[go: up one dir, main page]

CN116388982B - Device anonymization data association processing method, device, and terminal - Google Patents

Device anonymization data association processing method, device, and terminal

Info

Publication number
CN116388982B
CN116388982B CN202310365469.4A CN202310365469A CN116388982B CN 116388982 B CN116388982 B CN 116388982B CN 202310365469 A CN202310365469 A CN 202310365469A CN 116388982 B CN116388982 B CN 116388982B
Authority
CN
China
Prior art keywords
equipment
cudid
data association
unique identifier
anonymous
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310365469.4A
Other languages
Chinese (zh)
Other versions
CN116388982A (en
Inventor
刘鹏
马万铮
谢纯定
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Coocaa Network Technology Co Ltd
Original Assignee
Shenzhen Coocaa Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Coocaa Network Technology Co Ltd filed Critical Shenzhen Coocaa Network Technology Co Ltd
Priority to CN202310365469.4A priority Critical patent/CN116388982B/en
Publication of CN116388982A publication Critical patent/CN116388982A/en
Application granted granted Critical
Publication of CN116388982B publication Critical patent/CN116388982B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/30Managing network names, e.g. use of aliases or nicknames
    • H04L61/3015Name registration, generation or assignment
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本发明公开了设备匿名化数据关联处理方法、装置、终端,方法包括通过制造商的统一身份认证平台对需进行数据关联的指定设备、进行设备合法性校验;当校验通过生成与所述指定设备对应的用于关联所有信息的设备唯一标识符CUDID;将检验通过的携带设备唯一标识符CUDID的所述指定设备申请生成匿名Id,并将生成匿名Id的所述指定设备携带设备唯一标识符CUDID保存在本地并且上报到服务端;控制携带设备唯一标识符CUDID的所述指定设备通过所述匿名Id,进行设备匿名化数据关联。本发明可以实现设备匿名化数据关联,提高了数据安全性,保护了个人隐私。

The present invention discloses a device anonymized data association processing method, apparatus, and terminal. The method includes performing a device legitimacy verification on a designated device requiring data association through a manufacturer's unified identity authentication platform; generating a device unique identifier (CUDID) corresponding to the designated device for associating all information when the verification passes; applying for an anonymous ID to be generated for the designated device carrying the device unique identifier (CUDID) that has passed the verification, and storing the designated device carrying the device unique identifier (CUDID) locally and reporting it to a server; and controlling the designated device carrying the device unique identifier (CUDID) to perform device anonymized data association using the anonymous ID. The present invention can achieve device anonymized data association, improve data security, and protect personal privacy.

Description

Equipment anonymization data association processing method, device and terminal
Technical Field
The present invention relates to the field of data association technologies, and in particular, to a device anonymized data association processing method, device, intelligent terminal, and storage medium.
Background
The data association relationship is a structured relationship, and refers to a certain relationship existing between two objects, and the data association is also called measurement association and data correlation, namely a process of judging whether two groups of data from different local nodes represent the same target. The data association enables the data to be interconnected for better use.
At present, equipment and application anonymity Id are generated by equipment, and the common practice is to collect equipment information and data simultaneously so as to recommend corresponding data to a corresponding user terminal, so that the data is directly associated with the user equipment, and the security problem is easily caused due to the fact that some user privacy is involved, and the security of a data association method in the prior art is required to be improved under the protection of personal privacy.
Accordingly, there is a need for improvement and development in the art.
Disclosure of Invention
Aiming at the defects in the prior art, the invention provides the device anonymization data association processing method, the device, the intelligent terminal and the storage medium.
The technical scheme adopted by the invention for solving the problems is as follows:
A device anonymized data association processing method, wherein the method comprises:
carrying out equipment validity verification on appointed equipment needing data association through a unified identity authentication platform of a manufacturer;
Generating a device unique identifier CUDID for associating all information corresponding to the specified device when verification passes;
applying for generating an anonymous Id by the specified device which passes the verification and carries the unique identifier CUDID, and storing the unique identifier CUDID of the specified device which generates the anonymous Id locally and reporting the unique identifier to a server;
And controlling the designated equipment carrying the equipment unique identifier CUDID to carry out equipment anonymization data association through the anonymized Id.
The method for processing the anonymized data association of the equipment, wherein the step of carrying out equipment inspection on the appointed equipment needing to carry out data association through the unified identity authentication platform of the manufacturer further comprises the following steps:
When an operation instruction for resetting the anonymous Id is obtained, the designated equipment carrying the unique equipment identifier CUDID is controlled to reapply to generate a new anonymous Id, and the designated equipment carrying the unique equipment identifier CUDID for generating the new anonymous Id is stored locally and reported to a server.
The method for processing the anonymized data association of the device, wherein the step of controlling the designated device carrying the unique identifier CUDID to perform the anonymized data association of the device through the anonymized Id, further comprises:
and controlling the designated equipment carrying the equipment unique identifier CUDID to carry out equipment anonymization data association through the new anonymized Id.
The device anonymization data association processing method comprises the steps of, the step of checking the designated equipment to be subjected to data association and the equipment through the unified identity authentication platform of the manufacturer comprises the following steps:
and constructing a diversified identity authentication system through a unified identity authentication platform in advance, and performing device validity verification on the designated device.
The method for processing the anonymized data association of the equipment, wherein the step of verifying the validity of the equipment for the designated equipment needing to be subjected to the data association through the unified identity authentication platform of the manufacturer comprises the following steps:
Connecting appointed equipment needing data association;
Performing parameter validity check on the designated equipment needing data association through a verification interface of a unified identity authentication platform of the manufacturer;
when the parameter legitimacy is checked, judging whether the unique identifier UDID of the appointed equipment is legal or not, and if not, alarming;
When detecting that the unique identifier UDID of the specified device is legal, further judging whether the relationship of the unique identifier UDID of the specified device has a conflict, if so, checking the conflict, and reassigning the unique identifier UDID which does not have the conflict;
and when judging that the unique identifier UDID of the appointed equipment and the relation thereof have no conflict, judging that the equipment validity check passes.
The device anonymization data association processing method, wherein the step of generating the device unique identifier CUDID for associating all information corresponding to the designated device when verification is passed, comprises the following steps:
if the unique identifier UDID relation of the designated equipment is judged to be that no conflict exists, generating new CUDID, CDID and SID;
the CUDID is a unique identifier (unique Id) generated for the unified identity authentication platform and used for associating all other information;
the CDID is a redundant ID for eliminating the device unique identifier CUDID.
The SID is an activation ID and is used for a customer service system.
The method for processing the anonymized data association of the device, wherein the step of controlling the designated device carrying the unique identifier CUDID of the device to carry out the anonymized data association of the device through the anonymized Id comprises the following steps:
controlling the appointed equipment carrying the equipment unique identifier CUDID to collect interface data through the anonymous Id, and placing the collected data into a message queue of a distributed publishing subscription message kafka;
Acquiring consumption data from a message queue of the distributed publishing and subscribing message kafka, writing the acquired consumption data into an ES database, and establishing that a unique anonymous Id of a server is associated with an anonymous Id of the appointed equipment for controlling data intercommunication of the same manufacturer;
When a data query instruction is received, the unique anonymous Id of the server side is associated with the anonymous Id of the equipment according to the query instruction, and the data intercommunication of the same manufacturer is controlled.
A device anonymized data association processing method apparatus, wherein the apparatus comprises:
The checking module is used for checking the validity of the designated equipment needing data association through a unified identity authentication platform of the manufacturer;
an ID association module for generating a device unique identifier CUDID for associating all information corresponding to the specified device when verification is passed;
the generation and reporting module is used for applying the checked designated equipment carrying the unique equipment identifier CUDID to generate an anonymous Id, storing the unique equipment carrying the unique equipment identifier CUDID for generating the anonymous Id locally and reporting the unique equipment carrying the unique equipment identifier CUDID to the server;
And the data association module is used for controlling the designated equipment carrying the equipment unique identifier CUDID to carry out equipment anonymization data association through the anonymized Id.
A smart terminal comprising a memory and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by one or more processors, the one or more programs comprising means for performing any of the methods.
A non-transitory computer readable storage medium, wherein instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform any one of the methods.
The method and the device have the beneficial effects that the embodiment of the invention provides a device anonymized data association processing method, a device, an intelligent terminal and a storage medium, and the method and the device assign a globally unique anonymized identifier to the device by checking the legitimacy of the device; and the unique identifier after the equipment verification is associated with the equipment and the application anonymous Id, and the unique anonymous Id of the server is associated with the equipment anonymous Id, so that the data of the same manufacturer can be communicated, the equipment anonymized data association is realized, the data universality is improved, the data security is improved, and the personal privacy is protected.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments described in the present invention, and other drawings may be obtained according to the drawings without inventive effort to those skilled in the art.
Fig. 1 is a flow chart of a device anonymization data association processing method provided by an embodiment of the present invention.
Fig. 2 is a schematic flow chart of a specific application embodiment of the device anonymized data association processing method provided by the invention.
Fig. 3 is a block diagram of an implementation of one embodiment of a method for processing anonymized data association of a device according to an embodiment of the present invention.
Fig. 4 is a schematic diagram of anonymous Id association according to one embodiment of a method for device anonymized data association processing according to the embodiment of the present invention.
Fig. 5 is a schematic flow chart of another specific application embodiment of the device anonymized data association processing method provided by the invention.
Fig. 6 is a schematic block diagram of a device anonymized data association processing method and device according to an embodiment of the present invention.
Fig. 7 is a schematic block diagram of an internal structure of an intelligent terminal according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more clear and clear, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
It should be noted that, if directional indications (such as up, down, left, right, front, and rear are referred to in the embodiments of the present invention), the directional indications are merely used to explain the relative positional relationship, movement conditions, and the like between the components in a specific posture (as shown in the drawings), and if the specific posture is changed, the directional indications are correspondingly changed.
ES is a distributed search and analysis engine. Es (elastic search) the database is what, ELASTICSEARCH (ES) the database is a distributed, highly extended, highly real-time search and data analysis engine. The method can conveniently enable a large amount of data to have the capabilities of searching, analyzing and exploring.
The ES uses a log-like manner to store data and refresh the data in memory to disk through a periodic disk flushing mechanism. This process typically involves multi-threading and asynchronous operations.
The method and the device for the data authentication of the public network equipment assign globally unique anonymous identifiers to the equipment by checking the validity of the equipment, associate the unique identifiers after the equipment is checked with the equipment and the application anonymous Id, and associate the unique anonymous Id of the server with the anonymous Id of the equipment, so that the data of the same manufacturer can be communicated, the association of the anonymized data of the equipment is realized, the universality of the data is improved, the security of the data is improved, and the personal privacy is protected.
The process according to the invention is described in further detail by means of the following examples:
Exemplary method
As shown in fig. 1, an embodiment of the present invention provides a device anonymized data association processing method, which may be applied to an intelligent terminal. In an embodiment of the present invention, the method includes the following steps:
Step S100, carrying out equipment validity verification on specified equipment needing data association through a unified identity authentication platform of a manufacturer;
As shown in fig. 2, before the embodiment of the present invention, a diversified identity authentication system needs to be constructed in advance through a unified identity authentication platform, so as to perform device validity verification on a designated device. In the embodiment of the invention, oneID unified identity authentication platforms aim to construct diversified identity authentication systems, integrate various authentication login modes and realize the identity authentication of a user 'real name, real person and real card'.
In the embodiment of the invention, firstly, specified equipment to be subjected to data association is subjected to equipment validity verification through a unified identity authentication platform (OneID system, also called equipment verification system) of the manufacturer, for example, whether the specified equipment is equipment produced by the manufacturer is verified, if yes, the specified equipment is legal, if not, the specified equipment is illegal, and the like:
specifically, as shown in fig. 2, step S101, a designated device to be subjected to data association is connected;
Step S102, checking the validity of parameters of the designated equipment needing data association through a verification interface of a unified identity authentication platform of the manufacturer to verify whether the designated equipment is equipment produced by the manufacturer;
As shown in fig. 2, the unified identity authentication platform of the manufacturer is also called a device verification system, and is used for performing parameter validity check on the designated device to verify whether the designated device, i.e. the device needing to perform data association, is a legal device authorized by the designated manufacturer.
Step S103, when the parameter legitimacy is checked, judging whether the unique identifier UDID of the appointed equipment is legal or not, and if not, alarming;
When the validity of the parameter is checked, if the parameter is judged to be illegal (for example, the equipment name of the appointed equipment is not authorized legal equipment), the checking prompt is carried out to be the illegal parameter, if the parameter is legal, whether the unique identifier UDID of the appointed equipment is legal or not is judged, namely, whether the unique identifier UDID of the appointed equipment is the unique identifier UDID of the authorized legal equipment or not is verified, if not, the alarm is carried out, and if yes, the step S104 is carried out.
Wherein the UDID is a device unique identifier, and is generated when the device is generated or invoked. In the embodiment of the invention, the legal verification of the udid in the equipment verification is that the udid is obtained by calculating the udid by using a unified algorithm with a client, and whether the udid is the same with the client is judged.
Step S104, when detecting that the unique identifier UDID of the designated equipment is legal, further judging whether the relationship of the unique identifier UDID of the designated equipment has conflict, if so, checking the conflict, and reassigning the non-conflicting unique identifier UDID;
In this step, when detecting that the unique identifier UDID of the specified device is legal, it is further determined whether there is a conflict in the unique identifier UDID relationship of the specified device, where whether there is a conflict refers to whether there is a same unique identifier UDID in different devices in the same manufacturer device, that is, whether there is a conflict in the unique identifier UDID. If the conflict exists, the conflict is checked, and a conflict problem is returned to reassign the non-conflicting unique identifier UDID, so that the UDID relationship conflict problem is solved.
Step S105, when judging that there is no conflict between the unique identifier UDID of the specified device and the relationship thereof, determines that the device validity check passes.
In the embodiment of the invention, when the unique identifier UDID of the appointed equipment and the relation thereof are judged to have no conflict, the passing of the equipment validity check is judged,
Step 200, when verification passes, generating a device unique identifier CUDID corresponding to the specified device for associating all information;
in the embodiment of the invention, when the validity of the designated equipment is checked, a unique equipment identifier CUDID which corresponds to the designated equipment and is used for associating all information is generated, when the specific implementation is carried out, if the unique identifier UDID relationship of the designated equipment is judged to be collision-free, a new CUDID, CDID and SID which correspond to the designated equipment one by one is generated, data are returned, and the data are stored in a cache, for example, a mysql database or a Redis database, wherein Redis is an open source (BSD permission), and the data structure in an internal memory is used as a database, a cache and a message proxy.
The CUDID is a unique identifier (unique Id) generated for the unified identity authentication platform and used for associating all other information;
the CDID is a redundant ID for eliminating the device unique identifier CUDID.
The SID is an activation ID and is used for a customer service system.
Step S300, applying for generating an anonymous Id by the checked specified equipment carrying the unique equipment identifier CUDID, and storing the unique equipment identifier CUDID of the specified equipment carrying the anonymous Id locally and reporting the unique equipment identifier CUDID to a server;
In the embodiment of the present invention, as shown in fig. 2, the designated device carrying the unique identifier CUDID that passes the verification applies for generating an anonymous Id, where the anonymous Id is an Id after anonymization, and the anonymous Id is an Id that does not display a user name, which is beneficial to protecting user privacy. In the invention, the corresponding relation established by the unique identifier CUDID of the designated equipment carrying equipment for generating the anonymous Id is stored locally and reported to the server. The following steps are convenient for carrying out the anonymization data association of the equipment.
And step S400, controlling the designated equipment carrying the equipment unique identifier CUDID to carry out equipment anonymization data association through the anonymized Id.
In this step, the designated device carrying the unique identifier CUDID is controlled to perform the device anonymization data association through the anonymized Id. Specifically, as shown in fig. 2, the designated device carrying the unique identifier CUDID of the device is controlled to collect interface data through the anonymous Id, and the collected data is put into a message queue of a distributed publish-subscribe message kafka;
Acquiring consumption data from a message queue of the distributed publishing and subscribing message kafka, writing the acquired consumption data into an ES database, and establishing that a unique anonymous Id of a server is associated with an anonymous Id of the appointed equipment for controlling data intercommunication of the same manufacturer;
When a data query instruction is received, the unique anonymous Id of the server side is associated with the anonymous Id of the equipment according to the query instruction, and the data intercommunication of the same manufacturer is controlled.
Further, the method for processing the anonymized data association of the device, wherein the step of performing device inspection on the designated device needing to perform data association through the unified identity authentication platform of the manufacturer further comprises the following steps:
When an operation instruction for resetting the anonymous Id is obtained, the designated equipment carrying the unique equipment identifier CUDID is controlled to reapply to generate a new anonymous Id, and the designated equipment carrying the unique equipment identifier CUDID for generating the new anonymous Id is stored locally and reported to a server.
Wherein the step of controlling the designated device carrying the unique identifier CUDID to perform device anonymization data association according to the anonymized Id further includes:
and controlling the designated equipment carrying the equipment unique identifier CUDID to carry out equipment anonymization data association through the new anonymized Id.
The invention is further illustrated by the following specific examples of application:
as shown in FIG. 3, a device association diagram of the device anonymized data association processing method implemented by the present invention is CUDID: oneId, which is a unique Id of the system, and is used for associating all other information;
The first portion, manufacturer information, includes the MAC, EMMCID, barcode of the device (e.g., the designated device), wherein the physical address of the MAC device, physical addresses (PHYSICAL ADDRESS), EMMCID are embedded memory IDs, and Barcode is a device Barcode.
The second part, oneID system, is a unified identity authentication platform (OneID system, also called device verification system) of the manufacturer, which is preset in the invention, and is used for verifying the validity of the designated device to be subjected to data association. The core of OneID system has two IDs, CDID, and CUDID, wherein the CUDID: oneId system unique Id is used for associating all other information, and the CDID is used for eliminating CUDID redundancy. OneID systems can provide a validity check service and a relationship query service for a given device.
Wherein CUDID may not be visible to any cloud service other than OneID system and big data, and there is no repetition probability, but there may be redundancy;
The CDID can be just used for eliminating CUDID redundancy, and the repetition probability is zero and is used for identifying equipment for business service;
In the embodiment of the invention, the OneID system constructs information association of each device based on CUDID, each service can inquire the OneID system about the possibly associated device (CDID) through any ID under the OneID system on the premise of obtaining authorization, and each service can obtain other ID information (controlled by the authorization) of the device through the device (CDID).
For example, as shown in fig. 3, for a company system, IDs identifying devices are generated in the system, and only UDIDs and SIDs are provided to application programs that have system rights and are defined as system applications;
the UDID is generated after each system reset in the terminal local area, the repetition probability is extremely low, and the UDID can be used for auxiliary equipment confirmation when the SID is repeated. The SID is a service ID (also called an activation ID) and is special for a customer service system, and the SID is short and easy to read but has low repetition probability.
As shown in FIG. 3, the invention can obtain 3 anonymous IDs for any application at the application end, and the purposes and the characteristics of the anonymous IDs are different, and the invention comprises the following steps:
AAID, basically unchanged repetition probability is extremely low under the conditions that the system is not reset and the application is not unloaded;
VAID, under the condition that the application signature is the same as the Linux UID, the cross-application identical repetition probability is extremely low;
OAID, can be used for realizing the equipment identification sharing of cross-companies, has low repetition probability when having a value, and can be reset by a user or can be refused to provide (empty).
FIG. 4 is a schematic diagram of a device verification process and anonymous Id association;
the UDID is a unique identifier of the device, the generation time is generated when the device is generated or invoked, the characteristics are irreversible, unique, closed, consistent and tamper-proof, whether the device is reset or not is always unchanged unless hardware changes, the data relevance is full relevance, and the applicable object is a production environment and validity check which can be used for the device and is not opened to the outside.
OAID is an anonymous device identifier, the generation time is generated immediately after the system is started for the first time, the characteristics are closeable and connectivity, the special conditions of whether the system is reset to be user-resettable, factory setting is restored, the equipment manufacturer is reset, a machine is refreshed and the like are reset, the data relevance is relevance such as passing advertisements and the like, and the applicable objects are services such as personalized recommendation, advertisement marketing and the like.
VAID is an anonymous device identifier of a developer, the generation time is generated when the application is installed, the characteristics are anonymization, the same device and the same developer are consistent, all applications about whether the applications are reset to uninstall the developer are reset, factory setting is restored, the device is reset, special conditions such as a machine being brushed and the like are reset, the data relevance is related through the developer and the like, and the applicable object is recommendation and the like which can be used for unifying different applications of the developer.
The AAID is an application anonymous device identifier, the generation time is the generation time when the application is installed, the characteristics are anonymization and no privacy risk, the application data is cleared, the factory setting is restored, the equipment manufacturer is reset, special conditions such as a machine brushing and the like are reset, the data relevance is the relevance through a single application, and the applicable object is the application statistics and the like.
In this way, the method for processing the anonymized data of the embodiment of the present application is illustrated by taking the application package signature installation of the device terminal as an example, and includes the following steps:
Step 1, loading an equipment terminal system to generate a UDID;
UDID is a device unique identifier, and the generation timing is generated at the time of device generation or at the time of call. The data association of the unique identifier UDID of the device is full association, and the applicable objects are the production environment and validity check available for the device and are not open to the outside.
Step 2, checking whether the personalized tracking switch is generated OAID by the equipment terminal;
OAID is an anonymous device identifier, can be associated by advertisements and the like, and is applicable to services such as personalized recommendation, advertisement marketing and the like.
Step 3, checking application developer signature by the equipment terminal, and generating VAID;
VAID is a developer anonymous device identifier, which may be generated at the time of application installation, may be associated by the developer, etc.
Step 4, equipment terminal application installation;
the AAID is an application anonymous device identifier, generated at the time of application installation, and can be associated by a single application;
step 5, the equipment terminal performs anonymization data association with the equipment information service;
I. Submitting necessary terminal information (UDID) for legal inspection and security audit;
II. Returning a verification result;
and III, supplementing important information (OAID/VAID/AAID) related to the terminal for after-sales service.
From the above, in the embodiment of the invention, the unique anonymous Id is distributed to supplement the device to generate the short board of the anonymous Id through the server, and the unique anonymous Id of the server is associated with the anonymous Id of the device, so that the data of the same manufacturer can be communicated. The method distributes the globally unique anonymous identifier to the equipment by checking the validity of the equipment, associates the unique identifier checked by the equipment with the equipment and the application anonymous Id, improves the universality of data, improves the security of the data and protects the personal privacy.
Exemplary apparatus
As shown in fig. 6, an embodiment of the present invention provides a device anonymized data association processing method apparatus, where the device includes:
The checking module 310 is configured to check the validity of the device by using a unified identity authentication platform of the manufacturer for the designated device to be subjected to data association;
An ID association module 320, configured to generate, when verification passes, a device unique identifier CUDID corresponding to the specified device for associating all information;
the generating and reporting module 330 is configured to apply for generating an anonymous Id from the specified device that has passed the verification and has a unique identifier CUDID of the specified device, and store the unique identifier CUDID of the specified device that has generated the anonymous Id locally and report the same to a server;
And the data association module 340 is configured to control the designated device carrying the device unique identifier CUDID to perform device anonymization data association through the anonymized Id, as described above.
Based on the above embodiment, the present invention further provides an intelligent terminal, and a functional block diagram thereof may be shown in fig. 7. The intelligent terminal comprises a processor, a memory, a network interface and a display screen which are connected through a system bus. The processor of the intelligent terminal is used for providing computing and control capabilities. The memory of the intelligent terminal comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the intelligent terminal is used for communicating with an external terminal through network connection. The computer program, when executed by a processor, implements a device anonymization data association processing method. The display screen of the intelligent terminal can be a liquid crystal display screen or an electronic ink display screen, and the camera of the intelligent terminal is arranged in the intelligent terminal in advance.
It will be appreciated by those skilled in the art that the schematic block diagram shown in fig. 7 is merely a block diagram of a portion of the structure associated with the present inventive arrangements and is not limiting of the smart terminal to which the present inventive arrangements are applied, and that a particular smart terminal may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a smart terminal is provided that includes a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by one or more processors, the one or more programs comprising instructions for:
carrying out equipment validity verification on appointed equipment needing data association through a unified identity authentication platform of a manufacturer;
Generating a device unique identifier CUDID for associating all information corresponding to the specified device when verification passes;
applying for generating an anonymous Id by the specified device which passes the verification and carries the unique identifier CUDID, and storing the unique identifier CUDID of the specified device which generates the anonymous Id locally and reporting the unique identifier to a server;
And controlling the designated equipment carrying the equipment unique identifier CUDID to carry out equipment anonymization data association through the anonymized Id, and the specific steps are described above.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (SYNCHLINK) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
In summary, the embodiment of the invention provides a device anonymization data association processing method, a device, an intelligent terminal and a storage medium, wherein the method comprises the steps of carrying out device validity verification on designated devices needing to be subjected to data association through a unified identity authentication platform of a manufacturer, applying for generating an anonymity Id through the designated devices which are subjected to verification and carry out the unique device identifier CUDID when the verification is carried out by generating a unique device identifier CUDID corresponding to the designated devices and used for associating all information, storing the unique identifier CUDID of the designated devices which are subjected to the detection and carry out the anonymity Id locally and reporting the unique identifier CUDID of the designated devices which are subjected to the generation of the anonymity Id to a server, and controlling the designated devices carrying the unique device identifier CUDID to carry out the anonymity data association through the anonymity Id. The invention can realize the anonymization data association of the equipment, improves the data security and protects the personal privacy.
It will be appreciated that the application of the present invention is not limited to the examples described above, and that modifications or variations may be made by those skilled in the art in light of the above description, for example using the average or weighted frame rate of the forward reference time as a reference factor for the threshold decision. Instead of determining the adaptive threshold, using the minimum interval time as a trigger for frame rate adjustment, all such modifications and variations are intended to fall within the scope of the appended claims.

Claims (8)

1. A method for device anonymization data association processing, the method comprising:
carrying out equipment validity verification on appointed equipment needing data association through a unified identity authentication platform of a manufacturer;
The step of verifying the validity of the equipment for the specified equipment needing to be subjected to data association through the unified identity authentication platform of the manufacturer comprises the following steps:
Connecting appointed equipment needing data association;
Performing parameter validity check on the designated equipment needing data association through a verification interface of a unified identity authentication platform of the manufacturer;
when the parameter legitimacy is checked, judging whether the unique identifier UDID of the appointed equipment is legal or not, and if not, alarming;
When detecting that the unique identifier UDID of the specified device is legal, further judging whether the relationship of the unique identifier UDID of the specified device has a conflict, if so, checking the conflict, and reassigning the unique identifier UDID which does not have the conflict;
when the unique identifier UDID of the appointed equipment and the relationship thereof are judged to have no conflict, judging that the equipment validity check passes;
Generating a device unique identifier CUDID for associating all information corresponding to the specified device when verification passes;
applying for generating an anonymous Id by the specified device which passes the verification and carries the unique identifier CUDID, and storing the unique identifier CUDID of the specified device which generates the anonymous Id locally and reporting the unique identifier to a server;
controlling the designated equipment carrying the equipment unique identifier CUDID to carry out equipment anonymization data association through the anonymized Id;
the step of controlling the designated device carrying the device unique identifier CUDID to perform device anonymization data association through the anonymized Id includes:
controlling the appointed equipment carrying the equipment unique identifier CUDID to collect interface data through the anonymous Id, and placing the collected data into a message queue of a distributed publishing subscription message kafka;
Acquiring consumption data from a message queue of the distributed publishing and subscribing message kafka, writing the acquired consumption data into an ES database, and establishing that a unique anonymous Id of a server is associated with an anonymous Id of the appointed equipment for controlling data intercommunication of the same manufacturer;
When a data query instruction is received, the unique anonymous Id of the server side and the anonymous Id of the equipment are associated according to the query instruction, so that data intercommunication of the same manufacturer is controlled, and the universality and the safety of the data are improved.
2. The method for processing anonymized data association according to claim 1, wherein the step of performing device verification on a designated device to be subjected to data association through a unified identity authentication platform of a manufacturer further comprises:
When an operation instruction for resetting the anonymous Id is obtained, the designated equipment carrying the unique equipment identifier CUDID is controlled to reapply to generate a new anonymous Id, and the designated equipment carrying the unique equipment identifier CUDID for generating the new anonymous Id is stored locally and reported to a server.
3. The device anonymized data association processing method according to claim 2, wherein the step of controlling the specified device carrying the device unique identifier CUDID to perform device anonymized data association by the anonymized Id further comprises:
and controlling the designated equipment carrying the equipment unique identifier CUDID to carry out equipment anonymization data association through the new anonymized Id.
4. The method for processing anonymized data association according to claim 1, wherein before the step of verifying the designated device to be subjected to data association by the unified identity authentication platform of the manufacturer, the method comprises:
and constructing a diversified identity authentication system through a unified identity authentication platform in advance, and performing device validity verification on the designated device.
5. The device anonymized data association processing method according to claim 1, wherein the step of generating the device unique identifier CUDID for associating all the information corresponding to the specified device when checking comprises:
If the unique identifier UDID relation of the designated equipment is judged to be in conflict, generating a new CUDID, CDID and SID;
the CUDID is a unique identifier (unique Id) generated for the unified identity authentication platform and used for associating all other information;
the CDID is used for eliminating the redundant ID of the unique identifier CUDID of the equipment;
The SID is an activation ID and is used for a customer service system.
6. A device anonymized data association processing method apparatus, wherein the device anonymized data association processing method apparatus is applied to the device anonymized data association processing method according to any one of claims 1 to 5, the apparatus comprising:
The checking module is used for checking the validity of the designated equipment needing data association through a unified identity authentication platform of the manufacturer;
an ID association module for generating a device unique identifier CUDID for associating all information corresponding to the specified device when verification is passed;
the generation and reporting module is used for applying the checked designated equipment carrying the unique equipment identifier CUDID to generate an anonymous Id, storing the unique equipment carrying the unique equipment identifier CUDID for generating the anonymous Id locally and reporting the unique equipment carrying the unique equipment identifier CUDID to the server;
And the data association module is used for controlling the designated equipment carrying the equipment unique identifier CUDID to carry out equipment anonymization data association through the anonymized Id.
7. An intelligent terminal comprising a memory, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by one or more processors, the one or more programs comprising instructions for performing the method of any of claims 1-5.
8. A non-transitory computer readable storage medium, wherein instructions in the storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the method of any one of claims 1-5.
CN202310365469.4A 2023-03-30 2023-03-30 Device anonymization data association processing method, device, and terminal Active CN116388982B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310365469.4A CN116388982B (en) 2023-03-30 2023-03-30 Device anonymization data association processing method, device, and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310365469.4A CN116388982B (en) 2023-03-30 2023-03-30 Device anonymization data association processing method, device, and terminal

Publications (2)

Publication Number Publication Date
CN116388982A CN116388982A (en) 2023-07-04
CN116388982B true CN116388982B (en) 2025-09-26

Family

ID=86970654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310365469.4A Active CN116388982B (en) 2023-03-30 2023-03-30 Device anonymization data association processing method, device, and terminal

Country Status (1)

Country Link
CN (1) CN116388982B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117014850B (en) * 2023-10-07 2024-01-19 深圳市鲸视科技有限公司 Device searching method, system, device, computer device and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9706032B2 (en) * 2013-06-06 2017-07-11 Apple Inc. Device locator disable authentication
US20150026330A1 (en) * 2013-07-16 2015-01-22 Cellco Partnership D/B/A Verizon Wireless Generating unique identifiers for mobile devices
CN112379900A (en) * 2020-12-02 2021-02-19 天翼电子商务有限公司 Method and system for anonymous identification (VAID) of terminal equipment
CN112565479B (en) * 2020-12-07 2023-07-11 北京明略昭辉科技有限公司 Dynamic generation method and system of device ID, computer device and storage medium
CN113032823B (en) * 2021-02-26 2023-08-01 加和(北京)信息科技有限公司 Method and device for generating device ID
CN115273161A (en) * 2022-08-12 2022-11-01 深圳市欢太数字科技有限公司 Method and device for identifying equipment identifier, server and storage medium

Also Published As

Publication number Publication date
CN116388982A (en) 2023-07-04

Similar Documents

Publication Publication Date Title
CA3101781C (en) Methods and systems for identity creation, verification and management
CN113542288B (en) Service authorization method, device, equipment and system
CN110599137A (en) Electronic bill data processing method and device and computer equipment
US10210510B1 (en) Conditioned use of certificates
US9235840B2 (en) Electronic transaction notification system and method
US10474843B2 (en) Identifying stolen databases
CN112528268B (en) Cross-channel applet login management method and device and related equipment
CN106254366B (en) Identification processing method, device and system for routing inspection
CN116388982B (en) Device anonymization data association processing method, device, and terminal
KR20120070079A (en) User authenication system by using personal identification number, user terminal device, inquiry apparatus, authenication server, and user authenication method therefor
CN110138715A (en) Real name identification method, device, computer equipment and storage medium
US20250260580A1 (en) Systems and methods for user identification and/or retrieval of user-related data at a local auxiliary system
CN113704211B (en) Data query method and device, electronic equipment and storage medium
CN112200637A (en) Financing lease transaction processing method and system based on block chain
CN115664772A (en) Access request processing method and device, computer equipment and storage medium
US20250007709A1 (en) System and method for secret rotation using contextual management of machine identities
CN114971505A (en) Workflow calling method and device, computer equipment and storage medium
CN117439816A (en) Application stealth method and device and computer equipment
Kurniawan et al. Securing machine learning engines in IoT applications with attribute-based encryption
CN115550018A (en) Access right authentication method, device, unified authentication system and program product
Kazemi et al. Analysis of scalability and risks in cloud computing
CN116933326A (en) Data processing method and device based on safety house, electronic equipment and storage medium
CN114186216A (en) System access control method, system, computer device and storage medium
CN115378620A (en) Intelligent contract management method and device, computer equipment and storage medium
Jamil et al. Machine Learning–Based Identity and Access Management for Cloud Security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant