[go: up one dir, main page]

CN114727227B - A user duplicate elimination method, system and computer readable recording medium - Google Patents

A user duplicate elimination method, system and computer readable recording medium Download PDF

Info

Publication number
CN114727227B
CN114727227B CN202110005394.XA CN202110005394A CN114727227B CN 114727227 B CN114727227 B CN 114727227B CN 202110005394 A CN202110005394 A CN 202110005394A CN 114727227 B CN114727227 B CN 114727227B
Authority
CN
China
Prior art keywords
track data
desensitization
level
calculation
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110005394.XA
Other languages
Chinese (zh)
Other versions
CN114727227A (en
Inventor
董文宇
阎军智
杨波
杨成军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
Research Institute of China Mobile Communication Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
Research Institute of China Mobile Communication Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, Research Institute of China Mobile Communication Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202110005394.XA priority Critical patent/CN114727227B/en
Publication of CN114727227A publication Critical patent/CN114727227A/en
Application granted granted Critical
Publication of CN114727227B publication Critical patent/CN114727227B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • H04W4/029Location-based management or tracking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The invention provides a user weight removing method and a system, and relates to the field of mobile communication. The method comprises the steps of sending out a statistics request to count the number of users, sending out a desensitization level confirmation request to send out confirmed desensitization levels according to the statistics request, sending out confirmed desensitization levels according to the desensitization level confirmation request, determining a desensitization level for calculation according to the confirmed desensitization levels, extracting track data from a blockchain according to the desensitization level for calculation, and performing weight-removing calculation to obtain the number of users. According to the invention, the mobile terminal users crossing operators can be precisely subjected to weight-eliminating statistics.

Description

User duplication eliminating method, system and computer readable recording medium
Technical Field
The present invention relates to the field of mobile communications, and in particular, to a user duplication elimination method, system, and computer readable recording medium.
Background
The statistics of the number of mobile terminal users plays an important role in production and life. For example, in the scenes of national population census, urban planning, merchant investigation, market investigation and the like, the statistics based on the mobile terminal users can comprehensively analyze the rules of population distribution, migration, job, travel and the like, and compared with the traditional modes of statistics of household registration, household/street blocking visit and the like, the method has the remarkable advantages of high efficiency, good real-time performance, good authenticity, support of global statistical analysis instead of sampling and the like.
Currently, among business services provided by various telecom operators, one-person multi-number business is very popular. Mobile terminals in developed cities such as beijing have a popularity of over 100%, and a situation that one natural person user uses a plurality of SIM cards at the same time has been widespread, for example, using a plurality of mobile terminals, or 2 SIM cards in one mobile terminal, or using a plurality of smart devices such as smart bracelets, smart watches, and the like. One-person multi-number services are not only occurring within one operator, but also very common across operators. For example, due to tariff differences, coverage differences, marketing campaigns, etc., a natural person user often uses SIM cards of multiple different operators simultaneously.
Statistics of the number of mobile terminal users often require user duplication elimination techniques, which in particular, for mobile terminal users across operators, will face greater challenges. For example, if the number of mobile terminal users is counted only on the network side, the mobile terminal users using one-person-multiple-number service will be counted as multiple users, resulting in a statistical deviation. Therefore, there is a need to identify and reject other mobile terminal numbers of the same natural person user by using a user duplication elimination technique. However, in a cross-operator scenario, information interaction between different operators faces problems of privacy protection, asset leakage and the like, and the difficulty of counting the number of mobile terminal users is greater.
In the prior art, there are the following two schemes for user weight removal based on relevant information of a mobile terminal user.
Scheme one, carrying out duplicate elimination based on user identity information
In the scheme, the mobile terminal number registered under the same user identity card is identified as the same user.
The technical defects of the scheme are as follows:
Not in line with reality. For example, a natural person user may use his own identity card to transact a SIM card with a family member. In addition, the scheme also has the risk of revealing the privacy of the user, and operators often cannot provide sensitive information such as the identification card number of the user for other operators serving as competitors.
And secondly, carrying out weight removal based on the displacement track of the user.
In this scheme, if the motion trajectories of two mobile terminal numbers are substantially the same, for example, multiple times, and reside under the same base station in the same time period, then the users of the two numbers are considered to be the same natural person.
The technical defects of the scheme are as follows:
Not applicable across operator scenarios. Fig. 1 is a schematic diagram of user displacement trajectories of different operators in the prior art, and according to the diagram shown in fig. 1, since the number, deployment location and coverage area of base stations of different operators cannot be identical, it is impossible to determine from the one-to-one correspondence of base stations through which the user displacement trajectories pass.
In addition, judgment from the longitude and latitude of the track is not feasible. From the network side, the user track is mainly embodied as a continuous process of stay under each base station and switching between different base stations, so that the user track recorded by the network side is a series of position points and an ordered set of stay time periods at the position points, and the coordinates of each position point are the longitude and latitude of the stayed base station. On the one hand, the base stations of different operators are arranged at different places, so that the longitude and latitude of the same natural person user and the stay points in the networks of different operators are different. On the other hand, the base station location is the core secret of the operator and is inconvenient for the competitor.
Disclosure of Invention
The invention provides a mobile terminal user weight-removing method, a system and a computer readable recording medium, which are used for solving the problem that the weight-removing calculation of a user of a cross-operator cannot be accurately performed at present.
In order to solve the technical problems, the invention is realized as follows:
According to a first aspect of the present invention, there is provided a user duplication elimination method, the method comprising:
Sending out a counting request for counting the number of users;
according to the statistical request, a desensitization level confirmation request is sent, and the confirmed desensitization level is requested to be sent;
Transmitting a confirmed desensitization level according to the desensitization level confirmation request;
and determining a desensitization level for calculation according to the confirmed desensitization level, and extracting track data from the blockchain according to the desensitization level for calculation to perform weight-removing calculation to obtain the number of users.
Optionally, before the step of sending the statistical request, acquiring original track data of the user from an operator big data platform, performing multistage desensitization processing on the original track data to obtain desensitized track data, and uploading the desensitized track data to a blockchain.
Optionally, performing hierarchical encryption processing on the track data subjected to the multi-level desensitization processing to obtain the track data subjected to the hierarchical encryption, and uploading the track data subjected to the hierarchical encryption to a blockchain.
Optionally, the track data after the multi-level desensitization processing at least includes track data after the first-level desensitization processing and track data after the second-level desensitization processing, the track data after the first-level desensitization processing is encrypted by adopting the first encryption key, and the track data after the second-level desensitization processing is encrypted by adopting the second encryption key.
Optionally, a decryption key corresponding to the track data after hierarchical encryption is stored and provided, wherein the decryption key includes a first decryption key corresponding to the first encryption key and a second decryption key corresponding to the second encryption key.
Optionally, a request is sent to the link point on the operator, a decryption key corresponding to the desensitization level for calculation is requested, the decryption keys corresponding to the desensitization level for calculation are respectively sent to the duplicate removal statistics node, track data after hierarchical encryption is obtained from the blockchain according to the statistics request, and the track data after hierarchical encryption is decrypted by using the decryption keys corresponding to the desensitization level for calculation, so that decrypted track data is obtained.
Optionally, the blockchain stores track data provided by an operator, and extracts track data corresponding to the statistical request according to the statistical request.
Optionally, the statistical request includes an operator name, a predetermined time range, and a predetermined geographic range.
Optionally, the duplication elimination calculation is performed by using a duplication elimination algorithm based on the same track data, where if the motion tracks of two mobile terminal numbers belonging to different operators are substantially the same, the users of the two mobile terminal numbers are considered to be the same natural person.
According to a second aspect of the present invention, there is provided a user duplication elimination system comprising a statistics department node, a duplication elimination calculation node, an operator uplink node and a blockchain, wherein,
The statistics department node is used for sending a statistics request to the weight-removing calculation node to request the statistics of the number of users;
the weight-removing calculation node is used for sending a desensitization level confirmation request to the upper link point of the operator according to the statistical request, and requesting the upper link point of the operator to send the confirmed desensitization level;
the upper link point of the operator is used for sending the confirmed desensitization level to the weight-removing calculation node according to the desensitization level confirmation request;
And the weight-removing calculation node is used for determining a desensitization grade for calculation according to the confirmed desensitization grade, extracting track data from the blockchain according to the desensitization grade for calculation to perform weight-removing calculation, obtaining the number of mobile users, and transmitting the number of mobile users to the statistics department node.
Optionally, the carrier upper link point comprises a desensitization module and a transmission module, wherein,
The desensitization module is used for acquiring original track data of a user from the operator big data platform, and carrying out multistage desensitization processing on the original track data to obtain desensitized track data;
and the transmission module is used for uploading the desensitized track data to the blockchain.
Optionally, the carrier's upper link point includes a cryptographic module, wherein,
The encryption module is used for carrying out hierarchical encryption processing on the track data subjected to the multi-level desensitization processing to obtain the track data subjected to the hierarchical encryption;
and the transmission module is used for uploading the track data after hierarchical encryption to the blockchain.
Optionally, the track data after the multi-level desensitization processing at least includes track data after the first-level desensitization processing and track data after the second-level desensitization processing, the encryption module adopts the first encryption key to encrypt the track data after the first-level desensitization processing, and the encryption module adopts the second encryption key to encrypt the track data after the second-level desensitization processing.
Optionally, the carrier's upper link point includes a key management module, wherein,
And the key management module is used for storing and providing decryption keys corresponding to the track data after hierarchical encryption, wherein the decryption keys comprise a first decryption key corresponding to the first encryption key and a second decryption key corresponding to the second encryption key.
Optionally, the weight-saving computing node comprises an interaction module, an acquisition module, a decryption module and a computing module, wherein,
The interaction module is used for sending a request to the upper chain link point of the operator, requesting a decryption key corresponding to the desensitization level for calculation, and acquiring the decryption key corresponding to the desensitization level for calculation from the upper chain link point of the operator;
the acquisition module acquires track data after hierarchical encryption from the blockchain;
The decryption module decrypts the track data after the hierarchical encryption by using a decryption key corresponding to the desensitization level for calculation to obtain decrypted track data;
And the calculation module is used for performing weight removal calculation on the decrypted track data to obtain the number of mobile users.
Optionally, the blockchain includes a storage module and an extraction module, wherein,
The storage module is used for storing track data provided by an operator;
and the extraction module is used for extracting track data corresponding to the statistical request according to the statistical request.
Optionally, the statistical request includes an operator name, a predetermined time range, and a predetermined geographic range.
Optionally, the duplication elimination calculation node performs duplication elimination calculation by adopting a duplication elimination algorithm based on the same track data, where if the motion tracks of two mobile terminal numbers belonging to different operators are substantially the same, the users of the two mobile terminal numbers are considered to be the same natural person.
According to a third aspect of the present invention, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the user duplication elimination method of the first aspect described above.
In the embodiment of the invention, the mobile terminal users crossing operators can be precisely subjected to weight-removing statistics, the core assets of the operators and the user privacy are protected, the tamper-resistant characteristics of the blockchain are utilized, the important data such as user track data, desensitization levels of the statistics departments and the like are protected, and the user statistics of different desensitization levels can be realized aiming at different types of statistics departments such as government supervision departments, commercial advertisement institutions and the like.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to designate like parts throughout the figures. In the drawings:
FIG. 1 is a schematic diagram of user displacement trajectories of different operators in the prior art;
FIG. 2 is a block diagram of a mobile terminal user duplication elimination system in accordance with an embodiment of the present invention;
Fig. 3 is a block diagram of an operator uplink node according to an embodiment of the present invention;
FIG. 4 is a block diagram of a block chain architecture according to an embodiment of the present invention;
FIG. 5 is a block diagram of a weight-shifting computing node according to an embodiment of the present invention;
FIG. 6 is a flow chart of a user duplication elimination method according to an embodiment of the invention;
fig. 7 is a flowchart of a mobile terminal user duplication elimination method according to an embodiment of the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
Fig. 2 is a block diagram of a mobile terminal user duplication elimination system according to an embodiment of the present invention, and as shown in fig. 2, the mobile terminal user duplication elimination system includes an operator a upper link point 101A, an operator B upper link point 101B, an operator C upper link point 101C, an operator a big data platform 102A, an operator B big data platform 102B, an operator C big data platform 102C, a blockchain 103, a duplication elimination calculation node 104, a statistics department a node 105A, and a statistics department B node 105B, which are connected to each other through a network.
In the present embodiment, the upper link point 101A of the operator a, the upper link point 101B of the operator B, and the upper link point 101C of the operator C correspond to the operator a, the operator B, and the operator C, respectively, but the present invention is not limited thereto, and the present invention is equally applicable to many different operators.
In the present embodiment, the statistical department a node and the statistical department B node are exemplarily shown, but the present invention is not limited thereto, and the present invention is equally applicable to more different statistical departments.
For convenience of description, the carrier a upper link point 101A, the carrier B upper link point 101B, and the carrier C upper link point 101C are collectively referred to herein as carrier upper link points, the carrier a big data platform 102A, the carrier B big data platform 102B, and the carrier C big data platform 102C are collectively referred to herein as carrier big data platform 102, and the statistics department a node 105A and statistics department B node 105B are collectively referred to herein as statistics department node 105.
The statistics department node 105 issues a statistics request to the duplication elimination calculation node 104 requesting statistics of the number of mobile users.
The duplication elimination calculation node 104 issues a desensitization level confirmation request to the on-operator link point 101 according to the statistical request to request the on-operator link point 101 to send a confirmed desensitization level.
The operator upper link point 101 receives the desensitization level confirmation request and sends the confirmed desensitization level to the duplication elimination calculation node 104 according to the request.
The weight-shed computing node 104 receives the confirmed desensitization level from the operator upper link point 101 and determines the computed desensitization level.
The duplicate computing node 104 issues a request to the carrier upper link point 101 for a decryption key corresponding to the level of desensitization for computing.
The carrier uplink node 101 sends a decryption key corresponding to the computed desensitization level to the duplication elimination statistics node 104.
The duplicate computing node extracts the corresponding track data from the blockchain 103 according to the statistical request, and decrypts the track data by using the decryption key corresponding to the desensitization level for computing to obtain decrypted track data.
The weight-removing calculation node 104 performs user weight-removing calculation according to the decrypted track data to obtain a statistical result, and feeds back the statistical result to the statistical department node.
Fig. 3 is a block diagram of an operator uplink node according to an embodiment of the present invention, wherein the operator uplink node 101 includes a desensitization module 1011, an encryption module 1012, a transmission module 1013, a validation module 1014, and a key management module 1015.
The desensitization module 1011 is configured to obtain original track data of a mobile user from an operator big data platform, and perform desensitization processing on the original track data to obtain desensitized track data. The desensitization module 301 may perform multistage desensitization processing on the original track data according to actual situations, to obtain track data after multistage desensitization. The multi-level desensitization treatment may include a first level desensitization treatment, a second level desensitization treatment, a third, an nth level desensitization treatment, and the like different levels of desensitization treatments.
The encryption module 1012 encrypts the track data after the desensitization processing to obtain encrypted track data. The track data subjected to the multistage desensitization treatment can be obtained in a hierarchical encryption mode. For example, the track data after the first-level desensitization processing is encrypted by using a first encryption key, the track data after the second-level desensitization processing is encrypted by using a second encryption key, and the track data after the nth-level desensitization processing is encrypted by using an nth encryption key.
A transmission module 1013 that uploads the encrypted track data to the blockchain;
A validation module 1014 validates the desensitization level of the statistics department. Wherein, according to the type of the statistics department, confirm the desensitization grade corresponding to this type.
The key management module 1015 stores and provides a decryption key corresponding to the encrypted track data. For track data after hierarchical encryption, each encryption key has a corresponding decryption key, for example, a first decryption key corresponding to the first encryption key, a second decryption key corresponding to the second encryption key, and an nth decryption key corresponding to the nth encryption key.
Fig. 4 is a block diagram of a block chain 103, according to an embodiment of the present invention, wherein the block chain 103 includes a memory module 1031, a fetch module 1032, and an allocation module 1033.
A storage module 1031 that stores encrypted trajectory data provided by each operator;
The extraction module 1032 extracts track data corresponding to the statistical request according to the statistical request, for example, extracts track data corresponding to the operator within a predetermined time range and a predetermined region range according to the operator name and the predetermined time range included in the statistical request.
An assignment module 1033 assigns a desensitization level to the statistics department. Wherein, according to the type of the statistics department, the desensitization grade corresponding to the type is allocated.
Fig. 5 is a block diagram of a weight-saving computing node according to an embodiment of the present invention, where the weight-saving computing node 104 includes an interaction module 1041, an obtaining module 1042, a decryption module 1043, and a computing module 1044.
The interaction module 1041 interacts with the operator uplink node to obtain the desensitization level of the statistics department;
the acquisition module 1042 acquires encrypted track data from the blockchain;
the decryption module 1043 obtains a decryption key corresponding to the encrypted track data from the link point on the operator, and decrypts the encrypted track data to obtain decrypted track data;
The calculation module 1044 performs weight-removing calculation on the mobile terminal user according to the decrypted track data, identifies a plurality of mobile terminal numbers belonging to the same natural person user and different operators, and counts the mobile terminal numbers as the same natural person user.
Referring to fig. 6, an embodiment of the present application provides a user duplication eliminating method, which includes:
step 601, sending out a statistics request for counting the number of users;
step 602, according to the statistical request, sending out a desensitization level confirmation request, requesting to send out a confirmed desensitization level;
Step 603, according to the desensitization level confirmation request, sending the confirmed desensitization level;
Step 604, determining a desensitization level for calculation according to the confirmed desensitization level, and extracting track data from the blockchain according to the desensitization level for calculation for weight removal calculation to obtain the number of users.
In an embodiment of the present application, before the step 601, the method further includes:
and acquiring original track data of the user from an operator big data platform, performing multistage desensitization processing on the original track data to obtain desensitized track data, and uploading the desensitized track data to a blockchain.
In an embodiment of the present application, the method further includes:
And carrying out hierarchical encryption processing on the track data subjected to the multilevel desensitization processing to obtain the track data subjected to the hierarchical encryption, and uploading the track data subjected to the hierarchical encryption to a blockchain.
In the embodiment of the application, the track data after the multi-level desensitization processing at least comprises the track data after the first-level desensitization processing and the track data after the second-level desensitization processing, wherein the track data after the first-level desensitization processing is encrypted by adopting a first encryption key, and the track data after the second-level desensitization processing is encrypted by adopting a second encryption key.
In an embodiment of the present application, the method further includes:
And storing and providing a decryption key corresponding to the track data after hierarchical encryption, wherein the decryption key comprises a first decryption key corresponding to the first encryption key and a second decryption key corresponding to the second encryption key.
In an embodiment of the present application, the method further includes:
Sending a request to the link point on the operator, requesting a decryption key corresponding to the desensitization level for calculation, and respectively sending the decryption key corresponding to the desensitization level for calculation to the duplicate removal statistics node;
And obtaining the track data after hierarchical encryption from the blockchain according to the statistical request, and decrypting the track data after hierarchical encryption by using a decryption key corresponding to the desensitization level for calculation to obtain decrypted track data.
In the embodiment of the application, the blockchain stores the track data provided by the operator, and extracts the track data corresponding to the statistical request according to the statistical request.
In the embodiment of the application, the statistics request comprises an operator name, a preset time range and a preset regional range.
In an embodiment of the present application, the method further includes:
And performing weight-removing calculation by adopting a weight-removing algorithm based on the same track data, wherein if the motion tracks of two mobile terminal numbers belonging to different operators are basically the same, the users of the two mobile terminal numbers are considered to be the same natural person.
In the embodiment of the invention, the mobile terminal users crossing operators can be precisely subjected to weight-removing statistics, the core assets of the operators and the user privacy are protected, the tamper-resistant characteristics of the blockchain are utilized, the important data such as user track data, desensitization levels of the statistics departments and the like are protected, and the user statistics of different desensitization levels can be realized aiming at different types of statistics departments such as government supervision departments, commercial advertisement institutions and the like.
FIG. 7 is a flow chart of a mobile terminal user duplication elimination method according to an embodiment of the present invention, in which
And step 1, the statistical department node sends a statistical request to the weight-removing calculation node to request the statistics of the number of mobile users. The statistics request comprises conditions such as a statistics department ID, a desensitization level, a preset time range, a preset region range and the like, and the number of mobile users in the preset time range and the preset region range is counted according to a plurality of conditions included in the statistics request.
And 2, the weight-removing calculation node sends a desensitization level confirmation request to the link point on the operator according to the statistical request so as to request the link point on the operator to send the confirmed desensitization level.
And step 3, the link point on the operator receives the desensitization level confirmation request and sends the confirmed desensitization level to the weight-removing calculation node according to the request. Wherein,
If the type of the statistics department belongs to the national administration department, a lower desensitization level may be allowed, and even the desensitization level may be set to 0, i.e. the original trajectory data, without desensitization treatment.
If the type of the statistics department belongs to a business, enterprise or individual, a higher desensitization level needs to be adopted, and each operator sends a confirmed desensitization level according to the actual situation.
For the case of multiple operators, the method will perform the same steps as step 2 and step 3 for each operator, respectively, e.g. in fig. 6, step 2 and step 3 for operator a and step 2 'and step 3' for operator B. Although not shown in fig. 6, for the case where other operators exist, the corresponding steps may be performed for other operators as well.
And 4, the weight-removing calculation node receives the confirmed desensitization level from the link point on the operator and determines the desensitization level for calculation.
In the present invention, step 4 is not limited to an algorithm, and, for example, the highest level (the most stringent level) of desensitization is selected as the level of desensitization for calculation based on the level of desensitization confirmed by each of the operators a and B. Of course, the corresponding desensitization level may be selected as the desensitization level for calculation according to the actual requirement.
And 5, the duplicate removal computing node sends a request to the link point on the operator, and the request is a decryption key corresponding to the desensitization level for computing.
And 6, the operator uplink node transmits a decryption key corresponding to the desensitization level for calculation to the duplication elimination statistics node.
For the case of multiple operators, the method will perform the same steps as step 5 and step 6 for each operator, respectively, e.g. in fig. 6, step 5 and step 6 are performed for operator a and step 5 'and step 6' are performed for operator B. Although not shown in fig. 6, for the case where other operators exist, the corresponding steps may be performed for other operators as well.
And 7, the duplicate removal computing node extracts corresponding track data from the blockchain according to the statistical request, and decrypts the track data by using a decryption key corresponding to the desensitization level for computing to obtain decrypted track data. Wherein the respective trajectory data includes trajectory data of each operator corresponding to the condition of the statistical request, for example, trajectory data within a predetermined time range (from 1 st 2020 to 12 th 2020), a predetermined area range (china).
For the case of multiple operators, the method will perform the same steps as step 7 separately for each operator, e.g. in fig. 6 step 7 is performed for operator a and step 7' is performed for operator B. Although not shown in fig. 6, for the case where other operators exist, the corresponding steps may be performed for other operators as well.
And 8, performing user weight-removing calculation by the weight-removing calculation node according to the decrypted track data to obtain a statistical result.
In step 8, the algorithm used in the user weight-removing calculation may be a weight-removing algorithm based on the same track data, specifically, if the motion tracks of two mobile terminal numbers belonging to different operators are substantially the same, for example, the two mobile terminal numbers reside in the same location for the same period of time multiple times, and the number of times exceeds a predetermined threshold, the users of the two mobile terminal numbers are considered to be the same natural person.
When judging whether two mobile terminal numbers belonging to different operators reside in the same position, because the base station positions of the different operators cannot be completely overlapped, according to the embodiment of the invention, in the case that the longitude and latitude of the positions of the two mobile terminal numbers are not completely equal, the judgment is performed by the following predetermined algorithm.
The predetermined algorithm may include the following, although other related algorithms may be used with the present invention.
Algorithm 1. The distance between the residence of two mobile terminal numbers is smaller than a predetermined threshold, which may be set according to the layout of the operator base stations, for example, for a base station layout in a dense urban area, the predetermined threshold may be set to 300 meters.
Algorithm 2. The distance between the residence positions of the two mobile terminal numbers is smaller than the predetermined multiple of the geographic coordinate scale corresponding to the desensitization level.
For example, when the predetermined multiple is 2, the side length of the square of the geographical coordinate scale when the desensitization level is 0 is set to 1, the side length of the square of the geographical coordinate scale when the desensitization level is 1 is 2, and so on, and the side length of the square of the geographical coordinate scale when the desensitization level is 2 is 4. Of course, the predetermined multiple may be set according to the layout situation of the operator base station.
And 3, under a preset desensitization level, overlapping the resident positions of the two mobile terminal numbers into the square of the same geographic coordinate scale.
In step 8, considering that a natural user has multiple mobile terminal numbers of multiple operators at the same time, any mobile terminal number X may be taken from the operator a, the track data of the mobile terminal number X is taken as a reference standard, the multiple mobile terminal numbers Y, Z,..and N in the operator B are analyzed, if the track of the mobile terminal number X is the same as the track of the multiple mobile terminal numbers Y, Z,..and N in the operator B, it is confirmed that the mobile terminal number X is the same as the multiple mobile terminal numbers Y, Z,..and N in the operator B, and the mobile terminal numbers are counted as the same natural person user during the duplication elimination.
And 9, feeding back a statistical result to the statistical department node by the weight-removing calculation node. Wherein the statistics have been re-arranged across users of the operators.
The embodiment of the invention also provides a computer readable storage medium, on which a computer program is stored, which when executed by a processor, implements each process of the above embodiment of the user duplication elimination method, and can achieve the same technical effects, so that repetition is avoided, and no further description is given here. Wherein the computer readable storage medium is selected from Read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), magnetic disk or optical disk.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) comprising instructions for causing a terminal (which may be a mobile phone, a computer, a server, an air conditioner, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The embodiments of the present invention have been described above with reference to the accompanying drawings, but the present invention is not limited to the above-described embodiments, which are merely illustrative and not restrictive, and many forms may be made by those having ordinary skill in the art without departing from the spirit of the present invention and the scope of the claims, which are to be protected by the present invention.

Claims (17)

1. A method for user weight removal, the method comprising:
Sending out a counting request for counting the number of users;
according to the statistical request, a desensitization level confirmation request is sent, and the confirmed desensitization level is requested to be sent;
Transmitting a confirmed desensitization level according to the desensitization level confirmation request;
determining a desensitization level for calculation according to the confirmed desensitization level, extracting track data from the blockchain according to the desensitization level for calculation, and performing weight removal calculation to obtain the number of users;
extracting track data from the blockchain according to the desensitization level for calculation to perform weight removal calculation to obtain the number of users, wherein the weight removal calculation comprises the following steps:
Requesting a decryption key corresponding to the desensitization level for calculation from the link point on the operator;
Acquiring track data after hierarchical encryption from a block chain;
decrypting the track data after the hierarchical encryption by using a decryption key corresponding to the desensitization level for calculation to obtain decrypted track data;
and performing weight-removing calculation on the decrypted track data to obtain the number of users.
2. The method of claim 1, wherein prior to the step of issuing a statistical request, the method further comprises:
and acquiring original track data of the user from an operator big data platform, performing multistage desensitization processing on the original track data to obtain desensitized track data, and uploading the desensitized track data to a blockchain.
3. The method according to claim 2, wherein the method further comprises:
And carrying out hierarchical encryption processing on the track data subjected to the multilevel desensitization processing to obtain the track data subjected to the hierarchical encryption, and uploading the track data subjected to the hierarchical encryption to a blockchain.
4. The method of claim 3, wherein the step of,
The track data after the multi-level desensitization processing at least comprises track data after the first-level desensitization processing and track data after the second-level desensitization processing, wherein the track data after the first-level desensitization processing is encrypted by adopting a first encryption key, and the track data after the second-level desensitization processing is encrypted by adopting a second encryption key.
5. The method according to claim 3 or 4, characterized in that the method further comprises:
And storing and providing a decryption key corresponding to the track data after hierarchical encryption, wherein the decryption key comprises a first decryption key corresponding to the first encryption key and a second decryption key corresponding to the second encryption key.
6. The method of claim 1, wherein the step of determining the position of the substrate comprises,
The blockchain stores track data provided by an operator, and extracts track data corresponding to the statistical request according to the statistical request.
7. The method according to claim 1 or 6, wherein,
The statistical request includes an operator name, a predetermined time range, and a predetermined geographic range.
8. The method according to claim 1, wherein the method further comprises:
And performing weight-removing calculation by adopting a weight-removing algorithm based on the same track data, wherein if the motion tracks of two mobile terminal numbers belonging to different operators are basically the same, the users of the two mobile terminal numbers are considered to be the same natural person.
9. A user weight-removal system is characterized in that the system comprises a statistical department node, a weight-removal calculation node, an operator uplink node and a blockchain, wherein,
The statistics department node is used for sending a statistics request to the weight-removing calculation node to request the statistics of the number of users;
the weight-removing calculation node is used for sending a desensitization level confirmation request to the upper link point of the operator according to the statistical request, and requesting the upper link point of the operator to send the confirmed desensitization level;
the upper link point of the operator is used for sending the confirmed desensitization level to the weight-removing calculation node according to the desensitization level confirmation request;
The weight-removing calculation node is used for determining a desensitization grade for calculation according to the confirmed desensitization grade, extracting track data from the blockchain according to the desensitization grade for calculation to perform weight-removing calculation, obtaining the number of users, and transmitting the number of mobile users to the statistics department node;
wherein the weight-eliminating computing node comprises an interaction module, an acquisition module, a decryption module and a computing module, wherein,
The interaction module is used for sending a request to the upper chain link point of the operator, requesting a decryption key corresponding to the desensitization level for calculation, and acquiring the decryption key corresponding to the desensitization level for calculation from the upper chain link point of the operator;
the acquisition module acquires track data after hierarchical encryption from the blockchain;
The decryption module decrypts the track data after the hierarchical encryption by using a decryption key corresponding to the desensitization level for calculation to obtain decrypted track data;
and the calculation module is used for performing weight removal calculation on the decrypted track data to obtain the number of users.
10. The system of claim 9, wherein the system further comprises a controller configured to control the controller,
The link points on the carrier comprise desensitization modules and transmission modules, wherein,
The desensitization module is used for acquiring original track data of a user from the operator big data platform, and carrying out multistage desensitization processing on the original track data to obtain desensitized track data;
and the transmission module is used for uploading the desensitized track data to the blockchain.
11. The system of claim 10, wherein the system further comprises a controller configured to control the controller,
The carrier's upper link point includes a cryptographic module, wherein,
The encryption module is used for carrying out hierarchical encryption processing on the track data subjected to the multi-level desensitization processing to obtain the track data subjected to the hierarchical encryption;
and the transmission module is used for uploading the track data after hierarchical encryption to the blockchain.
12. The system of claim 11, wherein the system further comprises a controller configured to control the controller,
The track data after the multi-level desensitization processing at least comprises track data after the first-level desensitization processing and track data after the second-level desensitization processing, the encryption module adopts a first encryption key to encrypt the track data after the first-level desensitization processing, and the encryption module adopts a second encryption key to encrypt the track data after the second-level desensitization processing.
13. The system according to claim 11 or 12, wherein,
The carrier's upper link point includes a key management module, wherein,
And the key management module is used for storing and providing decryption keys corresponding to the track data after hierarchical encryption, wherein the decryption keys comprise a first decryption key corresponding to the first encryption key and a second decryption key corresponding to the second encryption key.
14. The system of claim 10, wherein the system further comprises a controller configured to control the controller,
The blockchain includes a storage module and a retrieval module, wherein,
The storage module is used for storing track data provided by an operator;
and the extraction module is used for extracting track data corresponding to the statistical request according to the statistical request.
15. The system of claim 9 or 14, wherein the system comprises a plurality of sensors,
The statistical request includes an operator name, a predetermined time range, and a predetermined geographic range.
16. The system of claim 9, wherein the system further comprises a controller configured to control the controller,
And the weight-removing calculation node performs weight-removing calculation by adopting a weight-removing calculation method based on the same track data, wherein if the motion tracks of two mobile terminal numbers belonging to different operators are basically the same, the users of the two mobile terminal numbers are considered to be the same natural person.
17. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the steps of the user duplication elimination method according to any one of claims 1 to 8.
CN202110005394.XA 2021-01-05 2021-01-05 A user duplicate elimination method, system and computer readable recording medium Active CN114727227B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110005394.XA CN114727227B (en) 2021-01-05 2021-01-05 A user duplicate elimination method, system and computer readable recording medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110005394.XA CN114727227B (en) 2021-01-05 2021-01-05 A user duplicate elimination method, system and computer readable recording medium

Publications (2)

Publication Number Publication Date
CN114727227A CN114727227A (en) 2022-07-08
CN114727227B true CN114727227B (en) 2025-03-14

Family

ID=82233756

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110005394.XA Active CN114727227B (en) 2021-01-05 2021-01-05 A user duplicate elimination method, system and computer readable recording medium

Country Status (1)

Country Link
CN (1) CN114727227B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109740363A (en) * 2019-01-04 2019-05-10 贵州大学 Document classification desensitization encryption method
CN110782252A (en) * 2019-10-24 2020-02-11 福建福链科技有限公司 A blockchain-based monitoring video data transaction method and system
CN111669710A (en) * 2020-04-21 2020-09-15 上海因势智能科技有限公司 Demographic deduplication method

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8504034B2 (en) * 2010-11-09 2013-08-06 Ntt Docomo, Inc. System and method for population tracking, counting, and movement estimation using mobile operational data and/or geographic information in mobile network
CN107665289B (en) * 2017-11-17 2020-12-08 广州汇智通信技术有限公司 Operator data processing method and system
CN109040057B (en) * 2018-07-26 2020-12-01 百色学院 A blockchain-based multi-key hierarchical protection privacy system and method
US20200334630A1 (en) * 2019-04-18 2020-10-22 Darwinly Designing, LLC Systems and methods for facilitating storing, delivering, and tracking of luggage
CN111967024A (en) * 2020-07-10 2020-11-20 苏州浪潮智能科技有限公司 File sensitive data protection method and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109740363A (en) * 2019-01-04 2019-05-10 贵州大学 Document classification desensitization encryption method
CN110782252A (en) * 2019-10-24 2020-02-11 福建福链科技有限公司 A blockchain-based monitoring video data transaction method and system
CN111669710A (en) * 2020-04-21 2020-09-15 上海因势智能科技有限公司 Demographic deduplication method

Also Published As

Publication number Publication date
CN114727227A (en) 2022-07-08

Similar Documents

Publication Publication Date Title
Pan et al. Divert: A distributed vehicular traffic re-routing system for congestion avoidance
CN104581630B (en) A kind of self-service anti-method of registering of practising fraud based on location-based service and planar bar code technology
US10395519B2 (en) Method and system for computing an O-D matrix obtained through radio mobile network data
US9037861B2 (en) Enhancing data security using re-encryption
US20130210455A1 (en) Aggregating demographic distribution information
US20170041762A1 (en) Method and system for identifying significant locations through data obtainable from a telecommunication network
CN107624249A (en) Method and system for real-time counting of people in a crowd over aggregated data of a telecommunications network
Wu et al. A novel dummy-based mechanism to protect privacy on trajectories
Caceres et al. Inferring origin–destination trip matrices from aggregate volumes on groups of links: a case study using volumes inferred from mobile phone data
CN109583227A (en) A kind of method for protecting privacy, apparatus and system
US12041515B2 (en) Systems and methods for utilizing models to identify location spoofing by user equipment
Fang et al. PrivateBus: Privacy identification and protection in large-scale bus WiFi systems
Galdames et al. Batching location cloaking techniques for location privacy and safety protection
CN114727227B (en) A user duplicate elimination method, system and computer readable recording medium
Jacques Mobile phone metadata for development
CN116156487B (en) Method, device and medium for identifying base stations in abnormal number portability areas
Zhang et al. Ensemble learning against adversarial ai-driven fake task submission in mobile crowdsensing
Miura et al. A hybrid method of user privacy protection for location based services
CN109474635A (en) A kind of electrical equipment distribution method and system based on barcode scanning technology
JP2021005167A (en) Program, device and method for estimating the number of users staying in each area for each time zone
Saxena et al. Preserving location privacy for continuous queries on known route
US20210243596A1 (en) Shared Anonymized Databases of Telecommunications-Derived Behavioral Data
Zhang et al. Privacy-preserving Online Ride-hailing Service System Based on Taking the Intersection of Private sets of Points of Interest
CN117935546B (en) Travel rule recognition method and terminal thereof
Hikita et al. Preliminary study about advantageous trajectory anonymization methods based on population

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant