisition method includes: receiving first user identification information corresponding to a target user input by a data acquirer; selecting from the behavior characteristic data of the target user At least part of the data is output to the data acquirer, wherein the behavior characteristic data of the target user includes a first part of data corresponding to the first user identification information and a first part of data that is different from the first user identification information but corresponds to the The second part of data corresponding to at least one piece of second user identification information of the target user. The solution of the present invention enables the data acquirer to fully grasp the diverse behaviors of the target user according to certain user identification information of the target user, and obtain the required behavior characteristic data of the target user.

Description

一种数据获取方法及系统A data acquisition method and system

技术领域technical field

本发明涉及数据业务技术领域,特别是涉及一种数据获取方法及系统。The invention relates to the technical field of data services, in particular to a data acquisition method and system.

背景技术Background technique

目前,不同行业的消费方(即数据获取方),在从电信运营商侧获取交易数据,例如用户行为特征数据时,常采用以下方式:At present, consumers in different industries (that is, data acquirers) often use the following methods when acquiring transaction data from telecom operators, such as user behavior characteristic data:

1、基于IMEI、IDFA、Android ID等终端标识信息1. Based on IMEI, IDFA, Android ID and other terminal identification information

参见图4所示,DPS(Demand-Side Platform,需求方平台)消费方将已经获得的目标用户所使用的终端标识(终端设备的IMEI/IDFA/Android ID)作为输入,输入至电信运营商侧的DMP(Data Management Platform,数据管理平台)系统;电信运营商从其DMP系统中查询,是否存在所述终端标识,若存在,则返回对应的用户行为特征数据。As shown in Figure 4, the DPS (Demand-Side Platform, demand-side platform) consumer takes the obtained terminal identification (IMEI/IDFA/Android ID of the terminal device) used by the target user as input and inputs it to the telecom operator side A DMP (Data Management Platform, data management platform) system; the telecom operator inquires from its DMP system whether the terminal identifier exists, and if so, returns the corresponding user behavior characteristic data.

2、基于Cookie-ID的映射2. Mapping based on Cookie-ID

与方式1的查询方式类似,本方式是将用户使用的浏览器等客户端存储的Cookie-ID作为输入,输入至电信运营商侧的DMP系统,以发起查询请求。Similar to the query method of method 1, in this method, the Cookie-ID stored in the client such as the browser used by the user is used as input to the DMP system on the telecom operator side to initiate a query request.

3、基于手机号、身份证等3. Based on mobile phone number, ID card, etc.

从事线下精准营销和个人征信服务的商业消费方,为了精确定位自己的目标受众和潜在客户,通常会拿自己已有的会员客户真实身份ID,比如手机号和身份证,直接来查询该电信用户手机号的在网时长或者经常活动区域是否与目标业务的区域相一致。Commercial consumers engaged in offline precision marketing and personal credit investigation services, in order to accurately locate their target audiences and potential customers, usually use their existing member customer real IDs, such as mobile phone numbers and ID cards, to directly inquire about the Whether the online duration or frequent activity area of a telecom user's mobile phone number is consistent with the area of the target business.

4、基于MSISDN、IMSI等4. Based on MSISDN, IMSI, etc.

内部业务系统间,比如流量经营分析系统和CRM(Customer RelationshipManagement,客户关系管理)、BOSS(Business&Operation Support System,业务运营支撑系统)子系统间,在依据用户标识信息进行数据关联时,通常直接采用MSISDN(手机号)和IMSI(国际移动用户识别码)。Between internal business systems, such as traffic management analysis system and CRM (Customer Relationship Management, customer relationship management), BOSS (Business&Operation Support System, business operation support system) subsystems, when performing data association based on user identification information, MSISDN is usually used directly (mobile phone number) and IMSI (International Mobile Subscriber Identity).

从上述方式可知:现有技术中,在从电信运营商获取目标用户的行为特征数据时,大都按照消费方的个性需求,即消费方输入什么样的用户标识信息,电信运营商就直接将被查询用户的标识信息及对应的行为特征数据,作为数据交易内容输出给消费方。It can be seen from the above method that in the prior art, when obtaining the behavioral characteristic data of the target user from the telecom operator, most of them are based on the individual needs of the consumer, that is, what kind of user identification information the consumer inputs, and the telecom operator will directly receive it. Query the user's identification information and corresponding behavioral characteristic data, and output it to the consumer as the data transaction content.

但是,随着外部行业消费方所涉及的行业需求越来越广泛,且不同行业对其目标用户关注的行为特征差异很大,比如汽车行业关注用户在汽车方面的行为偏好、电商行业关注用户的网上购买行为、征信行业关注用户的手机号在网年限等。所以,如何能满足不同行业消费方对电信运营商内用户各行业多样性行为的精准感知,已成为重点关注的问题。However, as consumers in external industries are involved in more and more industries, and the behavioral characteristics of their target users in different industries are very different. online purchase behavior, the number of mobile phone numbers of users concerned by the credit investigation industry, etc. Therefore, how to meet the precise perception of consumers in different industries on the diverse behaviors of users in telecom operators in various industries has become a key concern.

发明内容Contents of the invention

本发明的目的在于提供一种数据获取方法及系统,用以解决现有技术中存在的不同行业数据获取方不能对电信运营商内用户各行业多样性行为进行精准感知的技术问题。The purpose of the present invention is to provide a data acquisition method and system to solve the technical problem in the prior art that data acquirers in different industries cannot accurately perceive the diverse behaviors of users in various industries within a telecom operator.

为了实现上述的目的,本发明提供一种数据获取方法,包括:In order to achieve the above object, the present invention provides a data acquisition method, including:

接收一数据获取方输入的对应于一目标用户的第一用户标识信息;receiving first user identification information corresponding to a target user input by a data acquirer;

从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方;Selecting at least part of the data from the behavior characteristic data of the target user to output to the data acquirer;

其中,所述目标用户的行为特征数据包括与所述第一用户标识信息对应的第一部分数据和与所述第一用户标识信息不同但对应于所述目标用户的至少一个第二用户标识信息对应的第二部分数据。Wherein, the behavior characteristic data of the target user includes a first part of data corresponding to the first user identification information and at least one second user identification information corresponding to the target user which is different from the first user identification information The second part of the data.

优选的,所述第一用户标识信息为终端标识信息、业务卡标识信息、Web用户标识信息和Web客户端标识信息中的一者或多者。Preferably, the first user identification information is one or more of terminal identification information, service card identification information, Web user identification information, and Web client identification information.

优选的,所述从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方的步骤之前还包括:Preferably, before the step of selecting at least part of the data from the target user's behavior characteristic data and outputting it to the data acquirer, the step further includes:

获取所述目标用户的统一用户标识信息,所述统一用户标识信息与所述第一用户标识信息和至少一个第二用户标识信息对应;Acquire unified user identification information of the target user, where the unified user identification information corresponds to the first user identification information and at least one second user identification information;

将所述统一用户标识信息输出给所述数据获取方;Outputting the unified user identification information to the data acquirer;

接收所述数据获取方输入的携带所述统一用户标识信息的数据获取请求;receiving a data acquisition request carrying the unified user identification information input by the data acquirer;

根据所述统一用户标识信息,查找所述目标用户的行为特征数据。According to the unified user identification information, the behavior characteristic data of the target user is searched.

优选的,所述将所述统一用户标识信息输出给所述数据获取方的步骤包括:Preferably, the step of outputting the unified user identification information to the data acquirer includes:

对所述统一用户标识信息进行加密,得到一重编码用户标识信息;Encrypting the unified user identification information to obtain a re-encoded user identification information;

将所述重编码用户标识信息输出给所述数据获取方;Outputting the recoded user identification information to the data acquirer;

所述接收所述数据获取方输入的携带所述统一用户标识信息的数据获取请求的步骤包括:The step of receiving the data acquisition request carrying the unified user identification information input by the data acquirer includes:

接收所述数据获取方输入的携带所述重编码用户标识信息的数据获取请求;receiving a data acquisition request carrying the recoded user identification information input by the data acquirer;

解密所述重编码用户标识信息,得到相应的统一用户标识信息。The recoded user identification information is decrypted to obtain corresponding unified user identification information.

优选的,所述对所述统一用户标识信息进行加密,得到一重编码用户标识信息的步骤包括:Preferably, the step of encrypting the unified user identification information to obtain a re-encoded user identification information includes:

利用数据获取方标识信息和有效期,对所述统一用户标识信息进行加密,得到一重编码用户标识信息。The unified user identification information is encrypted by using the identification information of the data acquirer and the validity period to obtain the re-encoded user identification information.

优选的,所述解密所述重编码用户标识信息,得到相应的统一用户标识信息的步骤包括:Preferably, the step of decrypting the recoded user identification information to obtain corresponding unified user identification information includes:

解密所述重编码用户标识信息,得到所述统一用户标识信息和有效期;Decrypting the re-encoded user identification information to obtain the unified user identification information and validity period;

验证所述统一用户标识信息和有效期;Verifying the unified user identification information and validity period;

所述根据统一用户标识信息,查找所述目标用户的行为特征数据的步骤包括:The step of searching the behavior characteristic data of the target user according to the unified user identification information includes:

在验证结果为所述统一用户标识信息有效且所述有效期在有效生命周期内时,根据所述统一用户标识信息,查找所述目标用户的行为特征数据。When the verification result is that the unified user identification information is valid and the validity period is within a valid life cycle, the behavior characteristic data of the target user is searched according to the unified user identification information.

优选的,所述数据获取方法还包括:Preferably, the data acquisition method also includes:

在验证结果为所述统一用户标识信息无效或所述有效期超出有效生命周期时,对计数器加1,所述计数器的初值为0;When the verification result is that the unified user identification information is invalid or the validity period exceeds the valid life cycle, add 1 to the counter, and the initial value of the counter is 0;

当所述计数器的值大于一预设阈值时,将所述数据获取方标识信息加入黑名单,所述数据获取方标识信息是解密所述重编码用户标识信息时得到的。When the value of the counter is greater than a preset threshold, adding the data acquirer identification information to a blacklist, the data acquirer identification information is obtained when decrypting the re-encoded user identification information.

本发明还提供一种数据获取系统,包括:The present invention also provides a data acquisition system, including:

第一接收模块,用于接收一数据获取方输入的对应于一目标用户的第一用户标识信息;A first receiving module, configured to receive first user identification information corresponding to a target user input by a data acquirer;

第一输出模块,用于从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方;A first output module, configured to select at least part of the data from the target user's behavior characteristic data and output it to the data acquirer;

其中,所述目标用户的行为特征数据包括与所述第一用户标识信息对应的第一部分数据和与所述第一用户标识信息不同但对应于所述目标用户的至少一个第二用户标识信息对应的第二部分数据。Wherein, the behavior characteristic data of the target user includes a first part of data corresponding to the first user identification information and at least one second user identification information corresponding to the target user which is different from the first user identification information The second part of the data.

优选的,所述第一用户标识信息为终端标识信息、业务卡标识信息、Web用户标识信息和Web客户端标识信息中的一者或多者。Preferably, the first user identification information is one or more of terminal identification information, service card identification information, Web user identification information, and Web client identification information.

优选的,所述数据获取系统还包括:Preferably, the data acquisition system also includes:

获取模块,用于获取所述目标用户的统一用户标识信息,所述统一用户标识信息与所述第一用户标识信息和至少一个第二用户标识信息对应;An acquisition module, configured to acquire unified user identification information of the target user, where the unified user identification information corresponds to the first user identification information and at least one second user identification information;

第二输出模块,用于将所述统一用户标识信息输出给所述数据获取方;A second output module, configured to output the unified user identification information to the data acquirer;

第二接收模块,用于接收所述数据获取方输入的携带所述统一用户标识信息的数据获取请求;The second receiving module is configured to receive a data acquisition request carrying the unified user identification information input by the data acquirer;

查找模块,用于根据所述统一用户标识信息,查找所述目标用户的行为特征数据。A search module, configured to search for the behavior characteristic data of the target user according to the unified user identification information.

优选的,所述第二输出模块包括:Preferably, the second output module includes:

加密模块,用于对所述统一用户标识信息进行加密,得到一重编码用户标识信息;An encryption module, configured to encrypt the unified user identification information to obtain a re-encoded user identification information;

输出子模块,用于将所述重编码用户标识信息输出给所述数据获取方;An output submodule, configured to output the recoded user identification information to the data acquirer;

所述第二接收模块包括:The second receiving module includes:

接收子模块,用于接收所述数据获取方输入的携带所述重编码用户标识信息的数据获取请求;A receiving submodule, configured to receive a data acquisition request carrying the recoded user identification information input by the data acquirer;

解密模块,用于解密所述重编码用户标识信息,得到相应的统一用户标识信息。A decryption module, configured to decrypt the re-encoded user identification information to obtain corresponding unified user identification information.

优选的,所述加密模块具体用于利用数据获取方标识信息和有效期,对所述统一用户标识信息进行加密,得到一重编码用户标识信息。Preferably, the encryption module is specifically configured to encrypt the unified user identification information by using the data acquirer identification information and the validity period, so as to obtain re-encoded user identification information.

优选的,所述解密模块包括:Preferably, the decryption module includes:

解密子模块,用于解密所述重编码用户标识信息,得到所述统一用户标识信息和有效期;The decryption submodule is used to decrypt the re-encoded user identification information to obtain the unified user identification information and validity period;

验证子模块,用于验证所述统一用户标识信息和有效期;A verification submodule, configured to verify the unified user identification information and validity period;

所述查找模块具体用于在验证结果为所述统一用户标识信息有效且所述有效期在有效生命周期内时,根据所述统一用户标识信息,查找所述目标用户的行为特征数据。The search module is specifically configured to search for the behavior characteristic data of the target user according to the unified user identification information when the verification result is that the unified user identification information is valid and the validity period is within the valid life cycle.

优选的,所述数据获取系统还包括:Preferably, the data acquisition system also includes:

计数模块,用于在验证结果为所述统一用户标识信息无效或所述有效期超出有效生命周期时,对计数器加1,所述计数器的初值为0;A counting module, configured to add 1 to the counter when the verification result is that the unified user identification information is invalid or the validity period exceeds the valid life cycle, and the initial value of the counter is 0;

加入模块,用于当所述计数器的值大于一预设阈值时,将所述数据获取方标识信息加入黑名单,所述数据获取方标识信息是解密所述重编码用户标识信息时得到的。An adding module, configured to add the data acquirer identification information to a blacklist when the value of the counter is greater than a preset threshold, and the data acquirer identification information is obtained when decrypting the re-encoded user identification information.

通过本发明的上述技术方案,本发明的有益效果在于:Through the above-mentioned technical scheme of the present invention, the beneficial effect of the present invention is:

本发明实施例的数据获取方法,通过接收一数据获取方输入的对应于一目标用户的第一用户标识信息,从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方,能够使得所述数据获取方根据目标用户的某一用户标识信息,对所述目标用户的多样性行为进行全面的把握,得到所需要的所述目标用户的行为特征数据。In the data acquisition method of the embodiment of the present invention, by receiving the first user identification information corresponding to a target user input by a data acquirer, at least part of the data is selected from the behavior characteristic data of the target user and output to the data acquirer , enabling the data acquirer to fully grasp the diverse behaviors of the target user according to certain user identification information of the target user, and obtain the required behavior characteristic data of the target user.

附图说明Description of drawings

图1表示本发明实施例的数据获取方法的流程图。FIG. 1 shows a flowchart of a data acquisition method in an embodiment of the present invention.

图2表示统一用户标识信息与用户的真实的标识信息的对应关系图。FIG. 2 is a diagram showing the correspondence relationship between the unified user identification information and the real identification information of the user.

图3表示本发明实施例的数据获取系统的结构示意图。FIG. 3 shows a schematic structural diagram of a data acquisition system according to an embodiment of the present invention.

图4表示现有技术中,数据获取方利用目标用户的终端标识信息获取相应数据的示意图。FIG. 4 shows a schematic diagram of a data acquirer using terminal identification information of a target user to acquire corresponding data in the prior art.

具体实施方式detailed description

为使本发明实施例的目的、技术方案和优点更加清楚,下面将结合附图对具体实施例进行详细描述。In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, specific embodiments will be described in detail below with reference to the accompanying drawings.

参见图1所示,本发明实施例提供一种数据获取方法,应用于电信运营商侧的数据获取系统,包括:Referring to Fig. 1, an embodiment of the present invention provides a data acquisition method, which is applied to a data acquisition system on the telecom operator side, including:

S101:接收一数据获取方输入的对应于一目标用户的第一用户标识信息;S101: Receive first user identification information corresponding to a target user input by a data acquirer;

S102:从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方;S102: Selecting at least part of the data from the behavior characteristic data of the target user and outputting it to the data acquirer;

其中,所述目标用户的行为特征数据包括与所述第一用户标识信息对应的第一部分数据和与所述第一用户标识信息不同但对应于所述目标用户的至少一个第二用户标识信息对应的第二部分数据。Wherein, the behavior characteristic data of the target user includes a first part of data corresponding to the first user identification information and at least one second user identification information corresponding to the target user which is different from the first user identification information The second part of the data.

本发明实施例的数据获取方法,通过接收一数据获取方输入的对应于一目标用户的第一用户标识信息,从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方,能够使得所述数据获取方根据目标用户的某一用户标识信息,对所述目标用户的多样性行为进行全面的把握,得到所需要的所述目标用户的行为特征数据。In the data acquisition method of the embodiment of the present invention, by receiving the first user identification information corresponding to a target user input by a data acquirer, at least part of the data is selected from the behavior characteristic data of the target user and output to the data acquirer , enabling the data acquirer to fully grasp the diverse behaviors of the target user according to certain user identification information of the target user, and obtain the required behavior characteristic data of the target user.

例如,数据获取方A属于房地产行业,知道目标用户B的一个与房地产相关的Web账号12**5。For example, the data acquirer A belongs to the real estate industry and knows a real estate-related Web account 12**5 of the target user B.

现有技术中,A根据所述Web账号12**5,在电信运营商侧的数据获取系统中只能查询B的与房地产相关的数据。但是,通过本发明的数据获取方法,A根据所述Web账号12**5,可在电信运营商侧的数据获取系统中查询B的与其他行业,例如电商行业、征信行业等相关的数据。In the prior art, according to the Web account 12**5, A can only query B's real estate-related data in the data acquisition system on the telecom operator side. However, through the data acquisition method of the present invention, A can query B's information related to other industries, such as e-commerce industry, credit industry, etc. data.

本发明实施例中,所述第一用户标识信息(或第二用户标识信息)例如为终端标识信息、业务卡标识信息、Web用户标识信息和Web客户端标识信息中的一者或多者。In the embodiment of the present invention, the first user identification information (or second user identification information) is, for example, one or more of terminal identification information, service card identification information, Web user identification information, and Web client identification information.

具体的,所述终端标识信息主要针对终端Device,包括但不限于终端的IMEI,互联网接入设备的MAC、IDFA、IDFV、Android ID等设备标识。实际应用中,互联网广告主、DSP等外部消费方,倾向于使用所述终端标识信息。Specifically, the terminal identification information is mainly for the terminal Device, including but not limited to the IMEI of the terminal, device identifications such as MAC, IDFA, IDFV, and Android ID of the Internet access device. In practical applications, external consumers such as Internet advertisers and DSPs tend to use the terminal identification information.

所述业务卡标识信息主要针对手机Mobile,包括但不限于SIM卡的IMSI、手机号MISDN。实际应用中,电信运营商侧的内部业务子系统间在基于用户数据关联和聚合时,倾向于使用这一部分标识信息。The service card identification information is mainly for the mobile phone, including but not limited to the IMSI of the SIM card and the MISDN of the mobile phone number. In practical applications, this part of identification information tends to be used when the internal business subsystems on the telecom operator side are associated and aggregated based on user data.

所述Web用户标识信息主要针对Web用户(Web user),包括但不限于Web账号、Web昵称。实际应用中,电信运营商侧可通过解析流量包,获取用户在不同web站点和app应用中账户和昵称。而互联网行业例如房地产或电商在分析目标用户时,倾向于使用这一部分标识信息。The Web user identification information is mainly for Web users (Web users), including but not limited to Web accounts and Web nicknames. In practical applications, the telecom operator side can obtain user accounts and nicknames in different web sites and apps by analyzing traffic packets. Internet industries such as real estate or e-commerce tend to use this part of identification information when analyzing target users.

所述Web客户端标识信息主要针对Web客户端(Web client),包括但不限于暂存资料cookies、浏览器类型user agent。The Web client identification information is mainly aimed at the Web client (Web client), including but not limited to temporarily stored data cookies and browser type user agent.

其中,根据实际需求,可将所述终端标识信息、业务卡标识信息、Web用户标识信息和Web客户端标识信息划分为分属4个维度,即终端标识信息属于维度1,业务卡标识信息属于维度2,Web用户标识信息属于维度3,Web客户端标识信息属于维度4,以方便区分。Among them, according to actual needs, the terminal identification information, service card identification information, Web user identification information and Web client identification information can be divided into four dimensions, that is, the terminal identification information belongs to dimension 1, and the service card identification information belongs to dimension 1. Dimension 2, web user identification information belongs to dimension 3, and web client identification information belongs to dimension 4, for easy distinction.

本发明实施例中,所述从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方的步骤之前还包括:In the embodiment of the present invention, before the step of selecting at least part of the data from the behavior characteristic data of the target user and outputting it to the data acquirer, the step further includes:

获取所述目标用户的统一用户标识信息,所述统一用户标识信息与所述第一用户标识信息和至少一个第二用户标识信息对应;Acquire unified user identification information of the target user, where the unified user identification information corresponds to the first user identification information and at least one second user identification information;

将所述统一用户标识信息输出给所述数据获取方;Outputting the unified user identification information to the data acquirer;

接收所述数据获取方输入的携带所述统一用户标识信息的数据获取请求;receiving a data acquisition request carrying the unified user identification information input by the data acquirer;

根据所述统一用户标识信息,查找所述目标用户的行为特征数据。According to the unified user identification information, the behavior characteristic data of the target user is searched.

本发明实施例的数据获取方法,通过统一用户标识信息,不仅能够满足数据获取方的数据获取需求,还能够隐藏用户的真实的标识信息,避免从电信运营商侧泄露用户的真实的标识信息的风险。The data acquisition method in the embodiment of the present invention can not only meet the data acquisition requirements of the data acquirer by unifying the user identification information, but also hide the user's real identification information, avoiding leakage of the user's real identification information from the telecom operator side risk.

其中,参见图2所述,所述统一用户标识信息(UN-ID)是将上述4个维度的标识信息统一后的指代目标用户的唯一的标识信息,是分配给目标用户的身份标识,对应着目标用户的全部行为特征数据。Wherein, referring to FIG. 2, the unified user identification information (UN-ID) is the unique identification information referring to the target user after unifying the identification information of the above four dimensions, and is the identity identification assigned to the target user, Corresponding to all the behavior characteristic data of the target user.

例如,对于目标用户M,在电信运营商侧的数据获取系统中,其移动终端的IMEI为123,业务卡的IMSI为136****0101,Web账号为“天天”,Web客户端中的cookies包括M登录过的有关健身器械网站中的用户标识,分别对应着M的部分行为特征数据。而目标用户M的统一用户标识信息,例如qazwsx123,将这些标识信息融合在一起,唯一指代M,对应着M的全部行为特征数据。For example, for the target user M, in the data acquisition system on the telecom operator side, the IMEI of the mobile terminal is 123, the IMSI of the service card is 136****0101, the web account is "Tian Tian", and the Cookies include the user identification on the fitness equipment website that M has logged in, corresponding to some of M's behavioral characteristic data. The unified user identification information of the target user M, such as qazwsx123, combines these identification information together to uniquely refer to M, corresponding to all behavior characteristic data of M.

这样,电信运营商侧的数据获取系统在接收到数据获取方输入的移动终端的IMEI 123后,会获取到M的统一用户标识信息qazwsx123,并将所述qazwsx123输出给所述数据获取方,以进行后续的数据获取。In this way, after the data acquisition system on the telecom operator side receives the IMEI 123 of the mobile terminal input by the data acquirer, it will acquire the unified user identification information qazwsx123 of M, and output the qazwsx123 to the data acquirer for Follow-up data acquisition.

其中,用户的统一用户标识信息和真实的用户标识信息的对应关系例如是预先存储于电信运营商侧的数据获取系统中,或是在初次接收到某一用户的真实的用户标识信息时,根据预设规则,为所述用户分配一个统一用户标识信息,并存储这一对应关系,当再接收到所述用户的其他真实的用户标识信息时,直接根据存储的对应关系,确定出所述用户的统一用户标识信息。Wherein, the corresponding relationship between the unified user identification information of the user and the real user identification information is, for example, pre-stored in the data acquisition system on the side of the telecom operator, or when the real user identification information of a certain user is received for the first time, according to Preset rules, assign a unified user identification information to the user, and store this corresponding relationship, when receiving other real user identification information of the user, determine the user directly according to the stored corresponding relationship unified user identification information.

实际应用中,本发明实施例的数据获取方法的应用场景一般包括对内和对外,即电信运营商内部获取数据和电信运营商外部获取数据。而为了区分,以更方便满足电信运营商内部的需求,可通过为内部数据获取方和外部数据获取方配置不同权限的统一用户标识信息的方式来实现,本发明不对其进行限制,都应属于本发明所保护的范围。In practical applications, the application scenarios of the data acquisition method in the embodiment of the present invention generally include internal and external, that is, internal data acquisition by the telecom operator and external data acquisition by the telecom operator. In order to distinguish and meet the internal needs of telecom operators more conveniently, it can be realized by configuring unified user identification information with different permissions for the internal data acquirer and the external data acquirer. The present invention does not limit it, and it should belong to The protected scope of the present invention.

本发明实施例中,所述数据获取请求中不仅携带目标用户的统一用户标识信息,还包括数据获取方的需要限定,即数据获取方限定的需要获取的目标用户的行为特征数据。这样,电信运营商侧的数据获取系统在接收到数据获取方输入的数据获取请求后,会查找相应目标用户的行为特征数据(根据统一用户标识信息),并从所述行为特征数据中选择至少部分数据输出给所述数据获取方(根据数据获取方的需要限定),以完成数据获取过程。In the embodiment of the present invention, the data acquisition request not only carries the unified user identification information of the target user, but also includes the requirement definition of the data acquirer, that is, the behavior characteristic data of the target user that needs to be acquired as defined by the data acquirer. In this way, after receiving the data acquisition request input by the data acquirer, the data acquisition system on the telecom operator side will search for the behavior characteristic data of the corresponding target user (according to the unified user identification information), and select at least Part of the data is output to the data acquirer (defined according to the needs of the data acquirer) to complete the data acquisition process.

为了避免用户标识信息的泄露,可选择在输出统一用户标识信息时,对所述统一用户标识信息进行加密,例如,采用常用的MD5编码加密的机制。In order to avoid leakage of the user identification information, the unified user identification information may be encrypted when the unified user identification information is output, for example, a commonly used MD5 encoding encryption mechanism is adopted.

基于上述内容,在本发明具体实施例中,所述将所述统一用户标识信息输出给所述数据获取方的步骤包括:Based on the above, in a specific embodiment of the present invention, the step of outputting the unified user identification information to the data acquirer includes:

对所述统一用户标识信息进行加密,得到一重编码用户标识信息;Encrypting the unified user identification information to obtain a re-encoded user identification information;

将所述重编码用户标识信息输出给所述数据获取方;Outputting the recoded user identification information to the data acquirer;

所述接收所述数据获取方输入的携带所述统一用户标识信息的数据获取请求的步骤包括:The step of receiving the data acquisition request carrying the unified user identification information input by the data acquirer includes:

接收所述数据获取方输入的携带所述重编码用户标识信息的数据获取请求;receiving a data acquisition request carrying the recoded user identification information input by the data acquirer;

解密所述重编码用户标识信息,得到相应的统一用户标识信息。The recoded user identification information is decrypted to obtain corresponding unified user identification information.

但是,采用常用的MD5编码加密的机制对所述统一用户标识信息进行加密,然后直接提供给不同数据获取方的方式,电信运营商将无法保证从自身渠道获得目标用户的行为特征数据的数据获取方,不会将这些行为特征数据进行二次销售获利,即对外销售获取的统一用户标识信息。并且,只进行一次购买,就可反复从电信运营商侧获取数据,使得电信运营商无法获得应有的价值回报,特别是对一些生命周期很长的高价值数据。However, by adopting the commonly used MD5 code encryption mechanism to encrypt the unified user identification information, and then directly providing it to different data acquirers, the telecom operators will not be able to guarantee the data acquisition of the target user's behavior characteristic data from their own channels. Party, will not use these behavioral feature data for secondary sales for profit, that is, the unified user identification information obtained from external sales. Moreover, only one purchase is required to obtain data repeatedly from the telecom operator side, making it impossible for the telecom operator to obtain the due value return, especially for some high-value data with a long life cycle.

为了克服上述问题,可选择数据获取方标识信息和有效期对所述统一用户标识信息进行加密。这样,在相同统一用户标识信息的情况下:In order to overcome the above problems, the unified user identification information can be encrypted by selecting the data acquirer identification information and the validity period. In this way, in the case of the same unified user identification information:

1)对于不同的数据获取方,可得到不同的重编码用户标识信息;1) For different data acquirers, different recoded user identification information can be obtained;

2)对于相同的数据获取方但不同的时间点,前后会得到不同的重编码用户标识信息;2) For the same data acquirer but different time points, different recoded user identification information will be obtained before and after;

3)对于不同的数据获取方且不同的时间点,前后也会得到不同的重编码用户标识信息。3) For different data acquirers and different time points, different recoded user identification information will be obtained before and after.

基于上述内容,本发明实施例中,所述对所述统一用户标识信息进行加密,得到一重编码用户标识信息的步骤包括:Based on the above, in the embodiment of the present invention, the step of encrypting the unified user identification information to obtain a re-encoded user identification information includes:

利用数据获取方标识信息和有效期,对所述统一用户标识信息进行加密,得到一重编码用户标识信息。The unified user identification information is encrypted by using the identification information of the data acquirer and the validity period to obtain the re-encoded user identification information.

其中,加密算法可为简单叠加或轮流叠加字符等,本发明不对其进行限制,可依需求进行相应的选择。Wherein, the encryption algorithm can be simple superposition or alternate superposition of characters, etc., which is not limited in the present invention, and can be selected according to requirements.

例如,数据获取方C要获取目标用户D的行为特征数据。目标用户D的统一用户标识信息为tian45,数据获取方C的标识信息为wangli112,有效期为2015/9/28。For example, the data acquirer C wants to acquire the behavior characteristic data of the target user D. The unified user identification information of target user D is tian45, the identification information of data acquirer C is wangli112, and the validity period is 2015/9/28.

当加密算法为简单叠加时,利用wangli112和2015/9/28,对所述tian45进行加密,得到的重编码用户标识信息就是tian45wangli1122015/9/28。When the encryption algorithm is simple superposition, use wangli112 and 2015/9/28 to encrypt the tian45, and the obtained recoded user identification information is tian45wangli1122015/9/28.

而当加密算法为轮流叠加字符时,利用wangli112和2015/9/28,对所述tian45进行加密,得到的重编码用户标识信息就是tw2ia0an1ng54l/5i91/1228。When the encryption algorithm is to superimpose characters in turn, use wangli112 and 2015/9/28 to encrypt the tian45, and the obtained recoded user identification information is tw2ia0an1ng54l/5i91/1228.

此外,为了增强对统一用户标识信息的保护,也可增加数据获取方输入的目标用户的用户标识信息所属维度编号对所述统一用户标识信息进行加密,即利用数据获取方标识信息、有效期和维度编号,对所述统一用户标识信息进行加密,但本发明不对其进行限制。In addition, in order to enhance the protection of the unified user identification information, the dimension number of the user identification information of the target user input by the data acquirer can also be added to encrypt the unified user identification information, that is, the data acquirer identification information, validity period and dimension number, and encrypt the unified user identification information, but the present invention does not limit it.

例如,重编码加密函数为:For example, the recode encryption function is:

Encode(UN-ID)=Encode_function(UN-ID,buyerID,date,userid_dimension)Encode(UN-ID) = Encode_function(UN-ID, buyerID, date, userid_dimension)

其中,UN-ID为统一用户标识信息,buyerID为数据获取方标识信息,date为有效期,userid_dimension为用户标识信息所属维度编号。Among them, UN-ID is the unified user identification information, buyerID is the identification information of the data acquirer, date is the validity period, and userid_dimension is the dimension number to which the user identification information belongs.

这样,能够对加密方式进行定期修改,避免被不法者破解,增强对统一用户标识信息的保护。In this way, the encryption method can be regularly modified to avoid being deciphered by lawbreakers and enhance the protection of unified user identification information.

本发明实施例中,所述解密所述重编码用户标识信息,得到相应的统一用户标识信息的步骤包括:In the embodiment of the present invention, the step of decrypting the recoded user identification information to obtain the corresponding unified user identification information includes:

解密所述重编码用户标识信息,得到所述统一用户标识信息和有效期;Decrypting the re-encoded user identification information to obtain the unified user identification information and validity period;

验证所述统一用户标识信息和有效期;Verifying the unified user identification information and validity period;

所述根据统一用户标识信息,查找所述目标用户的行为特征数据的步骤包括:The step of searching the behavior characteristic data of the target user according to the unified user identification information includes:

在验证结果为所述统一用户标识信息有效且所述有效期在有效生命周期内时,根据所述统一用户标识信息,查找所述目标用户的行为特征数据。When the verification result is that the unified user identification information is valid and the validity period is within a valid life cycle, the behavior characteristic data of the target user is searched according to the unified user identification information.

这样,数据获取方只有利用有效的重编码用户标识信息,才能获得所需数据,避免了数据获取方的二次销售获利及只进行一次购买,就可反复从电信运营商侧获取数据的弊端,保证电信运营商的一些生命周期很长的高价值数据可得到应有的价值回报。In this way, the data acquirer can obtain the required data only by using the effective re-encoded user identification information, which avoids the data acquirer’s profit from secondary sales and the disadvantages of repeatedly obtaining data from the telecom operator’s side after only one purchase , to ensure that some high-value data with a long life cycle of telecom operators can get the due value return.

此外,为了对试图通过尝试不同的重编码用户标识信息获取数据的数据获取方进行管理识别,本发明实施例的数据获取方法还包括:In addition, in order to manage and identify the data acquirer who tries to acquire data by trying different re-encoded user identification information, the data acquisition method in the embodiment of the present invention further includes:

在验证结果为所述统一用户标识信息无效或所述有效期超出有效生命周期时,对计数器加1,所述计数器的初值为0;When the verification result is that the unified user identification information is invalid or the validity period exceeds the valid life cycle, add 1 to the counter, and the initial value of the counter is 0;

当所述计数器的值大于一预设阈值时,将所述数据获取方标识信息加入黑名单,所述数据获取方标识信息是解密所述重编码用户标识信息时得到的。When the value of the counter is greater than a preset threshold, add the data acquirer identification information to a blacklist, and the data acquirer identification information is obtained when decrypting the re-encoded user identification information.

其中,所述预设阈值例如为5,即在计数器的值大于5时,将所述数据获取方标识信息加入黑名单。Wherein, the preset threshold is, for example, 5, that is, when the value of the counter is greater than 5, the identification information of the data acquirer is added to the blacklist.

这样,能够避免某一数据获取方一直占用电信运营商的系统资源,而试图非法获取数据。In this way, it is possible to prevent a certain data acquirer from occupying the system resources of the telecom operator all the time and attempting to illegally acquire data.

参见图3所示,本发明实施例还提供一种数据获取系统,与图1所示的数据获取方法相对应,所述数据获取系统包括:Referring to Fig. 3, an embodiment of the present invention also provides a data acquisition system corresponding to the data acquisition method shown in Fig. 1, the data acquisition system includes:

第一接收模块31,用于接收一数据获取方输入的对应于一目标用户的第一用户标识信息;The first receiving module 31 is configured to receive first user identification information corresponding to a target user input by a data acquirer;

第一输出模块32,用于从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方;The first output module 32 is configured to select at least part of the data from the target user's behavior characteristic data and output it to the data acquirer;

其中,所述目标用户的行为特征数据包括与所述第一用户标识信息对应的第一部分数据和与所述第一用户标识信息不同但对应于所述目标用户的至少一个第二用户标识信息对应的第二部分数据。Wherein, the behavior characteristic data of the target user includes a first part of data corresponding to the first user identification information and at least one second user identification information corresponding to the target user which is different from the first user identification information The second part of the data.

本发明实施例的数据获取系统,通过接收一数据获取方输入的对应于一目标用户的第一用户标识信息,从所述目标用户的行为特征数据中选择至少部分数据输出给所述数据获取方,能够使得所述数据获取方根据目标用户的某一用户标识信息,对所述目标用户的多样性行为进行全面的把握,得到所需要的所述目标用户的行为特征数据。In the data acquisition system of the embodiment of the present invention, by receiving the first user identification information corresponding to a target user input by a data acquirer, at least part of the data is selected from the behavior characteristic data of the target user and output to the data acquirer , enabling the data acquirer to fully grasp the diverse behaviors of the target user according to certain user identification information of the target user, and obtain the required behavior characteristic data of the target user.

本发明实施例中,所述第一用户标识信息(或第二用户标识信息)例如为终端标识信息、业务卡标识信息、Web用户标识信息和Web客户端标识信息中的一者或多者。In the embodiment of the present invention, the first user identification information (or second user identification information) is, for example, one or more of terminal identification information, service card identification information, Web user identification information, and Web client identification information.

具体的,所述数据获取系统还包括:Specifically, the data acquisition system also includes:

获取模块,用于获取所述目标用户的统一用户标识信息,所述统一用户标识信息与所述第一用户标识信息和至少一个第二用户标识信息对应;An acquisition module, configured to acquire unified user identification information of the target user, where the unified user identification information corresponds to the first user identification information and at least one second user identification information;

第二输出模块,用于将所述统一用户标识信息输出给所述数据获取方;A second output module, configured to output the unified user identification information to the data acquirer;

第二接收模块,用于接收所述数据获取方输入的携带所述统一用户标识信息的数据获取请求;The second receiving module is configured to receive a data acquisition request carrying the unified user identification information input by the data acquirer;

查找模块,用于根据所述统一用户标识信息,查找所述目标用户的行为特征数据。A search module, configured to search for the behavior characteristic data of the target user according to the unified user identification information.

这样,通过统一用户标识信息,不仅能够满足数据获取方的数据获取需求,还能够隐藏用户的真实的标识信息,避免从电信运营商侧泄露用户的真实的标识信息的风险。In this way, by unifying the user identification information, not only can the data acquisition requirements of the data acquirer be met, but also the real identification information of the user can be hidden, avoiding the risk of leaking the real identification information of the user from the telecom operator side.

其中,为了避免用户标识信息的泄露,所述第二输出模块包括:Wherein, in order to avoid leakage of user identification information, the second output module includes:

加密模块,用于对所述统一用户标识信息进行加密,得到一重编码用户标识信息;An encryption module, configured to encrypt the unified user identification information to obtain a re-encoded user identification information;

输出子模块,用于将所述重编码用户标识信息输出给所述数据获取方;An output submodule, configured to output the recoded user identification information to the data acquirer;

所述第二接收模块包括:The second receiving module includes:

接收子模块,用于接收所述数据获取方输入的携带所述重编码用户标识信息的数据获取请求;A receiving submodule, configured to receive a data acquisition request carrying the recoded user identification information input by the data acquirer;

解密模块,用于解密所述重编码用户标识信息,得到相应的统一用户标识信息。A decryption module, configured to decrypt the re-encoded user identification information to obtain corresponding unified user identification information.

所述加密模块具体用于利用数据获取方标识信息和有效期,对所述统一用户标识信息进行加密,得到一重编码用户标识信息。The encryption module is specifically used to encrypt the unified user identification information by using the data acquirer identification information and the validity period to obtain a re-encoded user identification information.

而所述解密模块包括:And the decryption module includes:

解密子模块,用于解密所述重编码用户标识信息,得到所述统一用户标识信息和有效期;The decryption submodule is used to decrypt the re-encoded user identification information to obtain the unified user identification information and validity period;

验证子模块,用于验证所述统一用户标识信息和有效期;A verification submodule, configured to verify the unified user identification information and validity period;

所述查找模块具体用于在验证结果为所述统一用户标识信息有效且所述有效期在有效生命周期内时,根据所述统一用户标识信息,查找所述目标用户的行为特征数据。The search module is specifically configured to search for the behavior characteristic data of the target user according to the unified user identification information when the verification result is that the unified user identification information is valid and the validity period is within the valid life cycle.

这样,数据获取方只有利用有效的重编码用户标识信息,才能获得所需数据,避免了数据获取方的二次销售获利及只进行一次购买,就可反复从电信运营商侧获取数据的弊端,保证电信运营商的一些生命周期很长的高价值数据可得到应有的价值回报。In this way, the data acquirer can obtain the required data only by using the effective re-encoded user identification information, which avoids the data acquirer’s profit from secondary sales and the disadvantages of repeatedly obtaining data from the telecom operator’s side after only one purchase , to ensure that some high-value data with a long life cycle of telecom operators can get the due value return.

具体的,所述的数据获取系统还包括:Specifically, the data acquisition system also includes:

计数模块,用于在验证结果为所述统一用户标识信息无效或所述有效期超出有效生命周期时,对计数器加1,所述计数器的初值为0;A counting module, configured to add 1 to the counter when the verification result is that the unified user identification information is invalid or the validity period exceeds the valid life cycle, and the initial value of the counter is 0;

加入模块,用于当所述计数器的值大于一预设阈值时,将所述数据获取方标识信息加入黑名单,所述数据获取方标识信息是解密所述重编码用户标识信息时得到的。An adding module, configured to add the data acquirer identification information to a blacklist when the value of the counter is greater than a preset threshold, and the data acquirer identification information is obtained when decrypting the re-encoded user identification information.

这样,能够避免某一数据获取方一直占用电信运营商的系统资源,而试图非法获取数据。In this way, it is possible to prevent a certain data acquirer from occupying the system resources of the telecom operator all the time and attempting to illegally acquire data.

以上所述仅是本发明的优选实施方式,应当指出,对于本技术领域的普通技术人员来说,在不脱离本发明原理的前提下,还可以做出若干改进和润饰,这些改进和润饰也应视为本发明的保护范围。The above is only a preferred embodiment of the present invention, and it should be pointed out that for those of ordinary skill in the art, some improvements and modifications can be made without departing from the principle of the present invention. It should be regarded as the protection scope of the present invention.

Claims (14)

1. a kind of data capture method, it is characterised in that include:
Receive the first user identification information corresponding to a targeted customer of data acquisition side input;
At least part of data output is selected to obtain to the data from the behavior characteristicss data of the targeted customer The side of taking;
Wherein, the behavior characteristicss data of the targeted customer include corresponding with the first user identification information Part I data and it is different from the first user identification information but corresponding to the targeted customer at least Part II data corresponding to one second user identification information.
2. data capture method according to claim 1, it is characterised in that the first user mark Knowledge information is terminal identification information, service card identification information, Web user identification information and Web client One or more of identification information.
3. data capture method according to claim 1, it is characterised in that described from the target Before at least part of data output is selected in the behavior characteristicss data of user to the step of the data acquisition side Also include:
Obtain the unification user identification information of the targeted customer, the unification user identification information and described One user totem information and at least one second user identification information correspondence;
The unification user identification information is exported to the data acquisition side;
Receive the data acquisition request of the carrying unification user identification information of data acquisition side's input;
According to the unification user identification information, the behavior characteristicss data of the targeted customer are searched.
4. data capture method according to claim 3, it is characterised in that described by the unification User totem information is exported to be included to the step of the data acquisition side:
The unification user identification information is encrypted, a recodification user totem information is obtained;
The recodification user totem information is exported to the data acquisition side;
The data acquisition of the carrying unification user identification information for receiving data acquisition side's input The step of request, includes:
The data acquisition for receiving the carrying recodification user totem information of data acquisition side's input please Ask;
The recodification user totem information is decrypted, corresponding unification user identification information is obtained.
5. data capture method according to claim 4, it is characterised in that described to the unification User totem information is encrypted, and includes the step of obtain a recodification user totem information:
Using data acquisition side's identification information and effect duration, the unification user identification information is encrypted, Obtain a recodification user totem information.
6. data capture method according to claim 5, it is characterised in that the decryption is described heavy Coding user totem information, includes the step of obtain corresponding unification user identification information:
The recodification user totem information is decrypted, the unification user identification information and effect duration is obtained;
Verify the unification user identification information and effect duration;
It is described to be wrapped according to the step of unification user identification information, the behavior characteristicss data of the lookup targeted customer Include:
It is that the unification user identification information is effective and effect duration is in effective life cycle in the result When interior, according to the unification user identification information, the behavior characteristicss data of the targeted customer are searched.
7. data capture method according to claim 6, it is characterised in that also include:
It is that the unification user identification information is invalid or effect duration exceeds effective Life Cycle in the result During the phase, plus 1 to enumerator, the initial value of the enumerator is 0;
When the value of the enumerator is more than a predetermined threshold value, data acquisition side's identification information is added black List, data acquisition side's identification information is obtained when decrypting the recodification user totem information.
8. a kind of data-acquisition system, it is characterised in that include:
First receiver module, for receiving using corresponding to the first of a targeted customer for data acquisition side input Family identification information;
First output module, for selecting at least part of data from the behavior characteristicss data of the targeted customer Export to the data acquisition side;
Wherein, the behavior characteristicss data of the targeted customer include corresponding with the first user identification information Part I data and it is different from the first user identification information but corresponding to the targeted customer at least Part II data corresponding to one second user identification information.
9. data-acquisition system according to claim 8, it is characterised in that the first user mark Knowledge information is terminal identification information, service card identification information, Web user identification information and Web client One or more of identification information.
10. data-acquisition system according to claim 8, it is characterised in that also include:
Acquisition module, for obtaining the unification user identification information of the targeted customer, the unification user mark Knowledge information is corresponding with the first user identification information and at least one second user identification information;
Second output module, for the unification user identification information to be exported to the data acquisition side;
Second receiver module, the unification user mark letter of the carrying for receiving data acquisition side's input The data acquisition request of breath;
Searching modul, for according to the unification user identification information, the behavior for searching the targeted customer to be special Levy data.
11. data-acquisition systems according to claim 10, it is characterised in that second output Module includes:
Encrypting module, for being encrypted to the unification user identification information, obtains recodification user mark Knowledge information;
Output sub-module, for the recodification user totem information to be exported to the data acquisition side;
Second receiver module includes:
Receiving submodule, the recodification ID letter of the carrying for receiving data acquisition side's input The data acquisition request of breath;
Deciphering module, for decrypting the recodification user totem information, obtains corresponding unification user mark Information.
12. data-acquisition systems according to claim 11, it is characterised in that the encrypting module Specifically for using data acquisition side's identification information and effect duration, carrying out adding to the unification user identification information It is close, obtain a recodification user totem information.
13. data-acquisition systems according to claim 12, it is characterised in that the deciphering module Including:
Decryption submodule, for decrypting the recodification user totem information, obtains the unification user mark Information and effect duration;
Checking submodule, for verifying the unification user identification information and effect duration;
The searching modul is specifically for being that the unification user identification information is effective and described in the result When effect duration is in effective life cycle, according to the unification user identification information, the targeted customer is searched Behavior characteristicss data.
14. data-acquisition systems according to claim 13, it is characterised in that also include:
Counting module, for being that the unification user identification information is invalid or effect duration surpasses in the result When going out effective life cycle, plus 1 to enumerator, the initial value of the enumerator is 0;
Module is added, for when the value of the enumerator is more than a predetermined threshold value, by the data acquisition side Identification information adds blacklist, and data acquisition side's identification information is the decryption recodification ID letter Obtain during breath.
CN201510706158.5A 2015-10-27 2015-10-27 Data acquisition method and system Pending CN106612201A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510706158.5A CN106612201A (en) 2015-10-27 2015-10-27 Data acquisition method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510706158.5A CN106612201A (en) 2015-10-27 2015-10-27 Data acquisition method and system

Publications (1)

Publication Number Publication Date
CN106612201A true CN106612201A (en) 2017-05-03

Family

ID=58614509

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510706158.5A Pending CN106612201A (en) 2015-10-27 2015-10-27 Data acquisition method and system

Country Status (1)

Country Link
CN (1) CN106612201A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108810057A (en) * 2017-05-05 2018-11-13 腾讯科技(深圳)有限公司 Acquisition method, device and the storage medium of user behavior data

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011029238A1 (en) * 2009-09-11 2011-03-17 华为技术有限公司 Advertisement delivery method, advertisement server and advertisement system
CN104113828A (en) * 2013-04-19 2014-10-22 陈亚斌 Accurate push apparatus and accurate push method
CN104978383A (en) * 2015-02-12 2015-10-14 腾讯科技(深圳)有限公司 Data interworking method and data interworking equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011029238A1 (en) * 2009-09-11 2011-03-17 华为技术有限公司 Advertisement delivery method, advertisement server and advertisement system
CN104113828A (en) * 2013-04-19 2014-10-22 陈亚斌 Accurate push apparatus and accurate push method
CN104978383A (en) * 2015-02-12 2015-10-14 腾讯科技(深圳)有限公司 Data interworking method and data interworking equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108810057A (en) * 2017-05-05 2018-11-13 腾讯科技(深圳)有限公司 Acquisition method, device and the storage medium of user behavior data

Similar Documents

Publication Publication Date Title
US10586054B2 (en) Privacy firewall
US10848310B2 (en) Method and device for identifying user identity
US11296895B2 (en) Systems and methods for preserving privacy and incentivizing third-party data sharing
US9491146B2 (en) Computational systems and methods for encrypting data for anonymous storage
US9838839B2 (en) Repackaging media content data with anonymous identifiers
US11354437B2 (en) System and methods for providing data analytics for secure cloud compute data
US9432190B2 (en) Computational systems and methods for double-encrypting data for subsequent anonymous storage
US9195848B2 (en) Computational systems and methods for anonymized storage of double-encrypted data
US9037861B2 (en) Enhancing data security using re-encryption
TWI725940B (en) Method, device and tripartite service system for protecting the safety of sensitive data
CN114528571A (en) Method, apparatus, electronic device and medium for resource access and data processing
CN105262779A (en) Identity authentication method, device and system
JP2016031760A (en) Private analytics with controlled information disclosure
CN107645486A (en) Login authentication method and device
CN110598377B (en) Software serial number management method and device based on blockchain
CN105723681A (en) Partner encoding of anonymous links to protect consumer privacy
US20130268773A1 (en) Computational systems and methods for preparing data for double-encryption and anonymous storage
US11983284B2 (en) Consent management methods
US20130060695A1 (en) Computational systems and methods for regulating information flow during interactions
CN106612201A (en) Data acquisition method and system
CN115941279B (en) Encryption and decryption method, system and equipment for user identification in data
CN112559825B (en) Service processing method, device, computing equipment and medium
CN111131227A (en) A data processing method and device
Lou Sensitive Data Risks Analysis in Emerging Online Platforms
HK1226563A1 (en) Method and device for identifying user identity

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170503

RJ01 Rejection of invention patent application after publication